text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Testing Ising Models
Constantinos Daskalakis∗
EECS, MIT
[email protected]
Nishanth Dikkala†
EECS, MIT
[email protected]
Gautam Kamath‡
EECS, MIT
[email protected]
arXiv:1612.03147v4 [cs.DS] 30 Oct 2017
November 1, 2017
Abstract
Given samples from an unknown multivariate distribution p, is it possible to distinguish
whether p is the product of its marginals versus p being far from every product distribution?
Similarly, is it possible to distinguish whether p equals a given distribution q versus p and q
being far from each other? These problems of testing independence and goodness-of-fit have
received enormous attention in statistics, information theory, and theoretical computer science,
with sample-optimal algorithms known in several interesting regimes of parameters [BFF+ 01,
Pan08, VV17, ADK15, DK16]. Unfortunately, it has also been understood that these problems
become intractable in large dimensions, necessitating exponential sample complexity.
Motivated by the exponential lower bounds for general distributions as well as the ubiquity
of Markov Random Fields (MRFs) in the modeling of high-dimensional distributions, we initiate
the study of distribution testing on structured multivariate distributions, and in particular
the prototypical example of MRFs: the Ising Model. We demonstrate that, in this structured
setting, we can avoid the curse of dimensionality, obtaining sample and time efficient testers for
independence and goodness-of-fit. One of the key technical challenges we face along the way is
bounding the variance of functions of the Ising model.
∗
Supported by a Microsoft Research Faculty Fellowship, NSF CCF-1551875, CCF-1617730, CCF-1650733, and
ONR N00014-12-1-0999.
†
Supported by NSF CCF-1551875, CCF-1617730, CCF-1650733, and ONR N00014-12-1-0999.
‡
Supported by NSF CCF-1551875, CCF-1617730, CCF-1650733, and ONR N00014-12-1-0999.
Contents
1 Introduction
1.1 Further Technical Discussion and Highlights . . . . . . . .
1.1.1 Structural Results for Ferromagnetic Ising Models
1.1.2 A Linear Lower Bound for Testing Ising Models . .
1.2 Organization . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
8
8
9
10
2 Preliminaries
10
2.1 Input to Goodness-of-Fit Testing Algorithms . . . . . . . . . . . . . . . . . . . . . . 12
2.2 Symmetric KL Divergence Between Two Ising Models . . . . . . . . . . . . . . . . . 13
3 A General Purpose Localization Algorithm
13
3.1 Independence Test using Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2 Identity Test using Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4 Improved Tests for Forests and Ferromagnetic Ising Models
4.1 Improved Algorithms for Independence and Identity Testing on Forests . .
4.2 Ferromagnetic Ising Models: A Structural Understanding and an Improved
dence Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2.1 Random Cluster Model . . . . . . . . . . . . . . . . . . . . . . . .
4.2.2 Coupling between the Random Cluster Model and the Ising model
. . . . . .
Indepen. . . . . .
. . . . . .
. . . . . .
5 An Improved Test for High-Temperature Ising Models: A Learn-then-Test
gorithm
5.1 Weak Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.1 Weak Learning the Edges of an Ising Model . . . . . . . . . . . . . . . . .
5.2 Testing Our Learned Hypothesis . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3 Combining Learning and Testing . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.4 Balancing Weak Learning and Testing . . . . . . . . . . . . . . . . . . . . . . . .
5.5 Changes Required for General Independence and Identity Testing . . . . . . . . .
5.5.1 Independence Testing under an External Field . . . . . . . . . . . . . . .
5.5.2 Identity Testing under No External Field . . . . . . . . . . . . . . . . . .
5.5.3 Identity Testing under an External Field . . . . . . . . . . . . . . . . . . .
16
17
20
20
21
Al.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
25
28
28
31
31
32
32
32
34
35
6 Comparing Localization and Learn-then-Test Algorithms
36
7 Bounding the Variance of Functions of the Ising Model in the High-Temperature
Regime
7.1 Overview of the Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.2 Bounding Variance of Z 0 Under No External Field . . . . . . . . . . . . . . . . . . .
0
7.3 Bounding Variance of Zcen
Under Arbitrary External Field . . . . . . . . . . . . . . .
40
40
41
42
8 Lower Bounds
8.1 Dependences on n . . .
8.2 Dependences on h, β . .
8.3 Lower Bound Proofs . .
8.3.1 Proof of Theorem
8.3.2 Proof of Theorem
43
43
44
44
44
46
. .
. .
. .
18
19
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
8.3.3
Proof of Theorem 20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
50
A Weakly Learning Rademacher Random Variables
55
B An Attempt towards Testing by Learning in KL-divergence
57
1
Introduction
The two most fundamental problems in Statistics are perhaps testing independence and goodnessof-fit. Independence testing is the problem of distinguishing, given samples from a multivariate
distribution p, whether or not it is the product of its marginals. The applications of this problem
abound: for example, a central problem in genetics is to test, given genomes of several individuals, whether certain single-nucleotide-polymorphisms (SNPs) are independent from each other. In
anthropological studies, a question that arises over and over again is testing whether the behaviors of individuals on a social network are independent; see e.g. [CF07]. The related problem of
goodness-of-fit testing is that of distinguishing, given samples from p, whether or not it equals a
specific “model” q. This problem arises whenever one has a hypothesis (model) about the random
source generating the samples and needs to verify whether the samples conform to the hypothesis.
Testing independence and goodness-of-fit have a long history in statistics, since the early days;
for some old and some more recent references see, e.g., [Pea00, Fis35, RS81, Agr12]. Traditionally,
the emphasis has been on the asymptotic analysis of tests, pinning down their error exponents as
the number of samples tends to infinity [Agr12, TAW10]. In the two decades or so, distribution
testing has also piqued the interest of theoretical computer scientists, where the emphasis has been
different [BFF+ 01, Pan08, LRR13, VV17, ADK15, CDGR16, DK16]. In contrast to much of the
statistics literature, the goal has been to minimize the number of samples required for testing. From
this vantage point, our testing problems take the following form:
Goodness-of-fit (or Identity) Testing: Given sample access to an unknown distribution p over
Σn and a parameter ε > 0, the goal is to distinguish with probability at least 2/3 between
p = q and d(p, q) > ε, for some specific distribution q, from as few samples as possible.
Independence Testing: Given sample access to an unknown distribution p over Σn and a
parameter ε > 0, the goal is to distinguish with probability at least 2/3 between p ∈ I(Σn )
and d(p, I(Σn )) > ε, where I(Σn ) is the set of product distributions over Σn , from as few
samples as possible.
In these problem definitions, Σ is some discrete alphabet, and d(·, ·) some notion of distance or
divergence between distributions, such as the total variation distance or the KL divergence. As
usual, 32 is an arbitrary choice of a constant, except that it is bounded away from 21 . It can always
be boosted to some arbitrary 1 − δ at the expense of a multiplicative factor of O(log 1/δ) in the
sample complexity.
For both testing problems, recent work has identified tight upper and lower bounds on their
sample complexity [Pan08, VV17, ADK15, DK16]: when d is taken to bethe total
variation distance,
n/2
the optimal sample complexity for both problems turns out to be Θ |Σ|ε2 , i.e. exponential in
the dimension. As modern applications commonly involve high-dimensional data, this curse of
dimensionality makes the above testing goals practically unattainable. Nevertheless, there is a
sliver of hope, and it lies with the nature of all known sample-complexity lower bounds, which
construct highly-correlated distributions that are hard to distinguish from the set of independent
distributions [ADK15, DK16], or from a particular distribution q [Pan08]. Worst-case analysis of
this sort seems overly pessimistic, as these instances are unlikely to arise in real-world data. As such,
we propose testing high-dimensional distributions which are structured, and thus could potentially
rule out such adversarial distributions.
Motivated by the above considerations and the ubiquity of Markov Random Fields (MRFs) in
the modeling of high-dimensional distributions (see [Jor10] for the basics of MRFs and the references
[STW10, KNS07] for a sample of applications), we initiate the study of distribution testing for the
1
prototypical example of MRFs: the Ising Model, which captures all binary MRFs with node and
edge potentials.1 Recall that the Ising model is a distribution over {−1, 1}n , defined in terms of
a graph G = (V, E) with n nodes. It is parameterized by a scalar parameter θu,v for every edge
(u, v) ∈ E, and a scalar parameter θv for every node v ∈ V , in terms of which it samples a vector
x ∈ {±1}V with probability:
X
X
~ ,
θu,v xu xv − Φ(θ)
(1)
p(x) = exp
θ v xv +
v∈V
(u,v)∈E
~ is the log-partition function, ensuring that the distribution
where θ~ is the parameter vector and Φ(θ)
is normalized. Intuitively, there is a random variable Xv sitting on every node of G, which may be
in one of two states, or spins: up (+1) or down (-1). The scalar parameter θv models a local (or
“external”) field at node v. The sign of θv represents whether this local field favors Xv taking the
value +1, i.e. the up spin, when θv > 0, or the value −1, i.e. the down spin, when θv < 0, and its
magnitude represents the strength of the local field. We will say a model is “without external field”
when θv = 0 for all v ∈ V . Similarly, θu,v represents the direct interaction between nodes u and v.
Its sign represents whether it favors equal spins, when θu,v > 0, or opposite spins, when θu,v < 0,
and its magnitude corresponds to the strength of the direct interaction. Of course, depending on the
structure of the Ising model and the edge parameters, there may be indirect interactions between
nodes, which may overwhelm local fields or direct interactions.
The Ising model has a rich history, starting with its introduction by statistical physicists as a
probabilistic model to study phase transitions in spin systems [Isi25]. Since then it has found a
myriad of applications in diverse research disciplines, including probability theory, Markov chain
Monte Carlo, computer vision, theoretical computer science, social network analysis, game theory,
and computational biology [LPW09, Cha05, Fel04, DMR11, GG86, Ell93, MS10]. The ubiquity
of these applications motivate the problem of inferring Ising models from samples, or inferring
statistical properties of Ising models from samples. This type of problem has enjoyed much study in
statistics, machine learning, and information theory, see, i.e., [CL68, AKN06, CT06, RWL10, JJR11,
SW12, BGS14, Bre15, VMLC16, BK16, Bha16, BM16, MdCCU16, HKM17, KM17]. Much of prior
work has focused on parameter learning, where the goal is to determine the parameters of an Ising
model to which sample access is given. In contrast to this type of work, which focuses on discerning
parametrically distant Ising models, our goal is to discern statistically distant Ising models, in the
hopes of dramatic improvements in the sample complexity. (We will come to a detailed comparison
between the two inference goals shortly, after we have stated our results.) To be precise, we study
the following problems:
Ising Model Goodness-of-fit (or Identity) Testing: Given sample access to an unknown Ising
model p (with unknown parameters over an unknown graph) and a parameter ε > 0, the
goal is to distinguish with probability at least 2/3 between p = q and dSKL (p, q) > ε, for
some specific Ising model q, from as few samples as possible.
Ising Model Independence Testing: Given sample access to an unknown Ising model p (with
unknown parameters over an unknown graph) and a parameter ε > 0, the goal is to distinguish with probability at least 2/3 between p ∈ In and dSKL (p, In ) > ε, where In are all
product distributions over {−1, 1}n , from as few samples as possible.
We note that there are several potential notions of statistical distance one could consider — classically, total variation distance and the Kullback-Leibler (KL) divergence have seen the most study.
1
This follows trivially by the definition of MRFs, and elementary Fourier analysis of Boolean functions.
2
As our focus here is on upper bounds, we consider the symmetrized KL divergence dSKL , which is
a “harder” notion of distance than both: in particular, testers for dSKL immediately imply testers
for both total variation distance and the KL divergence. Moreover, by virtue of the fact that dSKL
upper-bounds KL in both directions, our tests offer useful information-theoretic interpretations of
rejecting a model q, such as data differencing and large deviation bounds in both directions.
Sample Applications: As an instantiation of our proposed testing problems for the Ising model
one may maintain the study of strategic behavior on a social network. To offer a little bit of
background, a body of work in economics has modeled strategic behavior on a social network as
the evolution of the Glauber dynamics of an Ising model, whose graph is the social network, and
whose parameters are related to the payoffs of the nodes under different selections of actions by
them and their neighbors. For example, [Ell93, MS10] employ this model to study the adoption of
competing technologies with network effects, e.g. iPhone versus Android phones. Glauber dynamics,
as described in Section 2, define the canonical Markov chain for sampling an Ising model. Hence an
observation of the actions (e.g. technologies) used by the nodes of the social network should offer
us a sample from the corresponding Ising model (at least if the Glauber dynamics have mixed).
An analyst may not know the underlying social network or may know the social network but not
the parameters of the underlying Ising model. In either case, how many independent observations
would he need to test, e.g., whether the nodes are adopting technologies independently, or whether
their adoptions conform to some conjectured parameters? Our results offer algorithms for testing
such hypotheses in this stylized model of strategic behavior on a network.
As another application, we turn to the field of computer vision. In the Bayesian setting, it is
assumed that images are generated according to some prior distribution. Often, practitioners take
this prior to be an Ising model in the binary case, or, in general, a higher-order MRF [GG86]. As
such, a dataset of images can be pictured as random samples from this prior. A natural question to
ask is, given some distribution, does a set of images conform to this prior? This problem corresponds
to goodness-of-fit testing for Ising models.
A third application comes up in the field of medicine and computational biology. In order to
improve diagnosis, symptom prediction and classification, as well as to improve overall healthcare
outcomes, graphical models are trained on data, often using heuristic methods [FLNP00] and surgeon intuition, thereby incorporating hard-wired expert knowledge; see, i.e., the pneumonia graphical model identified in [LAFH01]. Our methods give efficient algorithms for testing the accuracy
of such models. Furthermore, when the discrepancy is large, we expect that our algorithms could
reveal the structural reasons for the discrepancy, i.e., blaming a large portion of the error on a
misspecified edge.
Main Results and Techniques: Our main result is the following:
Theorem 1. Both Ising Model Goodness-of-fit Testing and Ising Model Independence Testing can
be solved from poly n, 1ε samples in polynomial time.
There are several variants of our testing problems, resulting from different knowledge that the analyst
may have about the structure of the graph (connectivity, density), the nature of the interactions
(attracting, repulsing, or mixed), as well as the temperature (low vs high). We proceed to discuss
all these variants, instantiating the resulting polynomial sample complexity in the above theorem.
We also illuminate the techniques involved to prove these theorems. This discussion should suffice
in evaluating the merits of the results and techniques of this paper.
A. Our Baseline Result. In the least favorable regime, i.e. when the analyst is oblivious to the
structure of the Ising model
4 2 p, 2the
signs of the interactions, and their strength, the polynomial in
p
n β +n h2
Theorem 1 becomes O
. In this expression, β = max{|θu,v
|} for independence testing,
ε2
3
p
q
and β = max{max{|θu,v
|}, max{|θu,v
|}} for goodness-of-fit testing, while h = 0 for independence
p
testing, and h = max{max{|θu |}, max{|θuq |}} for goodness-of-fit testing; see Theorem 2. If the
analyst has an upper bound on the maximum
dmax (of all Ising models involved in the
2 2 degree
n dmax β 2 +ndmax h2
problem) the dependence improves to O
, while if the analyst has an upper
ε2
bound on the total number of edges m, then max{m, n} takes the role of ndmax in the previous
bound; see Theorem 2.
Technical Discussion 1.0: “Testing via Localization.” All the bounds mentioned so far
are obtained via a simple localization argument showing that, whenever two Ising models p and q
satisfy dSKL (p, q) > ε, then “we can blame it on a node or an edge;” i.e. there exists a node with
significantly different bias under p and q or a pair of nodes u, v whose covariance is significantly
different under the two models. Pairwise correlation tests are a simple screening that is often
employed in practice. For our setting, there is a straighforward and elegant way to show that
pair-wise (and not higher-order) correlation tests suffice; see Lemma 4.
For more details about our baseline localization tester see Section 3.
B. Anchoring Our Expectations. Our next results aim at improving the afore-described baseline
bound. Before stating these improvements, however, it is worth comparing the sample complexity of
our baseline results to the sample complexity of learning. Indeed, one might expect and it is often the
case that testing problems can be solved in a two-step fashion, by first learning a hypothesis p̂ that is
statistically close to the true p and then using the learned hypothesis p̂ as a proxy for p to determine
whether it is close to or far from some q, or some set of distributions. Given that the KL divergence
and its symmetrized version do not satisfy the triangle inequality, however, it is not clear how such
an approach would work. Even if it could, the only algorithm that we are aware of for proper
learning Ising models, which offers KL divergence guarantees but does not scale exponentially with
the maximum degree and β, is a straightforward
net-based algorithm. This algorithm, explained
n6 β 2 +n4 h2
in Section B, requires Ω
samples and is time inefficient. In particular, our baseline
ε2
algorithm already beats this sample complexity and is also time-efficient. Alternatively, one could
aim to parameter-learn p; see, e.g., [SW12, Bre15, VMLC16] and their references. However, these
algorithms require sample complexity that is exponential in the maximum degree [SW12], and they
typically use samples exponential in β as well [Bre15, VMLC16]. For instance, if we use [VMLC16],
which is one of the state-of-the-art algorithms, to do parameter learning prior to testing, we would
4 β·dmax
need Õ( n ·2 ε2
) samples to learn p’s parameters closely enough to be able to do the testing
afterwards. Our baseline result beats this sample complexity, dramatically so if the degrees are
unbounded.
The problem of learning the structure of Ising models (i.e., determining which edges are present
in the graph) has enjoyed much study, especially in information theory – see [Bre15, VMLC16] for
some recent results. At a first glance, one may hope that these results have implications for testing
Ising models. However, thematic similarities aside, the two problems are qualitatively very different
– our problem focuses on statistical estimation, while theirs looks at structural estimation. To
point out some qualitative differences for these two problems, the complexity of structure learning
is exponential in the maximum degree and β, while only logarithmic in n. On the other hand, for
testing Ising models, the complexity has a polynomial dependence in all three parameters, which is
both necessary and sufficient.
C. Trees and Ferromagnets. When p is a tree-structured (or forest-structured) Ising model,
then independence testing can be performed computationally efficiently without any dependence on
β, with an additional quadratic improvement with respect to the other parameters. In particular,
without external fields, i.e. max{|θup |} = 0, independence can be solved from O( nε ) samples, and
this result is tight when m = O(n); see Theorem 3 for an upper bound and Theorem 19 for a lower
4
bound. Interestingly, we show the dependence on β cannot be avoided in the presence of external
fields, or if we switch to the problem of identity testing; see Theorem 20. In the latter case, we
can at least maintain the linear dependence on n; see Theorem 4. Similar results hold when p is a
p
ferromagnet, i.e. θu,v
≥ 0, with no external fields, even if it is not a tree. In particular, the sample
complexity becomes O( max{m,n}
) (which is again tight when m = O(n)), see Theorem 5.
ε
Technical Discussion 2.0: “Testing via Strong Localization.” The improvements that we
have just discussed are obtained via the same localization approach discussed earlier, which resulted
into our baseline tester. That is, we are still going to “blame it on a node or an edge.” The removal
of the β dependence and the improved running times are due to the proof of a structural lemma,
which relates the parameter θu,v on some edge (u, v) of the Ising model to the E[Xu Xv ]. We show
that for forest-structured Ising models with no external fields, E[Xu Xv ] = tanh(θu,v ), see Lemma 8.
A similar statement holds for ferromagnets with no external field, i.e., E[Xu Xv ] ≥ tanh(θu,v ), see
Lemma 11. The proof of the structural lemma for trees/forests is straightforward. Intuitively, the
only source of correlation between the endpoints u and v of some edge (u, v) of the Ising model is
the edge itself, as besides this edge there are no other paths between u and v that would provide
alternative avenues for correlation. Significant more work is needed to prove the inequality for
ferromagnets on arbitrary graphs. Now, there may be several paths between u and v besides the
edge connecting them. Of course, because the model is a ferromagnet, these paths should intuitively
only contribute to increase E[Xu Xv ] beyond tanh(θu,v ). But making this formal is not easy, as
calculations involving the Ising model quickly become unwieldy beyond trees.2 Our argument uses
a coupling between (an appropriate generalization of) the Fortuin-Kasteleyn random cluster model
and the Ising model. The coupling provides an alternative way to sample the Ising model by first
sampling a random clustering of the nodes, and then assigning uniformly random spins to the
sampled clusters. Moreover, it turns out that the probability that two nodes u and v land in the
same cluster increases as the vector of parameters θ~ of the Ising model increases. Hence, we can
work inductively. If only edge (u, v) were present, then E[Xu Xv ] = tanh(θu,v ). As we start adding
edges, the probability that u, v land in the same cluster increases, hence the probability that they
receive the same spin increases, and therefore E[Xu Xv ] increases.
A slightly more detailed discussion of the structural result for ferromagnets is in Section 1.1.1,
and full details about our testers for trees and ferromagnets can be found in Sections 4.1 and 4.2,
respectively.
D. Dobrushin’s Uniqueness Condition and the High-Temperature Regime. Motivated by
phenomena in the physical world, the study of Ising models has identified phase transitions in the
behavior of the model as its parameters vary. A common transition occurs as the temperature of the
model changes from low to high. As the parameters θ~ correspond to inverse (individualistic) temperatures, this corresponds to a transition of these parameters from low values (high temperature)
to high values (low temperature). Often the transition to high temperature is identified with the
satisfaction of Dobrushin-type conditions [Geo11]. Under such conditions, the model enjoys a number of good properties, including rapid mixing of the Glauber dynamics, spatial mixing properties,
and uniqueness of measure. The Ising model has been studied extensively in such high-temperature
regimes [Dob56, Cha05, Hay06, DGJ08], and it is a regime that is often used in practice.
In the high-temperature regime, we show that we can improve our baseline result without making
ferromagnetic or tree-structure assumptions, using a non-localization based argument, explained
next. In particular, we show in Theorem 7 that under high temperature
with
no external
and
n10/3
fields independence testing can be done computationally efficiently from Õ ε2 d2
samples, which
max
2
We note that the partition function is #P-hard to compute[JS93].
5
improves upon our baseline result
4/3if dmax is large enough. For instance, when dmax = Ω(n), the
sample complexity becomes Õ nε2 . Other tradeoffs between β, dmax and the sample complexity
are explored in Theorem 6. Similar improvements hold when external fields are present (Theorem 9),
as well as for identity testing, without and with external fields (Theorems 10 and 11).
We offer some intuition about the improvements in Figures 1 and 2 (appearing in Section 6),
which are plotted for high temperature and no external fields. In Figure 1, we plot the number of
1
samples required for testing Ising models with no external fields when β = Θ( dmax
) as dmax varies.
The horizontal axis is logn dmax . We see that localization is the better algorithm for degrees smaller
than O(n2/3 ), above which its complexity can be improved. In particular, the sample complexity
is O(n2 /ε2 ) until degree dmax = O(n2/3 ), beyond which it drops inverse quadratically in dmax . In
Figure 2, we consider a different tradeoff. We plot the number of samples required when β = n−α
and the degree of the graph varies. In particular, we see three regimes as a function of whether the
Ising model is in high temperature (dmax = O(na )) or low temperature (dmax = ω(na )), and also
which of our techniques localization vs non-localization gives better sample complexity bounds.
Technical Discussion 3.0: “Testing via a Global Statistic, and Variance Bounds.”
One way or another all our results up to this point had been obtained via localization, namely
blaming the distance of p from independence, or from some distribution q to a node or an edge.
Our improved bounds employ non-localized statistics that look at all P
the nodes of the Ising model
simultaneously. Specifically, we employ statistics of the form Z =
e=(u,v)∈E ce Xu Xv for some
appropriately chosen signs ce .
The first challenge we encounter here involves selecting the signs ce in accordance with the sign
of each edge marginal’s expectation, E[Xu Xv ]. This is crucial to establish that the resulting statistic
will be able to discern between the two cases. While the necessary estimates of these signs could be
computed independently for each edge, this would incur an unnecessary overhead of O(n2 ) in the
number of samples. Instead we try to learn signs that have a non-trivial agreement with the correct
signs, from fewer samples. Despite the Xu Xv terms potentially having nasty correlations with each
other, a careful analysis using anti-concentration calculations allows us to sidestep this O(n2 ) cost
and generate satisfactory estimates with a non-negligible probability, from fewer samples.
The second and more significant challenge involves bounding the variance of a statistic Z of the
above form. Since Z’s magnitude is at most O(n2 ), its variance can trivially be bounded by O(n4 ).
However, applying this bound in our algorithm gives a vacuous sample complexity. As the Xu ’s
will experience a complex correlation structure, it is not clear how one might arrive at non-trivial
bounds for the variance of such statistics, leading to the following natural question:
Question 1. How can one bound the variance of statistics over high-dimensional distributions?
This meta-question is at the heart of many high-dimensional statistical tasks, and we believe it
is important to develop general-purpose frameworks for such settings. In the context of the Ising
model, in fairly general regimes, we can show the variance to be Õ(n2 ). We consider this to be
surprising – stated another way, despite the complex correlations which may be present in the Ising
model, the summands in Z behave roughly as if they were pairwise independent.
This question has been studied in-depth in two recent works [DDK17, GLP17], which prove
concentration of measure for d-linear statistics over the Ising model. We note that these results are
stronger than what we require in this work – we need only variance bounds (which are implied by
concentration of measure) for bilinear statistics. Despite these stronger bounds, for completeness,
we present a proof of the variance bounds for bilinear statistics which we require3 . This approach
3
We thank Yuval Peres for directing us towards the reference [LPW09] and the tools required to prove these
bounds.
6
uses tools from [LPW09]. It requires a bound on the spectral gap of the Markov chain, and an
expected Lipschitz property of the statistic when a step is taken at stationarity. The technique is
described in Section 7, and the variance bounds are given in Theorems 16 and 17.
E. Our Main Lower Bound. The proof of our linear lower bound applies Le Cam’s method
[LC73]. Our construction is inspired by Paninski’s lower bound for uniformity testing [Pan08],
which involves pairing up domain elements and jointly perturbing their probabilities. This style of
construction is ubiquitous in univariate testing lower bounds. A naive application of this approach
would involve choosing a fixed matching of the nodes and randomly perturbing the weight of the
√
edges, which leads to an Ω( n) lower bound. We analyze a construction of a similar nature as
a warm-up for our main lower bound, while also proving a lower bound for uniformity testing on
product distributions over a binary alphabet (which are a special case of the Ising model where
no edges are present), see Theorem 18. To achieve the linear lower bound, we instead consider a
random matching of the nodes. The analysis of this case turns out to be much more involved due
to the complex structure of the probability function which corresponds to drawing k samples from
an Ising model on a randomly chosen matching. Indeed, our proof turns out to have a significantly
combinatorial flavor, and we believe that our techniques might be helpful for proving stronger lower
bounds in combinatorial settings for multivariate distributions. Our analysis of this construction
is tight, as uniformity testing on forests can be achieved with O(n) samples. We believe that a
super-linear lower bound would be very interesting, but also quite difficult to obtain. Proving our
linear lower bound already required a very careful analysis for a relatively simple construction, and
an improved lower bound would require analyzing a distribution over dense constructions, for which
an improved structural understanding is needed. A further technical discussion of this lower bound
is in Section 1.1.2, see Section 8 and Theorem 19 for a formal statement and full analysis of our
main lower bound. As mentioned before, we also show that the sample complexity must depend on
β and h in certain cases, see Theorem 20 for a formal statement.
Table 1 summarizes our algorithmic results.
The High-Dimensional Frontier and Related Work: We emphasize that we believe the study
of high-dimensional distribution testing to be of significant importance, as real-world applications
often involve multivariate data. As univariate distribution testing is now very well understood, with
a thorough set of tools and techniques, this is the natural next frontier to attack. However, multivariate distributions pose several new technical challenges, and many of these univariate tools are
rendered obsolete – as such, we must extend these methods, or introduce new techniques entirely. It
is important to develop approaches which may be applicable in much more general high-dimensional
distribution testing settings, when there may be complex correlations between random variables.
First, it is important to get a grasp on the concentration and variance of statistics in these settings,
and we provide exposition of a technique for bounding the variance of some simple statistics. Additionally, our linear lower bound’s construction and analysis give insight into which instances cause
intractability to arise, and provide a recipe for the style of combinatorics required to analyze them.
In further works, the authors and another group have investigated more properties of multilinear
functions over the Ising model [DDK17, GLP17]. In the present work, we require and prove variance
bounds for bilinear functions of the Ising model. These other works prove concentration bounds
(which are qualitatively stronger than variance bounds) for multilinear functions of arbitrary degree
d (rather than just bilinear functions, which are of degree d = 2).
High-dimensional distribution testing has recently attracted the interest of the theoretical computer science community, with work concurrent to ours on testing Bayes networks4 [CDKS17, DP17].
4
Bayes nets are another type of graphical model, and are in general incomparable to Ising models.
7
Testing Problem
Independence
using Localization
Identity
using Localization
No External Field
2 2 2
β
Õ n dmax
ε2
Õ
n2 d2max β 2
ε2
Arbitrary External Field
2 2 2
β
Õ n dmax
ε2
Õ
n2 d2max β 2
ε2
n2 h2
ε2
+
Independence
under Dobrushin/high-temperature
Õ
n10/3 β 2
ε2
Õ
n10/3 β 2
ε2
Õ
n10/3 β 2
ε2
using Learn-Then-Test
Identity
under Dobrushin/high-temperature
Õ
n11/3 β 2
ε2
n5/3 h2
ε2
+
using Learn-Then-Test
Independence on Forests
Õ
using Improved Localization
Identity on Forests
using Improved Localization
Independence on Ferromagnets
using Improved Localization
Õ
Õ
n
ε
Õ
n·c(β)
ε
ndmax
ε
Õ
Õ
n2 β 2
ε2
n2 β 2
ε2
+
n2 h2
ε2
n2 d2max β 2
ε2
Table 1: Summary of our results in terms of the sample complexity upper bounds for the various
problems studied. n = number of nodes in the graph, dmax = maximum degree, β = maximum absolute value of edge parameters, h = maximum absolute value of node parameters (when applicable),
and c is a function discussed in Theorem 4.
It remains to be seen which other multivariate distribution classes of interest allow us to bypass the
curse of dimensionality.
We note that the paradigm of distribution testing under structural assumptions has been explored in the univariate setting, where we may assume the distribution is log-concave or k-modal.
This often allows exponential savings in the sample complexity [DDS+ 13, DKN15b, DKN15a].
1.1
Further Technical Discussion and Highlights
In this section, we give a slightly more in-depth discussion of some of the technical highlights of
our work. For full details and more discussion, the interested reader can refer to the corresponding
sections in the body of the paper.
1.1.1
Structural Results for Ferromagnetic Ising Models
Our general-purpose testing algorithm is a localization-based algorithm – in particular, it operates
based on the structural property that if two Ising models (with no external field) are far from each
other, they will have a distant edge marginal. We convert this structural property to an algorithm
by estimating each edge marginal and testing whether they match for the two models. However,
the underlying structural property is quantitatively weak, and leads to sub-optimal testing bounds.
In some cases of interest, we can derive quantitatively stronger versions of this structural result,
8
giving us more efficient algorithms.
For instance, one can consider the ferromagnetic case, where one has all edge parameters θe ≥ 0.
We would like to derive a relationship between an edge marginal (i.e., E[Xu Xv ] for an edge e =
(u, v)) and the parameter on that edge θe . For a tree-structured Ising model with no external field
(ferromagnetic or not), it is not hard to show that E[Xu Xv ] = tanh(θe ) – for small edge parameters,
this indicates a linear relationship between the edge marginal and the edge parameter. Intuitively,
if a model is ferromagnetic and contains cycles, these cycles should only increase the correlation
between adjacent nodes, i.e., we would expect that E[Xu Xv ] ≥ tanh(θe ). While this is true, it
proves surprisingly difficult to prove directly, and we must instead view the Ising model through
the Fortuin-Kastelyn random cluster model.
At a high level, the Fortuin-Kastelyn random cluster model is defined for a graph G = (V, E)
with a probability parameter 0 < re < 1 on each edge. This parameter indicates the probability of a
bond being present on edge e (i.e., the distribution gives a measure over {0, 1}E ), placing this model
into the space of bond percolation models (see Section 4.2.1 and (21) for the formal definition). It
turns out that an alternative way to draw a sample from the Ising model is through this random
cluster model. Namely, we first draw a sample from the Fortuin-Kastelyn model (defined with
appropriate parameters), and for each connected component in the resulting graph, we flip a fair
coin to determine whether all the nodes in the component should be −1 or +1.
With this correspondence in hand, we can apply results for the Fortuin-Kastelyn model – crucial
for our purposes is that the fact that the FK model’s measure is stochastically increasing. Roughly,
this means that if we increase the values of the re ’s, the probability of an edge having a 1 can only
increase. Intuitively, this leads to an increase in E[Xu Xv ] in the Ising model, since it increases the
probability that the nodes are connected in the FK model, and thus the expectation of any edge can
only increase as we increase the ferromagnetic edge parameters. Careful work is needed to carry
through the implications of this correspondence, but it allows us to conclude the nearly-optimal
sample complexity of Õ(m/ε).
Full details are provided in Section 4.2.
1.1.2
A Linear Lower Bound for Testing Ising Models
As a starting point for our lower bound, we use Le Cam’s classical two-point method. This is the
textbook method for proving lower bounds in distribution testing. It involves defining two families
of distributions P and Q, such that every distribution p ∈ P is ε-far from every distribution q ∈ Q.
We consider selecting a uniformly random pair (p, q) ∈ (P, Q) and then drawing k independent
samples from each of p and q. If we can show that the resulting two transcripts of k samples are
close in total variation distance, then k samples are insufficient to distinguish these two cases.
While this method is fairly well-understood in the univariate setting, it proves more difficult
to apply in some multivariate settings. This difficulty arises in the definition of the set Q5 . In
the univariate setting, we often decompose the domain into several disjoint sets, and define Q by
applying perturbations to each of these sets independently. This style of construction allows us
to analyze each subset locally and compose the results. In the multivariate setting, constructions
of this local nature are still possible and are not too hard to analyze – see Theorem 18. In this
construction, we consider an Ising model defined by taking a fixed perfect matching on the graph
and selecting a distribution from Q by applying a random sign vector to the edge potentials of this
√
matching. This allows us to prove an Ω( n) lower bound on the complexity of uniformity testing.
However, such local constructions prove to be limited in the multivariate setting. In order to
prove stronger lower bounds, we instead must consider an Ising model generated by taking a random
5
We note that for simplicity, P is often chosen to be a singleton.
9
perfect matching on the graph. This construction is more global in nature, since the presence of
an edge gives us information about the presence of other edges in the graph. As a result, the
calculations no longer decompose elegantly over the (known) edges in the matching. While at a
first glance, the structure of such a construction may seem too complex to analyze, we reduce it to
analyzing the structure of a random pair of matchings by exploiting combinatorial symmetries. An
important step in the proof requires us to understand the random variable representing the number
of edges shared by two random perfect matchings. This analysis allows us to prove a quadraticallybetter lower bound of Ω(n). We believe our analysis may be useful in proving lower bounds for such
global constructions in other multivariate settings.
Full details are provided in Section 8.
1.2
Organization
In Section 2, we discuss preliminaries and the notation that we use throughout the paper. In Section
3, we give a simple localization-based algorithm for independence testing and its corresponding
variant for goodness-of-fit testing. In Section 4, we present improvements to our localization-based
algorithms for forest-structured and ferromagnetic Ising models. In Section 5, we describe our main
algorithm for the high-temperature regime which uses a global statistic on the Ising model. In
Section 6, we compare our algorithms from Sections 3 and 5. In Section 7, we discuss the bounds
in [LPW09] and apply them to bounding the variance of bilinear statistics over the Ising model. In
Section 8, we describe our lower bounds.
2
Preliminaries
Recall the definition of the Ising model from Eq. (1). We will abuse notation, referring to both the
probability distribution p and the random vector X that it samples in {±1}V as the Ising model.
That is, X ∼ p. We will use Xu to denote the variable corresponding to node u in the Ising model
X. When considering multiple samples from an Ising model X, we will use X (l) to denote the lth
sample. We will use h to denote the largest node parameter in absolute value and β to denote the
largest edge parameter in absolute value. That is, |θv | ≤ h for all v ∈ V and |θe | ≤ β for all e ∈ E.
Depending on the setting, our results will depend on h and β. Furthermore, in this paper we will
use the convention that E = {(u, v) | u, v ∈ V, u 6= v} and θe may be equal to 0, indicating that edge
e is not present in the graph. We use m to denote the number of edges with non-zero parameters
in the graph, and dmax to denote the maximum degree of a node.
Throughout this paper, we will use the notation µv , E[Xv ] for the marginal expectation of a
node v ∈ V (also called node marginal), and similarly µuv , E[Xu Xv ] for the marginal expectation
of an edge e = (u, v) ∈ E (also called edge marginal). In case a context includes multiple Ising
models, we will use µpe to refer to the marginal expectation of an edge e under the model p.
We will use Un to denote the uniform distribution over {±1}n , which also corresponds to the
Ising model with θ~ = ~0. Similarly, we use In for the set of all product distributions over {±1}n .
In this paper, we will consider Rademacher random variables, where Rademacher(p) takes value
1 with probability p, and −1 otherwise.
When p~ and ~q are vectors, we will write p~ ≤ ~q to mean that pi ≤ qi for all i.
Definition 1. In the setting with no external field, θv = 0 for all v ∈ V .
Definition 2. In the ferromagnetic setting, θe ≥ 0 for all e ∈ E.
10
Definition 3 (Dobrushin’s Uniqueness Condition). Consider an Ising
P model p defined on a graph
~
G = (V, E) with |V | = n and parameter vector θ. Suppose maxv∈V u6=v tanh (|θuv |) ≤ 1 − η for
some constant η > 0. Then p is said to satisfy Dobrushin’s uniqueness condition, or be in the high
temperature regime. Note that since tanh(|x|) ≤ |x| for all x, the above condition follows from more
simplified conditions which avoid having to deal with hyperbolic functions. For instance, either of
the following two conditions:
X
max
|θuv | ≤ 1 − η or
v∈V
u6=v
βdmax ≤ 1 − η
are sufficient to imply Dobrushin’s condition (where β = maxu,v |θuv | and dmax is the maximum
degree of G).
In general, when one refers to the temperature of an Ising model, a high temperature corresponds
to small θe values, and a low temperature corresponds to large θe values. In this paper, we will only
use the precise definition as given in Definition 3.
Remark 1. We note that high-temperature is not strictly needed for our results to hold – we only need
Hamming contraction of the “greedy coupling.” This condition implies rapid mixing of the Glauber
dynamics (in O(n log n) steps) via path coupling (Theorem 15.1 of [LPW09]). See [DDK17, GLP17]
for further discussion of this weaker condition.
Lipschitz functions of the Ising model have the following variance bound, which is in Chatterjee’s
thesis [Cha05]:
Lemma 1 (Lipschitz Concentration Lemma). Suppose that f (X1 , . . . , Xn ) is a function of an Ising
model in the high-temperature regime. Suppose the Lipschitz constants of f are l1 , l2 , . . . , ln respectively. That is,
f (X1 , . . . , Xi , . . . , Xn ) − f (X1 , . . . , Xi0 , . . . , Xn ) ≤ li
for all values of X1 , . . . , Xi−1 , Xi+1 , . . . , Xn and for any Xi and Xi0 . Then for some absolute constant
c1 ,
c1 t2
Pr [|f (X) − E[f (X)]| > t] ≤ 2 exp − Pn 2 .
2 i=1 li
In particular, for some absolute constant c2 ,
Var(f (X)) ≤ c2
X
li2 .
i
We will use the symmetric KL divergence, defined as follows:
p
q
dSKL (p, q) = dKL (p, q) + dKL (q, p) = Ep log
+ Eq log
.
q
p
We will use without proof the following well-known result regarding relations between distance
measures on probability distributions.
Lemma 2 (Pinsker’s Inequality). For any two distributions p and q, we have the following relation
between their total variation distance and their KL-divergence,
2d2TV (p, q) ≤ dKL (p||q).
11
Also since dKL (p||q) ≥ 0 for any distributions P and Q, we have
dSKL (p, q) ≥ dKL (p||q) ≥ 2d2TV (p, q).
(2)
Hence the symmetric KL-divergence between two distributions upper bounds both the KL-divergence
and total variation (TV) distance between them under appropriate scaling. Therefore, our results
which hold for testing with respect to the SKL-divergence also hold for testing with respect to
KL-divergence and TV distance.
We will use the following folklore result on estimating the parameter of a Rademacher random
variable.
Lemma 3. Given iid random variables X1 , . . . , Xk ∼ Rademacher(p) for k = O(log(1/δ)/ε2 ),
there exists an algorithm which obtains an estimate p̂ such that |p̂ − p| ≤ ε with probability 1 − δ.
In Section 7 we use the Glauber dynamics on the Ising model. Glauber dynamics is the canonical
Markov chain for sampling from an Ising model. We consider the basic variant known as single-site
Glauber dynamics. The dynamics are a Markov chain defined on the set Σn where Σ = {±1}. They
proceed as follows:
1. Start at any state X (0) ∈ Σn . Let X (t) denote the state of the dynamics at time t.
2. Let N (u) denote the set of neighbors of node u. Pick a node u uniformly at random and
update X as follows:
P
(t)
exp θu + v∈N (u) θuv Xv
Xu(t+1) = 1 w.p.
P
P
(t)
(t)
exp θu + v∈N (u) θuv Xv + exp −θu − v∈N (u) θuv Xv
P
(t)
exp −θu − v∈N (u) θuv Xv
Xu(t+1) = −1 w.p.
P
P
(t)
(t)
exp θu + v∈N (u) θuv Xv + exp −θu − v∈N (u) θuv Xv
Xv(t+1) = Xv(t)
∀ v 6= u.
Glauber dynamics define a reversible, ergodic Markov chain whose stationary distribution is
identical to the corresponding Ising model. In many relevant settings, such as, for instance, the
high-temperature regime, the dynamics are fast mixing, i.e., they mix in time O(n log n) and hence
offer an efficient way to sample from Ising models.
2.1
Input to Goodness-of-Fit Testing Algorithms
To solve the goodness-of-fit testing or identity testing problem with respect to a discrete distribution
q, a description of q is given as part of the input along with sample access to the distribution p
which we are testing. In case q is an Ising model, its support has exponential size and specifying the
vector of probability values at each point in its support is inefficient. Since q is characterized by the
edge parameters between every pair of nodes and the node parameters associated with the nodes, a
succinct description would be to specify the parameters vectors {θuv }, {θu }. In many cases, we are
also interested in knowing the edge and node marginals of the model. Although these quantities
can be computed from the parameter vectors, there is no efficient method known to compute the
marginals exactly for general regimes. A common approach is to use MCMC sampling to generate
samples from the Ising model. However, for this technique to be efficient we require that the mixing
12
time of the Markov chain be small which is not true in general. Estimating and exact computation of
the marginals of an Ising model is a well-studied problem but is not the focus of this paper. Hence,
to avoid such computational complications we will assume that for the identity testing problem the
description of the Ising model q includes both the parameter vectors {θuv }, {θu } as well as the edge
and node marginal vectors {µuv = E[Xu Xv ]}, {µu = E[Xu ]}.
2.2
Symmetric KL Divergence Between Two Ising Models
We note that the symmetric KL divergence between two Ising models p and q admits a very convenient expression [SW12]:
X
X
(θep − θeq ) (µpe − µqe ) .
(3)
dSKL (p, q) =
(θvp − θvq ) (µpv − µqv ) +
v∈V
e=(u,v)∈E
This expression will form the basis for all our algorithms.
3
A General Purpose Localization Algorithm
Our first algorithm is a general purpose “localization” algorithm. While extremely simple, this
serves as a proof-of-concept that testing on Ising models can avoid the curse of dimensionality,
while simultaneously giving a very efficient algorithm for certain parameter regimes. The main
observation which enables us to do a localization based approach is stated in the following Lemma,
which allows us to “blame” a difference between models p and q on a discrepant node or edge.
Lemma 4. Given two Ising models p and q, if dSKL (p, q) ≥ ε, then either
q
p
) (µpuv − µquv ) ≥
− θuv
• There exists an edge e = (u, v) such that (θuv
• There exists a node u such that (θup − θuq ) (µpu − µqu ) ≥
ε
2m ;
or
ε
2n .
Proof of Lemma 4: We have,
dSKL (p, q) =
X
(θep − θeq ) (µpe − µqe ) +
=⇒
(θvp − θvq ) (µpv − µqv ) ≥ ε
v∈V
e=(u,v)∈E
X
X
(θep − θeq ) (µpe − µqe ) ≥ ε/2 or
X
(θvp − θvq ) (µpv − µqv ) ≥ ε/2
v∈V
e=(u,v)∈E
p
q
ε
In the first case, there has to exist an edge e = (u, v) such that (θuv
− θuv
) (µpuv − µquv ) ≥ 2m
and
p
q
p
q
ε
in the second case there has to exist a node u such that (θu − θu ) (µu − µu ) ≥ 2n thereby proving
the lemma.
Before giving a description of the localization algorithm, we state its guarantees.
2 2
Theorem 2. Given Õ mε2β samples from an Ising model p, there exists a polynomial-time algorithm which distinguishes
the
2between
cases p ∈ In and dSKL (p, In ) ≥ ε with probability at least 2/3.
m β2
n2 h2
Furthermore, given Õ ε2 + ε2
samples from an Ising model p and a description of an Ising
model q, there exists a polynomial-time algorithm which distinguishes between the cases p = q and
dSKL (p, q) ≥ ε with probability at least 2/3 where β = max{|θuv |} and h = max{|θu |}. The above
algorithms assume that m, an upper bound on the
number of edges, is known. If no upper bound is
known, we may use the trivial upper bound of n2 . If we are given as input the maximum degree of
nodes in the graph dmax , m in the above bounds is substituted by ndmax .
13
Note that the sample complexity achieved by the localization algorithm gets worse as the graph
becomes denser. This is because as the number of possible edges in the graph grows, the contribution
to the distance by any single edge grows smaller thereby making it harder to detect.
We describe the algorithm for independence testing in Section 3.1. The algorithm for testing identity
is similar, its description and correctness proofs are given in Section 3.2.
3.1
Independence Test using Localization
We start with a high-level description of the algorithm. Given sample access to Ising model X ∼ p it
will first obtain empirical estimates of the node marginals µu for each node u ∈ V and edge marginals
µuv for each pair of nodes (u, v). Denote these empirical estimates by µ̂u and µ̂uv respectively.
Using these empirical estimates, the algorithm computes the empirical estimate for the covariance
of each pair of variables in the Ising model. That is, it computes an empirical estimate of λuv =
E[Xu Xv ] − E[Xu ]E[Xv ] for all pairs (u, v). If they are all close to zero, then we can conclude that
p ∈ In . If there exists an edge for which λuv is far from 0, this indicates that p is far from In .
The reason for this follows from the expression Lemma 4 and is described in further detail in the
proof of Lemma 6. A precise description of the test is given in in Algorithm 1 and its correctness
is proven via Lemmas 5 and 6. We note that this algorithm is phrased as if an upper bound on the
number of edges m is known. If we instead know an upper bound on the maximum degree dmax ,
then we can replace m by ndmax .
Algorithm 1 Test if an Ising model p is product
1: function LocalizationTest(sample
access to Ising model p, accuracy parameter ε, β, m)
2 2
m β log n
samples from p. Denote the samples by X (1) , . . . , X (k)
2:
Draw k = O
ε2
P (i)
P (i) (i)
3:
Compute empirical estimates µ̂u = k1 i Xu for each node u ∈ V and µ̂uv = k1 i Xu Xv
for each pair of nodes (u, v)
4:
Using the above estimates compute the covariance estimates λ̂uv = µ̂uv − µ̂u µ̂v for each pair
of nodes (u, v)
If for any pair of nodes (u, v), λ̂uv ≥
6:
Otherwise, return that p ∈ In
7: end function
5:
ε
4mβ
return that dSKL (p, In ) ≥ ε
To prove correctness of Algorithm 1, we will require the following lemma, which allows us to
detect pairs u, v for which λuv is far from 0.
n
Lemma 5. Given O log
samples from an Ising model X ∼ p, there exists a polynomial-time
ε2
algorithm which, with probability at least 9/10, can identify all pairs of nodes (u, v) ∈ V 2 such that
|λuv | ≥ ε, where λuv = E[Xu Xv ] − E[Xu ]E[Xv ]. Namely, the algorithm computes the empirical
value of |λuv | for each pair of nodes and identifies pairs such that this value is sufficiently far from
0.
Proof. This lemma is a direct consequence of Lemma 3. Note that for any edge e = (u, v) ∈ E,
Xu Xv ∼ Rademacher((1+µe )/2). Also Xu ∼ Rademacher((1+µu )/2) and Xv ∼ Rademacher((1+
µv )/2). We will use Lemma 3 to show that O(log n/ε2 ) samples suffice to detect whether λe = 0
or |λe | ≥ ε with probability at least 1 − 1/10n2 . With O(log n/ε2 ) samples, Lemma 3 implies we
ε
can obtain estimates µ̂uv , µ̂u and µ̂v for µuv , µu and µv respectively such that |µ̂uv − µuv | ≤ 10
,
ε
ε
2
|µ̂u − µu | ≤ 10 and |µ̂v − µv | ≤ 10 with probability at least 1 − 1/10n . Let λ̂uv = µ̂uv − µ̂u µ̂v . Then
14
2
ε
3ε
+ 100
. It can be seen that in
from the above, it follows by triangle inequality that |λuv − λ̂uv | ≤ 10
the case when the latter term in the previous inequality dominates the first, ε is large enough that
ε2
ε
O(log n) samples suffice to distinguish the two cases. In the more interesting case, 100
≤ 10
, and
|λuv − λ̂uv | ≤
4ε
10 .
Therefore if |λuv | ≥ ε, then λ̂uv ≥
6ε
10 ,
and if |λuv | = 0, then λ̂uv ≤
4ε
10
thereby
implying that with probability at least 1 − 1/10n2 we can detect whether λuv = 0 or |λuv | ≥ ε.
Taking a union bound over all edges, the probability that we correctly identify all such edges is at
least 9/10.
With this lemma in hand, we now prove the first part of Theorem 2.
2 2
Lemma 6. Given Õ mε2β samples from an Ising model X ∼ p, Algorithm 1 distinguishes between
the cases p ∈ In and dSKL (p, In ) ≥ ε with probability at least 2/3.
Proof. We will run Algorithm 1 on all pairs Xu , Xv to identify any pair such that |λuv | is large.
This will involve using the algorithm of Lemma 5 with parameter “ε” as ε/2βm. If no such pair is
identified, output that p ∈ In , and otherwise, output that dSKL (p, In ) ≥ ε. If p ∈ In , we know that
E[Xu Xv ] = E[Xu ]E[Xv ] for all edges (u, v), and therefore, with probability 9/10, there will be no
ε
edges for which the empirical estimate of |λe | ≥ 2βm
. On the other hand, if dSKL (p, In ) ≥ ε, then
dSKL (p, q) ≥ ε for every q ∈ In . In particular, consider the product distribution q on n nodes such
that µqu = µpu for all u ∈ V . For this particular product distribution q, by (3), there must exist some
ε
e∗ such that |λe∗ | ≥ 2βm
, and the algorithm will identify this edge. This is because
X
(θvp − θvq ) (µpv − µqv ) = 0
(4)
v∈V
∴ dSKL (p, q) ≥ ε
ε
=⇒ ∃e∗ = (u, v) s.t (θep − θeq ) (µpe − µqe ) ≥
m
ε
=⇒ ∃e∗ = (u, v) s.t |(µpe − µqe )| ≥
2βm
ε
=⇒ ∃e∗ = (u, v) s.t |λe∗ | ≥
.
2βm
(5)
(6)
where (4) follows because µpv = µqv for all v ∈ V , (5) follows from Lemma 4 and (6) follows because
|θep − θeq | ≤ 2β. This completes the proof of the first part of Theorem 2.
3.2
Identity Test using Localization
If one wishes to test for identity of p to an Ising model q, the quantities whose absolute values indicate
that p is far from q are µpuv − µquv for all pairs u, v, and µpu − µqu for all u, instead of λuv . Since µquv
and µqu are given as part of the description of q, we only have to identify whether E[Xu Xv ] ≥ c and
E[Xu ] ≥ c for any constant c ∈ [−1, 1]. A variant of Lemma 5 as stated in Lemma 7 achieves this
goal. Algorithm 2 describes the localization based identity test. Its correctness proof will imply the
second part of Theorem 2 and is similar in vein to that of Algorithm 1. It is omitted here.
n
Lemma 7. Given O log
samples from an Ising model p, there exists a polynomial-time algorithm
2
ε
which, with probability at least 9/10, can identify all pairs of nodes (u, v) ∈ V 2 such that |µpuv −c|
≥ ε
n
for any constant c ∈ [−1, 1]. There exists a similar algorithm, with sample complexity O log
ε2
which instead identifies all v ∈ V such that |µpv − c| ≥ ε, where µpv = E[Xv ] for any constant
c ∈ [−1, 1].
15
Proof of Lemma 7: The proof follows along the same lines as Lemma 5. Let X ∼ p. Then, for
any pair of nodes (u, v), Xu Xv ∼ Rademacher((1 + µpe )/2). Also Xu ∼ Rademacher((1 + µpu )/2)
for any node u. For any pair of nodes u, v, with O(log n/ε2 ) samples, Lemma 3 implies we that
ε
the empirical estimate µ̂puv is such that |µ̂puv − µpuv | ≤ 10
with probability at least 1 − 1/10n2 . By
p
p
ε
ε
triangle inequality, we get |µuv − c| − 10
≤ |µ̂uv − c| ≤ |µpuv − c| + 10
. Therefore if |µpuv − c| = 0,
ε
9ε
then |µ̂puv − c| ≤ 10
w.p. ≥ 1 − 1/10n2 and if |µpuv − c| ≥ ε, then |µ̂puv − c| ≥ 10
w.p. ≥ 1 − 1/10n2 .
p
Hence by comparing whether |µ̂uv − c| to ε/2 we can distinguish between the cases |µpuv − c| = 0
and |µpuv − c| ≥ ε w.p. ≥ 1 − 1/10n2 . Taking a union bound over all edges, the probability that
we correctly identify all such edges is at least 9/10. The second statement of the Lemma about the
nodes follows similarly.
Algorithm 2 Test if an Ising model p is identical to q
1: function LocalizationTestIdentity(sample access to Ising model X ∼ p, description of
Ising model q, accuracy
parameterε,β,h,m)
(m2 β 2 +n2 h2 ) log n
2:
Draw k = O
samples from p. Denote the samples by X (1) , . . . , X (k)
ε2
P (i)
P (i) (i)
3:
Compute empirical estimates µ̂pu = k1 i Xu for each node u ∈ V and µ̂puv = k1 i Xu Xv
for each pair of nodes (u, v)
ε
4:
If for any pair of nodes (u, v), |µ̂puv − µquv | ≥ 8mβ
return that dSKL (p, q) ≥ ε
q
p
ε
5:
If for any node u, if |µ̂u − µu | ≥ 8nh return that dSKL (p, q) ≥ ε
6:
Otherwise, return that p = q
7: end function
The proof of correctness of Algorithm 2 follows along the same lines as that of Algorithm 1 and
uses Lemma 7. We omit the proof here.
4
Improved Tests for Forests and Ferromagnetic Ising Models
In this section we will describe testing algorithms for two commonly studied classes of Ising models,
namely forests and ferromagnets. In these cases, the sample complexity improves compared to the
baseline result when in the regime of no external field. The testers are still localization based (like
those of Section 3), but we can now leverage structural properties to obtain more efficient testers.
First, we consider the class of all forest structured Ising models, where the underlying graph
G = (V, E) is a forest. Such models exhibit nice structural properties which can be exploited to
obtain more efficient tests. In particular, under no external field, the edge marginals µe , which,
in general are hard to compute, have a simple closed form expression. This structural information
enables us to improve our testing algorithms from Section 3 on forest graphs. We state the improved
sample complexities here and defer a detailed description of the algorithms to Section 4.1.
Theorem 3 (Independence testing of Forest-Structured Ising Models). Algorithm 3 takes in Õ nε
samples from an Ising model X ∼ p whose underlying graph is a forest and which is under no
external field and outputs whether p ∈ In or dSKL (p, In ) ≥ ε with probability ≥ 9/10.
Remark 2. Note that Theorem 3 together with our lower bound described in Theorem 19 indicate a
tight sample complexity up to logarithmic factors for independence testing on forest-structured Ising
models under no external field.
16
Theorem 4 (Identity Testing of Forest-Structured Ising Models). Algorithm 4 takes in the edge
parameters
of an Ising model q on a forest graph and under no external field as input, and draws
Õ c(β) nε samples from an Ising model X ∼ p (where c(β) is a function of the parameter β) whose
underlying graph is a forest and under no external field, and outputs whether p = q or dSKL (p, q) ≥ ε
with probability ≥ 9/10.
Note that for identity testing, any algorithm necessarily has to have at least a β dependence
due to the lower bound we show in Theorem 20.
The second class of Ising models we consider this section are ferromagnets. For a ferromagnetic
Ising model, θuv ≥ 0 for every pair of nodes u, v. Ferromagnets may potentially contain cycles but
since all interactions are ferromagnetic, the marginal of every edge is at least what it would have
been if it was a solo edge. This intuitive property turns out to be surprisingly difficult to prove in a
direct way. We prove this structural property using an alternative view of the Ising model density
which comes from the Fortuin-Kasteleyn random cluster model. Using this structural property, we
give a quadratic improvement in the dependence on parameter m for testing independence under no
external field. We state our main result in this regime here and a full description of the algorithm
and the structural lemma are provided in Section 4.2.
Theorem 5 (Independence Testing of Ferromagnetic Ising Models). Algorithm 5 takes in Õ ndmax
ε
samples from a ferromagnetic Ising model X ∼ p which is under no external field and outputs whether
p ∈ In or dSKL (p, In ) ≥ ε with probability ≥ 9/10.
4.1
Improved Algorithms for Independence and Identity Testing on Forests
Before we present the improved algorithms, we will prove the following fact about the edge marginals
of an arbitrary Ising model with no external field where the underlying graph is a forest. This result
was known prior to this work by the community but we couldn’t find a proof of the same, hence we
provide our own proof of the lemma.
Lemma 8 (Structural Lemma for Forest-Structured Ising Models). If p is an Ising model on a
forest graph with no external field, and X ∼ p, then for any (u, v) ∈ E, we have
E [Xu Xv ] = tanh(θuv ).
Proof. Consider any edge e = (u, v) ∈ E. Consider the tree (T, ET ) which contains e. Let nT be the
number of nodes in the tree. We partition the vertex set T into U and V as follows. Remove edge
e from the graph and let U denote all the vertices which lie in the connected component of node u
except u itself. Similarly, let V denote all the vertices which lie in the connected component of node
v except node v itself. Hence, T = U ∪ V ∪ {u} ∪ {v}. Let XU be the vector random variable which
denotes the assignment of values in {±1}|U | to the nodes in U . XV is defined similarly. We will
also denote a specific value assignment to a set of nodes S by xS and −xS denotes the assignment
which corresponds to multiplying each coordinate of xS by −1. Now we state the following claim
which follows from the tree structure of the Ising model.
Claim 1. Pr [XU = xU , Xu = 1, Xv = 1, XV = xV ] = exp(2θuv ) Pr [XU = xU , Xu = 1, Xv = −1, XV = −xV ].
In particular the above claim implies the following corollary which is obtained by marginalization
of the probability to nodes u and v.
Corollary 1. If X is an Ising model on a forest graph G = (V, E) with no external field, then for
any edge e = (u, v) ∈ E, Pr [Xu = 1, Xv = 1] = exp(2θuv ) Pr [Xu = 1, Xv = −1].
17
Now,
E [Xu Xv ] = Pr [Xu Xv = 1] − Pr [Xu Xv = −1]
= 2P r [Xu = 1, Xv = 1] − 2 Pr [Xu = 1, Xv = −1]
2P r [Xu = 1, Xv = 1] − 2 Pr [Xu = 1, Xv = −1]
=
2P r [Xu = 1, Xv = 1] + 2 Pr [Xu = 1, Xv = −1]
P r [Xu = 1, Xv = 1] − Pr [Xu = 1, Xv = −1]
=
P r [Xu = 1, Xv = 1] + Pr [Xu = 1, Xv = −1]
exp(2θuv ) − 1 Pr [Xu = 1, Xv = −1]
=
exp(2θuv ) + 1 Pr [Xu = 1, Xv = −1]
= tanh(θuv )
(7)
(8)
(9)
(10)
(11)
(12)
where (8) follows because Pr [Xu = 1, Xv = 1] = Pr [Xu = −1, Xv = −1] and Pr [Xu = −1, Xv = 1] =
Pr [Xu = 1, Xv = −1] by symmetry. Line (9) divides the expression by the total probability which
is 1 and (11) follows from Corollary 1.
Given the above structural lemma, we give the following simple algorithm for testing independence on forest Ising models under no external field.
Algorithm 3 Test if a forest Ising model p under no external field is product
1: function TestForestIsing-Product(sample access to Ising model p)
p
2:
Run the algorithm of Lemma 5 to identify all edges e = (u, v) such that |E[Xu Xv ]| ≥ nε .
using Õ nε samples. If it identifies any edges, return that dSKL (p, In ) ≥ ε
3:
Otherwise, return that p is product.
4: end function
Algorithm 3, at a high level, works as follows. If there is an edge parameter whose absolute
value is larger than a certain threshold, it will be easy to detect due to the structural information
about the edge marginals. In case all edges have parameters smaller in absolute value than this
threshold, the expression for dSKL (., .) between two Ising models tells us that there still has to be at
least one edge with a significantly large value of µe in case the model is far from uniform, and hence
will still be detectable by the algorithm of Lemma 5. The proof of Theorem 3 shows this formally.
Proof of Theorem 3: Firstly, note that under no external field, the only product Ising model is the
uniform distribution Un . Therefore the problem reduces to testing whether p is uniform or not.
Consider the case when p is indeed uniform. That is, there are no edges in the underlying graph of
the Ising model. In this case with probability at least 9/10 the localization algorithm of Lemma 5
will output no edges. Hence Algorithm 3 will output that p is uniform.
In case dSKL (p, Un ) ≥ ε, we split the analysis into two cases.
pε
• Case 1: There exists an edge e = (u, v) such that |θuv | ≥
n . In this case, E[Xu Xv ] =
tanh(θuv ) and in the regime
p ε where |θ| = o(1), |tanh(θ)| ≥ |θ/2|. Hence implying that
|E[Xu Xv ]| ≥ |θuv /2| ≥
n /2 . Therefore the localization algorithm of Lemma 5 would
identify such an edge with probability at least 9/10. Note that the regime where the inequality |tanh(θ)| ≥ |θ/2| isn’t valid is easily detectable using Õ( nε ) samples, as this would imply
that |θ| ≥ 1.9 and |E[Xu Xv ]| ≥ 0.95.
18
• Case 2: All edges e = (u, v) are such that |θuv | ≤
pε
n
. In this case we have,
dSKL (p, Un ) ≥ ε
ε
=⇒ ∃ edge e = (u, v) s.t θuv E[Xu Xv ] ≥
n
r
n
ε
=⇒ ∃ edge e = (u, v) s.t |E[Xu Xv ]| ≥
×
n
ε
r
ε
=
n
(13)
(14)
(15)
(16)
Hence, the localization algorithm of Lemma 5 would identify such an edge with probability at
least 9/10.
Next, we will present an algorithm for identity testing on forest Ising models under no external
field.
Algorithm 4 Test if a forest Ising model p under no external field is identical to a given Ising
model q
1: function TestForestIsing-Identity(Ising model q,sample access to Ising model p)
2:
If the Ising model q is not a forest, or has a non-zero external field on some node, return.
dSKL (p, q) ≥ ε
3:
Run the algorithm of p
Lemma 5 to identify all edges e = (u, v) such that.
q
ε
n
|E[Xu Xv ] − tanh(θuv )| ≥
n using Õ ε samples. If it identifies any edges, return that
dSKL (p, q) ≥ ε
4:
Otherwise, return that p = q.
5: end function
Proof of Theorem 4: Consider the case when p is indeed q. In this case with probability at least
9/10 the localization algorithm of Lemma 5 will output no edges. Hence Algorithm 4 will output
that p is uniform.
In case dSKL (p, q) ≥ ε, we split the analysis into two cases.
p
p
q
• Case 1: There exists an edge e = (u, v) such that |θuv
− θuv
| ≥ nε . In this case, E[Xu Xv ] −
p
q
p
q
p
q
µquv = tanh(θuv
) − tanh(θuv
) and hence has the same sign as θuv
− θuv
. Assume that θuv
≥ θuv
.
q
p
p
q
The argument for the case θuv
> θuv
will follow similarly. If θuv
− θuv
≤ 1/2 tanh(β), then
the following inequality holds from Taylor’s theorem.
p
q
sech2 (β) (θuv
− θuv
)
2
p
2
p
q
which would imply tanh(θuv
) − tanh(θuv
) ≥ sech2 (β) nε and hence the localization algorithm
of Lemma 5 would identify edge e with probability at least 9/10 using Õ c1 (β)n
samples
ε
p
q
tanh(θuv
) − tanh(θuv
)≥
p
q
p
q
4
(where
c1 (β) = cosh
(β)). If θuv − θuv > 1/2 tanh(β), then tanh(θuv ) − tanh(θuv ) ≥ tanh(β) −
1
tanh β − 2 tanh(β)
and hence the localization algorithm of Lemma 5 would identify edge e
with probability at least 9/10 using Õ (c2 (β)) samples where c2 (β) =
19
1
.
(tanh(β)−tanh(β−1/2 tanh(β)))2
Note that as β grows small, c2 (β) gets worse. However it cannot grow unbounded as we also
p
q
have to satisfy the constraint that θuv
− θuv
≤ 2β. This implies that
1
2
c2 (β) = min β ,
(tanh(β) − tanh(β − 1/2 tanh(β)))2
samples suffice in this case. Therefore
the algorithm will give the correct output with proba
n
bility > 9/10 using Õ c(β) ε samples where c(β) = max{c1 (β), c2 (β)}.
p
q
q
• Case 2: All edges e = (u, v) are such that |θuv
− θuv
| ≤ nε . In this case we have,
dSKL (p, q) ≥ ε
ε
p
q
=⇒ ∃ edge e = (u, v) s.t (θuv
− θuv
) (E[Xu Xv ] − µquv ) ≥
n
r
n
ε
q
=⇒ ∃ edge e = (u, v) s.t |E[Xu Xv ] − µuv | ≥
×
n
ε
r
ε
=
n
(17)
(18)
(19)
(20)
Hence, the localization algorithm of Lemma 5 would identify such an edge with probability at
least 9/10.
4.2
Ferromagnetic Ising Models: A Structural Understanding and an Improved
Independence Test
In this section we will describe an algorithm for testing independence of ferromagnetic Ising models
under no external field. The tester follows the localization based recipe of Section 3 but leverages
additional structural information about ferromagnets to obtain an improved sample complexity.
At a high level, the algorithm is as follows: if there exists an edge with a large edge parameter,
then we lower bound its marginal by tanh(θuv ) where uv is the edge under consideration. This
implies that its marginal sticks out and is easy to catch via performing local tests on all edges. If
all the edge parameters were small, then Algorithm 1 is already efficient.
We first prove a structural lemma about ferromagnetic Ising models. We will use the FortuinKasteleyn random cluster model and its coupling with the Ising model (described in Chapter 10 of
[RAS15]) to argue that in any ferromagnetic Ising model µuv ≥ tanh(θuv ) for all pairs u, v.
4.2.1
Random Cluster Model
Let G = (V, E) be a finite graph. The random cluster measure is a probability distribution on the
space Ω = {0, 1}E of bond configurations denoted by η = (η(e))e∈E ∈ {0, 1}E . Each edge has an
associated bond η(e). η(e) = 1 denotes that bond e is open or present and η(e) = 0 implies that
bond e is closed or unavailable. A random cluster measure is parameterized by an edge probability
0 < r < 1 and by a second parameter 0 < s < ∞. Let k(η) denote the number of connected
components in the graph (V, η). The random cluster measure is defined by
!
Y
1
ρr,s (η) =
rη(e) (1 − r)1−η(e) sk(η)
Zr,s
e∈E
20
where Zr,s is a normalizing factor to make ρ a probability density. We consider a generalization of
the random cluster model where each edge is allowed to have its own parameter 0 < re < 1. Under
this generalization, the measure becomes
!
Y
1
η(e)
1−η(e)
re (1 − re )
sk(η) .
(21)
ρ~r,s (η) =
Z~r,s
e∈E
The random cluster measure is stochastically increasing in ~r when s ≥ 1. This property is formally
stated in Lemma 10.3 of [RAS15]. We state a generalized version of the Lemma here which holds
when each edge is allowed its own probability parameter re .
Lemma 9. [Lemma 10.3 from [RAS15]] For s ≥ 1, and r~1 ≤ r~2 coordinate-wise, ρr~1 ,s ≤ ρr~2 ,s where
given two bond configurations η1 and η2 , η1 ≥ η2 iff η1 (e) = 1 for all e such that η2 (e) = 1.
4.2.2
Coupling between the Random Cluster Model and the Ising model
We will now describe a coupling between the random cluster measure and the probability density
function for a ferromagnetic Ising model. In particular, the edge probability re under the random
cluster measure and the edge parameters θe of the Ising model are related by
re = 1 − exp(−2θe )
and the parameter s = 2 because the Ising model has two spins ±1. The coupling Q will be a
joint distribution on the spin variables X = (X1 . . . Xn ) of the Ising model and the bond variables
η = (η(e))e∈E . The measure Q is defined as
Q(X, η) =
1
Z
Y
reη(e) (1 − re )1−η(e) (1Xu =Xv + (1 − η(e))1Xu 6=Xv )
e=(u,v)∈E
where Z is a normalizing constant so as to make Q a probability measure. Under the relation stated
above between re and θe , the following properties regarding the marginal distributions of Q hold.
X
X
1
Q(X, η) = 0 exp
θuv Xu Xv
Z
u6=v
η∈{0,1}E
!
X
Y
1
Q(X, η) = 00
reη(e) (1 − re )1−η(e) 2k(η) = ρ~r,2 (η)
Z
n
X∈{±1}
e∈E
(22)
where Z 0 , Z 00 are normalizing constants to make the marginals probability densities. The above
equations imply that the measure Q is a valid coupling and more importantly they yield an alternative way to sample from the Ising model as follows:
First sample a bond configuration η according to ρ~r,2 (η). For each connected component in the
bond graph, flip a fair coin to determine if the variables in that component will be all +1 or all −1.
In addition to the above information about the marginals of Q, we will need the following simple
observations.
21
1. Q(X, η) = 0 if η(e) = 1 for any e ∈
/ E.
2. Q(X, η) = 0 if for any e = (u, v) ∈ E, η(e) = 1 and Xu 6= Xv .
Next we state another property of the coupling Q(., .) which says that if two nodes u and v
are in different connected components in the bond graph specified by η, then the probability that
Xu = Xv is the same as the probability that Xu 6= Xv .
Claim 2. Let Cη (u, v) denote the predicate that under the bond configuration η, u and v are connected with a path of open bonds. Then,
X
X
X
X
Q(X, η)
Q(X, η) =
η s.t
X s.t.
Cη (u,v)=0 Xu 6=Xv
η s.t
X s.t.
Cη (u,v)=0 Xu =Xv
The proof of the above claim is quite simple and follows by matching the appropriate terms in
the probability density Q when u and v lie in different connected components. The proof is omitted
here.
Armed with the coupling Q and its properties stated above, we are now ready to state the main
structural lemma we show for ferromagnetic Ising models.
Lemma 10. Consider two ferromagnetic Ising models p and q under no external field defined on
Gp = (V, Ep ) and Gq = (V, Eq ). Denote the parameter vector of p model by θ~p and that of q model
by θ~q . If θ~p ≥ θ~q coordinate-wise, then for any two nodes u, v ∈ V , µpuv ≥ µquv .
Proof. Since
µpuv = Pr [Xu = Xv ] − Pr [Xu 6= Xv ]
p
=⇒
µpuv
p
= 2 Pr [Xu = Xv ] − 1
p
to show that µpuv ≥ µquv it suffices to show that Prp [Xu = Xv ] ≥ Prq [Xu = Xv ]. Consider the coupling Q(X, η) described above between the random cluster measure and the Ising model probability.
Prp [Xu = Xv ] can be expressed in terms of Qp (X, η) as follows:
X X
Pr [Xu = Xv ] =
Qp (X, η)
p
X s.t.
Xu =Xv
η
Denote the sum on the right in the above equation by Sp . It suffices to show that Sp ≥ Sq .
Lemma 10.3 of [RAS15] gives that for any bond configuration η0 ,
X
X
b
b
ρE
(η)
≥
ρE
p
q (η).
η≥η0
η≥η0
This follows because the parameter vectors of p and q satisfy the condition of the lemma that
θ~p ≥ θ~q . Again, let Cη (u, v) denote the predicate that under the bond configuration η, u and v are
connected. Let H be the set of all bond configurations such that u and v are connected by a single
distinct path. Therefore Cη0 (u, v) = 1 for all η0 ∈ H. Then the set
C = {η|η ≥ η0 for some η0 ∈ H}
22
represents precisely the bond configurations in which u and v are connected. Applying Lemma 10.3
of [RAS15] on each η0 ∈ H and summing up the inequalities obtained, we get
X
X
b
b
ρE
ρE
q (η)
p (η) ≥
X
=⇒
η s.t
Cη (u,v)=1
η s.t
Cη (u,v)=1
X
X
Qp (X, η) ≥
η s.t
X
Cη (u,v)=1
X
=⇒
X
X
Qq (X, η)
η s.t
X
Cη (u,v)=1
X
Qp (X, η) ≥
X
Qq (X, η)
(23)
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
where the last inequality follows because Q(X, η) = 0 if for any pair u, v, η(uv) = 1 but Xu 6= Xv .
Also, from Claim 2, we have that for any Ising model,
X
X
X
Q(X, η) =
η s.t
X s.t.
Cη (u,v)=0 Xu =Xv
X
Q(X, η)
(24)
η s.t
X s.t.
Cη (u,v)=0 Xu 6=Xv
And since Q(., .) is a probability measure we have that for any Ising model,
X
X
X
X
X
X
Q(X, η) +
Q(X, η) +
Q(X, η) +
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
η s.t
X s.t.
Cη (u,v)=0 Xu =Xv
X
=⇒
X
η s.t
X s.t.
Cη (u,v)=0 Xu 6=Xv
X
Q(X, η) +
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
X
X
X
X
Q(X, η) = 1(25)
η s.t
X s.t.
Cη (u,v)=1 Xu 6=Xv
X
Q(X, η) +
η s.t
X s.t.
Cη (u,v)=0 Xu =Xv
=⇒
X
Q(X, η) = 1(26)
η s.t
X s.t.
Cη (u,v)=0 Xu 6=Xv
X
Q(X, η) + 2
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
X
X
Q(X, η) = 1(27)
η s.t
X s.t.
Cη (u,v)=0 Xu =Xv
where (26) follows because the last term in (25) is 0 and (27) follows from (24).
Equation (27) implies that
X
X
X
X
Sp =
Qp (X, η) +
Qp (X, η)
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
=
1
2
X
X
η s.t
X s.t.
Cη (u,v)=0 Xu =Xv
Qp (X, η) +
η s.t
X s.t.
Cη (u,v)=1 Xu =Xv
1
2
Therefore from (23), we get
Sp ≥ Sq
Using the above lemma, we now prove the main structural lemma for ferromagnets which will
be crucial to our algorithm for testing ferromagnetic Ising models.
Lemma 11 (Structural Lemma about Ferromagnetic Ising Models). If X ∼ p is a ferromagnetic
Ising model on a graph G = (V, E) under zero external field, then µuv ≥ tanh(θuv ) for all edges
(u, v) ∈ E.
23
Proof. Fix the edge of concern e = (u, v). If the graph doesn’t contain cycles, then from Lemma 8
µuv = tanh(θuv ) and the statement is true. To show that the statement holds for general graphs we
will use induction on the structure of the graph. Graph G can be constructed as follows. Start with
the single edge e = (u, v) and then add the remaining edges in E\{e} one by one in some order.
Denote the intermediate graphs obtained during this process as G0 , G1 , . . . , Gm = G where G0 is
the graph consisting of just a single edge. For each graph Gi we can associate the corresponding
Ising model pi to be the model which has θepi = θe for e ∈ EGi and θepi = 0 otherwise. For each
graph Gi in the sequence, we will use µpuvi to denote E [Xu Xv ] for the Ising model corresponding
to graph Gi . We will prove that µpuv ≥ tanh(θuv ) by induction on this sequence of graphs. The
statement can be easily verified to be true for G0 . In fact, µpuv0 = tanh(θuv ). Suppose the statement
p
was true for some Gi in the sequence. By Lemma 10, we have that µuvi+1 ≥ µpuvi . This implies that
Gpi+1
µuv
≥ tanh(θuv ) hence showing the statement to be true for all graphs Gi in the sequence.
Given the above structural lemma about ferromagnetic Ising models under no external field, we
present the following algorithm for testing whether a ferromagnetic Ising model is product or not.
Algorithm 5 Test if a ferromagnetic Ising model p under no external field is product
1: function TestFerroIsing-Independence(sample access to an Ising model p)
√
2:
Run the algorithm
of Lemma 5 to identify if all edges e = (u, v) such that E[Xu Xv ] ≥ ε/n.
2
using Õ nε samples. If it identifies any edges, return that dSKL (p, In ) ≥ ε
3:
Otherwise, return that p is product.
4: end function
Proof of Theorem 5: Firstly, note that under no external field, the only product Ising model is the
uniform distribution Un . To the problem reduces to testing whether p is uniform or not. Consider
the case when p is indeed uniform. That is, there are no edges in the underlying graph of the
Ising model. In this case with probability at least 9/10 the localization algorithm of Lemma 5 with
output no edges. Hence Algorithm 5 will output that p is product.
In case dSKL (p, In ) ≥ ε, we split the analysis into two cases.
p
• Case 1: There exists an edge e = (u, v) such that |θuv | ≥ nε2 . In this case, |E[Xu Xv ]| ≥
|tanh(θuv )| and in the regime where
p ε ε is a fixed constant, |tanh(θ)| ≥ |θ/2|. Hence implying that |E[Xu Xv ]| ≥ |θuv /2| ≥
/2. Therefore the localization algorithm of Lemma 5
n2
would identify such an edge with probability at least 9/10. (The regime where the inequality
2
|tanh(θ)| ≥ |θ/2| isn’t valid would be easily detectable using Õ( nε ) samples.)
p
• Case 2: All edges e = (u, v) are such that θuv ≤ nε2 . In this case we have,
dSKL (X, In ) ≥ ε
ε
=⇒ ∃ edge e = (u, v) s.t θuv E[Xu Xv ] ≥
n2 r
ε
n2
=⇒ ∃ edge e = (u, v) s.t E[Xu Xv ] ≥
×
n2
ε
r
ε
=
n2
(28)
(29)
(30)
(31)
Hence, the localization algorithm of Lemma 5 would identify such an edge with probability at
least 9/10.
24
5
An Improved Test for High-Temperature Ising Models: A Learnthen-Test Algorithm
In this section, we describe a framework for testing Ising models in the high-temperature regime
which results in algorithms which are more efficient than our baseline localization algorithm of
Section 3 for dense graphs. This is the more technically involved part of our paper and we modularize
the description and analysis into different parts. We will give a high level overview of our approach
here.
The main approach we take in this section is to consider a global test statistic over all the
variables on the Ising model in contrast to the localized statistics of Section 3. For ease of exposition,
we first describe the approach for testing independence under no external field. We then describe
the changes that need to be made to obtain tests for independence under an external field and
goodness-of-fit in Section 5.5.
Note that testing independence under no external field boils down to testing uniformity as the
only independent Ising model when there is no external field is the one corresponding to the uniform
distribution. The intuition for the core of the algorithm is as follows. Suppose we are interested in
~ Note that for the uniform Ising model,
testing uniformity of Ising model p with parameter vector θ.
θuv = θu = 0 for all u, v ∈ V . We start by obtaining an upper bound on the SKL between p and Un
~ From (3), we have that under no
which can be captured via a statistic that does not depend on θ.
external field (θu = 0 for all u ∈ V ),
X
dSKL (p, Un ) =
θuv µuv
e=(u,v)∈E
=⇒ dSKL (p, Un ) ≤
X
β |µuv |
(32)
dSKL (p, Un ) X
=⇒
≤
|µuv | .
β
(33)
u6=v
u6=v
where (32) holds because |θuv | ≤ β.
P
Given the above upper bound, we consider the statistic Z = u6=v sign(µuv ) · (Xu Xv ), where
X ∼ p and sign(µuv ) is chosen arbitrarily if µuv = 0.
X
E[Z] =
|µuv | .
u6=v
If X ∈ In , then E[Z] = 0. On the other hand, by (33), we know that if dSKL (X, In ) ≥ ε, then
E[Z] ≥ ε/β. If the sign(µe ) parameters were known, we could simply plug them into Z, and using
Chebyshev’s inequality, distinguish these two cases using Var(Z)β 2 /ε2 samples.
There are two main challenges here.
• First, the sign parameters, sign(µuv ), are not known.
• Second, it is not obvious how to get a non-trivial bound for Var(Z).
One can quickly see that learning all the sign parameters might be prohibitively expensive. For
example, if there is an edge e such that |µe | = 1/2n , there would be no hope of correctly estimating
its sign with a polynomial number of samples. Instead, we perform a process we call weak learning
– rather than trying to correctly estimate all the signs, we instead aim to obtain a ~Γ which is
correlated with the vector sign(µe ). In particular, we aim to obtain ~Γ such that, in the case where
25
P
dSKL (p, Un ) ≥ ε, E[ e=(u,v)∈E Γe (Xu Xv )] ≥ ε/ζβ, where ζ = poly(n). That is we learn a sign
vector ~Γ which is correlated enough with the true sign vector such that a sufficient portion of the
signal from the dSKL expression is still preserved. The main difficulty of analyzing this process is
due to correlations between random variables (Xu Xv ). Naively, we could get an appropriate Γe for
(Xu Xv ) by running a weak learning process independently for each edge. However, this incurs a
prohibitive cost of O(n2 ) by iterating over all edges. We manage to sidestep this cost by showing
that, despite these correlations, learning all Γe simultaneously succeeds with a probability which is
≥ 1/ poly(n), for a moderate polynomial in n. Thus, repeating this process several times, we can
obtain a ~Γ which has the appropriate guarantee with sufficient constant probability.
At this point, we are in the setting as described above – we have a statistic Z 0 of the form:
X
Z0 =
cuv Xu Xv
(34)
u6=v
V
where c ∈ {±1}( 2 ) represent the signs obtained from the weak learning procedure. E[Z 0 ] = 0
if X ∈ In , and E[Z 0 ] ≥ ε/ζβ if dSKL (X, In ) ≥ ε. These two cases can be distinguished using
Var(Z 0 )ζ 2 β 2 /ε2 samples, by Chebyshev’s inequality. At this point, we run into the second issue
mentioned above. Since the range of Z 0 is Ω(n2 ), a crude bound for Var(Z 0 ) is O(n4 ), granting us
no savings over the localization algorithm of Theorem 2. However, in the high temperature regime,
we show the following bound on the variance of Z 0 (Theorem 16).
Var(Z 0 ) = Õ(n2 ).
In other words, despite the potentially complex structure of the Ising model and potential correlations, the variables Xu Xv contribute to the variance of Z 0 roughly as if they were all independent!
We describe the result and techniques involved in the analysis of the variance bound in Section 7.
Given the tighter bound on the variance of our statistic, we run the Chebyshev-based test on all the
hypotheses obtained in the previous learning step (with appropriate failure probability) to conclude
our algorithm. Further details about the algorithm are provided in Sections 5.1-5.4.
We state the sample complexity achieved via our learn-then-test framework for independence
testing under no external field here. The corresponding statements for independence testing under
external fields and identity testing are given in Section 5.5.
Theorem 6 (Independence Testing using Learn-Then-Test, No External Field). Suppose p is an
Ising
model in the high temperature regime under no external field. Then, given
10/3
n
β2
Õ
i.i.d samples from p, the learn-then-test algorithm runs in polynomial time and distinε2
guishes between the cases p ∈ In and dSKL (p, In ) ≥ ε with probability at least 9/10.
Next, we state a corollary of Theorem 6 with sample complexities we obtain when β is close to
the high temperature threshold.
Theorem 7 (Independence Testing with β near the Threshold of High Temperature, No External
1
Field). Suppose that p is an Ising model in the high temperature regime and suppose that β = 4dmax
.
That is, β is close to the high temperature threshold. Then:
10/3
• Given Õ εn2 d2
i.i.d samples from p with no external field, the learn-then-test algorithm
max
runs in polynomial time and distinguishes between the cases p ∈ In and dSKL (p, In ) ≥ ε with
probability at least 2/3. For testing identity of p to an Ising model q in the high temperature
regime, we obtain the same sample complexity as above.
26
Figure 1 shows the dependence of sample complexity of testing as dmax is varied in the regime
of Theorem 7 for the case of no external field.
The description of our algorithm is presented in Algorithm 6. It contains a parameter τ , which
we choose to be the value achieving the minimum in the sample complexity of Theorem 8. The
algorithm follows a learn-then-test framework, which we outline here.
Algorithm 6 Test if an Ising model p under no external field is product using Learn-Then-Test
1: function Learn-Then-Test-Ising(sample access to an Ising model p, β, dmax , ε, τ )
2:
Run the localization Algorithm 1 on p with accuracy parameter nετ . If it identifies any edges,.
return that dSKL (p, In ) ≥ ε
3:
for ` = 1 to O(n2−τ ) do
4:
Run the weak learning Algorithm 7 on S = {Xu Xv }u6=v with parameters τ and ε/β to.
(`)
generate a sign vector ~Γ(`) where Γuv is weakly correlated with sign (E [Xuv ])
5:
end for
6:
Using the same set of samples for all `, run the testing algorithm of Lemma 14 on each of.
the ~Γ(`) with parameters τ2 = τ, δ = O(1/n2−τ ). If any output that dSKL (p, In ) ≥ ε, return
that dSKL (p, In ) ≥ ε. Otherwise, return that p ∈ In
7: end function
Note: The first step in Algorithm 6 is to perform a localization test to check if |µe | is not too far
away from 0 for all e. It is added to help simplify the analysis of the algorithm and is not
necessary in principle. In particular, we use the first part of Algorithm 1, which checks if
any edge looks far from uniform, to perform this first step, albeit with a smaller value of the
accuracy parameter ε than before. Similar to before, if we find a single non-uniform edge,
this is sufficient evidence to output dSKL (X, In ) ≥ ε. If we do not find any edges which are
verifiably far from uniform, we proceed onward, with the additional guarantee that |µe | is
small for all e ∈ E.
A statement of the exact sample complexity achieved by our algorithm is given in Theorem 8.
When optimized for the parameter τ , this yields Theorem 6.
2
Theorem 8. Given Õ minτ >0 n2+τ + n6−2τ βε2 i.i.d samples from an Ising model p in the hightemperature regime with no external field, there exists a polynomial-time algorithm which distinguishes between the cases p ∈ In and dSKL (p, In ) ≥ ε with probability at least 2/3.
The organization of the rest of the section is as follows. We describe and analyze our weak
learning procedure in Section 5.1. Given a vector with the appropriate weak learning guarantees,
we describe and analyze the testing procedure in Section 5.2. In Section 5.3, we describe how to
combine all these ideas – in particular, our various steps have several parameters, and we describe
how to balance the complexities to obtain the sample complexity stated in Theorem 8. Finally, in
Section 5.4, we optimize the sample complexities from Theorem 8 for the parameter τ and filter out
cleaner statement of Theorem 6. We compare the performance of our localization and learn-then-test
algorithms and describe the best sample complexity achieved in different regimes in Section 6.
27
5.1
Weak Learning
Our overall goal of this section is “weakly learn” the sign of µe = E[Xu Xv ] for all edges e = (u, v).
More specifically, we wish to output a vector ~Γ with the following guarantee:
X
cε
EX
Γe Xu Xv ≥
,
2βn2−τ2
e=(u,v)∈E
for some constant c > 0 and parameter τ2 to be specified later. Note that the “best” Γ, for which
Γe = sign(µe ), has this guarantee with τ2 = 2 – by relaxing our required learning guarantee, we
can reduce the sample complexity in this stage.
The first step will be to prove a simple but crucial lemma answering the following question:
Given k samples from a Rademacher random variable with parameter p, how well can we estimate
the sign of its expectation? This type of problem is well studied in the regime where k = Ω(1/p2 ),
in which we have a constant probability of success (see, i.e. Lemma 3), but we analyze the case
when k 1/p2 and prove how much better one can do versus randomly guessing the sign. See
Lemma 20 in Section A for more details.
With this lemma in hand, we proceed to describe the weak learning procedure. Given parameters
τ ,ε and sample access to a set S of ’Rademacher-like’
2τ random variables which may be arbitrarily
correlated with each other, the algorithm draws Õ nε2 samples from each random variable in the
set and computes their empirical expected values and outputs a signs of thus obtained empirical
expectations. The procedure is described in Algorithm 7.
Algorithm 7 Weakly Learn Signs of the Expectations of a set of Rademacher-like random variables
1: function WeakLearning(sample access to set S = {Zi }i of random variables where |S| =
O(ns ) and where Zi ∈
{−1, 0, +1} and can be arbitrarily correlated,ε, τ ,).
(1)
(k)
n2τ
2:
Draw k = Õ ε2 samples from each Zi . Denote the samples by Zi , . . . , Zi
.
P
(l)
3:
Compute the empirical expectation for each Zi : Ẑi = k1 kl=1 Zi .
4:
Output ~Γ where Γi = sign(Ẑi ).
5: end function
We now turn to the setting of the Ising model, discussed in Section 5.1.1. We invoke the weaklearning procedure of Algorithm 7 on the set S = {Xu Xv }u6=v with parameters ε/β and 0 ≤ τ ≤ 2.
By linearity of expectations and Cauchy-Schwarz, it is not hard to see that we can get a guarantee
of the form we want in expectation (see Lemma 12). However, the challenge remains to obtain
this guarantee with constant probability. Carefully analyzing the range of the random variable and
using this guarantee on the expectation allows us to output an appropriate vector ~Γ with probability
inversely polynomial in n (see Lemma 13). Repeating this process several times will allow us to
generate a collection of candidates {~Γ(`) }, at least one of which has our desired guarantees with
constant probability.
5.1.1
Weak Learning the Edges of an Ising Model
We now turn our attention to weakly learning the edge correlations in the Ising model. To recall,
our overall goal is to obtain a vector ~Γ such that
X
cε
EX∼p
Γe Xu Xv ≥
.
2βn2−τ2
e=(u,v)∈E
28
We start by proving that the weak learning algorithm 7 yields a ~Γ for which such a bound holds
in expectation. The following is fairly straightforward from Lemma 20 and linearity of expectations.
and |µe | ≤
ε
βnτ2
n2τ2 β 2
ε2
samples from an Ising model X ∼ p such that dSKL (p, In ) ≥ ε
for all e ∈ E, Algorithm 7 outputs ~Γ = {Γe } ∈ {±1}|E| such that
!2
X
X
cβ
E~Γ EX∼p
|µe | ,
Γe Xu Xv ≥ 2−τ2
εn
Lemma 12. Given k = O
e∈E
e=(u,v)∈E
for some constant c > 0.
Proof. Since for all e = (u, v) ∈ E, |µe | ≤ βnετ2 , and by our upper bound on k, all of the random
variables Xu Xv fall into the first case of Lemma 20 (the “small k” regime). Hence, we get that
√
1 c1 |µe | k
Pr [Γe = sign(µe )] ≥ +
2
2
which implies that
√ !
1 c1 |µe | k
EΓe [Γe µe ] ≥
+
|µe | +
2
2
√
= c1 |µe |2 k
√ !
1 c1 |µe | k
−
(−|µe |)
2
2
Summing up the above bound over all edges, we get
"
#
X
√ X
|µe |2
E~Γ
Γe µe ≥ c1 k
e∈E
≥
e∈E
0
τ
2
c1 n β X
ε
|µe |2 ,
e∈E
for some constant c01 > 0. Applying the Cauchy-Schwarz inequality gives us
"
#
!2
X
X
cβ
E~Γ
Γe µe ≥ 2−τ2
|µe | ,
εn
e∈E
e∈E
as desired.
Next, we prove that the desired bound holds with sufficiently high probability. The following
lemma follows by a careful analysis of the extreme points of the random variable’s range.
2τ 2
2
Lemma 13. Given k = O n ε2β i.i.d. samples from an Ising model p such that dSKL (p, In ) ≥ ε
and |µe | ≤ βnετ2 for all e ∈ E, Algorithm 7 outputs ~Γ = {Γe } ∈ {±1}|E| where: Define χτ2 to be the
event that
X
cε
,
EX∼p
Γe Xu Xv ≥
2βn2−τ2
e=(u,v)∈E
for some constant c > 0. We have that
PrΓ [χτ2 ] ≥
29
c
4n2−τ2
.
Proof. We introduce some notation which will help in the elucidation of the argument which follows.
Let r = PrΓ [χτ2 ]. Let
!2
X
cβ
T =
|µe | .
2εn2−τ2
e∈E
Let Y be the random variable defined as follows
X
Y = EX∼p
Γe Xu Xv ,
e=(u,v)∈E
U = E~Γ [Y |Y > T ] and
L = E~Γ [Y |Y ≤ T ]
Then we have
rU + (1 − r)L ≥ 2T (From Lemma 12)
2T − L
=⇒ r ≥
U −L
Since U ≤
P
e∈E
|µe |, we have
2T − L
|µ
|
−L
e
e∈E
r≥ P
Since L ≥ −
P
e∈E
|µe |,
r≥
2
2T − L
P
e∈E |µe |
2
P
Since L ≤ T , we get
r≥
T
e∈E
|µe |
Substituting in the value for T we get
2
P
cβ
e∈E |µe |
P
r≥
4εn2−τ2
e∈E |µe |
P
cβ
e∈E |µe |
=⇒ r ≥
4εn2−τ2
P
Since dSKL (p, In ) ≥ ε, this implies
e∈E |µe | ≥ ε/β and thus
r≥
c
4n2−τ2
as desired.
30
,
5.2
Testing Our Learned Hypothesis
In this section, we assume that we were successful in weakly learning a vector ~Γ which is “good”
(i.e., it satisfies χτ2 , which says that the expectation the statistic with this vector is sufficiently
large). With such a ~Γ, we show that we can distinguish between p ∈ In and dSKL (p, In ) ≥ ε.
Lemma 14. Let p be an Ising model, let X ∼ p, and let σ 2 be such that, for any ~γ = {γe } ∈ {±1}|E| ,
X
Var
γe Xu Xv ≤ σ 2 .
e=(u,v)∈E
4−2τ2 β 2 log(1/δ)
Given k = O σ 2 · n
i.i.d samples from p, which satisfies either p ∈ In or dSKL (p, In ) ≥
2
ε
ε, and ~Γ = {Γe } ∈ {±1}|E| which satisfies χτ2 (as defined in Lemma 13) in the case that dSKL (p, In ) ≥
ε, then there exists an algorithm which distinguishes these two cases with probability ≥ 1 − δ.
Proof. We prove this lemma with failure probability 1/3 – by standard boosting arguments, this
can be lowered to δ by repeating the test O(log(1/δ)) times and taking the majority result.
Denote the ith sample as X (i) . The algorithm will compute the statistic
k
1 X X
Z=
Γe Xu(i) Xv(i) .
k
i=1 e=(u,v)∈E
If Z ≤ 4βncε2−τ2 , then the algorithm will output that p ∈ In . Otherwise, it will output that
dSKL (p, In ) ≥ ε.
By our assumptions in the lemma statement, in either case,
Var (Z) ≤
σ2
.
k
If p ∈ In , then we have that
E[Z] = 0.
By Chebyshev’s inequality, this implies that
ε
16σ 2 β 2 n4−2τ2
Pr Z ≥
≤
.
2−τ
4βn 2
kc2 ε2
Substituting the value of k gives the desired bound in this case. The case where dSKL (p, In ) ≥ ε
follows similarly, but additionally using the fact that χτ2 implies that
E[Z] ≥
5.3
cε
.
2βn2−τ2
Combining Learning and Testing
In this section, we combine lemmas from the previous sections to complete the proof of Theorem 8.
Lemma 13 gives us
weak learning step gives a “good” ~Γ with probability
that a single iteration of the
1
2−τ
at least Ω n2−τ2 . We repeat this step O(n 2 ) times, generating O(n2−τ2 ) hypotheses ~Γ(`) . By
standard tail bounds on geometric random variables, this will imply that at least one hypothesis is
31
good (i.e. satisfying χτ2 ) with probability at least 9/10. We then run the algorithm of Lemma 14
on each of these hypotheses, with failure probability δ = O(1/n2−τ2 ). If p ∈ In , all the tests will
output that p ∈ In with probability at least 9/10. Similarly, if dSKL (p, In ) ≥ ε, conditioned on at
∗
least one hypothesis ~Γ(` ) being good, the test will output that dSKL (p, In ) ≥ ε for this hypothesis
with probability at least 9/10. This proves correctness of our algorithm.
To conclude our proof, we analyze its sample complexity. Combining the complexities of Lemmas
5, 13, and 14, the overall sample complexity is
2τ1 2
2+τ2 2
4−2τ2 β 2
n β log n
n
β
2n
O
+O
+O σ
log n .
ε2
ε2
ε2
Noting that the first term is always dominated by the second term we can simplify the complexity
to the following expression.
2+τ2 2
4−2τ2 β 2
n
β
2n
+O σ
log n .
(35)
O
ε2
ε2
Plugging in the variance bounds from Section 7, Theorems 16 and 17 gives Theorem 8.
5.4
Balancing Weak Learning and Testing
The sample complexities in the statement of Theorem 8 arise from a combination of two separate
algorithms and from a variance bound for our multi-linear statistic which depends on β and dmax .
To balance for the optimal value of τ in various regimes of β and dmax we use Claim 3 which can
be easily verified and arrive at Theorem 6.
2
Claim 3. Let S = Õ n2+τ + n4−2τ · σ 2 βε2 . Let σ 2 = O(ns ). The value of τ which minimizes
S is
2+s
3 .
Claim 3 together with the variance bound (Theorem 16) implies Theorem 6.
Theorem 6 (Independence Testing using Learn-Then-Test, No External Field). Suppose p is an
Ising
model in the high temperature regime under no external field. Then, given
10/3
n
β2
Õ
i.i.d samples from p, the learn-then-test algorithm runs in polynomial time and distinε2
guishes between the cases p ∈ In and dSKL (p, In ) ≥ ε with probability at least 9/10.
5.5
Changes Required for General Independence and Identity Testing
We describe the modifications that need to be done to the learn-then-test approach described in
Sections 5.1-5.4 to obtain testers for independence under an arbitrary external field (Section 5.5.1),
identity without an external field (Section 5.5.2), and identity under an external field (Section 5.5.3).
5.5.1
Independence Testing under an External Field
Under an external field, the statistic we considered in Section 5 needs to be modified.
Suppose we are interested in testing independence of an Ising model p defined on a graph G = (V, E)
with a parameter vector θ~p . Let X ∼ p. We have that dSKL (p, In ) = minq∈In dSKL (p, q). In
particular, we consider q to be the independent Ising model on graph G0 = (V, E 0 ) with parameter
32
vector θ~q such that E 0 = φ and θuq is such that µqu = µpu for all u ∈ V . Then,
dSKL (p, In ) ≤ dSKL (p, q)
X
p
θuv
(µpuv − µquv )
=
(36)
e=(u,v)∈E
=
X
p
θuv
(µpuv − µpu µpv )
e=(u,v)∈E
≤
X
β |µpuv − µpu µpv |
e=(u,v)∈E
=⇒
dSKL (p, In )
≤
β
X
|µpuv − µpu µpv | .
e=(u,v)∈E
P
The above inequality suggests a statistic Z such that E[Z] = e=(u,v)∈E |λpuv | where λpuv = µpuv −
P
(1)
(2)
(1)
(2)
µpu µpv . We consider Z = u6=v sign(λuv ) Xu − Xu
Xv − Xv
where X (1) , X (2) ∼ p are
two independent samples from p. It can be seen that Z has the desired expectation. However,
we have the same issue as before that we don’t know the sign(λuv ) parameters. Luckily, it turns
out that our weak learning procedure is general
enough
case as well. Consider
to handle this
(1)
(2)
(1)
(2)
1
the following random variable: Zuv = 4 Xu − Xu
Xv − Xv . Zuv takes on values in
0 defined as follows: Pr[Z
{−1, 0, +1}. Consider an associated Rademacher variable Zuv
uv = −1] =
0
Pr[Zuv = −1] + 1/2 Pr[Zuv = 0]. It is easy to simulate a sample from Zuv given access to a sample
0 = −1 or +1. E[Z 0 ] = E[Z ] = λuv .
from Zuv . If Zuv = 0, toss a fair coin to decide whether Zuv
uv
uv
2
λuv
1
0
Hence Zuv ∼ Rademacher 2 + 4 and by Lemma 20 with k copies of the random variable Zuv we
√
get a success probability of 1/2+c1 k |λuv | of estimating sign(λuv ) correctly. Given this guarantee,
the rest of the weak learning argument of Lemmas 12 and 13 follows analogously by replacing µe
with λe .
0
After we have weakly learnt the signs, we are left with a statistic Zcen
of the form:
X
0
Zcen
=
cuv Xu(1) − Xu(2) Xv(1) − Xv(2)
(37)
u6=v
V
where the subscript cen denotes that the statistic is a centered one and c ∈ {±1}( 2 ) . We need to
0 ). We again employ the techniques described in Section 7 to obtain
obtain a bound on Var(Zcen
0 ) in the high-temperature regime. The statement of the variance
a non-trivial bound on Var(Zcen
result is given in Theorem 17 and the details are in Section 7.3. Combining the weak learning part
and the variance bound gives us the following sample complexity for independence testing under an
external field:
2+τ
(n
+ n4−2τ σ 2 )β 2
Õ
ε2
2+τ
(n
+ n4−2τ n2 )β 2
=Õ
ε2
Balancing for the optimal value of the τ parameter gives Theorem 9.
Theorem 9 (Independence Testing using Learn-Then-Test, Arbitrary External Field). Suppose p is
an Ising model in thehigh temperature
regime under an arbitrary external field. The learn-then-test
10/3 2
algorithm takes in Õ n ε2 β i.i.d. samples from p and distinguishes between the cases p ∈ In and
dSKL (p, In ) ≥ ε with probability ≥ 9/10.
33
The tester is formally described in Algorithm 8.
Algorithm 8 Test if an Ising model p under arbitrary external field is product
1: function Learn-Then-Test-Ising(sample access to an Ising model p, β, dmax , ε, τ )
2:
Run the localization Algorithm 1 with accuracy parameter nετ . If it identifies any edges,.
return that dSKL (p, In ) ≥ ε
3:
for ` = 1 to O(n2−τ ) do
(1)
(2)
(1)
(2)
4:
Run the weak learning Algorithm 7 on S = {(Xu − Xu )(Xv − Xv )}u6=v with param-.
(`)
eters τ2 h= τ and ε/β to generate ai
sign vector ~Γ(`) where Γuv is weakly correlated with
(1)
(2)
(1)
(2)
sign E (Xu − Xu )(Xv − Xv )
5:
end for
6:
Using the same set of samples for all `, run the testing algorithm of Lemma 14 on each of.
the ~Γ(`) with parameters τ2 = τ, δ = O(1/n2−τ ). If any output that dSKL (p, In ) ≥ ε, return
that dSKL (p, In ) ≥ ε. Otherwise, return that p ∈ In
7: end function
5.5.2
Identity Testing under No External Field
We first look at the changes needed for identity testing under no external field. Similar to before,
we start by obtaining an upper bound on the SKL between the Ising models p and q. We get that,
X
p
q
dSKL (p, q) =
(θuv
− θuv
) (µpuv − µquv )
(u,v)∈E
=⇒
dSKL (p, q) X p
≤
|(µuv − µquv )|
2β
u6=v
Since we know µquv for all pairs u, v, the above upper bound suggests the statistic Z of the form
X
Z=
sign (µpuv − µquv ) (Xu Xv − µquv )
u6=v
If p = q, E[Z] = 0 and if dSKL (p, q) ≥ ε, E[Z] ≥ ε/2β. As before, there are two things we need to
do: learn a sign vector which is weakly correlated with the right sign vector and obtain a bound on
Var(Z). By separating out the part of the statistic which is just a constant, we obtain that
X
Var(Z) ≤ Var
cuv Xu Xv
u6=v
V
where c ∈ {±1}( 2 ) . Hence, the variance bound of Theorem 16 holds for Var(Z).
As for the weakly learning the signs, using Corollary 2 of Lemma
√ 20 we get that for each pair
u, v, with k samples, we can achieve a success probability 1/2 + c1 k |µpuv − µquv | of correctly estimating sign(µpuv − µquv ). Following this up with analogous proofs of Lemmas 12 and 13 where µe
is replaced by µpe − µqe , we achieve our goal of weakly learning the signs with a sufficient success
probability.
By making these changes we arrive at the following theorem for testing identity to an Ising
model under no external field.
34
Theorem 10 (Identity Testing using Learn-Then-Test, No External Field). Suppose p and q are
Ising models
in thehigh temperature regime under no external field. The learn-then-test algorithm
10/3
n
β2
i.i.d. samples from p and distinguishes between the cases p = q and dSKL (p, q) ≥
takes in Õ
ε2
ε with probability ≥ 9/10.
The tester is formally described in Algorithm 9.
Algorithm 9 Test if an Ising model p under no external field is identical to q
1: function TestIsing(sample access to an Ising model p, β, dmax , ε, τ , description of Ising model
q under no external field)
2:
Run the localization Algorithm 2 with accuracy parameter nετ . If it identifies any edges,.
return that dSKL (p, q) ≥ ε
3:
for ` = 1 to O(n2−τ ) do
4:
Run the weak learning Algorithm 7 on S = {Xu Xv − µquv }u6=v with parameters τ2 = τ and.
(`)
ε/β to generate a sign vector ~Γ(`) where Γuv is weakly correlated with sign (E [Xuv − µquv ])
5:
end for
6:
Using the same set of samples for all `, run the testing algorithm of Lemma 14 on each of.
the ~Γ(`) with parameters τ2 = τ, δ = O(1/n2−τ ). If any output that dSKL (p, q) ≥ ε, return
that dSKL (p, q) ≥ ε. Otherwise, return that p = q
7: end function
5.5.3
Identity Testing under an External Field
When an external field is present, two things change. Firstly, the terms corresponding to nodes of
the Ising model in the SKL expression no longer vanish and have to be accounted for. Secondly, it
is unclear how to define an appropriately centered statistic which has a variance of O(n2 ) in this
setting, and we consider this an interesting open question. Instead, we use the uncentered statistic
which has variance Θ(n3 ).
We now describe the first change in more detail now. Again, we start by considering an upper
bound on the SKL between Ising models p and q.
X
X
p
q
dSKL (p, q) =
(θvp − θvq ) (µpv − µqv ) +
(θuv
− θuv
) (µpuv − µquv )
v∈V
=⇒ dSKL (p, q) ≤ 2h
(u,v)∈E
X
|(µpv
v∈V
− µqv )| + 2β
X
|(µpuv − µquv )|
u6=v
Hence if dSKL (p, q) ≥ ε, then either
P
• 2h v∈V |(µpv − µqv )| ≥ ε/2 or
P
• 2β u6=v |(µpuv − µquv )| ≥ ε/2.
P
P
Moreover, if p = q, then both 2h v∈V |(µpv − µqv )| = 0 and 2β u6=v |(µpuv − µquv )| = 0. Our tester
will first test for case (i) and if that test doesn’t declare that the two Ising models are far, then
proceeds to test whether case (ii) holds.
P
We will first describe the test to detect whether v∈V |(µpv − µqv )| = 0 or is ≥ ε/2h. We observe
that the random variables Xv are Rademachers and hence we can use the weak-learning framework
35
P
we developed so far to accomplish this goal. The statistic we consider is Z = v∈V sign(µpv ) (Xv − µqv ).
Again, as before, we face two challenges: we don’t know the signs of the node expectations µpv and
we need a bound on Var(Z).
We employ the weak-learning framework described in Sections 5.1-5.4 to weakly learn a sign
vector correlated with the true sign vector. In particular, since Xv ∼ Rademacher(1/2+µv /2), from
Corollary√2, we have that with k samples we can correctly estimate sign(µpv − µqv ) with probability
1/2 + c1 k |µpv − µqv |. The rest of the argument for obtaining a sign vector which, with sufficient
probability, preserves a sufficient amount of signal from the expected value of the statistic, proceeds
in a similar way as before. However since the total number of terms we have in our expression is
only linear we get some savings in the sample complexity.
P And from Lemma 1, weV have the following bound on functions fc (.) of the form fc (X) =
v∈V cv Xv (where c ∈ {±1} ) on the Ising model:
Var(fc (X)) = O(n).
By performing
in Sections 5.3 and 5.4, we obtain that by us 5/3 2 calculations analogous to the ones
P
p
q
n h
ing Õ
samples we can test whether
v∈V |(µv − µv )| = 0 or is ≥ ε/4h with probabilε2
P
ity ≥ 19/20. If the tester outputs that v∈V |(µpv − µqv )| = 0, then we proceed to test whether
P
p
q
u6=v |(µuv − µuv )| = 0 or ≥ ε/4β.
To perform this step, we begin by looking at the statistic Z used in Section 5.5.2:
X
Z=
sign (µpuv − µquv ) (Xu Xv − µquv )
u6=v
as Z has the right expected value. We learn a sign vector which is weakly correlated with the
true sign vector. However we need to obtain a variance bound on functions of the form fc (X) =
P
q
(V2 ) . By ignoring the constant term in f (X), we get that,
c
u6=v cuv (Xu Xv − µuv ) where c ∈ {±1}
X
Var(fc (X)) = Var
cuv Xu Xv
u6=v
which can be Ω(n3 ) as it is not appropriately centered.
We employ
Lemma 1 to get a variance
11/3
n
β2
3
bound of O(n ) which yields a sample complexity of Õ
for this setting.
ε2
Theorem 11 captures the total sample complexity of our identity tester under the presence of external
fields.
Theorem 11 (Identity Testing using Learn-Then-Test, Arbitrary External Field). Suppose p and
q are Ising models in thehigh temperature
regime under arbitrary external fields. The learn-then5/3 2
11/3 β 2
test algorithm takes in Õ n h +n
i.i.d. samples from p and distinguishes between the cases
ε2
p = q and dSKL (p, q) ≥ ε with probability ≥ 9/10.
The tester is formally described in Algorithm 10.
6
Comparing Localization and Learn-then-Test Algorithms
At this point, we now have two algorithms: the localization algorithm of Section 3 and the
learn-then-test algorithm of Section 5. Both algorithms are applicable in all temperature regimes
36
Algorithm 10 Test if an Ising model p under an external field is identical to Ising model q
1: function TestIsing(sample access to an Ising model p, β, dmax , ε, τ1 , τ2 , description of Ising
model q)
2:
Run the localization Algorithm 2 on the nodes with accuracy parameter 2nετ1 . If it identifies.
any nodes, return that dSKL (p, q) ≥ ε
3:
for ` = 1 to O(n1−τ1 ) do
4:
Run the weak learning Algorithm 7 on S = {(Xu − Yu }u∈V , where Yu ∼ Rademacher(1/2 +.
(`)
µqu /2), with parameters τ1 and ε/2h to generate a sign vector ~Γ(`) where Γu is weakly
correlated with sign (E [Xu − µqu ])
5:
end for
6:
Using the same set of samples for all `, run the testing algorithm of Lemma 14 on each of.
the ~Γ(`) with parameters τ3 = τ1 , δ = O(1/n1−τ1 ). If any output that dSKL (p, q) ≥ ε, return
that dSKL (p, q) ≥ ε
7:
————————–
8:
Run the localization Algorithm 2 on the edges with accuracy parameter 2nετ2 . If it identifies.
any edges, return that dSKL (p, q) ≥ ε
9:
for ` = 1 to O(n2−τ2 ) do
10:
Run the weak learning Algorithm 7 on S = {(Xu Xv − Yuv }u6=v , where Yuv ∼.
Rademacher(1/2 + µquv /2), with parameters τ2 and ε/2β to generate a sign vector ~Γ(`)
(`)
where Γuv is weakly correlated with sign (E [Xu Xv − µquv ])
11:
end for
12:
Using the same set of samples for all `, run the testing algorithm of Lemma 14 on each of.
the ~Γ(`) with parameters τ4 = τ2 , δ = O(1/n2−τ2 ). If any output that dSKL (p, q) ≥ ε, return
that dSKL (p, q) ≥ ε. Otherwise, return that p = q
13: end function
but learn-then-test beats localization’s sample complexity in high temperature under some degree
regimes. We note that their sample complexities differ in their dependence on β and dmax . In this
section, we offer some intuition as to why the difference arises and state the best sample complexities
we achieve for our testing problems by combining these two approaches.
First, we note that if the algorithm is agnostic of the maximum degree dmax , then learn-then-test
always outperforms localization in the high temperature regime. This leads to Theorem 12.
Theorem 12. Suppose p is an Ising model in the high temperature regime. To test either independence
4 2 or identity agnostic of the maximum degree of the graph dmax , localization requires
Õ nε2β
samples from p for a success probability > 2/3. Learn-then-test, on the other hand, re 10/3 2
quires Õ n ε2 β for independence testing and identity testing under no external field. It requires
11/3 2
Õ n ε2 β for identity testing under an external field.
When knowledge of dmax is available to the tester, he can improve his sample complexities of
localization approach. Now the sample complexity of localization gets worse as dmax increases. As
noted in Section 3, the reason for this worsening is that the contribution to the distance by any
single edge grows smaller thereby making it harder to detect. However, when we are in the hightemperature regime a larger dmax implies a tighter bound on the strength of the edge interactions β
and the variance bound of Section 7 exploits this tighter bound to get savings in sample complexities
when the degree is large enough.
37
We combine the sample complexities obtained by the localization and the learn-then-test algorithms and summarize in the following theorems the best sample complexities we can achieve
for testing independence and identity by noting the parameter regimes in which of the above two
algorithms gives better sample complexity. In both of the following theorems we fix β to be n−α
for some α and present which algorithm dominates as dmax ranges from a constant to n.
Theorem 13 (Best Sample Complexity Achieved, No External Field). Suppose p is an Ising model
under no external field.
• if β = O(n−2/3 ), then for the range dmax ≤ n2/3 , localization performs better, for both inde1
pendence and identity testing. For the range n2/3 ≤ dmax ≤ 4β
, learn-then-test performs better
than localization for both independence and identity testing yielding a sample complexity which
1
is independent of dmax . If dmax ≥ 4β
, then we are no longer in the high temperature regime.
• if β = ω(n−2/3 ), then for the entire range of dmax localization performs at least as well as the
learn-then-test algorithm for both independence and identity testing.
The theorem stated above is summarized in Figure 2 for the regime when β = O(n−2/3 ).
The comparison for independence testing under the presence of an external field is similar and
is presented in Theorem 14.
Theorem 14 (Best Sample Complexity Achieved for Independence Testing, Arbitrary External
Field). Suppose p is an Ising model under an arbitrary external field.
• if β = O(n−2/3 ), then for the range dmax ≤ n2/3 , localization performs better, for independence
1
, learn-then-test performs better than localization for
testing. For the range n2/3 ≤ dmax ≤ 4β
1
independence testing yielding a sample complexity which is independent of dmax . If dmax ≥ 4β
,
then we are no longer in the high temperature regime.
• if β = ω(n−2/3 ), then for the entire range of dmax localization performs at least as well as the
learn-then-test algorithm for independence testing.
Finally, we note in Theorem 15, the parameter regimes when learn-then-test performs better for
identity testing under an external field. Here our learn-then-test approach suffers worse bounds due
to a weaker bound on the variance of our statistic.
Theorem 15 (Best Sample Complexity Achieved for Identity Testing, Arbitrary External Field).
Suppose p is an Ising model under an arbitrary external field.
1
• if β = O(n−5/6 ), then for the range n2/3 ≤ dmax ≤ 4β
, learn-then-test performs better than
localization for identity testing yielding a sample complexity which is independent of dmax . If
1
dmax ≥ 4β
, then we are no longer in the high temperature regime.
• if β = ω(n−5/6 ), then for the entire range of dmax localization performs at least as well as the
learn-then-test algorithm for identity.
38
Figure 1: Localization vs Learn-Then-Test: A plot of the sample complexity of testing identity
1
under no external field when β = 4dmax
is close to the threshold of high temperature. Note that
throughout the range of values of dmax we are in high temperature regime in this plot.
Figure 2: Localization vs Learn-Then-Test: A plot of the sample complexity of testing identity
under no external field when β ≤ n−2/3 . The regions shaded yellow denote the high temperature
regime while the region shaded blue denotes the low temperature regime. The algorithm which
achieves the better sample complexity is marked on the corresponding region.
39
7
Bounding the Variance of Functions of the Ising Model in the
High-Temperature Regime
In this section, we describe a technique for bounding the variance of our statistics on the Ising
model in high temperature. As the structure of Ising models can be quite complex, it can be
challenging to obtain non-trivial bounds on the variance of even relatively simple statistics. In
particular, to apply our learn-then-test
framework of Section 5, we must bound the variance
P
0
of statistics of the form Z 0 =
c
u6=
v uv Xu Xv (under no external field, see (34)) and Zcen =
P
(1)
(2)
(1)
(2)
Xv − Xv
(under an external field, see (37)). While the variance for
u6=v cuv Xu − Xu
both the statistics is easily seen to be O(n2 ) if the graph has no edges, to prove variance bounds
better than the trivial O(n4 ) for general graphs requires some work. We show the following two
theorems in this section.
P
The first result, Theorem 16, bounds the variance of functions of the form u6=v cuv Xu Xv under
no external field which captures the statistic used for testing independence and identity by the
learn-then-test framework of Section 5 in the absence of an external field.
V
Theorem 16 (High Temperature VariancePBound, No External Field). Let c ∈ [−1, 1]( 2 ) and
define fc : {±1}V → R as follows: fc (x) = i6=j c{i,j} xi xj . Let also X be distributed according to
an Ising model, without node potentials (i.e. θv = 0, for all v), in the high temperature regime of
Definition 3. Then
Var (fc (X)) = Õ(n2 ).
The second result of this section, Theorem 17, bounds the variance of functions of the form
(1)
(2)
(1)
(2)
u6=v cuv (Xu − Xu )(Xv − Xv ) which captures the statistic of interest for independence testing
using the learn-then-test framework of Section 5 under an external field. Intuitively, this modification is required to “recenter” the random variables. Here, we view the two samples from Ising model
p over graph G = (V, E) as coming from a single Ising model p⊗2 over a graph G(1) ∪ G(2) where
G(1) and G(2) are identical copies of G.
P
V
Theorem 17 (High Temperature Variance Bound, Arbitrary External Field). Let c ∈ [−1, 1]( 2 )
and let X be distributed according to Ising model p⊗2 over graph G(1) ∪ G(2) in P
the high temperature
0
regime of Definition 3 and define gc : {±1}V ∪V → R as follows: gc (x) =
u,v∈V cuv (xu(1) −
s.t. u6=v
xu(2) )(xv(1) − xv(2) ). Then
Var(gc (X)) = Õ n
7.1
2
.
Overview of the Technique
We will use tools from Chapter 13 of [LPW09] to obtain the variance bounds of this section. At
a high level the technique to bound the variance of a function f on a distribution µ involves first
defining a reversible Markov chain with µ as its stationary distribution. By studying the mixing
time properties (via the spectral gap) of this Markov chain along with the second moment of the
variation of f when a single step is taken under this Markov chain we obtain bounds on the second
moment of f which consequently yield the desired variance bounds.
The Markov chain in consideration here will be the Glauber dynamics chain on the Ising model
p. As stated in Section 2, the Glauber dynamics are reversible and ergodic for Ising models. Let M
be the reversible transition matrix for the Glauber dynamics on some Ising model p. Let γ∗ be the
absolute spectral gap for this Markov chain. The first step is to obtain a lower bound on γ∗ .
40
Claim 4. In the high-temperature regime/under Dobrushin conditions, γ∗ ≥ Ω
arbitrary external field.
1
n log n
under an
Proof. From Theorem 15.1 of [LPW09], we have that the mixing time of the Glauber dynamics
is O(n log n). Since the Glauber dynamics on an Ising model is ergodic and reversible, using the
relation between mixing and relaxation times (Theorem 12.4 of [LPW09]) we get that
tmix ≥ γ1∗ − 1 log(2)
(38)
=⇒
1
γ∗
=⇒ γ∗
≤
n log n
log(2)
≥Ω
+1
1
n log n
(39)
.
(40)
For a function f , define
E(f ) =
1
2
X
[f (x) − f (y)]2 π(x)M (x, y).
x,y∈{±1}n
This can be interpreted as the expected square of the difference in the function, when a step is taken
at stationarity. That is,
1
E(f ) = E (f (x) − f (y))2
(41)
2
where x is drawn from the Ising distribution and y is obtained by taking a step in the Glauber
dynamics starting from x. We now state a slight variant of Remark 13.13 which we will use as
Lemma 15.
Lemma 15. For a reversible transition matrix P on state space Ω with stationary distribution π,
let
1 X
E(f ) :=
(f (x) − f (y))2 π(x)P (x, y),
2
x,y∈Ω
where f is a function on Ω such that Varπ (f ) > 0. Also let γ∗ be the absolute spectral gap of P .
Then
E(f )
γ∗ ≤
.
Varπ (f )
Note: Remark 13.13 in [LPW09] states a bound on the spectral gap as opposed to the absolute
spectral gap bound which we use here. However, the proof of Remark 13.13 also works for
obtaining a bound on the absolute spectral gap γ∗ .
7.2
Bounding Variance of Z 0 Under No External Field
We prove Theorem 16 now. Consider the function fc (x) =
P
u,v cuv xu xv
e
Claim 5. For an Ising model under no external field, E(fc ) = O(n).
41
|V |
where c ∈ [−1, 1]( 2 ) .
Proof. Since y is obtained
by taking a single step on the Glauber dynamics from x, fc (x) − fc (y) is a
P
function of the form v cv xv where cv ∈ [−1, 1] for all v ∈ V . The coefficients {cv }v depend on which
node v0 ∈ V was updated by the Glauber dynamics. Since there are n choices for nodes to update,
and since the update might P
also leave x unchanged, i.e. y = x, fc (x) − fc (y) is one of at most n + 1
√
linear functions of the form v cv xv . Denote, by E(x, y), the event that |fc (x) − fc (y)| ≥ c n log n.
We have, from the concentration of linear functions on the Ising model around their expected value
(Lemma 1) and a union bound over the n + 1 possible linear functions, that for a sufficiently large
1
c, under no external field, Pr [E(x, y)] ≤ 10n
2 . Now,
E (fc (x) − fc (y))2
= E (fc (x) − fc (y))2 |E(x, y) Pr[E(x, y)]
+ E (fc (x) − fc (y))2 |¬E(x, y) Pr[¬E(x, y)]
2
1
1
2
≤ n2 × 10n
2 + c n log n 1 − 10n2
e
= O(n)
where we used the fact that the absolute maximum value of (fc (x) − fc (y))2 is n2 .
Claim 4 together with Claim 5 are sufficient to conclude an upper bound on the variance of fc ,
by using Lemma 15, thus giving us Theorem 16.
7.3
0
Bounding Variance of Zcen
Under Arbitrary External Field
Under the presence of an external field, we saw that we need to appropriately center our statistics
to achieve low variance. The function gc (x) of interest now is defined over the 2-sample Ising model
p⊗2 and is of the form
X
(2)
(1)
(2)
gc (x) =
cuv (x(1)
u − xu )(xv − xv )
u,v
e
where now x, y ∈ {±1}2|V | . First, note that the absolute spectral gap for p⊗2 is also at least Ω(1/n).
Now we bound E(gc ).
e
Claim 6. For an Ising model under an arbitrary external field, E(gc ) = O(n).
Proof. Since y is obtained by taking a single step on the Glauber
dynamics from x, it can be seen
P
(1)
(2)
where cv ∈ [−1, 1] for all v ∈ V . The
that gc (x) − gc (y) is a function of the form v cv xv − xv
coefficients {cv }v depend on which node v0 ∈ V was updated by the Glauber dynamics. Since there
are n choices for nodes to update, and since the update might also leavex unchanged,
i.e. y = x,
P
(1)
(2)
gc (x) − gc (y) is one of at most n + 1 linear functions of the form v cv xv − xv . Denote, by
√
E(x, y), the event that |gc (x) − gc (y)| ≥ c n log n. We have, from Lemma 1 and a union bound,
1
that for a sufficiently large c, Pr [E(x, y)] ≤ 10n
2 . Now,
E (gc (x) − gc (y))2
= E (gc (x) − gc (y))2 |E(x, y) Pr[E(x, y)]
(42)
2
c
c
+ E (gc (x) − gc (y)) |E(x, y) Pr[E(x, y) ]
(43)
2
1
1
2
2
(44)
≤ 4n × 10n2 + c n log n 1 − 10n2
e
= O(n)
(45)
where we used the fact that the absolute maximum value of (gc (x) − gc (y))2 is 4n2 .
Similar to before, Claim 4 together with Claim 6 are sufficient to conclude an upper bound on
the variance of fc , by using Lemma 15, thus giving us Theorem 17.
42
8
Lower Bounds
In this section we describe our lower bound constructions and state the main results.
8.1
Dependences on n
Our first lower bounds show dependences on n, the number of nodes, in the complexity of testing
Ising models.
To start, we prove that uniformity testing on product measures over a binary alphabet requires
√
Ω( n/ε) samples. Note that a binary product measure corresponds to the case of an Ising model
with no edges. This implies the same lower bound for identity testing, but ( not) independence
testing, as a product measure always has independent marginals, so the answer is trivial.
Theorem 18. There exists a constant c > 0 such that any algorithm, given sample access to an
Ising model p with no edges (i.e., a product measure over a binary alphabet), which distinguishes
√
between the cases p = Un and dSKL (p, Un ) ≥ ε with probability at least 99/100 requires k ≥ c n/ε
samples.
Next, we show that any algorithm which tests uniformity of an Ising model requires Ω(n/ε)
samples. In this case, it implies the same lower bounds for independence and identity testing.
Theorem 19. There exists a constant c > 0 such that any algorithm, given sample access to an
Ising model p, which distinguishes between the cases p = Un and dSKL (p, Un ) ≥ ε with probability
at least 99/100 requires k ≥ cn/ε samples. This remains the case even if p is known to have a tree
structure and only ferromagnetic edges.
The lower bounds use Le Cam’s two point method which constructs a family of distributions P
such that the distance between any P ∈ P and a particular distribution Q is large (at least ε). But
given a P ∈ P chosen uniformly at random, it is hard to distinguish between P and Q with at least
2/3 success probability unless we have sufficiently many samples.
Our construction for product measures is inspired by Paninski’s lower bound for uniformity testing p
[Pan08]. We start with the uniform Ising model and perturb each node positively or negatively
by ε/n, resulting in a model which is ε-far in dSKL from Un . The proof appears in Section 8.3.1.
Our construction for the linear lower bound builds upon this style of perturbation. In the previous construction, instead of perturbing the node potentials, we could have left the node marginals
to be uniform and perturbed the edges of some fixed, known matching to obtain the same lower
bound. To get a linear lower bound, we instead choose a random perfect matching, which turns
out to require quadratically more samples to test. Interestingly, we only need ferromagnetic edges
(i.e., positive perturbations), as the randomness in the choice of matching is sufficient to make the
problem harder. Our proof is significantly more complicated for this case, and it uses a careful combinatorial analysis involving graphs which are unions of two perfect matchings. The lower bound is
described in detail in Section 8.3.2.
√
Remark 3. Similar lower bound constructions to those of Theorems 18 and 19 also yield Ω( n/ε2 )
and Ω(n/ε2 ) for the corresponding testing problems when dSKL is replaced with dTV . In our constructions, we describe families of distributions
which are ε-far in dSKL . This is done by perturbing
p
certain parameters by a magnitude of Θ( ε/n). We can instead describe families of distributions
√
which are ε-far in dTV by performing perturbations of Θ(ε/ n), and the rest of the proofs follow
similarly.
43
8.2
Dependences on h, β
Finally, we show that dependences on the h and β parameters are, in general, necessary for independence and identity testing. Recall that h and β are upper bounds on the absolute values of the
node and edge parameters, respectively. Our constructions are fairly simple, involving just one or
two nodes, and the results are stated in Theorem 20.
Theorem 20. There is a linear lower bound on the parameters h and β for testing problems on
Ising models. More specifically,
• There exists a constant c > 0 such that, for all ε < 1 and β ≥ 0, any algorithm, given sample
access to an Ising model p, which distinguishes between the cases p ∈ In and dSKL (p, In ) ≥ ε
with probability at least 99/100 requires k ≥ cβ/ε samples.
• There exists constants c1 , c2 > 0 such that, for all ε < 1 and β ≥ c1 log(1/ε), any algorithm,
given a description of an Ising model q with no external field (i.e., h = 0) and has sample
access to an Ising model p, and which distinguishes between the cases p = q and dSKL (p, q) ≥ ε
with probability at least 99/100 requires k ≥ c2 β/ε samples.
• There exists constants c1 , c2 > 0 such that, for all ε < 1 and h ≥ c1 log(1/ε), any algorithm,
given a description of an Ising model q with no edge potentials(i.e., β = 0) and has sample
access to an Ising model p, and which distinguishes between the cases p = q and dSKL (p, q) ≥ ε
with probability at least 99/100 requires k ≥ c2 h/ε samples.
The construction and analysis appears in Section 8.3.3.
This lower bound shows that the dependence on β parameters by our algorithms cannot be
avoided in general, though it may be sidestepped in certain cases. Notably, we show that testing
independence of a forest-structured Ising model under no external field can be done using Õ nε
samples (Theorem 3).
8.3
8.3.1
Lower Bound Proofs
Proof of Theorem 18
This proof will follow via an application of Le Cam’s two-point method. More specifically, we will
consider two classes of distributions P and Q such that:
1. P consists of a single distribution p , Un ;
2. Q consists of a family of distributions such that for all distributions q ∈ Q, dSKL (p, q) ≥ ε;
3. There exists some constant c > 0 such that any algorithm which distinguishes p from a
√
uniformly random distribution q ∈ Q with probability ≥ 2/3 requires ≥ c n/ε samples.
√
The third point will be proven by showing that, with k < c n/ε samples, the following two processes
have miniscule total variation distance, and thus no algorithm can distinguish them:
• The process p⊗k , which draws k samples from p;
• The process q̄ ⊗k , which selects q from Q uniformly at random, and then draws k samples from
q.
44
We will let p⊗k
be the process p⊗k restricted to the ith coordinate of the random vectors sampled,
i
⊗k
and q̄i is defined similarly.
p
We proceed with a description of our construction. Let δ = 3ε/2n. As mentioned before, P
consists of the single distribution p , Un , the Ising model on n nodes with 0 potentials on every node
and edge. Let M be the set of all 2n vectors in the set {±δ}n . For each M = (M1 , . . . , Mn ) ∈ M,
we define a corresponding qM ∈ Q where the node potential Mi is placed on node i.
Proposition 1. For each q ∈ Q, dSKL (q, Un ) ≥ ε.
Proof. Recall that
dSKL (q, Un ) =
X
δ tanh(δ).
v∈V
Note that tanh(δ) ≥ 2δ/3 for all δ ≤ 1, which can be shown using a Taylor expansion. Therefore
dSKL (q, Un ) ≥ n · δ · 2δ/3 = 2nδ 2 /3 = ε.
The goal is to upper bound dTV (p⊗k , q̄ ⊗k ). We will use the following lemma from [AD15], which
follows from Pinsker’s and Jensen’s inequalities:
Lemma 16. For any two distributions p and q,
2d2TV (p, q)
q
≤ log Eq
.
p
Applying this lemma, the fact that Q is a family of product distributions, and that we can
picture q̄ ⊗k as the process which picks a q ∈ Q by selecting a parameter for each node in an iid
manner, we have that
"
#
⊗k
q̄
2d2TV (p⊗k , q̄ ⊗k ) ≤ n log Eq̄⊗k 1⊗k .
1
p1
We proceed to bound the right-hand side. To simplify notation, let p+ = eδ /(eδ + e−δ ) be the
probability that a node with parameter δ takes the value 1. Note that a node with parameter −δ
takes the value 1 with probability 1 − p+ . We will perform a sum over all realizations k1 for the
number of times that node 1 is observed to be 1.
"
Eq̄⊗k
1
q̄1⊗k
p⊗k
1
#
=
k
X
(q̄1⊗k (k1 ))2
p⊗k
1 (k1 )
k =0
1
2
k
k1 (1 − p )k1
(p+ )k1 (1 − p+ )k−k1 + 12 k−k
(p
)
+
+
1
=
k
k
k1 (1/2)
k1 =0
k
2k X k
=
(p+ )2k1 (1 − p+ )2(k−k1 ) + (p+ )2(k−k1 ) (1 − p+ )2k1 + 2(p+ (1 − p+ ))k
4
k1
k
X
1 k
2 k1
k1 =0
=
k
k
X
2k
k
2k X
k
(p+ (1 − p+ ))k
+2·
(p2+ )k1 ((1 − p+ )2 )k−k1
2
k1
4
k1
k1 =0
k1 =0
45
where the second equality uses the fact that q̄1⊗k chooses the Ising model with parameter on node 1
P
being δ and −δ each with probability 1/2. Using the identity kk1 =0 kk1 ak1 bk−k1 = (a + b)k gives
that
"
#
k
q̄1⊗k
4k
2k
Eq̄⊗k ⊗k = (p+ (1 − p+ ))k +
2p2+ + 1 − 2p+ .
1
2
2
p1
Substituting in the value for p+ and applying hyperbolic trigenometric identities, the above expression simplifies to
k
k
1
sech2 (δ) + 1 + tanh2 (δ)
2
k 4
≤ 1+
δ
2
2
k 9ε
= 1+
2 4n2
where the inequality follows by a Taylor expansion.
This gives us that
2
k 9ε
9k 2 ε2
2
⊗k ⊗k
2dTV (p , q̄ ) ≤ n log 1 +
≤
.
2 4n2
4n
√
If k < 0.9 · n/ε, then d2TV (p⊗k , q̄ ⊗k ) < 49/50 and thus no algorithm can distinguish between the
two with probability ≥ 99/100. This completes the proof of Theorem 18.
8.3.2
Proof of Theorem 19
This lower bound similarly applies Le Cam’s two-point method, as described in the previous section.
We proceed with a description of our construction. Assume that n is even. As before, P consists of
the single distribution p , Un , the Ising model on n nodes with 0 potentials on every node and edge.
Let M denote the set of all (n − 1)!! perfect matchings on
p the clique on n nodes. Each M ∈ M
defines a corresponding qM ∈ Q, where the potential δ = 3ε/n is placed on each edge present in
the graph.
The following proposition follows similarly to Proposition 1.
Proposition 2. For each q ∈ Q, dSKL (q, Un ) ≥ ε.
The goal is to upper bound dTV (p⊗k , q̄ ⊗k ). We again apply Lemma 16 to 2d2TV (p⊗k , q̄ ⊗k ) and
focus on the quantity inside the logarithm. Let X (i) ∈ {±1}n represent the realization of the ith
sample and Xu ∈ {±1}k represent the realization of the k samples on node u. Let H(., .) represent
the Hamming distance between two vectors, and for sets S1 and S2 , let S = S1 ] S2 be the very
commonly used multiset addition operation (i.e., combine all the elements from S1 and S2 , keeping
duplicates). Let M0 be the perfect matching with edges (2i − 1, 2i) for all i ∈ [n/2].
⊗k
X
q̄
(q̄ ⊗k (X))2
Eq̄⊗k ⊗k =
p
p⊗k (X)
X=(X (1) ,...,X (k) )
X
= 2nk
(q̄ ⊗k (X))2
X=(X (1) ,...,X (k) )
46
We can expand the inner probability as follows. Given a randomly selected perfect matching, we can
break the probability of a realization X into a product over the edges. By examining the PMF of
theIsing model,
agree,the probability is multiplied by a factor
if the two endpoints of a given edge
eδ
e−δ
of 2(eδ +e−δ ) , and if they disagree, a factor of 2(eδ +e−δ ) . Since (given a matching) the samples
are independent, we take the product of this over all k samples. We average this quantity using a
uniformly random choice of perfect matching. Writing these ideas mathematically, the expression
above is equal to
1(Xu(i) =Xv(i) )
1(Xu(i) 6=Xv(i) ) 2
k
−δ
δ
X
X
Y
Y
e
1
e
2nk
δ
−δ
δ
−δ )
(n
−
1)!!
2(e
+
e
)
2(e
+
e
(1)
(k)
X=(X
,...,X
M ∈M (u,v)∈M i=1
)
X
= 2nk
X=(X (1) ,...,X (k) )
=
eδ
=
=
+
M ∈M (u,v)∈M
X
e−δ
X=(X (1) ,...,X (k) )
eδ
eδ + e−δ
nk
eδ
eδ + e−δ
nk
Y
1
δ
2(e + e−δ )
k
2
eδ(k−H(Xu ,Xv )) e−δH(Xu ,Xv )
2
nk
eδ
X
1
(n − 1)!!
1
(n − 1)!!
X
Y
exp(−2δH(Xu , Xv ))
M ∈M (u,v)∈M
2
1
(n − 1)!!2
1
(n − 1)!!2
X
X
Y
exp(−2δH(Xu , Xv ))
M ∈M (u,v)∈M
X=(X (1) ,...,X (k) )
X
X
Y
exp(−2δH(Xu , Xv ))
X=(X (1) ,...,X (k) ) M1 ,M2 ∈M (u,v)∈M1 ]M2
At this point, we note that if we fix the matching M1 , summing over all perfect matchings M2
gives the same value irrespective of the value of M1 . Therefore, we multiply by a factor of (n − 1)!!
and fix the choice of M1 to be M0 .
eδ
eδ + e−δ
=
nk
X
1
(n − 1)!!
X
Y
exp(−2δH(Xu , Xv ))
M ∈M X=(X (1) ,...,X (k) ) (u,v)∈M0 ]M
eδ
eδ + e−δ
nk
X
X
1
(n − 1)!!
(1)
M ∈M
X
k
Y
exp −2δH Xu(1) , Xv(1)
(u,v)∈M0 ]M
We observe that multiset union of two perfect matchings will form a collection of even length
cycles (if they contain the same edge, this forms a 2-cycle), and this can be rewritten as follows.
k
eδ
eδ + e−δ
nk
X X
1
(n − 1)!!
(1)
M ∈M
X
Y
Y
cyclesC (u,v)∈C
∈M0 ]M
exp −2δH Xu(1) , Xv(1)
k
=
eδ
eδ + e−δ
nk
X Y
1
(n − 1)!!
M ∈M
X
Y
cycles C X (1) (u,v)∈C
∈M0 ]M C
47
exp −2δH Xu(1) , Xv(1)
(46)
We now simplify this using a counting argument over the possible realizations of X (1) when
restricted to edges in cycle C. Start by noting that
n/2
(1)
(1)
X Y
X
|C| − 1
|C| − 1
2δ −2H Xu ,Xv
(e )
=2
+
(e2δ )−2i .
2i
−
1
2i
(1)
i=0
XC (u,v)∈C
This follows by counting the number of possible ways to achieve a particular Hamming distance over
the cycle. The |C| − 1 (rather than |C|) and the grouping of consecutive binomial coefficients arises
as we lose one “degree of freedom” due to examining a cycle, which fixes the Hamming distance to
be even. Now, we apply Pascal’s rule and can see
n/2
n/2
X
X
|C|
|C| − 1
|C| − 1
2δ −2i
(e2δ )−2i .
+
(e )
=2
2
2i
2i − 1
2i
i=0
i=0
This is twice the sum over the even terms in the binomial expansion of (1 + e−2δ )|C| . The odd terms
may be eliminated by adding (1 − e−2δ )|C| , and thus (46) is equal to the following.
k
eδ
eδ + e−δ
nk
X Y
1
−2δ |C|
−2δ |C|
(1
+
e
)
+
(1
−
e
)
(n − 1)!!
M ∈M
cycles C
∈M0 ]M
=
eδ
eδ + e−δ
nk
X Y
1
(n − 1)!!
M ∈M
Y
= E
cycles C
∈M0 ]M
cycles C
∈M0 ]M
k
eδ + e−δ
eδ
|C|
k
!
δ
|C|
e − e−δ
1+
eδ + e−δ
1 + tanh|C| (δ)
(47)
where the expectation is from choosing a uniformly random perfect matching M ∈ M. At this
point, it remains only to bound Equation (47). Noting that for all x > 0 and t ≥ 1,
1 + tanht (δ) ≤ 1 + δ t ≤ exp δ t ,
we can bound (47) as
Y
E
cycles C
∈M0 ]M
k
k
Y
≤ E
1 + tanh|C| (δ)
cycles C
∈M0 ]M
exp δ |C|
.
For our purposes, it turns out that the 2-cycles will be the dominating factor, and we use the
following crude upper bound. Let ζ be a random variable representing the number of 2-cycles in
M0 ] M , i.e., the number of edges shared by both perfect matchings.
k
k
Y
Y
|C|
|C|
2
4
2
= E
E
exp
δ
exp
δ
exp
δ
ζk
≤
exp
δ
·
n/4
·
k
E
exp
δ
ζk
,
cycles C
cycles C
∈M0 ]M
∈M0 ]M
|C|≥4
48
where in the last inequality, we used the facts that δ |C| is maximized for |C| ≥ 4 when |C| = 4, and
that there are at most n/4 cycles of length at least 4.
We examine the distribution of ζ. Note that
E[ζ] =
n
1
n
·
=
.
2 n−1
2(n − 1)
More generally, for any positive integer z ≤ n/2,
E[ζ − (z − 1)|ζ ≥ z − 1] =
n − 2z + 2
1
n − 2z + 2
·
=
.
2
n − 2z + 1
2(n − 2z + 1)
By Markov’s inequality,
Pr[ζ ≥ z|ζ ≥ z − 1] = Pr[ζ − (z − 1) ≥ 1|ζ ≥ z − 1] ≤
Therefore,
Pr[ζ ≥ z] =
z
Y
Pr[ζ ≥ i|ζ ≥ i − 1] ≤
i=1
n − 2z + 2
.
2(n − 2z + 1)
z
Y
n − 2i + 2
.
2(n − 2i + 1)
i=1
In particular, note that for all z < n/2,
Pr[ζ ≥ z] ≤ (2/3)z .
We return to considering the expectation above:
n/2
X
Pr[ζ = z] exp δ 2 zk
E exp δ 2 ζk =
z=0
≤
n/2
X
Pr[ζ ≥ z] exp δ 2 zk
z=0
n/2
3X
≤
(2/3)z exp δ 2 zk
2
z=0
n/2
3X
exp (δ 2 k − log(3/2))z
=
2
z=0
3
1
≤ ·
,
2
2 1 − exp (δ k − log(3/2))
where the last inequality requires that exp δ 2 k − log(3/2) < 1. This is true as long as k <
· nε .
log(3/2)/δ 2 = log(3/2)
3
Combining Lemma 16 with the above derivation, we have that
3
2
⊗k ⊗k
4
2dTV (p , q̄ ) ≤ log exp(δ nk/4) ·
2(1 − exp (δ 2 k − log(3/2)))
3
= δ 4 nk/4 + log
2(1 − exp (δ 2 k − log(3/2)))
2
9ε
3
=
k + log
.
4n
2(1 − exp (3kε/n − log(3/2)))
1
If k < 25
· nε , then dTV (p⊗k , q̄ ⊗k ) < 49/50 and thus no algorithm can distinguish between the two
cases with probability ≥ 99/100. This completes the proof of Theorem 19.
49
8.3.3
Proof of Theorem 20
We provide constructions for our lower bounds of Theorem 20 which show that a dependence on β
is necessary in certain cases.
Lemma 17. There exists a constant c > 0 such that, for all ε < 1 and β ≥ 0, any algorithm, given
sample access to an Ising model p, which distinguishes between the cases p ∈ In and dSKL (p, In ) ≥ ε
with probability at least 99/100 requires k ≥ cβ/ε samples.
Proof. Consider the following two models, which share some parameter τ > 0:
1. An Ising model p on two nodes u and v, where θup = θvp = τ and θuv = 0.
2. An Ising model q on two nodes u and v, where θuq = θvq = τ and θuv = β.
(2τ +β)+exp (−2τ +β)−exp(−β)
q q
2
We note that E[Xup Xvp ] = exp
exp (2τ +β)+exp (−2τ +β)+exp(−β) and E[Xu Xv ] = tanh (τ ). By (3), these two
p p
q q
models have dSKL (p, q) = β (E[Xu Xv ] − E[Xu Xv ]). For any for any fixed β sufficiently large and
ε > 0 sufficiently small, τ can be chosen to make E[Xup Xvp ]−E[Xuq Xvq ] = βε . This is because at τ = 0,
this is equal to tanh(β) and for τ → ∞, this approaches 0, so by continuity, there must be a τ which
causes the expression to equal this value. Therefore, the SKL distance between these two models
is ε. On the other hand, it is not hard to see that dTV (p, q) = Θ (E[Xup Xvp ] − E[Xuq Xvq ]) = Θ(ε/β),
and therefore, to distinguish these models, we require Ω(β/ε) samples.
Lemma 18. There exists constants c1 , c2 > 0 such that, for all ε < 1 and β ≥ c1 log(1/ε), any
algorithm, given a description of an Ising model q with no external field (i.e., h = 0) and has sample
access to an Ising model p, and which distinguishes between the cases p = q and dSKL (p, q) ≥ ε with
probability at least 99/100 requires k ≥ c2 β/ε samples.
Proof. This construction is very similar to that of Lemma 17. Consider the following two models,
which share some parameter τ > 0:
p
= β.
1. An Ising model p on two nodes u and v, where θuv
p
2. An Ising model q on two nodes u and v, where θuv
= β − τ.
We note that E[Xup Xvp ] = tanh(β) and E[Xuq Xvq ] = tanh(β − τ ). By (3), these two models have
dSKL (p, q) = τ (E[Xup Xvp ] − E[Xuq Xvq ]). Observe that at τ = β, dSKL (p, q) = β tanh(β), and at
τ = β/2, dSKL (p, q) = β2 (tanh(β) − tanh(β/2)) = β2 (tanh(β/2) sech(β)) ≤ β exp(−β) ≤ ε, where
the last inequality is based on our condition that β is sufficiently large. By continuity, there
exists some τ ∈ [β/2, β] such that dSKL (p, q) = ε. On the other hand, it is not hard to see that
dTV (p, q) = Θ (E[Xup Xvp ] − E[Xuq Xvq ]) = Θ(ε/β), and therefore, to distinguish these models, we
require Ω(β/ε) samples.
The lower bound construction and analysis for the h lower bound follow almost identically, with
the model q consisting of a single node with parameter h.
Lemma 19. There exists constants c1 , c2 > 0 such that, for all ε < 1 and h ≥ c1 log(1/ε), any
algorithm, given a description of an Ising model q with no edge potentials(i.e., β = 0) and has sample
access to an Ising model p, and which distinguishes between the cases p = q and dSKL (p, q) ≥ ε with
probability at least 99/100 requires k ≥ c2 h/ε samples.
Together, Lemmas 17, 18, and 19 imply Theorem 20.
50
Acknowledgements
The authors would like to thank Yuval Peres for directing them towards the reference [LPW09] and
the tools used to prove the variance bounds in this paper, and Pedro Felzenszwalb for discussing
applications of Ising models in computer vision.
References
[AD15]
Jayadev Acharya and Constantinos Daskalakis. Testing Poisson binomial distributions.
In Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms,
SODA ’15, pages 1829–1840, Philadelphia, PA, USA, 2015. SIAM.
[ADK15]
Jayadev Acharya, Constantinos Daskalakis, and Gautam Kamath. Optimal testing for
properties of distributions. In Advances in Neural Information Processing Systems 28,
NIPS ’15, pages 3577–3598. Curran Associates, Inc., 2015.
[Agr12]
Alan Agresti. Categorical Data Analysis. Wiley, 2012.
[AJ06]
José A. Adell and Pedro Jodrá. Exact Kolmogorov and total variation distances between some familiar discrete distributions. Journal of Inequalities and Applications,
2006(1):1–8, 2006.
[AKN06]
Pieter Abbeel, Daphne Koller, and Andrew Y. Ng. Learning factor graphs in polynomial time and sample complexity. Journal of Machine Learning Research, 7(Aug):1743–
1788, 2006.
[BFF+ 01]
Tugkan Batu, Eldar Fischer, Lance Fortnow, Ravi Kumar, Ronitt Rubinfeld, and
Patrick White. Testing random variables for independence and identity. In Proceedings
of the 42nd Annual IEEE Symposium on Foundations of Computer Science, FOCS ’01,
pages 442–451, Washington, DC, USA, 2001. IEEE Computer Society.
[BGS14]
Guy Bresler, David Gamarnik, and Devavrat Shah. Structure learning of antiferromagnetic Ising models. In Advances in Neural Information Processing Systems 27, NIPS
’14, pages 2852–2860. Curran Associates, Inc., 2014.
[Bha16]
Bhaswar B. Bhattacharya. Power of graph-based two-sample tests. arXiv preprint
arXiv:1508.07530, 2016.
[BK16]
Guy Bresler and Mina Karzand. Learning a tree-structured Ising model in order to
make predictions. arXiv preprint arXiv:1604.06749, 2016.
[BM16]
Bhaswar B. Bhattacharya and Sumit Mukherjee. Inference in Ising models. Bernoulli,
2016.
[Bre15]
Guy Bresler. Efficiently learning ising models on arbitrary graphs. In Proceedings
of the 47th Annual ACM Symposium on the Theory of Computing, STOC ’15, pages
771–782, New York, NY, USA, 2015. ACM.
[CDGR16]
Clément L. Canonne, Ilias Diakonikolas, Themis Gouleakis, and Ronitt Rubinfeld.
Testing shape restrictions of discrete distributions. In Proceedings of the 33rd Symposium on Theoretical Aspects of Computer Science, STACS ’16, pages 25:1–25:14,
Dagstuhl, Germany, 2016. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.
51
[CDKS17]
Clément L. Canonne, Ilias Diakonikolas, Daniel M. Kane, and Alistair Stewart. Testing
Bayesian networks. In Proceedings of the 30th Annual Conference on Learning Theory,
COLT ’17, pages 370–448, 2017.
[CF07]
Nicholas A. Christakis and James H. Fowler. The spread of obesity in a large social
network over 32 years. New England Journal of Medicine, 357(4):370–379, 2007.
[Cha05]
Sourav Chatterjee. Concentration Inequalities with Exchangeable Pairs. PhD thesis,
Stanford University, June 2005.
[CL68]
C.K. Chow and C.N. Liu. Approximating discrete probability distributions with dependence trees. IEEE Transactions on Information Theory, 14(3):462–467, 1968.
[CT06]
Imre Csiszár and Zsolt Talata. Consistent estimation of the basic neighborhood of
Markov random fields. The Annals of Statistics, 34(1):123–145, 2006.
[DDK17]
Constantinos Daskalakis, Nishanth Dikkala, and Gautam Kamath. Concentration of
multilinear functions of the Ising model with applications to network data. In Advances
in Neural Information Processing Systems 30, NIPS ’17. Curran Associates, Inc., 2017.
[DDS+ 13]
Constantinos Daskalakis, Ilias Diakonikolas, Rocco A. Servedio, Gregory Valiant, and
Paul Valiant. Testing k-modal distributions: Optimal algorithms via reductions. In
Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA
’13, pages 1833–1852, Philadelphia, PA, USA, 2013. SIAM.
[DGJ08]
Martin Dyer, Leslie Ann Goldberg, and Mark Jerrum. Dobrushin conditions and
systematic scan. Combinatorics, Probability and Computing, 17(6):761–779, 2008.
[DK16]
Ilias Diakonikolas and Daniel M. Kane. A new approach for testing properties of
discrete distributions. In Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’16, pages 685–694, Washington, DC, USA, 2016.
IEEE Computer Society.
[DKN15a]
Ilias Diakonikolas, Daniel M. Kane, and Vladimir Nikishkin. Optimal algorithms and
lower bounds for testing closeness of structured distributions. In Proceedings of the
56th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’15, pages
1183–1202, Washington, DC, USA, 2015. IEEE Computer Society.
[DKN15b]
Ilias Diakonikolas, Daniel M. Kane, and Vladimir Nikishkin. Testing identity of structured distributions. In Proceedings of the 26th Annual ACM-SIAM Symposium on
Discrete Algorithms, SODA ’15, pages 1841–1854, Philadelphia, PA, USA, 2015. SIAM.
[DMR11]
Constantinos Daskalakis, Elchanan Mossel, and Sébastien Roch. Evolutionary trees
and the Ising model on the Bethe lattice: A proof of Steel’s conjecture. Probability
Theory and Related Fields, 149(1):149–189, 2011.
[Dob56]
Roland L. Dobrushin. Central limit theorem for nonstationary Markov chains. I. Theory of Probability & Its Applications, 1(1):65–80, 1956.
[DP17]
Constantinos Daskalakis and Qinxuan Pan. Square Hellinger subadditivity for Bayesian
networks and its applications to identity testing. In Proceedings of the 30th Annual
Conference on Learning Theory, COLT ’17, pages 697–703, 2017.
52
[Ell93]
Glenn Ellison.
Learning, local interaction, and coordination.
61(5):1047–1071, 1993.
[Fel04]
Joseph Felsenstein. Inferring Phylogenies. Sinauer Associates Sunderland, 2004.
[Fis35]
Ronald A. Fisher. The Design of Experiments. Macmillan, 1935.
[FLNP00]
Nir Friedman, Michal Linial, Iftach Nachman, and Dana Pe’er. Using Bayesian networks to analyze expression data. Journal of Computational Biology, 7(3-4):601–620,
2000.
[FOS08]
Jon Feldman, Ryan O’Donnell, and Rocco A. Servedio. Learning mixtures of product
distributions over discrete domains. SIAM Journal on Computing, 37(5):1536–1564,
2008.
[Geo11]
Hans-Otto Georgii. Gibbs Measures and Phase Transitions. Walter de Gruyter, 2011.
[GG86]
Stuart Geman and Christine Graffigne. Markov random field image models and their
applications to computer vision. In Proceedings of the International Congress of Mathematicians, pages 1496–1517. American Mathematical Society, 1986.
[GLP17]
Reza Gheissari, Eyal Lubetzky, and Yuval Peres. Concentration inequalities for polynomials of contracting Ising models. arXiv preprint arXiv:1706.00121, 2017.
[Hay06]
Thomas P. Hayes. A simple condition implying rapid mixing of single-site dynamics
on spin systems. In Proceedings of the 47th Annual IEEE Symposium on Foundations
of Computer Science, FOCS ’06, pages 39–46, Washington, DC, USA, 2006. IEEE
Computer Society.
[HKM17]
Linus Hamilton, Frederic Koehler, and Ankur Moitra. Information theoretic properties
of Markov random fields, and their algorithmic applications. In Advances in Neural
Information Processing Systems 30, NIPS ’17. Curran Associates, Inc., 2017.
[Isi25]
Ernst Ising. Beitrag zur theorie des ferromagnetismus. Zeitschrift für Physik A Hadrons
and Nuclei, 31(1):253–258, 1925.
[JJR11]
Ali Jalali, Christopher C. Johnson, and Pradeep K. Ravikumar. On learning discrete
graphical models using greedy methods. In Advances in Neural Information Processing
Systems 24, NIPS ’11, pages 1935–1943. Curran Associates, Inc., 2011.
[Jor10]
Michael Jordan. Lecture notes for Bayesian modeling and inference, 2010.
[JS93]
Mark Jerrum and Alistair Sinclair. Polynomial-time approximation algorithms for the
Ising model. SIAM Journal on Computing, 22(5):1087–1116, 1993.
[KM17]
Adam Klivans and Raghu Meka. Learning graphical models using multiplicative
weights. In Proceedings of the 58th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’17, Washington, DC, USA, 2017. IEEE Computer Society.
[KNS07]
Jeongwoo Ko, Eric Nyberg, and Luo Si. A probabilistic graphical model for joint
answer ranking in question answering. In Proceedings of the 30th International ACM
SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’07,
pages 343–350, New York, NY, USA, 2007. ACM.
53
Econometrica,
[LAFH01]
Charles Lagor, Dominik Aronsky, Marcelo Fiszman, and Peter J. Haug. Automatic
identification of patients eligible for a pneumonia guideline: comparing the diagnostic
accuracy of two decision support models. Studies in Health Technology and Informatics,
84(1):493–497, 2001.
[LC73]
Lucien Le Cam. Convergence of estimates under dimensionality restrictions. The
Annals of Statistics, 1(1):38–53, 1973.
[LPW09]
David A. Levin, Yuval Peres, and Elizabeth L. Wilmer. Markov Chains and Mixing
Times. American Mathematical Society, 2009.
[LRR13]
Reut Levi, Dana Ron, and Ronitt Rubinfeld. Testing properties of collections of distributions. Theory of Computing, 9(8):295–347, 2013.
[MdCCU16] Abraham Martín del Campo, Sarah Cepeda, and Caroline Uhler. Exact goodness-of-fit
testing for the Ising model. Scandinavian Journal of Statistics, 2016.
[MS10]
Andrea Montanari and Amin Saberi. The spread of innovations in social networks.
Proceedings of the National Academy of Sciences, 107(47):20196–20201, 2010.
[Pan08]
Liam Paninski. A coincidence-based test for uniformity given very sparsely sampled
discrete data. IEEE Transactions on Information Theory, 54(10):4750–4755, 2008.
[Pea00]
Karl Pearson. On the criterion that a given system of deviations from the probable in
the case of a correlated system of variables is such that it can be reasonably supposed to
have arisen from random sampling. Philosophical Magazine Series 5, 50(302):157–175,
1900.
[RAS15]
Firas Rassoul-Agha and Timo Seppäläinen. A Course on Large Deviations with an
Introduction to Gibbs Measures. American Mathematical Society, 2015.
[RS81]
Jon N.K. Rao and Alastair J. Scott. The analysis of categorical data from complex
sample surveys: Chi-squared tests for goodness of fit and independence in two-way
tables. Journal of the Americal Statistical Association, 76(374):221–230, 1981.
[RWL10]
Pradeep Ravikumar, Martin J. Wainwright, and John D. Lafferty. High-dimensional
ising model selection using `1 -regularized logistic regression. The Annals of Statistics,
38(3):1287–1319, 2010.
[STW10]
Sujay Sanghavi, Vincent Tan, and Alan Willsky. Learning graphical models for hypothesis testing and classification. IEEE Transactions on Signal Processing, 58(11):5481–
5495, 2010.
[SW12]
Narayana P. Santhanam and Martin J. Wainwright. Information-theoretic limits of selecting binary graphical models in high dimensions. IEEE Transactions on Information
Theory, 58(7):4117–4134, 2012.
[TAW10]
Vincent Y.F. Tan, Animashree Anandkumar, and Alan S. Willsky. Error exponents
for composite hypothesis testing of Markov forest distributions. In Proceedings of the
2010 IEEE International Symposium on Information Theory, ISIT ’10, pages 1613–
1617, Washington, DC, USA, 2010. IEEE Computer Society.
54
[VMLC16]
Marc Vuffray, Sidhant Misra, Andrey Lokhov, and Michael Chertkov. Interaction
screening: Efficient and sample-optimal learning of Ising models. In Advances in Neural
Information Processing Systems 29, NIPS ’16, pages 2595–2603. Curran Associates,
Inc., 2016.
[VV17]
Gregory Valiant and Paul Valiant. An automatic inequality prover and instance optimal identity testing. SIAM Journal on Computing, 46(1):429–455, 2017.
A
Weakly Learning Rademacher Random Variables
In this section, we examine the concept of “weakly learning” Rademacher random variables. This
problem we study is classical, but our regime of study and goals are slightly different. Suppose we have k samples from a random variable, promised to either be Rademacher(1/2 + λ)
or Rademacher(1/2 − λ), for some 0 < λ ≤ 1/2. How many samples do we need to tell which case
we are in? If we wish to be correct with probability (say) ≥ 2/3, it is folklore that k = Θ(1/λ2 ) samples are both necessary and sufficient. In our weak learning setting, we focus on the regime where
we are sample limited (say, when λ is very small), and we are unable to gain a constant benefit
over randomly guessing. More precisely, we have a budget of k samples from some Rademacher(p)
random variable, and we want to guess whether p > 1/2 or p < 1/2. The “margin” λ = |p−1/2| may
not be precisely known, but we still wish to obtain the maximum possible advantage over randomly
guessing, which gives us probability of success equal √
to 1/2. We show that with any k ≤ 1/4λ2
samples, we can obtain success probability 1/2 + Ω(λ k). This smoothly interpolates within the
“low sample” regime, up to the point where k = Θ(1/λ2 ) and folklore results also guarantee a
constant probability of success. We note that in this low sample regime, standard concentration
bounds like Chebyshev and Chernoff give trivial guarantees, and our techniques require a more
careful examination of the Binomial PMF.
We go on to examine the same problem under alternate centerings – where we are trying to
determine whether p > µ or p < µ, generalizing the previous case where µ = 1/2. We provide a
simple “recentering” based reduction to the previous case, showing that the same upper bound holds
for all values of µ. We note that our reduction holds even when the centering µ is not explicitly
known, and we only have limited sample access to Rademacher(µ).
We start by proving the following lemma, where we wish to determine the direction of bias with
respect to a zero-mean Rademacher random variable.
Lemma 20. Let X1 , . . . , Xk be iid random variables, distributed as Rademacher(p) for any p ∈
[0, 1]. There exists an algorithm which takes X1 , . . . , Xk as input and outputs a value b ∈ {±1},
with the following guarantees: there exists constants c1 , c2 > 0 such that for any p 6= 12 ,
(
√
1
+
c
|λ|
k if k ≤ 4λ1 2
1
Pr (b = sign (λ)) ≥ 21
otherwise,
2 + c2
where λ = p − 12 . If p = 21 , then b ∼ Rademacher 21 .
P
Proof. The algorithm is as follows: let S = ki=1 Xi . If S 6= 0, then output b = sign(S), otherwise
output b ∼ Rademacher 12 .
The p = 1/2 case is trivial, as the sum S is symmetric about 0. We consider the case where
λ > 0 (the negative case follows by symmetry) and when k is even (odd k can be handled similarly). As the case where k > 4λ1 2 is well known (see Lemma 3), we focus on the former case,
55
where λ ≤
1
√
.
2 k
By rescaling and shifting the variables, this is equivalent to lower bounding
Pr Binomial k, + λ ≥ k2 . By a symmetry argument, this is equal to
1
1
1
+ dTV Binomial k, − λ , Binomial k, + λ
.
2
2
2
√
It remains to show this total variation distance is Ω(λ k).
1
1
dTV Binomial k, − λ , Binomial k, + λ
2
2
1
1
, Binomial k, + λ
≥
dTV Binomial k,
2
2
Z 1/2+λ
Pr (Binomial (k − 1, u) = l − 1) du
(48)
≥
k
min
1
2
`∈{dk/2e,...,dk/2+kλe} 1/2
≥
=
≥
=
≥
=
λk · Pr (Binomial (k − 1, 1/2 + λ) = k/2)
k/2
k/2−1
k−1
1
1
λk ·
+λ
−λ
k/2
2
2
r
1
1 k/2
1 k/2
Ω(λk) ·
1+ √
1− √
2k
k
k
√
1 k/2
Ω(λ k) · 1 −
k
√
1 1/2
Ω(λ k) · exp (−1/2) 1 −
k
√
Ω(λ k),
(49)
(50)
as desired.
(48) applies Proposition 2.3 of [AJ06]. (49) is by an application of Stirling’s approximation and
k
c
since λ ≤ 2√1 k . (50) is by the inequality 1 − kc ≥ 1 − kc exp(−c).
We now develop a corollary allowing us to instead consider comparisons with respect to different
centerings.
Corollary 2. Let X1 , . . . , Xk be iid random variables, distributed as Rademacher(p) for any p ∈
[0, 1]. There exists an algorithm which takes X1 , . . . , Xk and q ∈ [0, 1] as input and outputs a value
b ∈ {±1}, with the following guarantees: there exists constants c1 , c2 > 0 such that for any p 6= q,
(
√
1
+ c1 |λ| k if k ≤ 4λ1 2
2
Pr (b = sign (λ)) ≥ 1
otherwise,
2 + c2
1
where λ = p−q
2 . If p = q, then b ∼ Rademacher 2 .
This algorithm works even if only given k iid samples Y1 , . . . , Yk ∼ Rademacher(q), rather than
the value of q.
Proof. Let X ∼ Rademacher(p) and Y ∼ Rademacher(q). Consider the random variable Z defined
as follows. First, sample X and Y . If X 6= Y , output 21 (X − Y ). Otherwise, output
a random
variable sampled as Rademacher 12 . One can see that Z ∼ Rademacher 12 + p−q
.
2
56
in this method using
Our algorithm can generate k iid samples Zi ∼ Rademacher 21 + p−q
2
Xi ’s and Yi ’s, where Yi ’s are either provided as input to the algorithm or generated according to
Rademacher(q). At this point, we provide the Zi ’s as input to the algorithm of Lemma 20. By
examining the guarantees of Lemma 20, this implies the desired result.
B
An Attempt towards Testing by Learning in KL-divergence
One approach to testing problems is by learning the distribution which we wish to test. If the
distance of interest is the total variation distance, then a common approach to learning is a coverbased method. One first creates a set of hypothesis distributions H which O(ε)-covers the space.
Then by drawing k = Õ(log |H|/ε2 ) samples from p, we can output a distribution from H with the
guarantee that it is at most O(ε)-far from p. The algorithm works by computing a score based on
the samples for each of the distributions in the hypothesis class and then choosing the one with the
maximum score.
However, it is not clear if this approach would work for testing in KL-divergence (an easier problem than testing in SKL-divergence) because KL-divergence does not satisfy the triangle inequality.
In particular, if p and q are far, and we learn a distribution p̂ which is close to p, we no longer
have the guarantee that p̂ and q are still far. Even if this issue were somehow resolved, the best
known sample complexity for learning follows from the maximum likelihood algorithm. We state
the guarantees provided by Theorem 17 of [FOS08].
Theorem 21 (Theorem 17 from [FOS08]). Let b, a, ε > 0 such that a < b. Let Q be a set of
hypothesis distributions for some distribution p over the space X such that at least one q ∗ ∈ Q is
such that dKL (p||q ∗ ) ≤ ε. Suppose also that a ≤ q(x) ≤ b for all q ∈ Q and for all x such that
p(x) > 0. Then running the maximum likelihood algorithm on Q using a set S of i.i.d. samples
from p, where |S| = k, outputs a q M L ∈ Q such that dKL (p||q M L ) ≤ 4ε with probability 1 − δ where
!
−2kε2
.
δ ≤ (|Q| + 1) exp
log2 ab
To succeed with probability at least 2/3, we need that
log (3(|Q| + 1)) log2
k≥
2ε2
b
a
For the Ising model, a KL-cover Q would consist of creating a poly(n/ε) mesh for each parameter.
2
Since there are O(n2 ) parameters, the cover will have a size of poly(n/ε)n . Letting β and h denote
the maximum edge and node parameter (respectively), then the ratio b/a in the above theorem is
such that
b
≥ exp O(n2 β + nh) .
a
Therefore, the number of samples required by this approach would be
!
˙ 2
n2 log nε (n
β + nh)2
k=O
ε2
6 2
n β + n4 h2
= Õ
ε2
57
which is more expensive than our baseline, the localization algorithm of Theorem 2. Additionally,
this algorithm is computationally inefficient, as it involves iterating over all hypotheses in the
exponentially large set Q. To summarize, there are a number of issues preventing a learning-based
approach from giving an efficient tester.
58
| 10math.ST
|
arXiv:1410.0602v1 [quant-ph] 2 Oct 2014
A probabilistic evolutionary optimization approach to
compute quasiparticle braids
Roberto Santana
Ross B. McDonald
Helmut G. Katzgraber
Intelligent Systems Group
Dept. of Computer Science
and Artificial Intelligence
University of the Basque
Country (UPV/EHU)
Dept. of Physics and
Astronomy
Texas A&M University, College
Station, TX 77843-4242, USA
Dept. of Physics and
Astronomy
Texas A&M University, College
Station, TX 77843-4242, USA
Santa Fe Institute, 1399 Hyde
Park Road, Santa Fe, NM
87501, USA
[email protected]
[email protected]
ABSTRACT
Topological quantum computing is an alternative framework
for avoiding the quantum decoherence problem in quantum
computation. The problem of executing a gate in this framework can be posed as the problem of braiding quasiparticles.
Because these are not Abelian, the problem can be reduced
to finding an optimal product of braid generators where the
optimality is defined in terms of the gate approximation and
the braid’s length. In this paper we propose the use of different variants of estimation of distribution algorithms to
deal with the problem. Furthermore, we investigate how the
regularities of the braid optimization problem can be translated into statistical regularities by means of the Boltzmann
distribution. We show that our best algorithm is able to
produce many solutions that approximates the target gate
with an accuracy in the order of 10−6 , and have lengths up
to 9 times shorter than those expected from braids of the
same accuracy obtained with other methods.
Keywords
topological computing, quasiparticle braids, estimation of
distribution algorithms, probabilistic graphical models, evolutionary algorithms
1.
INTRODUCTION
The idea of using the theory of quantum mechanics to obtain computers potentially exponentially faster for certain
applications, such as the factorization of prime numbers,
arouses considerable interest and research efforts from the
scientific community nowadays. In quantum computation,
information is represented and manipulated using quantum
properties. An obstacle for the construction of large quantum computers is the problem of quantum decoherence, that
can be viewed as the loss of information of the quantum sys-
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 2014 ACM .
tem due to the interaction with the environment. It terms
of the computation goal, quantum decoherence can be also
understood as unwanted noise introduced in quantum computation [25]. One possible solution to this problem is the
design of quantum systems immune to quantum decoherence
on a hardware level.
Topological quantum computing (TQC) [3, 25] investigates quantum computing systems that, given the properties of quasiparticles they use, are not affected by quantum
decoherence. The key idea of these systems is that quantum
information can be stored in global properties of the system
and thus affected only by global operations but not by local
perturbations such as noise. In TQC, quantum gates are
carried out by adiabatically braiding quasiparticles around
each other. This braiding is used to perform the unitary
transformations of a quantum computation.
One of the essential questions to design a TQC is to find
a product of braid generators (matrices) that approximates
a quantum gate with the smallest possible error and, if possible, as short as possible to prevent loss [12]. Some approaches that treat this question as an optimization problem
have been proposed. Exhaustive search [3] has been applied
to search for braids of manageable size (up to 46 exchanges).
More recently, McDonald and Katzgraber [12] have proposed
the use of genetic algorithms to find optimal braids. They
also introduce a function that takes into account the goals of
maximizing the accuracy and minimizing the length. In this
paper, we build on their results to propose an analysis of the
braid optimization problem using probabilistic modeling of
the space of braid solutions. For braid problems of small
size, we show that the regularities that exist in the search
space can be captured by the probabilistic models. We then
extend these results to propose the application of evolutionary algorithms (EAs) able to capture statistical regularities
of the best solutions.
Estimation of distribution algorithms (EDAs) [11, 15, 10]
are EAs that apply learning and sampling of distributions
instead of classical crossover and mutation operators. Modeling the dependencies between the variables of the problem
can serve to efficiently orient the search to more promising
areas of the search space by explicitly capturing and exploiting potential relationships between the problem variables. In
addition, the information contained in the models can reveal
previously unknown information about the problem.
The paper is organized as follows: The next section briefly
describes braids and Fibonacci anyons [3]. The problem formulation, including the problem representation and fitness
functions used are presented in Section 3. The framework
for probabilistic analysis of braids is introduced in Section 4.
This section also includes a number of experiments that help
to illustrate the rationale of our approach. Section 5 presents
the different variants of EDAs proposed for the braids problem. Work related to our approach is discussed in Section 6.
Section 7 describes the experimental framework to evaluate our proposal and presents the numerical results of our
experiments. The main contributions of the paper are summarized in Section 8 where some lines for future research are
also discussed.
2.
BRAIDS AND ANYONS
Qubits play in quantum computation a role similar to that
played by bits in digital computers. A braid operation can be
represented by a matrix that acts on the qubit space. These
matrices are referred to as generators, and the quantum gate
that a braid represents is the product of the generators that
encode the individual braid operations.
Let σ1 and σ2 represent two possible generators. σ1−1 and
−1
σ2 respectively represent their inverses. Given a braid B,
len() is a function that returns the braid’s length l (e.g.
B = σ1 σ1 σ2 σ1−1 , l = len(B) = 4).
Since the product of a matrix by its inverse reduces to the
identity matrix, some braids can be simplified reducing their
length. Therefore, we also define function elen(), that has a
braid as its argument and returns the braid’s effective length
which is the length of braid after all possible simplifications
have been conducted.
σ1 σ1 σ1 σ1 σ1−1 =σ1 σ1 σ1
σ2−1 σ1 σ1 σ1−1 σ1−1 σ2 σ1−1
=σ1−1
(1)
(2)
In the braids shown in examples (1) and (2), the effective
length values are 3 and 1, respectively.
Let T represent the target matrix (gate to be emulated),
the braid error is calculated with the following metric [12]:
ǫ = |B − T |
where the matrix norm used is
sX
2
|M | =
Mij
.
(3)
for the non computational state, and therefore it can be
ignored. Overall, phases in the problem can also be ignored. Therefore the transition matrices can be projected
iπ
onto SU(2) by a multiplication with e 10 , yielding for the
generators
σ1 =
e
−i7π
10
−e
0
−iπ
σ2 =
√
0
−τ e 10
√
−i τ
−i3π
10
!
!
√
−i τ
−iπ
−τ e 10
(5)
(6)
.
where τ = 5−1
2
In this paper we address the problem of finding a product of generator matrices for Fibonacci anyon braids. Although the methodology we propose can be extended to
other braids, we focus on anyon braids since they are one
of the best known in TQC [12, 29]. As a target gate for
computing the error (3) we use
T =
i
0
0
i
.
(7)
3. PROBLEM FORMULATION
3.1 Problem representation
Let X = (X1 , . . . , Xn ) denote a vector of discrete random
variables. We use x = (x1 , . . . , xn ) to denote an assignment
to the variables. I denotes a set of indices in {1, . . . , n}, and
XI (respectively xI ) a subset of the variables of X (respectively x) determined by the indices in I.
In our representation for the quasiparticle braids problem,
X = (X1 , . . . , Xn ) represents a braid of length n, where Xi
takes values in {0, 1, . . . , 2g − 1} and g is the number of
generators. Given an order for the generators σ1 , σ2 , . . . , σg ,
Xi = j, j < g means that the matrix in position i is σj+1 . If
−1
. For
Xi = j, j ≥ g, then the matrix in position i is σ(j−g)+1
example, for generators shown in Equations (5) and (6), and
B = σ1 σ1 σ2 σ2−1 σ1−1 , the corresponding braid representation
is x = (0, 0, 1, 3, 2).
3.2 Fitness function
(4)
ij
The problem of finding braiding operations that approximate gates is then reduced to finding a product chain of the
reduced generators and their inverses that approximates the
matrix representing the quantum gate. Two elements that
describe the quality of a braid are its error ǫ and its length
l.
2.1 Fibonacci anyon braids
Anyons appear as emergent quasiparticles in fractional
quantum Hall states and as excitations in microscopic models of frustrated quantum magnets that harbor topological
quantum liquids [21]. Fibonacci anyons are the simplest
anyons with non-Abelian braiding statistics that can give
rise to universal quantum computation. Fibonacci anyon
braids [3] only encompasses one-qubit gates. In such systems, the braid transition operators result in a phase change
We are interested in the solution of an optimization problem formulated as x∗ = argmaxxf (x), where f : S → R is
called the objective or fitness function. The optimum x∗ is
not necessarily unique.
To evaluate the fitness function associated to a solution
x, firstly the product of braid matrices B is computed according to x and then the error ǫ is calculated from B as
in (3).
The fitness function [12] is defined as:
f (x) =
1−λ
λ
+
1+ǫ
l
(8)
where l is the braid’s length, and the parameter λ serves to
balance the two conflicting goals, i.e., having short braids or
low approximation error. When λ = 0, braids are optimized
only for the error and the function reaches its maximum
value when this error is minimized.
We define functions fˆ(x) and f¯(x) as two variations of
function (8). Function fˆ(x) is identical to f (x), except that
the effective length l̂ = elen(B) is used instead of the braid’s
length. Function f¯(x) outputs the maximum value of the
function for any of the braids contained in B that start from
the first position, i.e.
f¯(x) = maxy,y∈{(x1 ),(x1 ,x2 ),(x1 ,...,xi ),(x1 ,...,xn )} f (y)
4.
(9)
4.2 Statistical analysis of the braids space
PROBABILISTIC MODELING OF BRAIDS
To optimize the braid problem we use a class of evolutionary algorithms that capture and exploit statistical regularities in the best solutions. These methods assume that
such regularities exist. As a preliminary proof of concept on
the existence of such regularities, we investigate the Boltzmann distribution for braids of manageable size. A similar
approach has been successfully applied to investigate the
dependencies that arise in the configurations of simplified
protein models [24] and conductance-based neuron models
[23].
4.1 Boltzmann distribution
When the dimension of the braid problem is small, complete enumeration and evaluation of all possible solutions is
feasible. In this situation, brute force can be applied to identify the optimal solutions. We use complete enumeration to
define a probability distribution on the space of all possible
braids for n = 10. Using the fitness value as an energy function, we associate to each possible braid a probability value
p(x) according to the Boltzmann probability distribution.
The Boltzmann probability distribution pB (x) is defined as
pB (x) = P
e
x′
g(x)
T
e
g(x′ )
T
,
The reason is that f¯ considers a greater space of solutions.
Differences between functions f and fˆ can be also detected
by comparing figures 1b) and 1c). For the three functions,
the space of solutions with lower fitness is more dense that
the solutions with higher fitness.
(10)
where g(x) is a given objective function and T is the system
temperature that can be used as a parameter to smooth the
the probabilities.
The Boltzmann probability distribution is used in statistical physics to associate a probability with a system state
according to its energy [28]. In our context of application,
pB (x) assigns a higher probability to braids that gives a
more accurate approximation to the target gate. The solutions with the highest probability correspond to the braids
that maximize the objective function. We use an arbitrary
choice of the temperature, T = 1, since our idea is to compare the distributions associated to different fitness functions for the same parameter T .
Using the Boltzmann distribution we can investigate how
potential regularities of the fitness function are translated
into statistical properties of the distribution. In particular, we investigate the marginal probabilities associated to
the variables and the mutual information between pairs of
variables. Figure 1 shows the probabilities assigned by the
Boltzmann distribution to functions f , fˆ, f¯, for n = 10. The
search space comprises 410 = 1, 048, 576 braids.
It can be seen in Figure 1a) that probabilities assigned
by the Boltzmann distribution to function f and fˆ are very
similar although not identical. For both functions, only few
points have a high probability. The important difference between functions f and f¯ is evident in Figure 1b). The probability assigned by the Boltzmann distribution to a braid is
always higher or equal for function f¯ than for function f .
Figure 2 shows the univariate probabilities computed from
the Boltzmann distribution for the three functions analyzed
and the 10 variables. p1 , p2 , p3 , and p4 respectively represent the univariate probabilities for braid generators λ1 ,
−1
λ2 , λ−1
1 , and λ2 . For all the functions, higher probabilities
is more likely to be present in the
for p3 indicate that λ−1
1
best solutions. This is the type of statistical regularities that
can be detected and exploited by EAs that learn probabilistic models. If a particular configuration is more likely to
be present in the best solutions, then, these configurations
could be sampled more frequently at the time of generating
new solutions.
Analysis of Figure 2 also reveals the similarities between
functions f and fˆ since they determine similar univariate
distributions for all the variables. A remarkable fact is that
for function f¯ (Figure 2c)) the univariate probabilities notably differ for the first variables and are more similar as the
index of the variables increases. One possible explanation
for this behavior is that the first variables are present in
more solutions of those considered by function f¯. Changes
in these variables are more influential in the function. Finally, another remarkable observation is that the univariate
are always very close
probabilities associated to λ1 and λ−1
1
for the three functions.
Finally, using the Boltzmann probabilities, we compute
the bivariate marginal distributions between every pair of
variables and derive the values of the mutual information.
The mutual information is a measure of statistical dependence between the variables and can serve to identify variables that are dependent. A strong dependence between two
variables may indicate that their joint effect has a strong
influence on the function. Figure 3 shows the mutual information computed for the three functions analyzed.
It can be seen in Figure 3 that for the three functions
the strongest dependencies are between adjacent variables,
although for functions f and fˆ there is also a strong dependence between the first variable and the last variable.
Although the pattern of dependence is similar in functions
f and fˆ, the mutual information is higher for function fˆ.
It can also appreciated in Figure 3c) that the dependencies between adjacent variables decreases with the index for
function f¯.
Summarizing, the statistical analysis of the Boltzmann
distribution shows that there are at least two types of regularities of the braid problem that are translated into statistical features. Firstly, there are different frequencies associated to the generators in the space of the best solutions.
Secondly, there are strong dependencies between the variables, particularly those that are adjacent in the braid representation.
5. MODELING THE BRAID SPACE
Using the Boltzmann distribution to find the statistical
regularities is not feasible for real problems for which the
space of solutions can not be inspected exhaustively. However, statistical regularities can be detected in samples of
a)
b)
c)
Figure 1: Boltzmann distribution computed for different functions. a) f vs fˆ , b) f vs f¯, and c) fˆ vs f¯.
0.2505
0.26
0.2505
p
1
p2
0.2504
p2
0.2504
p3
0.2503
0.2503
p
p2
0.258
p3
p3
p4
0.256
p
4
4
0.2501
0.25
Probabilities
0.2502
Probabilities
0.2502
Probabilities
p1
p
1
0.2501
0.25
0.2499
0.2499
0.2498
0.2498
0.2497
0.2497
0.2496
1
0.2496
1
0.254
0.252
0.25
0.248
2
3
4
5
6
7
8
9
10
0.246
2
3
4
5
Variables
6
7
8
9
0.244
1
10
2
3
4
5
a)
6
7
8
9
10
Variables
Variables
b)
c)
Figure 2: Univariate probabilities computed from the Boltzmann distribution for : a) f , b) fˆ, and c) f¯.
−9
−9
−5
x 10
x 10
1
2.5
2
x 10
1
4.5
1
2
4
2
3
3.5
3
2
4
1.5
5
6
Variables
Variables
4
4
3
5
2.5
6
2
Variables
2
3
1.5
5
6
1
1
7
7
7
1.5
8
8
8
1
0.5
9
9
0.5
9
0.5
10
10
1
2
3
4
5
6
7
8
Variables
9
10
0
10
1
2
3
4
5
6
7
8
9
10
0
1
2
3
4
Variables
a)
b)
5
6
7
8
9
10
0
Variables
c)
Figure 3: Mutual information computed from the Boltzmann distribution for: a) f , b) fˆ, and c) f¯.
n
50
100
150
200
250
braid
σ1−1 σ23 σ1−2 σ2 σ1−1 σ2 σ1−2 σ23 σ1−1 σ2 σ1−1 σ2 σ1−2 σ2 σ1−2 σ2 σ1−1 σ23 σ1−1 σ22 σ1−1 σ2 σ1−1 σ2 σ1−2 σ22 σ1−3 σ22
σ1 σ2−2 σ14 σ2−1 σ1 σ2−4 σ1 σ2−1 σ13 σ2−1 σ12 σ2−2 σ14 σ2−1 σ1 σ2−4 σ1 σ2−1 σ16 σ22 σ1 σ2 σ1 σ22 σ13 σ25 σ1−1 σ2 σ1−3 σ2 σ13 σ25
σ2 σ1−1 σ2 σ1−1 σ2−1 σ12 σ2−1 σ1 σ2−4 σ12 σ2−2 σ1−1 σ2−1 σ1−2 σ2−4 σ12 σ2−4 σ1 σ2−1 σ12 σ2−1 σ1−1 σ2 σ1−3 σ2−1 σ1 σ2−1 σ13 σ2−1 σ1 σ2−4 σ12 σ2−4 σ12 σ2−3
σ2−2 σ14 σ2−1 σ1 σ2−4 σ1 σ2−1 σ12 σ2−1 σ13 σ2−1 σ1 σ2−4 σ1 σ2−1 σ14 σ2−1 σ1 σ2−2 σ12 σ22 σ1 σ2−1 σ1 σ2−1 σ1−5 σ2 σ1−1 σ2−6 σ1−2 σ23
σ1 σ2 σ1−1 σ2 σ1−1 σ2−1 σ1 σ2−1 σ1−3 σ24 σ1−2 σ24 σ1−1 σ2 σ12 σ2 σ1−1 σ24 σ1−2 σ24 σ1−3 σ2−1 σ1 σ2−1 σ1−1 σ22 σ1 σ2−1 σ12 σ2−1 σ1 σ2−4 σ12 σ2−4 σ1 σ2−1 σ14
σ2−1 σ1−1 σ2−1 σ1−4 σ2−1 σ1−1 σ2−1 σ14 σ2−1 σ1 σ2−4 σ12 σ2−4 σ1 σ2−2 σ1−1 σ25 σ1−1 σ2 σ1−4 σ22 σ1−4 σ22 σ1−4 σ22 σ1−1
Table 1: Best braids found by the EDAs for each value of n.
solutions selected according to their fitness. EDAs use samples of solutions to learn a model that captures some of the
regularities that may exist in the data. The pseudocode of
an EDA is shown in Algorithm 1.
EDAs that used univariate, one-order Markov, and tree
models were respectively introduced in [1, 16], [5] and [2]
and details on the methods used to learn and sample the
models can be obtained from these references.
Algorithm 1: Estimation of distribution algorithm
5.1 Enhancements to the EDAs
1 Set t ⇐ 0. Generate N solutions randomly.
2 do {
3
Evaluate the solutions using the fitness function.
We consider three enhancements to EDAs: 1) Use of a
local optimizer. 2) Partial sampling. 3) Recoding.
As is the case of other EAs, EDAs can be enhanced by
the incorporation of local optimizers [19]. We use a greedy
optimization algorithm that is applied during the evaluation
of the population by the EDA. The algorithm starts from the
solution generated by the EDA. In each iteration, the local
optimizer evaluates all the 3n solutions that are different
to the current solution in only one variable (the neighbor
solutions). The next selected solution is the neighbor that
improves the fitness of the current solution the most. The
algorithm stops when none of the neighbors improves the
fitness of the current solution.
During the sampling step of an EDA, all variables are assigned their values according to the probabilistic model and
the sampling method. For the EDA that uses the univariate
model, variables are independently sampled. For 1-order
Markov and tree, probabilistic logic sampling (PLS) [7] is
used. In both methods, all variables are assigned the new
values. However, for some problems with higher-order interactions using a base template solution can be better than
generating each new solution from scratch. For the braid
problem, careful recombination of the solutions proved to
be essential for the genetic algorithm introduced in [12].
In partial sampling, a solution of the population is selected
and only a subset of its variables are sampled according to
the model. We use two variants of partial sampling I) Partial
sampling where the number of variables to be modified is
randomly selected between 1 and n. II) Partial sampling,
where the number of variables to be modified is randomly
selected between 1 and n2 .
Recoding consists in modifying the representation of the
solution according to the evaluation. For functions fˆ and f¯
it is possible to recode the solution by eliminating redundant
generators (e.g., pairs σi σi−1 ). The rationale of using recoding is that meaningful variables will be located closer to the
beginning of the braid. Since solutions have a fixed length,
the last variables will be kept unused, i.e. garbage information. Therefore, we devised two ways to fill these gaps: I)
Leaving the unused variables as they were in the original solution. II) Replacing the unused variables by a reverse copy
of the variables used in the evaluation. The second variant
intends to replicate information that has proved to be “informative” about the problem. Equations (14) and (15) show
examples of recoding type I and II, respectively. In this hypothetical examples, the underlined variables are those that
provided the best fitness after simplifying the braid and evaluating function f¯.
4
Select a population DtS of K ≤ N solutions according to a selection method.
Calculate a probabilistic model of DtS .
Generate N new solutions sampling from the distribution represented in the model.
7
t⇐t+1
8 } until Termination criteria are met.
5
6
The model used by the EDA will determine the type of
regularities that will be captured from the data and also
the cost of the optimization algorithm since more complex
models are generally more computationally costly.
In this paper we use three types of probabilistic graphical
models: 1) Univariate model. 2) 1-order Markov model. 3)
Tree model. We work with positive distributions denoted
by p. p(xI ) denotes the marginal probability for XI = xI .
p(xi | xj ) denotes the conditional probability distribution of
Xi = xi given Xj = xj .
In the univariate model variables are considered to be independent, and the probability of a solution is the product
of the univariate probabilities for all variables:
pu (x) =
n
Y
p(xi )
(11)
i=1
In the 1-order Markov model, the configuration of variable
Xi depends on the configuration of its previous variable:
pM K (x) = p(x1 )
n
Y
i=2
p(xi | xi−1 )
(12)
A probability distribution pT (x) that is conformal with a
tree is defined as:
n
Y
p(xi |pa(xi )),
(13)
pT (x) =
i=1
where P a(Xi ) is the parent of Xi in the tree, and p(xi |pa(xi )) =
p(xi ) when pa(Xi ) = ∅, i.e. Xi is a root of the tree. We allow the existence of more than one root in the PGM (i.e.
forests) although for convenience of notation we refer to the
model as tree.
Univariate approximations are expected to work well for
functions that can be additively
decomposed into functions
P
of order one (e.g. g(x) = i xi ). However, other non additively decomposable functions can be easily
Q solvedPwith
EDAs that use univariate models (e.g. g(x) = i xi + i xi )
[14]. Therefore, it makes sense to test the univariate approximation for the braid problem. The 1-order Markov model
captures only dependencies between adjacent variables, and
the tree model can represent a maximum of n − 1 bivariate
dependencies.
(0, 3, 1, 3, 3, 3, 2, 1, 2, 2) =(0, 3, 3, 3, 2, 3, 2, 1, 2, 2)
(14)
(0, 3, 1, 3, 3, 3, 2, 1, 2, 2) =(0, 3, 3, 3, 2, 2, 3, 3, 3, 0)
(15)
6. RELATED WORK
In addition to the use of genetic algorithms [12], brute
force [3] has been proposed to search for a braids of manageable size (up to 46 exchanges). Other methods such as
the Solovay-Kitaev algorithm [4, 9, 17] provide bounds on
the accuracy and length of the braids. However, these methods do not allow the user to tune the balance between the
accuracy and the length as pioneered in [12].
The Boltzmann distribution has played an important role
in the theoretical analysis of EDAs and other authors works
have analyzed the relationship between the function structure and the dependencies in the distribution [13, 18, 22].
Other problems from physics have been previously treated
with EDAs. In particular, spin glass models with different
types of interactions and topologies have been addressed [19,
20, 27]. Two important differences between the braid problem and the spin glass models that makes it particularly
challenging is that its fitness function is multiplicative and
that the representation is non binary. In fact the cardinality
of the variables can increase with the number of generators.
n
50
100
150
200
250
l
44
70
64
62
124
ǫ
4.8435 × 10−4
8.3527 × 10−6
8.3527 × 10−6
8.3527 × 10−6
3.5038 × 10−6
log10 (ǫ)
−3.3148
−5.0782
−5.0782
−5.0782
−5.4555
3.97 1
log10
(ǫ)
116.47
633.37
633.37
633.37
841.82
Table 2: Parameters of the best braids found by the
EDAs for each value of n.
Figure 4 shows the length of all the best solutions found
for each value of n. It can be observed in Figure 4 that
EDAs are able to find several braids with different lengths
for n = 150 and n = 200.
200
EXPERIMENTS
The main objective of our experiments is to evaluate the
capacity of the EDAs to find optimal solutions to the braid
problem. We run experiments for n ∈ {50, 100, 150, 200, 250}
in order to evaluate the scalability of the algorithms. A second objective is to compare different variants of the problem
formulation and of the algorithm.
7.1 Experimental settings
Each EDA is characterized by 5 parameters:
180
160
140
Length
7.
120
100
80
60
40
• Use of local optimizer. 0: Only EDA is applied, 1:
EDA is combined with greedy search as described in
Section 5.1.
• Type of function and representation. 0: Function f ,
1: Function f¯ without recoding, 2: Function f¯ with
recoding type I, 3: Function f¯ with recoding type II.
• λ value. 0:0.0, 1:0.01, 2:0.05, 3:0.1.
• Sampling method. 0: Normal, 1: Partial sampling
type I, 2: Partial sampling type II.
• Type of probabilistic model. 0: Univariate, 1: 1-order
Markov, 2: Tree.
The total number of variants of the algorithm was 2 ×
4 × 4 × 3 × 3 = 288. All the algorithms use truncation
selection, in which the best 5% of the population is selected.
EDAs that do not incorporate the greedy local search use a
population size N = 10000. For these EDAs, the number of
generations was dependent on n as Ng = 15n.
Due to the large number of evaluations spent by the greedy
search method, the population size for all hybrid EDAs was
N = 100n and the number of generations was fixed to
Ng = 100. For each EDA variant, 100 experiments were
run.
7.2 Best solutions found by EDAs
Tables 1 and 2 respectively show the best braids achieved
by the EDAs for each value of n and the characteristics of
these solutions. In Table 2, we show an estimate of the
3.97
length of the braids (O[log10
(1/ǫ)]) that would compute
the Solovay-Kitaev algorithm to obtain the same error ǫ of
our best solutions. The lengths of our solutions compare
favorably with these estimates.
50
100
150
200
250
Maximum length
Figure 4: Length of the best solutions found for each
value of n.
7.3 Behavior of the different EDA variants
We further investigate the behavior of the different EDA
variants. Figure 5 shows the violin plots [8] with the distribution of the best values found in all the executions for: a)
All EDA variants without local optimizer (14400 runs), b)
All EDA variants that incorporate the greedy search (14400
runs), c) EDAs with local optimizer, recoding type II, and
that use partial sampling type II (300 runs). Each violin
plot shows a histogram smoothened using a kernel density
with Normal kernel. The mean and median are shown as
red crosses and green squares, respectively.
In Figure 5, the modes of the Normal distribution indicate
the existence of a local optimum with a very wide basin
of attraction. This local optimum has value log10 f (ǫ) =
−2.50785 and the majority of the EDA runs can be trapped
in this value. Differences between the EDAs due to the application of the greedy method can be appreciated for n = 200
and n = 250 (Figures 5a) and 5b)). Also, Figure 5c) reveals
how a particular combination of the EDA’s parameters can
improve the results of the search. This is shown in detail in
Table 3 that comprises all EDA variants that reached one of
the best solutions in at least one of the 100 runs.
There are a number of commonalities between the best
EDA variants included in Table 3. Except in one case, all
EDAs use recoding of type II. Similarly, except in one case,
in all the variants λ ∈ {0.01, 0.05}. Except in two cases, the
sampling method selected was partial sampling. The application of the local optimizer notably improved the results
0
0
−1
−1.5
−1
−1
−2
−2
−2
−2.5
log10 ε
ε
10
log
log
10
ε
−3
−3
−3
−3.5
−4
−4
−4
−4.5
−5
−5
−5
−5.5
−6
50
100
150
200
−6
250
50
100
Maximum length
150
200
−6
250
Maximum length
a)
50
100
150
200
250
Maximum length
b)
c)
Figure 5: Violin plots showing the distribution of the best values found in all the executions for: a) All EDAs
variants without local optimizer (14400 runs), b: All EDAs variants with local optimizer (14400 runs), c: EDAs
with local optimizer, recoding type II, and that use partial sampling type II (300 runs).
tλ
1
1
1
1
1
1
1
2
2
2
2
2
2
2
2
0
1
1
1
1
1
2
2
2
2
2
2
ts
0
1
1
1
2
2
2
0
1
1
1
2
2
2
1
1
1
1
2
2
2
1
1
1
2
2
2
pm
0
0
1
2
0
1
2
0
0
1
2
0
1
2
2
2
0
2
0
1
2
0
1
2
0
1
2
50
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
100
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
2
1
0
0
0
0
0
0
150
1
1
1
1
0
0
0
0
4
0
1
0
1
2
1
1
0
0
9
14
18
0
1
1
4
2
4
200
1
4
2
0
2
2
3
1
3
1
1
1
1
3
0
0
2
1
12
21
19
4
1
0
20
9
11
250
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
tot
2
6
3
1
2
2
4
1
7
1
2
2
3
5
1
1
2
1
21
37
38
4
2
1
24
11
16
−0.6
−0.8
−1
−1.2
log
Table 3: EDAs variants that obtained one of the
best solutions at least one in the 100 experiments.
L: Local optimizer, tf: Type of function and representation, tλ: type of λ value, ts: type of sampling,
pm: probabilistic model.
the random search, we randomly selected 10000 solutions
and selected the best solution according to function f¯, λ =
0.01. The same experiment was repeated 100 times to select
the 100 “best” solutions for n ∈ {50, 100, 150, 200, 250}.
A similar procedure was followed for the greedy local search.
The local optimizer was applied to each of the 10000 solutions until no improvement was possible. For the GA, we
used the results of 100 GA runs used for the work published
in [12]. Since these results were obtained using solutions
of different length, and with a different number of evaluations, care must be taken to interpret the differences. We
only compare the GA results with the other algorithms for
n = 50. Similarly, the results of the random search search
were very poor for n > 50 and we only include them in the
comparison for n = 50. Results are shown in Figure 6. The
results of the comparison between the EDA and the greedy
search for n > 50 are shown in Figure 7. In the boxplots,
the central mark is the median, the edges of the box are the
25th and 75th percentiles, the whiskers extend to the most
extreme data points not considered outliers, and outliers are
plotted individually.
ε
tf
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
3
3
3
3
3
3
3
3
3
3
3
3
10
L
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
1
1
1
−1.4
−1.6
−1.8
−2
for n ∈ {150, 200} but in terms of the best solution found it
did not have an important influence for the other values of
n.
As a summary, we recommend to use an EDA that incorporates the greedy search, and uses partial sampling of type
II and the 1-order Markov model since it is less complex
than the tree and results achieved by the two models are
similar.
−2.2
−2.4
−2.6
Best EDA
Random
Greedy
Algorithms
GA
Figure 6: Comparison between the Best EDA variant, a random search, the greedy local search and
the GA for n = 50.
7.4 Improvement over other search methods
As a final validation of our method, we compare it with
the results achieved using a random search, the greedy local
optimizer, and the GA introduced in [12]. We compare our
best EDA variant as described in the previous section. For
It can be seen in Figures 6 and 7 that the EDA significantly outperforms all the other methods. Furthermore, as
n increases the algorithm is able to scale and find better
solutions.
−2.5
[2]
−3
log
10
ε
−3.5
−4
[3]
−4.5
−5
100
150
200
250
Best EDA
100
150
200
Greedy search
250
Figure 7: Comparison between the Best EDA variant and the greedy local search n ∈ {100, 150, 200, 250}.
8.
CONCLUSIONS
In this paper we have proposed the use of different EDA
variants for the quasiparticle braid problem. We have shown
that the fitness function and general evolutionary optimization approach initially introduced with GAs, can be successfully extended by the application of EDAs. The best braids
obtained with our EDAs have lengths up to 9 times shorter
than those expected from braids of the same accuracy obtained with the Solovay-Kitaev algorithm and had not been
previously reported to be found by the GA approach. We
have also proposed three different methods to enhance the
behavior of EDAs. Our results show that although the local
optimizer improves the results of the EDA, it is not able to
reach solutions of similar quality when applied alone. Decoding, and particularly partial sampling, can be used as
effective methods when dealing with other real-world problems as a way to improve usability of the representation and
avoid disrupting complex solutions, respectively.
By means of analyzing the Boltzmann distribution we
have shown that some of the problem characteristics are
translated into statistical regularities of the Boltzmann distribution. In the future we plan to extend this analysis to
try to extract more problem specific information that can be
useful for designing more effective search methods. Other
evolutionary algorithms that use models able to represent
higher order dependencies, such as Bayesian networks [11],
Markov networks [26], and factor graphs [6], could be applied. We also plan to address other braid problems of higher
difficulty.
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
9.
ACKNOWLEDGMENTS
R. Santana has been partially supported by the Saiotek
and Research Groups 2013-2018 (IT-609-13) programs (Basque
Government), TIN2013-41272P (Ministry of Science and Technology of Spain), COMBIOMED network in computational
bio-medicine (Carlos III Health Institute), and by the NICaiA
Project PIRSES-GA-2009-247619 (European Commission).
H. G. Katzgraber acknowledges support from the NSF (Grant
No. DMR-1151387).
[15]
[16]
10. REFERENCES
[1] S. Baluja. Population-based incremental learning: A
method for integrating genetic search based function
optimization and competitive learning. Technical
[17]
Report CMU-CS-94-163, Carnegie Mellon University,
Pittsburgh, PA, 1994.
S. Baluja and S. Davies. Using optimal
dependency-trees for combinatorial optimization:
Learning the structure of the search space. In D. H.
Fisher, editor, Proceedings of the 14th International
Conference on Machine Learning, pages 30–38, 1997.
N. E. Bonesteel, L. Hormozi, G. Zikos, and S. H.
Simon. Braid topologies for quantum computation.
Physical review letters, 95(14):140503, 2005.
C. M. Dawson and M. A. Nielsen. The Solovay-Kitaev
algorithm. arXiv preprint quant-ph/0505030, 2005.
J. S. De Bonet, C. L. Isbell, and P. Viola. MIMIC:
Finding optima by estimating probability densities. In
Mozer et al., editor, Advances in Neural Information
Processing Systems, volume 9, pages 424–430. The
MIT Press, Cambridge, 1997.
B. H. Helmi, A. T. Rahmani, and M. Pelikan. A factor
graph based genetic algorithm. Int. J. Appl. Math.
Comput. Sci, 24(3):621–633, 2014.
M. Henrion. Propagating uncertainty in Bayesian
networks by probabilistic logic sampling. In J. F.
Lemmer and L. N. Kanal, editors, Proceedings of the
Second Annual Conference on Uncertainty in Artificial
Intelligence, pages 149–164. Elsevier, 1988.
J. L. Hintze and R. D. Nelson. Violin plots: a box
plot-density trace synergism. The American
Statistician, 52(2):181–184, 1998.
L. Hormozi, G. Zikos, N. E. Bonesteel, and S. H.
Simon. Topological quantum compiling. Physical
Review B, 75(16):165310, 2007.
P. Larrañaga, H. Karshenas, C. Bielza, and
R. Santana. A review on probabilistic graphical
models in evolutionary computation. Journal of
Heuristics, 18(5):795–819, 2012.
P. Larrañaga and J. A. Lozano, editors. Estimation of
Distribution Algorithms. A New Tool for Evolutionary
Computation. Kluwer Academic Publishers, 2002.
R. B. McDonald and H. G. Katzgraber. Genetic braid
optimization: A heuristic approach to compute
quasiparticle braids. Physical Review B, 87(5):054414,
2013.
H. Mühlenbein and T. Mahnig. Theoretical Aspects of
Evolutionary Computing, chapter Evolutionary
algorithms: from recombination to search
distributions, pages 137–176. Springer, Berlin, 2000.
H. Mühlenbein, T. Mahnig, and A. Ochoa. Schemata,
distributions and graphical models in evolutionary
optimization. Journal of Heuristics, 5(2):213–247,
1999.
H. Mühlenbein and G. Paaß. From recombination of
genes to the estimation of distributions I. Binary
parameters. In Parallel Problem Solving from Nature PPSN IV, volume 1141 of Lectures Notes in Computer
Science, pages 178–187, Berlin, 1996. Springer.
H. Mühlenbein and D. Schlierkamp-Voosen. The
science of breeding and its application to the breeder
genetic algorithm (BGA). Evolutionary Computation,
1(4):335–360, 1994.
M. A. Nielsen and I. L. Chuang. Quantum
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
computation and quantum information. Cambridge
university press, 2010.
A. Ochoa and M. R. Soto. Linking entropy to
estimation of distribution algorithms. In J. A. Lozano,
P. Larrañaga, I. Inza, and E. Bengoetxea, editors,
Towards a New Evolutionary Computation: Advances
on Estimation of Distribution Algorithms, pages 1–38.
Springer, 2006.
M. Pelikan and D. E. Goldberg. Hierarchical BOA
solves Ising spin glasses and Max-Sat. IlliGAL Report
No. 2003001, University of Illinois at
Urbana-Champaign, January 2003.
M. Pelikan and H. G. Katzgraber. Analysis of
evolutionary algorithms on the one-dimensional spin
glass with power-law interactions. In Proceedings of
the 11th Annual conference on Genetic and
evolutionary computation, pages 843–850. ACM, 2009.
N. Read and E. Rezayi. Beyond paired quantum Hall
states: parafermions and incompressible states in the
first excited Landau level. Physical Review B,
59(12):8084, 1999.
R. Santana. Estimation of distribution algorithms
with Kikuchi approximations. Evolutionary
Computation, 13(1):67–97, 2005.
R. Santana, C. Bielza, and P. Larrañaga. Conductance
interaction identification by means of boltzmann
distribution and mutual information analysis in
conductance-based neuron models. BMC
Neuroscience, 13(Suppl 1):P100, 2012.
R. Santana, P. Larrañaga, and J. A. Lozano. Protein
folding in simplified models with estimation of
distribution algorithms. IEEE Transactions on
Evolutionary Computation, 12(4):418–438, 2008.
S. D. Sarma, M. Freedman, and C. Nayak. Topological
quantum computation. Physics Today, 59(7):32–38,
2006.
S. Shakya and R. Santana, editors. Markov Networks
in Evolutionary Computation. Springer, 2012.
S. Shakya, R. Santana, and J. A. Lozano. A
Markovianity based optimisation algorithm. Genetic
Programming and Evolvable Machines, 13(2):159–195,
2012.
N. van Kampen. Stochastic Processes in Physics and
Chemistry. North Holland, 1992.
H. Xu and X. Wan. Constructing functional braids for
low-leakage topological quantum computing. Physical
Review A, 78(4):042325, 2008.
| 9cs.NE
|
1
The Gaussian Interference Channel in the Presence
of Malicious Jammers
arXiv:1712.04133v1 [cs.IT] 12 Dec 2017
Fatemeh Hosseinigoki1 and Oliver Kosut1
Abstract
This paper considers the two-user Gaussian interference channel in the presence of adversarial
jammers. We first provide a general model including an arbitrary number of jammers, and show that
its capacity region is equivalent to that of a simplified model in which the received jamming signal at
each decoder is independent. Next, existing outer and inner bounds for two-user Gaussian interference
channel are generalized for this simplified jamming model. We show that for certain problem parameters,
precisely the same bounds hold, but with the noise variance increased by the received power of the
jammer at each receiver. Thus, the jammers can do no better than to transmit Gaussian noise. For these
problem parameters, this allows us to recover the half-bit theorem. In weak and strong interference
regime, our inner bound matches the corresponding Han-Kobayashi bound with increased noise variance
by the received power of the jammer, and even in strong interference we achieve the exact capacity.
Furthermore, we determine the symmetric degrees of freedom where the signal-to-noise, interferenceto-noise and jammer-to-noise ratios are all tend to infinity. Moreover, we show that, if the jammer has
greater received power than the legitimate user, symmetrizability makes the capacity zero. The proof of
the outer bound is straightforward, while the inner bound generalizes the Han-Kobayashi rate splitting
scheme. As a novel aspect, the inner bound takes advantage of the common message acting as common
randomness for the private message; hence, the jammer cannot symmetrize only the private codeword
without being detected. This complication requires an extra condition on the signal power, so that in
general our inner bound is not identical to the Han-Kobayashi bound. We also prove a new variation
of the packing lemma that applies for multiple Gaussian codebooks in an adversarial setting.
Index Terms: Gaussian interference channel, adversarial jammer, capacity region
This material is based upon work supported by the National Science Foundation under Grant No. CCF-1453718.
This paper was presented in part at the 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton
2016 [1].
1
School
of
Electrical,
Computer
{fhossei1,okosut}@asu.edu
and
Energy
Engineering,
Arizona
State
University,
Tempe,
AZ
85287.
2
I. I NTRODUCTION
The open nature of the wireless communication medium makes it inherently vulnerable to an
active attack, wherein a malicious adversary (or jammer) transmits into the medium to disrupt the
operation of the legitimate users. Therefore, developing techniques to manage the presence of an
active attacker and to characterize the effect of an attacker on the fundamental limits of wireless
communication is important. In this paper, we investigate the two-user Gaussian interference
channel (GIC) in the presence of intelligent jammers (see Fig. 1) to characterize the capacity
region under the input and state constraints.
A. Prior Work
There are a wide variety of information-theoretic studies of active attacks in the literature
such as the arbitrarily-varying channel (AVC) [2]–[4], correlated jamming [5], network coding
with adversarial errors [6], [7], multiuser channels with correlated jamming [8], and a diamond
network in the presence of a jammer [9].
In [2], Ahlswede proved that the capacity of discrete memoryless AVC for deterministic codes
is either zero or equal to the random code capacity under the average probability of error criterion.
Ericson in [10] found a sufficient condition for the capacity to be zero, and later in [3] it is
proved that the condition is also necessary. Csiszar and Narayan further studied the deterministic
code capacity of the Gaussian AVC under the average probability of error criterion in [4] while
they also considered the input and state power constraints. Here, we mainly follow the Gaussian
AVC of [4] in which an adversary does not have any knowledge about the legitimate user’s
signal (but does know the code), and it may send an arbitrary sequence across the coding block
subject to a power constraint.
On the other hand, the interference channel (without a jammer) is one of the fundamental
problems in network information theory, and the exact capacity region is still unknown in general.
However, the Han-Kobayashi inner bound [11] is optimal or near-optimal for many interference
channels. The proof of this inner bound involves rate splitting, wherein each transmitter sends a
common message, decoded by both receivers, as well as a private message, decoded by only the
intended receiver. The authors in [12] showed that for the GIC, the Han-Kobayashi comes within
half a bit of the capacity region. Furthermore, [13] obtains an outer bound on the capacity region
of the GIC, and it is shown that for sufficiently weak interference signals, treating interference
3
as noise achieves the sum capacity. The deterministic interference channel model is proposed
by Brestler and Tse [14], and they show that the capacity of this channel is within a constant
number of bits of the corresponding GIC.
B. Main Results
Our main contribution is to generalize existing inner and outer bounds for the GIC in the
presence of AVC-style jammers. We provide a generalized GIC model with G jammers (G ≥ 1),
and show that the capacity region is equivalent to the capacity region of GIC with only two
independent jammers. We show that the capacity region depends only on the received power
of the jamming signal, not on the number of jammers. Moreover, we obtain the symmetric
degrees of freedom (DoF) by taking the limit of the normalized symmetric capacity as signal-tonoise, interference-to-noise and jammer-to-noise ratios converge to infinity. This characterization
generalized the so-called “W” DoF curve in [15, p. 153]. We also recover the optimal sum-rate
for the weak interference regime, as well as the exact capacity region for the strong interference
regime. We show that our bounds are within a half-bit in some regions, but we cannot show that
this holds in general.
We show that the outer bound in [12] holds with the noise variance increased by the received
power of the corresponding jammer at each receiver. The proof, given in Section IV, follows
by applying the outer bound in [12] with the jammers choosing to transmit Gaussian noise.
Moreover, we show that if the jammer’s received power at either receiver is larger than that
of the intended transmitter, AVC symmetrizability prevents this message from being decoded,
because the receiver cannot distinguish the legitimate codeword from the jammer’s counterfeit;
thus the capacity becomes zero.
We also provide a generalization of the Han-Kobayashi inner bound. For certain problem
parameters—for example, in the symmetric case when the jammer’s received power is less than
that of the interfering user—this inner bound is precisely the Han-Kobayashi inner bound with
the noise variance again increased by the received power of the jammer. Thus, for these problem
parameters we recover the half-bit theorem of [12], although we cannot prove that it holds in
general. The proof of the inner bound, given in Section V, is somewhat more involved, as the
receivers must decode correctly no matter what the jammer transmits. One novel aspect of our
inner bound proof is that we use the common message in the rate-splitting scheme as common
4
randomness for the private message. Thus, if the jammer has more power than the private
codeword but less than both together, it cannot use symmetrization without being detected, and
thus the receiver can decode.
In both [3] and [4], Csiszar and Narayan utilized lemmas (Lemma 3 in [3] and Lemma 1 in [4])
which assert the existence of codebooks with desirable properties in order to prove achievability
results. However, they only provided these lemmas for a single codebook, and for either discrete
random vectors (in [3]) or codewords uniformly distributed on the unit ball (in [4]). On the
other hand, our proof requires a variation on the Gaussian AVC packing lemma that handles
decoding of multiple superposed Gaussian codebooks. Our main technical tools for this goal are
Lemma 4, Lemma 5 and Lemma 6, proved in Appendix B, C and D, respectively.
The remainder of this paper is organized as follows. We describe the problem and the system
model for GIC with jammers in Section II. Our main results including the outer and the
inner bound for the capacity region are given by two theorems in Section III. We also discuss
implications of our bounds for different regimes, as well as illustrate numerical results in Section
IV. The proof for the outer bound is provided in Section V, and Section VI consists of the inner
bound proof. We conclude in Section VII.
Notations: We use bold letters to indicate the n-length vectors. Notation 1(·) refers to the
indicator function. We employ h·, ·i and k · k to denote inner product and norm-2, respectively.
We indicate the positive-part function and the expectation by |·|+ and E[·], respectively. Also, for
an integer N , notation [N ] stands for the set {1, 2, 3, . . . , N }. Notation In represents the identity
matrix of size n. Each of log(·) and exp(·) functions has base 2. Moreover, C(x) = 21 log(1 + x)
and ᾱ = 1 − α.
II. P ROBLEM S TATEMENT
The Gaussian interference channel with two independent jammers is shown in Fig. 1, in which
two users send their messages to their own receivers in the presence of one or two jammers.
The jammers are assumed not to have any information about the user’s signals (but know the
code). In particular, the received signals are given by
Y1 = h11 X1 + h12 X2 + g1 W1 + V1
(1)
Y2 = h21 X1 + h22 X2 + g2 W2 + V2
5
𝑾2
𝑾1
𝑔2
𝑿1
𝑔1
𝑽1
ℎ11
𝒀1
ℎ21
𝑿2
𝑽2
ℎ12
𝒀2
ℎ22
Fig. 1: Two-user Gaussian Interference Channel with Two Independent Jammers.
where X1 and X2 are n-length vectors representing the user’s signals, W1 and W2 are the
independent adversarial jammer signals, hij and gi for i, j ∈ {1, 2} are the channel gains, and
Vi is the n-length noise vector distributed as a sequence of i.i.d. zero mean Gaussian random
variables with variance σ 2 which is independent of X1 , X2 , W1 and W2 .
The transmitter and jammer signals are constrained to satisfy power constraints kXi k2 ≤ nPi
and kWi k2 ≤ nΛ, for i = 1, 2, respectively. We define the received signal-to-noise and interferenceto-noise ratios as S1 = h211 P1 /σ 2 , S2 = h222 P2 /σ 2 , I1 = h212 P2 /σ 2 and I2 = h221 P1 /σ 2 . We
also denote the jammer-to-noise ratios as J1 = g12 Λ/σ 2 and J2 = g22 Λ/σ 2 . We assume that the
transmitters and receivers know the signal-to-noise and interference-to-noise ratios, but they need
not know the jammer-to-noise ratios. However, we require small probability of error only when
the jammer-to-noise ratios do not exceed J1 ,J2 ; thus the code is independent of the jammer’s
power up to a point, and beyond that it may fail to decode correctly.
A 2nR1 , 2nR2 , n deterministic code is given by:
•
Message sets M1 = [2nR1 ] and M2 = [2nR2 ],
•
Encoding functions xi : Mi → Rn for i = 1, 2, and
•
Decoding functions φi : Rn → Mi for i = 1, 2.
For i = 1, 2, the message Mi is chosen uniformly from the set Mi , and each transmitter
encodes its own message to Xi . At each receiver, the received signal Yi is decoded by function
(n)
φi to M̂i = φi (Yi ). The average probability of error Pe
is now given by the probability that
(M̂1 , M̂2 ) 6= (M1 , M2 ), maximized over all possible choices of jammers’ sequences W1 and
W2 . A rate pair (R1 , R2 ) is achievable if there exists a sequence of 2nR1 , 2nR2 , n codes where
(n)
lim Pe = 0. The capacity region C is the closure of the set of all achievable rate pairs (R1 , R2 ).
n→∞
6
𝑾1
𝑾2
𝑔22
𝑿1
𝑔12
𝑔21
𝑔11
𝑽1
ℎ11
𝒀1
ℎ21
𝑿2
𝑽2
ℎ12
ℎ22
𝒀2
𝑔1𝐺
𝑔2𝐺
𝑾𝐺
Fig. 2: Two-user Gaussian Interference Channel with Two Independent Cross Jammers.
A. Generalized Jamming Model
Generally speaking, if there are G jammers (G ≥ 1) with the cross matrix G
g11 g12 g13 . . . g1G
G =
g21 g22 g23 . . . g2G
(2)
as shown in Fig. 2, then the received signals at each decoder are given by
Y1 = h11 X1 + h12 X2 + g11 W1 + g12 W2 + . . . + g1G WG + V1
(3)
Y2 = h21 X1 + h22 X2 + g21 W1 + g22 W2 + . . . + g2G WG + V2
where kWi k2 ≤ nΛ for i = 1, 2, . . . , G. This includes the case where there is only one jammer
(G = 1). We refer the capacity region of this channel as CG , and state the following proposition
for the relation between CG and C . Indeed, the capacity region depends only on the received
signal at each decoder and not the number of jammers.
Proposition 1: We have CG = C as long as
|g11 | + |g12 | + . . . + |g1G | = |g1 |
(4)
|g21 | + |g22 | + . . . + |g2G | = |g2 |
where the jammer-to-noise ratios are then given by J1 = (g11 + g12 + . . . + g1G )2 Λ/σ 2 and
J2 = (g21 + g22 + . . . + g2G )2 Λ/σ 2 .
The proof is provided in Appendix A.
7
III. M AIN R ESULTS
In this section, we present inner and outer bounds on the capacity region C (two-user GIC with
two independent jammers). Before stating the main results, we define regions Ro (S1 , S2 , I1 , I2 )
and Ri (S1 , S2 , I1 , I2 ) as the previously-derived outer and inner bounds respectively for the GIC
with no jammer; namely Ro is the outer bound of [12], and Ri is the Han-Kobayashi inner bound
[11]. When we write an expression with i and j, we mean for it to hold for both (i, j) = (1, 2)
and (i, j) = (2, 1).
Define Ro (S1 , S2 , I1 , I2 ) as the set of rate pairs (R1 , R2 ) such that
Ri ≤ C (Si )
Si
+ C (Ij + Sj )
Ri + Rj ≤ C 1+I
j
S2 +I2 +I1 I2
S1 +I1 +I1 I2
+C
R1 + R2 ≤ C
1+I2
1+I1
Sj +Ij +Ii Ij
Si
.
2Ri + Rj ≤ C 1+Ij + C (Si + Ii )+ C
1+Ii
Define Ri (S1 , S2 , I1 , I2 ) as the set of rate pairs (R1 , R2 ) such that
Si
Ri < C 1+α
j Ii
Si +ᾱj Ii
αj Sj
Ri + Rj < C 1+α
+
C
1+αi Ij
j Ii
α1 S1 +ᾱ2 I1
α2 S2 +ᾱ1 I2
R1 + R2 < C
+C
1+α2 I1
1+α1 I2
Si +ᾱj Ii
αj Sj +ᾱi Ij
αi Si
2Ri + Rj < C 1+αj Ii +C 1+αj Ii +C
1+αi Ij
for some αi in [0, 1] where αi implies the portion of the private message power in the HanKobayashi inner bound proof at user i. Note that in the Han-Kobayashi inner bound proof encoder
i divides the message mi into private message mip and common message mic with power αi Pi
and ᾱi Pi respectively.
Define Si0 =
Si
1+Ji
and Ii0 =
Ii
.
1+Ji
We now state our main outer and inner bounds.
Theorem 2 (Outer Bound): C ⊆ Ro (S10 , S20 , I10 , I20 ). Moreover, if S1≤ J1 or S2≤ J2 , then C = ∅.
Theorem 3 (Inner Bound): Assume Si > Ji for i = 1, 2. Let R̃i (S10 , S20 , I10 , I20 ) be the subset
of rate pairs in Ri (S10 , S20 , I10 , I20 ) achieved by αi ∈ [0, 1] satisfying
αi Si + ᾱj Ii > Ji for (i, j) = (1, 2), (2, 1).
Then R̃i (S10 , S20 , I10 , I20 ) ⊆ C .
(5)
8
(a) S = 4, I = 3, and J between 0 and 5. For these parameters the bound Ri (S 0 , S 0 , I 0 , I 0 )
is identical to our inner bound if the jammer-to-noise ratio is less than 3.2.
(b) S = 4, J = 3.5, and I between 0 and 10. The bound
(c) S = 10, J = 3.5, and I between 0 and 40. The bound
Ri (S , S , I , I ) is identical to our inner bound for weak
Ri (S 0 , S 0 , I 0 , I 0 ) is identical to our inner bound for high
and strong interference.
signal-to-noise ratio S = 10.
0
0
0
0
Fig. 3: Bounds on the symmetric capacity Csym (S, I, J) for S1 = S2 = S, I1 = I2 = I, and
J1 = J2 = J. In addition to our inner R̃i (S 0 , S 0 , I 0 , I 0 ) and outer bounds Ro (S 0 , S 0 , I 0 , I 0 ), also
shown the bound Ri (S 0 , S 0 , I 0 , I 0 ) and shown Ri (S 0 , S 0 , I 0 , I 0 ) with sub-optimal α =
1
.
1+I 0
9
IV. D ISCUSSION AND N UMERICAL R ESULTS
Note that the inner bound differs from Ri (S10 , S20 , I10 , I20 ) only when the optimal αi parameters
do not satisfy (5). However, in several regimes of interest, this constraint is not active. For
q 0
Ij
example, if the channel has weak interference, in the sense of [15, eq (6.8)]
(1 + Ii0 ) ≤
S0
i
ρi (1 − ρj ) for some ρ1 , ρ2 ∈ [0, 1] and (i, j) = (1, 2), (2, 1) then treating interference as noise
is optimal for the sum-rate [15, Theorem 6.3]. Treating interference as noise corresponds to
α1 = α2 = 1, under which (5) holds. Therefore, in the weak interference regime, our inner
bound matches Ri (S10 , S20 , I10 , I20 ), and it also achieves the exact sum-rate capacity. On the other
hand, when the channel has strong interference in both users I20 ≥ S10 and I10 ≥ S20 , by choosing
α1 = α2 = 0 each transmitter only sends its own common message, and both messages can be
decoded at each receiver. Therefore, (5) holds if we have I1 > J1 and I2 > J2 . Thus, we obtain
the exact capacity region for the strong interference regime [15, Theorem 6.2].
In [15, Theorem 6.6], it is shown that using Han-Kobayashi inner bound with sub-optimal
choices α1 =
1
1+I20
and α2 =
1
1+I10
outer bound. Therefore, if α1 =
yields an inner bound that is always within half a bit of the
1
1+I20
and α2 =
1
1+I10
satisfy our conditions in (5) then our inner
bound is guaranteed to be within half a bit of our outer bound; that is, if J1 <
J2 <
S2
1+I10
+
I22
1+I20
S1
1+I20
+
I12
1+I10
and
, our inner and outer bounds are within half a bit.
Now, consider the symmetric case; i.e. S1 = S2 = S, I1 = I2 = I, J1 = J2 = J, and
R1 = R2 = R. Clearly in this case it is optimal to choose α1 = α2 = α for inner bound. Define
the symmetric capacity of the channel as Csym (S, I, J) = max{R : (R, R) ∈ C }. We illustrate
the bounds for Csym (S, I, J) in Fig. 3 including our outer bound Ro (S 0 , S 0 , I 0 , I 0 ), our inner
bound R̃i (S 0 , S 0 , I 0 , I 0 ) with optimal α, the Han-Kobayashi inner bound with the noise variance
increased by the received power of the jammer Ri (S 0 , S 0 , I 0 , I 0 ) and the latter with sub-optimal
α=
1
.
1+I 0
Note that we are in the strong interference regime only if I 0 ≥ S 0 .
Define the normalized symmetric capacity as dsym =
Csym (S,I,J)
.
C(S)
Then the symmetric degrees
of freedom (DoF) d∗sym is given by
d∗sym (β, δ)
Csym (S, S β , S δ )
= lim
.
S→∞
C(S)
(6)
By substituting I = S β and J = S δ in our outer and inner bounds Ro (S 0 , S 0 , I 0 , I 0 ) and
R̃i (S 0 , S 0 , I 0 , I 0 ), we find the upper bound for Csym (S, S β , S δ ) given by
10
(a) DoF for δ =
1
4
and β between 0, 2.
(b) DoF for β = 0.7 and δ between 0, 2.
Fig. 4: Symmetric degrees of freedom for the GIC.
Csym (S, S β , S δ ) ≤ max{R : (R, R) ∈ Ro (S 0 , S 0 , I 0 , I 0 )} =
2β
S+S β + S δ
S
S
S + Sβ
1
1
1+S
min C
, C
+ C
,C
,
1+S δ +S β
1 + Sδ
2
1 + Sδ + Sβ
2
1 + Sδ
2β
S+S β + S δ
S
S + Sβ
1
1
1
1+S
C
+ C
+ C
, (7)
1+S δ +S β
3
1 + Sδ + Sβ
3
1 + Sδ
3
and the lower bound for Csym (S, S β , S δ ) given by
Csym (S, S β , S δ ) ≥ max{R : (R, R) ∈ R̃i (S 0 , S 0 , I 0 , I 0 )} =
S + ᾱS β
αS
S
1
1
max
min C
, C
+ C
,
1 + S δ + αS β
2
1 + S δ + αS β
2
1 + S δ + αS β
α:αS+ᾱS β >S δ
αS + ᾱS β
1
S + ᾱS β
1
αS
1
αS + ᾱS β
, C
+ C
+ C
.
C
1 + S δ + αS β
3
1 + S δ + αS β
3
1 + S δ + αS β
3
1 + S δ + αS β
(8)
We may further lower bound the symmetric capacity by choosing α =
1
1+I 0
=
1+S δ
1+S δ +S β
as long
as this choice satisfies (5). In particular, we claim that this value of α always satisfies (5) for
sufficiently large S. We show this by substituting this value of α to find
1 + Sδ
Sβ
αS + ᾱS =
S+
Sβ
δ
β
δ
β
1+S +S
1+S +S
1+δ
2β
S+S
+S
=
.
δ
1 + S + Sβ
β
(9)
(10)
11
Since the capacity region is empty when S ≤ J = S δ , it suffices to consider (10) only for δ < 1.
The dominant power of S in (10) is given by
max{1 + δ, 2β} − max{δ, β} > max{2δ, 2β} − max{δ, β} = max{δ, β} ≥ δ.
Therefore, (10) is larger than J = S δ for sufficiently large S, thus α =
1
1+I 0
(11)
satisfies (5). Now,
we may substitute this choice of α into (8), and take the limits of (8) and (7) as S → ∞.
Therefore, we find that the symmetric DoF is given by
β δ β δ
∗
dsym (β, δ) = min max{0, 1 − δ}, max {0, 1 − β, β − δ} , max 0, 1 − − , −
2 2 2 2
(12)
which is illustrated for fixed δ = 1/4 in Fig. 4a and fixed β = 0.7 in Fig. 4b. Note that for
the interference channel with no jammer [15, p. 153], the DoF exhibits a “W” shape for a fixed
δ=
log J
.
log S
V. P ROOF OF O UTER B OUND
Consider a sequence of (2nR1 , 2nR2 , n) codes with vanishing probability of error. Since these
codes must function for arbitrary jamming signals, we may derive an outer bound by assuming
the jammers transmit Gaussian noise with variance Λ. Thus, we follow the outer bound for the
GIC with no jammer [15, Chapter 6.7.2, p. 151] and the noise power σ 2 + gi2 Λ. This yields the
outer bound Ro (S10 , S20 , I10 , I20 ).
Moreover, if J1 ≥ S1 , based on the assumption that the jammer knows the code, the jammer
can choose an arbitrary message m̃1 and transmit a scaled form of the corresponding codeword
w1 = x1 (m̃1 )h11 /g1 . Given Y1 = h11 x1 (m1 ) + h12 x2 (m2 ) + h11 x1 (m̃1 ) + V1 , decoder 1 cannot
decode the message since it does not know whether the true message is m1 or m̃1 . The same
scenario can happen for decoder 2 if J2 ≥ S2 . This attack constitutes AVC symmetrization.
VI. P ROOF OF I NNER B OUND
Our inner bound proof is a generalization of the Han-Kobayashi bound [15, Chapter 6.5.1,
p. 144]. Using rate splitting, we represent message mi from user i for i = 1, 2, by independent
common message mic at rate Ric and private message mip at rate Rip such that Ri = Ric + Rip .
Thus, each receiver will decode its own common and private messages and the common message
12
of the interfering user. Assuming Si > Ji for i = 1, 2, we show that (R1c , R1p , R2c , R2p ) is
achievable if
Rip < C
αi Si
1+Ji +αj Ii
Rip + Ric < C
Si
1+Ji +αj Ii
Rip + Rjc < C
αi Si +ᾱj Ii
1+Ji +αj Ii
Rip + Ric + Rjc < C
Si +ᾱj Ii
1+Ji +αj Ii
(13)
for some αi ∈ [0, 1] satisfying αi Si + ᾱj Ii > Ji , and again the above holds for (i, j) = (1, 2) and
(i, j) = (2, 1). This achieves the region R̃i by substituting R1 = R1c + R1p and R2 = R2c + R2p ,
and applying the Fourier-Motzkin procedure to eliminate Ric and Rip .
Before proceeding to the proof, we first define the following typical set for Gaussian random
variables X1 , . . . , Xk as:
T(n) (X1 , . . . , Xk )
1
= (x1 , . . . , xk ) : E(Xi Xj ) − ≤ hxi , xj i ≤ E(Xi Xj ) + for all i, j ∈ [1 : k] . (14)
n
Codebook generation: Fix α1 , α2 ∈ [0, 1] and γ > 0. For i = 1, 2, we generate 2nRic i.i.d
zero mean Gaussian sequences Xic (mic ) with variance (1 − γ)ᾱi Pi for each mic ∈ [2nRic ]. Also,
for each mic ∈ [2nRic ], generate 2nRip i.i.d. zero mean Gaussian sequences Xip (mic , mip ) with
variance (1 − γ)αi Pi for each mip ∈ [2nRip ] for i = 1, 2.
Encoding: For i = 1, 2, write message mi as (mic , mip ) where mic ∈ [2nRic ] and mip ∈ [2nRip ].
Transmitter i sends Xi = Xic (mic )+Xip (mic , mip ) if its power is less than Pi , otherwise it sends
zero.
Decoding: We describe the decoding procedure for receiver 1; that of receiver 2 is similar.
First, let
n
o
[
S = (m1c , m1p , m2c ) : (x1c (m1c ), x1p (m1c , m1p ), x2c (m2c ), y1 ) ∈
T(n) (X1c , X1p , X2c , Y1 )
(15)
where the union is over all joint Gaussian distributions X1c , X1p , X2c , Y1 such that (X1c , X1p , X2c ,
Y1 − h11 X1c − h11 X1p − h12 X2c ) are mutually independent.
13
Given y1 , decoder 1 finds
(m̂1c , m̂1p , m̂2c ) =
arg min
ky1 − h11 x1c (m1c ) − h11 x1p (m1c , m1p ) − h12 x2c (m2c )k .
(m1c ,m1p ,m2c )∈S
(16)
If there is more than one minimum, choose between them arbitrarily. The decoder then outputs
the message estimate m̂1 = (m̂1c , m̂1p ).
Analysis of the probability of error: Assume the two users send messages (M1c , M1p ), (M2c ,
M2p ) . We will obtain the average probability of error for decoder 1 and similarly generalize
the results for decoder 2. Define the error event
E0 = {(M1c , M1p , M2c ) ∈
/ S}.
(17)
To consider error events in which a false message set appears correct, we define the set
T = (m1c , m1p , m2c ) ∈ S : kY1 − h11 x1c (m1c ) − h11 x1p (m1c , m1p ) − h12 x2c (m2c )k2
≤ kY1 − h11 x1c (M1c ) − h11 x1p (M1c , M1p ) − h12 x2c (M2c )k2 . (18)
An error can only occur if there exists some (m1c , m1p , m2c ) ∈ T where (m1c , m1p ) 6= (M1c , M1p ).
We divide this event into the following 4 error events:
E1 = {∃ m̃1p 6= M1p : (M1c , m̃1p , M2c ) ∈ T }
(19)
E2 = {∃ m̃1c 6= M1c , m̃1p : (m̃1c , m̃1p , M2c ) ∈ T }
(20)
E3 = {∃ m̃1p 6= M1p , m̃2c 6= M2c : (M1c , m̃1p , m̃2c ) ∈ T }
(21)
E4 = {∃ m̃1c 6= M1c , m̃1p , m̃2c 6= M2c : (m̃1c , m̃1p , m̃2c ) ∈ T } .
(22)
We will prove that the probability of each one of the error events converges to zero as long as
the conditions in (13) are satisfied.
To bound these error events, we state two versions of a Gaussian AVC packing lemma. The
basic approach to these lemmas originates in [3, Lemma 3] and [4, Lemma 1], and the proof
is most similar to that of [3, Lemma 3]. These earlier lemmas showed that a single random
codebook satisfies several desirable properties with high probability. Here, we need to show that
multiple codebooks simultaneously satisfy desirable properties; thus we need a slightly more
general approach. Furthermore, we use Gaussian codewords instead of codewords uniformly
14
distributed on the unit ball. The advantage of Gaussian codewords is that superpositions of
codewords are themselves Gaussian, and we here are dealing with the summation of more than
one codeword. Lemma 5 shows that with high probability, two superposed Gaussian codebooks
yield small probability of error. While the result is stated for two codebooks for simplicity, it
applies for any number of codebooks, and so it will be used to bound events E2 , E3 , and E4 .
Note that Lemma 5 requires Λ < 1; i.e. the jammer’s power must be less than the codeword
power, which is necessary to avoid symmetrization. This requirement leads to the conditions
that Si > Ji and αi Si + ᾱj Ii > Ji . The latter, originating from event E3 , constitutes the main
difference between our inner bound and the Han-Kobayashi inner bound, but we have been
unable to eliminate it.
Lemma 4 differs from Lemma 5 in that it focuses on just one codebook, but takes into account
common randomness at the encoder and decoder. This lemma is used to bound event E1 , because
in this error event, the common message can be used as common randomness. The advantage
of AVC coding with common randomness is that it is not susceptible to symmetrization. Thus,
in Lemma 4 there is no requirement that Λ < 1.
Lemmas 4, 5 and 6 are proved in Appendix B, C and D respectively.
Lemma 4: Fix σ 2 , Λ ≥ 0, N = 2nR and K ≥ n2 . Let Xi (k) for i = 1, . . . , N , k = 1, . . . , K
be independent zero mean Gaussian random vectors with covariance matrix In . Let R satisfy
R < C(1/(Λ + σ 2 )). Define
p2 (x1 (1), . . . , x1 (K), x2 (1), . . . , x2 (K), . . . , xN (1), . . . , xN (K)|w) =
N
K
1 XX
P ∃j 6= i : kxi (k)+w+V−xj (k)k2 ≤ kw+Vk2, xi (k) ∈ T(n) (X), xj (k) ∈ T(n) (X)
N K i=1 k=1
(23)
where V is Gaussian noise distributed as V ∼ N (0, σ 2 In ). There exists ρ > 0 such that
"
#
lim P
n→∞
sup
p2 (X1 (1), . . . , X1 (K), . . . , XN (1), . . . , XN (K)|w) ≤ ρ = 0.
(24)
w:||w||2 ≤nΛ
Lemma 5: Fix θ ∈ [0, 1], σ 2 , Λ ≥ 0, N1 = 2nR1 and N2 = 2nR2 . Let X1 , . . . , XN1 ∈ Rn
and Y1 , . . . , YN2 ∈ Rn be independent zero mean Gaussian random vectors (codebooks) with
covariance matrices θ In and θ̄ In , respectively. Let Λ, R1 , R2 satisfy
15
Λ < 1,
(25)
R1 < C
θ
Λ + σ2
,
θ̄
,
R2 < C
Λ + σ2
1
R1 + R2 < C
.
Λ + σ2
(26)
(27)
(28)
(n)
Let U be the set of triples (x, y, z) ∈ T (X, Y, Z) for some Gaussian triple (X, Y, Z) where
EX 2 = θ,
EY 2 = θ̄,
(X, Y, Z) are mutually independent.
(29)
Define
p1 (x1 , . . . , xN1 , y1 , . . . , yN2 |w) =
N1 X
N2
1 X
P ∃j1 6= i1 , j2 6= i2 : kxi1 + yi2 + w + V − xj1 − yj2 k2 ≤ kw + Vk2 ,
N1 N2 i =1 i =1
1
2
(xi1 , yi2 , w + V) ∈ U, (xj1 , yj2 , xi1 + yi2 + w + V − xj1 − yj2 ) ∈ U
(30)
where V is Gaussian noise distributed as V ∼ N (0, σ 2 In ). There exists ρ > 0 such that
"
#
lim P
n→∞
sup
w:||w||2 ≤nΛ
p1 (X1 , . . . , XN1 , Y1 , . . . , YN2 |w) ≤ exp(−nρ) = 0.
(31)
Since we are dealing with more than one Gaussian codeword in this paper, we need a new
version of [3, Lemma 3] and [4, Lemma 1] not only for Gaussian vectors, but also for multiple
codebooks. It did not appear possible to use the properties derived from these lemmas on each
codebook individually; instead, we must prove a new lemma establishing joint properties among
more than one codebook. This new lemma (Lemma 6) provides the main properties that the
Gaussian codebooks need to satisfy in order to bound the probability of error event E0 by (33)
and as part of the proof of Lemma 5 by (34)-(36).
Lemma 6: Fix θ ∈ [0, 1], N1 = 2nR1 and N2 = 2nR2 . Given any random variables X, Y, W ,
define the quantity
JX;Y ;W (R1 , R2 ) = max 0, R1 −I(X; W Y ), R2 −I(Y ; W X), R1 +R2 −I(XY ; W )−I(X; Y ) .
(32)
16
Let Xi1 and Yi2 be Gaussian i.i.d. n-length random vectors (codebooks) independent from each
other with zero mean and Cov(Xi1 ) = θ In , Cov(Yi2 ) = θ̄ In where i1 ∈ {1, 2, . . . , N1 } and
i2 ∈ {1, 2, . . . , N2 }. With probability approaching 1 as n → ∞, they satisfy the following, for any
x, y, w where kwk2 ≤ nΛ and any zero mean jointly Gaussian random vector (X, Y, X 0 , Y 0 , W )
with positive definite covariance matrices with diagonals at most (θ, θ̄, θ, θ̄, Λ).
[
1
(n)
(i1 , i2 ) : (xi1 , yi2 , w) ∈
/
T (X, Y, W ) ≤ exp(−nδ()). (33)
N1 N2
(X,Y,W ) mutually independent:
EX 2 =θ,EY 2 =θ̄,EW 2 ≤Λ
(i1 , i2 ) : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
≤ exp n JX 0 ;Y 0 ;W (R1 , R2 ) + δ()
(34)
(i1 , i2 ) : (x, y, xi1 , yi2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) ≤ exp n JX 0 ;Y 0 ;XY W (R1 , R2 ) + δ()
(35)
1
(i1 , i2 ) : (xi1 , yi2 , xj1 , yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) for some j1 6= i1 , j2 6= i2
N1 N2
≤ 8 exp{−nδ()/4}
if JX 0 ;Y 0 ;W (R1 , R2 ) ≤ I(XY ; X 0 Y 0 W ) − 2δ().
(36)
(n,k)
We now consider each of the five error events, beginning with E0 . Define set T
S
(n)
T (X1 , . . . , Xk )
as
over all joint Gaussian distributions X1 , . . . , Xk such that (X1 , . . . , Xk )
are mutually independent. For every > 0 , we have
P(E0 ) = P{(M1c , M1p , M2c ) ∈
/ S}
n
o
[
(n)
= P (x1c (M1c ), x1p (M1c , M1p ), x2c (M2c ), Y1 ) ∈
/
T (X1c , X1p , X2c , Y1 )
= P (x1c , x1p , x2c , h12 x2p + g1 w1 + V1 ) ∈
/ T(n,4)
≤ P (x1c , x1p , x2c , x2p , w1 , V1 ) ∈
/ T(n,6)
n
o
(n,5)
≤ P (x1c , x1p , x2c , x2p , w1 ) ∈
/ T0
n
o
(n,5)
+ P (x1c , x1p , x2c , x2p , w1 , V1 ) ∈
/ T(n,6) (x1c , x1p , x2c , x2p , w1 ) ∈ T0
(37)
(38)
(39)
(40)
(41)
where the union in (38) is exactly the one in set S definition (15). (40) follows because if
(x1c , x1p , x2c , x2p , w1 , V1 ) is typical for independent distributions then (x1c , x1p , x2c , h12 x2p +
g1 w1 +V1 ) would be typical. The probabilities in (41) follows from the fact that if (x1c , x1p , x2c ,
17
(n,5)
x2p , w1 ) ∈
/ T0
(n,6)
then (x1c , x1p , x2c , x2p , w1 , V1 ) ∈
/ T
. Finally, as n → ∞ the first term in
(41) vanishes exponentially by using the general version of Lemma 6-(33), and the second term
in (41) tends to zero by using conditional typicality lemma (see (70) in appendix C). Then,
P(E0 ) tends to zero as n → ∞.
To bound the probability of event E1 , we apply Lemma 4 with the following:
•
i = m1p , j = m̃1p , k = m1c ,
•
11 x1p (m1c ,m1p )
,
xi (k) = h√
2
•
11 x1p (m1c ,m̃1p )
,
xj (k) = h√
2
•
V=
•
w=√
(1−γ)α1 σ S1
(1−γ)α1 σ S1
h12 x2p (M2c ,M2p )+V1
√
(1−γ)α1 σ 2 S1
g1 w1
(1−γ)α1 σ 2 S1
,
.
In this case, K = 2nR1c ≥ n2 for sufficiently large n as long as R1c > 0. Note that event E1
occurs if
kh11 X1p (m1c , m1p ) + g1 w1 + h12 X2p (M2c , M2p ) + V1 − h11 X1p (m1c , m̃1p )k2
Thus, by Lemma 4, if R1p
≤ kg1 w1 + h12 X2p (M2c , M2p ) + V1 k2 . (42)
(1−γ)α1 S10
(1−γ)α1 S1
< C 1+J1 +(1−γ)α2 I1 = C 1+(1−γ)α2 I 0 , then with high probability
1
the codebook X1p will be such that P(E1 ) → 0 as n → ∞.
We now bound event E2 by applying Lemma 5 with the following particularizations:
•
i1 = m1c , i2 = (m1c , m1p ), j1 = m̃1c , j2 = (m̃1c , m̃1p ),
•
h11 x1c (m1c )
1p )
x i1 = √
, yi2 = h11√x1p (m1c ,m
,
2
2
•
h11 x1c (m̃1c )
xj1 = √
, yj2 = h11√x1p (m̃1c ,2m̃1p ) ,
2
•
V=
•
w=√
(1−γ)σ S1
(1−γ)σ S1
(1−γ)σ S1
h12 x2p (M2c ,M2p )+V1
√
(1−γ)σ 2 S1
g1 w1
(1−γ)σ 2 S1
.
(1−γ)σ S1
,
18
Note that event E2 occurs if
kh11 X1c (m1c )+h11 X1p (m1c , m1p )+w+V−h11 X1c (m̃1c )−h11 X1p (m̃1c , m̃1p )k2 ≤ kw+Vk2 .
Therefore, we can conclude by Lemma 5 that with high probability as n → ∞, P(E2 ) → 0 if
J1
S1
< 1,
R1c < C
(1−γ)ᾱ1 S1
1+J1 +(1−γ)α2 I1
(43)
R1p < C
(1−γ)α1 S1
1+J1 +(1−γ)α2 I1
(44)
R1c + R1p < C
(1−γ)S1
1+J1 +(1−γ)α2 I1
.
(45)
Similarly, the probability of event E3 can be bounded using Lemma 5 as long as we have
α1 S1 + ᾱ2 I1 > J1 , (44),
ᾱ2 I1
R2c < C 1+J(1−γ)
1 +(1−γ)α2 I1
1 S1 +ᾱ2 I1 )
R1p + R2c < C (1−γ)(α
.
1+J1 +(1−γ)α2 I1
(46)
(47)
Finally, the probability of event E4 may be bounded using Lemma 5 under the conditions S1 +
ᾱ1 S1 +ᾱ2 I1 )
and R1c + R1p + R2c <
ᾱ2 I1 > J1 , (43), (44), (45), (46), (47), R1c + R2c < C (1−γ)(
1+J1 +(1−γ)α2 I1
(1−γ)(S1 +ᾱ2 I1 )
. Note that in this case we use a version of Lemma 5 for three independent
C 1+J
1 +(1−γ)α2 I1
codebooks rather than two. We finally get all equations in (13) as γ → 0.
VII. C ONCLUSION
We provided inner and outer bounds for the capacity region of the Gaussian interference
channel in the presence of malicious jammers. We showed that if input power is less than the
jammers’ power, then the capacity region is zero. Otherwise, both our inner and outer bounds
correspond to existing bounds with the noise variance increased by the jammers’ received power,
except that our inner bound has an additional constraint compared to the classical Han-Kobayashi
bound. These bounds allowed us to recover most existing results for the GIC with no jammer,
with the exception of the half-bit gap, which we have been unable to prove in general. These
results include the symmetric DoF of our channel as signal-to-noise ratio tends to infinity along
with the interference-to-noise ratio and the jammer-to-noise ratio. To prove our achievability
result, we employed three novel lemmas, including new versions of the packing lemma for
multiple Gaussian codebooks. Extensions to more than two users should be straightforward. We
19
believe that our new packing lemmas may be applicable to other network information theory
problems in the presence of a malicious intruder.
A PPENDIX A
P ROOF OF P ROPOSITION 1
First, we prove that C ⊆ CG . Consider rate pair (R10 , R20 ) ∈ C meaning that there exists a
0
0
2nR1 , 2nR2 , n code that yields an arbitrary small probability of error for any possible adversary
action of two independent jammers. Now, we must show that this same code will also work for
G jammers. In the G jammer model, let w1 , . . . , wG be any jamming signals. We may define
equivalent jamming signals for the model with two independent jammers as
w10 =
g11 w1 + g12 w2 + . . . + g1G wG
g1
w20 =
g21 w1 + g22 w2 + . . . + g2G wG
.
g2
and
Note that the received signal in the G jammer model is identical to that in the 2 jammer
model with jamming signals w10 , w20 . Moreover, in order to show that w10 and w20 satisfy power
constraints, we have
kwi0 k2 =
kgi1 w1 + gi2 w2 + . . . + giG wG k2
|gi |2
(|gi1 |kw1 k + |gi2 |kw2 k + . . . + |giG |kwG k)2
≤
|gi |2
√
√
√ 2
|gi1 | nΛ + |gi2 | nΛ + . . . + |giG | nΛ
≤
|gi |2
(48)
(49)
(50)
(|gi1 | + |gi2 | + . . . + |giG |)2
≤ nΛ
|gi |2
(51)
= nΛ
(52)
where i = 1, 2, and 52 follows from the assumption in the proposition. Therefore, the probability
of error under the G jammer model is at most that of the 2 jammer model.
Now, we prove CG ⊆ C . Let rate (R1 , R2 ) ∈ CG . Therefore, there exists a sequence of
2nR1 , 2nR2 , n code that has arbitrary small probability of error PeG for any possible adversary
20
actions with G jammers. Now, if we use this code for two-jammer scenario Fig. 1, the probability
of error at decoder i = 1, 2 is given as
Pei = max
P(M̂i 6= Mi )
0
(53)
wi
=
max
w1 ,w2 ,...,wG
P(M̂i 6= Mi )
(54)
where the last equality follows because of the same power constraints kwj k2 ≤ nΛ and kwi0 k2 ≤
nΛ (52) for j = 1, 2, . . . , G and i = 1, 2 in both models meaning that the set of received jammer
signals gi1 w1 + gi2 w2 + . . . + giG wG or gi wi0 are identical at each decoder. Note that we have
the assumption |gi1 | + |gi2 | + . . . + |giG | = |gi | for i = 1, 2. By the equivalent expression for Pei
in (54), the probability of error in the G jammer model can be lower bounded by
PeG ≥ max{Pe1 , Pe2 }.
(55)
In addition, the overall probability of error is upper bounded by
Pe(n) ≤ Pe1 + Pe2 .
(56)
Since PeG → 0, from (55) both Pe1 and Pe2 must tend to zero, too. Therefore, the sum in (56)
(n)
also tends to zero, so the overall probability of error with two jammers Pe
vanishes as n → ∞.
A PPENDIX B
P ROOF OF L EMMA 4
We prove this lemma using a random code reduction, as in [16, Lemma 12.8]. We first show
that a Gaussian codebook independent of the jammer’s signal achieves small probability of error,
and then we show that a finite number of deterministic codebooks achieve essentially the same
probability.
Let X1 , . . . , XN be Gaussian random vectors with zero mean and covariance In . We will
prove that, for any i ∈ [N ] and any w such that kwk2 ≤ nΛ
P ∃j 6= i : kXi + w + V − Xj k2 ≤ kw + Vk2 → 0
(57)
as n → ∞, where V ∼ N (0, σ 2 In ). To prove this, we adopt the basic approach of [17]. In
particular, let Z = w + V, and let U be a unitary matrix that maps Z to (kZk, 0, . . . , 0). Then
we may write
P ∃j 6= i : kXi + Z − Xj k2 ≤ kZk2 = P ∃j 6= i : kU Xi + U Z − U Xj k2 ≤ kU Zk2
(58)
21
= P ∃j 6= i : kXi + U Z − Xj k2 ≤ kU Zk2
(59)
where (59) follows from the spherical symmetry of the codebook distribution. Now if we define,
for any Σ > 0,
√
e(Σ) = P{∃j 6= i : kXi + ( nΣ, 0, . . . , 0) − Xj k2 ≤ nΣ}
(60)
then the probability in (59) may be written as Ee(kZk2 ). Note that for any δ,
lim P kZk2 − n(σ 2 + Λ) > nδ} → 0.
(61)
n→∞
Moreover, e(Σ) is non-decreasing in Σ. Thus, for any δ > 0, if we let Ṽ ∼ N (0, σ 2 + Λ + δ), for
sufficiently large n we have Ee(kZk2 ) ≤ Ee(kṼk2 ). Now, Ee(kṼk2 ) is simply the probability of
error for a Gaussian channel with noise variance σ 2 + Λ + δ. Since Gaussian codebooks achieve
capacity for Gaussian channels with minimum distance decoding, this quantity vanishes with n
as long as
R<C
1
2
σ +Λ+δ
(62)
which holds for small enough δ by the assumption that R < C( σ21+Λ ). This proves (57).
Now let Xi (k) for i = 1, . . . , N and k = 1, . . . , K be independent Gaussian vectors with zero
mean and covariance In . For any i ∈ [N ], k ∈ [K], and w such that kwk2 ≤ nΛ, let
n
E(k, i, w) = P ∃j 6= i : kXi (k) + w + V − Xj (k)k2 ≤ kw + Vk2 ,
(n)
(n)
Xi (k) ∈ T0 , Xj (k) ∈ T0
o
X1 (k), . . . , XN (k) . (63)
To prove the lemma, we need to show that, for any > 0
(
)
N
K
[
1 XX
lim P
E(k, i, w) >
→ 0.
n→∞
N
K
2
w:kwk ≤nΛ
(64)
i=1 k=1
From (57), we know that for any δ > 0 and sufficiently large n for any k, i, w, we have
EE(k, i, w) ≤ δ (The conditions on Xi and Xj only decrease the probability.) Thus, for fixed i
and w we have
(
)
K
n PK
o
1 X
E(k,i,w)
K/2
k=1
P
E(k, i, w) > /2 = P 2
>2
K k=1
−K/2
≤2
K
Y
k=1
E2E(k,i,w)
(65)
(66)
22
≤ 2−K/2 (1 + EE(1, i, w))K
(67)
= 2−K(/2−log(1+δ))
(68)
where (66) holds by Markov’s inequality, and (67) holds since 2t ≤ 1 + t if t ∈ [0, 1]. Thus, if
√
we let w1 , . . . , wL be any finite set of vectors with norm at most nΛ, we may apply the union
bound to find
(
)
K
[
1 X
P
E(k, i, wl ) >
≤ LN 2−K( 2 −log(1+δ)) .
K k=1
2
l∈[L]
(69)
i∈[N ]
In particular, let w1 , . . . , wL be a ν-dense subset of points in the sphere of radius
√
nΛ. There
exists such a set with L = 2nρ for some ρ. Since E(k, i, w) is continuous in w, for sufficiently
small ν, if the probability of error for all wl is at most /2, then the probability of error for all
w is at most . Thus we may bound the probability in (64) by
2nρ 2nR 2−K(/2−log(1+δ)) .
As long as δ is small enough so that /2 − log(1 + δ) > 0 and K/n → ∞, this probability
vanishes in n.
A PPENDIX C
P ROOF OF L EMMA 5
Throughout the appendices, we use the following conditional typicality lemma and joint
typicality lemma for Gaussian random variables; their proofs easily follow from the corresponding
proofs in [15] for discrete memory-less random variables.
(n)
Conditional Typicality Lemma: Let (X, Y ) ∼ f (x, y). Suppose that x ∈ T (X) and Y ∼
Q
f (y|x) = ni=1 fY |X (yi |xi ). Then, for every > 0 ,
lim P{(x, Y) ∈ T(n) (X, Y )} = 1.
n→∞
(70)
Joint Typicality Lemma: Let (X, Y, Z) ∼ f (x, y, z). If (x̃, ỹ) is a pair of arbitrary sequences
Q
and Z̃ ∼ ni=1 fZ|X (z̃i |x̃i ) then there exists δ() > 0 that tends to zero as → 0 such that
P{(x̃, ỹ, Z̃) ∈ T(n) (X, Y, Z)} ≤ exp(−n(I(Y ; Z|X) − δ())).
(71)
23
We apply Lemma 6 to assume the two codebooks satisfy (33)–(36). To prove (31), first note
(n)
that by (33), with high probability (xi1 , yi2 , w) ∈ T0 (X, Y, W ) where (X, Y, W ) are mutually
independent, and
EX 2 = θ,
EY 2 = θ̄,
EW 2 ≤ Λ.
(72)
Thus, by the conditional typicality lemma, for every > 0 with high probability (xi1 , yi2 , w, V) ∈
(n)
T (X, Y, W, V ) where (X, Y, W, V ) are mutually independent, and EV 2 = σ 2 . This implies
that (xi1 , yi2 , w + V) ∈ U, and also that
kw + Vk2 ≤ n(Λ + σ 2 + ).
(73)
~ = (XY X 0 Y 0 W V ). For i1 , i2 , w and any Gaussian distribution on X,
~
We use shorthand X
define
n
o
~ for some j1 6= i1 , j2 6= i2 .
eX~ (i1 , i2 , w) = P (xi1 , yi2 , xj1 , yj2 , w, V) ∈ T(n) (X)
We need to show that for some δ > 0,
1 X
N1 N2
eX~ (i1 , i2 , w) ≤ exp(−nρ)
(74)
(75)
i1 ,i2
~ where
for all X
(X, Y, W, V ) are mutually independent,
EX 2 = EX 02 = θ,
EW 2 ≤ Λ,
EY 2 = EY 02 = θ̄,
EV 2 = σ 2
E(X + Y + W + V − X 0 − Y 0 )2 ≤ Λ + σ 2
(X 0 , Y 0 , X + Y + W + V − X 0 − Y 0 ) are mutually independent.
(76)
(77)
(78)
(79)
Observe that if I(XY V ; W X 0 Y 0 ) = 0, then we would have
Λ + σ 2 ≥ E(X + Y + W + V − X 0 − Y 0 )2
(80)
= E(X + Y + V )2 + E(W − X 0 − Y 0 )2
(81)
≥ 1 + σ2.
(82)
But this cannot happen since Λ < 1 by (25). Thus, there exists η > 0 where
I(XY V ; W X 0 Y 0 ) ≥ η.
(83)
24
Recalling that I(XY V ; W ) = 0, this implies
I(XY V ; X 0 Y 0 |W ) ≥ η.
(84)
Also, by (36), we may restrict ourselves to distributions where
JX 0 ;Y 0 ;W (R1 , R2 ) ≥ I(XY ; X 0 Y 0 W ) − 2δ().
We may now write, for any (i1 , i2 ) and any w
X
eX~ (i1 , i2 , w) ≤
n
o
P (xi1 , yi2 , xj1 , yj2 , w, V) ∈ T(n)
(85)
(86)
(n)
(j1 ,j2 ):(xi1 ,yi2 ,xj1 ,yj2 ,w)∈T
n h
io
≤ exp n JX 0 ;Y 0 ;XY W (R1 , R2 ) − I(V ; X 0 Y 0 |XY W ) + δ() .
(87)
where in (87) we have applied (35), the joint typicality lemma, and the fact that I(V ; XY W ) = 0.
We consider two cases.
Case (a): JX 0 ;Y 0 ;W (R1 , R2 ) = 0. Note that JX 0 ;Y 0 ;XY W (R1 , R2 ) ≤ JX 0 ;Y 0 ;W (R1 , R2 ) so in this
case we also have JX 0 ;Y 0 ;XY W (R1 , R2 ) = 0. By (85), I(XY ; X 0 Y 0 W ) ≤ 2δ(). Thus, from (84)
η ≤ I(XY V ; X 0 Y 0 |W )
(88)
= I(XY ; X 0 Y 0 |W ) + I(V ; X 0 Y 0 |XY W )
(89)
≤ 2δ() + I(V ; X 0 Y 0 |XY W ).
(90)
From (87), we have
eX~ (i1 , i2 , w) ≤ exp{n[−I(V ; X 0 Y 0 |XY W ) + δ()]}
≤ exp{n[−η + 3δ()]}.
(91)
(92)
This vanishes exponentially fast if δ() is sufficiently small.
Case (b): JX 0 ;Y 0 ;W (R1 , R2 ) > 0. This implies that (recalling that I(X 0 ; Y 0 ) = 0)
JX 0 ;Y 0 ;W (R1 , R2 ) = max{R1 − I(X 0 ; W Y 0 ), R2 − I(Y 0 ; W X 0 ), R1 + R2 − I(X 0 Y 0 ; W )}. (93)
By (85), we have
−2δ() ≤ max{R1 −I(X 0 ; W Y 0 ), R2 −I(Y 0 ; W X 0 ), R1 +R2 −I(X 0 Y 0 ; W )}−I(XY ; X 0 Y 0 W ).
(94)
25
Note that
I(X 0 ; W Y 0 ) + I(XY ; X 0 Y 0 W ) ≥ I(X 0 ; W Y 0 ) + I(XY ; X 0 |W Y 0 )
= I(X 0 ; XY W Y 0 ).
(95)
(96)
Similarly
I(Y 0 ; W X 0 ) + I(XY ; X 0 Y 0 W ) ≥ I(Y 0 ; XY W X 0 ),
(97)
I(X 0 Y 0 ; W ) + I(XY ; X 0 Y 0 W ) ≥ I(X 0 Y 0 ; XY W ).
(98)
Thus
−2δ() ≤ max{R1 −I(X 0 ; XY W Y 0 ), R2 −I(Y 0 ; XY W X 0 ), R1 +R2 −I(X 0 Y 0 ; XY W )}. (99)
Hence
JX 0 ;Y 0 ;XY W (R1 , R2 )
≤ max{R1 − I(X 0 ; XY W Y 0 ), R2 − I(Y 0 ; XY W X 0 ), R1 + R2 − I(X 0 Y 0 ; XY W )} + 2δ().
(100)
By (87), we have
1
log eX~ (i1 , i2 , w)
n
≤ JX 0 ;Y 0 ;XY W (R1 , R2 ) − I(V ; X 0 Y 0 |XY W ) + δ()
(101)
≤ max{R1 − I(X 0 ; XY W Y 0 ), R2 − I(Y 0 ; XY W X 0 ), R1 + R2 − I(X 0 Y 0 ; XY W )}
− I(V ; X 0 Y 0 |XY W ) + 3δ()
(102)
≤ max{R1 − I(X 0 ; XY W Y 0 V ), R2 − I(Y 0 ; XY W X 0 V ), R1 + R2 − I(X 0 Y 0 ; XY W V )}
+ 3δ().
(103)
Let Z = X + Y + W + V − X 0 − Y 0 . Recalling that (X 0 , Y 0 , Z) are mutually independent and
EZ 2 ≤ Λ + σ 2 , we have
I(X 0 ; XY W Y 0 V ) ≥ I(X 0 ; X + Y + W + V − Y 0 )
(104)
= I(X 0 ; X 0 + Z)
(105)
= h(X 0 + Z) − h(X 0 + Z|X 0 )
(106)
26
1
log 2πe(θ + EZ 2 ) − h(Z|X 0 )
2
1
1
= log 2πe(θ + EZ 2 ) − log 2πeEZ 2
2
2
θ
=C
EZ 2
θ
≥C
.
Λ + σ2
=
(107)
(108)
(109)
(110)
Similarly
0
0
I(Y ; XY SX V ) ≥ C
θ̄
Λ + σ2
.
(111)
Moreover,
I(X 0 Y 0 ; XY W V ) ≥ I(X 0 Y 0 ; Z + X 0 + Y 0 )
(112)
= h(Z + X 0 + Y 0 ) − h(Z)
1
=C
EZ 2
1
≥C
.
Λ + σ2
(113)
(114)
(115)
Thus
n h
eX~ (i1 , i2 , w) ≤ exp n max R1 − C
θ
Λ+σ 2
, R2 − C
θ̄
Λ+σ 2
, R1 + R2 − C
1
Λ+σ 2
io
+ 3δ() .
(116)
Therefore, eX~ (i1 , i2 , w) is exponentially vanishing if δ() is sufficiently small and (26)–(28)
hold.
A PPENDIX D
P ROOF OF L EMMA 6
Since we frequently use [3, Lemma A1] throughout this appendix, we provide the statement
of this lemma here.
Lemma 7: Let Z1 , . . . , ZN be arbitrary random variables, and let fi (Z1 , . . . , Zi ) be arbitrary
with 0 ≤ fi ≤ 1, i = 1, . . . , N . Then the condition
E [fi (Z1 , . . . , Zi )|Z1 , . . . , Zi−1 ] ≤ a a.s., i = 1, . . . , N,
(117)
27
implies that
(
P
)
N
1 X
fi (Z1 , . . . , Zi ) > t ≤ exp{−N (t − a log e)}.
N i=1
(118)
Let Xi1 and Yi2 be Gaussian i.i.d. n-length random vectors (codebooks) independent from
(n)
(n)
each other with Var(X) = θ and Var(Y ) = θ̄. Fix x ∈ T (X), y ∈ T (Y ), w ∈ S n and
a covariance matrix Cov(X, Y, X 0 , Y 0 , W ) ∈ V 5×5 such that S n is a ν-dense subset of Rn for
w such that ||w||2 ≤ nΛ, and V 5×5 is a ν-dense subset of R5x5 for positive definite covariance
matrices with diagonals at most (θ, θ̄, θ, θ̄, Λ).
Let
[
An (X, W ) =
T(n) (X, W )
(119)
X,W independent
EX 2 =θ,EW 2 ≤Λ
and
[
An (X, Y, W ) =
T(n) (X, Y, W ).
(120)
(X,Y,W ) mutually independent
EX 2 =θ,EY 2 =θ̄,EW 2 ≤Λ
To prove (33), first define hi1 as a function of X1 , . . . , Xi1 as follows:
1, if (Xi , w) ∈
/ An (X, W )
1
hi1 (X1 , . . . , Xi1 ) =
0, otherwise .
(121)
Then the expected value of hi1 is given as
E[hi1 (X1 , . . . , Xi1 )|X1 , . . . , Xi1 −1 ] = E [1 ((Xi1 , w) ∈
/ An (X, W ))]
(122)
= P {(Xi1 , w) ∈
/ An (X, W )}
(123)
1
1
kwk2 ≥ Λ + + P
|hXi1 , wi| ≥
≤P
n
n
1
2
(124)
+ P | kXi1 k − θ| ≥
n
≤ exp(−nr1 ())
(125)
where (124) follows since the union in An (X, W ) is over independent X, W such that EX 2 = θ,
EW 2 ≤ Λ, and directly from the definition of typical set in (14) we obtain that it only suffices
to find the probability of those (Xi1 , w) that simultaneously do not satisfy the conditions of the
union and the typical set definition’s inequalities. The upper bound in (125) follows since the first
28
term in (124) is equal to zero (assumption kwk2 ≤ nΛ), and the other terms are exponentially
vanishing by using the large deviation theory for Gaussian distributions X with positive function
r1 ().
Now, using Lemma 7, we have
1
n
|{i1 : (Xi1 , w) ∈
/ A (X, W )}| > exp(−nδ1 ())
P
N1
≤ exp{−N1 [exp(−nδ1 ()) − exp(−nr1 ()) log e]} (126)
≤ exp(− exp(nρ1 ())).
(127)
where the last inequality follows as long as δ1 () < r1 () for some ρ1 () > 0. Thus, the
probability vanishes doubly exponentially as n → ∞, and with high probability we have
1
|{i1 : (xi1 , w) ∈
/ An (X, W )}| ≤ exp(−nδ1 ()).
N1
(128)
Fix xi1 , and for any i2 define h̃i2 as
h̃i2 (Y1 , . . . , Yi2 ) =
1
N1
X
1 ((xi1 , Yi2 , w) ∈/ An (X, Y, W )) .
(129)
i1 :(xi1 ,w)∈ An
(X,W )
The expected value of h̃i2 can be written as
i
h
X
1
P {(xi1 , Yi2 , w) ∈
/ An (X, Y, W )}
E h̃i2 (Y1 , . . . , Yi2 )|Y1 , . . . , Yi2 −1 =
N1
i1 :(xi1 ,w)∈ An
(X,W )
1
1
2
kwk ≥ Λ + + P
|hxi1 , wi| ≥
≤P
n
n
1
1
2
+P
kxi k − θ ≥ + P
|hYi2 , wi| ≥
n 1
n
1
1
2
+P
|hYi2 , xi1 i| ≥ + P
kYi2 k − θ̄ ≥
n
n
(130)
≤ exp(−nr2 ())
(131)
where (130) follows directly from the definition of typical set and the union’s conditions, and
(131) follows since the first three terms in (130) are equal to 0 due to the assumptions and the
other terms in (130) vanish exponentially by the large deviation theory for Gaussian distributions
Y with positive function r2 ()
29
Using Lemma 7, we have
1
X
P
N1 N2
n
i1 :(xi1 ,w)∈ A (X,W )
|{i2 : (xi1 , Yi2 , w) ∈
/ An (X, Y, W )}| > exp(−nδ2 ())
≤ exp{−N2 (exp(−nδ2 () − exp(−nr2 ()) log e))}
(132)
≤ exp(− exp(nρ2 ()))
(133)
where (133) follows if δ2 () < r2 () for some ρ2 () > 0. Therefore, with probability approaching
1, as n → ∞ we have
X
1
N1 N2
|{i2 : (xi1 , yi2 , w) ∈
/ An (X, Y, W )}| ≤ exp(−nδ2 ()).
(134)
i1 :(xi1 ,w)∈ An
(X,W )
Eventually, we easily use (128) and (134) to bound the fraction in (33) as follows:
1
|{(i1 , i2 ) :(xi1 , yi2 , w) ∈
/ An (X, Y, W )}|
N1 N2
X
1
|{i2 : (xi1 , yi2 , w) ∈
/ An (X, Y, W )}|
≤
N1 N2
n
i1 :(xi1 ,w)∈
/ A (X,W )
+
1
N1 N2
X
|{i2 : (xi1 , yi2 , w) ∈
/ An (X, Y, W )}|
(135)
i1 :(xi1 ,w)∈ An
(X,W )
≤ exp(−nδ1 ()) + exp(−nδ2 ())
(136)
≤ exp(−nδ()).
(137)
This proves (33).
Next, define function fi1 as follows:
fi1 (X1 , . . . , Xi1 ) =
1,
if (Xi1 , w) ∈ T (X 0 , W )
0,
otherwise .
(n)
(138)
Then, by joint typicality lemma we get
E[fi1 (X1 , . . . , Xi1 )|X1 , . . . , Xi1 −1 ] = E 1 (Xi1 , w) ∈ T(n) (X 0 , W )
= P (Xi1 , w) ∈ T(n) (X 0 , W )
≤ exp(−nI(X 0 , W ) + nδ()).
Thus, using Lemma 7, we have
P
i1 : (Xi1 , w) ∈ T(n) (X 0 , W )
> exp n|R1 − I(X 0 , W )|+ + n2δ()
(139)
(140)
(141)
30
≤ exp − exp n|R1 − I(X 0 , W )|+ + n2δ() +exp(−nI(X 0 , W ) + nδ() + nR1 ) log e . (142)
If R1 > I(X 0 , W ), (142) becomes less than doubly exponentially function exp(− exp(nσ()))
where σ() > 0 since for large enough n we obtain exp(nδ()) > log e. Now, if R1 ≤ I(X 0 , W )
then (142) is less than
exp{− exp(n2δ()) + exp(nR1 + nδ() − nI(X 0 , W )) log e} ≤ exp(− exp(nσ()))
where σ() > 0. In both cases, this doubly decreasing exponential function vanishes as n → ∞.
Hence, with high probability, we have
i1 : (xi1 , w) ∈ T(n) (X 0 , W )
≤ exp n |R1 − I(X 0 ; W )|+ + δ() .
(143)
For any i2 ,
P (xi1 , Yi2 , w) ∈ T(n) (X 0 , Y 0 , W ) for some i1
X
≤
P (xi1 , Yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
(144)
(n)
i1 :(xi1 ,w)∈T (X 0 ,W )
≤
i1 : (xi1 , w) ∈ T(n) (X 0 , W )
max P (x̂, Yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
x̂
≤ exp n |R1 − I(X 0 ; W )|+ − I(Y 0 ; X 0 W ) + δ() ,
(145)
(146)
where (144) follows since if (xi1 , Yi2 , w) is typical then (xi1 , w) is always typical and (146)
follows from (143) and joint typicality lemma. Thus, applying Lemma 7 in the same way that
we used it to get (143), with high probability we attain
i2 : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W ) for some i1
n h
≤ exp n R2 + |R1 − I(X 0 ; W )|+ − I(Y 0 ; X 0 W )
(n)
+
io
+ δ() . (147)
(n)
Since (xi1 , yi2 , w) ∈ T (X 0 , Y 0 , W ) implies (yi2 , w) ∈ T (Y 0 , W ), we have the simpler
bound
i2 : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W ) for some i1
(148)
i2 : (yi2 , w) ∈ T(n) (Y 0 , W )
≤ exp n |R2 − I(Y 0 ; W )|+ + δ() ,
≤
(149)
31
where (149) is similar to (143). Moreover, if we replace vector w by (yi2 , w) in (143), then for
any i2 we get
i1 : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
≤ exp n |R1 − I(X 0 ; Y 0 W )|+ + δ() .
(150)
Therefore,
(i1 , i2 ) : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
X
≤
{i1 : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
(n)
i2 :(xi1 ,yi2 ,w)∈T
(151)
(X 0 ,Y 0 ,W ) for some i1
n h
≤ exp n R2 + |R1 − I(X 0 ; W )|+ − I(Y 0 ; X 0 W )
+
0
0
+
+ |R1 − I(X ; Y W )| + δ()
io
(152)
where (152) follows from (147) and (150). If R1 ≤ I(X 0 ; Y 0 W ), then we have
(i1 , i2 ) : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
n h
io
+
0
+
0
0
≤ exp n R2 + |R1 − I(X ; W )| − I(Y ; X W ) + δ()
(153)
n h
io
= exp n max 0, R2 − I(Y 0 ; X 0 W ), R1 + R2 − I(X 0 Y 0 ; W ) − I(X 0 ; Y 0 ) + δ()
(154)
= exp n JX 0 ;Y 0 ;W (R1 , R2 ) + δ() .
(155)
Using (149) and (150), we alternatively bound
(i1 , i2 ) : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
≤ exp n |R2 − I(Y 0 ; W )|+ + |R1 − I(X 0 ; Y 0 W )|+ + δ() . (156)
In particular, if R1 > I(X 0 ; Y 0 W ) then we have
(i1 , i2 ) : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
≤ exp n |R2 − I(Y 0 ; W )|+ + R1 − I(X 0 ; W |Y 0 ) + δ()
n h
io
= exp n max R1 − I(X 0 ; W |Y 0 ), R1 + R2 − I(X 0 Y 0 ; W ) + δ()
= exp n JX 0 ;Y 0 ;W (R1 , R2 ) + δ() .
(157)
(158)
(159)
This proves (34). An identical calculation with (X, Y, W ) in place of W gives (35). We indeed
use Lemma 7 to prove that the complement of two events (34) and (35) happen with decreasingly
doubly exponential probability for sufficiently large n as follows:
32
P
(i1 , i2 ) : (xi1 , yi2 , w) ∈ T(n) (X 0 , Y 0 , W )
> exp n JX 0 ;Y 0 ;W (R1 , R2 ) + δ()
< exp(− exp(nσ())), (160)
P
(i1 , i2 ) : (x, y, xi1 , yi2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W )
> exp n JX 0 ;Y 0 ;XY W (R1 , R2 ) + δ()
< exp(− exp(nσ())). (161)
Now, in order to prove (36), first let
A(i1 ,i2 ) = (j1 , j2 ) : j1 < i1 , j2 6= i2 , (xj1 , Yj2 , w) ∈ T(n) (X 0 , Y 0 , W ) ,
A(i ,i ) , if |A(i ,i ) | ≤ exp {n (JX 0 ;Y 0 ;W (R1 , R2 ) + δ())}
1 2
1 2
Ã(i1 ,i2 ) =
∅,
otherwise,
(162)
(163)
where Ã(i1 ,i2 ) is defined for fixed value of x1 , . . . , xi1 −1 and random Y1 , . . . , Yj2 , i.e. Ã(i1 ,i2 ) is
a random set. Define
n
o
gi1 (x1 , . . . , xi1 ) = P (xi1 , Yi2 , xj1 , Yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) for some (j1 , j2 ) ∈ Ã(i1 ,i2 )
(164)
and
g̃i1 (x1 , . . . , xi1 ) =
1,
if gi1 (x1 , . . . , xi1 ) > exp(−nδ()/2)
∅,
otherwise.
(165)
It is notable that since by (34)
P
(j1 , j2 ) : (xj1 , yj2 , w) ∈ T(n) (X 0 , Y 0 , W )
> exp{n(JX 0 ;Y 0 ;W (R1 , R2 ) + δ())}
(166)
tends to zero as n grows, the probability that Ã(i1 ,i2 ) 6= A(i1 ,i2 ) for some i1 , i2 vanishes as n → ∞.
Finding the expected values of gi1 and g̃i1 , we have
E[gi1 (X1 , . . . , Xi1 )|X1 = x1 , . . . , Xi1 −1 = xi1 −1 ]
n
o
= P (Xi1 , Yi2 , xj1 , Yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) for some (j1 , j2 ) ∈ Ã(i1 ,i2 )
X
≤
P (Xi1 , Yi2 , xj1 , Yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W )
(167)
(168)
(j1 ,j2 )∈Ã(i1 ,i2 )
≤ exp(nJX 0 ;Y 0 ;W (R1 , R2 ) + δ()) max P (Xi1 , Yi2 , x̂, ŷ, w) ∈ T(n) (X, Y, X 0 , Y 0 , W )
x̂,ŷ
(169)
33
≤ exp{−n(−JX 0 ;Y 0 ;W (R1 , R2 ) + I(XY ; X 0 Y 0 W ) − δ())}
(170)
≤ exp(−nδ())
(171)
where (169) follows since by (163) the size of Ã(i1 ,i2 ) is almost surely less than exp(nJX 0 ;Y 0 ;W (R1 ,
R2 ) + δ()), (170) follows by joint typicality lemma, and (171) follows by the condition in (36).
Moreover, by Markov’s inequality we have
E[g̃i1 (X1 , . . . , Xi1 )|X1 , . . . , Xi1 −1 ] = P{gi1 (X1 , . . . , Xi1 ) > exp(−nδ()/2)|X1 , . . . , Xi1 −1 }
≤
E[gi1 (X1 , . . . , Xi1 )|X1 , . . . , Xi1 −1 ]
exp(−nδ()/2)
(172)
≤ exp(−nδ() + nδ()/2)
(173)
= exp(−nδ()/2).
(174)
Therefore, using Lemma 7, we have
(
)
N1
1 X
P
g̃i (x1 , . . . , xi1 ) > exp(−nδ()/4)
N1 i =1 1
1
1
|{i1 : gi1 (x1 , . . . , xi1 ) > exp(−nδ()/2)}| > exp(−nδ()/4)
=P
N1
(175)
≤ exp{− exp(nR1 )(exp(−nδ()/4) − exp(−nδ()/2) log e)}
(176)
≤ exp(− exp(nσ())).
(177)
for σ() > 0 i.e. with high probability
1 X
1
g̃i1 (x1 , . . . , xi1 ) =
|{i1 : gi1 (x1 , . . . , xi1 ) > exp(−nδ()/2)}|
N1 i
N1
(178)
1
≤ exp(−nδ()/4).
(179)
Let
f(i1 ,i2 ) (y1 , . . . , yi2 ) =
1,
0,
(n)
if (xi1 , yi2 , xj1 , yj2 , w) ∈ T (X, Y, X 0 , Y 0 , W ),
for some (j1 , j2 ) ∈ Ã(i1 ,i2 ) and j2 < i2
otherwise.
Now, fix an i1 such that gi1 (x1 , . . . , xi1 ) ≤ exp(−nδ()/2). Therefore, we have
E f(i1 ,i2 ) (Y1 , . . . , Yi2 )|Y1 , . . . , Yi2 −1
(180)
34
n
= P (xi1 , Yi2 , xj1 , Yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) for some (j1 , j2 ) ∈ Ã(i1 ,i2 ) and j2 < i2
o
Y1 , . . . , Yi2 −1
(181)
≤ gi1 (x1 , . . . , xi1 )
(182)
≤ exp(−nδ()/2)
(183)
where (182) and (183) follow directly from gi1 definition and our assumption for the gi1 . Thus,
using Lemma 7 we get
P
!
N2
1 X
f(i ,i ) (Y1 , . . . , Yi2 ) > exp(−nδ()/4) ≤ exp(− exp(nσ()))
N2 i =1 1 2
(184)
2
where σ() > 0. If we sum over all i1 ’s, we obtain
N1
X
N2
1 X
f(i ,i ) (Y1 , . . . , Yi2 ) > exp(−nδ()/4)
N2 i =1 1 2
P
i1 =1
!
≤ exp(nR1 − exp(nσ())),
(185)
2
that is this doubly exponential function still tends to zero as n → ∞. Therefore, with probability
approaching 1, for every i1 that gi1 (x1 , . . . , xi1 ) ≤ exp(−nδ()/2) we have
o
1 n
i2 : (xi1 , yi2 , xj1 , yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) for some (j1 , j2 ) ∈ Ã(i1 ,i2 ) and j2 < i2
N2
≤ exp(−nδ()/4). (186)
In general, for all i1 we have
1 n
(i1 , i2 ) : (xi1 , yi2 , xj1 , yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W )
N1 N2
for some (j1 , j2 ) ∈ Ã(i1 ,i2 ) and j2 < i2
o
(187)
N1
1 X
1 n
≤
i2 : (xi1 , yi2 , xj1 , yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W )
N1 i =1 N2
1
o
for some (j1 , j2 ) ∈ Ã(i1 ,i2 ) and j2 < i2
(188)
X
1
1 n
≤ exp(−nδ()/4)+
i2 : (xi1 , yi2 , xj1 , yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W )
N1
N2
i1 :gi1 ≤exp(−nδ()/2)
o
for some (j1 , j2 ) ∈ Ã(i1 ,i2 ) and j2 < i2
(189)
≤ 2 exp(−nδ()/4)
where (189) and (190) follow from (179) and (186), respectively.
(190)
35
We may use this argument to upper bound the probability in (187) for the remain three cases
(j1 < i1 , j2 > i2 ), (j1 > i1 , j2 < i2 ) and (j1 > i1 , j2 > i2 ) by defining different A(i1 ,i2 ) ’s, and
conclude the same decreasing exponential function. Finally, we obtain
1
(i1 , i2 ) : (xi1 , yi2 , xj1 , yj2 , w) ∈ T(n) (X, Y, X 0 , Y 0 , W ) for some j1 6= i1 , j2 6= i2
N1 N2
≤ 8 exp{−nδ()/4} (191)
if we have JX 0 ;Y 0 ;W (R1 , R2 ) ≤ I(XY ; X 0 Y 0 W ) − 2δ().
In order to complete the proof, since for any fixed ν the cardinality of finite set S n is
only increasingly exponentially in n, and the set V 5×5 is finite along with the doubly decreasing
exponential probabilities in (160) and (161), we derive that with probability approaching to 1, all
inequalities in (33), (34), (35) and (36) hold simultaneously for sufficiently large n. Since these
inequalities hold for every element in the finite sets S n and V 5×5 , then for any vector w, x, y and
any given covariance matrix Cov(X, Y, X 0 , Y 0 , W ) (with kxk2 = nθ, kyk2 = nθ̄, kwk2 ≤ nΛ)
which is not in its corresponding ν-dense subset, there exists a point in the corresponding ν-dense
subset that is close enough to it (in its ν distance neighborhood). Now, by using the continuity
properties of all sets, we may conclude that (33), (34), (35) and (36) hold also for any point
which is not in the ν-dense subset.
R EFERENCES
[1] F. Hosseinigoki and O. Kosut, “The gaussian interference channel in the presence of a malicious jammer,” in 2016 54th
Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sept 2016, pp. 679–686.
[2] R. Ahlswede, “Elimination of correlation in random codes for arbitrarily varying channels,” Zeitschrift fr Wahrscheinlichkeitstheorie und verwandte Gebiete, vol. 44, no. 2, pp. 159–175, 1978.
[3] I. Csiszar and P. Narayan, “The capacity of the arbitrarily varying channel revisited: positivity, constraints,” Information
The, vol. 34, no. 2, pp. 181–193, 1988.
[4] ——, “Capacity of the Gaussian arbitrarily varying channel,” Information Theory, IEEE Transactions on, vol. 37, no. 1,
pp. 18–26, Jan 1991.
[5] M. Medard, “Capacity of correlated jamming channels,” in Proc. 35th Annu. Allerton Conf. Communications, Control and
Computing, 1997.
[6] R. W. Yeung and N. Cai, “Network error correction, part I: Basic concepts and upper bounds,” Comm. in Inf. and Syst.,
vol. 6, no. 1, pp. 19–36, 2006.
[7] N. Cai and R. W. Yeung, “Network error correction, part II: Lower bounds,” Comm. in Inf. and Syst., vol. 6, no. 1, pp.
37–54, 2006.
36
[8] S. Shafiee and S. Ulukus, “Mutual information games in multiuser channels with correlated jamming,” IEEE Transactions
on Information Theory, vol. 55, no. 10, pp. 4598–4607, Oct 2009.
[9] S. Mohajer and S. Diggavi, “Gaussian diamond network with adversarial jammer,” in Information Theory Workshop (ITW),
2010 IEEE, 2010, pp. 1–5.
[10] T. Ericson, “Exponential error bounds for random codes in the arbitrarily varying channel,” IEEE Transactions on
Information Theory, vol. 31, no. 1, pp. 42–48, Jan 1985.
[11] T. Han and K. Kobayashi, “A new achievable rate region for the interference channel,” Information Theory, IEEE
Transactions on, vol. 27, no. 1, pp. 49–60, Jan 1981.
[12] R. H. Etkin, D. N. C. Tse, and H. Wang, “Gaussian interference channel capacity to within one bit,” Information Theory,
IEEE Transactions on, vol. 54, no. 12, pp. 5534–5562, Dec 2008.
[13] V. S. Annapureddy and V. V. Veeravalli, “Gaussian interference networks: Sum capacity in the low-interference regime
and new outer bounds on the capacity region,” IEEE Transactions on Information Theory, vol. 55, no. 7, pp. 3032–3050,
July 2009.
[14] G. Bresler and D. Tse, “The two-user Gaussian interference channel: a deterministic view,” Eur. Trans. Telecomm., vol. 19,
no. 4, pp. 333–354, June 2008.
[15] A. E. Gamal and Y. H. Kim, Network information theory.
Cambridge University Press, 2011.
[16] I. Csiszár and J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems.
Cambri, 2011.
[17] A. Lapidoth, “Nearest neighbor decoding for additive non-Gaussian noise channels,” IEEE Transactions on Information
Theory, vol. 42, no. 5, pp. 1520–1529, Sep 1996.
| 7cs.IT
|
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
ws-ijmpc
arXiv:1402.2440v1 [cs.CE] 11 Feb 2014
International Journal of Modern Physics C
c World Scientific Publishing Company
VALIDATION EXPERIMENTS FOR LBM SIMULATIONS OF
ELECTRON BEAM MELTING
REGINA AMMER∗ and ULRICH RÜDE†
Department of Computer Science 10 System Simulation, University of Erlangen-Nuremberg,
Cauerstr. 11, 91058 Erlangen, Germany
∗ [email protected]
† [email protected]
MATTHIAS MARKL⋆ , VERA JÜCHTER† and CAROLIN KÖRNER‡
Chair of Metals Science and Technology, University of Erlangen-Nuremberg,
Martensstr. 5, 91058 Erlangen, Germany
⋆ [email protected]
† [email protected]
‡ [email protected]
Received Day Month Year
Revised Day Month Year
This paper validates 3D simulation results of electron beam melting (EBM) processes
comparing experimental and numerical data. The physical setup is presented which is
discretized by a three dimensional (3D) thermal lattice Boltzmann method (LBM). An
experimental process window is used for the validation depending on the line energy
injected into the metal powder bed and the scan velocity of the electron beam. In the
process window the EBM products are classified into the categories, porous, good and
swelling, depending on the quality of the surface. The same parameter sets are used
to generate a numerical process window. A comparison of numerical and experimental
process windows shows a good agreement. This validates the EBM model and justifies
simulations for future improvements of EBM processes. In particular numerical simulations can be used to explain future process window scenarios and find the best parameter
set for a good surface quality and dense products.
Keywords: 3D thermal lattice Boltzmann method; free surface; electron beam melting;
validation experiments.
PACS Nos.: 11.25.Hf, 123.1K
1. Introduction
Electron beam melting (EBM) is an additive manufacturing method used to produce complex metallic structures layer by layer from metal powder 1 . EBM opens
new opportunities in many industries, ranging from aircraft manufacturers to producers of medical implants. However, until now the parts cannot be manufactured
at sufficient speed to make them economically viable for any but specific very high
1
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
2
ws-ijmpc
Regina Ammer, Matthias Markl, Vera Jüchter, Carolin Körner, Ulrich Rüde
value applications. In order to accelerate the building process and improve the accuracy a better understanding of the beam-powder interaction is necessary. This
can be gained by 3D simulations of the process.
Based on the work of Körner et al.2 we use a 3D thermal LBM for the discretization for the EBM processes. This model includes hydrodynamic effects, like melt
flow, capillarity and wetting, as well as thermal effects, like absorption of the beam
energy, melting and solidification. Detailed information for parallel, optimized 3D
absorption algorithms is found in 3 and the description of the modeling aspects,
e.g., the generation of the Ti-Al6-V4 powder particles is given in 4 . The implementation of the model is embedded in the waLBerla framework (widely applicable
lattice Boltzman solver from Erlangen) which is a lattice Boltzmann based fluid
flow solver with highly parallelized kernels 5,6 . In 4 basic validation examples are
already shown, like the test of the Stefan problem as benchmark for the simulation of solid-liquid phase transition, and modest EBM process examples, e.g., the
melting of a spot regarding the interaction of powder particles and electron beam.
In this paper we extend the validation examples focusing on the EBM processes,
e.g, hatching scenarios, and compare the numerical results with experimental data.
These numerical results demonstrate the good potential of the thermal LBM approach to understand and predict complex processes like the EBM depending on
thermodydnamic as well as on fluid dynamic phenomena.
The remainder of the paper is organized as follows: Section 2 describes the 3D
thermal LBM used for the simulation of the EBM process. The next section defines
line energy, scan velocity, porosity and swelling before showing the experimental
process window. Subsequently, the generation of the numerical process window is
described, shown and compared with the experimental one. Section 4 concludes the
validation experiments and outlines future research topics.
2. Numerical methods
Based on the lattice Boltzmann equation the isothermal lattice Boltzmann method
(LBM) is introduced by 7 as an improvement of its predecessor, the lattice gas
automata (LGA) 8 . LBM is an alternative, mesoscopic approach for the numerical
solution of the Navier-Stokes equations 9 and can be parallalized easier than other
traditional CFD methods whose computation is based on the conservation of macroscopic quantities. LBM has also less computational storage and work requirements
than molecular dynamic methods which consider microscopic physics.
Thermal LB methods are classified into three categories: the multispeed
LBM 10,11 , the double-distribution or multidistribution approach 12,13,14 and hybrid approach where the scalar temperature equation is solved by finite differences
or finite volume methods 15 . The multispeed LBM can be seen as an extension of
the isothermal LBM where the equilibrium distribution function depends also on
the temperature and has higher nonlinear velocity terms. This method suffers from
numerical instabilities which have to be stabilized as it is shown in 16 . An additional
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
ws-ijmpc
Validation Experiments for LBM Simulations of Electron Beam Melting
3
disadvantage is that only one Prandtl number can be simulated by multispeed LBM
which limits the range of applications. The multidistribution LBM overcomes these
drawbacks using a separate distribution function for the temperature field.
For the simulation of the EBM process a thermal two-distribution LBM is used
which is described followed by the treatment of the free surface boundary condition.
2.1. 3D thermal lattice Boltzmann method
The model for the EBM process is based on the work of Körner et al. in 2 where a
2D thermal LBM is discussed. The idea of LBM is solving the Boltzmann equation
in the hydrodynamic limit for a particle distribution function (pdf) in the physical
momentum space. This pdf f (x, v, t) indicates the probability of finding a particle
with the macroscopic velocity v(x, t) at position x and time t. For the thermal LBM
a second pdf set h(x, v, t) is used for the numerical solution of the temperature field.
The collision operator is approximated by the BGK-collision operator 17,11 ,
Ωf = −
1
(f − f eq ) ,
τf
Ωh = −
1
(h − heq ) ,
τh
(1)
where f eq and heq denote the Maxwell equilibrium distribution 19 . τf is the relaxation time related to the viscosity ν of the fluid and given by ν = c2s ∆t(τf − 0.5)
∆x2
with the lattice speed of sound c2s = 3∆t
2 . τh belongs to the second pdf set hi and
there exists the relation to the thermal diffusivity k = c2s ∆t(τh − 0.5).
The D3Q19 stencil is used to discretize the microscopic space, i.e., a finite set of
19 discrete velocities ei and lattice weights ωi are given 19 . The Maxwell equilibrium
distribution is discretized by a Taylor series expansion 20 and is given by,
(ei · u) (ei · u)2
(ei · u)
u2
eq
eq
fi (x, t) = ωi ρ 1 +
+
− 2 , hi (x, t) = ωi E 1 +
c2s
2c4s
2cs
c2s
(2)
where u denotes the velocity of the liquid. It is sufficient to use a linearized equilibrium distribution function heq
i for the temperature field. The macroscopic quantities
density ρ, momentum ρu and energy density E are computed in the following way,
X
X
X
hi .
(3)
ei fi , E =
fi , ρu =
ρ=
i
i
i
Both pdf sets are one-way coupled by the velocity of the fluid u which is used for the
computation of heq
i . The discretization of the EBM process by a 3D coupled-thermal
4
LBGK can be written in a stream-collide algorithm,
( ′
f (x + ei ∆t, t + ∆t) = fi (x, t)
streaming i′
(4)
hi (x + ei ∆t, t + ∆t) = hi (x, t),
collide
(
fi (x, t + ∆t)
hi (x, t + ∆t)
′
= fi (x, t + ∆t) +
′
= hi (x, t + ∆t) +
eq
1
τf (fi (ρ, u) − fi (x, t + ∆t)) + Fi
eq
1
τh (hi (E, u) − hi (x, t + ∆t)) + Φi ,
(5)
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
4
ws-ijmpc
Regina Ammer, Matthias Markl, Vera Jüchter, Carolin Körner, Ulrich Rüde
where Fi denotes an external force term, e.g., gravity, and Φi is the energy injected
into the system by the electron beam,
(ei − u) (ei · u)ei
Fi = ωi ρ
· g, Φi (x, t) = ωi Eb (x, t),
(6)
+
c2s
c4s
where Eb denotes the energy of the electron beam. Detailed information how the
beam energy and absorption are computed is given in 3,4 . Next, the free surface
boundary condition is outlined.
2.2. Free surface lattice Boltzmann method
Körner et al. introduce in 21 a volume-of-fluid based free surface lattice Boltzmann
approach. This method neglects the gas phase and works completely on the liquid
phase assuming that the liquid phase covers the behavior of the flow completely. In
order to ensure mass and momentum conservation a boundary condition is imposed
at the interface which separates liquid and gas phase. More information regarding
the free surface boundary condition used for this EBM model can be found in 4 .
3. Validation experiments
The following validation experiments do not only cover particular aspects as the
solid-liquid phase transition or only concentrate on qualitative accordance but consider also the complete EBM process in a quantitative way.
3.1. Definitions and experimental setup
10mm
We use the following experimental setup for the validation experiments.
A cuboid of size (15x15x10) mm3 is generated by
hatching the Ti-Al6-V4 powder particles layer
by layer (compare the red arrows in Fig. 1). The
hatching differs by line energy and scan velocity
of the electron beam. The line energy is defined
by,
Pbeam
U ·I
=
,
EL =
vscan
vscan
(7)
m
15
m
15mm
where U denotes the acceleration voltage in [V],
Fig. 1. Experimental setup.
I the current in [A] and vscan the scan velocity
in [ ms ] of the electron beam. The parameter set
(EL , vscan ) defines the electron beam. The quality of EBM products is classified into
three categories, namely porous, good and swelling. Good samples have a smooth
surface and a relative density higher than 99.5%. If the temperature during the
process is too high swelling can occur and the dimensional accuracy cannot be
guaranteed. On the other side, if the line energy is too low and the relative density
is smaller than 99.5%, then the sample is porous (cf. Fig. 2). Next, a experimental
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
ws-ijmpc
Validation Experiments for LBM Simulations of Electron Beam Melting
porous
good
5
swelling
Increasing line energy
Fig. 2.
Categories of samples.
process window is shown in Fig. 3 which is compared with numerical simulation
results.
3.2. Experimental data
Fig. 3 shows the quality of samples with different line energies in [ kJ
m ] and scan
velocities in [ ms ] of the electron beam. The red circles stand for a porous parameter
0.8
good
porous
swelling
0.7
Line energy [kJ/m]
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0
1
2
3
4
5
6
7
Scan velocity [m/s]
Fig. 3. Process window of experimental data. Built temperature 1000 K, line offset 100 µm, layer
thickness 50 µm, focused electron beam.
set, the blue squares for an optimal, good parameter set and the yellow rhombus
for a sample where swelling occurs because of too high temperatures at the surface.
It can be observed that the higher the scan velocity the lower the embedded line
energy has to be to get an optimal sample result.
3.3. Numerical results
We validate our 3D numerical EBM model against these experimental data
of Fig. 3. Because of the high computational cost of the 3D simulations we
only model the hatching of one powder layer instead of the multiple layers.
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
6
ws-ijmpc
Regina Ammer, Matthias Markl, Vera Jüchter, Carolin Körner, Ulrich Rüde
One simplified scenario for the exembeam offset
J
plary parameter set of (3.2 ms , 0.2 m
)
does already require 8 compute nodes
of LiMaa for 4 wall clock hours. LiMa
is the compute cluster where all 3D
simulations are done. However, this
simplification is in good agreement
simulated powder bed
hatching lines
with the situation expected for the full
setup as it will be shown in this Section.
We also minimize the simulated powder
Fig. 4. Sketch of simulation scenario.
particle layer, i.e., we focus only a rectangular powder layer and have seven hatching lines (cf. Fig. 4). Thus, a beam offset
per layer is defined where the electron beam is on but outside the simulated powder
particle bed.
In Fig. 5 the quality of the numerical experiments with different line energy and
scan velocity is shown. In order to determine if the numerical sample is porous the
relative density of the sample is measured and if it is less than 99.5% the sample is
porous. The definition of numerical swelling is more difficult. Our model does not
include evaporation and thus no evaporation pressure. Hence, numerical swelling
effects cannot occur. We have to find another way how we can determine regions
numerically where swelling exists experimentally. Therefore, we use the numerical
computed temperature which is higher than in real EB melting processes because
the cooling effect during the process of evaporation is missing. Furthermore, numerical artefacts cause outliers in the temperature field. In order to overcome these
numerical influences we use an averaging process for the temperature values. If these
averaged values are still higher than 7500 K we assume that swellings occur in the
experimental setup.
In comparison with the experimental data in Fig. 3 it is observed that all porous
samples are consistent in the simulation results (cf. Fig. 5). Furthermore, the numerical and experimental results for scan velocities of 3.2 ms , 4.0 ms and 6.4 ms agree
with each other. Small differences between numerical and experimental data are
only found for 0.8 ms , 1.6 ms , 2.4 ms , 4.8 ms and 5.6 ms for higher line energies; for
vscan = 0.8 ms in experimental data swelling already occur for 0.4 and 0.5 kJ
m but in
numerical data no swelling is measured. The same effect is seen for scan velocities
1.6 and 2.4 ms where swelling occurs for smaller line energies experimentally than
numerically. For higher scan velocities of 4.8 and 5.6 ms the reverse effect is observed,
i.e., more swelling occur numerically than experimentally. For vscan = 4.8 ms swelling
arises numerically already for a line energy of 0.25 kJ
m while the experimental setup
is still good. The same is seen for vscan = 5.6 ms ; line energies higher than 0.25 kJ
m
lead to swelling in numerical simulations, but in experimental data only energies
equal 0.3 kJ
m arise swelling.
a http://www.rrze.uni-erlangen.de/dienste/arbeiten-rechnen/hpc/systeme/lima-cluster.shtml
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
ws-ijmpc
Validation Experiments for LBM Simulations of Electron Beam Melting
7
0.8
swelling
porous
good
0.7
Line energy [kJ/m]
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0
1
2
3
4
5
6
7
Scan velocity [m/s]
Fig. 5. Process window of numerical data. ∆x = 5 · 10−6 m, ∆t = 1.75 · 10−7 s, simulated powder
domain (1.44x0.64x0.24)·10−3 m3 , beam offset =13.56·10−3 m.
Both effects can be explained by the focus of the electron beam gun. The focus
is more precise for smaller scan velocities imposed by a smaller electron beam power
Pbeam , e.g, vscan = 1.6 ms or vscan = 2.4 ms lead to a precise, small focus and thus,
energy is brought onto a smaller area. For these velocities swelling occurs for smaller
line energies experimentally than numerically because the EB gun focus is constant
for different beam power and scan velocities, respectively. For higher scan velocities
(larger Pbeam ) like 4.8 ms the focus of the gun spreads and, subsequently, the same
amount of energy is brought into a larger area of powder particles and the maximum
temperature is smaller. As a consequence in experimental data less swelling occurs
for higher scan velocities (larger Pbeam ) than in numerical data.
(a) t = 0.20·10−3 s
(b) t = 4.27·10−3 s
Fig. 6.
Hatching of one layer, (0.15
(c) t = 12.91·10−3 s
kJ
,
m
6.4
m
).
s
m
Fig. 6 shows hatching of one line with parameter set (0.15 kJ
m , 6.4 s ) for three
different time steps. The inverse Gaussian distributed powder particles 4 are demonstrated the and the free surface is visualized by an isosurface. In Fig. 6(a) the
electron beam melted one line and powder particles in this first line are not yet
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
8
ws-ijmpc
Regina Ammer, Matthias Markl, Vera Jüchter, Carolin Körner, Ulrich Rüde
completely melted. The next Fig. 6(b) shows the second melted line by a comingback electron beam. Here, the particles of the first line are now melted completely.
In the third Fig. 6(c) the electron beam has melted seven hatching lines and the
whole powder layer is melted.
4. Conclusion
This paper describes the 3D thermal LB method for the numerical simulation of
EBM processes. Experimental data of hatching a cuboid with different line energies
and scan velocities are shown in a process window. The different samples are classified into porous, good and swelling, depending on the parameter set (line energy,
scan velocity). For the validation all parameter sets are tested numerically and a
numerical process window is generated by 3D simulations of hatching one powder
layer. Numerical and experimental process window are highly concordant especially
in the region of small line energies because parameter sets which are porous in
experimental process window are that also in the numerical one. Only in the region between good and swelling differences exist which are reducible to the focus
of the EB gun. The precision of the focus depends on the beam power but in our
simulations the focus is constant.
In order to accelerate the building process of EBM manufacturing it is important
to extend the process window, i.e., to raise up the question how the process window
will look like for a higher beam power and therefore higher scan velocities. After
the validation experiments in this paper which justify the correct behavior of our
framework and its beneficing to simulate EBM processes we will try to find better
parameter sets regarding quality of EBM products.
Acknowledgments
Our work is supported by the European Union Seventh Framework Program – Research for SME’s with full title “High Productivity Electron Beam Melting Additive
Manufacturing Development for the Part Production Systems Market” and grant
agreement number 286695. We also gratefully thank the German Research Foundation (DFG) for funding the experimental work within the Collaborative Research
Centre 814, project B2.
References
1.
2.
3.
4.
5.
6.
7.
8.
P. Heinl et al., Adv. Eng. Mater. 9 360 (2007).
C. Körner et al., J. Mater. Process. Tech. 211 978 (2011).
M. Markl et al., Procedia Comput. Sci. 18 2127 (2013).
R. Ammer et al, Comput. Math. Appl. 67 318 (2014)
C. Feichtinger et al., J. Comput. Sci. 2 105 (2011).
H. Köstler et al., IT-Information Technology 55 91 (2013).
G.R. McNamara et al., Phys. Rev. Lett. 61 2332 (1988).
U. Frisch et al., Phys. Rev. Lett. 56 1505 (1986).
February 12, 2014 3:6 WSPC/INSTRUCTION FILE
ws-ijmpc
Validation Experiments for LBM Simulations of Electron Beam Melting
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
F. Higuera et al., Europhys. Lett. 9 663 (1989)
F.J. Alexander et al., Phys. Rev. E 47 R2249 (1993)
Y. Chen et al., Phys. Rev. E 50 2776 (1994)
F. Massaioli et al., Europhys. Lett. 21 305 (1993)
X. Shan, Phys. Rev. E 55 2780 (1997)
X. He et al., J. Comput. Phys. 146 282 (1998).
P. Lallemand et al., Int. J. Mod. Phys B 17 41 (2003)
G.R. McNamara et al., J. Stat. Phys. 81 395 (1995).
P. Bhatnagar et al., Phys. Rev. 94 511 (1954).
S. Chen et al., Annu. Rev. Fluid Mech. 30 329 (1998).
X. He et al., Phys. Rev. E 56 6811 (1997)
X. He et al., Phys. Rev. E 55 R6333 (1997)
C. Körner et al., J. Stat. Physics 121 179 (2005).
9
| 5cs.CE
|
arXiv:1709.06441v1 [math.GR] 19 Sep 2017
EVERY GROUP IS THE OUTER AUTOMORPHISM GROUP
OF AN HNN-EXTENSION OF A FIXED TRIANGLE GROUP
ALAN D. LOGAN
Abstract. Fix an equilateral triangle group Ti = ha, b; ai , bi , (ab)i i with
i ≥ 6 arbitrary. Our main result is: for every presentation P of every
countable group Q there exists an HNN-extension TP of Ti such that
Out(TP ) ∼
= Q. We construct the HNN-extensions explicitly, and examples are given. The class of groups constructed have nice categorical and
residual properties. In order to prove our main result we give a method
for recognising malnormal subgroups of small cancellation groups, and we
introduce the concept of “malcharacteristic” subgroups.
1. Introduction
Every group can be realised as the outer automorphism group of some group
[Mat89]. One can ask what restrictions can be placed on the groups involved.
Several authors have achieved results in this vein [Koj88] [GP00] [DGG01]
[BG03] [FM06] [Log15] [Log16a] [Log16b]. Notably, Bumagin–Wise proved
that every countable group Q can be realised as the outer automorphism group
of a finitely generated group GQ [BW05] (here GQ is the kernel of a short
exact sequence inspired by Rips’ construction [Rip82]), and Minasyan proved
that GQ can additionally be taken to have 2-conjugacy classes and Kazdhan’s
property T [Min09] (here GQ is one of Osin’s monster groups [Osi10]).
We therefore say that a class of finitely generated groups C possesses the
Bumagin–Wise property if for every countable group Q there exists a group
GQ ∈ C such that Out(GQ ) ∼
= Q. Hence, Bumagin–Wise prove that a certain class of groups related to Rips’ construction possesses the Bumagin–Wise
property. Minasyan proved that the class of Osin’s monster groups possesses
the Bumagin–Wise property. These two classes of groups are well-known to
possess pathological properties. Therefore, the results of Bumagin–Wise and
Minasyan suggest that the Bumagin–Wise property is a pathological property.
Date: September 20, 2017.
2010 Mathematics Subject Classification. 20F28, 20F65, 20F55.
Key words and phrases. Outer automorphism groups, triangle groups, HNN-extensions,
small cancellation theory, automorphisms of free groups.
1
2
ALAN D. LOGAN
The main result of this paper is Theorem A, below, which proves that certain
classes of “nice” HNN-extensions of “nice” groups possess the Bumagin–Wise
property. Theorem B then says that this construction is functorial. These
results are in stark contrast to the results of Bumagin–Wise and Minasyan,
and suggest that the Bumagin–Wise property is not pathological. By a “nice”
HNN-extension we mean an automorphism-induced HNN-extension; we define
these HNN-extensions in Section 2. By a “nice” group we mean a triangle
group, defined below; such groups are extremely well studied [Mag74].
The proof of Theorem A has two main innovations. Firstly, we give a method
for recognising malnormal subgroups of small cancellation groups (Theorem F
says that if the presentation hx; r, si and the set s possess certain properties
then hsi is a malnormal subgroup of G = hx; ri). Secondly, we introduce and
study the notion of “malcharacteristic” subgroups (which generalise malnormal
subgroups). The key idea of this paper is that the existence of malcharacteristic subgroups in certain triangle groups implies Theorem A.
Main theorems. A triangle group is a group with a presentation of the
following form.
Ti,j,k := ha, b; ai , bj , (ab)k i
If i = j = k we shall write Ti := Ti,i,i for the corresponding equilateral triangle
group. Theorem A reveals a certain universal property possessed by equilateral
triangle groups Ti with i ≥ 6.
By a countable group presentation we mean a presentation P = hx; ri where
|x| ≤ |N| (and hence |r| ≤ |N|). All our presentations are countable so we shall
often omit the adjective “countable”. We also assume that each presentation
P contains at least one generator (that is, |x| ≥ 1); this excludes the empty
presentation of the trivial group. For a group presentation P we write π1 (P)
for the group defined by P. We often abuse notation and write Q = hx; ri for
Q a group (as we did above with Ti,j,k ). Note that a group Q is countable if
and only if there exists a countable presentation P with Q ∼
= π1 (P).
Theorem A. Fix an equilateral triangle group Ti with i ≥ 6. For every
countable group presentation P with at least one generator there exists an
automorphism-induced HNN-extension TP of Ti such that Out(TP ) ∼
= Q and
T
⋊
Q,
where
Q
:=
π
(P).
Aut(TP ) ∼
= P
1
We construct the groups TP from Theorem A in Section 4. We discuss why
we require i ≥ 6 in Theorem A after the proof of Lemma 7.7.
In Section 4 we study properties of the construction underlying Theorem A.
This analysis leads to Theorems B–E. Firstly, in Section 4 we note that countable group presentations form a category Pres, with morphisms P1 → P2
HNN-EXTENSIONS OF TRIANGLE GROUPS
3
corresponding to certain surjective homomorphisms of the groups π1 (P1 ) and
π1 (P2 ). Theorem B then says that the construction of Theorem A is functorial.
Theorem B. The map defined by P 7→ TP is a functor from the category of
countable group presentations Pres to the category of groups Grp.
Theorem B follows from Theorem 4.3. We note after the proof of Theorem 4.3 that if an appropriate subcategory of Pres is chosen then this functor
may be extended to a functor from a subcategory of Grp to Grp.
The construction of Theorem A possesses the following residual property.
Theorem C. Let TFin be the class of groups TQ where π1 (Q) is finite. If π1 (P)
is residually finite then TP is residually-TFin .
Theorem C follows from Theorem 4.4. In Section 8 we prove the following
corollary of Theorem C. Bumagin–Wise asked if every countable group Q can
be realised as the outer automorphism group of a finitely generated, residually
finite group GQ [BW05, Problem 1]. Corollary D gives a positive answer to this
question of Bumagin–Wise for all finitely generated, residually finite groups Q
by taking Q := π1 (P) and GQ := TP .
Corollary D. If the presentation P has a finite, non-empty generating set
and the group π1 (P) is residually finite then the group TP is residually finite.
The construction of Theorem A has a certain flexibility. It allows a choice
of certain subgroups Mn , and this choice may be made in such a way that we
obtain easy examples or additional properties of the groups TP . The above
theorems do not require these subgroups to be chosen in any particular way.
However, the subgroups Mn may be chosen in such a way that the following
result holds, where for presentations P = hx; ri and Q = hy; si we write P ∗ Q
for the presentation hx, y; r, si (so π1 (P ∗ Q) ∼
= π1 (P) ∗ π1 (Q)).
Theorem E. The subgroups Mn , n ∈ N, in the proof of Theorem A may be
chosen in such a way that for every presentation P with finite, non-empty
generating set and for every countable group presentation Q there exists a
surjection TP ։ TP∗Q .
Theorem E follows from Theorem 4.5. The chosen subgroups Mn are specified in Theorem 4.5.
Examples. We now give some simple examples of our construction. These examples illustrate the simplicity of the construction itself (examples of Bumagin–
Wise’s groups and of Minasyan’s groups are much harder to construct) as well
as the construction’s functorial properties. Let P∞ = hz; −i and Pk = hz; z k i
for k ∈ N (we will always assume 0 6∈ N). Fix i ≥ 6. By φ we mean the
automorphism φ : a 7→ b, b 7→ (ab)−1 of Ti = ha, b; ai , bi , (ab)i i which has order
4
ALAN D. LOGAN
three. By x and y we mean specific words over a and b which are given in
Section 3.
TP∞ = hTi , t; ty −j xy j t−1 = φ(y −j xy j ), ∀ j ∈ Zi
TPk = hTi , t; ty k t−1 = φ(y k ), ty −j xy j t−1 = φ(y −j xy j ), ∀ 0 ≤ j < ki
Note that the words y −j xy j , j ∈ Z, generate the kernel of the map F (x, y) →
π1 (P∞ ), x 7→ 1, y 7→ z, while the words y k and y −j xy j , 0 ≤ j < k, generate
the kernel of the analogous map F (x, y) → π1 (Pk ). It is clear that the map
Z/kZ 7→ TPk , k ∈ N ∪ {∞}, is a functor from a subcategory of Grp to Grp.
Triangle groups. In Theorems 7.9–7.12 we obtain results analogous to Theorems A–E where the base group H is any triangle group Ti,j,k , i, j, k ≥ 6.
The price we pay in allowing for more base groups is that the “Out(TP ) ∼
= Q”
condition of Theorem A is weakened to “Q embeds with index one or two in
Out(TP )”.
The constructions of Theorem A and Theorem 7.9 are specific cases of Theorem 4.2. This more general theorem potentially allows for other base groups
H to be taken in Theorem A, and not just triangle groups. However, it is
a highly non-trivial task to apply Theorem 4.2, and so our proofs of Theorem A and Theorem 7.9 use properties of triangle groups throughout. We
focus on triangle groups because they are well-studied groups with many nice
properties. It would be extremely surprising if the universal properties of Theorem A and Theorem 7.9 were to disappear if we replaced the groups H with
less well-behaved groups (for example Thompson’s groups F , T or V ). We
therefore record a quasi-conjecture: If a group H has a suitably rich subgroup
structure (e.g. contains a non-abelian free subgroup) then the class CH of
HNN-extensions of H possesses the Bumagin–Wise property.
Malcharacteristic subgroups. This paper introduces malcharacteristic subgroups, and most of the paper is devoted to their study. Malnormal subgroups
are central objects in geometric group theory, and malcharacteristic subgroups
generalise malnormal subgroups in the same way that characteristic subgroups
generalise normal subgroups.
We formally define malcharacteristic subgroups in Section 3 (the definition
of malnormal subgroups can be found there too). Our focus on malcharacteristic subgroups is because of Theorem 4.2, which can be interpreted as saying
“Theorem A holds if each group Ti , i ≥ 6, contains a malcharacteristic subgroup which is free of rank two”.
In Proposition 5.4 we provide concrete examples of malcharacteristic subgroups in the free group F (a, b). We use these to provide, in Proposition 7.8,
HNN-EXTENSIONS OF TRIANGLE GROUPS
5
concrete examples of malcharacteristic subgroups in the triangle groups Ti,j,k
with i, j, k ≥ 6. Theorem A then follows from Theorem 4.2.
Malnormal subgroups of small cancellation groups. In order to obtain
concrete examples of malcharacteristic subgroups we first need concrete examples of malnormal subgroups. To find these we apply Theorem F, stated
below. Theorem F gives a new method for recognising malnormal subgroups
of small cancellation groups. We refer the reader to Lyndon–Schupp’s classic
text for the definitions of the metric C ′ (1/6) and C ′ (1/4) − T (4) small cancellation conditions [LS77, Section V]. A word W in F (x) is a proper power if
there exists another word U ∈ F (x) and an integer n > 1 such that W = U n .
For a group G = hx; ri, Theorem F links the malnormality of a subgroup M
generated by a set of words s, so M = hsi, with properties of the presentation hx; r, si. Note that Theorem F allows for the explicit construction of
malnormal subgroups of small cancellation groups.
Theorem F. Suppose that hx; r, si is a C ′ (1/6) or C ′ (1/4) − T (4) small cancellation presentation, and that no element of the set s is a proper power. Then
the subgroup hsi of the small cancellation group G = hx; ri is malnormal and
free with basis s.
The assumption that no element of the set s is a proper power is necessary,
as if U n ∈ s with n > 1 then U 6∈ hsi (by small cancellation) but hU n i ≤
(U −1 hsiU ∩ hsi).
Theorem F follows from two more general theorems, Theorems 6.4 and 6.5.
These two theorems give a new method for recognising, for L and M subgroups
of a small cancellation group G, if Lg ∩ M = 1 for all g ∈ G. Also related is
Lemma 6.3, which gives a new method for recognising free subgroups of small
cancellation groups. Note that fibre products of Stalling’s graphs [Sta83, Theorem 5.5] solve for free groups the underlying decision problems of Theorem F
and of Theorems 6.4 and 6.5.
Outline of the paper. In Section 2 we prove Lemma 2.2, a result on
automorphism-induced HNN-extensions which underpins the construction of
Theorem 4.2. In Section 3 we define, and prove present basic results about,
malcharacteristic subgroups. In Section 4 we prove Theorem 4.2; this gives the
construction underlying Theorem A. This section also contains the proofs of
various properties of this construction relating to Theorems B–E. In Section 5
we give concrete examples of malcharacteristic subgroups of the free group
F (a, b). In Section 6 we give concrete examples of malnormal subgroups of
triangle groups Ti,j,k , i, j, k ≥ 6, and in particular we prove Theorem F. In
6
ALAN D. LOGAN
Section 7 we combine the results of the previous sections to give concrete examples of malcharacteristic subgroups of triangle groups Ti,j,k , i, j, k ≥ 6, and
in particular we prove Theorems A, B, C and E. In Section 8 we apply Theorem C to the question of Bumagin–Wise regarding residually finite groups,
and in particular we prove Corollary D. In Section 9 we pose certain questions
which arose in the writing of this paper.
Acknowledgements. I would like to thank Stephen J. Pride and Tara Brendle for many helpful discussions about this paper. I would also like to thank
Jim Howie for observing when the groups in Theorem A are finitely and infinitely presentable (see the discussion following the proof of Theorem 4.2), Peter
Kropholler for ideas which led to Theorem C, and Henry Wilton for pointing
out that triangle groups are LERF.
2. Automorphism-induced HNN-extensions
The main result of this section is Lemma 2.2, which gives certain isomorphisms underpinning Theorem A. We also define automorphism-induced HNNextensions and explain why they are “nice”.
Automorphism-induced HNN-extensions. Let H be a group, K H a
proper subgroup and φ ∈ Aut(H) an automorphism. Then the automorphisminduced HNN-extension of H with associated subgroup K and with associated
automorphism φ is the group with relative presentation
H∗(K,φ) = hH, t; tkt−1 = φ(k), k ∈ Ki.
The groups TP in Theorem A are automorphism-induced HNN-extensions.
That they are automorphism-induced is crucial to our paper. For example,
to prove Theorem B we apply the following fact particular to automorphisminduced HNN-extensions: if K < K0 H then H∗(K,φ) ։ H∗(K0 ,φ) .
Automorphism-induced HNN-extensions are “nice”, in the sense that they
are an easy class of groups to work with and possess nicer properties than general HNN-extensions. The simplest examples of HNN-extensions are Baumslag–
Solitar groups (HNN-extensions of the infinite cyclic group), and these also provide the standard examples of badly-behaved HNN-extensions. For example,
Baumslag–Solitar groups can have non-finitely generated outer automorphism
group [CL83]. However, if a Baumslag–Solitar group is automorphism-induced
then it has virtually cyclic outer automorphism group [GHMR00].
As another example of the tractability of automorphism-induced HNNextensions, we note that the notation H∗(K,φ) emphasises that the second
associated subgroup φ(K) can, in practice, be ignored when studying these
HNN-EXTENSIONS OF TRIANGLE GROUPS
7
groups. This in demonstrated in Theorem 2.1 and Lemma 2.2, where the
descriptions of Out(H∗(K,φ)) mention K but not φ(K).
Describing Out(G). For G = H∗(K,φ), Theorem 2.1 now describes Out(G)
subject to certain conditions. One of the conditions required by Theorem 2.1
is that the group H has Serre’s property FA, that is, every action of H on
any tree has a global fixed point. This is an extremely natural property (see,
for example, [Ser80, Theorem 15]). For δ ∈ Aut(H) we write δb to mean the
outer automorphism δ Inn(H) ∈ Out(H). For g ∈ H we write γg for the inner
automorphism of H acting as conjugation by g, so γg (h) = g −1hg for all h ∈ H.
We define the subgroup AK of Aut(H) as follows:
AK := {δ ∈ Aut(H) : δ(K) = K, ∃ g ∈ H s.t. δφ(k) = φδγg (k) ∀ k ∈ K}
Theorem 2.1 follows immediately from two results from our previous paper
[Log16b, Theorems A & C].
Theorem 2.1. Let G = H∗(K,φ) be an automorphism-induced HNN-extension.
Assume that:
(1) H has Serre’s property FA;
(2) there does not exist any b ∈ H such that φ(K) γb (K) and there does
not exist any c ∈ H such that γc (K) φ(K); and
(3) Z(H) = 1.
Then there exists a short exact sequence:
NH (K)
AK Inn(H)
1 → CH (K) ⋊
→ Out0 (G) →
→1
K
Inn(H)
where either Out0 (G) = Out(G) or there exists some δ ∈ Aut(H) and some
a ∈ H such that δ(K) = φ(K), δ 2 γa (K) = K and δφ−1 (k) = φδγa (k) for all
k ∈ K, whence Out0 (G) has index two in Out(G).
The assumption that Z(H) = 1 means that the short exact sequence here is
easily-digestible. A more extensive description of this sequence in our previous
paper requires no such assumption [Log16b, Theorem B].
Lemma 2.2 now refines the description of Out(G) given by Theorem 2.1.
We shall often use Out0 (G) to mean an index-one or-two subgroup of Out(G).
Then by Aut0 (G) we shall mean the full pre-image of Out0 (G) in Aut(G) under
the natural map (see Lemmas 2.2 and 4.1, and Theorem 4.2).
Lemma 2.2. Suppose H, K and φ are such that the following hold:
(1) H has Serre’s property FA;
(2) CH (K) is trivial;
(3) δ(K) ∩ K = 1 for all automorphisms δ 6∈ Inn(H); and
(4) φ 6∈ Inn(H).
8
ALAN D. LOGAN
Let G = H∗(K,φ) . Then there exists an index-one or-two subgroup Out0 (G)
of Out(G) such that Out0 (G) ∼
= NH (K)/K. Moreover, Aut0 (G) = Inn(G) ⋊
0
0
∼
Out (G), and so Aut (G) = G ⋊ NH (K)/K. Suppose, in addition, that the
following holds:
(5) φb has odd or infinite order in Out(H).
Then Out0 (G) = Out(G) and Aut0 (G) = Aut(G).
Proof. The three conditions of Theorem 2.1 hold here, with the second condition following from Conditions (3) and (4) here as Conditions (3) and (4)
imply that φ(K) ∩ γh (K) = 1 for all h ∈ H. Hence, the description of
Out0 (G) given by Theorem 2.1 holds here. It is therefore sufficient to prove
that AK ≤ Inn(H) that Aut0 (G) = Inn(G) ⋊ Out0 (G), and that if Condition (5) holds then Out0 (G) = Out(G).
Condition (3) implies that δ(K) 6= K for all δ 6∈ Inn(H), and so AK ≤
Inn(G) as required.
That Aut0 (G) = Inn(G) ⋊ Out0 (G) follows from the fact that AK ≤ Inn(H)
[Log16b, Lemma 5.4].
Suppose that Condition (5) holds and that Out0 (G) 6= Out(G). Then there
exists δ ∈ Aut(H) and a ∈ H such that δφ−1 (K) = K = δ 2 γa (K). Now,
b by (3). Therefore, δ 2 6∈ Inn(G), by (4) and
δφ−1 (K) = K implies that δb = φ,
(5). On the other hand, δ 2 γa (K) = K implies that δ 2 ∈ Inn(H), by (3), a
contradiction. Hence, Out0 (G) = Out(G) as required.
3. Malcharacteristic subgroups
In this section we define malcharacteristic subgroups, and present basic results about them. We also state a subgroup M of Ti,j,k which is malcharacteristic and free of rank two. Theorem 4.2 reduces the proof of Theorem A
to proving that this subgroup M is indeed malcharacteristic and free of rank
two; the purpose of Sections 5–7 is to prove these two properties of M.
Definition of malcharacteristic subgroups. A malnormal subgroup intersects its conjugates trivially apart from in the obvious place in the obvious
way. More formally, a subgroup M ≤ H is malnormal in H if the following
implication holds, where hg := g −1 hg and M g := {hg ; h ∈ M}.
M g ∩ M 6= 1 ⇒ g ∈ M
Similarly, a malcharacteristic subgroup intersects its automorphic orbit trivially apart from in the obvious place in the obvious way. More formally, a
subgroup M ≤ H is malcharacteristic in H if M is malnormal in H and for
all δ ∈ Aut(H) the following implication holds.
δ(M) ∩ M 6= 1 ⇒ δ ∈ Inn(H)
HNN-EXTENSIONS OF TRIANGLE GROUPS
9
Basic results. We now make two observations which are applied in, respectively, Lemma 3.3 and Section 4. The proofs of these observations are routine
and so omitted. Lemma 3.1 is dual to the well-known result that if N is normal
in H and C is characteristic in N then C is normal in H.
Lemma 3.1. If M is malcharacteristic in H and L is malnormal in M then
L is malcharacteristic in H.
Note that we may replace the word “malnormal” in Lemma 3.2 with the
word “malcharacteristic”.
Lemma 3.2. If M is malnormal in H and K 6= 1 is a normal subgroup of M
then NH (K) = M.
Free, malcharacteristic subgroups. Lemma 3.3 constructs free, malcharacteristic subgroups from a single “seed” subgroup M. This lemma is central
to Theorem 4.2. We use ∞ to denote the first infinite cardinal |N|.
Lemma 3.3. If a group G contains a malcharacteristic subgroup M which is
free of rank m > 1 (possibly m = ∞) then for each n ∈ N ∪ {∞} the group G
contains a malcharacteristic subgroup Mn which is free of rank n.
Proof. Suppose M = hxi is a malcharacteristic subgroup of G which is free on
the set x, where |x| = m. Let x1 , x2 ∈ x and consider L = hx1 , x2 i (clearly L
is free of rank two). Now, L is malnormal in M and so L is malcharacteristic
in G, by Lemma 3.1. Therefore, again by Lemma 3.1, it is sufficient to prove
that L ∼
= F (x1 , x2 ), the free group of rank two, contains malnormal subgroups
of arbitrary rank (possibly countably infinite).
To see that F (x1 , x2 ) contains malcharacteristic subgroups of arbitrary rank
n ∈ N∪{∞}, first note that for each such n there exists a C ′ (1/6) small cancellation set sn ⊂ F (x1 , x2 ) which has cardinality n and where no element of sn is
a proper power [BW05, Lemma 6]. If n < ∞ then Mn := hsn i is a malnormal
subgroup of F (x1 , x2 ) which is free of rank n [Wis01, Theorems 2.11 & 2.14].
If n = ∞ then write M∞ := hs∞ i. Identities of the form U0 (s∞ ) = 1 or
W (x1 , x2 )−1 U1 (s∞ )W (x1 , x2 ) = U2 (s∞ ) only apply finitely many elements of
s∞ , and so it follows from the finite-rank case that M∞ is a malnormal subgroup of F (x1 , x2 ) which is free of countably-infinite rank.
A malcharacteristic subgroup. Let i, j, k ≥ 6. We record here that the
10
ALAN D. LOGAN
subgroup M = hx, yi, x and y as below with ρ ≫ max(i, j, k), is a malcharacteristic subgroup of Ti,j,k = ha, b; ai , bj , (ab)k i which is free of rank two.
x := (ab−1 )3 (a2 b−1 )3 (ab−1 )3 (a2 b−1 )4 . . . (ab−1 )3 (a2 b−1 )ρ+2
y := (ab−1 )3 (a2 b−1 )ρ+3 (ab−1 )3 (a2 b−1 )ρ+4 . . . (ab−1 )3 (a2 b−1 )2ρ+2
This fact is proven in Lemma 7.7.
4. The construction underlying Theorem A
In this section we prove Theorem 4.2, which proves Theorem A modulo the
existence of a free, malcharacteristic subgroup M of rank two in the group
Ti for each i ≥ 6. We also prove Theorems 4.3–4.5, which are the result
underlying Theorems B–E.
The construction. In the construction of Theorem 4.2 we simply specify the
subgroups Mn and K in Lemma 4.1. Recall that by Aut0 (G) we mean the full
pre-image of Out0 (G) in Aut(G) under the natural map.
Lemma 4.1. Suppose that H and φ ∈ Aut(H) are such that Conditions (1)
and (4) of Lemma 2.2 hold. Suppose that Mn is a malcharacteristic subgroup
of H which is free of rank n > 1, and K 6= 1 is a normal subgroup of Mn .
Let G = H∗(K,φ). Then there exists an index-one or-two subgroup Out0 (G)
of Out(G) such that Out0 (G) ∼
= Mn /K. Moreover, Aut0 (G) = Inn(G) ⋊
0
0
Out (G), and so Aut (G) ∼
= G ⋊ Mn /K.
Suppose, in addition, that φ is such that Condition (5) of Lemma 2.2 holds.
Then Out0 (G) = Out(G) and Aut0 (G) = Aut(G).
Proof. By Lemma 3.2, NH (K) = Mn . Therefore, to prove the result it is sufficient to prove that H, K and φ satisfy Conditions (2) and (3) of Lemma 2.2.
The subgroup Mn is malcharacteristic in H, so (3) holds. We now prove
that CH (K) is trivial, so (2) holds. Suppose that g ∈ H is such that [k, g] = 1
for all k ∈ K. Then g ∈ Mn , by malnormality of Mn , and so CH (K) ≤ Mn .
As Mn is free we have that K is cyclic. Now, non-trivial normal subgroups of
non-cyclic free groups can never be cyclic. Thus, as Mn is free of rank n > 1
we conclude that CH (K) is trivial, as required.
If r ⊆ F (x) then we write hhrii for the normal closure of the set r in F (x),
so F (x)/hhrii = π1 (hx; ri). We say that hy; si is a quotient presentation of
hx; ri if x = y and hhrii hhsii. We now have the main result of this section.
Theorem 4.2. Suppose that the group H has
(1) Serre’s property FA;
(2) non-trivial outer automorphism group; and
(3) a malcharacteristic subgroup which is free of rank two.
HNN-EXTENSIONS OF TRIANGLE GROUPS
11
Then:
i. For every countable group presentation P with at least one generator
there exists an automorphism-induced HNN-extension HP of H such that
Out0 (HP ) ∼
= π1 (P), where Out0 (HP ) is an index-one or-two subgroup of
Out(HP ). Moreover, Aut0 (HP ) = Inn(HP )⋊Out0 (HP ), and so Aut0 (HP ) ∼
=
HP ⋊ π1 (P).
ii. For P1 and P2 countable group presentations with at least one generator, if
P2 is a quotient presentation of P1 then there is a surjection HP1 ։ HP2 .
Suppose, in addition, that the group H has
(4) a non-inner automorphism φ such that φb ∈ Out(H) has odd or infinite
order.
Then Out0 (HP ) = Out(HP ) and Aut0 (HP ) = Aut(HP ).
Proof. By Lemma 3.3, and as H contains a malcharacteristic subgroup which
is free of rank two, the group H contains malcharacteristic subgroups Mn
which are free of rank n for any given n ∈ N ∪ {∞}. Fix for each n ∈ N ∪ {∞}
such a subgroup Mn .
Let P = hx; ri be a given presentation. Let HP be the automorphisminduced HNN-extension H∗(KP ,φ) of H where φ ∈ Aut(H) is a non-inner automorphism (with φb of odd or infinite order if such an automorphism exists) and
b = hx, z0 ; r, z0 i, z0 6∈ x±1 ,
where KP is as follows: Consider the presentation P
b = x ⊔ {z0 } and b
and we shall write x
r = r ⊔ {z0 } (so Pb = hb
x; b
ri). Note that
∼
b
x| > 1, and that b
r is non-empty. Choose M|bx| to be
π1 (P) = π1 (P), that |b
malcharacteristic in H of rank |b
x| and take KP to be the normal subgroup of
M|bx| associated with hhb
rii, the normal closure in F (b
x) of b
r.
By Lemma 4.1, this construction proves Point (i) of the theorem. Also by
Lemma 4.1, if there exists φb ∈ Out(H) which has odd or infinite order then
Out0 (HP ) = Out(HP ) and Aut0 (HP ) = Aut(HP ).
To see that this construction proves Point (ii) of the theorem, note that as
P2 = hx; si is a quotient presentation of P2 = hx; ri we have that hhr, z0 ii
hhr, s, z0 ii ≤ F (x, z0 ). Therefore, adding the relators tUt−1 φ(U)−1 to HQ ,
where U ∈ M|bx| corresponds to an element of hhr, s, z0 ii \ hhr, z0ii, induces the
required group homomorphism HP1 ։ HP2 .
Note that because the subgroup KP in the proof of Theorem 4.2 is free,
the presentation of the HNN-extension HP = H∗(KP ,φ) is aspherical, and so
minimal [CCH81, Theorem 3.1]. Thus, for P = hx; ri, the group HP in the
construction is finitely presented if and only if the set x and the group π1 (P) ∼
=
Out(HP ) are both finite.
Proving Theorem A. To obtain the groups TP from Theorem A, take in
12
ALAN D. LOGAN
Theorem 4.2 the group H to be Ti , the automorphism φ to be a 7→ b, b 7→
b−1 a−1 , and the malcharacteristic subgroup in Condition (3) to be the subgroup
M := hx, yi stated in Section 3, above.
Theorem 7.9 is a related construction, and also follows from Theorem 4.2.
Indeed, Theorem 4.2 proves Theorem A and Theorem 7.9 modulo proving that
the subgroup M = hx, yi of Ti,j,k , i, j, k ≥ 6, is malcharacteristic and free of
rank two; that is, modulo proving that Condition (3) of Theorem 4.2 holds
for these triangle groups. This is because the groups Ti,j,k are well-known
to possess Conditions (1) and (2), while the groups Ti additionally possess
Condition (4) (the map φ : a 7→ b, b 7→ b−1 a−1 is non-inner of order three).
Note that non-equilateral triangle groups have outer automorphism groups of
order two or four (see Lemma 7.3), so Condition (4) does not hold for the
triangle groups of Theorem 7.9. Theorem A and Theorem 7.9 are formally
proven in Section 7.
Functorial properties. Countable group presentations form a category in
the following sense: We define the equivalence relation ∼ on presentations as
hx; ri ∼ hy; si if x = y and hhrii = hhsii. Form the category Presx whose
objects are group presentations with generating set x, under the equivalence
relation ∼ and with morphisms Pj → Pk if Pk is a quotient presentation of
Pj . Note that the normal subgroups of F (x) form a category, with morphisms
obtained from the usual subgroup partial order, and this category is naturally
isomorphic to the category Presx . Note also that the categories Presx and
Presy are isomorphic if |x| = |y|. Therefore, there exists a well-defined category
of n-generator presentations Presn , n ∈ N ∪ {∞}. The category of countable
group presentations Pres is the union of the categories Presn for n ∈ N ∪ {∞}.
Theorem 4.3 now says that the construction of Theorem 4.2 is functorial.
Theorem 4.3. The map defined by P 7→ HP is a functor from the category
of countable group presentations Pres to the category of groups Grp.
Proof. If there exists a morphism Pj → Pk then Pk is a quotient presentation
of Pj . Therefore, HPj ։ HPk by Theorem 4.2.ii.
Let Q be a fixed group and let Q be the category whose objects are quotient
groups Q/Nk and whose morphisms correspond to inclusion of kernels, so
Q/Nj → Q/Nk if Nj
Nk . Fixing a presentation of P of Q, the category
Q is isomorphic to the subcategory of Pres with initial object P. Hence, the
functor of Theorem B also encodes information about quotient groups.
Write Pk for the image of Q/Nk under the aforementioned isomorphism of
categories. Suppose that the group Q is such that Q/Nj ∼
= Q/Nk implies
Nj = Nk . Then Q is isomorphic to a subcategory of Grp and hence the map
Q/Nk 7→ TPk is a functor from a subcategory of Grp to Grp.
HNN-EXTENSIONS OF TRIANGLE GROUPS
13
On the other hand, it is impossible to chose for each group Q a presentation
P with π1 (P) = Q such that the map Q 7→ TP , factoring as Q 7→ P 7→ TP ,
is functorial; this is because there exist non-isomorphic groups Q1 and Q2
such that Q1 ։ Q2 ։ Q1 . Hence Theorem 4.3 cannot be extended in the
natural way. Indeed, Q1 and Q2 can be taken to be 2-generator, 1-relator
groups [BM06], so if we fix n > 1 and restrict to all finitely presentable ngenerator groups then the map Q 7→ TP can still not be made functorial. The
examples from the introduction show that if n = 1 then this map can be made
functorial.
Residual Properties. Let HFin be the class of groups HP where π1 (P) is
finite. Note that these presentations P are countable presentations of finite
groups. In particular, if the input presentation P = hx; ri in Theorem 4.4 has
infinite generating set, so |x| = ∞, then the presentations Pg = hx; r, si in the
following proof are presentations of finite groups but with infinite generating
set x. It follows that if |x| = ∞ then the associated subgroups KPg cannot be
finitely generated. If U and V are words then we write U ≤ V to mean that
U is a subword of V .
Theorem 4.4. If π1 (P) is residually finite then HP is residually-HFin .
Proof. Recall that HP is an HNN-extension H∗(KP ,φ) . Let g ∈ H ∗(KP ,φ)
\{1} be arbitrary. By Britton’s lemma, g is represented by a word W =
h0 tǫ1 h1 · · · tǫm hm which does not contain any subwords of the form tkt−1 or
t−1 φ(k)t for any k ∈ KP . For those hi in NH (KP ) such that thi t−1 ≤ W , write
hi := hi KP ∈ Mn /KP , and for those hi in NH (φ(KP )) such that t−1 hi t ≤ W ,
write hi := φ−1 (hi )KP ∈ Mn /KP . As Mn /KP ∼
= π1 (P) is residually finite
there exists a finite group Pg and a homomorphism σ g : Mn /KP → Pg such
that σ g (hi ) 6= 1 for each hi (if there are no hi , so for example if every hi 6∈
NH (KP ) ∪ NH (φ(KP )), then we may take Pg to be trivial). Now, there exists
a quotient presentation Pg = hx; r, si of P = hx; ri which corresponds to the
map σ g . Consider the group TPg = H∗(KPg ,φ) from Theorem A. Then, the
map σg : TP ։ TPg from Therorem 4.2.ii is obtained by adding the relators
tUt−1 φ(U)−1 , where U corresponds to an element of hhr, s, z0 ii \ hhr, z0 ii ⊆
F (x, z0 ). In particular, this map naturally corresponds to the map σ g , and so if
hi ∈ NH (KP ) and thi t−1 ≤ W then hi 6∈ KPg , and similarly if hi ∈ NH (φ(KP ))
and t−1 hi t ≤ W then hi 6∈ φ(KPg ). Note also that NH (KP ) = NH (KPg ).
We now prove that σg (g) 6= 1, which proves the result. Suppose thi t−1 ≤
W . If hi ∈ NH (KP ) then hi 6∈ KPg by the above. On the other hand, if
hi 6∈ NH (KP ) then hi 6∈ KPg ≤ NH (KP ). Hence, W does not contain any
subword of the form tkt−1 for any k ∈ KPg . Similarly, W does not contain any
14
ALAN D. LOGAN
subword of the form t−1 φ(k)t for any k ∈ KPg . That σg (g) 6= 1 now follows
from Britton’s Lemma.
Choosing the subgroups Mn . Let M0 = hx0 , y0 i denote the malcharacteristic subgroup of H which is free of rank two from Theorem 4.2. Now, the
subgroup Mn in the proof of Theorem 4.2 may be taken to be any subgroup
of M0 which is generated by a small cancellation subset sn of F (x0 , y0 ), such
that |sn | = n and sn contains no proper powers. This flexability allows for
concrete examples of this construction to be written down (for example, the
groups TP∞ and TPk from the introduction). Theorem 4.5 now demonstrates
that if we are more strict in our choice of the subgroups Mn then we can obtain
more properties of the groups HP from Theorem 4.2.
Suppose x ⊂ y, and let r ⊂ F (x). Then we write hhriiF (x) for the normal
closure of r in the free group F (x), and hhriiF (y) for the normal closure of r
in the free group F (y). Note that if we view F (x) as a subgroup of F (y) in
the natural way then hhriiF (x) ≤ hhriiF (y) .
Theorem 4.5. Let H be as in Theorem 4.2.
Then H contains a malcharacteristic subgroup hz0 , z1 , z2 , . . .i which is free
on the infinite set {z0 , z1 , z2 , . . .}. Suppose that the subgroups Mn , n ∈ N, in
the proof of Theorem 4.2 are taken to be the subgroups Mn := hz0 , z1 , . . . , zn i,
and that the subgroup M∞ is taken to be hz0 , z1 , z2 , . . .i. Then for every presentation P with finite, non-empty generating set and for every countable group
presentation Q there exists a surjection HP ։ HP∗Q .
Proof. Write zn := {z1 , z2 , . . . , zn } for n ∈ N and z∞ := {z1 , z2 , . . .}. Suppose P = hx; r(x)i and Q = hy; −i. Note that HP has associated subgroup
KP = hhr(z|x|), z0 iiF (z0 ,z|x| ) (we identify the symbol z0 here with the symbol
z0 in Theorem 4.2). Then HP∗Q is obtained from HP by adding the relators
tUt−1 φ(U)−1 to HP , for all U ∈ hhz0 , r(z|x|)iiF (z0 ,z|x⊔y| ) \ hhz0 , r(z|x|)iiF (z0 ,z|x| ) .
This induces the required group homomorphism HP ։ HP∗Q . The result then
follows for all Q from Theorem 4.2.ii.
The free product is the coproduct in the category of groups, and so Theorem 4.5 hints at the notion of a coproduct in our setting. However, it is not
clear whether or not HQ always surjects onto HP∗Q , even if Q has a finite
generating set. Consider the subcategory Pres<∞ := ∪n∈N Presn of Pres. If
the surjection HQ ։ HP∗Q always exist for Q ∈ Pres<∞ then adding the
morphisms P → P ∗ Q and Q → P ∗ Q to the category Pres<∞ to produces a new category Pres<∞ (possibly with a coproduct), and then the map
Pres<∞ → Grp given by P 7→ HP is still functorial.
HNN-EXTENSIONS OF TRIANGLE GROUPS
15
5. Malcharacteristic subgroups of free groups
In this section we find concrete examples of malcharacteristic subgroups
of the free group F (a, b). To find such subgroups we use fibre products of
Stallings’ graphs to obtain an algorithm which decides whether or not the
malcharacteristic property holds for certain subgroups of F (a, b).
The examples we obtain are used to find similar examples in triangle groups.
f{x,y} be the subgroup of F (a, b) generated by the words x and y
Indeed, let M
given in Section 3 (so generated by the same words which generated the subf{x,y} is malcharacteristic
group M of Ti,j,k ). It follows from Lemma 5.3 that M
f{x,y} is malcharacteristic in F (a, b) to
in F (a, b). We later use the fact that M
prove that M is malcharacteristic in Ti,j,k .
Maps of graphs. The principal device applied in this section is that of
maps of graphs; see Stallings’ paper for more details as well as for the relevant
definitions and terminology [Sta83].
The key tool when studying maps of graphs is Stallings’ folding algorithm
[Sta83, Section 3.2]. The algorithm begins with a map of graphs Γ1 → Γ,
and factors this map as a composition Γ1 → Γ2 → · · · → Γk → Γ such that
Γk → Γ is a locally injective map of graphs (and therefore is π1 -injective [Sta83,
Proposition 5.3]), and such that for 1 ≤ j < k the map Γj → Γj+1 is a folding
map. The graph Γk is uniquely determined, although in general the individual
foldings maps are not unique. A map of graphs Γ1 → Γ is folded if it cannot
be factored using the above algorithm.
Let F (x) be a free group with basis x. The basis x corresponds naturally to
a bouquet of circles Γx , which are directed and labeled by the letters xi ∈ x.
Any word in F (x) determines a closed path in Γx . Let s = {W1 , W2 , . . . , Wn }
be a set of words in F (x). Then this set corresponds naturally to a bouquet
Γs of n circles, with circles corresponding to the Wi ∈ s. There exists a
natural map Γs → Γx which sends the i-th loop of Γs to the closed path of
Γx corresponding to Wi . The Stallings’ graph of s is the graph Γs equipped
with the natural labeling induced by the map Γs → Γx . A Stallings’ graph Γs
bs to denote
is folded if the corresponding map Γs → Γx is folded. We use Γ
the folded Stallings’ graph of s, so the unique folded graph, equipped with the
bs → Γ. If C = hsi
natural map, such that the map Γs → Γx factors as Γs → Γ
bs )) then
bs have the same rank (that is, π1 (Γs ) ∼
and the graphs Γs and Γ
= π1 (Γ
bs ) ֒→ π1 (Γx ) corresponds to the map C ֒→ F (x).
the induced map π1 (Γ
Fibre products. The proofs in this section apply fibre products in the category of graphs [Sta83, Theorem 5.5]. If C = hsi is a subgroup of F (x) then
C is malnormal in F (x) if and only if the non-diagonal components of the
16
ALAN D. LOGAN
bs ⊗ Γ
bs form a forest. Fibre products are computable for finitely
fibre-product Γ
generated subgroups of free groups, and hence malnormality is decidable for
such subgroups of free groups. Also, if C = hsi and D = hti are subgroups of
bt ⊗ Γ
bs
F (x) then D ∩ C g = 1 for all g ∈ F (x) if and only if the fibre-product Γ
b
b
is a forest. In particular, if δ ∈ Aut(F (x)) then by computing Γδ(s) ⊗ Γs it is
decidable whether or not δ(C) ∩ C g = 1 for all g ∈ F (x).
Length preserving automorphisms. An automorphism α ∈ Aut(F (a, b))
is length-preserving if |α(a)| = 1 = |α(b)|. We begin with the following lemma,
which follows immediately from a result of Cohen–Metzler–Zimmermann [CMZ81,
Statement 3.9]. For words s ∈ F (a, b) we write s+ to mean the subsemigroup
of F (a, b) generated by the words s.1
Lemma 5.1. For all δ ∈ Aut(F (a, b)) there exists an inner automorphism
γ ∈ Inn(F (a, b)), length-preserving automorphisms α1 , α2 , and an integer m ∈
Z such that one of the following occurs:
(1) δγ is length-preserving; or
(2) α2 δα1 γ(a) = abm , α2 δα1 γ(b) = b with m 6= 0; or
(3) δα1 γ(a), δα1 γ(b) ∈ {abm , abm+1 }+ .
The length-preserving automorphism α1 corresponds to trivial changes of
notation in the images of a and b, for example replacing {abm , abm+1 }+ with
{bam , bam+1 }+ . The length-preserving automorphism α2 in Case (2) allows for
the images to be swapped, for example if δ is the map δ : a 7→ b, b 7→ abm then
we take α2 : a 7→ b, b 7→ a and take α1 and γ to be trivial.
Determining the malcharacteristic property. Lemma 5.2 now gives an
algorithm which decides if a given subgroup from a certain class C of subgroups
of F (a, b) is malcharacteristic or not. Note that it is decidable if a finite set of
words s satisfies the conditions of Lemma 5.2 (hence, membership of the class
C is decidable). Note also that the subsemigroup {a2 , a3 , b2 , b3 }+ of F (a, b)
consists precisely of the freely reduced words W in F (a, b) which do not contain
a−1 or b−1 and such that every instance of a in W is part of an a2 -term and
every instance of b in W is part of a b2 -term. Therefore, in Lemma 5.2 every
b s is part of an
instance of a in any circuit in the folded Stallings’ graph Γ
2
a -term, and similarly for b.
Lemma 5.2. Let s be a finite set of pairwise non-equal words contained in
the subsemigroup {a2 , a3 , b2 , b3 }+ of the free group F (a, b), and write C := hsi.
1
We use the “Kleene plus” s+ (subsemigroup) rather than the “Kleene star” s∗ (submonoid) as we reserve the notation s∗ for the symmetrised closure (see Section 6).
HNN-EXTENSIONS OF TRIANGLE GROUPS
17
b s contains some a3 Suppose that every circuit in the folded Stalling’s graph Γ
term and some b3 -term. Then C is malcharacteristic in F (a, b) if and only
if C is malnormal in F (a, b) and α(C) ∩ C g = 1 for all non-trivial lengthpreserving automorphism α ∈ Aut(F (a, b)) and all g ∈ F (a, b). In particular,
it is decidable whether C is malcharacteristic in F (a, b) or not.
Proof. First, suppose that C is malnormal in F (a, b) and that α(C) ∩ C g = 1
for all length-preserving automorphisms α ∈ Aut(F (a, b)) and all g ∈ F (a, b).
We show that for all non-inner δ ∈ Aut(F (a, b)) the fibre product of the folded
bδ(s) ⊗ Γ
bs is a forest; as C is malnormal this implies that C
Stallings’ graphs Γ
is malcharacteristic in F (a, b). To show that this condition holds for all such
δ ∈ Aut(F (a, b)) we consider the three cases of Lemma 5.1. The result holds
by assumption if δ ∈ Aut(F (a, b)) is such that Case (1) of Lemma 5.1 holds.
Now, suppose δ ∈ Aut(F (a, b)) is such that Case (2) of Lemma 5.1 holds,
so α2 δα1 γ(a) = abm , α2 δα1 γ(b) = b for some m ∈ Z \ {0}, γ ∈ Inn(F (a, b))
and α1 , α2 ∈ Aut(F (a, b)) length-preserving. Then
α2 δα1 γ(s) ⊆ {(abm )2 , (abm )3 , b2 , b3 }+
⊆ {abm a, (abm )2 a, b}+ =: s1 .
However, no element of s1 contains an a3 -term. Hence no circuit in the folded
bα δα γ(s) contains an a3 -term, and as γ is inner the same holds
Stallings’ graph Γ
2
1
for Γα2 δα1 (s) . As α1 , α2 are length-preserving, we further have that either no
bδ(s) contains an a3 -term or no circuit in Γ
bδ(s) contains a b3 -term.
circuit in Γ
bδ(s) ⊗ Γs is a forest, as required.
Therefore, the fibre product Γ
Finally, suppose δ ∈ Aut(F (a, b)) is such that Case (3) of Lemma 5.1 holds,
so δα1 γ(a), δα1 γ(b) ∈ {abm , abm+1 }+ for some m ∈ Z, γ ∈ Inn(F (a, b)) and
α1 ∈ Aut(F (a, b)) length-preserving. Then there exist positive words Ua and
Ub such that:
δα1 γ(s) = {Ua (abm , abm+1 )2 , Ua (abm , abm+1 )3 , Ub (abm , abm+1 )2 , Ub (abm , abm+1 )3 }
⊆ {abm , abm+1 }+ =: s2 .
If m 6= 0, −1 then no element of s2 contains an a3 -term. If m = 0 or m = −1
then s2 = {a, abǫ }+ , ǫ = ±1, and so no element of s2 contains a b3 -term.
b δα γ(s) contains an a3 -term or
Hence, no circuit in the folded Stallings’ graph Γ
1
3
b
no circuit in Γδα1 γ(s) contains a b -term. Therefore, as γ is inner and as α1 is
bδ(s) contains an a3 -term or no circuit
length-preserving, either no circuit in Γ
b δ(s) contains a b3 -term. Hence, the fibre product Γ
b δ(s) ⊗ Γs is a forest, as
in Γ
required.
18
ALAN D. LOGAN
The opposite direction is trivial. The decidability statement follows because
there are only finitely many length-preserving automorphisms α ∈ Aut(F (a, b)).
Examples of malcharacteristic subgroups. Lemma 5.3 now gives an exf of F (a, b).
ample of a malcharacteristic subgroup M
f be the subgroup of F (a, b) which is generated by the folLemma 5.3. Let M
lowing elements, with ρ ≫ 1.
x
e := a3 b3 a3 b4 . . . a3 bρ+2
ye := a3 bρ+3 a3 . . . a3 b2ρ+2
f is a non-cyclic malcharacteristic subgroup of F (a, b).
Then M
Proof. First, note that s = {e
x, ye} ⊆ {a2 , a3 , b2 , b3 }, and that every circuit
bs contains some a3 -term and some b3 -term.
in the folded Stalling’s graph Γ
Therefore, we may apply Lemma 5.2. Now, the words x
e and ye satisfy Wise’s
f is nonc(5) small cancellation condition for ρ ≫ 1, and so the subgroup M
cyclic and malnormal in F (a, b) [Wis01, Theorems 2.11 & 2.14].
Suppose that α ∈ Aut(F (a, b)) is non-trivial and length-preserving, and
f ∩M
fg 6= 1 for some g ∈ F (a, b). Then the fibre product Γα(s) ⊗ Γs
that α(M)
is not a forest. If we pick a circuit in this fibre product Γα(s) ⊗ Γs then this
circuit contains a subpath with label U = (a3 bp a3 bp+1 a3 bp+2 a3 bp+3 a3 bp+4 a3 )ǫ ,
where p > 3 and ǫ = ±1, as every circuit in Γs contains a subpath with a
label of this form. By traversing our chosen circuit in the opposite direction
if necessary, we may assume ǫ = 1.
The set α(s) is C ′ (λ) small cancellation, with λ arbitrarily small (as ρ ≫ 1).
Therefore, U is either a subword of an element of α(s)±1 (so of α(e
x)±1 or
±1
±1
of α(e
y ) ), or a subword of the product of two elements of α(s) . Hence a
subword a3 bq a3 bq+1 a3 of U is a subword of either α(e
x)±1 or of α(e
y)±1 , q > 3. It
is then clear that α is trivial (one way to see this is to note that α−1 is lengthpreserving and then to apply each non-trivial length-preserving automorphism
to a3 bq a3 bq+1 a3 and to a3 bq a3 bq+1 a3 ; the result is never a subword of x
e nor of ye).
g
f
f
This is a contradiction, so α(M ) ∩ M = 1 for all g ∈ F (a, b) as required.
f{x,y} and M
f are in the same automorphic orbit of F (a, b).
The subgroups M
f{x,y} is malcharacteristic in F (a, b). In Lemma 7.7 we
Hence, by Lemma 5.3, M
use this fact to prove that M is malcharacteristic in Ti,j,k .
Lemmas 3.3 and 5.3 combine to prove the following result.
Proposition 5.4. The free group F (a, b) contains malcharacteristic subgroups
fn of arbitrary rank n (possibly countably infinite).
M
HNN-EXTENSIONS OF TRIANGLE GROUPS
19
fn is generated by n finite subwords satisfying C ′ (1/6)
Indeed, the subgroup M
of the following infinite word:
x
eye(e
xye2 )e
xye(e
xye2)2 x
eye(e
xye2)3 · · · .
6. Malnormal subgroups from small cancellation presentations
The main results of this section are Theorems 6.4 and 6.5. We also prove
Theorem F, which is a special case of these two theorems. Theorem 6.5 is
applied in Section 7 to prove that the subgroup M of Ti,j,k , i, j, k ≥ 6, as
stated at the end of Section 3, is a free and malcharacteristic subgroup of
Ti,j,k ; Theorem A and Theorem 7.9 then follow by Theorem 4.2.
The results of this section lift conjugation in groups hx; ri to conjugation
in the ambient free group F (x). Our principal tool here is small cancellation
theory (see [LS77, Section V] for the basic definitions and results), and our key
innovation is to prove results about the subgroup hsiG of the group G = hx; ri
by studying the presentation hx; r, si. Theorems 6.4 and 6.5 give a new method
for recognising, for L and M subgroups of a small cancellation group G, if
Lg ∩ M = 1 for all g ∈ G.
Theorem 6.4 is not applied in this paper. It is included for the sake of
completeness, and because we believe that Theorem F and Theorems 6.4 and
6.5 are of general interest. These results can be viewed as a generalisation
of results of Wise, who applied small cancellation conditions on graphs to
give a method of recognising malnormal subgroups of free groups [Wis01].
We conclude this section by noting that our proofs can be adapted to Wise’s
graphical small cancellation setting.
6.1. Free subgroups of small cancellation groups. We start with Lemma
6.1, which describes how to view elements of the subgroup hsi of hx; ri as
diagrams over the presentation hx; r, si. We then apply this view to prove
Lemma 6.3, below, which gives a new method for recognising free subgroups
of small cancellation groups.
If r is a subset of F (x) then we write r∗ for the symmetrised closure of r,
that is, r∗ is the set of all cyclic shifts, inverses, and cyclic shifts of inverses
of elements of r. By an r∗ -diagram we mean a diagram over the presentation
hx; ri. Note that an r∗ -diagram is also an (r ∪ s)∗ -diagram. By an r∗ -disk
diagram we mean a diagram ∆ where R \ ∆ has exactly one component. By
an r∗ -region R we mean an r∗ -diagram which corresponds to a single relator
R ∈ r∗ . We call R a region if the set of relators is understood. A word
W ∈ F (x) is cyclically reduced if every cyclic shift of W is freely reduced.
Lemma 6.1. Let hx; si be a C(m) presentation, m ≥ 3. For every word
U = S1ǫ1 · · · Snǫn , Si ∈ s, there exists an s∗ -disk diagram DU with boundary
20
ALAN D. LOGAN
labels precisely the cyclically reduced cyclic shifts of U, and which has n regions
Si , 1 ≤ i ≤ n. For each region Si the intersection of Si with the boundary ∂DU
is connected and contains an edge, so pi := Si ∩ ∂DU is a path. Each such path
pi is the product of at least m − 2 pieces.
Proof. First form the bouquet of n petals labeled clockwise with the words
S1 , . . . , Sn respectively (different petals may have the same label). This defines,
in the obvious way, an s∗ -disk diagram ∆U with n regions Si such that Si
is a label of Si . Form the s∗ -disk diagram DU by taking ∆U and folding
small-cancellation pieces in adjacent petals together, that is, perform certain
Stallings’ folds on the edges of ∆U . Applying the C(m) condition, pi :=
Si ∩ ∂DU is connected and contains at least m − 2 pieces. Clearly some, and
hence every cyclically reduced cyclic shift of U is a label of ∂DU , and the result
follows.
Suppose that two diagrams ∆1 and ∆2 have a paths on their boundaries
with a common label, so there exist paths I1 ⊂ ∂∆1 and I2 ⊂ ∂∆2 such I1
and I2 have the same label. Then we may form a new diagram ∆ = ∆1 ∪ ∆2
where we equate the paths I1 and I2 . We call the image I ⊂ ∆ of the paths
I1 and I2 the attaching path of ∆ over ∆1 and ∆2 , or just the attaching path
if ∆, ∆1 and ∆2 are understood.
Lemma 6.2. Let hx; r, si be a C(4) presentation and let U ∈ F (x). Suppose
that ∆ is an (r ∪ s)∗ -diagram containing the subdiagram DU , formed as in
Lemma 6.1. If R is an r∗ -region of ∆ which attaches to DU over an attaching
path I then I cannot straddle three paths pi , pi+1 (mod n) and pi+2 (mod n) of DU .
Proof. Suppose I straddles three paths pi , pi+1 (mod n) and pi+2 (mod n) of DU .
Then pi+1 (mod n) contains one piece, a contradiction as pi+1 (mod n) cannot be
written as the product of fewer than two pieces by Lemma 6.1.
For a word W ∈ F (x) and a rational number c we write W > cr to mean
that there is a relator R ∈ r∗ such that W is a subword of R with |W | > c|R|.
A word W ∈ F (x) is called r∗ -reduced if W is freely reduced and there is
no subword U of W with U > 12 r. We call W cyclically r∗ -reduced if every
free reduction of every cyclic shift of W is non-empty and r∗ -reduced. Note
that a non-cyclically reduced word may be cyclically r∗ -reduced. We call W
(cyclically) Dehn reduced, rather than (cyclically) r∗ -reduced, if the underlying
set of relators r is understood.
Note that for s ⊂ F (x), if a word W ∈ hsi is freely/cyclically reduced as
a word over s±1 then it is not necessarily freely/cyclically reduced over F (x).
We therefore have to be careful what we mean by “free reduction”. If s ⊂ F (x)
we shall write Us (s), Vs (s), and so on, to mean words over the set s±1 which
HNN-EXTENSIONS OF TRIANGLE GROUPS
21
are freely reduced over s, and we shall write Ux (s), Vx (s), and so on, to mean
words over the set s±1 which are freely reduced over x.
By an r∗ -piece we mean a piece relative to the set r∗ . If G is given by the
generating set x and s ⊂ F (x) then we use hsiG to denote the subgroup of G
generated by the words s.
Lemma 6.3. Let G be given by a C ′ (1/6) or C ′ (1/4) − T (4) presentation
hx; ri. Suppose that hx; r, si is a C ′ (1/4) presentation. Then every word Us (s)
is cyclically r∗ -reduced, and hence hsiG is a free subgroup of hx; ri with basis
s.
Proof. Suppose that there exists a non-empty word U := Us (s) = S1ǫ1 . . . Snǫn ,
Si ∈ s, which is cyclically reduced as a word over s±1 but is not cyclically
r∗ -reduced. We obtain a contradiction.
Consider the (non-empty) diagram DU given by Lemma 6.1. As U is not
cyclically r∗ -reduced we may attach an r∗ -region R to the boundary ∂DU of the
diagram DU over an attaching path I such that |I| > 21 |∂R| [LS77, Theorems
V.4.5 & V.4.6].
By Lemma 6.2, the attaching path I straddles at most two paths pi and
pi+1 (mod n) of ∂DU , and hence the path I contains at most two (r ∪ s)∗ -pieces.
Therefore, |I| < 42 |∂R| = 21 |∂R|, a contradiction.
6.2. Conjugacy in small cancellation groups. Theorems 6.4 and 6.5 lift
conditions on conjugation and intersections of subgroups in small cancellation
groups hx; ri to the analogous situation in the ambient free group F (x).
An annular r∗ -diagram A is an r-diagram such that R2 \ A has exactly two
components. Such a diagram has an interior boundary ∂I A and an exterior
boundary ∂E A. Annular diagrams encode conjugation, and for C ′ (1/6) and
C ′ (1/4) − T (4) small cancellation presentations there are extremely strong
structural theorems for annular diagrams [LS77, Theorems V.5.3 & V.5.5]. In
particular, if A is an annular r∗ -diagram where hx; ri is a C ′ (1/6) or C ′ (1/4) −
T (4) small cancellation presentation then either every region of A has edges
on both the interior boundary and the exterior boundary of A, or no region
has this property. In the case that no region has this property, every region
has connected intersection with one of ∂I A of ∂E A, and each such intersection
contains at least one edge (see [LS77, Figure V.5.2]).
Note that if hx; r, si is a C ′ (1/6) presentation then the sub-presentation
hx; ri is also a C ′ (1/6) presentation. If I is a path in a graph then we use ι(I)
to denote the initial vertex of I and τ (I) to denote the terminal vertex of I.
Theorem 6.4. Suppose that hx; r, si is a C ′ (1/6) small cancellation presentation. Let G be the group given by the sub-presentation hx; ri, and let
ϕ : F (x) → hx; ri be the natural map.
22
ALAN D. LOGAN
Suppose that t ⊂ F (x) is a set of words such that every word Vt (t) is
cyclically r∗ -reduced. For all U ∈ hsi and V ∈ hti, if there exists g ∈ G such
that g −1ϕ(U)g =G ϕ(V ) then there exists W ∈ F (x) such that ϕ(W ) = g and
W −1 UW =F (x) V . In particular, there exists g ∈ G such that hsigG ∩ htiG 6=G 1
if and only if there exists W ∈ F (x) such that hsiW ∩ hti =
6 F (x) 1.
Proof. First note that every word Us (s) is cyclically r∗ -reduced by Lemma 6.3.
Therefore, suppose that A is an annular r-diagram such that its interior boundary ∂I A has a label which is a cyclic shift of some word U := U(s) = S1ǫ1 · · · Snǫn ,
Si ∈ s, and its exterior boundary ∂E A has a label which is a cyclic shift of
some word V (t). It is sufficient to prove that A contains no regions.
Consider the disk diagram DU from Lemma 6.1. Each of the paths pi on the
boundary of DU contains at least five (r ∪ s)∗ -pieces. Note that we can form
an (r ∪ s)∗ -disk diagram ∆ by attaching the boundary ∂DU to the boundary
∂A of A. Suppose that A contains at least one region; we find a contradiction.
As A contains a region, the boundary of DU connects to a region R of A
over an attaching path I such that I contains an edge.
First, suppose that R∩∂E A is empty. By the structural theorem for annular
′
C (1/6) diagrams we have that |I| > 26 |∂R|. Hence, I cannot be written as
the product of fewer than three (r ∪ s)∗ -pieces. Therefore, the path I straddles
three paths pi , pi+1 (mod n) and pi+2 (mod n) , a contradiction by Lemma 6.2.
Next, suppose that R ∩ ∂E A is non-empty. In this case every region of A
has an edge on ∂I S and an edge on ∂E S. Additionally, suppose that R does
not share an edge with any other region of A. Then we have that |I| = 21 |∂R|,
and hence I cannot be written as the product of fewer than four (r∪s)∗ -pieces.
Therefore, the path I straddles four paths pi , . . . , pi+3 (mod n) , a contradiction
by Lemma 6.2. On the other hand, suppose that R shares an edge with some
region S of A. Now, as with the path I, the path J := S ∩ ∂I A contains
an edge. We may assume that the terminal vertex of I is the initial vertex
of J, so τ (I) = ι(J). The minimal possible length of I corresponds to when
|∂E (R)| = 12 |∂R| and R connects over a piece to an additional region T of A.
Hence, |I| > (1 − 61 − 16 − 12 )|∂R| = 16 |∂R|. Hence, the attaching path I cannot
be written as the product of fewer than two pieces. Similarly, |J| > 16 |∂S| so
the attaching path J cannot be written as the product of fewer than two pieces.
We therefore have that I straddles two paths pi and pi+1 (mod n) , with ι(I) ∈ pi
and τ (I) ∈ pi+1 (mod n) , and that J straddles two paths pj and pj+1 (mod n) ,
with ι(J) ∈ pj and τ (J) ∈ pj+1 (mod n) . As τ (I) = ι(J) and as the path
pi+1 (mod n) does not consist of a single piece we have that pi+1 (mod n) = pj .
However, this means that pj decomposes into only two pieces, a contradiction
by Lemma 6.2.
HNN-EXTENSIONS OF TRIANGLE GROUPS
23
We now prove the analogous result for C ′ (1/4) − T (4) presentations. Note
that if hx; r, si is a C ′ (1/4)−T (4) presentation then the sub-presentation hx; ri
is also a C ′ (1/4) − T (4) presentation.
Theorem 6.5. Suppose that hx; r, si is a C ′ (1/4) − T (4) small cancellation
presentation. Let G be the group given by the sub-presentation hx; ri, and let
ϕ : F (x) → hx; ri be the natural map.
Suppose that t ⊂ F (x) is a set of words such that every word Vt (t) is
cyclically r∗ -reduced. For all U ∈ hsi and V ∈ hti, if there exists g ∈ G such
that g −1ϕ(U)g =G ϕ(V ) then there exists W ∈ F (x) such that ϕ(W ) = g and
W −1 UW =F (x) V . In particular, there exists g ∈ G such that hsigG ∩ htiG 6=G 1
if and only if there exists W ∈ F (x) such that hsiW ∩ hti =
6 F (x) 1.
Proof. First note that every word Us (s) is cyclically r∗ -reduced by Lemma 6.3.
Therefore, suppose that A is an annular r-diagram such that its interior boundary ∂I A has a label which is a cyclic shift of some word U := U(s) = S1ǫ1 · · · Snǫn ,
Si ∈ s, and its exterior boundary ∂E A has a label which is a cyclic shift of
some word in hti. It is sufficient to prove that A contains no regions.
Consider the disk diagram DU from Lemma 6.1. Each of the paths pi on the
boundary of DU contains at least three (r ∪ s)∗ -pieces. Note that we can form
an (r ∪ s)∗ -disk diagram ∆ by attaching the boundary ∂DU to the boundary
∂A of A. Suppose that A contains at least one region; we find a contradiction.
As A contains a region, the boundary of DU connects to a region R of A
over an attaching path I such that I contains an edge.
First, suppose that R∩∂E A is empty. By the structural theorem for annular
′
C (1/4)−T (4) diagrams we have that |I| > 14 |∂R|. Hence, I cannot be written
as the product of fewer than two (r∪s)∗ -pieces. Therefore, the path I straddles
two paths pi , pi+1 (mod n) . Then the vertex v = pi ∩ pi+1 (mod n) is an internal
vertex of a C ′ (1/4)−T (4) disc diagram which has degree three, a contradiction.
Next, suppose that R ∩ ∂E A is non-empty. In this case every region of A
has an edge on ∂I S and an edge on ∂E S. Additionally, suppose that R does
not share an edge with any other region of A. Then we have that |I| = 12 |∂R|,
and hence I cannot be written as the product of fewer than three (r ∪ s)∗ pieces. Therefore, the path I straddles three paths pi , pi+1 (mod n) , pi+2 (mod n) ,
a contradiction by Lemma 6.2. On the other hand, suppose that R shares an
edge with some region S of A. Now, as with the path I, the path J := S ∩∂I A
contains an edge. We may assume that the terminal vertex of I is the initial
vertex of J, so τ (I) = ι(J), and note that this vertex is an internal vertex of
the disc diagram. Therefore, the vertex τ (I) = ι(J) has degree at least 4, by
the T (4) condition. Hence, there is a path pi of DU such that either pi is a
subpath of I or I is a subpath of pi . If pi is a subpath of I then pi consists
of a single piece, a contradiction by Lemma 6.2. If I is a subpath of pi then
24
ALAN D. LOGAN
|I| < 41 |∂R|. Then |∂E A ∩ R| ≤ 12 |∂R|, and |R ∩ S| < 14 |∂R|, hence there
exists a second region T of A which connects over a piece to S, and where
K := T ∩ DU is a non-empty path. We may assume that τ (K) ∈ I, and so
τ (K) = ι(I). The vertex τ (K) = ι(I) is an internal vertex of the disk diagram
∆, and hence has degree four by the T (4) condition. Thus, I = pi , but then
pi consists of a single piece, a contradiction.
Proof of Theorem F. We now prove Theorem F.
Proof of Theorem F. As the set s contains no proper powers and satisfies the
C(5) small cancellation condition, the set s also satisfies Wise’s c(5) small
cancellation condition [Wis01, Definition 2.3]. Hence, hsi is a malnormal in
F (x) with minimal basis s [Wis01, Theorems 2.11 & 2.14]. The result then
follows by taking t := s in Theorem 6.4 or in Theorem 6.5, as appropriate.
C(m) − T (4) does not work. The C ′ (1/6) and C ′ (1/4) − T (4) conditions
are needed in Theorems 6.4 and 6.5 because they are metric conditions, in the
sense that pieces have bounded length. The following example demonstrates
that the conclusions of these two theorems do not hold in general if the set
r ∪ s satisfies the the non-metric condition C(m) − T (4) for any m, even if r
satisfies C ′ (λ) for arbitrarily small λ: Let x = {a, b, x1 , y1 , . . . , x2p , y2p }, and
take
R = [x1 , y1 ] · · · [x2p , y2p ], and
S = [x1 , y1 ] · · · [xp , yp ]abab2 · · · abq .
Then hx; Ri has the C ′ (1/(2p − 1)) small cancellation condition while hx; R, Si
has the C(m) − T (4) condition, where m is arbitrarily large and dependent
on p and q (note that hx; r, si has T (4) as R and S are positive words). Note
that R has a piece [x1 , y1] · · · [xp , yp ] which has length 21 |R|. Then the words
S and T = abab2 · · · abq ([xp+1 , yp+1] · · · [x2p , y2p ])−1 are both r∗ -reduced, as are
all their powers, and neither of S not T is a proper power of any element of
x. Moreover, S and T are conjugate in hx; ri but are not freely conjugate.
Hence, for all W (x) ∈ F (s) we have that hsi ∩ htiW (x) 6=F (X) 1, but there
exists g ∈ G such that hsiG ∩ htigG 6=G 1.
Wise’s graphical small cancellation theory. In the classical small cancellation theory, which underlines Theorems 6.4 and 6.5, we ensure that certain
conditions hold for all cyclic shifts of every R ∈ (r ∪ s)±1 (the symmetrised
closure (r ∪ s)∗ ). This is more powerful than is necessary for Theorems 6.4
and 6.5. In particular, we do not need all cyclic shifts of the elements of s±1
HNN-EXTENSIONS OF TRIANGLE GROUPS
25
because the diagram DU , given by Lemma 6.1, is constructed only by elements
of s±1 .
We therefore introduce the following conditions, which sit between the classical small cancellation conditions and Wise’s graphical small cancellation conditions [Wis01] (see also Gromov [Gro03]). We state below two theorems which
use these new conditions to generalise Theorems 6.4 and 6.5. We do not prove
these analogous theorems as the proofs are essentially identical to the proofs
of Theorems 6.4 and 6.5. This is because Wise’s small cancellation conditions
involve the use of a “distinguished vertex” for the boundary of each region R,
but these new conditions allow for this vertex to be placed arbitrarily on the
boundary of R. Therefore, in the proofs of Theorems 6.4 and 6.5 we can first
“place” the distinguished vertex of the region R where we want it to be in ∂R
(for example, we can chose that the distinguished vertex will be an internal
vertex of the annular diagram A of degree at least three, or will be the initial
vertex ι(I) of the attaching path I).
The new conditions are as follows; they can be roughly though of as Wise’s
graphical small cancellation conditions involving the symmetrised closure of a
subset of the relators. Let r = {R1 , . . . , Rn }. We say that the presentation
hx; r, si has the graphical c′r∗ (λ) condition if every set {R1W1 , . . . , RnWn } ∪ s,
where each RiWi is cyclically reduced, has the graphical c′ (λ) condition. The
cr∗ (m) and tr∗ (n) conditions are defined analogously.
Theorem 6.6. Suppose that G is given by the C ′ (1/6) small cancellation presentation hx; ri, and let ϕ : F (x) → hx; ri be the natural map. Suppose that
hx; r, si is a graphical c′r∗ (1/6) small cancellation presentation.
Suppose that t ⊂ F (x) is a set of words such that every word Vt (t) is
cyclically r∗ -reduced. For all U ∈ hsi and V ∈ hti, if there exists g ∈ G such
that g −1ϕ(U)g =G ϕ(V ) then there exists W ∈ F (x) such that ϕ(W ) = g and
W −1 UW =F (x) V . In particular, there exists g ∈ G such that hsigG ∩ htiG 6=G 1
if and only if there exists W ∈ F (x) such that hsiW ∩ hti =
6 F (x) 1.
Theorem 6.7. Suppose that G is given by the C ′ (1/4) − T (4) small cancellation presentation hx; ri, and let ϕ : F (x) → hx; ri be the natural map. Suppose
that hx; r, si is a graphical c′r∗ (1/4) − tr∗ (4) small cancellation presentation.
Suppose that t ⊂ F (x) is a set of words such that every word Vt (t) is
cyclically r∗ -reduced. For all U ∈ hsi and V ∈ hti, if there exists g ∈ G such
that g −1ϕ(U)g =G ϕ(V ) then there exists W ∈ F (x) such that ϕ(W ) = g and
W −1 UW =F (x) V . In particular, there exists g ∈ G such that hsigG ∩ htiG 6=G 1
if and only if there exists W ∈ F (x) such that hsiW ∩ hti =
6 F (x) 1.
26
ALAN D. LOGAN
7. Malcharacteristic free subgroups of triangle groups
In this section we obtain examples of malcharacteristic subgroups of triangle
groups. In particular, Lemma 7.7 proves that the subgroup M of Ti,j,k , i, j, k ≥
6, stated in Section 3 is malcharacteristic and free of rank two. At the end of
the section we apply this to prove Theorem A and Theorem 7.9.
M is free and malnormal. We first prove that the stated subgroup M of
Ti,j,k is free of rank two and malnormal.
Lemma 7.1. The subgroup M = hx, yi of Ti,j,k = ha, b; ai , bj , (ab)k i, i, j, k ≥ 6,
is a malnormal subgroup of Ti,j,k and is free of rank two.
Proof. The set {ai , bj , (ab)k , x, y} has the C ′ (1/4) − T (4) small cancellation
condition. The result then follows from Theorem F.
The automorphisms of Ti,j,k . After Lemma 7.1, in order to prove that M
is malcharacteristic in Ti,j,k it is sufficient to prove that if δ ∈ Aut(Ti,j,k ) such
that δ(M) ∩ M 6= 1 then δ ∈ Inn(Ti,j,k ). We therefore need to understand
the outer automorphism groups of triangle groups; we do this in Lemmas 7.2
and 7.3. The proof of Lemma 7.2 follows closely certain proofs in a paper of
Zieschang [Zie76] (but Lemma 7.2 does not follow from Zieschang’s paper).
Lemma 7.2. Suppose that Ti,j,k , with i, j, k ≥ 6, and Tt1 ,t2 ,t3 define the same
presentation, up to a permutation of the generators. Write G = ha, b; ai , bj , (ab)k i
and H = hx1 , x2 , x3 ; xt11 , xt22 , xt33 , x1 x2 x3 i. If f : G → H is an isomorphism then
there exists an inner automorphism γ ∈ Inn(H), integers p, q ∈ {1, 2, 3} with
p 6= q, and ǫ = ±1 such that f γ(a) = xǫp and f γ(b) = xǫq .
ξ
ξ
Proof. We may assume f (a) = U1 xpp U1−1 and f (b) = U2 xqq U2−1 , with p, q ∈
{1, 2, 3} not necessarily distinct, and with |ξp | ≤ 12 tp and |ξq | ≤ 12 tq [ZVC70,
Satz IV.12] (see also [FR99, Theorem 4.3.2]). Therefore, there exists an inner
ξ
ξ
automorphism γ ∈ Inn(H) such that f γ(a) = xpp and f γ(b) = Uxqq U −1 ,
where U does not begin with x±1
and does not end with x±1
p
q . We view H
′
tp
tq
using the C (1/4) − T (4) presentation PH = hxp , xq ; x , x , (xp xq )tr i. Let
s = {xtp , xtq , (xp xq )tr }. Assume that the word U is Dehn reduced (that is, U
is s∗ -reduced).
ξ
ξ
Suppose that U is not the empty word. Now, the word xpp Uxqq U −1 has finite
ξ
ξ
order in H, and so there exist some n > 1 such that (xpp Uxqq U −1 )n contains a
subword W of some R ∈ s∗ with |W | > 32 |R| [LS77, Theorem V.4.4.ii]. Then
ξ
ξ
W must contain letters from U or U −1 and at least one letter from xpp or xqq .
−ǫ ξ ǫ
Therefore, R is conjugate to (xp xq )±tr . Since tq > 2, the word xq q xpp xqq is
HNN-EXTENSIONS OF TRIANGLE GROUPS
27
ξ
not contained in W , and hence if W contains a part of xpp then W contains a
ξ
single letter from xpp , and this is either at the start or the end of W . Similarly,
−ǫ ξ ǫ
since tp > 2 the word xp p xqq xpp is not contained in W and so the analogous
ξ
statement holds for W containing a part of xqq .
ξs1
We therefore have two cases: either W contains x±1
s1 from xs1 and the other
ξs1
letters are from one of U or U −1 , or W begins with x±1
s1 from xs1 , ends with
ξs2
−1
.
x±1
s2 from xs2 , s1 6= s2 , and all other letters are from precisely one of U or U
′
tr
In the first case, U contains a part W from the defining relation (xp xq ) with
|W ′ | = |W | − 1 > 32 · 2tr − 1 > tr = 21 |R| (as tr > 3). Hence, U is not Dehn
reduced, a contradiction. In the second case, W is again part of the relation
(xp xq )±tr , therefore |U| = |W | − 2 > 23 · 2tr − 2 ≥ tr (as tr ≥ 6), and so again
U is not Dehn reduced, a contradiction. Therefore, U is the empty word, and
ξ
ξ
we have f γ(a) = xpp and f γ(b) = xqq .
We now prove that there exists some ǫ = ±1 such that ξp = ǫ = ξq , which
proves the result. Suppose otherwise. Then the longest possible subword of a
ξ ξ
ǫ ǫ ǫ
ǫ ǫ ǫ
relator contained in the word (xpp xqq )tr is either xpp xqq xpp or xqq xpp xqq , so the
ξ ξ
word (xpp xqq )tr is Dehn reduced. As this word is non-empty and Dehn reduced
it is non-trivial, a contradiction.
Write Ψ for the set consisting of the following twelve maps. Note that each
map defines an automorphism of F (a, b).
ψ(1,ǫ) : a 7→ aǫ
b 7→ bǫ
ψ(4,ǫ) : a 7→ bǫ
b 7→ aǫ
ψ(2,ǫ) : a 7→ aǫ
b 7→ (ab)−ǫ
ψ(5,ǫ) : a 7→ bǫ
b 7→ (ab)−ǫ
ψ(3,ǫ) : a 7→ (ab)ǫ
b 7→ b−ǫ
ψ(6,ǫ) : a 7→ (ab)ǫ
b 7→ a−ǫ
Lemma 7.3. Let i, j, k ≥ 6. Then:
(1) If i, j, k are pairwise non-equal then Ψi,j,k := {ψ(1,1) , ψ(1,−1) } is a transversal for Out(Ti,j,k ).
(2) If i = j 6= k then Ψi,i,k := {ψ(1,1) , ψ(1,−1) , ψ(4,1) , ψ(4,−1) } is a transversal
for Out(Ti,j,k ).
(3) If i = j = k then Ψ is a transversal for Out(Ti,i,i ).
Proof. By Lemma 7.2, if δ ∈ Aut(Ti,j,k ) then there exists some γ ∈ Inn(Ti,j,k )
such that δγ ∈ Ψ. The result follows by checking which elements of Ψ define
automorphisms of Ti,j,k for each of the three cases.
The images of x and y under automorphisms. Let s := {x, y} ⊂ F (a, b).
28
ALAN D. LOGAN
Our final step before proving that M is malcharacteristic in Ti,j,k is to prove
that for each ψ ∈ Ψ, every word Wψ(s) (ψ(s)) is cyclically Dehn reduced in
Ti,j,k . This allows us to apply Theorem 6.5 to ψ(s). Lemmas 7.4–7.6 now
analyse these words Wψ(s) (ψ(s)).
Every map ψ ∈ Ψ extends naturally to the whole group Ti,j,k , even if
ψ 6∈ Aut(Ti,j,k ). That there are maps ψ ∈ Ψ which are not necessarily automorphisms of the groups involved does not affect the proofs of Lemmas 7.4–
7.6.
Lemma 7.4. Let Ti,j,k = ha, b; ai , bj , (ab)k i, with i, j, k ≥ 6. Suppose ψ is
a map contained in the set Ψ, and we shall write A := ψ(a)ψ(b)−1 , B :=
ψ(a)2 ψ(b)−1 . Then for all p, q ≥ 0 the word B p A3 B q is freely reduced over
F (a, b) and does not contain a±4 , b±4 , ((ab)3 a)±1 or (b(ab)3 )±1 , and so is
Dehn reduced.
Proof. The proof is by inspection of the appropriate words. Indeed the following words are all freely reduced over F (a, b) for p, q ≥ 3 with the longest
subwords of relators occurring being a3 ≤ ai , b ≤ bj and babab ≤ (ab)k . Each
word represents B p A3 B q for the indicated ψ ∈ Ψ.
ψ(1,1) :
(a2 b−1 )p (ab−1 )3 (a2 b−1 )q
ψ(2,1) :
(a3 b)p (a2 b)3 (a3 b)q
ψ(3,1) :
(abab2 )p (ab2 )3 (abab2 )q
Now, if the result holds for ψ(l,1) , l ∈ {1, 2, 3} then it also holds for ψ(l+3,1)
(as ψ(l,1) and ψ(l+3,1) differ just by a switch of a and b, and possibly by an
inner automorphism). Further, if the result holds for ψ(l,1) then it also holds
for ψ(l,−1) . Hence, the proof is complete.
Lemma 7.5. Let Ti,j,k = ha, b; ai , bj , (ab)k i, with i, j, k ≥ 6. Suppose ψ is
a map contained in the set Ψ, and we shall write A := ψ(a)ψ(b)−1 , B :=
ψ(a)2 ψ(b)−1 . Then for all p, q ≥ 3, ǫ0 = ±1, after free reduction over F (a, b)
the word B ǫ0 p A3 B −ǫ0 q has the form B ǫ0 (p−1) CB −ǫ0 (q−1) for some word C ∈
F (a, b). Moreover, the resulting word B ǫ0 (p−1) CB −ǫ0 (q−1) does not contain a±4 ,
b±4 , (ab)±3 or (ba)±3 and so is Dehn reduced.
Proof. As with Lemma 7.4, the proof is by inspection of the appropriate words.
Indeed, after free reduction over F (a, b) the following words are all Dehn reduced for p, q ≥ 3, ǫ0 = ±1, with the longest subwords of relators occurring
being a±3 ≤ a±i , b±2 ≤ b±j and (babab)±1 ≤ (ab)±k . In each line the left-hand
word represents B ǫ0 p A3 B −ǫ0 q for the indicated map ψ ∈ Ψ and the right-hand
word represents the freely reduced form of the word. Each map has two cases:
HNN-EXTENSIONS OF TRIANGLE GROUPS
29
ǫ0 = 1 and ǫ0 = −1.
ψ(1,1) : (a2 b−1 )p (ab−1 )3 (a2 b−1 )−q = (a2 b−1 )p (ab−1 )2 a−1 (ba−2 )q−1
(a2 b−1 )−p (ab−1 )3 (a2 b−1 )q = (ba−2 )p−1 ba−1 b−1 (ab−1 )2 (a2 b−1 )q
ψ(2,1) :
(a3 b)p (a2 b)3 (a3 b)−q = (a3 b)p (a2 b)2 a−1 (b−1 a−3 )q−1
(a3 b)−p (a2 b)3 (a3 b)q = (b−1 a−3 )p−1 b−1 a−1 b(a2 b)2 (a3 b)q
ψ(3,1) :
(abab2 )p (ab2 )3 (abab2 )−q = (abab2 )p ab2 aba−1 (b−2 a−1 b−1 a−1 )q−1
(abab2 )−p (ab2 )3 (abab2 )q = (b−2 a−1 b−1 a−1 )p−1b−2 a−1 b(ab2 )2 (abab2 )q
Now, if the result holds for ψ(l,1) , l ∈ {1, 2, 3} then it also holds for ψ(l+3,1)
(as ψ(l,1) and ψ(l+3,1) differ just by a switch of a and b, and possibly by an
inner automorphism). Further, if the result holds for ψ(l,1) then it also holds
for ψ(l,−1) . Hence, the proof is complete.
We now combine Lemmas 7.4 and 7.5 as follows. Note that the word
W{a,b} (ψ(s)) corresponds to the image of the word Ws (s) under the map ψ
after applying free reduction in F (a, b).
Lemma 7.6. Let Ti,j,k = ha, b; ai , bj , (ab)k i, with i, j, k ≥ 6, and let s := {x, y}.
Suppose ψ is a map contained in the set Ψ and consider Ws (s). Then the word
W{a,b} (ψ(s)) is Dehn reduced.
Proof. Write A := ψ(a)ψ(b)−1 and B := ψ(a)2 ψ(b)−1 . Write Xp0 ,q0 := B p0 A3 B q0 ,
Yp1 ,q1 := B p1 A3 B −q1 and Zp2 ,q2 := B −p2 A3 B q2 , where p0 , q0 ≥ 0 and where
p1 , p2 , q1 , q2 ≥ 3, and write
s0 := {Xp0 ,q0 | p0 , q0 ≥ 0} ∪ {Yp1 ,q1 , Zp2 ,q2 | pi , qi ≥ 3}.
Now, Wψ(s) (ψ(s)) is a product of the words (A3 B 3 A3 B 4 · · · A3 B ρ+2 )±1 and
(A3 B ρ+3 A3 · · · A3 B 2ρ+2 )±1 . Therefore, there exists a word Us0 (s0 ) such that
Us0 (s0 ) ≡ Wψ(s) (ψ(s)), and where every subword of length two of Us0 (s0 ) has
the form either (Xp0 ,q0 Yp1 ,q1 )±1 , (Yp1,q1 Xp−1
)±1 , (Xp−1
Z
)±1 , (Zp2 ,q2 Xp0 ,q0 )±1 ,
0 ,q0
0 ,q0 p2 ,q2
or (Xp0 ,q0 Xp′0 ,q0′ )±1 . Note that U{a,b} (s0 ) ≡ W{a,b} (ψ(s)).
By Lemma 7.4, the words Xp0 ,q0 are freely reduced over F (a, b) and are
Dehn reduced. By Lemma 7.5, after free reduction in F (a, b) all words Yp1 ,q1
and Zp2 ,q2 are Dehn reduced and of the form respectively B p1 −1 C1 B −(q1 −1)
and B −(p2 −1) C2 B q2 −1 for some fixed words C1 , C2 ∈ F (a, b). Then, applying
Lemma 7.4 again, the following words are freely reduced over F (a, b) and Dehn
reduced:
)±1 ,
(Xp0 ,q0 B p1 −1 C1 B −(q1 −1) )±1 , (B p1−1 C1 B −(q1 −1) Xp−1
0 ,q0
B −(p2 −1) C2 B q2 −1 )±1 , (B −(p2 −1) C2 B q2 −1 Xp0 ,q0 )±1 , (Xp0 ,q0 Xp′0 ,q0′ )±1
(Xp−1
0 ,q0
30
ALAN D. LOGAN
These words represent the length-two subwords of Us0 (s0 ) after free reduction
in F (a, b), and hence the word U{a,b} (s0 ) is Dehn reduced. As U{a,b} (s0 ) ≡
W{a,b} (ψ(s)), the words W{a,b} (ψ(s)) is Dehn reduced as required.
Examples of malcharacteristic subgroups. We are finally ready to prove
that the subgroup M of Ti,j,k , i, j, k ≥ 6, is malcharacteristic.
Lemma 7.7. Let M be the subgroup of Ti,j,k = ha, b; ai , bj , (ab)k i, i, j, k ≥ 6,
which is generated by the following elements, with ρ ≫ i, j, k.
x := (ab−1 )3 (a2 b−1 )3 (ab−1 )3 (a2 b−1 )4 . . . (ab−1 )3 (a2 b−1 )ρ+2
y := (ab−1 )3 (a2 b−1 )ρ+3 (ab−1 )3 (a2 b−1 )ρ+4 . . . (ab−1 )3 (a2 b−1 )2ρ+2
Then M is a malcharacteristic subgroup of Ti,j,k and is free of rank two.
f{x,y} = hx, yi for the subgroup of F (a, b) generated by the
Proof. Write M
f{x,y} is in the same Aut(F (a, b))-orbit as the subgroup
words x and y. Then M
f defined in Lemma 5.3. Therefore, by Lemma 5.3, the subgroup M
f{x,y} is
M
malcharacteristic in F (a, b). We use this to prove that M is malcharacteristic
in Ti,j,k .
Now, by Lemma 7.1, it is sufficient to prove that if δ ∈ Aut(Ti,j,k ) is such
that δ(M) ∩ M 6= 1 then δ ∈ Inn(Ti,j,k ). So, suppose that there exists an
automorphism δ ∈ Aut(Ti,j,k ) and two words U and V such that U(x, y) =
V (δ(x), δ(y)), and we wish to prove that δ is inner. Now, by Lemma 7.3
there exist ψ ∈ Ψ and γg ∈ Inn(Ti,j,k ), g ∈ Ti,j,k , such that δ = ψγg , so
ψγg (M) ∩ M 6= 1. Now, after free reduction over F (a, b) every word in ψ(M)
is Dehn reduced, by Lemma 7.6. Hence, we may apply Theorem 6.5. Therefore,
e W (M
f{x,y} )∩M
f{x,y} 6=F (a,b) 1, where
there exists a word W ∈ F (a, b) such that ψγ
ψe is the automorphism of F (a, b) defined using the same words as ψ. Then ψe 6∈
f{x,y} is not malcharacteristic in F (a, b), a contradiction.
Inn(F (a, b)), so M
If any of i, j or k in Ti,j,k are less than 6 then it is not clear that the
subgroup M is malcharacteristic. The precise issues are found in Lemma 7.2
and in Lemmas 7.4 and 7.5, whose proofs each require i, j, k ≥ 6. Because of
the small cancellation arguments we apply, it is likely that Lemma 7.7, and
hence Theorem A and Theorem 7.9, can be extended to i, j, k > 6 or even to
i, j, k > 4. To develop our results in this direction, first Lemma 7.2 would need
to be extended appropriately. To extend Lemmas 7.4 and 7.5 it is likely that
new words x, y ∈ F (a, b) would need to be found.
Lemmas 3.3 and 7.7 combine to prove the following result.
Proposition 7.8. A triangle group Ti,j,k , i, j, k ≥ 6, contains malcharacteristic subgroups Mn of arbitrary rank n (possibly countably infinite).
HNN-EXTENSIONS OF TRIANGLE GROUPS
31
Indeed, the subgroup Mn is generated by n finite subwords satisfying C ′ (1/6)
of the following infinite word:
xy(xy 2 )xy(xy 2)2 xy(xy 2)3 · · · .
Proofs of Theorems A, B, C and E. We first prove Theorem A.
Proof of Theorem A. By Lemma 7.7, the group Ti contains a malcharacteristic
subgroup which is free of rank two. As Ti has Serre’s property FA [Ser80,
Example 6.3.5] and as φ : a 7→ b, b 7→ b−1 a−1 defines a non-inner automorphism
of Ti which has order three, the result follows from Theorem 4.2.
We now prove Theorem B.
Proof of Theorem B. Theorem B follows immediately from Theorem 4.3.
We now prove Theorem C.
Proof of Theorem C. Theorem C follows immediately from Theorem 4.4.
We now prove Theorem E.
Proof of Theorem E. Theorem E follows immediately from Theorem 4.5.
The triangle groups Ti,j,k . Theorems 7.9–7.12 prove analogous results to
Theorems A–E where the base group H is a fixed triangle group Ti,j,k rather
than an equilateral triangle group Ti .
Theorem 7.9. Fix a (non-equilateral) triangle group Ti,j,k with i, j, k ≥ 6.
Every countable group Q can be realised as an index-one or-two subgroup of
the outer automorphism group of an automorphism-induced HNN-extension
TPi,j,k of Ti,j,k . Moreover, Aut(TPi,j,k ) has an index-one or-two subgroup which
splits as TPi,j,k ⋊ Q.
Proof. By Lemma 7.7, the group Ti,j,k contains a malcharacteristic subgroup
which is free of rank two. As Ti,j,k has Serre’s property FA [Ser80, Example
6.3.5] and as φ : a 7→ a−1 , b 7→ b−1 defines a non-inner automorphism of Ti,j,k ,
the result follows from Theorem 4.2.
The proofs of Theorems 7.10–7.12 are identical to the proofs of Theorems
B, C and E, and hence are omitted.
Theorem 7.10. The map defined by P 7→ TPi,j,k is a functor from the category
of countable group presentations Pres to the category of groups Grp.
i,j,k
Theorem 7.11. Let Ti,j,k
where π1 (P) is finite.
Fin be the class of groups TP
If π1 (P) is residually finite then TPi,j,k is residually-Ti,j,k
Fin .
32
ALAN D. LOGAN
Theorem 7.12. The subgroups Mn , n ∈ N, in the proof of Theorem 7.9 may
be chosen in such a way that for every presentation P with finite, non-empty
generating set and for every countable group presentation Q there exists a
surjection TP ։ TP∗Q .
8. Residual finiteness
Bumagin–Wise asked if every countable group Q can be realised as the outer
automorphism group of a finitely generated, residually finite group GQ [BW05,
Problem 1]. We now prove Corollary D (which is a corollary of Theorem C).
Corollary D answers this question of Bumagin–Wise for all finitely generated,
residually finite groups Q by taking GQ := TP for P a presentation of Q with
finite, non-empty generating set.
Proof of Corollary D. By Theorem C it is sufficient to prove that if P = hx; ri
has finite, non-empty generating set x and π1 (P) is finite then TP is residually
finite. Under these conditions the associated subgroup KP of the group TP =
H∗(KP ,φ) has finite index in the subgroup M|x| . As M|x| is a free group of finite
rank |x|, the subgroup KP is finitely generated.
Now, triangle groups are LERF [Sco78]. Hence, KP is separable in the
triangle group H. Therefore, the automorphism-induced HNN-extension TP
is residually finite [BT78, Lemma 4.4], as required.
In order to extend Corollary D to all countable residually finite groups it
would be necessary to prove that if P = hx; ri is a presentation of a finite
group where |x| = ∞ then the group TP is residually finite. (In Corollary D
we explicitly use the fact that x is a finite set.) We therefore have the following
corollary of Theorem C.
Corollary 8.1. Let T∞
Fin be the class of groups TP where π1 (P) is finite but
where P has infinite generating set. Suppose that every element of T∞
Fin is
residually finite. Then for every countable, residually finite group Q there
exists a finitely generated, residually finite group GQ such that Out(GQ ) ∼
= Q.
Note that Corollary 8.1 represents the best application of Theorem A in
this direction, in the sense that if TP is residually finite then Q := π1 (P) is
residually finite. This is because Q embeds in Aut(TP ), so if Q is not residually
finite then TP is not residually finite [Bau63].
9. Questions
We now pose certain questions which arose in the writing of this paper.
Injectivity of the functor. The functor of Theorem B should be injective
on both objects and morphisms. Injectivity of the functor is equivalent to a
HNN-EXTENSIONS OF TRIANGLE GROUPS
33
positive answer to the following question, where ∼ is the equivalence relation
on presentations defined in Section 4.
Question 1. Is it true that TP ∼
= TQ if and only if P ∼ Q?
It is unlikely that the functor of Theorem 4.3 is injective for all choices of
groups H and automorphisms φ ∈ Aut(H).
Question 2. For which base groups H and automorphisms φ ∈ Aut(H) does it
hold that in the construction of Theorem 4.2, HP ∼
= HQ if and only if P ∼ Q?
Residual finiteness. Question 3 leads naturally on from Corollary D and
Corollary 8.1.
Question 3. Suppose P = hx; ri is a presentation of a finite group such that
the set x is infinite. Is the group TP from Theorem A residually finite?
Free groups. In Section 5 we proved that F2 , the free group of rank two,
f with M
f∼
contains a malcharacteristic subgroup M
= F2 ; it then follows from
Lemma 3.3 that F2 contains malcharacteristic subgroups of arbitrary rank.
Question 4. Do the free groups Fn , n > 2, each contain a malcharacteristic
subgroup which is free of rank two?
Malnormality is decidable in free groups. In Lemma 5.2 we gave conditions
relating to the malcharacteristic property being decidable in F2 .
Question 5. Is it decidable if a subgroup M of a free group Fn , n ≥ 2, is
malcharacteristic?
Malnormality is a generic property of subgroups of free groups: using the the
“few relator” model for random groups we see that a random finite set of words
s ⊂ Fn contains no proper powers and satisfies the classical small cancellation
conditions [Oll05, Proposition 2]. It then follows that s is malnormal in Fn
with free basis s [Wis01, Theorems 2.11 & 2.14].
Question 6. Does a generic set of words s ⊂ Fn , n ≥ 2, generate, with
overwhelming probability, a malcharacteristic subgroup of Fn ?
Other groups. As was mentioned in the introduction, we expect Theorem A to hold for many other classes of groups and not just equilateral triangle groups. Now, Thompson’s group V has Serre’s property FA [Far11] and
has outer automorphisms of any given order [BCM+ 16]. Therefore, a positive
answer to the following question would allow us to apply Theorem 4.2 to V ,
obtaining a result analogous to Theorem A.
34
ALAN D. LOGAN
Question 7. Does Thompson’s group V contain a malcharacteristic subgroup
which is free of rank two?
Thompson’s group T also has Serre’s property FA [Far11], but Out(T ) is
cyclic of order two [Bri96]. Therefore, a positive answer to the following question would allow us to apply Theorem 4.2 to T , obtaining a result analogous
to Theorem 7.9.
Question 8. Does Thompson’s group T contain a malcharacteristic subgroup
which is free of rank two?
Note that we ask about T and V and not Thompson’s group F because it
is well-known that F does not contain a non-abelian free group.
References
[Bau63]
G. Baumslag, Automorphism groups of residually finite groups, J. London Math.
Soc. 48 (1963), 117–118.
[BCM+ 16] C. Bleak, P. Cameron, Y. Maissel, A. Navas, and F. Olukoya, The further
chameleon groups of Richard Thompson and Graham Higman: Automorphisms
via dynamics for the Higman groups G{n,r} , arXiv:1605.09302 (2016).
[BG03]
G. Braun and R. Göbel, Outer automorphisms of locally finite p-groups, J. Algebra 264 (2003), no. 1, 55–67.
[BM06]
A. V. Borshchev and D. I. Moldavanskii, On the isomorphism of some groups
with one defining relation, Mathematical Notes 79 (2006), no. 1, 31–40.
[Bri96]
M.G. Brin, The chameleon groups of Richard J. Thompson: automorphisms and
dynamics, Inst. Hautes Études Sci. Publ. Math. (1996), no. 84, 5–33 (1997).
MR 1441005
[BT78]
B. Baumslag and M. Tretkoff, Residually finite HNN extensions, Comm. Algebra
6 (1978), no. 2, 179–194. MR 484178
[BW05]
I. Bumagin and D.T. Wise, Every group is an outer automorphism group of a
finitely generated group, J. Pure App. Alg. 200 (2005), no. 1, 137–147.
[CCH81] I.M. Chiswell, D.J. Collins, and J. Huebschmann, Aspherical group presentations, Math. Zeitschrift 178 (1981), no. 1, 1–36.
[CL83]
D.J. Collins and F. Levin, Automorphisms and Hopficity of certain BaumslagSolitar groups, Arch. Math. 40 (1983), no. 1, 385–400.
[CMZ81] M. Cohen, W. Metzler, and A. Zimmermann, What does a basis of F (a, b) look
like?, Math. Ann. 257 (1981), no. 4, 435–445.
[DGG01] M. Droste, M. Giraudet, and R. Göbel, All groups are outer automorphism
groups of simple groups, J. Lon. Math. Soc. 64 (2001), no. 3, 565–575.
[Far11]
D. Farley, A proof that Thompson’s groups have infinitely many relative ends,
J. Group Theory 14 (2011), no. 5, 649–656. MR 2831963
[FM06]
R. Frigerio and B. Martelli, Countable groups are mapping class groups of hyperbolic 3-manifolds, Math. Res. Lett. 13 (2006), no. 5-6, 897–910. MR 2280783
[FR99]
B. Fine and G. Rosenberger, Algebraic generalizations of discrete groups, Monographs and Textbooks in Pure and Applied Mathematics, vol. 223, Marcel
Dekker, Inc., New York, 1999, A path to combinatorial group theory through
one-relator products. MR 1712997
HNN-EXTENSIONS OF TRIANGLE GROUPS
35
[GHMR00] N.D. Gilbert, J. Howie, V. Metaftsis, and E. Raptis, Tree actions of automorphism groups, J. Group Theory 3 (2000), no. 2, 213–223.
[GP00]
R. Göbel and A.T. Paras, Outer automorphism groups of metabelian groups, J.
Pure App. Algebra 149 (2000), no. 3, 251–266.
[Gro03]
M. Gromov, Random walk in random groups, Geom. Funct. Anal. 13 (2003),
no. 1, 73–146. MR 1978492
[Koj88]
S. Kojima, Isometry transformations of hyperbolic 3-manifolds, Topology and
its Applications 29 (1988), no. 3, 297–307.
[Log15]
A.D. Logan, On the outer automorphism groups of finitely generated, residually
finite groups, J. Algebra 423 (2015), 890–901. MR 3283743
, On a question of Bumagin and Wise, New York J. Math. 22 (2016),
[Log16a]
865–873. MR 3548127
[Log16b]
, The Bass-Jiang group for automorphism-induced HNN-extensions,
arXiv:1509.01847 (2016).
[LS77]
R.C. Lyndon and P.E. Schupp, Combinatorial group theory, Classics in Mathematics, Springer, 1977.
[Mag74]
Wilhelm Magnus, Noneuclidean tesselations and their groups, Academic Press
[A subsidiary of Harcourt Brace Jovanovich, Publishers], New York-London,
1974, Pure and Applied Mathematics, Vol. 61. MR 0352287
[Mat89]
T. Matumoto, Any group is represented by an outer automorphism group, Hiroshima Math. J. 19 (1989), no. 1, 209–219.
[Min09]
Ashot Minasyan, Groups with finitely many conjugacy classes and their automorphisms, Comment. Math. Helv. 84 (2009), no. 2, 259–296. MR 2495795
[Oll05]
Yann Ollivier, A January 2005 invitation to random groups, Ensaios
Matemáticos [Mathematical Surveys], vol. 10, Sociedade Brasileira de
Matemática, Rio de Janeiro, 2005. MR 2205306
[Osi10]
D. Osin, Small cancellations over relatively hyperbolic groups and embedding
theorems, Ann. of Math. (2) 172 (2010), no. 1, 1–39. MR 2680416
[Rip82]
E. Rips, Subgroups of small cancellation groups, Bull. London Math. Soc 14
(1982), no. 1, 45–47.
[Sco78]
P. Scott, Subgroups of surface groups are almost geometric, J. London Math.
Soc. (2) 17 (1978), no. 3, 555–565. MR 0494062
[Ser80]
J.P. Serre, Trees, Springer-Verlag, Berlin-New York, 1980, Translated from the
French by John Stillwell. MR 607504
[Sta83]
J.R. Stallings, Topology of finite graphs, Invent. Math. 71 (1983), no. 3, 551–565.
[Wis01]
D.T. Wise, The residual finiteness of positive one-relator groups, Comment.
Math. Helv. 76 (2001), no. 2, 314–338.
[Zie76]
H. Zieschang, On triangle groups, Russian Math. Surveys 31 (1976), no. 5,
226–233.
[ZVC70]
H. Zieschang, E. Vogt, and H.-D. Coldewey, Flächen und ebene diskontinuierliche Gruppen, Lecture Notes in Mathematics, Vol. 122, Springer-Verlag, BerlinNew York, 1970. MR 0262378
| 4math.GR
|
1
Coordinate-Descent Diffusion Learning by
Networked Agents
arXiv:1607.01838v2 [cs.MA] 11 Oct 2017
Chengcheng Wang, Student Member, IEEE, Yonggang Zhang, Senior Member, IEEE,
Bicheng Ying, Student Member, IEEE, and Ali H. Sayed, Fellow, IEEE
Abstract—This work examines the mean-square error performance of diffusion stochastic algorithms under a generalized
coordinate-descent scheme. In this setting, the adaptation step
by each agent is limited to a random subset of the coordinates
of its stochastic gradient vector. The selection of coordinates
varies randomly from iteration to iteration and from agent to
agent across the network. Such schemes are useful in reducing
computational complexity at each iteration in power-intensive
large data applications. They are also useful in modeling situations where some partial gradient information may be missing
at random. Interestingly, the results show that the steady-state
performance of the learning strategy is not always degraded,
while the convergence rate suffers some degradation. The results
provide yet another indication of the resilience and robustness
of adaptive distributed strategies.
Index Terms—Coordinate descent, stochastic partial update,
computational complexity, diffusion strategies, stochastic gradient algorithms, strongly-convex cost.
I. I NTRODUCTION AND R ELATED W ORK
Consider a strongly-connected network of N agents, where
information can flow in either direction between any two
connected agents and, moreover, there is at least one self-loop
in the topology [2, p. 436]. We associate a strongly convex
differentiable risk, Jk (w), with each agent k and assume in
this work that all these costs share a common minimizer,
wo ∈ RM , where R denotes field of real numbers. This case
models important situations where agents work cooperatively
towards the same goal. The objective of the network is to
determine the unique minimizer wo of the following aggregate
cost, assumed to be strongly-convex:
J glob (w) ,
N
X
Jk (w)
(1)
k=1
A short version of this work appears in the conference publication [1].
This work was performed while C. Wang was a visiting student at the
UCLA Adaptive Systems Laboratory. The work of C. Wang was supported
in part by a Chinese Government Scholarship. The work of Y. Zhang was
supported in part by the National Natural Science Foundation of China
(61371173), and Fundamental Research Founds for the Central University
of Harbin Engineering University (HEUCFP201705). The work of B. Ying
and A. H. Sayed was supported in part by NSF grants CCF-1524250 and
ECCS-1407712.
C. Wang and Y. Zhang are with the College of Automation, Harbin
Engineering University, Harbin, Heilongjiang 150001 China. C. Wang is
also with the School of Electrical and Electronic Engineering, Nanyang
Technological University, 639798 Singapore (e-mail: [email protected];
[email protected]).
B. Ying is with the Department of Electrical Engineering, University of
California, Los Angeles, CA 90024 USA (e-mail: [email protected]).
A. H. Sayed is with the Ecole Polytechnique Federale de Lausanne, EPFL,
School of Engineering, CH-1015 Lausanne, Switzerland (e-mail: ali.sayed@
epfl.ch).
It is also assumed that the individual cost functions, Jk (w),
are each twice-differentiable and satisfy
0 < νd IM ≤ ∇2w Jk (w) ≤ δd IM
(2)
where ∇2w Jk (w) denotes the M ×M Hessian matrix of Jk (w)
with respect to w, νd ≤ δd are positive parameters, and IM
is the M × M identity matrix. In addition, for matrices A
and B, the notation A ≤ B denotes that B − A is positive
semi-definite. The condition in (2) is automatically satisfied
by important cases of interest, such as logistic regression or
mean-square-error designs [2], [3].
Starting from some initial conditions {wk,−1 }, the agents
work cooperatively in an adaptive manner to seek the minimizer wo of problem (1) by applying the following diffusion
strategy [2], [3]:
X
φk,i−1 =
a1,`k w`,i−1
(3a)
`∈N
k
\
ψk,i = φk,i−1 − µk ∇
(3b)
wT J k (φk,i−1 )
X
wk,i =
a2,`k ψ`,i
(3c)
`∈Nk
where the M -vector wk,i denotes the estimate by agent k
at iteration i for wo , while ψk,i and φk,i−1 are intermediate
estimates. Moreover, an approximation for the true gradient
\
vector of Jk (w), ∇
wT J k (·), is used in (3b) since it is generally
the case that the true gradient vector is not available (e.g.,
when Jk (w) is defined as the expectation of some loss function
and the probability distribution of the data is not known
beforehand to enable computation of Jk (·) or its gradient
vector). The symbol Nk in (3) refers to the neighborhood of
agent k. The N × N combination matrices A1 = [a1,`k ] and
A2 = [a2,`k ] are left-stochastic matrices consisting of convex
combination coefficients that satisfy:
aj,`k ≥ 0,
N
X
aj,`k = 1, aj,`k = 0, if ` ∈
/ Nk
(4)
`=1
for j = 1, 2. Either of these two matrices can be chosen as the
identity matrix, in which case algorithm (3) reduces to one of
two common forms for diffusion adaptation: the adapt-thencombine (ATC) form when A1 = I and the combine-thenadapt (CTA) form when A2 = I. We continue to work with the
general formulation (3) in order to treat both algorithms, and
other cases as well, in a unified manner. The parameter µk > 0
is a constant step-size factor used to drive the adaptation
process. Its value is set to a constant in order to enable
2
continuous adaptation in response to streaming data or drifting
minimizers. We could also consider a distributed implementation of the useful consensus-type [2], [4]–[11]. However, it has
been shown in [2], [12] that when constant step-sizes are used
to drive adaptation, the diffusion networks have wider stability
ranges and superior performance. This is because consensus
implementations have an inherent asymmetry in their updates,
which can cause network graphs to behave in an unstable
manner when the step-size is constant. This problem does
not occur over diffusion networks. Since adaptation is a core
element of the proposed strategies in this work, we therefore
focus on diffusion learning mechanisms.
The main distinction in this work relative to prior studies
on diffusion or consensus adaptive networks is that we now
assume that, at each iteration i, the adaptation step in (3b)
has only access to a random subset of the entries of the
approximate gradient vector. This situation may arise due to
missing data or a purposeful desire to reduce the computational
burden of the update step. We model this scenario by replacing
the approximate gradient vector by
miss
\
∇
wT J k
\
(φk,i−1 ) = Γk,i · ∇
wT J k (φk,i−1 )
(5)
where the random matrix Γk,i is diagonal and consists of
Bernoulli random variables {rk,i (m)}; each of these variables
is either zero or one with probability
Prob(rk,i (m) = 0) , rk
(6)
where 0 ≤ rk < 1 and
Γk,i = diag{rk,i (1), rk,i (2), . . . , rk,i (M )}
(7)
In the case when rk,i (m) = 0, the m-th entry of the gradient
vector is missing, and then the m-th entry of ψk,i in (3b) is
not updated. Observe that we are attaching two subscripts to
r: k and i, which means that we are allowing the randomness
in the update to vary across agents and also over time.
A. Relation to Block-Coordinate Descent Methods
Our formulation provides a nontrivial generalization of the
powerful random coordinate-descent technique studied, for
example, in the context of deterministic optimization in [13]–
[15] and the references therein. Random coordinate-descent
has been primarily applied in the literature to single-agent
convex optimization, namely, to problems of the form:
wo = arg min J(w)
w
(8)
where J(w) is assumed to be known beforehand. The traditional gradient descent algorithm for seeking the minimizer of
J(w), assumed differentiable, takes the form
wi = wi−1 − µ∇wT J(wi−1 )
(9)
where the full gradient vector is used at every iteration to
update wi−1 to wi . In a coordinate-descent implementation,
on the other hand, at every iteration i, only a subset of the
entries of the gradient vector is used to perform the update.
These subsets are usually chosen as follows. First, a collection
of K partitions of the parameter space w is defined. These
partitions are defined by diagonal matrices, {Ωk }. Each matrix
has ones and zeros on the diagonal and the matrices add up
to the identity matrix:
K
X
Ωk = I M
(10)
k=1
Multiplying w by any Ωk results in a vector of similar size,
albeit one where the only nontrivial entries are those extracted
by the unit locations in Ωk . At every iteration i, one of the
partitions is selected randomly, say, with probability
Prob(Γi = Ωk ) = ωk
(11)
where the {ωk } add up to one. Subsequently, the gradient
descent iteration is replaced by
wi = wi−1 − µΓi ∇wT J(wi−1 )
(12)
This formulation is known as the randomized block-coordinate
descent (RBCD) algorithm [13]–[15]. At each iteration, the
gradient descent step employs only a collection of coordinates
represented by the selected entries from the gradient vector.
Besides reducing complexity, this step helps alleviate the
condition on the step-size parameter for convergence.
If we reduce our formulation (3)–(5) to the single agent
case, it will become similar to (12) in that the desired cost
function is optimized only along a subset of the coordinates at
each iteration. However, our algorithm offers more randomness
in generating the coordinate blocks than the RBCD algorithm,
by allowing more random combinations of the coordinates at
each time index. In particular, we do not limit the selection
of the coordinates to a collection of K possibilities predetermined by the {Ωk }. Moreover, in our work we use a
random subset of the stochastic gradient vector instead of
the true gradient vector to update the estimate, which is
necessary for adaptation and online learning when the true risk
function itself is not known (since the statistical distribution
of the data is not known). Also, our results consider a general
multi-agent scenario involving distributed optimization where
each individual agent employs random coordinates for its own
gradient direction, and these coordinates are generally different
from the coordinates used by other agents. In other words,
the networked scenario adds significant flexibility into the
operation of the agents under model (5).
B. Relation to Partial Updating Schemes
It is also important to clarify the differences between our
formulation and other works in the literature, which rely on
other useful notions of partial information updates. To begin
with, our formulation (5) is different from the models used
in [16]–[18] where the step-size parameter was modeled as
a random Bernoulli variable, µk (i), which could assume the
values µk or zero with certain probability. In that case, when
the step-size is zero, all entries of ψk,i will not be updated
and adaptation is turned off completely. This is in contrast
to the current scenario where only a subset of the entries are
left without update and, moreover, this subset varies randomly
from one iteration to another.
3
Likewise, the useful work [19] employs a different notion
of partial sharing of information by focusing on the exchange
of partial entries of the weight estimates themselves rather
than on partial entries of the gradient directions. In other
words, the partial information used in this work relates to the
combination steps (3a) and (3c) rather than to the adaptation
step (3b). It also focuses on the special case in which the risks
{Jk (w)} are quadratic in w. In [19], it is assumed that only
a subset of the weight entries are shared (diffused) among
neighbors and that the estimate itself is still updated fully. In
comparison, the formulation we are considering diffuses all
entries of the weight estimates. Similarly, in [20] it is assumed
that some entries of the regression vector are missing, which
causes changes to the gradient vectors. In order to undo these
changes, an estimation scheme is proposed in [20] to estimate
the missing data. In our formulation, more generally, a random
subset of the entries of the gradient vector are set to zero at
each iteration, while the remaining entries remain unchanged
and do not need to be estimated.
There are also other criteria that have been used in the
literature to motivate partial updating. For example, in [21], the
periodic and sequential least-mean-squares (LMS) algorithms
are proposed, where the former scheme updates the whole
coefficient vector every N −th iteration, with N > 1, and the
latter updates only a fraction of the coefficients, which are predetermined, at each iteration. In [22], [23] the weight vectors
are partially updated by following a set-membership approach,
where updates occur only when the innovation obtained from
the data exceeds a predetermined threshold. In [23]–[25], only
entries corresponding to the largest magnitudes in the regression vector or the gradient vector at each agent are updated.
However, such scheduled updating techniques may suffer from
non-convergence in the presence of nonstationary signals [26].
Partial update schemes can also be based on dimensionality
reduction policies using Krylov subspace concepts [27]–[29].
There are also techniques that rely on energy considerations
to limit updates, e.g., [30].
The objective of the analysis that follows is to examine the
effect of random partial gradient information on the learning
performance and convergence rate of adaptive networks for
general risk functions. We clarify these questions by adapting
the framework described in [2], [3].
Notation: We use lowercase letters to denote vectors, uppercase letters for matrices, plain letters for deterministic
variables, and boldface letters for random variables. We also
use (·)T to denote transposition, (·)−1 for matrix inversion,
Tr(·) for the trace of a matrix, diag{·} for a diagonal matrix,
col{·} for a column vector, λ(·) for the eigenvalues of a matrix,
ρ(·) for the spectral radius of a matrix, k·k for the two-induced
norm of a matrix or the Euclidean norm of a vector, kxk2Σ for
the weighted square value xT Σx, ⊗ for Kronecker product,
⊗b for block Kronecker product. Besides, we use p 0
to denote that all entries of vector p are positive. Moreover,
α = O(µ) signifies that |α| ≤ c|µ| for some constant c > 0,
and α = o(µ) signifies that α/µ → 0 as µ → 0. In addition,
the notation lim supn→∞ a(n) denotes limit superior of the
sequence a(n).
II. DATA M ODEL AND A SSUMPTIONS
Let F i−1 represent the filtration (collection) of all random
events generated by the processes {wk,j } and {Γk,j } at all
agents up to time i − 1. In effect, the notation F i−1 refers to
the collection of all past {wk,j , Γk,j } for all j ≤ i − 1 and all
agents.
Assumption 1: (Conditions on indicator variables). It is
assumed that the indicator variables rk,i (m) and r`,i (n) are
independent of each other, for all `, k, m, n. In addition, the
\
variables {rk,i (m)} are independent of F i−1 and ∇
wT J k (w)
for any iterates w ∈ F i−1 and for all agents k.
Let
\
sk,i (φk,i−1 ) , ∇
wT J k (φk,i−1 ) − ∇wT J k (φk,i−1 )
(13)
denote the gradient noise at agent k at iteration i, based on
\
the complete approximate gradient vector, ∇
wT J k (w). We
introduce its conditional second-order moment
Rs,k,i (w) , E[sk,i (w)sT
k,i (w)|F i−1 ].
(14)
The following assumptions are standard and are satisfied by
important cases of interest, such as logistic regression risks or
mean-square-error risks, as already shown in [2], [3]. These
references also motivate these conditions and explain why they
are reasonable.
Assumption 2: (Conditions on gradient noise) [2, pp. 496–
497]. It is assumed that the first and fourth-order conditional
moments of the individual gradient noise processes satisfy the
following conditions for any iterates w ∈ F i−1 and for all
k, ` = 1, 2, . . . , N :
E[sk,i (w)|F i−1 ] = 0
E[sk,i (w)sT
`,i (w)|F i−1 ]
E[ksk,i (w)k4 |F i−1 ]
(15)
= 0, k 6= `
≤
βk4 kwk4
(16)
+
4
σs,k
(17)
4
almost surely, for some nonnegative scalars βk4 and σs,k
.
Assumption 3: (Smoothness conditions) [2, pp. 552,576].
It is assumed that the Hessian matrix of each individual cost
function, Jk (w), and the covariance matrix of each individual
gradient noise process are locally Lipschitz continuous in a
small neighborhood around w = wo in the following manner:
k∇2w Jk (wo + 4w) − ∇2w Jk (wo )k ≤ κc k4wk
o
o
kRs,k,i (w + 4w) − Rs,k,i (w )k ≤ κd k4wk
(18)
γ
(19)
for any small perturbations k4wk ≤ ε and for some κc ≥ 0,
κd ≥ 0, and parameter 0 < γ ≤ 4.
III. M AIN R ESULTS : S TABILITY AND P ERFORMANCE
For each agent k, we introduce the error vectors:
e k,i , wo − wk,i
w
e , wo − φk,i
φ
k,i
e
ψ , wo − ψk,i
k,i
(20)
(21)
(22)
4
We also collect all errors, along with the gradient noise
processes, from across the network into block vectors:
e i , col {w
e 1,i , w
e 2,i , . . . , w
e N,i }
w
o
n
e , col ψ
e ,ψ
e ,...,ψ
e
ψ
i
1,i
2,i
N,i
o
n
e , col φ
e ,φ
e ,...,φ
e
φ
i
1,i
2,i
N,i
si , col {s1,i , s2,i , . . . , sN,i }
(23)
(24)
(25)
(26)
For simplicity, in (26) we use the notation sk,i to replace the
gradient noise sk,i (φk,i−1 ) defined in (13), but note vector
si is dependent on the collection of {φk,i−1 } for all k. We
further introduce the extended matrices:
M , diag{µ1 , µ2 , . . . , µN } ⊗ IM
(27)
A1 , A1 ⊗ IM , A2 , A2 ⊗ IM
(28)
Γi , diag{Γ1,i , Γ2,i , . . . , ΓN,i }
(29)
Note that the main difference between the current work
and the prior work in [2] is the appearance of the random
matrices {Γk,i } defined by (5). In the special case when
the random matrices are set to the identity matrices across
the agents, i.e., {Γk,i ≡ IM }, current coordinate-descent
case will reduce to the full-gradient update studied in [2].
The inclusion of the random matrices {Γk,i } adds a nontrivial level of complication because now, agents update only
random entries of their iterates at each iteration and, importantly, these entries vary randomly across the agents. This
procedure adds a rich level of randomness into the operation
of the multi-agent system. As the presentation will reveal,
the study of the stability and limiting performance under
these conditions is more challenging than in the stochastic
full-gradient diffusion implementation due to at least two
factors: (a) First, the evolution of the error dynamics will
now involve a non-symmetric matrix (matrix D11,i defined
later in (111)); because of this asymmetry, the arguments of
[2] do not apply and need to be modified; and (b) second,
there is also randomness in the coefficient matrix for the error
dynamics (namely, randomness in the matrix B0i defined by
(39)). These two factors add nontrivial complications to the
stability, convergence, and performance analysis of distributed
coordinate-descent solutions, as illustrated by the extended
derivations in Appendices A and B. These derivations illustrate
the new arguments that are necessary to handle the networked
solution of this manuscript. For this reason, in the presentation
that follows, whenever we can appeal to a result from [2], we
will simply refer to it so that, due to space limitations, we
can focus the presentation on the new arguments and proofs
that are necessary for the current context. It is clear from the
proofs in Appendices A and B that these newer arguments are
demanding and not straightforward.
where
T
Bi , AT
2 (I − MΓi Hi−1 ) A1
Hi−1 , diag{H1,i−1 , H2,i−1 , . . . , HN,i−1 }
Z 1
ek,i−1 )dt.
Hk,i−1 ,
∇2w Jk (wo − tφ
(31)
(32)
(33)
0
Proof : Refer to [2, pp. 498–504], which is still applicable to
the current context. We only need to set in that derivation
the matrix Ao to Ao = I, and the vector b to b = 0M N .
These quantities were defined in (8.131) and (8.136) of [2].
The same derivation will lead to (30)–(33), with the main
difference being the appearance now of the random matrix
Γi in (30) and (31).
We assume that the matrix product P = A1 A2 is primitive. This condition is guaranteed automatically, for example,
for ATC and CTA scenarios when the network is stronglyconnected. This means, in view of the Perron-Frobenius Theorem [2], [3], that P has a single eigenvalue at one. We denote
the corresponding eigenvector by p, and normalize the entries
of p to add up to one. It follows from the same theorem that
the entries of p are strictly positive, written as
P p = p, 1T p = 1, p 0
(34)
with 1 being the vector of size N with all its entries equal to
one.
Theorem 1: (Network stability). Consider a stronglyconnected network of N interacting agents running the diffusion strategy (3) with the gradient vector replaced by (5).
Assume the matrix product P = A1 A2 is primitive. Assume
also that the individual cost functions, Jk (w), satisfy the
condition in (2) and that Assumptions 1–2 hold. Then, the
second and fourth-order moments of the network error vectors
are stable for sufficiently small step-sizes, namely, it holds, for
all k = 1, 2, . . . , N , that
ek,i k2 = O(µmax )
lim sup Ekw
(35)
ek,i k4 = O(µ2max )
lim sup Ekw
(36)
i→∞
i→∞
for any µmax < µo , for some small enough µo , where
µmax , max{µ1 , µ2 , . . . , µN }.
(37)
Proof : The argument requires some effort and is given in
Appendix A.
Lemma 1: (Network error dynamics). Consider a network
of N interacting agents running the diffusion strategy (3) with
the gradient vector replaced by (5). The evolution of the error
dynamics across the network relative to the reference vector
wo is described by the following recursion:
Lemma 2: (Long-term network dynamics). Consider a
strongly-connected network of N interacting agents running
the diffusion strategy (3) under (5). Assume the matrix product
P = A1 A2 is primitive. Assume also that the individual
cost functions satisfy (2), and that Assumptions 1–2 and (18)
hold. After sufficient iterations, i 1, the error dynamics
of the network relative to the reference vector wo is wellapproximated by the following model:
ei = Bi w
ei−1 + AT
w
2 MΓi si
0
ei0 = B0i w
ei−1
w
+ AT
2 MΓi si , i 1
(30)
(38)
5
where
B0i
,
AT
2
(I −
MΓi H) AT
1
H , diag{H1 , H2 , . . . , HN }
Hk , ∇2w Jk (wo )
(39)
to first-order in µmax :
MSDk , µmax
lim lim sup
µmax →0
(40)
(41)
MSDav ,
(42)
0
ek,i
lim sup Ekw
k4 = O(µ2max )
(43)
i→∞
i→∞
ei0 k2 = lim sup Ekw
ei k2 + O(µ3/2
lim sup Ekw
max ).
i→∞
Result (35) ensures that the mean-square-error (MSE) performance of the network is in the order of µmax . Using the
long-term model (38), we can be more explicit and derive
the proportionality constant that describes the value of the
network mean-square-error to first-order in µmax . To do so,
we introduce the quantity
(45)
and the gradient-noise covariance matrices:
Gk , lim Rs,k,i (wo )
(46)
G0k , E[Γk,i Gk Γk,i ].
(47)
i→∞
(49)
(50)
Likewise, we define the excess-risk (ER) for each agent k as
the average fluctuation of the normalized aggregate cost
!−1 N
N
X
X
glob
¯
J
(w) ,
qk
qk Jk (w)
(51)
k=1
k=1
with {qk } being entries of the vector q defined by (45), around
its minimum value J¯glob (wo ) at steady state to first-order in
µmax , namely [2, p. 581]:
Proof : To establish (38), we refer to the derivation in [2, pp.
553–555], and note that, in our case, kΓi k ≤ 1 and b = 0M N
(which appeared in (10.2) of [2]). Moreover, the results in (42)
and (43) can be established by following similar techniques
to the proof of Theorem 1, where the only difference is that
the random matrix Hi−1 defined in (32) is now replaced with
the deterministic matrix H defined by (40), and by noting that
the matrices {Hk } in (41) still satisfy the condition (2). With
regards to result (44), we refer to the argument in [2, pp. 557–
560] and note again that kΓi k ≤ 1.
q , diag {µ1 , µ2 , . . . , µN } A2 p
N
1 X
MSDk .
N
(44)
i→∞
µmax
ek,i k2
Ekw
k=1
More specifically, it holds for sufficiently small step-sizes that
0
ek,i
lim sup Ekw
k2 = O(µmax )
i→∞
1
Observe that Gk is the limiting covariance matrix of the
gradient noise process evaluated at wo , and is assumed to
be a constant value, while G0k is a weighted version of it.
A typical example for the existence of the limit in (46) is the
MSE network, where the covariance matrix of the gradient
noise is a constant matrix, which is independent of the time
index i [2, p. 372]. It follows by direct inspection that the
entries of G0k are given by:
(1 − rk )2 Gk (m, n), m 6= n
G0k (m, n) =
(48)
(1 − rk )Gk (m, m), m = n.
We also define the mean-square-deviation (MSD) for each
agent k, and the average MSD across the network to firstorder in µmax — see [2] for further clarifications on these
expressions where it is explained, for example, that MSDk
ek,i k2
provides the steady-state value of the error variance Ekw
ERk , µmax
×
lim lim sup
µmax →0
i→∞
1
µmax
E{J¯glob (wk,i ) − J¯glob (wo )} .
(52)
The average ER across the network is defined by
ERav ,
N
1 X
ERk .
N
(53)
k=1
By following similar arguments to [2, p. 582], it can be verified
that the excess risk can also be evaluated by computing a
weighted mean-square-error variance:
1
ek,i k21 H̄
ERk , µmax
Ekw
(54)
lim lim sup
2
µmax →0 i→∞ µmax
where H̄ denotes the Hessian matrix of the normalized aggregate cost, J¯glob (w), evaluated at the minimizer w = wo :
!−1 N
N
X
X
qk Hk
(55)
H̄ ,
qk
k=1
k=1
with Hk defined by (41). Moreover, we define the convergence
ek,i k2 ,
rate as the slowest rate at which the error variances, Ekw
converge to the steady-state region. By iterating the recursion
for the second-order moment of the error vector, we will arrive
at a relation in the following form:
ei k2 ] = E kw
e−1 k2F i+1 + c
(56)
E[kw
e−1 denotes the
for some matrix F and constant c, where w
network error vector at the initial time instant. The first-term
on the right-hand side corresponds to a transient component
that dies out with time, and the second-term denotes the
ei k2 ] converges to. Then, the
steady-state region that E[kw
2
ei k ] towards its steady-state region is
convergence rate of E[kw
dictated by ρ(F ) [2, p. 395]. The following conclusion is one
of the main results in this work. It shows how the coordinate
descent construction influences performance in comparison to
the standard diffusion strategy where all entries of the gradient
vector are used at each iteration. Following the statement of
the result, we illustrate its implications by considering several
important cases.
6
Theorem 2: (MSD and ER performance). Under the same
setting of Theorem 1, and assume also that Assumption 3
holds, it holds that, for sufficiently small step-sizes:
MSDcoor,k = MSDcoor,av
!−1 N
N
X
1 X
= Tr
qk (1 − rk )Hk
qk2 G0k
2
k=1
k=1
N
ERcoor,k = ERcoor,av
(57)
X
1
= Tr X
qk2 G0k
2
!
(58)
k=1
where the subscript “coor” denotes the stochastic coordinatedescent diffusion implementation, and matrix X is the unique
solution to the following Lyapunov equation:
!
!
N
N
X
X
X
qk (1 − rk )Hk +
qk (1 − rk )Hk X = H̄
k=1
k=1
(59)
with H̄ defined by (55). Moreover, for large enough i, the
ek,i k2 , towards
convergence rate of the error variances, Ekw
the steady-state region (57) is given by
!
N
X
+1)/N
αcoor = 1 − 2λmin
qk (1 − rk )Hk + O µ(N
max
k=1
(60)
Proof : See Appendix B.
IV. I MPLICATIONS AND U SEFUL C ASES
A. Uniform Missing Probabilities
Consider the case when the missing probabilities are identical across the agents, i.e., {rk ≡ r}.
1) Convergence time: Consider the ATC or CTA forms of
the full-gradient or coordinate-descent diffusion strategy (3a)–
(3c) and (5). From (56), we find that the error variances for
the distributed strategies evolve according to a relation of the
form:
ek,i k2 ≤ αi+1 Ekw
ek,−1 k2 + c
Ekw
(61)
for some constant c > 0, and where the parameter α determines the convergence rate. Its value is denoted by αgrad for
the full-gradient implementation and is given by [2, p. 584]:
!
N
X
αgrad = 1 − 2λmin
qk Hk + o (µmax )
(62)
k=1
Likewise, the convergence rate for the coordinate-descent variant is denoted by αcoor and is given by expression (60). It is
clear that αcoor ≥ αgrad for 0 ≤ r < 1, so that the coordinatedescent implementation converges at a slower rate as expected
(since it only employs partial gradient information). Thus, let
Tcoor and Tgrad denote the largest number of iterations that
ek,i k2 , to converge to
are needed for the error variances, Ekw
their steady-state regions. The values of Tcoor and Tgrad can be
estimated by assessing the number of iterations that it takes
ek,−1 k2 in (61) to assume a
for the transient term αi+1 E kw
higher-order value in µmax , i.e., for
Tcoor
ek,−1 k2 = dµ1+
αcoor
Ekw
max
(63)
Tgrad
ek,−1 k2
αgrad
Ekw
(64)
=
dµ1+
max
for some proportionality constant d, and small number > 0.
Then, it holds that
ln αgrad
Tcoor
=
Tgrad
ln αcoor
P
N
ln 1 − 2λmin
(a)
k=1 qk Hk
P
≈
N
ln 1 − 2λmin
q
(1
−
r)H
k
k
k=1
P
N
q
H
−2λ
k
k
min
(b)
k=1
P
≈
N
−2(1 − r)λmin
q
H
k=1 k k
1
(65)
1−r
where in step (a) we ignored the higher-order term in µmax ,
and in (b) we used ln(1 − x) ≈ −x as x → 0. Expression
(65) reveals by how much the convergence time is increased
in the coordinate-descent implementation. Note that because
of longer convergence time, the stochastic coordinate-descent
diffusion implementation may require more quantities to be
exchanged across the network compared to the full-gradient
case.
=
2) Computational complexity: Let us now compare the
computational complexity of both implementations: the
coordinate-descent and the full-gradient versions. Assume that
the computation required to calculate each entry of the gradient
\
vector ∇
wT J k (φk,i−1 ) is identical, and let cm ≥ 0 and
ca ≥ 0 denote the number of multiplications and additions,
respectively, that are needed for each entry of the gradient
vector.
Let nk , |Nk | denote the degree of agent k. Then, in the
full-gradient implementation, the adaptation step (3b) requires
cm M + M multiplications and ca M + M additions, while the
combination step (3a) or (3c) requires nk M multiplications
and (nk − 1)M additions. In the coordinate-descent implementation, the adaptation step (3b) with the gradient vector
replaced by (5) requires (1 − r) · (cm M + M ) multiplications
and (1 − r) · (ca M + M ) additions on average, while the
combination step (3a) or (3c) requires nk M multiplications
and (nk − 1)M additions. Let mcoor,k and mgrad,k denote the
combined number of multiplications required by the adaptation
and combination steps per iteration at each agent k in the
coordinate-descent and full-gradient cases. Then,
mgrad,k = (cm + nk + 1)M
(66)
mcoor,k = mgrad,k − (cm + 1)M r
(67)
If we now consider that these algorithms take Tcoor and Tgrad
iterations to reach their steady-state regime, then the total
number of multiplications at agent k, denoted by Mcoor,k and
7
!−1 N
N
X
1 X
= Tr
q k Hk
qk2 Gk +
2
k=1
k=1
!−1 N
N
X
X
r
Tr
qk Hk
qk2 diag{Gk } −
2
k=1
k=1
!
−1
N
N
X
r X
Tr
qk Hk
qk2 Gk .
2
Mgrad,k , are therefore given by
Mcoor,k = mcoor,k Tcoor
(68)
Mgrad,k = mgrad,k Tgrad
(69)
Mcoor,k
mcoor,k 1
=
Mgrad,k
mgrad,k 1 − r
(70)
so that using (65):
Now, the first term on the right hand side satisfies
mcoor,k
cm + 1
=1−
r
mgrad,k
cm + nk + 1
k=1
(71)
so that from (70) and (71):
1≤
Mcoor,k
cm + 1
= (1 − r)−1 1 −
r
Mgrad,k
cm + n k + 1
(72)
since 0 ≤ r < 1. It is clear that when it is costly to compute
the gradient entries, i.e., when cm nk , then Mcoor,k and
Mgrad,k will be essentially identical. This means that while
the coordinate-descent implementation will take longer to
converge, the savings in computation per iteration that it provides is such that the overall computational complexity until
convergence remains largely invariant (it is not increased).
This is a useful conclusion. It means that in situations where
computations at each iteration need to be minimal (e.g., when
low end sensors are used), then a coordinate-descent variant is
recommended and it will be able to deliver the same steadystate performance (to first-order in µmax , see (78) ahead)
with the total computational demand spread over a longer
number of iterations. This also means that the complexity and
convergence rate measures, when normalized by the number
of entries that are truly updated at each iteration, remain
effectively invariant. A similar analysis and conclusion holds
if we examine the total number of additions (as opposed to
multiplications) that are necessary.
3) MSD performance: The matrix G0k defined by (48) can
be written as
G0k = (1 − r)2 Gk + (1 − r) − (1 − r)2 diag{Gk }
r
= (1 − r)2 Gk +
diag{Gk }
(73)
1−r
where the term diag{Gk } is a diagonal matrix that consists
of the diagonal entries of Gk . Then, the MSD expression (57)
gives
!−1
N
X
(73) 1
MSDcoor,k = (1 − r)Tr
qk Hk
×
2
k=1
!
N
X
r
qk2 Gk +
diag{Gk }
1−r
k=1
(74)
k=1
By recognizing that the first item in (74) is exactly the MSD
expression for the stochastic full-gradient diffusion case [2, p.
594], which is denoted by “MSDgrad,k ”, we get
MSDcoor,k − MSDgrad,k
r
= Tr
2
N
X
!−1
q k Hk
k=1
N
X
!
qk2 Ǧk
(75)
k=1
where
Ǧk , diag{Gk } − Gk .
(76)
We show in Appendix C that the difference in (75) can be
positive or negative, i.e., the MSD performance can be better or
worse in the stochastic coordinate-descent case in comparison
to the stochastic full-gradient case. Recall from (49) that the
MSD performance is evaluated to first-order in µmax . Then,
the MSD gap in (75) is to first-order in the step-size parameter.
Observe that the missing probability r on the right hand side
of that equation is independent of µmax . It thus follows that
!−1 N
!
N
X
X
2
qk Ǧk = O(µmax ).
Tr
q k Hk
(77)
k=1
k=1
Corollary 1: (Small missing probabilities). Let r =
O(µεmax ) for a small number ε > 0. It holds that
MSDcoor,k − MSDgrad,k = O(µ1+ε
max ) = o(µmax ).
(78)
Proof : It follows from (75) and (77).
We proceed to provide a general upper bound for the
difference between MSDcoor,k and MSDgrad,k .
Corollary 2: (Upper bound). Under the same conditions of
Theorem 2, and when the missing probabilities are uniform,
namely, {rk ≡ r}, it holds that:
|MSDcoor,k − MSDgrad,k | ≤
!−1
N
N
1
1 X 2
r X
qk
−
qk Tr(Gk ) (79)
2
νd
δd
k=1
k=1
where the positive numbers νd ≤ δd are defined in (2), and
the matrices {Gk } are defined by (46). Furthermore, when the
matrices {Hk } or {Gk } are diagonal, it follows that
MSDcoor,k = MSDgrad,k
(80)
Proof : See Appendix D.
Corollary 3: (Uniform step-sizes). Continuing with the
setting of Corollary 2 by assuming now that the step-sizes
are uniform across all agents and A1 = I or A2 = I
(corresponding to either the ATC or CTA formulations). Let
8
{pk } be entries of the vector p defined by (34). Then, in view
of (45) and (34), qk = µpk and the {pk } add up to one. In
this case, the sum of the {qk } is equal to µ and expression
(79) simplifies to
|MSDcoor,k − MSDgrad,k | ≤
N
r
1
1 X 2
µ
−
pk Tr(Gk ). (81)
2
νd
δd
k=1
Consider now MSE networks where the risk function that
is associated with each agent k is the mean-square-error:
Jk (w) = E(dk (i) − uk,i w)2
(82)
where dk (i) denotes the desired signal, and uk,i is a (row)
regression vector. In these networks, the data {dk (i), uk,i }
are assumed to be related via the linear regression model
dk (i) = uk,i wo + vk (i)
(83)
where vk (i) is zero-mean white measurement noise with vari2
ance σv,k
and assumed to be independent of all other random
variables. The processes {dk (i), uk,i , vk (i)} are assumed to
be jointly wide-sense stationary random processes. Assume
also that the regression data {uk,i } are zero-mean, and white
over time and space with
E uT
k,i u`,j , Ru,k δk,` δi,j
(84)
where Ru,k > 0, and δk,` denotes the Kronecker delta
sequence. Consider the case when the covariance matrices of
the regressors are identical across the network, i.e., {Ru,k ≡
Ru > 0}. Then, it holds that [2, p. 598]
2
Hk ≡ 2Ru , Gk = 4σv,k
Ru .
(85)
matrices, i.e., {Ru,k ≡ Ru > 0}, it holds that
0 ≤ MSDcoor,k − MSDgrad,k ≤
!−1 N
!
N
X
X
δd
2 2
r
qk
−1 M
qk σv,k
νd
k=1
(87)
k=1
Moreover, it holds that MSDcoor,k = MSDgrad,k if, and only
if, Ru is diagonal.
Proof : It follows from Corollary 2 by using Tr (Gk ) =
2
4σv,k
Tr (Ru ) and noting that νd /2 ≤ λ (Ru ) ≤ δd /2 according to (85) and (2).
4) ER performance: Consider the scenario when the missing probabilities are identical across the agents, i.e., {rk ≡ r}.
Then, expression (59) simplifies to
!
!
N
N
X
X
(1 − r)
qk X H̄ + (1 − r)
qk H̄X = H̄ (88)
k=1
k=1
where we used the equality
follows that
PN
1
X = (1 − r)−1
2
k=1 qk Hk
N
X
=
P
N
k=1 qk
H̄, it
!−1
qk
IM .
(89)
k=1
Thus, the ER expression in (58) can be rewritten as:
!−1
!
N
N
X
X
1
−1
2 0
ERcoor,k = (1 − r)
qk
Tr
qk Gk
4
k=1
k=1
!−1 N
N
X
X
(a) 1
qk2 Tr (Gk )
(90)
=
qk
4
k=1
k=1
which is exactly the same result for the full gradient case
from [2, p. 608], and where the equality (a) holds because
Tr (G0k ) = (1 − r)Tr (Gk ) according to the definition in (48).
Substituting into (75) we have
MSDcoor,k − MSDgrad,k
!−1 N
!
N
X
X
2 2
=r
qk
qk σv,k Tr Ru−1 diag{Ru } − M
k=1
B. Uniform Individual Costs
k=1
≥0
(86)
where (86) holds because Tr Ru−1 diag{Ru } ≥ M , which
can be shown by using the property that Tr (X) Tr X −1 ≥
M 2 for any M ×M symmetric positive-definite matrix X [31,
1
1
p. 317], and choosing X = diag 2 {Ru }Ru−1 diag 2 {Ru }. In
the case of MSE networks, by exploiting the special relation
between the matrices {Hk } and {Gk } in (85), we are able
to show that the MSD in the stochastic coordinate-descent
case is always larger (i.e., worse) than or equal to that in
the stochastic full-gradient diffusion case (although by not
more than o(µmax ), as indicated by (78)). We are also able
to provide a general upper bound on the difference between
these two MSDs.
Corollary 4: (MSE networks). Under the same conditions
of Corollary 2, and for MSE networks with uniform covariance
Consider the case when the individual costs, Jk (w), are
identical across the network, namely, [2, p. 610]
Jk (w) ≡ J(w) , EQ(w; xk,i )
(91)
where Q(w; xk,i ) denotes the loss function. In this case, it
will hold that the matrices {Hk , Gk } are uniform across the
agents, i.e.,
Hk = ∇2w J(wo ) ≡ H
(92)
T
Gk = E∇wT Q(wo ; xk,i ) [∇wT Q(wo ; xk,i )] ≡ G
(93)
in view of ∇wT J(wo ) = 0. Then, (92) ensures the matrix
H̄ = H according to the definition in (55). By referring to
(59), we have
!−1
N
1 X
qk (1 − rk )
IM .
(94)
X=
2
k=1
9
Then, expressions (57) and (58) reduce to
MSDcoor,k = MSDcoor,av
1
=
2
N
X
!−1
qk (1 − rk )
k=1
N
X
qk2 Tr H −1 G0k
(95)
k=1
ERcoor,k = ERcoor,av
N
X
!−1
qk (1 − rk )
k=1
N
X
qk2 (1 − rk )Tr (G) . (96)
k=1
We proceed to compare the MSD and ER performance in the
stochastic full-gradient and coordinate-descent cases. Let
PN
PN
2
2
qk2
k=1 qk (1 − rk )
− Pk=1
(97)
α , PN
N
k=1 qk (1 − rk )
k=1 qk
PN
PN
2
qk2
k=1 qk (1 − rk )
θ , PN
− Pk=1
(98)
N
k=1 qk (1 − rk )
k=1 qk
and note that α ≤ θ, with equality if, and only if, {rk ≡ 0}.
Corollary 5: (Performance comparison). Under the same
conditions of Theorem 2, when the individual costs Jk (w) are
identical across the agents, it holds that:
a) if α ≥ 0:
0 ≤ MSDcoor,k − MSDgrad,k
1 θ
≤
Tr (G)
2 νd
Fig. 1. Network topology consisting of N = 100 agents.
10
Theoretical MSD for full update
Theoretical MSD for partial update
MSE network, full update
MSE network, partial update
0
Transient MSD (dB)
1
=
4
−10
−20
−30
−40
−50
−60
0.5
1
1.5
2
2.5
3
3.5
(99)
4
4
Iterations
x 10
b) if α < 0, and θ ≥ (1 − δd /νd ) α ≥ 0:
Fig. 2. MSD learning curves, averaged over 200 independent runs, in the
case of Corollary 1 when {rk = 0.1}. The dashed lines show the theoretical
MSD values from (57).
0 ≤ MSDcoor,k − MSDgrad,k ≤
1
1
1 θ
+
−
α Tr (G) (100)
2 νd
δd
νd
A. MSE Networks
Likewise, it holds that
θ
Tr (G) .
(102)
4
Then, in the case when either the missing probabilities or the
quantities {qk } are uniform across the agents, namely, {rk ≡
r} or {qk ≡ q}, it follows that
ERcoor,k − ERgrad,k =
ERcoor,k = ERgrad,k .
(103)
Proof : See Appendix E.
Note that for the other choices of parameter θ that are not
indicated in Corollary 5, there is no consistent conclusion on
which MSD (between MSDcoor,k and MSDgrad,k ) is lower.
10
Transient MSD (dB)
c) if α < 0, and θ ≤ (1 − νd /δd ) α ≤ 0:
1
1 θ
1
+
−
α Tr (G) ≤
2 δd
νd
δd
MSDcoor,k − MSDgrad,k ≤ 0. (101)
In the following examples, we will test performance of
the associated algorithms in the case when uniform missing
probabilities are utilized across the agents. We adopt the ATC
formulation, and set the combination matrices A1 = I, and
A2 according to the averaging rule [2, p. 664] in the first two
examples, and Metropolis rule [2, p. 664] in the third example.
In the first example, we test the case when the gradient vectors
are missing with small probabilities across the agents. Figure
1 shows a network topology with N = 100 agents. The
parameter vector wo is randomly generated with M = 10.
Theoretical MSD
MSE network, full update
MSE network, partial update
convergence rate for full update
convergence rate for partial update
0
−10
−20
−30
−40
−50
−60
0.2
V. S IMULATION R ESULTS
In this section, we illustrate the results by considering MSE
networks and logistic regression networks; both settings satisfy
condition (2) and Assumptions 1 through 3.
0.4
0.6
0.8
1
1.2
Iterations
1.4
1.6
1.8
2
4
x 10
Fig. 3. MSD learning curves, averaged over 200 independent runs, in the
case of Corollary 2 when {Hk , Gk } are diagonal. The dashed line along the
horizontal axis shows the theoretical MSD value from (57). Those along the
learning curves show the reference recursion at rates formulated by (60).
10
0
−28
−15
−28.5
−20
−29
−25
−29.5
1700
1800
1900
2000
Theoretical MSD for full update
Theoretical MSD for partial update
MSE network, full update
MSE network, partial update
0
−5
−10
−15
−20
5
Theoretical ER
MSE network, full update
MSE network, partial update
0
Transient ER (dB)
Transient MSD (dB)
−10
5
Transient MSD (dB)
Theoretical MSD for full update
Theoretical MSD for partial update
MSE network, full update
MSE network, partial update
−5
−5
−10
−15
−20
−25
−25
−30
−30
500
1000
1500
2000
−30
1000
2000
3000
4000
5000
6000
1000
2000
3000
4000
Iterations
Iterations
Iterations
(a)
(b)
(c)
5000
6000
7000
Fig. 4. Learning curves, averaged over 10000 independent runs, and theoretical results calculated from (57) and (58) respectively, for a two-agent MSE
network, with parameters {π1 = −0.34, π2 = 0.99} in (a), and {π1 = 0.34, π2 = 0.99} in (b) and (c).
The regressors are generated by the first-order autoregressive
model
q
uk,i (m) = πk uk,i (m − 1) + 1 − πk2 tk,i (m), 1 ≤ m < M
(104)
and the variances are scaled to be 1. The processes {tk,i }
are zero-mean, unit-variance, and independent and identically
distributed (i.i.d) Gaussian sequences. The parameters {πk }
are generated from a uniform distribution on the interval
(−1, 1). The noises, uncorrelated with the regression vectors,
are zero-mean white Gaussian sequences with the variances
uniformly distributed over (0.001, 0.1). The step-sizes {µk }
across the agents are generated from a uniform distribution
on the interval (0.0001, 0.0005). We choose a small missing
probability {rk = 0.1}. Figure 2 shows the simulation results, which are averaged over 200 independent runs, as well
as the theoretical MSD values calculated from (57), which
are −57.72dB and −57.61dB, respectively, for the full and
partial update case. It is clear from the figure that, when the
gradient information is missing with small probabilities, the
performance of the coordinate-descent case is close to that of
the full-gradient diffusion case.
In the second example, we test the case when the regressors
are white across the agents. We randomly generate wo of
size M = 10. The white regressors are generated from zeromean white Gaussian sequences, and the powers, which vary
from entry to entry, and from agent to agent, are uniformly
distributed over (0.05, 0.15). The noises {vk (i)}, uncorrelated
with the regressors, are zero-mean white Gaussian sequences,
2
with the variances {σv,k
} generated from uniform distribution
on the interval (0.0001, 0.01). The step-sizes are uniformly
distributed over (0.001, 0.01). The results, including the theoretical MSD value from (57) in Theorem 2, the simulated
MSD learning curves, and the convergence rates from (60),
are illustrated by Fig. 3, where the results are averaged over
200 independent runs. It is clear from the figure that, when
white regressors are utilized in MSE networks, the stochastic
coordinate-descent case converges to the same MSD level
as the full-gradient diffusion case, which verifies (80), at a
convergence rate formulated in (60).
In the third example, we revisit the two-agent MSE network
discussed in Appendix C, i.e., N = 2. We randomly generate
wo of size M = 2. The step-sizes µ1 = µ2 = 0.005 are
uniform across the agents, which gives q1 = q2 = 2.5 ×
7
14
1
4
3
13
20
11
15
18
8
16
2
6
19
17
5
10
9
12
Fig. 5. Network topology consisting of N = 20 agents.
10−3 . The missing probabilities r1 = r2 = 0.5. The noises
{v1 (i), v2 (i)} are zero-mean white Gaussian sequences with
2
2
the variances {σv,1
= 0.5, σv,2
= 5 × 10−4 }. The regressors,
uncorrelated with the noise sequences, are scaled such that the
covariance matrices are of the form
|π1 | π1
|π2 | π2
Ru,1 =
, Ru,2 =
(105)
π1
1
π2
1
with |π1 | < 1, |π2 | < 1. Now we select parameters {π1 =
−0.34, π2 = 0.99}, which satisfy condition (169a), and
{π1 = 0.34, π2 = 0.99} to illustrate the cases of MSDcoor,k <
MSDgrad,k and MSDcoor,k > MSDgrad,k respectively. Fig. 4
(a) shows the simulation results with the parameters {π1 =
−0.34, π2 = 0.99}. Figures 4 (b) and 4 (c) show the simulation results with the parameters {π1 = 0.34, π2 = 0.99}.
All results are averaged over 10000 independent runs. It is
clear from the figures that the simulation results match well
with the theoretical results from Theorem 2. In Fig. 4 (a), the
steady-state MSD of the stochastic coordinate-descent case is
slightly lower than that of the full-gradient diffusion case, by
about 0.32dB, which is close to the theoretical MSD difference
of 0.41dB from (75). The MSD performance is better in the
full-gradient diffusion case in Fig. 4 (b), and the difference
between these two MSDs at steady state is 1.71dB, which is
close to the theoretical difference of 1.49dB from (75). The
ER performance for both the stochastic coordinate-descent and
full-gradient diffusion cases are the same as illustrated in Fig.
4 (c), which verifies the theoretical result in (90).
11
−5
Theoretical ER for full update
Theoretical ER for partial update
logistic network, full update
logistic network, partial update
−20
−25
−30
−35
−15
−20
−40
−25
−42
−30
3.5
3.6
3.7
4
−35
−40
0.5
1
1.5
2
Iterations
(a)
2.5
3
−45
3.5
−15
−20
−40
−25
−42
−30
5.8
−35
x 10
5.82
5.84
5.86
4
x 10
−40
−40
−45
Theoretical ER for full update
Theoretical ER for partial update
logistic network, full update
logistic network, partial update
−10
Transient ER (dB)
−10
Transient ER (dB)
−15
Transient ER (dB)
−5
−5
Theoretical ER
logistic network, full update
logistic network, partial update
−10
0.5
1
1.5
4
x 10
2
Iterations
2.5
(b)
3
−45
3.5
4
x 10
1
2
3
Iterations
4
5
6
4
x 10
(c)
Fig. 6. ER learning curves, averaged over 1000 independent runs, and theoretical results from (96) for diffusion learning over a logistic network with full or
partial updates. Corollary 5 is tested in (a) when a uniform step-size and a doubly-stochastic combination matrix are utilized across the network. Corollary 5
is tested when the parameters {µk } and {rk } are scaled to make θ in (98) negative in (b) and positive in (c).
B. Logistic Networks
We now consider an application in the context of pattern
classification. We assign with each agent the logistic risk
n h
io
T
ρ
Jk (w) = kwk2 + E ln 1 + e−γk (i)hk,i w
(106)
2
with regularization parameter ρ > 0, and where the labels
{γk (i) = ±1} are binary random and the {hk,i } are feature
vectors. The objective is for the agents to determine a parameter vector wo to enable classification by estimating the class
o
bk (i) = hT
labels via γ
k,i w .
We proceed to test the theoretical findings in Corollary 5.
Consider the network topology in Fig. 5 with N = 20 agents.
We still adopt the ATC formulation, and set the combination
matrices A1 = I, and A2 according to the Metropolis rule in
[2, p. 664]. The feature vectors and the unknown parameter
vector are randomly generated from uncorrelated zero-mean
unit-variance i.i.d Gaussian sequences, both of size M = 10.
The parameter ρ in (106) is set to 0.01. To generate the
trajectories for the experiments, the optimal solution to (106),
wo , the Hessian matrix H, and the gradient noise covariance
matrix, G, are first estimated off-line by applying a batch
algorithm to all data points.
In the first example, we consider the case when a uniform
step-size {µk = 0.005} is utilized across the agents. All entries
of the stochastic gradient vectors are missing completely at
random with positive probabilities that are uniformly distributed over (0, 1). Figure 6 (a) shows the transient ER curves
for the diffusion strategies with complete and partial gradients,
where the results are averaged over 1000 independent runs.
The figure also shows the theoretical result calculated from
(96). It is clear from Figure 6 (a) that the same ER performance
is obtained in the stochastic coordinate-descent and fullgradient diffusion cases, by utilizing a uniform step-size and
a doubly-stochastic combination matrix across the agents (in
which case the parameters {qk } in (45) are identical across the
agents), which is in agreement with the theoretical analysis in
(103).
In the second and third examples, we randomly generate the
step-sizes {µk } and missing probabilities {rk } by following
uniform distributions on the intervals (0.001, 0.01) and (0, 1)
respectively. In Figure 6 (b), the parameters {µk } and {rk }
are scaled to get a negative value for θ in (98), and in
Fig. 6 (c), those parameters are scaled to make θ positive.
Figures 6 (b) and 6 (c) show respectively the transient ER
learning curves in these two cases for the diffusion strategies
with complete and partial gradients, where the results are
averaged over 1000 independent runs. The figures also show
the theoretical results calculated from (96). It is clear from
Figs. 6 (b) and 6 (c) that these learning curves converge to
their theoretical results at steady state. In Fig. 6 (b) where
θ < 0, the stochastic coordinate-descent case converges to
a lower ER level than the full-gradient diffusion case, and
the difference between these two ERs is 0.637dB, which is
close to the theoretical difference of 0.640dB from (102).
In Fig. 6 (c) where θ > 0, the steady-state ER in the fullgradient diffusion case is lower than that of the stochastic
coordinate-descent case, by about 0.726dB, which is close to
the theoretical difference of 0.750dB from (102).
A PPENDIX A
P ROOF OF T HEOREM 1
Let P = A1 A2 . It was argued in [2, p.510] that P admits
a Jordan canonical decomposition of the form P = V JV−1
where
T
1
1 0
−1
,J=
V , p VR , V ,
(107)
0 J
VLT
p is defined by (34), denotes an arbitrary positive scalar that
we are free to choose, and the matrix J has a Jordan structure
with appearing in the first lower diagonal rather than unit
entries. All eigenvalues of J are strictly inside the unit circle.
Then,
P , P ⊗ IM , V J V−1
(108)
where V , V ⊗ IM , J , J ⊗ IM . Using (108), we can
rewrite Bi from (31) as
T
T
Bi , V−1 (J T − D T
(109)
i )V
where
T T
T
−1
DT
i , V A2 MΓi Hi−1 A1 V
T
T
D11,i D21,i
=
T
T
D12,i D22,i
T
(110)
12
and
D11,i =
N
X
512], we have
qk Hk,i−1 Γk,i
(111)
k=1
with the vector q = {qk } defined by (45). With regards to the
norm of D11,i , we observe that contrary to the arguments
in [2, p. 511], this matrix is not symmetric anymore in
the coordinate-descent case due to the presence of Γk,i . We
therefore need to adjust the arguments, which we do next.
Let
D̄11,i , E [D11,i |F i−1 ]
N
X
=
(6)
=
qk Hk,i−1 E [Γk,i ]
k=1
N
X
qk (1 − rk )Hk,i−1
k=1
T
= E D11,i
|F i−1 .
E [Γk,i Γj,i ] =
(1 − rk )(1 − rj ), k 6= j
1 − rk ,
k=j
(113)
we introduce
i
T
D11,i − D̄11,i |F i−1
T
T
= E D11,i D11,i
|F i−1 − D̄11,i E D11,i
|F i−1 −
RD11 ,i , E
h
D11,i − D̄11,i
2
D̄11,i
E [D11,i |F i−1 ] D̄11,i +
(112)
T
2
= E D11,i D11,i
|F i−1 − D̄11,i
=
N X
N
X
(114)
qk qj Hk,i−1 E [Γk,i Γj,i ] Hj,i−1 −
k=1 j=1
N X
N
X
qk qj (1 − rk )(1 − rj )Hk,i−1 Hj,i−1
k=1 j=1
(113)
=
N
N
X
X
qk qj (1 − rk )(1 − rj )Hk,i−1 Hj,i−1 −
k=1 j6=k=1
N X
N
X
qk qj (1 − rk )(1 − rj )Hk,i−1 Hj,i−1 +
k=1 j=1
N
X
=
=
k=1
N
X
Now, multiplying both sides of (30) by VT , we have
T
ei = (J T − D T
ei−1 + VT AT
VT w
i )V w
2 MΓi si
(118)
where the asymmetry of the matrix D11,i in this case leads
to a difference in the first row, compared to the arguments in
[2, pp. 514–515]. We adjust the arguments as follows. Using
Jensen’s inequality, we have [2, p. 515]:
E[kw̄i k2 |F i−1 ] ≤
1
T
E[k(IM − D11,i
)w̄i−1 k2 |F i−1 ]
1−t
1
T
+ E[kD21,i
w̌i−1 k2 |F i−1 ] + E[ks̄i k2 |F i−1 ] (122)
t
for any 0 < t < 1, where the expectation of the cross term
T
T
between s̄i and (IM − D11,i
)w̄i−1 − D21,i
w̌i−1 vanishes
conditioned on F i−1 and Γi in view of (15), and the result in
(122) follows by taking the expectations again on both sides
over Γi . Then, the first term on the right hand side of (122)
can be bounded by
T
E k(IM − D11,i
)w̄i−1 k2 |F i−1
T
T
= (w̄i−1 ) E (IM − D11,i ) IM − D11,i
|F i−1 w̄i−1
(a)
2
T
≤ λmax E (IM − D11,i ) IM − D11,i
|F i−1 kw̄i−1 k
(b)
T
= E (IM − D11,i ) IM − D11,i
|F i−1 kw̄i−1 k2
(112)
T
= IM − 2D̄11,i + E D11,i D11,i
|F i−1 kw̄i−1 k2
(114)
2
qk2 (1 − rk )Hk,i−1
2
IM − 2D̄11,i + D̄11,i
+ RD11 ,i kw̄i−1 k2
2
≤
IM − D̄11,i
+ RD11 ,i kw̄i−1 k2
(c)
2
=
IM − D̄11,i + RD11 ,i kw̄i−1 k2
2 2
≤ (1 − σ11 µmax )2 + β11
µmax kw̄i−1 k2
=
k=1
N
X
2
for some positive constants σ11 and β11
, and sufficiently small
µmax .
where (109) was used. Let
ei
pT ⊗ IM w
w̄i
ei =
VT w
,
(119)
ei
w̌i
VRT ⊗ IM w
q T ⊗ IM Γi si
s̄i
VT AT
MΓ
s
=
,
i i
2
ši
VRT ⊗ IM AT
2 MΓi si
(120)
We then rewrite (118) as
T
T
−D21,i
IM − D11,i
w̄i−1
s̄i
w̄i
+
=
T
T
w̌i−1
ši
w̌i
−D12,i
JT − D22,i
(112)
(121)
Noting that
2 2
kIM − D̄11,i k ≤ 1 − σ11 µmax , kRD11 ,i k ≤ β11
µmax (117)
2
qk2 (1 − rk )Hk,i−1
−
N
X
2
qk2 (1 − rk )2 Hk,i−1
k=1
2
qk2 (1 − rk )rk Hk,i−1
.
(115)
(123)
(116)
where in step (a) we called upon the Rayleigh-Ritz characterization of eigenvalues [32], [33], and (b), (c) hold because
kAk = λmax (A) for any symmetric positive-semidefinite
matrix A, and kA2 k = kAk2 for any symmetric matrix A.
Then, matrices D̄11,i and RD11 ,i are symmetric positivedefinite. Following similar arguments to those in [2, pp. 511–
Computing the expectations again on both sides of (123),
k=1
Recall, from (2) and (33), that
0 < νd IM ≤ Hk,i−1 ≤ δd IM .
13
Let X be a constant matrix of size M × M . Then,
(1 − rk )(1 − rj )X, k 6= j
E [Γk,i XΓj,i ] =
(134)
X 0,
k=j
we have
1
T
E E[k(IM − D11,i
)w̄i−1 k2 |F i−1 ]
1−t
1
2 2
≤
(1 − σ11 µmax )2 + β11
µmax Ekw̄i−1 k2
1− t
2 2
β11
µmax
(a)
= 1 − σ11 µmax +
Ekw̄i−1 k2
1 − σ11 µmax
where X 0 has the same form as (48), and we can further
rewrite X 0 as (73). It follows that:
T
2
E D11,i
D11,i |F i−1 − D̄11,i
(b)
0
≤ (1 − σ11
µmax ) Ekw̄i−1 k2
(124)
where in step (a) we set t = σ11 µmax , and in (b) positive
0
0
number σ11
< σ11 , and µmax is small enough such that σ11
≤
−1 2
σ11 − (1 − σ11 µmax ) β11 µmax . We can now establish (35)
by substituting (124) into (122), and completing the argument
starting from Eq. (9.69) in the proof of Theorem 9.1 in [2, pp.
516–521], where the quantity b = 0M N (appeared in (9.54)
of [2]).
=
N X
N
X
N X
N
X
for any 0 < t < 1, which appeared in (9.117) of [2]. Let
T
T
Ki , (IM − D11,i ) IM − D11,i
w̄i−1 (w̄i−1 )
T
× (IM − D11,i ) IM − D11,i
(126)
2
T
Li , (IM − D11,i ) IM − D11,i
.
(127)
Then, both matrices Ki and Li are symmetric positive semidefinite. Thus, we have
T
E k(IM − D11,i
)w̄i−1 k4 |F i−1
T
= (w̄i−1 ) E [Ki |F i−1 ] w̄i−1
(134)
=
N
N
X
X
2
qk2 (1 − rk )2 Hk,i−1
+
k=1
N X
N
X
2
qk2 (1 − rk )rk diag{Hk,i−1
}−
qk qj (1 − rk )(1 − rj )Hk,i−1 Hj,i−1
k=1 j=1
=
N
X
2
qk2 (1 − rk )rk diag{Hk,i−1
}.
(135)
k=1
2
Recall from (116) that {Hk,i−1 > 0}. Then, {Hk,i−1
> 0}
2
and {diag{Hk,i−1 } > 0}. Computing Euclidean norms on
both sides of (135), we have
T
2
E D11,i
D11,i |F i−1 − D̄11,i
N
(a) X
≤
k=1
N
(b) X
2
qk2 (1 − rk )rk diag{Hk,i−1
}
2
qk2 (1 − rk )rk Tr Hk,i−1
k=1
≤ Tr (E [Ki |F i−1 ]) kw̄i−1 k
T
= w̄i−1
E [Li |F i−1 ] w̄i−1 kw̄i−1 k2
≤
N
X
2
qk2 (1 − rk )rk M λmax Hk,i−1
k=1
N
(116) X
4
= kE [Li |F i−1 ] kkw̄i−1 k4
(128)
where the inequality (a) holds because λmax (Σ) ≤ Tr(Σ) for
any symmetric positive semi-definite matrix Σ. We proceed to
deal with the term E [Li |F i−1 ]. Note that
Li = IM − L1,i + L2,i − L3,i + L4,i
(129)
≤
qk2 (1 − rk )rk M δd2
T
L1,i , 2D11,i + 2D11,i
2
(130)
2
T
T
T
L2,i , 3D11,i D11,i
+ D11,i
D11,i + (D11,i ) + D11,i
(131)
2
2
T
T
L3,i , (D11,i ) D11,i
+ D11,i D11,i
+
(132)
(133)
and we have E [L1,i |F i−1 ] = 4D̄11,i according to (112).
(136)
k=1
where in step (a) we used the property that kA + Bk ≤
kAk + kBk [33], and (b) holds because kXk ≤ Tr(X),
for any symmetric positive semi-definite matrix X, and that
Tr[diag{X}] = Tr[X]. Recall from (45) that [2, p. 509]
T
qk = µk (eT
k A2 p) , µmax τk (ek A2 p)
where
T
T
T
D11,i D11,i
D11,i + D11,i
D11,i D11,i
2
T
L4,i , D11,i D11,i
N
X
k=1
2
≤ λmax (E [Li |F i−1 ]) kw̄i−1 k
qk qj (1 − rk )(1 − rj )Hk,i−1 Hj,i−1 +
k=1 j6=k=1
≤
2
≤ λmax (E [Ki |F i−1 ]) kw̄i−1 k
(a)
qk qj (1 − rk )(1 − rj )Hk,i−1 Hj,i−1
k=1 j=1
N
X
We next establish (36). Compared to the proof for Theorem
9.2 in [2], the main difference, apart from the second-order
moments evaluated in (124), is the term
1
T
E k(IM − D11,i
)w̄i−1 k4
(125)
3
(1 − t)
qk qj E [Γk,i Hk,i−1 Hj,i−1 Γj,i |F i−1 ] −
k=1 j=1
(137)
where ek denotes the k-th basis vector, which has a unit entry
at the k-th location and zeros elsewhere, and the parameter τk
satisfies µk = µmax τk . Then, we have
T
2
E D11,i
D11,i |F i−1 − D̄11,i
= O(µ2max )
(138)
14
Likewise, it follows that
h
i
2
2
E (D11,i ) |F i−1 − D̄11,i
h
i
2
2
T
E D11,i
|F i−1 − D̄11,i
Recall from (117) and (114) that
2
T
E D11,i D11,i
|F i−1 − D̄11,i
=
O(µ2max )
(139)
=
O(µ2max ).
(140)
=
O(µ2max ).
Substituting (138)–(141) into (131), we obtain
2
E [L2,i |F i−1 ] − 6 D̄11,i
= O(µ2max ).
(141)
(142)
Then, by following similar techniques shown in the proof of
Lemma 9.5 [2, pp. 542–546], we have
(I − F)−1 = [(p ⊗ p)(1 ⊗ 1)T ] ⊗ Z −1 + O(1)
(148)
where
Z,
N
X
qk (1 − rk ) [(Hk ⊗ IM ) + (IM ⊗ Hk )] .
(149)
k=1
The desired results (57) and (58) in Theorem 2 now follow
by referring to the proofs of Theorem 11.2 and Lemma 11.3
in [2, pp. 583–596], and Theorem 11.4 in [2, pp. 608–609].
Similarly, it can be verified that
3
E [L3,i |F i−1 ] − 4 D̄11,i
= O(µ3max )
4
E [L4,i |F i−1 ] − D̄11,i
= O(µ4max ).
(143)
(144)
It follows that
kE [Li |F i−1 ] k = kI − E [L1,i |F i−1 ] + E [L2,i |F i−1 ] −
E [L3,i |F i−1 ] + E [L4,i |F i−1 ] k
2
3
= I − 4D̄11,i + 6 D̄11,i − 4 D̄11,i +
4
2
D̄11,i + E [L2,i |F i−1 ] − 6 D̄11,i
3
− E [L3,i |F i−1 ] − 4 D̄11,i
4
+ E [L4,i |F i−1 ] − D̄11,i
2
3
≤ I − 4D̄11,i + 6 D̄11,i − 4 D̄11,i +
4
2
D̄11,i
+ E [L2,i |F i−1 ] − 6 D̄11,i
3
+ E [L3,i |F i−1 ] − 4 D̄11,i
4
+ E [L4,i |F i−1 ] − D̄11,i
4
= k I − D̄11,i k + O(µ2max )
Evaluating the squared Euclidean norms on both sides of
(38) and taking expectations conditioned on F i−1 , then taking
expectations again we get
n
o
0
ei0 k2bvec(I ) ] = E kw
ei−1
E[kw
k2F bvec(I ) +
NM
n NM
o
2
E ksi kE[(Γ MA )⊗ (Γ MA )]bvec(I )
(150)
i
4
≤ (1 − σ11 µmax ) + O(µ2max ).
00
≤ (1 − σ11
µmax ) Ekw̄i−1 k4
(146)
00
for some positive constant σ11
< σ11 , and for small enough
µmax , where in step (a) we set t , σ11 µmax . Then, the result
in (36) can be obtained by continuing from Eq. (9.117) (by
choosing t = σ11 µmax ) in the proof of Theorem 9.2 in [2, pp.
523–530].
T
F , E B0i ⊗b B0i
2
NM
n
E ksi k2E[(Γ
NM
o
i MA2 )⊗b (Γi MA2 )]F
n
bvec(IN M )
(151)
n=0
where the first-term corresponds to a transient component that
ek,i k2
dies out with time, and the convergence rate of Ekw
towards the steady-state regime is seen to be dictated by ρ (F)
[2, p. 592]. Now, let
Γ , EΓi = diag{(1 − rk )}N
k=1 ⊗ IM
(152)
M0 , MΓ = diag{µk (1 − rk )}N
k=1 ⊗ IM
(153)
0
T
B 0 , EB0i = AT
2 (I − M H) A1
(154)
0
We now rewrite (147) in terms of B as
(39)
T
T
T T
F = E AT
2 (I − MΓi H) A1 ⊗b A2 (I − MΓi H) A1
= (A1 ⊗b A1 ) I − I ⊗b (HΓM) − (HΓM) ⊗b I+
E [(HΓi M) ⊗b (HΓi M)] (A2 ⊗b A2 )
T
= [B 0 ⊗b B 0 ] + ∆F (µ2max )
(155)
where ∆F (µ2max ) is a matrix whose entries are in the order
of O(µ2max ). Following similar techniques to the proof of
Theorem 9.3 [2, pp. 535–540], we make the same Jordan
canonical decomposition for matrix P = A1 A2 as (108), then
substituting into (154) we get
T
B 0 = V−1 (J T − D0T )VT
(156)
where
A PPENDIX B
P ROOF OF T HEOREM 2
Define
i
NM
i
X
(145)
Substituting into (128), and taking expectations again on both
sides, we have
1
T
E k(IM − D11,i
)w̄i−1 k4
3
(1 − t)
1
4
2
≤
(1
−
σ
µ
)
+
O(µ
)
Ekw̄i−1 k4
11
max
max
(1 − t)3
(a)
= 1 − σ11 µmax + O(µ2max ) Ekw̄i−1 k4
b
where we used the weighted vector notation kxk2σ = kxk2Σ
with σ = bvec(Σ) and bvec(·) denoting the block vector
operation [2, p. 588]. Iterating the relation we get
n
o
0
ei0 k2bvec(I ) ] = E kw
e−1
E[kw
k2F i+1 bvec(I ) +
= kI − D̄11,i k4 + O(µ2max )
(117)
2
(147)
0
T
−1
D0T , VT AT
2 M HA1 V
0T
0T
D11 D21
=
0T
0T
D12 D22
T
(157)
15
and
0
D11
=
N
X
0
qk (1 − rk )Hk , D21
= O(µmax ).
(158)
k=1
0T
We now introduce the eigen-decomposition D11
, U ΛU T for
0T
the symmetric positive-definite matrix D11 , where U is unitary,
and Λ is a diagonal matrix composed of the eigenvalues of
0T
D11
. Let
2/N
(N −1)/N
T = diag{µ1/N
IM , µmax IM }
max U, µmax IM , . . . , µmax
(159)
then we have
0
0
T
B11 B12
T −1 VT B 0 V−1 T =
.
(160)
0
0
B21
B22
which means that the diagonal entries of F11 are the eigenval0
0
perturbed by a second-order term, O(µ2max ).
ues of B11
⊗ B11
Referring to Gershgorin’s Theorem, the union of the M 2
Gershgorin discs, centered at the diagonal entries of F11 with
(N +1)/N
radius O(µmax
), is disjoint from the union of the other
M 2 (N 2 −1) Gershgorin discs, centered at the diagonal entries
of F22 . Note that F has the same eigenvalues as the block
matrix on the right hand side of (163), and that eigenvalues
are invariant under a transposition operation. It follows from
(161) that
0
0
+1)/N
ρ (F) = ρ (B11
⊗ B11
) + O(µ(N
).
max
(166)
2
0
0
0
Using the fact that ρ (B11
⊗ B11
) = [ρ (B11
)] , we arrive at
the desired result (60).
(N +1)/N
0
0
It follows that B11
, IM − Λ, B12
= O(µmax
) [2,
0
p. 538]. The matrix B has the same eigenvalues as the
block matrix on the right hand side of (160). By referring to
Gershgorin’s Theorem [32], [33], it is shown in [2, pp. 539–
540] that the union of the M Gershgorin discs, each centered
(N +1)/N
0
at an eigenvalue of B11
), is disjoint
with radius O(µmax
from that of the other M (N − 1) Gershgorin discs, centered
0
at the diagonal entries of B22
, and therefore
0
+1)/N
ρ (B 0 ) = ρ (B11
) + O(µ(N
).
max
A PPENDIX C
E XAMINING THE D IFFERENCE IN (75)
We revisit the MSE networks discussed in (82). Assume
that there are only two agents in the network as shown in Fig.
2
2
7, namely, N = 2, with M = 2. Assume that σv,1
> σv,2
. For
1
(161)
Let
1
˜ F , T T V−1 ⊗b T T V−1 ∆F (µ2max )×
∆
T
T
V T −1
⊗b V T −1
1/N
o(µmax )
O(µ2max )
2/N
O(µ2max )
o(µmax )
.
=
..
o(µ2max )
.
1+1/N
O(µ2max )
o(µmax )
1
Fig. 7. A two-agent MSE network with a doubly-stochastic combination
matrix.
(162)
˜ F are
It follows from (162) that all the diagonal blocks of ∆
2
in the order of O(µmax ), the remaining block matrices in the
1/N
first row are in the order of o(µmax ), the remaining block
matrices in the first column are in the order of o(µ2max ), and
the upper and lower triangular blocks in the (2, 2)th block of
1+1/N
˜ F are in the order of o(µ2/N
∆
) respectively.
max ) and o(µmax
Then, substituting (160) and (162) into (155), we have
T
T
T T V−1 ⊗b T T V−1 F V T −1
⊗b V T −1
0
0
T
0
0
B11 B12
B11 B12
˜F
=
⊗b
+∆
0
0
0
0
B22
B22
B21
B21
T
F11 F12
=
(163)
F21 F22
where
0
0
+1)/N
F11 = B11
⊗ B11
+ O(µ2max ), F12 = O(µ(N
). (164)
max
Recall that
we have
0
B11
is a diagonal matrix, so is
0
B11
⊗
0
B11
,
0
0
diag{F11 } = diag{ λ (B11
⊗ B11
)} + O(µ2max )
2
then
(165)
simplicity, uniform parameters {qk ≡ q} are used across the
agents (which may occur, for example, in the ATC or CTA
forms when the step-sizes are uniform across the agents, i.e.,
{µk ≡ µ}, and doubly-stochastic combination matrices are
adopted. In this case, we get {qk ≡ µ/N } [2, pp. 493–494]).
Let
|π1 | π1
|π2 | π2
Ru,1 =
, Ru,2 =
(167)
π1
1
π2
1
where the numbers |π1 | < 1, |π2 | < 1 ensure that Ru,1 >
0, Ru,2 > 0. Then, expression (75) can be rewritten as
MSDcoor,k − MSDgrad,k
(85)
−1
2
= rqTr (Ru,1 + Ru,2 )
σv,1
(diag{Ru,1 } − Ru,1 ) +
2
σv,2
(diag{Ru,2 } − Ru,2 )
−1
(167)
|π1 | + |π2 | π1 + π2
= rqTr
×
π1 + π2
2
!
2
2
0
−π1 σv,1
− π2 σv,2
2
2
−π1 σv,1
− π2 σv,2
0
=
2
2
2rq(π1 + π2 )(π1 σv,1
+ π2 σv,2
)
2
2 (|π1 | + |π2 |) − (π1 + π2 )
(168)
where the denominator is positive for all |π1 | < 1, |π2 | <
1. Then, MSDcoor,k < MSDgrad,k if, and only if (π1 +
16
2
2
π2 )(π1 σv,1
+ π2 σv,2
) < 0, which implies that
(
2
2
0 < π2 < 1, −π2 < π1 < − σv,2
/σv,1
π2
2
2
−1 < π2 < 0, − σv,2 /σv,1 π2 < π1 < −π2 .
A PPENDIX E
P ROOF OF C OROLLARY 5
(169a)
(169b)
We start from the MSD expression in (95) and note first
that
rk
G0k = (1 − rk )2 G +
diag{G}
(174)
1 − rk
Otherwise, MSDcoor,k ≥ MSDgrad,k .
Substituting into (95) we have:
A PPENDIX D
P ROOF OF C OROLLARY 2
MSDcoor,k
1
=
2
k=1
k=1
=
1
2
(170)
where we substituted (76) into (75) and used the relation
Tr(Gk ) = Tr (diag{Gk }). Then, noting that
!
N
N
N
X
X
X
0<
qk λmin (Hk ) ≤ λ
qk Hk ≤
qk λmax (Hk )
k=1
k=1
k=1
(172)
we have
N
.
X
1
δd
qk
!
(a)
≤ 1
k=1
N
.X
λ
N
X
qk λmax (Hk ) ≤
!−1
≤
k=1
N
N
.X
X
(b) .
1
qk λmin (Hk ) ≤ 1
νd
qk
k=1
− rk )
×
k=1
−1
1
G +
2
N
X
!−1
qk (1 − rk )
×
k=1
!
qk2 (1 − rk )rk
Tr H −1 diag{G}
k=1
1
=
2
N
X
!−1
qk (1 − rk )
k=1
N
X
!
qk2 (1 − rk )2
×
k=1
1
Tr H −1 G + (θ − α)Tr H −1 diag{G}
2
(175)
where (175) holds because
PN
PN
2
2
qk2 (1 − rk )
k=1 qk (1 − rk )
θ − α = Pk=1
−
PN
N
k=1 qk (1 − rk )
k=1 qk (1 − rk )
PN
qk2 (1 − rk )rk
= Pk=1
(176)
N
k=1 qk (1 − rk )
with the numbers α and θ being defined in (97) and (98),
respectively. Recall that
!−1 N
N
X
1 X
MSDgrad,k =
qk
qk2 Tr H −1 G
(177)
2
k=1
qk Hk
2
k=1
is the MSD performance for the full-gradient case. Thus,
k=1
!
qk2 (1
k=1
k=1
N
X
k=1
k=1
N
X
rk
diag{G}
1 − rk
!−1 N
!
N
X
X
2
2
qk (1 − rk )
qk (1 − rk ) ×
Tr H
Then, applying the inequality [34]:
for any symmetric positive semi-definite matrices A and B,
where λmin (A) and λmax (A) represent respectively the largest
and smallest eigenvalues of A, we obtain
(
!−1
N
X
r
−
MSDcoor,k −MSDgrad,k ≤
λmax
qk Hk
2
k=1
!−1 ) N
N
X
X
qk2 Tr(Gk ) (171)
λmin
qk Hk
qk (1 − rk )
k=1
k=1
λmin (A)Tr(B) ≤ Tr(AB) ≤ λmax (A)Tr(B)
!−1
−1
Tr H
G+
In the case when the matrices {Hk } or {Gk } are diagonal, it
follows from (75) and (76) that MSDcoor,k − MSDgrad,k = 0,
which verifies (80).
More generally, according to (2) and (46), we have
!−1
N
N
N
X
X
X
q k Hk
> 0,
qk2 Gk ≥ 0,
qk2 diag{Gk } ≥ 0
N
X
!
(173)
k=1
where the inequalities (a) and (b) hold due to (2). Substituting
(173) into (171) gives the upper bound for the difference
MSDcoor,k −MSDgrad,k as shown by (79). Then, by following
a similar argument, we obtain the lower bound for the difference as the opposite number of the upper bound, which leads
to the desired result in Corollary 2.
MSDcoor,k − MSDgrad,k
!
PN
PN
2
2
2
1
k=1 qk (1 − rk )
k=1 qk
=
− PN
Tr H −1 G
PN
2
k=1 qk (1 − rk )
k=1 qk
1
+ (θ − α)Tr H −1 diag{G}
2
1
α
= Tr H −1 G + (θ − α)Tr H −1 diag{G} . (178)
2
2
Applying (170) and (2) to (178), we obtain the desired results
for the MSD performance shown in Corollary 5. The result
for the ER performance in Corollary 5 can be shown by
subtracting the ER expression, ERgrad,k , on the both sides
of (96).
17
R EFERENCES
[1] C. Wang, Y. Zhang, B. Ying, and A. H. Sayed, “Coordinate-descent
adaptation over networks,” in Proc. EUSIPCO, Kos Island, Greece,
Aug. 2017.
[2] A. H. Sayed, “Adaptation, learning, and optimization over networks,”
Foundations and Trends in Machine Learning, vol. 7, no. 4-5, pp. 311–
801, 2014.
[3] A. H. Sayed, “Adaptive networks,” Proceedings of the IEEE, vol. 102,
no. 4, pp. 460–497, Apr. 2014.
[4] S. Kar, J. M. F. Moura, and K. Ramanan, “Distributed parameter estimation in sensor networks: Nonlinear observation models and imperfect
communication,” IEEE Trans. Information Theory, vol. 58, no. 6, pp.
3575–3605, June 2012.
[5] A. Nedić and A. Ozdaglar, “Cooperative distributed multi-agent optimization,” in Convex Optimization in Signal Processing and Communications, D. P. Palomar and Y. C. Eldar, Eds., pp. 340–386. Cambridge
University Press, 2010.
[6] S. Kar and J. M. F. Moura, “Convergence rate analysis of distributed
gossip (linear parameter) estimation: Fundamental limits and tradeoffs,”
IEEE J. Sel. Top. Signal Process., vol. 5, no. 4, pp. 674–690, Aug. 2011.
[7] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione,
“Gossip algorithms for distributed signal processing,” Proc. IEEE, vol.
98, no. 11, pp. 1847–1864, Nov. 2010.
[8] S. Sardellitti, M. Giona, and S. Barbarossa, “Fast distributed average
consensus algorithms based on advection-diffusion processes,” IEEE
Trans. Signal Process., vol. 58, no. 2, pp. 826–842, Feb. 2010.
[9] P. Braca, S. Marano, and V. Matta, “Running consensus in wireless
sensor networks,” in Proc. 11th International Conference on Information
Fusion, Cologne, Germany, June 2008, pp. 1–6.
[10] U. A. Khan and J. M. F. Moura, “Distributing the Kalman filter for
large-scale systems,” IEEE Trans. Signal Process., vol. 56, no. 10, pp.
4919–4935, Oct. 2008.
[11] L. Xiao and S. Boyd, “Fast linear iterations for distributed averaging,”
Syst. Control Lett., vol. 53, no. 1, pp. 65–78, Sep. 2004.
[12] S.-Y. Tu and A. H. Sayed, “Diffusion strategies outperform consensus
strategies for distributed estimation over adaptive networks,” IEEE
Trans. Signal Process., vol. 60, no. 12, pp. 6217–6234, Dec. 2012.
[13] Y. Nesterov, “Efficiency of coordinate descent methods on huge-scale
optimization problems,” SIAM Journal on Optimization, vol. 22, no. 2,
pp. 341–362, 2012.
[14] P. Richtárik and M. Takáč, “Iteration complexity of randomized blockcoordinate descent methods for minimizing a composite function,”
Mathematical Programming, vol. 144, no. 1-2, pp. 1–38, 2014.
[15] Z. Lu and L. Xiao, “On the complexity analysis of randomized blockcoordinate descent methods,” Mathematical Programming, vol. 152, pp.
615–642, 2015.
[16] X. Zhao and A. H. Sayed, “Asynchronous adaptation and learning over
networks-Part I: Modeling and stability analysis,” IEEE Trans. Signal
Process., vol. 63, no. 4, pp. 811–826, Feb. 2015.
[17] X. Zhao and A. H. Sayed, “Asynchronous adaptation and learning over
networks-Part II: Performance analysis,” IEEE Trans. Signal Process.,
vol. 63, no. 4, pp. 827–842, Feb. 2015.
[18] X. Zhao and A. H. Sayed, “Asynchronous adaptation and learning over
networks-Part III: Comparison analysis,” IEEE Trans. Signal Process.,
vol. 63, no. 4, pp. 843–858, Feb. 2015.
[19] R. Arablouei, S. Werner, Y.-F. Huang, and K. Dogancay, “Distributed
least mean-square estimation with partial diffusion,” IEEE Trans. Signal
Process., vol. 62, no. 2, pp. 472–484, Jan. 2014.
[20] M. R. Gholami, E. G. Ström, and A. H. Sayed, “Diffusion estimation
over cooperative networks with missing data,” in Proc. IEEE GlobalSIP,
Austin, TX, Dec. 2013, pp. 411–414.
[21] S. C. Douglas, “Adaptive filters employing partial updates,” IEEE Trans.
Circuits Syst. II, vol. 44, no. 3, pp. 209–216, Mar. 1997.
[22] S. Werner, M. Mohammed, Y.-F. Huang, and V. Koivunen, “Decentralized set-membership adaptive estimation for clustered sensor networks,”
in Proc. IEEE ICASSP, Las Vegas, NV, 2008, pp. 3573–3576.
[23] S. Werner and Y.-F. Huang, “Time- and coefficient- selective diffusion
strategies for distributed parameter estimation,” in Proc. Asilomar
Conference on Signals, Systems, and Computers, Pacific Grove, CA,
2010, pp. 696–700.
[24] S. C. Douglas, “A family of normalized LMS algorithms,” IEEE Signal
Process. Lett., vol. 1, no. 3, pp. 49–51, Mar. 1994.
[25] K. Doğancay, O. Tanrıkulu, “Adaptive filtering algorithms with selective
partial updates,” IEEE Trans. Circuits Syst. II, vol. 48, no. 8, pp. 762–
769, Aug. 2001.
[26] M. Godavarti and A. O. Hero, “Partial update LMS algorithms,” IEEE
Trans. Signal Process., vol. 53, no. 7, pp. 2382–2399, Jul. 2005.
[27] S. Chouvardas, K. Slavakis, and S. Theodoridis, “Trading off complexity
with communication costs in distributed adaptive learning via Krylov
subspaces for dimensionality reduction,” IEEE Journal Selected Topics
Signal Process., vol. 7, no. 2, pp. 257–273, April 2013.
[28] S. Theodoridis, K. Slavakis, and I. Yamada, “Adaptive learning in a
world of projections: A unifying framework for linear and nonlinear
classification and regression tasks,” IEEE Signal Process. Magazine,
vol. 28, no. 1, pp. 97–123, Jan. 2011.
[29] S. Chouvardas, K. Slavakis, Y. Kopsinis, and S. Theodoridis, “A sparsity
promoting adaptive algorithm for distributed learning,” IEEE Trans.
Signal Process., vol. 60, no. 10, pp. 5412–5425, Oct. 2012.
[30] O. N. Gharehshiran, V. Krishnamurthy, and G. Yin, “Distributed energyaware diffusion least mean squares: Game-theoretic learning,” IEEE J.
Sel. Top. Signal Process., vol. 7, no. 5, pp. 821–836, Oct. 2013.
[31] A. H. Sayed, Adaptive Filters, Wiley, 2008.
[32] G. H. Golub and C. F. Van Loan, Matrix Computations, The John
Hopkins University Press, Baltimore, 3 edition, 1996.
[33] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University
Press, 2003.
[34] Y. Fang, K. A. Loparo, and X. Feng, “Inequalities for the trace of
matrix product,” IEEE Trans. Automatic Control, vol. 39, no. 12, pp.
2489–2490, 1994.
Chengcheng Wang (S’17) received the B.Eng. degree in Electrical Engineering and Automation, and
Ph.D degree in Control Science and Engineering,
from the College of Automation, Harbin Engineering University, Harbin, China, in 2011 and 2017,
respectively. She is currently a Research Fellow in
the School of Electrical and Electronic Engineering,
Nanyang Technological University, Singapore. From
Sep. 2014 to Sep. 2016, she was a visiting graduate
researcher in Adaptive Systems Laboratory at the
University of California, Los Angeles, California,
USA. Her research interests include adaptive and statistical signal processing,
and distributed adaptation and learning.
Yonggang Zhang (S’06–M’07–SM’16) received the
B.S. and M.S. degrees from the College of Automation, Harbin Engineering University, Harbin,
China, in 2002 and 2004, respectively. He received
his Ph.D. degree in Electronic Engineering from
Cardiff University, UK in 2007 and worked as a
Post-Doctoral Fellow at Loughborough University,
UK from 2007 to 2008 in the area of adaptive signal
processing. Currently, he is a Professor of Control Science and Engineering in Harbin Engineering
University (HEU) in China. His current research
interests include signal processing, information fusion and their applications
in navigation technology, such as fiber optical gyroscope, inertial navigation
and integrated navigation.
Bicheng Ying (S’15) received his B.S. and M.S.
degrees from Shanghai Jiao Tong University (SJTU)
and University of California, Los Angeles (UCLA)
in 2013 and 2014, respectively. He is currently working towards the PhD degree in Electrical Engineering
at UCLA. His research interests include multi-agent
network processing, large-scale machine learning,
distributed optimization, and statistical signal processing.
18
Ali H. Sayed (S’90–M’92–SM’99–F’01) is Dean
of Engineering at EPFL, Switzerland. He has also
served as distinguished professor and former chairman of electrical engineering at UCLA. An author of over 500 scholarly publications and six
books, his research involves several areas including
adaptation and learning, statistical signal processing,
distributed processing, network and data sciences,
and biologically-inspired designs. Dr. Sayed has received several awards including the 2015 Education
Award from the IEEE Signal Processing Society, the
2014 Athanasios Papoulis Award from the European Association for Signal
Processing, the 2013 Meritorious Service Award, and the 2012 Technical
Achievement Award from the IEEE Signal Processing Society. Also, the 2005
Terman Award from the American Society for Engineering Education, the
2003 Kuwait Prize, and the 1996 IEEE Donald G. Fink Prize. He served as
Distinguished Lecturer for the IEEE Signal Processing Society in 2005 and as
Editor-in-Chief of the IEEE TRANSACTIONS ON SIGNAL PROCESSING
(2003–2005). His articles received several Best Paper Awards from the IEEE
Signal Processing Society (2002, 2005, 2012, 2014). He is a Fellow of
the American Association for the Advancement of Science (AAAS). He is
recognized as a Highly Cited Researcher by Thomson Reuters. He is serving
as President-Elect of the IEEE Signal Processing Society.
| 3cs.SY
|
Overcoming Exploration in Reinforcement Learning
with Demonstrations
arXiv:1709.10089v2 [cs.LG] 25 Feb 2018
Ashvin Nair12 , Bob McGrew1 , Marcin Andrychowicz1 , Wojciech Zaremba1 , Pieter Abbeel12
Abstract— Exploration in environments with sparse rewards
has been a persistent problem in reinforcement learning (RL).
Many tasks are natural to specify with a sparse reward, and
manually shaping a reward function can result in suboptimal
performance. However, finding a non-zero reward is exponentially more difficult with increasing task horizon or action
dimensionality. This puts many real-world tasks out of practical
reach of RL methods. In this work, we use demonstrations
to overcome the exploration problem and successfully learn to
perform long-horizon, multi-step robotics tasks with continuous
control such as stacking blocks with a robot arm. Our method,
which builds on top of Deep Deterministic Policy Gradients and
Hindsight Experience Replay, provides an order of magnitude
of speedup over RL on simulated robotics tasks. It is simple
to implement and makes only the additional assumption that
we can collect a small set of demonstrations. Furthermore, our
method is able to solve tasks not solvable by either RL or
behavior cloning alone, and often ends up outperforming the
demonstrator policy.
I. I NTRODUCTION
RL has found significant success in decision making for
solving games, so what makes it more challenging to apply
in robotics? A key difference is the difficulty of exploration,
which comes from the choice of reward function and complicated environment dynamics. In games, the reward function
is usually given and can be directly optimized. In robotics,
we often desire behavior to achieve some binary objective
(e.g., move an object to a desired location or achieve a certain
state of the system) which naturally induces a sparse reward.
Sparse reward functions are easier to specify and recent work
suggests that learning with a sparse reward results in learned
policies that perform the desired objective instead of getting
stuck in local optima [1], [2]. However, exploration in an
environment with sparse reward is difficult since with random
exploration, the agent rarely sees a reward signal.
The difficulty posed by a sparse reward is exacerbated
by the complicated environment dynamics in robotics. For
example, system dynamics around contacts are difficult to
model and induce a sensitivity in the system to small errors.
Many robotics tasks also require executing multiple steps
successfully over a long horizon, involve high dimensional
control, and require generalization to varying task instances.
These conditions further result in a situation where the agent
so rarely sees a reward initially that it is not able to learn at
all.
All of the above means that random exploration is not a
tenable solution. Instead, in this work we show that we can
use demonstrations as a guide for our exploration. To test our
1
OpenAI,
2
University of California, Berkeley.
method, we solve the problem of stacking several blocks at
a given location from a random initial state. Stacking blocks
has been studied before in the literature [3], [4] and exhibits
many of the difficulties mentioned: long horizons, contacts,
and requires generalizing to each instance of the task. We
limit ourselves to 100 human demonstrations collected via
teleoperation in virtual reality. Using these demonstrations,
we are able to solve a complex robotics task in simulation
that is beyond the capability of both reinforcement learning
and imitation learning.
The primary contribution of this paper is to show that
demonstrations can be used with reinforcement learning
to solve complex tasks where exploration is difficult. We
introduce a simple auxiliary objective on demonstrations, a
method of annealing away the effect of the demonstrations
when the learned policy is better than the demonstrations,
and a method of resetting from demonstration states that
significantly improves and speeds up training policies. By
effectively incorporating demonstrations into RL, we shortcircuit the random exploration phase of RL and reach
nonzero rewards and a reasonable policy early on in training.
Finally, we extensively evaluate our method against other
commonly used methods, such as initialization with learning
from demonstrations and fine-tuning with RL, and show that
our method significantly outperforms them.
II. R ELATED W ORK
Learning methods for decision making problems such as
robotics largely divide into two classes: imitation learning
and reinforcement learning (RL). In imitation learning (also
called learning from demonstrations) the agent receives behavior examples from an expert and attempts to solve a task
by copying the expert’s behavior. In RL, an agent attempts
to maximize expected reward through interaction with the
environment. Our work combines aspects of both to solve
complex tasks.
Imitation Learning: Perhaps the most common form of
imitation learning is behavior cloning (BC), which learns a
policy through supervised learning on demonstration stateaction pairs. BC has seen success in autonomous driving
[5], [6], quadcopter navigation [7], locomotion [8], [9]. BC
struggles outside the manifold of demonstration data. Dataset
Aggregation (DAGGER) augments the dataset by interleaving
the learned and expert policy to address this problem of
accumulating errors [10]. However, DAGGER is difficult to
use in practice as it requires access to an expert during all
of training, instead of just a set of demonstrations.
Fig. 1: We present a method using reinforcement learning to solve the task of block stacking shown above. The robot starts
with 6 blocks labelled A through F on a table in random positions and a target position for each block. The task is to move each
block to its target position. The targets are marked in the above visualization with red spheres which do not interact with the
environment. These targets are placed in order on top of block A so that the robot forms a tower of blocks. This is a complex,
multi-step task where the agent needs to learn to successfully manage multiple contacts to succeed. Frames from rollouts of
the learned policy are shown. A video of our experiments can be found at: http://ashvin.me/demoddpg-website
Fundamentally, BC approaches are limited because they
do not take into account the task or environment. Inverse
reinforcement learning (IRL) [11] is another form of imitation learning where a reward function is inferred from the
demonstrations. Among other tasks, IRL has been applied
to navigation [12], autonomous helicopter flight [13], and
manipulation [14]. Since our work assumes knowledge of a
reward function, we omit comparisons to IRL approaches.
Reinforcement Learning: Reinforcement learning methods have been harder to apply in robotics, but are heavily
investigated because of the autonomy they could enable.
Through RL, robots have learned to play table tennis [15],
swing up a cartpole, and balance a unicycle [16]. A renewal
of interest in RL cascaded from success in games [17], [18],
especially because of the ability of RL with large function
approximators (ie. deep RL) to learn control from raw pixels.
Robotics has been more challenging in general but there
has been significant progress. Deep RL has been applied to
manipulation tasks [19], grasping [20], [21], opening a door
[22], and locomotion [23], [24], [25]. However, results have
been attained predominantly in simulation per high sample
complexity, typically caused by exploration challenges.
Robotic Block Stacking: Block stacking has been studied
from the early days of AI and robotics as a task that
encapsulates many difficulties of more complicated tasks we
want to solve, including multi-step planning and complex
contacts. SHRDLU [26] was one of the pioneering works,
but studied block arrangements only in terms of logic and
natural language understanding. More recent work on task
and motion planning considers both logical and physical
aspects of the task [27], [28], [29], but requires domainspecific engineering. In this work we study how an agent
can learn this task without the need of domain-specific
engineering.
One RL method, PILCO [16] has been applied to a simple
version of stacking blocks where the task is to place a
block on a tower [3]. Methods such as PILCO based on
learning forward models naturally have trouble modelling
the sharply discontinuous dynamics of contacts; although
they can learn to place a block, it is a much harder problem
to grasp the block in the first place. One-shot Imitation [4]
learns to stack blocks in a way that generalizes to new target
configurations, but uses more than 100,000 demonstrations
to train the system. A heavily shaped reward can be used
to learn to stack a Lego block on another with RL [30]. In
contrast, our method can succeed from fully sparse rewards
and handle stacking several blocks.
Combining RL and Imitation Learning: Previous work
has combined reinforcement learning with demonstrations.
Demonstrations have been used to accelerate learning on
classical tasks such as cart-pole swing-up and balance [31].
This work initialized policies and (in model-based methods)
initialized forward models with demonstrations. Initializing
policies from demonstrations for RL has been used for
learning to hit a baseball [32] and for underactuated swingup [33]. Beyond initialization, we show how to extract more
knowledge from demonstrations by using them effectively
throughout the entire training process.
Our method is closest to two recent approaches —
Deep Q-Learning From Demonstrations (DQfD) [34] and
DDPG From Demonstrations (DDPGfD) [2] which combine
demonstrations with reinforcement learning. DQfD improves
learning speed on Atari, including a margin loss which
encourages the expert actions to have higher Q-values than
all other actions. This loss can make improving upon the
demonstrator policy impossible which is not the case for
our method. Prior work has previously explored improving
beyond the demonstrator policy in simple environments by
introducing slack variables [35], but our method uses a
learned value to actively inform the improvement. DDPGfD
solves simple robotics tasks akin to peg insertion using
DDPG with demonstrations in the replay buffer. In contrast
to this prior work, the tasks we consider exhibit additional
difficulties that are of key interest in robotics: multi-step
behaviours, and generalization to varying goal states. While
previous work focuses on speeding up already solvable tasks,
we show that we can extend the state of the art in RL with
demonstrations by introducing new methods to incorporate
demonstrations.
III. BACKGROUND
A. Reinforcement Learning
We consider the standard Markov Decision Process framework for picking optimal actions to maximize rewards over
discrete timesteps in an environment E. We assume that the
environment is fully observable. At every timestep t, an agent
is in a state xt , takes an action at , receives a reward rt ,
and E evolves to state xt+1 . In reinforcement learning, the
agent must learn a policy at = π(xt ) toPmaximize expected
T
returns. We denote the return by Rt = i=t γ (i−t) ri where
T is the horizon that the agent optimizes over and γ is
a discount factor for future rewards. The agent’s objective
is to maximize expected return from the start distribution
J = Eri ,si ∼E,ai ∼π [R0 ].
A variety of reinforcement learning algorithms have been
developed to solve this problem. Many involve constructing
an estimate of the expected return from a given state after
taking an action:
Qπ (st , at ) = Eri ,si ∼E,ai ∼π [Rt |st , at ]
= Ert ,st+1 ∼E [rt + γ Eat+1 ∼π [Qπ (st+1 , at+1 )]]
(1)
(2)
We call Qπ the action-value function. Equation 2 is a
recursive version of equation 1, and is known as the Bellman equation. The Bellman equation allows for methods to
estimate Q that resemble dynamic programming.
B. DDPG
Our method combines demonstrations with one such
method: Deep Deterministic Policy Gradients (DDPG) [23].
DDPG is an off-policy model-free reinforcement learning
algorithm for continuous control which can utilize large
function approximators such as neural networks. DDPG
is an actor-critic method, which bridges the gap between
policy gradient methods and value approximation methods
for RL. At a high level, DDPG learns an action-value
function (critic) by minimizing the Bellman error, while
simultaneously learning a policy (actor) by directly maximizing the estimated action-value function with respect to
the parameters of the policy.
Concretely, DDPG maintains an actor function π(s) with
parameters θπ , a critic function Q(s, a) with parameters θQ ,
and a replay buffer R as a set of tuples (st , at , rt , st+1 )
for each transition experienced. DDPG alternates between
running the policy to collect experience and updating the
parameters. Training rollouts are collected with extra noise
for exploration: at = π(s) + N , where N is a noise process.
During each training step, DDPG samples a minibatch
consisting of N tuples from R to update the actor and critic
networks. DDPG minimizes the following loss L w.r.t. θQ
to update the critic:
yi = ri + γQ(si+1 , π(si+1 ))
(3)
L=
1 X
(yi − Q(si , ai |θQ ))2
N i
(4)
The actor parameters θπ are updated using the policy
gradient:
1 X
∇a Q(s, a|θQ )|s=si ,a=π(s) ∇θπ π(s|θπ )|si
∇θ π J =
N i
(5)
To stabilize learning, the Q value in equation 3 is usually
computed using a separate network (called the target network) whose weights are an exponential average over time
of the critic network. This results in smoother target values.
Note that DDPG is a natural fit for using demonstrations. Since DDPG can be trained off-policy, we can use
demonstration data as off-policy training data. We also take
advantage of the action-value function Q(s, a) learned by
DDPG to better use demonstrations.
C. Multi-Goal RL
Instead of the standard RL setting, we train agents with
parametrized goals, which lead to more general policies
[36] and have recently been shown to make learning with
sparse rewards easier [1]. Goals describe the task we expect
the agent to perform in the given episode, in our case
they specify the desired positions of all objects. We sample
the goal g at he beginning of every episode. The function
approximators, here π and Q, take the current goal as an
additional input.
D. Hindsight Experience Replay (HER)
To handle varying task instances and parametrized goals,
we use Hindsight Experience Replay (HER) [1]. The key
insight of HER is that even in failed rollouts where no
reward was obtained, the agent can transform them into
successful ones by assuming that a state it saw in the rollout
was the actual goal. HER can be used with any off-policy
RL algorithm assuming that for every state we can find a
goal corresponding to this state (i.e. a goal which leads to a
positive reward in this state).
For every episode the agent experiences, we store it in
the replay buffer twice: once with the original goal pursued
in the episode and once with the goal corresponding to the
final state achieved in the episode, as if the agent intended
on reaching this state from the very beginning.
IV. M ETHOD
Our method combines DDPG and demonstrations in several ways to maximally use demonstrations to improve
learning. We describe our method below and evaluate these
ideas in our experiments.
A. Demonstration Buffer
First, we maintain a second replay buffer RD where we
store our demonstration data in the same format as R. In
each minibatch, we draw an extra ND examples from RD
to use as off-policy replay data for the update step. These
examples are included in both the actor and critic update.
This idea has been introduced in [2].
B. Behavior Cloning Loss
Second, we introduce a new loss computed only on the
demonstration examples for training the actor.
LBC =
ND
X
2
kπ(si |θπ ) − ai k
(6)
i=1
This loss is a standard loss in imitation learning, but we show
that using it as an auxiliary loss for RL improves learning
significantly. The gradient applied to the actor parameters θπ
is:
λ1 ∇θπ J − λ2 ∇θπ LBC
(7)
(Note that we maximize J and minimize LBC .) Using this
loss directly prevents the learned policy from improving
significantly beyond the demonstration policy, as the actor is
always tied back to the demonstrations. Next, we show how
to account for suboptimal demonstrations using the learned
action-value function.
C. Q-Filter
We account for the possibility that demonstrations can be
suboptimal by applying the behavior cloning loss only to
states where the critic Q(s, a) determines that the demonstrator action is better than the actor action:
LBC =
ND
X
2
kπ(si |θπ ) − ai k 1Q(si ,ai )>Q(si ,π(si ))
(8)
i=1
The gradient applied to the actor parameters is as in equation
7. We label this method using the behavior cloning loss and
Q-filter “Ours” in the following experiments.
D. Resets to demonstration states
To overcome the problem of sparse rewards in very long
horizon tasks, we reset some training episodes using states
and goals from demonstration episodes. Restarts from within
demonstrations expose the agent to higher reward states during training. This method makes the additional assumption
that we can restart episodes from a given state, as is true in
simulation.
To reset to a demonstration state, we first sample a
demonstration D = (x0 , u0 , x1 , u1 , ...xN , uN ) from the set
of demonstrations. We then uniformly sample a state xi
from D. As in HER, we use the final state achieved in the
demonstration as the goal. We roll out the trajectory with the
given initial state and goal for the usual number of timesteps.
At evaluation time, we do not use this procedure.
We label our method with the behavior cloning loss, Qfilter, and resets from demonstration states as “Ours, Resets”
in the following experiments.
V. E XPERIMENTAL S ETUP
A. Environments
We evaluate our method on several simulated MuJoCo [37]
environments. In all experiments, we use a simulated 7-DOF
Fetch Robotics arm with parallel grippers to manipulate one
or more objects placed on a table in front of the robot.
The agent receives the positions of the relevant objects
on the table as its observations. The control for the agent is
continuous and 4-dimensional: 3 dimensions that specify the
desired end-effector position1 and 1 dimension that specifies
the desired distance between the robot fingers. The agent is
controlled at 50Hz frequency.
We collect demonstrations in a virtual reality environment.
The demonstrator sees a rendering of the same observations
as the agent, and records actions through a HTC Vive
interface at the same frequency as the agent. We have
the option to accept or reject a demonstration; we only
accept demonstrations we judge to be mostly correct. The
demonstrations are not optimal. The most extreme example
is the “sliding” task, where only 7 of the 100 demonstrations
are successful, but the agent still sees rewards for these
demonstrations with HER.
B. Training Details
To train our models, we use Adam [38] as the optimizer
with learning rate 10−3 . We use N = 1024, ND = 128, λ1 =
10−3 , λ2 = 1.0/ND . The discount factor γ is 0.98. We use
100 demonstrations to initialize RD . The function approximators π and Q are deep neural networks with ReLU activations and L2 regularization with the coefficient 5×10−3 . The
final activation function for π is tanh, and the output value
is scaled to the range of each action dimension. To explore
during training, we sample random actions uniformly within
the action space with probability 0.1 at every step, and the
noise process N is uniform over ±10% of the maximum
value of each action dimension. Task-specific information,
including network architectures, are provided in the next
section.
C. Overview of Experiments
We perform three sets of experiments. In Sec. VI, we
provide a comparison to previous work. In Sec. VII we
solve block stacking, a difficult multi-step task with complex
contacts that the baselines struggle to solve. In Sec. VIII
we do ablations of our own method to show the effect of
individual components.
VI. C OMPARISON W ITH P RIOR W ORK
A. Tasks
We first show the results of our method on the simulated
tasks presented in the Hindsight Experience Replay paper
[1]. We apply our method to three tasks:
1) Pushing. A block placed randomly on the table must
be moved to a target location on the table by the robot
(fingers are blocked to avoid grasping).
2) Sliding. A puck placed randomly on the table must be
moved to a given target location. The target is outside
the robot’s reach so it must apply enough force that
the puck reaches the target and stops due to friction.
3) Pick-and-place. A block placed randomly on the table
must be moved to a target location in the air. Note
1 In
the 10cm x 10cm x 10cm cube around the current gripper position
Pushing
1.0
0.4
0.2
0.8
Success Rate
0.6
0.6
0.4
0.2
0.0
2M
4M
6M
Timesteps
8M
10M
0.6
0.4
0.2
0.0
0M
Pick and Place
1.0
Ours
HER
BC
0.8
Success Rate
0.8
Success Rate
Sliding
1.0
0.0
0M
2M
4M
6M
8M
10M
0M
Timesteps
2M
4M
6M
8M
10M
Timesteps
Fig. 2: Baseline comparisons on tasks from [1]. Frames from the learned policy are shown above each task. Our method
significantly outperforms the baselines. On the right plot, the HER baseline always fails.
that the original paper used a form of initializing from
favorable states to solve this task. We omit this for our
experiment but discuss and evaluate the initialization
idea in an ablation.
As in the prior work, we use a fully sparse reward for this
task. The agent is penalized if the object is not at its goal
position:
(
0,
if ||xi − gi || < δ
rt =
(9)
−1, otherwise
where the threshold δ is 5cm.
B. Results
Fig. 2 compares our method to HER without demonstrations and behavior cloning. Our method is significantly faster
at learning these tasks than HER, and achieves significantly
better policies than behavior cloning does. Measuring the
number of timesteps to get to convergence, we exhibit a 4x
speedup over HER in pushing, a 2x speedup over HER in
sliding, and our method solves the pick-and-place task while
HER baseline cannot solve it at all.
The pick-and-place task showcases the shortcoming of RL
in sparse reward settings, even with HER. In pick-and-place,
the key action is to grasp the block. If the robot could manage
to grasp it a small fraction of the time, HER discovers
how to achieve goals in the air and reinforces the grasping
behavior. However, grasping the block with random actions
is extremely unlikely. Our method pushes the policy towards
demonstration actions, which are more likely to succeed.
In the HER paper, HER solves the pick-and-place task
by initializing half of the rollouts with the gripper grasping
the block. With this addition, pick-and-place becomes the
easiest of the three tasks tested. This initialization is similar
in spirit to our initialization idea, but takes advantage of the
fact that pick-and-place with any goal can be solved starting
from a block grasped at a certain location. This is not always
true (for example, if there are multiple objects to be moved)
and finding such a keyframe for other tasks would be difficult, requiring some engineering and sacrificing autonomy.
Instead, our method guides the exploration towards grasping
the block through demonstrations. Providing demonstrations
does not require expert knowledge of the learning system,
which makes it a more compelling way to provide prior
information.
VII. M ULTI -S TEP E XPERIMENTS
A. Block Stacking Task
To show that our method can solve more complex tasks
with longer horizon and sparser reward, we study the task
of block stacking in a simulated environment as shown in
Fig. 1 with the same physical properties as the previous
experiments. Our experiments show that our approach can
solve the task in full and learn a policy to stack 6 blocks
with demonstrations and RL. To measure and communicate
various properties of our method, we also show experiments
on stacking fewer blocks, a subset of the full task.
We initialize the task with blocks at 6 random locations
x1 ...x6 . We also provide 6 goal locations g1 ...g6 . To form a
tower of blocks, we let g1 = x1 and gi = gi−1 + (0, 0, 5cm)
for i ∈ 2, 3, 4, 5.
By stacking N blocks, we mean N blocks reach their
target locations. Since the target locations are always on top
of x1 , we start with the first block already in position. So
stacking N blocks involves N −1 pick-and-place actions. To
solve stacking N , we allow the agent 50 ∗ (N − 1) timesteps.
This means that to stack 6 blocks, the robot executes 250
actions or 5 seconds.
We recorded 100 demonstrations to stack 6 blocks, and
use subsets of these demonstrations as demonstrations for
stacking fewer blocks. The demonstrations are not perfect;
they include occasionally dropping blocks, but our method
can handle suboptimal demonstrations. We still rejected more
than half the demonstrations and excluded them from the
demonstration data because we knocked down the tower of
blocks when releasing a block.
B. Rewards
Two different reward functions are used. To test the
performance of our method under fully sparse reward, we
Ours
Stack 2, Sparse
Stack 3, Sparse
Stack 4, Sparse
Stack 4, Step
Stack 5, Step
Stack 6, Step
99%
99%
1%
91%
49%
4%
Ours,
Resets
97%
89%
54%
73%
50%
32%
BC
HER
65%
1%
0%
-
0%
0%
0%
-
BC+
HER
65%
1%
0%
-
Fig. 3: Comparison of our method against baselines. The
value reported is the median of the best performance (success
rate) of all randomly seeded runs of each method.
reward the agent only if all blocks are at their goal positions:
rt = min 1||xi −gi ||<δ
i
(10)
The threshold δ is the size of a block, 5cm. Throughout the
paper we call this the “sparse” reward.
To enable solving the longer horizon tasks of stacking 4
or more blocks, we use the “step” reward :
X
rt = −1 +
1||xi −gi ||<δ
(11)
i
Note the step reward is still very sparse; the robot only
sees the reward change when it moves a block into its
target location. We subtract 1 only to make the reward more
interpretable, as in the initial state the first block is already
at its target.
Regardless of the reward type, an episode is considered
successful for computing success rate if all blocks are at
their goal position in their final state.
C. Network architectures
We use a 4 layer networks with 256 hidden units per layer
for π and Q for the HER tasks and stacking 3 or fewer
blocks. For stacking 4 blocks or more, we use an attention
mechanism [39] for the actor and a larger network. The
attention mechanism uses a 3 layer network with 128 hidden
units per layer to query the states and goals with one shared
head. Once a state and goal is extracted, we use a 5 layer
network with 256 hidden units per layer after the attention
mechanism. Attention speeds up training slightly but does
not change training outcomes.
D. Baselines
We include the following methods to compare our method
to baselines on stacking 2 to 6 blocks. 2
Ours: Refers to our method as described in section IV-C.
Ours, Resets: Refers to our method as described in section
IV-C with resets from demonstration states (Sec. IV-D).
BC: This method uses behavior cloning to learn a policy.
Given the set of demonstration transitions RD , we train the
2 Because of computational constraints, we were limited to 5 random seeds
per method for stacking 3 blocks, 2 random seeds per method for stacking 4
and 5 blocks, and 1 random seed per method for stacking 6 blocks. Although
we are careful to draw conclusions from few random seeds, the results are
consistent with our collective experience training these models. We report
the median of the random seeds everywhere applicable.
Stack 3, Sparse Reward
1.0
Ours
Ours, Resets
No Q-Filter
No BC
No HER
0.8
Success Rate
Task
0.6
0.4
0.2
0.0
0M
50M
100M
150M
200M
250M
300M
350M
400M
Timesteps
Fig. 4: Ablation results on stacking 3 blocks with a fully
sparse reward. We run each method 5 times with random
seeds. The bold line shows the median of the 5 runs while
each training run is plotted in a lighter color. Note “No
HER” is always at 0% success rate. Our method without
resets learns faster than the ablations. Our method with resets
initially learns faster but converges to a worse success rate.
policy π by supervised learning. Behavior cloning requires
much less computation than RL. For a fairer comparison,
we performed a large hyperparameter sweep over various
networks sizes, attention hyperparameters, and learning rates
and report the success rate achieved by the best policy found.
HER: This method is exactly the one described in Hindsight
Experience Replay [1], using HER and DDPG.
BC+HER: This method first initializes a policy (actor) with
BC, then finetunes the policy with RL as described above.
E. Results
We are able to learn much longer horizon tasks than
the other methods, as shown in Fig. 3. The stacking task
is extremely difficult using HER without demonstrations
because the chance of grasping an object using random
actions is close to 0. Initializing a policy with demonstrations
and then running RL also fails since the actor updates depend
on a reasonable critic and although the actor is pretrained,
the critic is not. The pretrained actor weights are therefore
destroyed in the very first epoch, and the result is no better
than BC alone. We attempted variants of this method where
initially the critic was trained from replay data. However,
this also fails without seeing on-policy data.
The results with sparse rewards are very encouraging. We
are able to stack 3 blocks with a fully sparse reward without
resetting to the states from demonstrations, and 4 blocks with
a fully sparse reward if we use resetting. With resets from
demonstration states and the step reward, we are able to learn
a policy to stack 6 blocks.
VIII. A BLATION E XPERIMENTS
In this section we perform a series of ablation experiments
to measure the importance of various components of our
method. We evaluate our method on stacking 3 to 6 blocks.
We perform the following ablations on the best performing
of our models on each task:
No BC Loss: This method does not apply the behavior
cloning gradient during training. It still has access to demonstrations through the demonstration replay buffer.
Stack 4, Step Reward
0.5
0.6
0.4
0.35
Stack 6, Step Reward
Ours
Ours, Resets
0.30
0.4
0.3
0.2
0.25
0.20
0.15
0.10
0.2
0.1
0.0
0.05
0.0
100M
200M
300M
400M
500M
600M
700M
800M
0M
3.0
2.5
Reward
2.0
1.5
1.0
500M
1000M
1500M
4.0
4.0
3.5
3.5
3.0
3.0
2.5
2.5
2.0
1.5
1.0
0.5
100M
200M
300M
400M
500M
Timesteps
600M
700M
800M
1000M
1500M
2000M
1000M
1500M
2000M
2.0
1.5
0.5
0.0
0M
500M
1.0
0.5
0.0
0.00
0M
Reward
0M
Reward
0.40
Ours
Ours, Resets
No Q-Filter
0.6
Success Rate
0.8
Success Rate
Stack 5, Step Reward
Ours
Ours, Resets
No Q-Filter
No BC
Success Rate
1.0
0.0
0M
500M
1000M
1500M
0M
500M
Timesteps
Timesteps
Fig. 5: Ablation results on longer horizon tasks with a step reward. The upper row shows the success rate while the lower
row shows the average reward at the final step of each episode obtained by different algorithms. For stacking 4 and 5 blocks,
we use 2 random seeds per method. The median of the runs is shown in bold and each training run is plotted in a lighter
color. Note that for stacking 4 blocks, the “No BC” method is always at 0% success rate. As the number of blocks increases,
resets from demonstrations becomes more important to learn the task.
No Q-Filter: This method uses standard behavioral cloning
loss instead of the loss from equation Eq. 8, which means
that the actor tries to mimic the demonstrator’s behaviour
regardless of the critic.
No HER: Hindsight Experience Replay is not used.
A. Behavior Cloning Loss
Without the behavior cloning loss, the method is significantly worse in every task we try. Fig. 4 shows the training
curve for learning to stack 3 blocks with a fully sparse
reward. Without the behavior cloning loss, the system is
about 2x slower to learn. On longer horizon tasks, we do
not achieve any success without this loss.
To see why, consider the training curves for stacking 4
blocks shown in Fig. 5. The “No BC” policy learns to stack
only one additional block. Without the behavior cloning loss,
the agent only has access to the demonstrations through the
demonstration replay buffer. This allows it to view highreward states and incentivizes the agent to stack more blocks,
but there is a stronger disincentive: stacking the tower higher
is risky and could result in lower reward if the agent knocks
over a block that is already correctly placed. Because of
this risk, which is fundamentally just another instance of
the agent finding a local optimum in a shaped reward, the
agent learns the safer behavior of pausing after achieving a
certain reward. Explicitly weighting behavior cloning steps
into gradient updates forces the policy to continue the task.
B. Q-Filter
The Q-Filter is effective in accelerating learning and
achieving optimal performance. Fig. 4 shows that the method
without filtering is slower to learn. One issue with the
behavior cloning loss is that if the demonstrations are suboptimal, the learned policy will also be suboptimal. Filtering
by Q-value gives a natural way to anneal the effect of the
demonstrations as it automatically disables the BC loss when
a better action is found. However, it gives mixed results
on the longer horizon tasks. One explanation is that in the
step reward case, learning relies less on the demonstrations
because the reward signal is stronger. Therefore, the training
is less affected by suboptimal demonstrations.
C. Resets From Demonstrations
We find that initializing rollouts from within demonstration states greatly helps to learn to stack 5 and 6 blocks but
hurts training with fewer blocks, as shown in Fig. 5. Note that
even where resets from demonstration states helps the final
success rate, learning takes off faster when this technique
is not used. However, since stacking the tower higher is
risky, the agent learns the safer behavior of stopping after
achieving a certain reward. Resetting from demonstration
states alleviates this problem because the agent regularly
experiences higher rewards.
This method changes the sampled state distribution, biasing it towards later states. It also inflates the Q values
unrealistically. Therefore, on tasks where the RL algorithm
does not get stuck in solving a subset of the full problem, it
could hurt performance.
IX. D ISCUSSION AND F UTURE W ORK
We present a system to utilize demonstrations along with
reinforcement learning to solve complicated multi-step tasks.
We believe this can accelerate learning of many tasks,
especially those with sparse rewards or other difficulties in
exploration. Our method is very general, and can be applied
on any continuous control task where a success criterion can
be specified and demonstrations obtained.
An exciting future direction is to train policies directly on
a physical robot. Fig. 2 shows that learning the pick-andplace task takes about 1 million timesteps, which is about
6 hours of real world interaction time. This can realistically
be trained on a physical robot, short-cutting the simulationreality gap entirely. Many automation tasks found in factories
and warehouses are similar to pick-and-place but without the
variation in initial and goal states, so the samples required
could be much lower. With our method, no expert needs
to be in the loop to train these systems: demonstrations
can be collected by users without knowledge about machine
learning or robotics and rewards could be directly obtained
from human feedback.
A major limitation of this work is sample efficiency
on solving harder tasks. While we could not solve these
tasks with other learning methods, our method requires a
large amount of experience which is impractical outside
of simulation. To run these tasks on physical robots, the
sample efficiency will have to improved considerably. We
also require demonstrations which are not easy to collect
for all tasks. If demonstrations are not available but the
environment can be reset to arbitrary states, one way to learn
goal-reaching but avoid using demonstrations is to reuse
successful rollouts as in [40].
Finally, our method of resets from demonstration states
requires the ability to reset to arbitrary states. Although we
can solve many long-horizon tasks without this ability, it is
very effective for the hardest tasks. Resetting from demonstration rollouts resembles curriculum learning: we solve a
hard task by first solving easier tasks. If the environment
does not afford setting arbitrary states, then other curriculum
methods will have to be used.
X. ACKNOWLEDGEMENTS
We thank Vikash Kumar and Aravind Rajeswaran for valuable discussions. We thank Sergey Levine, Chelsea Finn, and
Carlos Florensa for feedback on initial versions of this paper.
Finally, we thank OpenAI for providing a supportive research
environment.
R EFERENCES
[1] M. Andrychowicz et al., “Hindsight experience replay,” in Advances
in neural information processing systems, 2017.
[2] M. Večerı́k et al., “Leveraging Demonstrations for Deep Reinforcement Learning on Robotics Problems with Sparse Rewards,” arXiv
preprint arxiv:1707.08817, 2017.
[3] M. P. Deisenroth, C. E. Rasmussen, and D. Fox, “Learning to Control a
Low-Cost Manipulator using Data-Efficient Reinforcement Learning,”
Robotics: Science and Systems, vol. VII, pp. 57–64, 2011.
[4] Y. Duan et al., “One-shot imitation learning,” in NIPS, 2017.
[5] D. A. Pomerleau, “Alvinn: An autonomous land vehicle in a neural
network,” NIPS, pp. 305–313, 1989.
[6] M. Bojarski et al., “End to End Learning for Self-Driving Cars,” arXiv
preprint arXiv:1604.07316, 2016.
[7] A. Giusti et al., “A Machine Learning Approach to Visual Perception
of Forest Trails for Mobile Robots,” in IEEE Robotics and Automation
Letters., 2015, pp. 2377–3766.
[8] J. Nakanishi et al., “Learning from demonstration and adaptation of
biped locomotion,” in Robotics and Autonomous Systems, vol. 47, no.
2-3, 2004, pp. 79–91.
[9] M. Kalakrishnan et al., “Learning Locomotion over Rough Terrain
using Terrain Templates,” in The 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009.
[10] S. Ross, G. J. Gordon, and J. A. Bagnell, “A Reduction of Imitation
Learning and Structured Prediction to No-Regret Online Learning,”
in Proceedings of the 14th International Conference on Artificial
Intelligence and Statistics (AISTATS), 2011.
[11] A. Ng and S. Russell, “Algorithms for Inverse Reinforcement Learning,” International Conference on Machine Learning (ICML), 2000.
[12] B. D. Ziebart et al., “Maximum Entropy Inverse Reinforcement
Learning.” in AAAI Conference on Artificial Intelligence, 2008, pp.
1433–1438.
[13] P. Abbeel and A. Y. Ng, “Apprenticeship learning via inverse reinforcement learning,” in ICML, 2004, p. 1.
[14] C. Finn, S. Levine, and P. Abbeel, “Guided Cost Learning: Deep
Inverse Optimal Control via Policy Optimization,” in ICML, 2016.
[15] J. Peters, K. Mülling, and Y. Altün, “Relative Entropy Policy Search,”
Artificial Intelligence, pp. 1607–1612, 2010.
[16] M. P. Deisenroth and C. E. Rasmussen, “Pilco: A model-based and
data-efficient approach to policy search,” in ICML, 2011, pp. 465–472.
[17] V. Mnih et al., “Human-level control through deep reinforcement
learning,” Nature, vol. 518, no. 7540, pp. 529–533, 2015.
[18] D. Silver et al., “Mastering the game of Go with deep neural networks
and tree search,” Nature, vol. 529, no. 7587, pp. 484–489, Jan 2016.
[19] S. Levine et al., “End-to-end training of deep visuomotor policies,”
CoRR, vol. abs/1504.00702, 2015.
[20] L. Pinto and A. Gupta, “Supersizing self-supervision: Learning
to grasp from 50k tries and 700 robot hours,” arXiv preprint
arXiv:1509.06825, 2015.
[21] S. Levine et al., “Learning hand-eye coordination for robotic grasping
with deep learning and large-scale data collection,” arXiv preprint
arXiv:1603.02199, 2016.
[22] S. Gu et al., “Deep Reinforcement Learning for Robotic Manipulation with Asynchronous Off-Policy Updates,” arXiv preprint
arXiv:1610.00633, 2016.
[23] T. P. Lillicrap et al., “Continuous control with deep reinforcement
learning,” arXiv preprint arXiv:1509.02971, 2015.
[24] V. Mnih et al., “Asynchronous methods for deep reinforcement learning,” in ICML, 2016.
[25] J. Schulman et al., “Trust region policy optimization,” in Proceedings
of the twenty-first international conference on Machine learning, 2015.
[26] T. Winograd, Understanding Natural Language. Academic Press,
1972.
[27] L. P. Kaelbling and T. Lozano-Perez, “Hierarchical task and motion
planning in the now,” IEEE International Conference on Robotics and
Automation, pp. 1470–1477, 2011.
[28] L. Kavraki et al., “Probabilistic roadmaps for path planning in highdimensional configuration spaces,” IEEE transactions on Robotics and
Automation, vol. 12, no. 4, pp. 566–580, 1996.
[29] S. Srivastava et al., “Combined Task and Motion Planning Through
an Extensible Planner-Independent Interface Layer,” in International
Conference on Robotics and Automation, 2014.
[30] I. Popov et al., “Data-efficient Deep Reinforcement Learning for
Dexterous Manipulation,” arXiv preprint arXiv:1704.03073, 2017.
[31] S. Schaal, “Robot learning from demonstration,” Advances in Neural
Information Processing Systems, no. 9, pp. 1040–1046, 1997.
[32] J. Peters and S. Schaal, “Reinforcement learning of motor skills with
policy gradients,” Neural Networks, vol. 21, no. 4, pp. 682–697, 2008.
[33] J. Kober and J. Peter, “Policy search for motor primitives in robotics,”
in Advances in neural information processing systems, 2008.
[34] T. Hester et al., “Learning from Demonstrations for Real World
Reinforcement Learning,” arXiv preprint arxiv:1704.03732, 2017.
[35] B. Kim et al., “Learning from Limited Demonstrations,” Neural
Information Processing Systems., 2013.
[36] T. Schaul et al., “Universal Value Function Approximators,” Proceedings of The 32nd International Conference on Machine Learning, pp.
1312–1320, 2015.
[37] E. Todorov, T. Erez, and Y. Tassa, “MuJoCo: A physics engine for
model-based control,” in The IEEE/RSJ International Conference on
Intelligent Robots and Systems, 2012.
[38] D. Kingma and J. Ba, “Adam: A method for stochastic optimization,”
International Conference on Learning Representations (ICLR), 2015.
[39] D. Bahdanau, K. Cho, and Y. Bengio, “Neural Machine Translation
by Jointly Learning to Align and Translate,” in ICLR, 2015.
[40] C. Florensa et al., “Reverse Curriculum Generation for Reinforcement
Learning,” in Conference on robot learning, 2017.
| 9cs.NE
|
Random Monomial Ideals1
arXiv:1701.07130v2 [math.AC] 5 Jan 2018
Jesús A. De Loera, Sonja Petrović, Lily Silverstein, Despina Stasi, Dane Wilburne
Abstract: Inspired by the study of random graphs and simplicial complexes, and motivated
by the need to understand average behavior of ideals, we propose and study probabilistic models
of random monomial ideals. We prove theorems about the probability distributions, expectations
and thresholds for events involving monomial ideals with given Hilbert function, Krull dimension,
first graded Betti numbers, and present several experimentally-backed conjectures about regularity,
projective dimension, strong genericity, and Cohen-Macaulayness of random monomial ideals.
1. Introduction
Randomness has long been used to study polynomials. A commutative algebraist’s interest in randomness stems from the desire to understand “average” or “typical” behavior of ideals and rings. A
natural approach to the problem is to define a probability distribution on a set of ideals or varieties,
which, in turn, induces a distribution on algebraic invariants or properties of interest. In such a
formal setup, questions of expected (typical) or unlikely (rare, non-generic) behavior can be stated
formally using probability. Let us consider some examples. Already in the 1930’s, Littlewood and
Offord [32] studied the expected number of real roots of a random algebraic equation defined by random coefficients. The investigations on random varieties, defined by random coefficients on a fixed
Newton polytope support, have generated a lot of work now considered classical (see, e.g., [26, 29, 39]
and the references therein). A probabilistic analysis of algorithms called smooth analysis has been
used in algebraic geometry, see [5, 9]. Roughly speaking, smooth analysis measures the expected
performance of an algorithm under slight random perturbations of worst-case inputs. Another more
recent example of a notion of algebraic randomness appears in [15, 16], where they consider the
distribution of Betti numbers generated randomly using concepts from the Boij-Söderberg theory
[18]. Still, there are many other examples of algebraic topics in which probabilistic analysis plays a
useful role (see e.g., [13] and the references therein). Our paper introduces a new probabilistic model
on monomial ideals inside a polynomial ring.
Why work on a probabilistic model for monomial ideals? There are at least three good reasons:
First, monomial ideals are the simplest of ideals and play a fundamental role in commutative algebra,
most notably as Gröbner degenerations of general ideals, capturing the range of values shown in all
ideals for several invariants (see [12, 17]). Second, monomial ideals provide a strong link to algebraic
combinatorics (see [23, 33, 38]). Third, monomial ideals naturally generalize graphs, hypergraphs,
and simplicial complexes; and, since the seminal paper of Erdös and Rényi [19], probabilistic methods
have been successfully applied to study those objects (see, e.g., [1, 7, 27] and the references therein).
Thus, our work is an extension of both classical probabilistic combinatorics and the new trends in
stochastic topology.
Our goal is to provide a formal probabilistic setup for constructing and understanding distributions
of monomial ideals and the induced distributions on their invariants (degree, dimension, Hilbert
1
This work is supported by the NSF collaborative grants DMS-1522662 to Illinois Institute of Technology and
DMS-1522158 to the Univ. of California, Davis.
1
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
2
function, regularity, etc.). To this end, we define below a simple probability distribution on the set
of monomial ideals. Drawing a random monomial ideal from this distribution allows us to study
the average behavior of algebraic invariants. While we are interested in more general probability
distributions on ideals, some of which we describe in Section 5, we begin with the most basic model
one can consider to generate random monomial ideals; inspired by classical work, we call this family
the Erdős-Rényi-type model, or the ER-type model for random monomial ideals.
The ER-type model for random monomial ideals Let k be a field and let S = k[x1 , . . . , xn ] be
the polynomial ring in n indeterminates. We construct a random monomial ideal in S by producing
a random set of generators as follows: Given an integer D and a parameter p = p(n, D), 0 ≤ p ≤ 1,
we include independently with probability p each non-constant monomial of total degree at most D
in n variables in a generating set of the ideal. In other words, starting with B = ∅, each monomial in
S of degree at most D is added to the set B independently with equal probability p. The resulting
random monomial ideal is then simply I = (B); if B = ∅, then we let I = (0).
Henceforth, we will denote by B(n, D, p) the resulting Erdős-Rényi-type distribution on the sets
of monomials. Since sets of monomials are now random variables, a random set of monomials B
drawn from the distribution B(n, D, p) will be denoted by the standard notation for distributions
B ∼ B(n, D, p). Note that if B ⊂ S is any fixed set of monomials of degree at most D each and
B ∼ B(n, D, p), then
D+n
P (B = B) = p|B| (1 − p)( D )−|B|−1 .
In turn, the distribution B(n, D, p) induces a distribution I(n, D, p) on ideals. We will use the
notation I ∼ I(n, D, p) to indicate that B ∼ B(n, D, p) and I = (B) is a random monomial ideal
generated by the ER-type model.
Before we state our results, let us establish some necessary probabilistic notation and background.
Readers already familiar with random structures and probability background may skip this part, but
those interested in further details are directed to many excellent texts on random graphs and the
probabilistic method including [1, 7, 25].
Given a random variable X, we denote its expected value by E [X], its variance by Var [X], and its
covariance with random variable Y as Cov [X, Y ]. We will often use in our proofs four well-known
facts: the linearity property of expectation, i.e., E [X + Y ] = E [X] + E [Y ], the first moment method
(a special case of Markov’s inequality), which states that P (X > 0) ≤ E [X], and the second moment
method (a special case of Chebyshev’s inequality), which states that P (X = 0) ≤ Var [X]/(E [X])2
for X a non-negative integer-valued random variable. Finally, an indicator random variable 1A for
an event A is a random variable such that 1A = 1, if event A occurs, and 1A = 0 otherwise. Indicator
random variables behave particularly nicely with regard to taking expectations: for any event A,
E [1A ] = P (A) and Var [1A ] = P (A)(1 − P (A)). Following convention, we abbreviate by saying a
property holds a.a.s, to mean that a property holds asymptotically almost surely if, over a sequence
of sets, the probability of having the property converges to 1.
An important point is that I(n, D, p) is a parametric probability distributions on the set of monomial ideals, because it clearly depends on the value of the probability parameter p. A key concern
of our paper is to investigate how invariants evolve as p changes. To express some of our results,
we will need to use asymptotic analysis of probabilistic events: For functions f, g : N → R, we
write f (n) = o (g(n)), and g(n) = ω (f (n)) if limn→∞ f (n)/g(n) = 0. We also write f (n) ∼ g(n) if
limn→∞ f (n)/g(n) = 1, and f (n) g(n) if there exist positive constants n0 , c1 , c2 such that c1 g(n) ≤
f (n) ≤ c2 g(n) when n ≥ n0 . When a sequence of probabilistic events is given by f (n) for n ∈ N, we
say that f happens asymptotically almost surely, abbreviated a.a.s., if limn→∞ P (f (n)) = 1.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
3
In analogy to graph-theoretic properties, we define an (monomial) ideal-theoretic property Q to
be the set of all (monomial) ideals that have property Q. A property Q is monotone increasing if for
any monomial ideals I and J such that I ⊆ J, I ∈ Q implies J ∈ Q as well. We will see that several
algebraic invariants on monomial ideals are monotone.
Let I ∼ I(n, D, p). A function f : N → R is a threshold function for a monotone property Q if for
any p : N → [0, 1]:
(
0, if p = o (f (D)) ,
lim P (I ∈ Q) =
D→∞
1, if p = ω (f (D)) .
A similar definition holds for the case when f is a function of n and n → ∞. A threshold function
gives a zero/one law that specifies when a certain behavior appears.
Our results Our results, summarized in (A)-(E) below, describe the kind of monomial ideals
generated by the ER-type model, in the sense that we can get a handle on both the average and
the extreme behavior of these random ideals and how various ranges of the probability parameter p
control those properties. The following can also serve as an outline of this paper.
(A) Hilbert functions and the distribution of monomial ideals In Section 2, we begin our
investigation of random monomial ideals by showing that I(n, D, p) is not a uniform distribution on
all monomial ideals, but instead, the probability of choosing a particular monomial ideal under the
ER-type model is completely determined by its Hilbert function and the first total Betti number of
its quotient ring.
For an ideal I, denote by βi,j = βi,j (S/I) the (i, j)-th graded Betti number of S/I, that is, the
number of syzygies of degree j at step i of the minimal free resolution. We will collect the first graded
Betti numbers, counting the minimal generators of I, in a vector βˆ1 = (β1,1 , β1,2 , . . . , β1,reg0 ), and
denote by β1 = β1,1 + β1,2 + · · · + β1,reg0 the first total Betti number of S/I. We will denote by hI (·),
or simply hI , the Hilbert function of the ideal I. We can now state the following foundational result:
Theorem 1.1. Let I ⊆ S be a fixed monomial ideal generated in degree at most D. The probability
that the random monomial ideal I ∼ I(n, D, p) equals I is
PD
P (I = I) = pβ1 (S/I) (1 − p)−1+
d=1
hI (d)
.
In this way, two monomial ideals with the same Hilbert function and the same number of minimal
generators have the same probability of occurring. Then, the following natural question arises: How
many monomial ideals in n variables with generators of degree less than or equal to D and with a
given Hilbert function are there? It is well-known that one can compute the Hilbert function from the
graded Betti numbers (see e.g., [38]). Thus it is no surprise that we can state a combinatorial lemma
to count monomial ideals in terms of their graded Betti numbers. If we denote by N M on(n, D, h, βˆ1 )
the number of possible monomial ideals in n variables, generated in degree no more than D, Hilbert
function h, and first graded Betti numbers βˆ1 = (β1,1 , β1,2 , . . . , β1,reg0 ), then N M on(n, D, h, βˆ1 ) is
equal to the number of 0–1 vertices of a certain convex polytope (Lemma 2.3).
Based on Theorem 1.1 and Lemma 2.3, we can provide a closed formula for the induced distribution
on Hilbert functions under the ER-type model, that is, the probability that the ER-type model places
on any given Hilbert function. This is presented in Theorem 2.4.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
4
(B) The Krull dimension and random monomial ideals Section 3 is dedicated to a first
fundamental ring invariant: the Krull dimension dim S/I. By encoding the Krull dimension as the
transversal number of a certain hypergraph, we can show (see Theorem 3.1 for the precise statement)
that the probability that dim(S/I) is equal to t for 0P≤ t ≤ n, for a random monomial ideal
D n
I ∼ I(n, D, p), is given by a polynomial in p of degree t+1
i=1 i
i . This formula is exponentially
large but we make it explicit in some interesting values of t (Theorem 3.2); which in particular give
a complete description of the case for two- and three-variable polynomials.
Turning to asymptotic behavior, we prove that the Krull dimension of (S/I) can be controlled by
bounding the asymptotic growth of the probability parameter p = p(D) as D → ∞. The evolution
of the Krull dimension in terms of p is illustrated in Figure 1. The result is obtained by combining
the family of threshold results from Theorem 3.4 and is stated in the following corollary:
Corollary 1.2. Let I ∼ I(n, D, p), n be fixed, and 0 ≤ t < n. If the parameter p = p(D) is such
that p = ω D−(t+1) and p = o D−t as D → ∞, then dim(S/I) = t asymptotically almost surely.
It is very useful to consider the evolution – as the probability p increases from 0 to 1 – of the random
monomial ideal from the ER-type model and its random generating set B. For very small values of
p, B is all but guaranteed to be empty, and the random monomial ideal is asymptotically almost
surely the zero ideal. As p increases, the random monomial ideal evolves into a more complex ideal
generated in increasingly smaller degrees and support. Simultaneously, as the density of B continues
to increase with p, smaller-degree generators appear; these divide increasingly larger numbers of
monomials and the random ideal starts to become less complex as its minimal generators begin to
have smaller and smaller support, causing the Krull dimension to drop. Finally, the random ideal
becomes 0-dimensional and continues to evolve towards the maximal ideal.
n (zero ideal)
|
p=0
|
p = D−n
n−1
···
n−2
|
p = D−(n−1)
|
p = D−(n−2)
1
|
p = D−2
0
|
p = D−1
|
p=1
Fig 1. Evolution of the Krull dimension of S/I, where I is the random monomial ideal I ∼ I(n, D, p), as the probability
parameter p = p(D) changes.
(C) First Betti numbers and random monomial ideals The ER-type model induces a distribution on the Betti numbers of the coordinate ring of random monomial ideals. To study this
distribution, we first ask: what are the first Betti numbers generated under the model? A natural
way to ‘understand’ a distribution is to compute its expected value, i.e., the average first Betti
number. In Theorem 4.1 we establish the asymptotic behavior for the expected number of minimal
generators in a random monomial ideal.
We also establish and quantify threshold behavior of first graded Betti numbers of random monomial ideals I ∼ I(n, D, p) in two regimes, as n or D go to infinity, in Theorem 4.4. As in the Krull
dimension case, we combine the threshold results to obtain the following corollary:
Corollary 1.3. Let I ∼ I(n, D, p).
a) Let D be fixed, and d be a constant such
that 1 < d ≤ D. If the parameter p = p(n) is such that
−d
−d+1
p(n) = ω n
and p(n) = o n
then initdeg(I) = d asymptotically almost surely.
b) Let n be fixed. Suppose that di = di (D), 1 ≤ di ≤ D and limD→∞ di (D) = ∞
for i ∈ {1, 2}. If
−n
−n
the parameter p = p(D) is such that p(D) = ω d1
and p(D) = o d2
as D → ∞, then
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
5
d2 ≤ initdeg(I) ≤ d1 asymptotically almost surely. Note that this is attainable when d1 (D) =
ω (d2 (D)).
While Corollary 1.3 explains how the parameter p controls the smallest non-zero first Betti number,
it gives no information regarding the largest such number; the latter, of course, leads the complexity
of the first Betti numbers. To that end, we study the degree complexity reg0 (I), introduced by Bayer
and Mumford in [4] as the maximal degree of any reduced Gröbner basis of I; for monomial ideals,
this is simply the highest degree of a minimal generator. In Theorem 4.7 we show that p can be
specified so that, even though B contains many large degree monomials, none are minimal.
Intuitively, one can think of the above results in following terms: when the growth of p is bounded
above by that of 1/D, Corollary 1.3 provides the minimum degree of a minimal generator of I. When
the growth of p is bounded below by that of 1/D, Theorem 4.7 provides the maximum degree of a
minimal generator of I. The evolution of the minimum degree of a minimal generator for the case
when D is fixed and n tends to infinity is illustrated in Figure 2:
zero ideal
|
p = 0
|
p = n−D
D
D−1
|
p = n−(D−1)
D−2
|
p = n−(D−2)
|
p = n−(D−3)
···
···
d
|
p = n−d
|
p = n−(d−1)
|
p = 1
Fig 2. Evolution of the initial degree of S/I, where I is the random monomial ideal I ∼ I(n, D, p), as the model
parameter p = p(n) changes, for fixed D. The initial degree, that is, the smallest integer k such that β1,j = 0 for j < k
and β1,k 6= 0, is the value displayed in each box.
(D) Other probabilistic models for generating monomial ideals In Section 5 we define
more general models for random monomial ideals. This is useful to study distributions on ideals that
place varying probabilities on monomials depending on a property of interest. For example, one may
wish to change the likelihood of monomials according to their total degree. To that end, we define
a general multiparameter model for random monomials, show how the ER-type model is a special
case of it, and introduce the graded model. In Theorem 5.2 we show there is a choice of probability
parameters in the general model for random monomial ideals that recovers, as a special case, the
multiparameter model for random simplicial complexes of [11], which itself generalizes various models
for random graphs and clique complexes presented in [27, 31].
(E) Experiments & conjectures Section 6 contains a summary of computer simulations of
additional algebraic properties of random monomial ideals using the ER-type model. For each triple
of selected values of model parameters p, n, and D, we generate 1000 monomial ideals I ∼ I(n, D, p)
and compute their various properties. Our simulation results are summarized in Figures 3, 4, 5, 6,
7, and 8. The experiments suggest several trends and conjectures, which we state explicitly.
2. Hilbert functions and the Erdős-Rényi distribution on monomial ideals
The Hilbert function, and the Hilbert polynomial that it determines, are important tools in the classification of ideals via the Hilbert scheme [17]. Of course, monomial ideals are key to this enterprise:
given an arbitrary homogeneous ideal I and a monomial order on k[x1 , . . . , xn ], the monomial ideal
generated by the leading terms of the polynomials in I has the same Hilbert function as I. Therefore the study of all Hilbert functions reduces to the study of Hilbert functions of monomial ideals.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
6
Moreover, the Hilbert function hI (·) of a monomial ideal I ⊆ S has a useful combinatorial meaning:
the value of hI (d), d ≤ D, counts the number of standard monomials - monomials of degree exactly
d that are not contained in I.
In this section we explore the Erdős-Rényi distribution of monomial ideals and the induced distribution on Hilbert functions. It turns out they are intimately related.
2.1. Distribution of monomial ideals
Our first theorem precisely describes the distribution I(n, D, p) on ideals specified by the ER-type
model. Recall that Theorem 1.1 states that the Hilbert function and first total Betti number determine the probability of any given ideal in n variables generated in degree at most D.
Proof of Theorem 1.1. Fix I ⊆ S generated in degree at most D and let M be the unique minimal set
of generators of I. Then, I = I if and only if B ⊇ M and no monomial xα such that xα 6∈ I is in B. Let
A1 denote the event that each of the β1 (S/I) elements of M is in B and let A2 denote the event that
no monomial xα such that xα 6∈ I is in B. Then, the event I = I is equivalent to the event A1 ∩ A2 .
Since the events A1 and A2 are independent, P (I = I) = P (A1 ∩ A2 ) = P (A1 )P (A2 ). Observe that
P (A1 ) = pβ1 (S/I) , since each of the β1P
(S/I) elements of M is chosen to be in B independently with
PD
D
−1+
d=1 hI (d) , since there are exactly −1 +
probability p and P (A2 ) = (1 − p)
d=1 hI (d) monomials
of degree at most D not contained in I and each of them is excluded from B independently with
probability 1 − p.
Consider a special case of this theorem in the following example.
Example 2.1 (Principal random monomial ideals in 2 variables). Fix n = 2 and D > 0. In this
example, we calculate the probability of observing the principal random monomial ideal (B) =
0
0
(xα y γ ) ⊆ k[x, y], α + γ ≤ D. We observe the ideal (xα y γ ) exactly when xα y γ ∈ B and xα y γ 6∈ B
0
0
for every monomial xα y γ with α0 < α ≤ D or γ 0 < γ ≤ D. Thus, we must count the lattice points
below the “staircase” whose only corner is at (α, γ) ∈ Z2≥0 . A simple counting argument shows that
there are exactly γ2 (2D − γ + 3) + α2 (2D − α + 3) − αγ − 1 lattice points. Hence,
γ
α
P (I = (xα y γ )) = p(1 − p) 2 (2D−γ+3)+ 2 (2D−α+3)−αγ−1 .
Note that the right hand side of this expression is maximized at α = 1, γ = 0 or α = 0, γ = 1, so that
among the principal ideals, the most likely to appear under the ER-type model are (x) and (y).
A corollary of Theorem 1.1 follows directly from the well-known formulas for Stanley-Reisner rings:
Corollary 2.2. If I is a square-free monomial ideal, then the probability of I under the ER-type model
is determined by the number of minimal non-faces and faces of the associated simplicial complex.
2.2. Distribution of Hilbert functions
Since the Erdős-Rényi-type model specifies a distribution on monomial ideals, it provides a formal
probabilistic procedure to generate random Hilbert functions, in turn providing a very natural question: what is the induced probability of observing a particular Hilbert function? In other words, what
is the most likely Hilbert function under the ER-type model? If we randomly generate a monomial
ideal, are all Hilbert functions equally likely?
Not all possible non-negative vectors are first graded Betti vectors, but Lemma 2.3 below gives an
algorithmic way to determine, using polyhedral geometry, whether a particular potential set of first
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
7
graded Betti numbers can occur for a monomial ideal in n variables. We note that Onn and Sturmfels
introduced other polytopes useful in the study of initial (monomial) ideals of a zero-dimensional ideal
for n generic points in affine d-dimensional space: the staircase polytope and the simpler corner cut
polyhedron [34].
Lemma 2.3. Denote by N M on(n, D, h) the number of possible monomial ideals in n variables, with
generating monomials of degree no more than D and given Hilbert function h. Then N M on(n, D, h)
is equal to the number of vertices of the 0 − 1 convex polytope Q(n, D, h) defined by
X
|α|=L
xα =
n+L−1
− h(L), ∀L = 1, . . . D
L
xα ≤ xγ ,
∀ α ≤ γ, |α| + 1 = |γ|,
where α, γ denote exponent vectors of monomials with n variables and total degree no more than
D, thus the system has n+D
− 1 variables.
D
Proof of Lemma 2.3. The variables xα are indicator variables recording when a monomial xα , for
0 < |α| ≤ D, is chosen to be in the ideal (xα = 1) or is not chosen to be in the ideal (xα = 0).
The first type of equation forces the values of the Hilbert function at degree L to be satisfied. The
inequalities xα ≤ xγ , for all α ≤ γ, ensure the set of chosen monomials is closed under divisibility
and thus forms an ideal. A non-redundant subset of these satisfying |α| + 1 = |γ| suffices to cut out
the polyhedron.
Theorem 2.4. Let h be a Hilbert function for an ideal of the polynomial ring in n variables. As
before, Q(n, D, h) is the polytope whose vertices are in one-to-one correspondence with the distinct
monomial ideals in n variables, with generators of degree less than or equal to D, and Hilbert function
h. Then the probability of generating a random monomial ideal I from the ER-type model with Hilbert
function h is expressed by the following formula
PD
P (hI = h) = (1 − p)−1+
d=1
h(d)
X
pβ1 (v) ,
(2.1)
v∈V (Q(n,D,h))
where β1 (v) is the total first Betti number of the monomial ideal associated to the vertex v.
Proof of Theorem 2.4. To derive the above formula for the probability of randomly generating a
monomial ideal with a particular Hilbert function h using the ER model, we decompose the random
event into probability events that are combinatorially easy to count. The probability of generating
random monomial ideals with a given Hilbert function h is the sum of the probabilities of disjoint
events enumerated by the vertices v in the polytope Q(n, D, h) (see Lemma 2.3). For each choice
of v, the probability of the corresponding ideal being randomly generated by our model is given in
Theorem 1.1 and is completely determined by its Hilbert
function and first total Betti number. These
PD
ideals share a Hilbert function, h, and so (1 − p)−1+ d=1 h(d) is a common factor for all terms. The
choice of v determines the ideal and its first Betti number.
Some final remarks about Theorem 2.4. First of all, one can find examples that show that the
Hilbert function of an ideal does not uniquely determine the value of the number of minimal generators. Second, the values for the Betti numbers have explicit tight bounds from the Bigatti-HulettPardue theorem (see [6],[24], [35]). Finally, note that, from the point of view of computer science,
it is useful to know that the Hilbert function h can be specified with one polynomial (the Hilbert
polynomial) accompanied by a list of finitely many values that do not fit the polynomial.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
8
3. Krull dimension
In this section, we study the Krull dimension dim S/I of a random monomial ideal under the model
I(n, D, p). First, in Section 3.2, we give an explicit formula to calculate the probability of I having
a given Krull dimension. Second, in Section 3.3, we establish threshold results characterizing the
asymptotic behavior of the Krull dimension and we provides ranges of values of p that, asymptotically,
control the Krull dimension of the random monomial ideal.
3.1. Hypergraph Transversals and Krull dimension
Let us recall some necessary definitions. A hypergraph H is a pair H = (V, E) such that V is a finite
vertex set and E is a collection of non-empty subsets of V , called edges; we allow edges of size one.
A clutter is a hypergraph where no edge is contained in any other (see, e.g., [10, Chapter 1]). A
transversal of H, also called a hitting set or a vertex cover, is a set T ⊆ V such that no edge in E
has a nonempty intersection with T . The transversal number of H, also known as its vertex cover
number and denoted c(H), is the minimum cardinality of any transversal of H.
Given a collection B of monomials in k[x1 , . . . , xn ], the support hypergraph of B is the hypergraph
G(B) with vertex set V = {x1 , . . . , xn }, and edge set E = {supp(xα ) | xα ∈ B}, where supp(xα )
denotes the support of the monomial xα , i.e., xi ∈ supp(xα ), if and only if xi | xα . What we require
here is that for I = (B), the Krull dimension of S/I is determined by the transversal number of
G(B) through the formula
dim S/I + c (G(B)) = n.
(3.1)
This formula is known to hold for square-free monomial ideals minimally generated by B (see e.g.,
[20]). Since the support hypergraph of B is equal to that of its maximal square-free subset and
c (G(B)) is invariant under the choice of generating set B of I, the equation, obviously, also holds
for general ideals.
3.2. Probability distribution of Krull dimension
The relationship between Krull dimension and hypergraph transversals leads to a complete characterization of the probability of producing a monomial ideal with a particular fixed Krull dimension in the
ER-type model (Theorem 3.1). Explicitly computing the values given by Theorem 3.1 requires an exhaustive combinatorial enumeration, which we demonstrate for several special cases in Theorem 3.2.
Nevertheless, where the size of the problem makes enumeration prohibitive, Theorem 3.1 gives that
P (dim S/I = t) is always a polynomial in p of a specific degree, and thus can be approximated by
numerically evaluating P (dim S/I = t) for a sufficient number of p values, and interpolating.
Theorem 3.1. Let I ∼ I(n, D, p). For any integer P
t, 0 ≤ t ≤ n,
the probability that S/I has Krull
t+1 D n
dimension t is given by a polynomial in p of degree i=1 i i . More precisely,
P (dim S/I = t) =
X
Y
C∈Cn−t σ∈E(C)
D
1 − (1 − p)(|σ|)
Y
D
(1 − p)(|σ0 |) ,
σ 0 ⊂{x1 ,...,xn }
σ6⊆σ 0 ∀σ∈E(C)
where Cn−t is the set of all clutters on {x1 , . . . , xn } with transversal number n − t.
Proof. Let B be the random generating set that gave rise to I. By Equation (3.1), the probability
that S/I has Krull dimension t is equal to the probability that c(G(B)) = n − t. Let Gmin (B) be
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
9
the hypergraph obtained from G(B) by deleting all edges of G(B) that are strict supersets of other
edges in G(B): in other words, Gmin (B) contains all edges σ of G(B) for which there is no σ 0 in
G(B) such that σ 0 ( σ.
Also let Cn−t denote the set of clutters on {x1 , . . . , xn } with transversal number n − t. Then
c(G(B)) = n − t if and only if Gmin (B) = C for some C ∈ Cn−t . As these are disjoint events, we have
X
P (dim S/I = t) =
P (Gmin (B) = C) .
(3.2)
C∈Cn−t
Let σ ⊂ {x1 , . . . , xn }. There are
D
|σ|
monomials supported on σ, so
D
D
P (σ ∈ E(G(B))) = 1 − (1 − p)(|σ|) , and P (σ 6∈ E(G(B))) = (1 − p)(|σ|) .
D
Note that both expressions are polynomials in p of degree exactly |σ|
. Now Gmin (B) = C if only if:
1. every edge σ of C is an edge of G(B), and
2. every σ 0 ⊂ {x1 , . . . , xn } such that σ 0 does not contain any σ ∈ E(C) is not an edge of G(B).
Note that condition 2 is the contrapositive of: any edge of G(B) which is not an edge of C is not
minimal. Since edges are included in G(B) independently, the above are also independent events and
the probability of their intersection is
Y
Y
P (Gmin (B) = C) =
P (σ ∈ E(G(B)))
P σ 0 6∈ E(G(B))
σ∈E(C)
=
Y
σ∈E(C)
s.t. |σ|≤t+1
σ 0 ⊂{x1 ,...,xn }
σ6⊆σ 0 ∀σ∈E(C)
P (σ ∈ E(G(B)))
Y
σ 0 ⊂{x
1 ,...,xn }
s.t. |σ 0 |≤t and
0
σ6⊆σ ∀σ∈E(C)
P σ 0 6∈ E(G(B)) .
(3.3)
The last equality follows because for C ∈ Cn−t , if σ is an edge of C then |σ| ≤ t + 1, and also if σ 0 is
a subset of {x1 , . . . , xn } satisfying σ 6⊆ σ 0 for all σ ∈ E(C), then |σ 0 | ≤ t. To show the first statement,
suppose σ ∈ E(C) with |σ| > t + 1. Since C is a clutter, no proper subset of σ is an edge of C, so for
every σ 0 ∈ E(C), σ 0 6= σ, σ 0 contains at least one vertex not in σ. Hence the set T = {x1 , . . . , xn }\σ
intersects every edge of C except σ. By taking the union of T with any one vertex in σ, we create a
transversal of C of cardinality |T | + 1 = n − |σ| + 1 < n − t, contradicting c(C) = n − t.
For the second statement, suppose |σ 0 | > t. By assumption no edge of C is a subset of σ 0 , so every
edge of C contains at least one vertex in the set T = {x1 , . . . , xn }\σ 0 . Hence T is a transversal of C
with |T | = n − |σ 0 | < n − t, again a contradiction.
No subset of {x1 , . . . , xn } can appear in both
index sets of (3.3), and each subset that does appear
contributes a polynomial in p of degree Di . It follows that (3.3) is a polynomial in p of degree no
P
D n
greater than t+1
i=1 i
i , and hence so is P (dim S/I = t) as (3.2) is a sum of such polynomials.
To prove this bound is in fact the precise
of the polynomial, we show there is a particular
Pdegree
D n
clutter for which (3.2) has degree exactly t+1
i=1 i
i , and furthermore, that for every other clutter the expression in (3.3) is of strictly lower degree. Hence the sum over clutters in (3.2) has no
cancellation of this leading term.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
10
n
edges of cardinality t + 1 and no other edges.
Consider the hypergraph Knt+1 that contains all t+1
t+1
Then Kn ∈ Cn−t and
Y
Y
P Gmin (B) = Knt+1 =
P (σ ∈ E(G(B)))
P (σ 6∈ E(G(B)))
σ∈{x1 ,...,xn }
|σ|=t+1
σ∈{x1 ,...,xn }
|σ|≤t
D
n
D n
D n
= (1 − (1 − p)(t+1) )(t+1) (1 − p)Dn+( 2 )( 2 )+···+( t )( t )
which has the correct degree. On the other hand, if C ∈ Cn−t and C 6= Knt+1 , then at least one edge
σ of C is not an edge of Knt+1 ; hence |σ| ≤ t. All subsets properly containing σ are neither edges
of C, nor do they satisfy condition 2 above, hence these subsets are not indexed by either product
in 3.3. In particular there are positively many subsets of cardinality t + 1 which do not contribute
factors to P (Gmin (B) = C).
To use the main formula of Theorem 3.1, one must be able to enumerate all clutters on n vertices
with transversal number n − t. When t is very small or very close to n this is tractable, as we see in
the following theorem.
Theorem 3.2. Let I ∼ I(n, D, p). Then,
n
a) P (dim S/I = 0) = 1 − (1 − p)D .
(n−j )
D
P
2
n
D )j (1 − p)D(n−j) 1 − (1 − p)( 2 )
.
(1
−
(1
−
p)
b) P (dim S/I = 1) = n−1
j=0 j
n+D
n+D−j
n+D
P
c) P (dim S/I = n − 1) = −(1 − p)( n )−1 + nj=1 (−1)j−1 nj (1 − p)( n )−1−( n ) .
n+D
d) P (dim S/I = n) = (1 − p)( n )−1 .
For n ≤ 4, the listed formulas gives the complete probability distribution of Krull dimension induced
by I(n, D, p), for any integer D.
Proof. Proof of Part (a) For B ∼ B(n, D, p), I = (B), S/I is zero dimensional if and only if
Gmin (B) ∈ Cn . There is a single clutter on n vertices with transversal number n: the one with edge
set {{x1 }, {x2 }, . . . , {xn }}. Hence by Theorem 3.1,
P (dim S/I = 0) =
n
Y
i=1
1 − (1 − p)
(|{xDi }|)
= 1 − (1 − p)D
n
.
Proof of Part (b): S/I is one-dimensional if and only if Gmin (B) ∈ Cn−1 . We wish to describe Cn−1 .
Suppose C is a clutter on n vertices and exactly j of the vertices are contained in a 1-edge. Then
j 6= n else C would be the clutter from part a, so let 0 ≤ j ≤ n − 1, and denote by V the set of
these j vertices. Then V is a subset of any transversal of C. Let W = {x1 , . . . , xn }\V , then it can
be shown that c(C) = n − 1 if and only E(C) = {{xi } | xi ∈ V } ∪ {{xi , xk } | xi , xk ∈ W, xi 6= xk }.
Hence P (Gmin (B) = C) equals
Y
Y
Y
P ({xi } ∈ E(G(B)))
P ({xi , xk } ∈ E(G(B)))
P ({xi } 6∈ E(G(B)))
xi ∈V
xi ,xk ∈W
xi ∈W
(n−j )
D
2
= (1 − (1 − p)D )j 1 − (1 − p)( 2 )
(1 − p)D(n−j) .
The expression for P (dim S/I = 1) is obtained by summing over all
1-edges, for each 0 ≤ j ≤ n − 1.
n
j
ways of selecting the j
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
11
Proof of Part (c): For the case of (n − 1)–dimensionality, Theorem 3.1 requires us to consider clutters
with transversal number 1: clutters where some vertex appears in all the edges. However, for this
case we can give a simpler argument by looking at the monomials in B directly. Now the condition
equivalent to (n − 1)–dimensionality
is that there
is some xi that divides every monomial in B.
n+D−1
n+D
Fix an i, then there are D − 1 − D−1 monomials that xi does not divide. If Fi is the event
n+D
n+D−1
that x divides every monomial in B, then P (F ) = (1 − p)( D )−1−( D−1 ) . To get an expression for
i
i
(n − 1)-dimensionality, we need to take the union over all Fi , which we can do using an inclusionexclusion formula considering the events that two variables divide every monomial, three variables
divide every monomial, etc. Finally, we subtract the probability that B is empty.
Proof of Part (d): Since only the zero ideal has Krull dimension n, this occurs if and only if B is
n+D
empty, which has probability (1 − p)( D )−1 .
3.3. Threshold and asymptotic results
Next we study the asymptotic behavior of dim(S/I). In particular, we derive ranges of values of p
that control the Krull dimension as illustrated in Figure 1. As a special case we obtain a threshold
result for the random monomial ideal being zero-dimensional.
Lemma 3.3. Let n, t be fixed integers, with 0 ≤ t ≤ n − 1. If B ∼ B(n, D, p) and p(D) = o D−t ,
then a.a.s. B will contain no monomials of support size t or less as D tends to infinity.
Proof. By the first moment method, the probability that B contains some monomial of support at
most t is bounded above by the expected number of such monomials.
As
the number of monomials in
n D+t
n variables with support of size at most t is strictly less than t
is bounded
t , the expectation
−t and n and t are
above by the quantity p nt D+t
.
This
quantity
tends
to
zero
when
p(D)
=
o
D
t
constants, thus establishing the lemma.
Theorem 3.4. Let n, t be integers and p = p(D) with 1 ≤ t ≤ n and 0 ≤ p ≤ 1. Suppose
that B ∼ B(n, D, p) and I ∼ I(n, D, p). Then D−t is a threshold function for the property that
dim(S/I) ≤ t − 1. In other words,
(
0, if p = o D−t
.
lim P (dim(S/I) ≤ t − 1) =
D→∞
1, if p = ω D−t
Proof. Let p = o D−t . Consider the support hypergraph of B, G(B). If every monomial in B
has support of size t + 1 or more, then any (n − t)-vertex set of G(B) is a transversal, giving
c(G(B)) ≤ n−t. Thus Equation 3.1 and Lemma 3.3 give that dim(S/I) ≤ t−1 holds with probability
tending to 0.
Now, let p = ω D−t . Consider σ ⊂ {x1 , . . . , xn } with |σ| = t and let Xσ be the random variable
that records the number of monomials in B with support exactly the set σ. There are exactly Dt
such monomials of degree at most D: each monomial can be divided by all variables in σ and the
remainder is a monomial
in (some or all of) the variables of σ of degree
no greater than D − t.
D
−t
Thus, E [Xσ ] = t p tends to infinity with D, when p = ω D . Further, Var [Xσ ] ≤ E [Xσ ], as
Xσ is a sum of independent indicator random variables, one for each monomial with support exactly
σ. Hence we can apply the second moment method to conclude that as D tends to infinity,
P (Xσ = 0) ≤
Var [Xσ ]
≤
E [Xσ ]2
1
→ 0.
p
D
t
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
12
In other words, a.a.s. B will contain a monomial with support σ. Since σ was an arbitrary t-subset
of the variables {x1 , . . . , xn }, it follows that the same holds for every choice of σ.
The probability that any of the events Xσ = 0 occurs is bounded above by the sum of their
probabilities and tends to zero, as there are a finite number of sets σ. Then, with probability tending
to 1, G(B) contains all size-t edges, which implies that, for every vertex set of size n − t or less, G(B)
contains an edge of size t that is disjoint from it. Thus the transversal number of the hypergraph is
at least n − t + 1, and, by Formula 3.1, dim(S/I) = n − c(G(B)) ≤ t − 1 a.a.s.
The smallest choice of t-values in Theorem 3.4, t = 1, gives a threshold function for the event that
I ∼ I(n, D, p) has zero Krull dimension:
Corollary 3.5. Let I ∼ I(n, D, p), n be fixed and p = p(D). Then the function 1/D is a threshold
function for the 0-dimensionality of S/I.
Now we move to obtain Corollary 1.2 announced in the Introduction. Theorem
3.4 establishes
a
threshold result for each choice of constant t. But, if both p = ω D−(t+1) and p = o D−t hold,
then the theorem gives that events dim(S/I) > t and dim(S/I) < t each hold with probability
tending to 0. Therefore the probability of their union, in other words the probability that dim(S/I)
is either strictly larger than t or strictly smaller than t, also tends to 0. By combining the threshold
results applied to two consecutive constants t and t+1 in this way, we have established the Corollary.
4. Minimal generators of random monomial ideals from the ER-type model
A way to measure the complexity of a monomial ideal is to study the number of minimal generators.
As before, we will denote by β1 := β1 (S/I) the first total Betti number of the quotient ring of the
ideal I, that is, the total number of minimal generators of I. Subsection 4.1 addresses this invariant
and provides a formula for the asymptotic average value of β1 . A more refined invariant is, of course,
the set of first graded Betti numbers β1,d (S/I), recording the number of minimal generators of I of
degree d. Subsection 4.2 provides threshold results that explain how the asymptotic growth of the
parameter value p influences the appearance of minimal generators of given degree. Subsection 4.3
provides an analogous result for the degree complexity reg0 (I) of a monomial ideal I, that is, the
maximum degree of a minimal generator.
4.1. The first total Betti number
Consider the random variable β1 (S/I) for I ∼ I(n, D, p) in the regime D → ∞. Before stating
the results of this section, we introduce a concept from multiplicative number theory. The order r
divisor function, denoted by τr (k), is a function that records the number of ordered factorizations of
an integer k into exactly r parts (e.g., τ3 (4) = 6).
Theorem 4.1. Let I ∼ I(n, D, p) and let β1 (S/I) be the random variable denoting the number of
minimal generators of the random monomial ideal I. Then,
lim E [β1 (S/I)] = p
D→∞
∞
X
k=0
τn (k + 2)(1 − p)k .
(3)
Proof. For each α = (α1 , . . . , αn ) ∈ Zn≥0 , let 1α be the indicator random variable for the event
that xα is a minimal generator of I. Excluding the constant monomial 1 and xα itself, there are
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
13
Qn
Qn
monomials in S that divide xα . Therefore, E [1α ] = p(1 − p) i=1 (αi +1)−2 and letting
D → ∞ shows that
Qn
X
X
(1 − p) i=1 (αi +1)−2 .
E [1α ] = p
lim E [β1 (S/I)] =
i=1 (αi + 1) − 2
D→∞
06=α∈Zn
≥0
06=α∈Zn
≥0
Q
Q
Since ni=1 (αi + 1) − 2 is also the number of lattice points contained in the box ni=1 [0, αi ], excluding
the origin and α, it follows that every integer k ≥ 0 appears as an exponent of q in the infinite sum
above exactly as many times as k +P
2 can be factored into a product of n ordered factors, so that
k
the above sum may be rewritten as ∞
k=0 τn (k + 2)(1 − p) .
When n = 2, τ2 (k) is simply the usual divisor function which counts the number of divisors of
an integer k. The ordinary generating function of τ2 (k) has the form of a Lambert series (see [14]),
which leads to the following result in the two-variable case.
Corollary 4.2. Let I ∼ I(2, D, p). Then,
"∞
#
X (1 − p)k
p
p
lim E [β1 (S/I)] =
−
.
2
k
D→∞
(1 − p)
1−p
1 − (1 − p)
k=1
Proof. This follows from the Lambert series identity
(1−p)k
k=1 1−(1−p)k
P∞
=
P∞
k=1 τ2 (k)(1 − p)
k
in (3).
Corollary 4.2 provides an expression for the asymptotic expected number of minimal generators
of a random monomial ideal in two variables that can be easily evaluated for any fixed value of p.
For example, if I ∼ I(2, D, 10−5 ), then asymptotically (i.e., for very large values of D) one expects
I to have about 12 generators on average. On the other hand, when n ≥ 3, the right-hand side of
(3) is difficult to compute exactly, but one can obtain bounds from the fact that n ≤ τn (k) ≤ k n ,
which are valid for every k ≥ 2. Hence
n ≤ lim E [β1 (S/I)] ≤
D→∞
p
Li−n (1 − p),
(1 − p)2
(4)
P
xk
where Lis (x) denotes the polylogarithm function of order s defined by Lis (x) = ∞
k=1 ks . A polylogarithm of negative integer order can be expressed as a rational function of its argument:
n
X
1 − p j+1
Li−n (1 − p) =
j!S(n + 1, j + 1)
,
p
j=0
where S(n + 1, k + 1) denotes a Stirling number of the second kind (see [30]). The upper bound in
(4) is thus of order O (p−n ) .
4.2. The first graded Betti numbers
Here we study the behavior of the random variables β1,k (S/I) for I ∼ I(n, D, p). Specifically, we
show how the choice of p in the ER-type model controls the minimum degree of a generator of I, by
controlling the degrees of the monomials in the random set B.
Lemma 4.3. Let B ∼ B(n, D, p), I = hBi and Bd := {xα ∈ B : |α| ≤ d}.
a) If d, D is fixed, 0 < d ≤ D and p = p(n), then f (n) = n−d is a threshold function for the property
that |Bd | = 0.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
14
b) If n is fixed, d = d(D) ≤ D is such that limD→∞ d(D) → ∞ and p = p(D), then f (d) = d−n is a
threshold function for the property that |Bd | = 0.
Proof. For part a), we must show
that when p(n) = o n−d , then |Bd | = 0 with probability tending
to 1, and when p(n) = ω n−D , then |Bd | > 0 with probability tending to 1.
For d fixed, the number of monomials of degree at most d in n variables is n+d
nd (by
d
considering the usual asymptotic bounds for binomial coefficients). For any α ∈ Zn≥0 , with
P0 <
α ∈ B, so that |B | =
||α||1 ≤ d, let 1α be the indicator random variable for
the
event
that
x
d
α 1α ,
P
n+d
and therefore E [|Bd |] = α E [1α ] = p ·
− 1 . By the first moment method:
d
P (|Bd | > 0) ≤ E [|Bd |] = p ·
n+d
− 1 ≤ ped nd .
d
If p(n) = o n−d , then ped nd →
0 as n → ∞ and hence limn→∞ P (|Bd | > 0) = 0.
Now suppose p(n) = ω n−d . In this case E [|Bd |] → ∞, since:
E [|Bd |] = p ·
d
n+d
2
· pnd .
−1 ≥
d
d
The variance of |Bd | is calculated as follows:
Var [|Bd |] =
X
α
Var [1α ] +
n+d
Cov [1α , 1α0 ] =
− 1 · p · (1 − p) = E [|Bd |] · (1 − p),
d
0
X
α6=α
where we have again used that Var [1α ] = E 12α − E [1α ]2 = p − p2 and for α 6= α0 , 1α and 1α0
are independent and thus have 0 covariance. Then by the second moment method and the fact that
E [|Bd |] → ∞ when p = ω n−d :
Var [|Bd |]
1−p
1
=
≤
→ 0 as n → ∞.
2
(E [|Bd |])
E [|Bd |]
E [|Bd |]
Part b) follows in a similar fashion, once one notices that, for fixed n, n+d
=
d
tends to infinity.
P (|Bd | = 0) ≤
n+d
n
dn as d
From Lemma 4.3 we immediately obtain a threshold result for the first graded Betti numbers:
Theorem 4.4. Let B ∼ B(n, D, p) and I = (B).
a) If d ≤ D is fixed and p = p(n), then the function f (n) = n−d is a threshold function for the
property that initdeg(I) > d.
b) If n is fixed, d = d(D) ≤ D is such that limD→∞ d(D) = ∞ and p = p(D), then f (d) = d−n is a
threshold function for the property that initdeg(I) > d.
P
Proof. By definition, initdeg(I) > d if and only if dk=1 β1,k (S/I) = 0. Equivalently, initdeg(I) > d
if and only if B 6= ∅ and B contains no monomials of degree k for each 1 ≤ k ≤ d and therefore
!
d
X
P
β1,k (S/I) = 0 = P (|Bd | = 0) .
k=1
Both a) and b) now follow directly from Lemma 4.3.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
15
The case d = D of Theorem 4.4 deserves special mention, as it provides a threshold function for
the property that the random ideal generated by the ER-type model is the zero ideal.
Corollary 4.5. Let B ∼ B(n, D, p) and I = hBi.
a) Let D be fixed and p = p(n). Then n−D is a threshold function for the property that I = (0) .
b) Let n be fixed and p = p(D). Then D−n is a threshold function for the property that I = (0) .
On the other hand, in the critical region of this threshold function, both the expected number of
monomials in B and the variance of the number of monomials in B is constant.
Proposition 4.6. Let B ∼ B(n, D, p).
−
1
then E [|B|] = 1 and Var [|B|] = 1.
a) For any n, D, if p = 1/ n+D
D
b) For D fixed, if p = p(n) n−D then k1 ≤ limn→∞ E [|B|] ≤ k2 and c1 ≤ limn→∞ Var [|B|] ≤ c2 ,
for some constants k1 , k2 , c1 , c2 .
c) For n fixed, if p = p(D) D−n then k1 ≤ limD→∞ E [|B|] ≤ k2 and c1 ≤ limD→∞ Var [|B|] ≤ c2 ,
for some constants k1 , k2 , c1 , c2 .
Proof. Since B = BD , each of these claims follows directly from the calculated values of E [|BD |]
and Var [|BD |] from the proof of Lemma 4.3.
By combining threshold functions from Theorem 4.4 we can obtain Corollary 1.3 announced in the
Introduction: the result specifies ranges of p for which initdeg(I) = d asymptotically almost surely.
The argument is identical to the one used in Section 3.3 to obtain Corollary 1.2 from Theorem 3.4.
4.3. Degree complexity
In the previous subsection, we saw how the choice of p influences the smallest degree of a minimal
generator of a random monomial ideal. In this subsection, we ask the complementary question:
what can one say about the largest degree of a minimal generator of a random monomial ideal? The
following theorem establishes an asymptotic bound for the degree complexity reg0 (I) of I ∼ I(n, D, p)
for certain choices of probability parameter p.
Theorem 4.7. Let n be fixed, I ∼ I(n, D, p), p = p(D) and let r = r(D) be a function tending to
infinity as D → ∞. If p = ω 1r , then reg0 (I) ≤ nr a.a.s.
Proof. By the proof of Theorem 3.5, for each variable xi , a.a.s. B will contain a monomial of the
form xji where j ≤ r. If j1 , . . . , jn are integers such that 1 ≤ ji ≤ r for each 1 ≤ i ≤ n, then the ideal
(xj11 , . . . , xjnn ) contains all monomials of degree ≥ rn in S, since if deg(xα ) ≥ r, by the pigeonhole
principle at least one αi ≥ b nr c. Hence, with probability tending to 1, I will contain every monomial
in S of degree nr and thus every minimal generator has degree at most nr.
To illustrate this result, suppose that p = ω (1/log D) and let I ∼ I(n, D, p). Then, by Theorem 4.7, as D tends to infinity, one should expect reg0 (I) to be at most n log D. One should keep
in mind that I never contains generators of degree larger than D, and so the bound given in this
theorem is not optimal for certain choices of r.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
16
5. Other probabilistic models
As mentioned in the Introduction, the study of ‘typical’ ideals from a family of interest may require
not only the ER-type model, but also more general models of random monomial ideals. To that end,
we define the most general probabilistic model on sets of monomials which, a priori, provides no
structure, but it does provide a framework within which other models can be recovered.
A general model. Fix a degree bound D > 0. To each monomial xα ∈ k[x1 , . . . , xn ] with 0 <
deg(xα ) ≤ D, the general model for random monomials assigns an arbitrary probability 0 ≤ pα ≤ 1
of selecting the monomial xα :
P (xα ) = pα .
(5.1)
Hence the general model has many parameters, namely {pα : α ∈ Nn \ {0}, |α| ≤ D}. It is clear that
that, for a fixed n and fixed degree bound D, the ER-type model is a special case of the general
model, where pα = p(n, D), for all α ∈ Nn such that 0 < |α| ≤ D, does not depend on α.
Of course, there are many other interesting models one can consider. We define another natural
extension of ER-type model.
The graded model. Fix a degree bound D > 0. The graded model for random monomials places
the following probability on each monomial xα ∈ k[x1 , . . . , xn ] with 0 < deg(xα ) ≤ D:
pα = f (n, D, |α|),
(5.2)
where 0 ≤ pα ≤ 1. Note that, given deg(xα ) = |α|, the probability of each monomial is otherwise
constant in α. The graded model is a D-parameter family of probability distributions on random sets
of monomials that induces a distribution on monomial ideals in the same natural way as the ER-type
model. Namely, the probability model selects random monomials and they are added to a generating
set with probability according to the model, thus producing a random monomial ideal in k[x1 , . . . , xn ]
whose generators are of degree at most D. More precisely, let p(n, D) = (p1 (n, D), . . . , pD (n, D)) be
such that 0 ≤ pi (n, D) < 1 for all 1 ≤ i ≤ D. Initialize B = ∅ and for each monomial xα of degree i,
1 ≤ i ≤ D, add xα to B with probability pi (n, D). The resulting random monomial ideal is I = (B)
(again with the convention that if B = ∅, then we set I = (0)). Denote by G(n, D, p) the resulting
induced distribution on monomial ideals. As before, since ideals are now random variables, we will
write I ∼ G(n, D, p) for a random monomial ideal generated using the graded model.
The analogue of Theorem 1.1 for G(n, D, p), which has an almost identical proof, is as follows:
Theorem 5.1. Fix n, D, and the graded model parameters p(n, D) = (p1 , . . . , pD ). For any fixed
monomial ideal I ⊆ S, random monomial ideals from the graded model distribution I ∼ G(n, D, p)
satisfy the following:
D
Y
β (S/I)
P (I = I) =
pd 1,d
(1 − pd )hI (d) ,
d=1
where β1,d (S/I) is the number of degree-d minimal generators of I (that is, the first graded Betti
number of S/I), and hI (d) is its Hilbert function.
5.1. Random monomial ideals generalize random simplicial complexes
An abstract simplicial complex on the vertex set [n] is a collection of subsets (called faces) of [n] closed
under the operation of taking subsets. The dimension dim(σ) of a face σ ⊆ [n] is |σ| − 1. If Y is an
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
17
abstract simplicial complex on [n], then the dimension dim(Y ) of Y is max{dim(σ) : σ is a face of Y }
and the Stanley-Reisner ideal IY in the polynomial ring k[x1 , . . . , xn ] is the square-free monomial
ideal generated by the monomials corresponding to the non-faces τ of Y : IY := hτ : τ ⊆ [n], τ 6∈ Y i.
For example, if n = 2 and Y = {∅, {1}, {2}}, then IY = hx1 x2 i ⊂ k[x1 , x2 ]. A fundamental result in
combinatorial commutative algebra is that the Stanley-Reisner correspondence constitutes a bijection
between abstract simplicial complexes on [n] and the square-free monomial ideals in k[x1 , . . . , xn ].
See, for example, [33, Theorem 1.7].
In [11], Costa and Farber introduced a model for generating abstract simplicial complexes at
(r)
random. Their model, which we call the Costa-Farber model, is a probability distribution on ∆n ,
the set of all abstract simplicial complexes on [n] of dimension at most r. In it, one selects a vector
p̃ = (p̃0 , . . . , p̃r , 0, . . . , 0) of probabilities such that 0 ≤ p̃l ≤ 1 for all 0 ≤ l ≤ r. Then, one retains
each of the n vertices with probability p̃0 , and for each pair ij of remaining vertices, one forms the
edge ij with probability p̃1 , and for each triple of vertices ijk that are pairwise joined by an edge,
one forms the 2 dimensional face ijk with probability p̃2 , and so on.
One can study the combinatorial and topological properties of the random simplicial complexes
generated by the Costa-Farber model. In view of the Stanley-Reisner correspondence, this model can
be seen as a model for generating random square-free monomial ideals. Thus, the general model for
generating random monomial ideals can be viewed as a generalization of the Costa-Farber model,
which in turn has been proved to generalize many other models of random combinatorial objects, for
example, the Erdős-Rényi model for random graphs and Kahle’s model for random clique complexes
[27]. See [11, Section 2.3] for details.
The relationship between our models for random monomial ideals and the Costa-Farber model can
be made precise in the following way: there exists a choice of parameters pα in (5.1) such that the
resulting distribution on square-free monomial ideals in S = k[x1 , . . . , xn ] is precisely the distribution
on the abstract simplicial complexes on [n] under the Costa-Farber model.
Theorem 5.2. Let p̃ = (p̃0 , p̃1 , . . . , p̃r , 0, . . . , 0) denote the n-vector of probabilities in the Costa(r)
Farber model for random simplicial complexes. Let Y ⊂ ∆n be a simplicial complex on [n] of
dimension at most r and let IY be the Stanley-Reisner ideal corresponding to Y . Fix D = r + 1 and
specify the following probabilities pα , where α ∈ Nn and 0 < ||α||1 ≤ r + 1, for the general monomial
model (5.1):
(
1 − p̃deg(xα )−1 , if 0 6= α ∈ {0, 1}n ,
pα =
(5.3)
0,
otherwise .
Then, PCF (Y ) = P (IY ), where the former is probability under the Costa-Farber model and the latter
under the distribution on random monomial ideals induced by the general model (5.1).
In other words, the specification of probabilities in Theorem 5.2 recovers the Costa-Farber model
on random simplicial complexes as a sub-model of the model (5.1) on random monomial ideals. Note
that this specification of probabilities can be considered as an instance of the graded model with
support restricted to the vertices of the unit hypercube.
Proof. From [11, Equation (1)], the following probability holds under the Costa-Farber model:
PCF (Y ) =
r
Y
i=0
f (Y )
p̃i i
(1 − p̃i )ei (Y ) ,
where fi (Y ) denotes the number of i-dimensional faces of Y and ei (Y ) denotes the number of idimensional minimal non-faces of Y (i.e., the number of i-dimensional non-faces of Y that do not
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
18
strictly contain another non-face). The minimal non-faces of Y correspond exactly to the minimal
generators of the Stanley-Reisner ideal IY . Thus, IY has exactly ei (Y ) minimal generators of degree
i+1, that is, ei (Y ) = β1,i+1 (S/IY ). Each i-dimensional face of Y corresponds to a degree i+1 standard
square-free monomial of IY , hence we have a Hilbert function valuehIY (i + 1) = fi (Y ). Next, note
that the specification of probabilities in (5.3) depends only on the degree of each monomial, so that
0
if deg(xα ) = deg(xα ), then pα = pα0 . Hence, for each 1 ≤ j ≤ r + 1, we denote by pj the probability
assigned to the degree j monomials in (5.3), so pj = 1 − p̃j−1 . We now apply Theorem 5.1 to conclude
that
r+1
r
Y β1,j
Y
f (Y )
P (IY ) =
pj (1 − pj )hIY (j) =
(1 − p̃i )ei (Y ) p̃i i
= PCF (Y ), as desired.
j=1
i=0
Simplicial
complex Y
Ideal IY
Faces of Y
Non-faces of Y
PCF (Y )
P (IY )
Void
k[x1 , x2 ]
none
∅, x1 , x2 , x1 x2
0
0
∅
(x1 , x2 )
∅
x1 , x2 , x1 x2
(1 − p̃0 )2
p21
1
(x2 )
∅, x1
x2 , x1 x2
p̃0 (1 − p̃0 )
p1 (1 − p1 )
2
(x1 )
∅, x2
x1 , x1 x2
p̃0 (1 − p̃0 )
p1 (1 − p1 )
1
2
(x1 x2 )
∅, x1 , x2
x1 x2
p̃20 (1 − p̃1 )
(1 − p1 )(1 − p1 )p2
1
2
(0)
∅, x1 , x2 , x1 x2
none
p̃20 p̃1
(1 − p1 )(1 − p1 )(1 − p2 )
Table 1
A table illustrating the correspondence between random monomial ideals and the Costa-Farber model.
Table 5.1 illustrates Theorem 5.2 in the case n = 2 and r = 1. The Costa-Farber model generates
a random simplicial complex on {1, 2} by specifying a probability vector p̃ = (p̃0 , p̃1 ) and starting
with two vertices x1 and x2 . We retain each vertex independently with probability p̃0 . In the event
that we retain both x1 and x2 , we connect them with probability p̃1 . By Theorem 5.2, to recover this
model from Equation (5.1) we set D = 2 and p(2,0) = p(0,2) = 0, p1 = p(1,0) = p(0,1) = 1 − p̃0 , and
p2 = p(1,1) = 1 − p̃1 . The probability distribution of the set of all simplicial complexes Y on {1, 2}
and, equivalently, all square-free monomial ideals IY ⊆ k[x1 , x2 ] appear in the table.
To conclude, note that there are other models that do not sample individual monomials, but
instead sample ensembles of monomials all at the same time. Examples of these are the methods to
generate random integer partitions and Ferrers diagrams [36] and random lattice polytopes [3].
6. Experiments & conjectures
This section collects experimental work with two purposes in mind: illustrating the theorems we
proved in this paper, and also motivating further conjectures about the ER-type model. These
experiments were performed using Macaulay2 [22] and SageMath [37], including the MPFR [21] and
NumPy [2] modules. Graphics were created using SageMath.
We ran several sets of experiments using the ER-type model. All experiments considered varying
number of variables n, varying maximum degree D, and varying probability p. For each choice of
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
19
a triple (n, D, p), we generated a sample of N = 1000 monomial ideals. We then computed some
algebraic properties and tabulated the results. The figures in this section summarize the results and
support the conjectures we state.
Cohen-Macaulayness. Recall that an ideal has an (arithmetically) Cohen-Macaulay quotient
ring if its depth equals its Krull dimension. As is well-known, Cohen-Macaulayness is a very special
property from which one derives various special results; see [8] for a standard reference.
CM
CM
n=4, D=4
1
CM
n=4, D=5
1
1
CM
n=4, D=6
1
CM
n=4, D=7
1
CM
n=4, D=8
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
CM
0.1
0.15
0.2
0.25
p
CM
n=5, D=4
1
0.05
0.1
0.15
0.2
p
CM
n=5, D=5
1
1
0.05
0.1
0.15
p
CM
n=5, D=6
1
0.05
0.1
p
CM
n=5, D=7
1
0.05
0.1
p
0.2
CM
n=5, D=8
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
CM
0.05
0.1
0.15
0.2
p
0.25
n=6, D=4
1
CM
0.05
0.1
0.15
0.2
p
CM
n=6, D=5
1
1
0.05
0.1
0.15
p
CM
n=6, D=6
1
0.05
0.1
p
CM
n=6, D=7
1
0.05
0.1
p
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
CM
0.05
0.1
0.15
0.2
p
0.25
n=7, D=4
1
CM
0.05
0.1
0.15
0.2
p
CM
n=7, D=5
1
1
0.05
0.1
0.15
p
CM
n=7, D=6
1
0.05
0.1
p
CM
n=7, D=7
1
0.05
0.1
p
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
0.1
0.15
0.2
p
0.25
0.05
0.1
0.15
0.2
p
0.05
0.1
0.15
p
0.05
0.1
p
0.05
0.1
p
0.1
p
n=5, D=9
0.05
0.1
p
n=6, D=9
0.2
CM
n=7, D=8
0.05
0.2
CM
n=6, D=8
n=4, D=9
0.05
0.1
p
n=7, D=9
0.2
0.05
0.1
p
Fig 3. Frequency of random monomial ideals I ∼ I(n, D, p) for which S/I is Cohen-Macaulay for (n, D) = (4, 4)
through (n, D) = (7, 9), as the model parameter p takes values between D−n and D−1 . The sample size for each fixed
value of p is 1000.
Figure 3 shows the percent of ideals in the random samples whose quotient rings are arithmetically
Cohen-Macaulay for n = 4, . . . , 7, D = 4, . . . , 9. We see that, as n and D get larger, very few
Cohen-Macaulay ideals are generated, suggesting that Cohen-Macaulayness is a “rare” property in a
meaningful sense. We speculate that the appearances of Cohen-Macaulay ideals are largely or entirely
due to the appearance of the zero ideal and of zero-dimensional ideals, both of which are trivially
Cohen-Macaulay. For the smallest n and D values, the zero ideal appears with observable frequency
for all p values, as do zero-dimensional ideals. As p decreases toward the zero ideal threshold or
increases toward the zero-dimensional threshold, these probabilities grow, resulting in a “U” shape.
(Note that probabilities continue to increase to 1 for larger p beyond the domain of these plots.)
However, as n and D grow, the thresholds for the zero ideal and for zero-dimensionality become
pronounced, and even as p approaches either threshold the frequency of Cohen-Macaulayness stays
low. When p is so low that only the zero ideal is generated, Cohen-Macaulayness is of course observed
with probability 1, but as soon as nontrivial ideals are generated, the frequency plummets to near
zero. These experimental results suggest the following conjecture:
Conjecture 1. For large n and D, the only Cohen-Macaulay ideals generated by the ER-type model
are the trivial cases (the zero ideal or zero-dimensional ideals), with probability approaching 1. In
particular, using the threshold functions of Theorems 3.4 and 4.4, we conjecture that as n goes to
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
20
infinity, the probability
that I ∼ I(n, D, p) is Cohen-Macaulay will go to zero for p = p(D) satisfying
p(D) = o D−1 and p(D) = ω (D−n ).
Projective Dimension. Further exploring the complexity of minimal free resolutions, and how
much the ranges of Betti numbers vary, we investigate the projective dimension of S/I; i.e., the
length of the minimal free resolution of S/I.
pd
pd
n=4, D=4
5
pd
n=4, D=5
5
5
pd
n=4, D=6
5
pd
n=4, D=7
5
pd
n=4, D=8
5
4
4
4
4
4
4
3
3
3
3
3
3
2
2
2
2
2
2
1
1
1
1
1
0.05
pd
0.05
0.2
0.25
p
pd
0.1
0.15
0.2
p
0.25
n=6, D=4
7
6
5
4
3
2
1
pd
0.15
n=5, D=4
6
5
4
3
2
1
pd
0.1
0.05
0.1
0.15
0.2
p
0.25
n=7, D=4
8
7
6
5
4
3
2
1
0.05
0.1
0.15
0.2
p
0.25
0.05
0.05
0.2
p
pd
0.1
0.15
0.2
p
0.05
0.1
0.15
0.2
p
0.05
0.1
0.15
0.2
7
6
5
4
3
2
1
pd
n=7, D=5
8
7
6
5
4
3
2
1
6
5
4
3
2
1
pd
n=6, D=5
7
6
5
4
3
2
1
pd
0.15
n=5, D=5
6
5
4
3
2
1
pd
0.1
p
8
7
6
5
4
3
2
1
0.05
0.1
0.15
p
pd
n=5, D=6
0.05
0.1
0.15
p
pd
n=6, D=6
0.05
0.1
0.15
p
0.1
0.15
7
6
5
4
3
2
1
pd
n=7, D=6
0.05
6
5
4
3
2
1
p
8
7
6
5
4
3
2
1
0.05
0.1
p
pd
n=5, D=7
0.05
0.1
p
pd
n=6, D=7
0.05
0.1
p
0.1
7
6
5
4
3
2
1
pd
n=7, D=7
0.05
6
5
4
3
2
1
p
8
7
6
5
4
3
2
1
0.05
0.1
p
0.05
0.1
p
0.1
p
0.1
7
6
5
4
3
2
1
pd
n=7, D=8
0.05
6
5
4
3
2
1
pd
n=6, D=8
0.05
1
pd
n=5, D=8
p
n=4, D=9
8
7
6
5
4
3
2
1
0.05
0.1
p
n=5, D=9
0.05
0.1
p
n=6, D=9
0.05
0.1
p
n=7, D=9
0.05
0.1
p
Fig 4. Projective dimension of S/I for random monomial ideals I ∼ I(n, D, p) for (n, D) = (4, 4) through (n, D) =
(7, 9). The values of the model parameter p are 20 evenly spaced values between D−n and D−1 , and the sample size for
each value of p is 1000. For each p, circle sizes indicate the proportion of quotient rings with that projective dimension,
while the black curve indicates the mean projective dimension.
By the Hilbert syzygy theorem, the projective dimension is at most n. We see experimentally that
for large n and D, the projective dimension of S modulo any non-zero random ideal tends toward
this upper bound. (Since pd(S/I) = 0 if and only if I = (0), the projective dimension will always
concentrate at 0 below the p = D−n threshold for the zero ideal.)
Conjecture 2. As n and D increase, the projective dimension of the quotient ring of any non-zero
ideal in the ER-type model is equal to n with probability approaching 1.
Note that Conjecture 2 implies Conjecture 1. By the Auslander-Buchsbaum formula ([8], see also
[38]), pd(S/I) = n−depth(S/I) for all I. Hence Conjecture 2 implies depth(S/I) → 0, which implies
that the quotient ring of a nonzero ideal will be Cohen-Macaulay if and only if it is zero-dimensional.
Strong genericity. A monomial ideal I ⊂ k[x1 , . . . , xn ] is said to be strongly generic if no two
minimal generators agree on a non-zero exponent of the same variable. For example, x1 x2 , x21 x3
is a strongly generic monomial ideal in k[x1 , x2 , x3 ], but (x1 x2 , x1 x3 ) is not. Strong genericity is
interesting because the minimal free resolution of S/I has a combinatorial interpretation using the
Scarf polyhedral complex (see [33, Chapter 6] for details.), when I is strongly generic.
The zero ideal, with no generators, is trivially strongly generic, as is any principal ideal. At first
it might seem that increasing p, and thus increasing the expected number of monomials included in
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
SG
SG
n=4, D=4
1
SG
n=4, D=5
1
1
SG
n=4, D=6
1
SG
n=4, D=7
1
21
SG
n=4, D=8
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
SG
0.1
0.15
0.2
0.25
p
SG
n=5, D=4
1
0.05
0.1
0.15
0.2
p
SG
n=5, D=5
1
1
0.05
0.1
0.15
p
SG
n=5, D=6
1
0.05
0.1
p
SG
n=5, D=7
1
0.05
0.1
p
0.2
SG
n=5, D=8
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
SG
0.05
0.1
0.15
0.2
p
0.25
n=6, D=4
1
SG
0.05
0.1
0.15
0.2
p
SG
n=6, D=5
1
1
0.05
0.1
0.15
p
SG
n=6, D=6
1
0.05
0.1
p
SG
n=6, D=7
1
0.05
0.1
p
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
SG
0.05
0.1
0.15
0.2
p
0.25
n=7, D=4
1
SG
0.05
0.1
0.15
0.2
p
SG
n=7, D=5
1
1
0.05
0.1
0.15
p
SG
n=7, D=6
1
0.05
0.1
p
SG
n=7, D=7
1
0.05
0.1
p
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
0.1
0.15
0.2
p
0.25
0.05
0.1
0.15
0.2
p
0.05
0.1
0.15
p
0.05
0.1
p
0.05
0.1
p
0.1
p
n=5, D=9
0.05
0.1
p
n=6, D=9
0.2
SG
n=7, D=8
0.05
0.2
SG
n=6, D=8
n=4, D=9
0.05
0.1
p
n=7, D=9
0.2
0.05
0.1
p
Fig 5. Frequency of strong genericity in the ER-type model, for (n, D) = (4, 4) through (n, D) = (7, 9), as the model
parameter p takes values between D−n and D−1 . The sample size for each fixed value of p is 1000.
I, would always lower the frequency of strong genericity. However at the other extreme of p = 1 − ,
the maximal ideal (x1 , x2 , . . . , xn ) occurs frequently, and this ideal is strongly generic. Between these
extremal cases, we observe experimentally that very few random monomial ideals are strongly generic,
and suspect a connection between this behavior and our results in Section 4 about the number of
minimal generators.
Conjecture 3. As n and D increase, there will be a lower threshold function l(n, D) and an upper
threshold function u(n, D), such that the probability of being strongly generic will go to zero for
p = o (u(n, D)) and p = ω (l(n, D)), while the probability of being strongly generic will go to one for
p = o (l(n, D)) as well as for p = ω (u(n, D)).
Note that because the plots in Figure 5 display p values between D−n and D−1 , the behavior as
p approaches 1 is not visible.
We now turn to several properties of monomial ideals for which we experimentally observed noticeable patterns, but for which we do not have explicit conjectures to present.
Castelnuovo-Mumford regularity. The Castelnuovo-Mumford regularity (or simply regularity)
of an ideal is a measure of the variation and spread of the the degrees of the generators at each of
the modules in a minimal free resolution of the ideal. To compute the regularity requires computing
the resolutions and the number of rows in the Macaulay2-formatted Betti diagram. Of course, the
degree complexity studied in Section 4 is similar but less refined measure of complexity, as it counts
the number of entries in the first column of the Betti diagram only.
The simulations on the range of values realized for regularity of random monomial ideals, which
do not take into account any zero ideals generated (since their regularity is −∞), show an interesting
trend. Namely, already for the small values of n and D depicted in Figure 6, there is quite a range
of values obtained under the model. As n grows these values concentrate more tightly around their
mean, while seeming to follow a binomial distribution (discretized version of a normal distribution).
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
reg
reg
n=4, D=4
20
reg
n=4, D=5
20
20
reg
n=4, D=6
20
reg
n=4, D=7
20
22
reg
n=4, D=8
20
15
15
15
15
15
15
10
10
10
10
10
10
5
5
5
5
5
0.05
reg
0.1
0.15
0.2
0.25
p
reg
n=5, D=4
20
0.05
0.1
0.15
0.2
p
reg
n=5, D=5
20
20
0.05
0.1
0.15
p
reg
n=5, D=6
20
0.05
0.1
p
reg
n=5, D=7
20
5
0.05
0.1
p
reg
n=5, D=8
20
15
15
15
15
15
15
10
10
10
10
10
10
5
5
5
5
5
reg
0.05
0.1
0.15
0.2
p
0.25
n=6, D=4
20
reg
0.05
0.1
0.15
0.2
p
reg
n=6, D=5
20
20
0.05
0.1
0.15
p
reg
n=6, D=6
20
0.05
0.1
p
reg
n=6, D=7
20
0.1
p
reg
n=6, D=8
20
15
15
15
15
15
10
10
10
10
10
10
5
5
5
5
5
reg
0.1
0.15
0.2
p
0.25
n=7, D=4
20
reg
0.05
0.1
0.15
0.2
p
reg
n=7, D=5
20
20
0.05
0.1
0.15
p
reg
n=7, D=6
20
0.05
0.1
p
reg
n=7, D=7
20
0.1
p
reg
n=7, D=8
20
15
15
15
15
15
10
10
10
10
10
10
5
5
5
5
5
0.1
0.15
0.2
p
0.25
0.05
0.1
0.15
0.2
p
0.05
0.1
0.15
p
0.05
0.1
p
0.1
p
n=5, D=9
0.05
0.1
p
n=6, D=9
5
0.05
15
0.05
0.05
5
0.05
15
0.05
n=4, D=9
0.05
0.1
p
n=7, D=9
5
0.05
0.1
p
0.05
0.1
p
Fig 6. Castelnuovo-Mumford regularity of random monomial ideals I ∼ I(n, D, p) for (n, D) = (4, 4) through (n, D) =
(7, 9). Note that n increases across rows and D increases down columns, and that the values of the model parameter
p are 20 evenly spaced values between D−n and D−1 . The sample size for each fixed value of p is 1000. Circle sizes
indicate the relative frequencies of occurrence of random monomial ideals of corresponding regularity, and the mean
regularity for each p value is indicated by the black curves.
Simplicial homology of associated simplicial complexes. One motivation for studying random monomial ideals is that they provide a way to generate random simplicial complexes different
from earlier work, where the authors randomly generate k-dimensional faces of complexes for some
fixed integer k (see [11, 27, 31]). Instead, by Stanley-Reisner duality, the indices in a monomial we
generate are the elements of a non-face of a simplicial complex.
There are two natural ways to randomly generate sets of square-free monomials and our experiments considered both of them. First, as radicals of random monomial ideals drawn from the ER-type
model and, second, directly as random square-free monomial ideals drawn from the general model,
as described in Theorem 5.2, that places zero probability on non-square-free-monomials and probability p on square-free monomials. In our experiments, given an ideal in n variables, we computed
the Z2 -homology Hi , for i from 0 to n − 1, of the associated simplicial complex. Figure 7 displays
the homological properties of the random simplicial complexes obtained via the Stanley-Reisner correspondence from the first approach. Figure 8 displays the homological properties of the random
simplicial complexes obtained via the second method, directly generating square-free ideals, avoiding
taking the radical.
The patterns of appearance and disappearance of higher homology groups, visible in both figures,
are familiar in the world of random topology; see, for example, [28]. For each i there is a lower
threshold below which Hi always vanishes, and an upper threshold above which Hi also vanishes, while
between these two thresholds we see a somewhat normal-looking curve. Since our model parameter
p controls how many faces are removed from a complex, higher dimensional objects are associated
with lower values of p: a reversal of the typical behavior in prior random topological models. Another
interesting pattern in both sets of experiments (unfortunately not evident in the plots) is that there
was an overall tendency for each random simplicial complex to have no more than one non-trivial
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
n=4, D=4
1
n=4, D=5
1
1
n=4, D=6
1
n=4, D=7
1
23
n=4, D=8
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
0.1
0.15
0.2
0.25
p
n=5, D=4
1
0.05
0.1
0.15
0.2
p
n=5, D=5
1
0.05
1
0.1
0.15
p
n=5, D=6
0.05
1
0.1
0.2
p
n=5, D=7
0.05
1
0.1
p
n=5, D=8
0.05
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
0.1
0.15
0.2
p
0.25
n=6, D=4
1
0.05
0.1
0.15
0.2
p
n=6, D=5
1
0.05
1
0.1
0.15
p
n=6, D=6
0.05
1
0.1
0.05
1
0.1
p
n=6, D=8
0.05
1
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.05
0.1
0.15
0.2
p
0.25
n=7, D=4
1
0.05
0.1
0.15
0.2
p
n=7, D=5
1
0.05
1
0.1
0.15
p
n=7, D=6
0.05
1
0.1
0.05
1
0.1
p
n=7, D=8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.4
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.1
0.15
0.2
p
0.25
0.05
0.1
Legend:
0.15
0.2
H0
p
0.05
0.1
H1
0.15
p
0.05
H2
0.1
H3
0.1
p
n=6, D=9
0.05
1
0.8
0.05
p
0.2
p
n=7, D=7
0.1
n=5, D=9
0.2
p
n=6, D=7
n=4, D=9
0.1
p
n=7, D=9
0.2
p
0.05
H4
0.1
p
0.05
0.1
p
H5
Fig 7. Non-trivial homology groups for the random simplicial complexes whose nonfaces are radicals of random monomial ideals in the ER-type model setting. Each subplot in Figure 7 represents a fixed pair of (n, D) values, with n increasing down columns, and D increasing across rows. For each n, D and p value we generated 1000 ideals rad(I ∼ I(n, D, p)).
Each subplot registers the frequency at which the second kind of random simplicial complex exhibited Hi 6= {0} over Z2 .
The values of p in each subplot are chosen in the interval [D−n , D−1 ]. We note that I tends to the maximal ideal as
p → 1, so every curve will tend to 0.
homology group. That is, if for a particular n, D and p the experiments found that H0 was nontrivial
with frequency x, and H1 was nontrivial with frequency y, one might expect to see random simplicial
complexes with H0 and H1 simultaneously nontrivial with frequency xy. This would be the case
if these events were statistically uncorrelated. However we consistently observed frequencies much
lower than this, i.e. a negative correlation between nonzero homology at i and nonzero homology at
j, for every i 6= j.
7. Acknowledgements
We are grateful for the comments, references and suggestions from Eric Babson, Boris Bukh, Seth
Sullivant, Agnes Szanto, Ezra Miller, and Sayan Mukherjee. We are also grateful to REU student
Arina Ushakova who did some initial experiments for this project.
References
[1] Alon, N., and Spencer, J. H. The Probabilistic Method, 4th ed. Wiley, 2016.
[2] Ascher, D., Dubois, P. F., Hinsen, K., Hugunin, J., and Oliphant, T. Numerical
Python, ucrl-ma-128569 ed. Lawrence Livermore National Laboratory, Livermore, CA, 1999.
[3] Bárány, I., and Matousek, J. The randomized integer convex hull. Discrete & Computational Geometry 33, 1 (2005), 3–25.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
n=4, D=4
0.6
n=4, D=5
0.6
0.4
0.4
0.2
0.4
0.6
0.8
1
p
n=5, D=4
0.6
0.2
0.4
0.6
0.8
1
n=5, D=5
0.6
0.2
0.4
0.6
0.8
1
n=5, D=6
0.6
0.4
0.2
0.2
0.4
0.6
0.8
1
p
n=5, D=7
0.6
0.2
0.2
0.4
0.6
0.8
1
p
n=5, D=8
0.6
0.2
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.2
0.4
0.6
0.8
1
p
n=6, D=4
0.6
0.2
0.4
0.6
0.8
1
p
n=6, D=5
0.6
0.2
0.4
0.6
0.8
1
p
n=6, D=6
0.6
0.2
0.4
0.6
0.8
1
p
n=6, D=7
0.6
0.2
0.4
0.6
0.8
1
p
n=6, D=8
0.6
0.2
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.4
0.6
0.8
1
p
n=7, D=4
0.6
0.2
0.4
0.6
0.8
1
p
n=7, D=5
0.6
0.2
0.4
0.6
0.8
1
p
n=7, D=6
0.6
0.2
0.4
0.6
0.8
1
p
n=7, D=7
0.6
0.2
0.4
0.6
0.8
1
p
n=7, D=8
0.6
0.2
0.4
0.4
0.4
0.4
0.4
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.4
0.6
0.8
1
p
0.2
Legend:
0.4
0.6
0.8
1
H0
p
0.2
0.4
0.6
H1
0.8
1
p
0.2
H2
0.4
0.6
0.8
H3
1
p
0.2
0.4
H4
0.6
0.8
1
p
0.8
1
0.8
1
0.8
1
0.8
1
p
0.4
0.6
p
0.4
0.6
p
n=7, D=9
0.6
0.4
0.6
n=6, D=9
0.6
0.4
0.4
n=5, D=9
0.6
0.4
0.2
n=4, D=9
0.6
0.4
0.2
p
n=4, D=8
0.6
0.4
0.2
p
n=4, D=7
0.6
0.4
0.2
0.2
n=4, D=6
0.6
24
0.2
0.4
0.6
p
H5
Fig 8. Non-trivial homology groups for the random simplicial complexes whose non-faces are random square-free monomial ideals. Each subplot is for a pair (n, D) values, with n increasing down columns, and D increasing across rows.
With a sample size of 1000 monomial ideals for each n, D and p, each subplot shows the frequency at which the second kind of random simplicial complex exhibited Hi 6= {0} over Z2 . The p values for this set of experiments are
{0.05n | 0 ≤ n ≤ 20}. The subplots register the frequency at which these randomly generated simplicial complexes
exhibited Hi 6= {0}.
[4] Bayer, D., and Mumford, D. What can be computed in algebraic geometry? In Computational algebraic geometry and commutative algebra (Apr. 1992), University Press, pp. 1–48.
[5] Beltrán, C., and Pardo, L. M. Smale’s 17th problem: average polynomial time to compute
affine and projective solutions. Journal of the AMS 22, 2 (2009.), 363–385.
[6] Bigatti, A. M. Upper bounds for the Betti numbers of a given Hilbert function. Commutative
Algebra 21 (1993), 2317–2334.
[7] Bollobás, B. Random graphs, 2nd ed. Cambridge University Press, 2001.
[8] Bruns, W., and Herzog, J. Cohen-Macaulay rings. Cambridge University Press, 1998.
[9] Bürgisser, P., and Cucker, F. On a problem posed by Steve Smale. Annals of Mathematics
174, 3 (2011), 1785–1836.
[10] Cornuéjols, G. Combinatorial Optimization: Packing and Covering. CBMS-NSF Regional
Conference Series in Applied Mathematics. SIAM, 2001.
[11] Costa, A., and Farber, M. Random simplicial complexes. In Configuration spaces - Geometry, Topology, and Representation Theory, INdAM Series. Springer, To appear.
[12] Cox, D., Little, J. B., and O’Shea, D. Ideals, Varieties, and Algorithms: An Introduction
to Computational Algebraic Geometry and Commutative Algebra. Springer, 2007.
[13] De Loera, J. A., Petrović, S., and Stasi, D. Random sampling in computational algebra:
Helly numbers and violator spaces. Journal of Symbolic Computation 77 (2016), 1–15.
[14] Dilcher, K. Some q-series identities related to divisor functions. Discrete mathematics 145, 1
(1995), 83–93.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
25
[15] Ein, L., Erman, D., and Lazarsfeld, R. Asymptotics of random Betti tables. Journal für
die reine und angewandte Mathematik (Crelle’s Journal). (To appear).
[16] Ein, L., and Lazarsfeld, R. Asymptotic syzygies of algebraic varieties. Inventiones mathematicae 190, 3 (2012), 603–646.
[17] Eisenbud, D. Commutative algebra with a view toward algebraic geometry, vol. 150 of Graduate
Texts in Mathematics. Springer, 1995.
[18] Eisenbud, D., and Schreyer, F.-O. Betti numbers of graded modules and cohomology of
vector bundles. Journal of the American Mathematical Society 22, 3 (2009), 859–888.
[19] Erdös, P., and Rényi, A. On random graphs, I. Publicationes Mathematicae (Debrecen) 6
(1959), 290–297.
[20] Faridi, S. Cohen-macaulay properties of square-free monomial ideals. Journal of Combinatorial
Theory, Series A 109, 2 (2005), 299–329.
[21] Fousse, L., Hanrot, G., Lefèvre, V., Pélissier, P., and Zimmermann, P. Mpfr: A
multiple-precision binary floating-point library with correct rounding. ACM Transactions on
Mathematical Software 33, 2 (June 2007).
[22] Grayson, D. R., and Stillman, M. E. Macaulay2, a software system for research in algebraic
geometry. Available at http://www.math.uiuc.edu/Macaulay2/.
[23] Herzog, J., and Hibi, T. Monomial ideals, vol. 260 of Graduate Texts in Mathematics.
Springer-Verlag London, Ltd., London, 2011.
[24] Hulett, H. Maximum Betti numbers of homogeneous ideals with a given Hilbert function.
Communications in Algebra 21 (1993), 2335–2350.
[25] Janson, S., Luczak, T., and Ruciński, A. Random graphs. Interscience Series in Discrete
Mathematics and Optimization. Wiley, New York, 2000.
[26] Kac, M. On the average number of real roots of a random algebraic equation. Bulletin of the
American Mathematical Society 49 (1943), 314–320.
[27] Kahle, M. Topology of random simplicial complexes: a survey. In Algebraic topology: applications and new directions, vol. 620 of Contemporary Mathematics. American Mathematical
Society, Providence, RI, 2014, pp. 201–221.
[28] Kahle, M., and Meckes, E. Limit theorems for Betti numbers of random simplicial complexes. Homology Homotopy Appl. 15, 1 (2013), 343–374.
[29] Kouchnirenko, A. G. Polyèdres de Newton et nombres de Milnor. Inventiones mathematicae
32 (1976), 1–32.
[30] Lewin, L. Polylogarithms and associated functions. Elsevier Science Ltd, 1981.
[31] Linial, N., and Meshulam, R. Homological connectivity of random 2-complexes. Combinatorica 26, 4 (Aug. 2006), 475–487.
[32] Littlewood, J. E., and Offord, A. C. On the Number of Real Roots of a Random Algebraic
Equation. Journal of the London Mathematical Society S1-13, 4 (1938), 288.
[33] Miller, E., and Sturmfels, B. Combinatorial commutative algebra, vol. 227 of Graduate
Texts in Mathematics. Springer-Verlag, New York, 2005.
[34] Onn, S., and Sturmfels, B. Cutting corners. Advances in applied mathematics 23, 1 (1999),
29–48.
[35] Pardue, K. Deformation classes of graded modules and maximal Betti numbers. Illinois
Journal of Mathematics 40 (1996), 564–585.
[36] Pittel, B. On a likely shape of the random Ferrer’s diagram. Advances in Applied Mathematics
18, 4 (1997), 432 – 488.
[37] Sage Developers. SageMath, the Sage Mathematics Software System (Version 7.3), 2016.
De Loera, Petrović, Silverstein, Stasi, Wilburne/Random monomial ideals
26
http://www.sagemath.org.
[38] Stanley, R. P. Combinatorics and commutative algebra, 2nd ed., vol. 41 of Progress in Mathematics. Birkhäuser Boston, Inc., Boston, MA, 1996.
[39] Sturmfels, B. Polynomial equations and convex polytopes. The American Mathematical
Monthly 105, 10 (1998), 907–922.
| 0math.AC
|
Soft-Deep Boltzmann Machines
arXiv:1505.02462v3 [cs.NE] 21 Jun 2015
Taichi Kiwaki
Graduate School of Engineering
The University of Tokyo
[email protected]
Abstract
We present a layered Boltzmann machine (BM) that can better exploit the advantages of a distributed representation. It is widely believed that deep BMs (DBMs)
have far greater representational power than its shallow counterpart, restricted
Boltzmann machines (RBMs). However, this expectation on the supremacy of
DBMs over RBMs has not ever been validated in a theoretical fashion. In this
paper, we provide both theoretical and empirical evidences that the representational power of DBMs can be actually rather limited in taking advantages of distributed representations. We propose an approximate measure for the representational power of a BM regarding to the efficiency of a distributed representation.
With this measure, we show a surprising fact that DBMs can make inefficient
use of distributed representations. Based on these observations, we propose an
alternative BM architecture, which we dub soft-deep BMs (sDBMs). We show
that sDBMs can more efficiently exploit the distributed representations in terms
of the measure. Experiments demonstrate that sDBMs outperform several stateof-the-art models, including DBMs, in generative tasks on binarized MNIST and
Caltech-101 silhouettes.
1
Introduction
One aspect behind superior performance of deep architectures is the effective use of distributed
representations [1, 2]. A representation is said distributed if it consists of mutually non-exclusive
features [1]. Distributed representations can efficiently model complex functions with enormous
number of variations by dividing the input space to a huge number of sub-regions with a combination
features [2].
Recent analyses have proven efficient use of distributed representations in deep feed forward networks with rectified linear (ReL) activations [3, 4]. Such deep networks model complex input-output
relationships by dividing the input space to enormous number of sub-regions, that grow exponentially in the number of parameters. Multiple levels of feature representations in deep feed forward
networks successfully facilitate efficient reuse of low-level representations, and deep feed forward
networks thus can manage an exponentially greater number of sub-regions than shallow architectures.
It is interesting to ask whether deep generative models could attain such a property as deep discriminative models. To answer this question, it would be useful to compare restricted Boltzmann
machines (RBMs) and deep Boltzmann machine (DBMs). RBMs are a shallow generative model
with distributed representations [5]. Deep Boltzmann machines (DBM) are a deep extension of
RBMs [6]. DBMs are commonly expected to have a far greater representational power than RBMs
while being relatively easy to be trained compared to RBMs. However, the expectation of supremacy
of DBMs over RBMs has not ever been validated in a theoretical fashion.
In this paper, we provide both theoretical and empirical evidences that the representational power
of DBMs can actually be rather limited in exploiting the advantages of distributed representations.
1
2
2
Energy
0
0
2
2
4
4
6
8
1010
Figure 1: Illustration of
an sDBM. All the layer
pairs are connected in
different magnitudes of
strength.
F̂(v)
© ª
E(v, 0,0 )
© ª
E(v, 0,1 )
5
0
©
ª
6
E(v, 1,0 )
© ª
E(v, 1,1 )
F(v)
5
v
8
10
10
0
5
v
10
15
(a)
(b)
Figure 2: (a) Free energy F and hard-min free energy F̂ of (a)
a two-layered DBM and (b) sDBM (i.e., gBM(2)). Free energy
bounds are indicated with shaded regions. All the layers of BMs
have only one unit. The sDBM parameters are generated with Algorithm 1 and rescaling. (best view in color)
Our contributions are as follows. First, we propose an approximate measure for the efficiency of
distributed representations of BMs inspired by recent analysis on deep feedforward networks [3, 4].
Our measure is the number of linear regions of a piecewise linear function that approximates the free
energy function of a BM. This measure approximates the number of sub-regions that a BM manages
in the visible space. We show that the depth does not largely improve the representational power of a
DBM in terms of this measure. This indicates a surprising fact that DBMs can make inefficient use of
distributed representations, despite common expectations. Second, we propose a superset of DBMs,
which we dub soft-deep BMs (sDBMs). An sDBM is a layered BM where all the layer pairs are
connected with topologically defined regularization. Such relaxed connections realize soft hierarchy
as opposed to hard hierarchy of conventional deep networks where only neighboring layers are
connected. We show that the number of linear regions of the approximate free energy of an sDBM
scales exponential in the number of its layers thus can be as large as that of a general BM and can
be exponentially greater than that of an RBM or a DBM. Finally, we experimentally demonstrate
high generative performance of sDBMs. sDBMs trained without pretraining outperform state-ofthe-art generative models, including DBMs, on two benchmark datasets: MNIST and Caltech-101
silhouettes.
2
Soft-Deep BMs
We propose a soft-deep BM (sDBM): a Boltzmann Machine (BM) [7] that consists of multiple
layers where all the layer pairs are connected and connections within layers are restricted. Figure 1
illustrates an sDBM. The energy of an sDBM is defined as:
E(X ; θ sDBM ) = −
X
Nk X
Nl
X
0≤l<k≤L i=1 j=1
(k,l)
(k)
(k)
(k,l) (l)
xi Wi,j xj −
Nk
L X
X
(k) (k)
bi xi ,
(1)
k=0 i=1
(k)
where θ sDBM = {Wi,j , bi } is a set of parameters, x(k) = {xi } is the state of the k th layer,
and X = {v, H} is the set of all the units with H = {h(k) } being the set of hidden layers, and
v being the visible layer. We number layers x(k) s.t. x(0) is the visible layer, and x(k) is the k th
hidden layer. Let L be the number of layers, N be the total number of units, Nk be the number of
units in k th layer, Nvis be the number of visible units, and Nhid be the number of hidden units. An
sDBM assigns probability p(X ; θ) ∝ exp(−E(X ; θ)) to a configuration X ∈ {0, 1}N .
RBMs and DBMs are subsets of sDBMs; RBMs are sDBMs of L = 1, and DBMs are sDBMs where
(k,l)
Wi,j ≡ 0 for k − l > 1.
2
3
Quantifying the Efficiency of Distributed Representation in BMs
In the this section, we define an approximate measure for the representational power of a BM based
on its free energy function. We compare various BMs in terms of this measure and show that sDBMs
could attain richer representations than DBMs and RBMs.
The free energy of a BM is defined as the negative log probability that the network assigns to a
visible configuration without normalizing constant:
X
F (v; θ) , − log
exp(−E(v, H; θ)),
(2)
H
P
where H denotes summation over all the hidden configurations, and θ is the set of parameters. We
would be able to measure the representational power of a BM with the complexity of the free energy
function because the free energy function contains all the information on the probability distribution
that a BM models.
3.1
Hard-min Approximation of Free Energy
We here define a piecewise linear approximation of the free energy function of a BM. For RBMs,
it is widely known that the free energy function can be well approximated with a piecewise linear function [8]. This idea can be extended to general BMs that do P
not have connections between
visible units, which include sDBMs, as follows: the operation log H exp in Eq. (2) can be regarded
as a relaxed max operation; the sum is virtually dominated by the smallest energy, i.e.,
P
exp(−E(v,
H)) ≈ exp(− minH E(v, H)) where minH denotes min operation over all possiH
ble hidden configurations. The negative logarithm of the sum is thus nearly minH E(v, H). Based
on this observation, we define following approximation of the free energy:
Definition 1. Hard-min free energy F̂ of a BM with parameters θ is defined as:
F̂ (v; θ) , min E(v, H; θ).
H
(3)
Note that F̂ (v; θ) is a piecewise linear function if the BM does not have connections between visible
units because E(v, H; θ) does not have interactions involving multiple visible units.
Formally, we can show that F̂ bounds F as:
P
Theorem 2. Let Eres (v) = − log{ H exp(−E(v, H)) − exp(−F̂ (v))}. Then the free energy
F (v) is bounded as:
F̂ (v) − exp(F̂ (v) − Eres (v)) ≤ F (v) ≤ FMF (v) ≤ F̂ (v),
(4)
where FMF is the mean-filed approximation of the free energy.
The tightness of the bound is determined by the dominance of minimum energy F̂ over the free
energy. The difference between the upper and the lower bounds becomes fairly tight if F̂ is smaller
than Eres , the contribution of the non-minimum energies on the free energy.
Theorem 2 shows that F̂ is a very rough approximation for the free energy; F̂ is less accurate than
mean-field approximation FMF . Nevertheless, the bound can be tight except points where several
energy terms nearly achieve the minimum, e.g., boundaries between linear regions of F̂ . Figure 2
demonstrates this idea. Therefore, we will be able to roughly measure the complexity of the free
energy of a BM through quantifying the complexity of F̂ .
A natural way to quantify the complexity of a piecewise linear function is to count the number of
its linear regions. To quantify the representational power of a deep feedforward network with ReL
activation, this strategy was recently applied to the piecewise linear input-output function [3, 4].
Inspired by these analyses, we propose to use the number of the linear regions of F̂ to measure a
BM’s representational power. Intuitively, this measure roughly indicates the number of effective
Bernoulli mixing components of a BM; F̂ with k linear regions will be well approximated by the
negative probability function of a mixture of k Bernoulli components by assigning each component
to each region. We therefore shall call this measure the number of effective mixtures of a BM:
3
Definition 3. Suppose a BM with no connections between visible units. The number of effective
mixtures of the BM is the number of linear regions of the hard-min free energy F̂ of the BM.
Obviously from Definitions 1 and 3, the maximal number of effective mixtures of a BM is bounded
above by the number of its hidden configurations:
Proposition 4. The number of effective mixtures of a BM is upper bounded by 2Nhid .
Note that this proposition tells us nothing about whether this bound is actually achievable by a BM
with a certain parameter configuration; we provide positive results in later sections.
The number of effective mixtures of a BM approximately measures the efficiency of the distributed
representation. Each configuration of a distributed representation can give rise to a linear region
of F̂ . Therefore, an efficient distributed representation of a BM potentially manages 2Nhid subregions in the visible space. The efficiency, however, can substantially be damaged by restricted
connections.
For deep feedforward networks with ReL, Montúfar et al. [4] showed that a deeper network can
model a piecewise linear function with much more linear regions than a shallow network with the
same number of parameters. The number of the linear regions grows exponentially in the number
of the layers. Now we ask a question: is this also true for DBMs in terms of the approximate free
energy F̂ ? Surprisingly, the answer is NO. We shall provide proofs in the following sections.
3.2
The Number of Effective Mixtures of an RBM
We first analyze RBMs. The free energy function of an RBM can be approximated with a 2-layered
feedforward network with ReL [8]. The number of linear regions of the input-output function of
such a shallow network has been studied by Pascanu et al. [3] and Montúfar et al. [4]. With slight
modification on their results, we can compute the maximal number of effective mixtures of an RBM:
PN0 N1
Theorem 5. The maximal number of effective mixtures of an RBM is j=0
j .
Note that this
bound is quite smaller than the upper bound in Proposition 4 for N1 > N0 because
PN0 N1
=
Θ(N1 N0 ) 2N1 .
j=0 j
3.3
The Number of Effective Mixtures of a DBM
Next we analyze DBMs. Here we provide lower and upper bounds on the maximal number of
effective mixtures of DBMs. We have a lower bound because DBMs are a superset of RBMs:
Proposition
6. The maximal number of effective mixtures of a DBM is lower bounded by
PN0 N1
j=0 j .
A key idea of the proof on an upper bound, which we show in the appendix, is that energies associated with a same configuration in the first hidden layer h(1) have an identical gradient in the
space of v. For example, E(v, h(1) = •, h(2) = 0) and E(v, h(1) = •, h(2) = 1) have the
same gradient i.e., slope in Fig. 2 (a). This is because h(2) does not affect the statistics of v
given h(1) . The number of linear regions of F̂ is therefore bounded by 2N1 = 21 because one
of the energy terms with the same slope become globally smaller than the other energy term, e.g.,
E(v, h(1) = 0, h(2) = 0) < E(v, h(1) = 0, h(2) = 1) for any v. This generalize to any DBMs
leading to a natural but somewhat shocking result where the bound only depends on the number of
units in the first hidden layer:
Theorem 7. The number of effective mixtures of a DBM with any number of hidden layers is upper
bounded by 2N1 .
Depth does not largely help the number of effective mixtures of DBMs. This suggests that a distributed representation is inefficiently used in a DBM at least in the scope of the approximate free
energy F̂ . From Proposition 6 and Theorem 7, we can readily show a serious limitation on the
number of effective mixture of DBMs:
Proposition 8. The number of effective mixture of a DBM with N1 > N0 never achieves the bound
2Nhid .
4
-2
Energy
1
0.0
Energy
Energy
1
-4 2
0.5
Algorithm 1 A recursive construction of gBM(L)
-2 1
-8
1.0
function SOFT D EEP(L)
1
1 2
2 3
1.51.0 0.5 0.0 0.5
1
2
4
if L = 0 then
0
0
0
v
w(k,l) ← 0 for 0 ≤ l < k < ∞
(k)
b ← 0 for 0 ≤ k < ∞
(b)
(a)
return {w(k,l) }, {b(k) }
1.0
else
6.5
0.5
(k,l)
(k)
{w
}, {b } ← SOFT D EEP(L − 1)
16.0
2.0
x ← 2L−1
25.5
(L,0)
3.5
w
←x
35.0
(L)
1 0
1
2
1 1 3 5 7
b
← 0.5x(1 − x)
v
v
for l = 1 to L − 1 do
(L,l)
(l,0)
(c)
(d)
w
← −xw
end for
Figure 3: (a): gBM(L) for L ∈ {1, 2, 3} with
return {w(k,l) }, {b(k) }
unit indices and connection strengths. (b) to (d):
end if
F̂ (printed in black) and E(v, •) ∈ S(L) (in
end function
gray) with L = (b)1, (c)2, and (d)3.
3.4
The Number of Effective Mixtures of an sDBM
The key to the limited number of effective mixtures of DBMs is the independency between v and
{h(2) , h(3) , . . .} given h(1) . Conversely, if there exists dependency between the visible and the
upper hidden layers even given h(1) , the limitation over the number of effective mixtures will not
hold. Bypassing connections of sDBMs therefore might improve the number of effective mixtures.
Figure 2 (b) demonstrate this idea by showing that F̂ of an sDBM attains 2Nhid = 24 linear regions
with properly chosen parameters. In this section, we refine this idea for general sDBMs.
3.4.1
General BMs as Elemental sDBMs
We first analyze the number of effective mixtures of a general BM with only one visible unit, which
can be regarded as an elemental sDBM. Let gBM(L) be a general BM with L hidden units and one
visible unit whose energy function is defined as:
E(x(0:L) ; θ gBM(L) ) = −
X
0≤l<k≤L
x(k) w(k,l) x(l) −
L
X
b(k) x(k) ,
(5)
k=0
where we defined v = x(0) , h(k) = x(k) , and x(l:k) , {x(l) , . . . , x(k) } for 0 ≤ l < k ≤ L. Because
we regard a gBM(L) as an elemental sDBM with L layers each of which has only one unit, we index
units and parameters with superscripts. We may call the k th unit of a gBM(L) the k th layer because
of the same reason. Let S(L) be a set of one dimensional linear functions defined over the visible
unit: S(L) , {E(x(0) , x(1:L) ; θ gBM(L) )|x(1:L) ∈ {0, 1}L }.
We first analyze an arrangement of the elements of S(L) with a network construction procedure and
then analyze the number of linear regions of F̂ under this arrangement. The procedure is listed in
Algorithm 1, where a network is constructed by appending a unit in a recursive manner, starting
from the 1st unit to the Lth unit (see Fig. 3 (a) for example). With this construction, we can show
that all the elements of S(L) are arranged to be a tangent of a quadratic curve at 2L different points:
Lemma 9. Assume that {w(k,l) }, {b(k) } are computed with SOFT D EEP(M ) for a large integer M .
Then elements of S(L) for 0 < L ≤ M are tangents of a quadratic function with equally spaced
points of tangency.
From Lemma 9, we can readily show that:
Lemma 10. The number of effective mixtures of a gBM(L) reaches 2L = 2Nhid , the bound in
Proposition 4, when parameters are properly set.
5
Figures 3 from (b) to (d) demonstrate the statements of Lemma 9
and 10 for L ∈ {1, 2, 3}. Different hidden units control the slope
of the energy in different levels of magnitude (e.g., 1, 2, 4, 8, . . .).
This allows E(v, •) to have mutually different slopes and thus
leads to 2L effective mixtures.
We call connections determined with Algorithm 1 soft-deep connections because the connection strengths can be regarded to decay exponentially in the distance between layers. Let us have
units aligned in a sequential order k = 0, L, . . . , 1 as in Fig. 3 (a).
The strength of a connection from a unit to an upper unit which is
d units away from the unit under this spatial configuration is proportional to 2−d . We observe that this connection pattern is soft
Figure 4: Heatmap of F of a counterpart of the conventional deep connection pattern where
two-layered sDBM. The sDBM only adjacent layers are connected.
is constructed as a bundle of two
independent gBM(2)s. Lines
indicate the boundary of linear 3.4.2 Main Results
regions of F̂ . The parameters By applying Lemma 10 to an sDBM constructed as a bundle of
are computed with Algorithm 1 independent gBM(L)s, we can show that the maximal number of
and with rescaling.
effective mixtures of an L-layered sDBM scales exponentially in
L:
Theorem 11. Suppose an sDBM with L hidden layers each of
which contains M (≤ Nvis ) units. Then the number of effective mixtures of this sDBM reaches
2M L = 2Nhid , the bound in Proposition 4, with a certain parameter configuration.
Figure 4 demonstrates the claim of Theorem 11; the free energy function of an sDBM with four
hidden units can be well approximated with F̂ that has 24 = 16 linear regions.
Along with the analysis on DBMs and RBMs, Theorem 11 indicates that soft-deep connections that
bypass between remote layers can be vital for a deeply layered BM to have superior representational
power to shallow one in terms of the efficiency of a distributed representations. This clearly contrasts
with feedforward networks where bypassing connections do not critically affect the representational
power [9].
4
Remarks
There are two appealing properties of sDBMs other than the huge number of effective mixtures.
First, fast block Gibbs sampling can be performed. Although sampling efficiency degrades compared to DBMs due to the dependency between hidden layers introduced by soft-deep connections,
we believe that benefits from the huge representational power offset this negative effect.
Second, soft-deep connections can ease difficulties in learning deeply layered BMs. Because DBMs
do not have connections between remote layers, the effect that the visible layer exerts on remote
hidden layers decays exponentially in the depth. This phenomenon will hinder learning signals
from correctly propagating through deep layers. We believe that one of the benefits of pretraining
is to help this stochastic vanishing gradient effect. The soft-deep connections ease this problem
by bypassing between the visible layer and remote hidden layers. We believe that high generative
performance of sDBMs without pretraining shown in Section 5 is achieved not only with the huge
representational power proven in Theorem 11, but also with the less severe vanishing gradient effect.
4.1
Soft-Deep Regularization
For the number of effective mixtures of an sDBM to scale exponentially in the depth as in Theorem 11, it is essential that connection weights are in multiple levels of magnitude. Without regularization or with uniform regularization, networks do not attain such property via learning. To address
this point, we introduce soft-deep regularization where strength of L2 regularization for connections between k th and lth layers is inversely proportional to |w(k,l) |η where w(k,l) are computed
with Algorithm 1, and η is a hyper parameter. Although this technique does not strictly guarantee
6
that the weights scale as w(k,l) , we experimentally observed that this regularization improves the
performance of sDBMs.
5
Experiments
We have discussed representational power of BMs based on approximated free energy F̂ . To validate
the approximation, we experimentally demonstrated advantages of sDBMs. We performed experiments on two datasets: MNIST digits [10] and Caltech-101 silhouettes [11]. We used Theano [12]
and pylearn2 [13] to implement sDBMs. We used stochastic maximum likelihood [14] to jointly
train networks with the centering method [15] and soft-deep regularization. We did not perform
pretraining. We scheduled learning rates to linearly decay from an initial value to zero.
To evaluate networks, we used AIS [16, 17] to estimate the variational lower bound for the average
log-likelihood on test data. We evaluated the reliability of estimates by computing 3σ confidence
intervals, which we show in the supplementary material.
On both datasets, we trained 2-, 3-, and 4-layered sDBMs with various hyper parameters. The number of units in each hidden layer is fixed to 500. Hyper parameters are tuned via random sampling
[18]. See supplementary material for detail.
Figure 5: Random samples from a 4-layered sDBM (left in each cell) displayed with nearest training
(center) and test samples (right) from binarized MNIST. Generated images are probabilities that
pixels are sampled from. The nearest neighbors are computed in terms of pixelwise L2 distance.
The sDBM does not simply memorize training examples but generalize to unseen test examples.
5.1
Binarized MNIST
MNIST is a collection of gray scaled digit images that consists of 60,000 training samples and
10,000 test samples [10]. We binarized the images following the procedure by Salakhutdinov and
Murray [17] to generate training and test data.
Table 1 compares sDBMs and various models in the literature in terms of generative performance.
We can see that sDBMs greatly performed compared to other models. Even the 2-layered sDBM
outperformed the previous state-of-the-art test log-likelihood of −80.97 nat by a recent report [19].
The best-performing 4-layered sDBM achieved −66.56 nat of test log-likelihood with a 3σ confidence interval of [−67.01, −65.70] nat.
Note that sDBMs with 2- and 3-hidden layers outperformed DBMs with the same number of layers
[20]. This result would be seen to reflect the exponentially greater number of effective mixtures of
sDBMs than of DBMs with the same number of parameters.
The depth of networks largely improved the performance, though improvement of the 3-layered
model over the 2-layered model was relative small. We believe that this effect is due to insufficiency
7
Figure 6: Random samples from a 4-layered sDBM trained on Caltech-101 silhouettes displayed
with nearest training and test examples as in Fig. 5.
in parameter tuning; The 3-layered model performed worse than 2-layered model on training data
as shown in the supplementary material. The performance of models would uniformly improve as
the depth of networks with more precise parameter tuning.
Figure 5 shows random samples from the best performing sDBM. The sDBM well generalizes to
unseen test examples.
Table 1: Comparison of generative performance of various generative models on binarized MNIST.
We report average test log-likelihood measured in nat.
Model
RBM [17]
DBN 2hl [22]
DBM 2hl [20]
DBM 3hl [20]
NADE [24]
EoNADE 2hl [25]
EoNADE-5 2hl [26]
DLGM [27]
5.2
Test LL
≈ -86.34
≈ -84.55
≈ -83.43
≈ -83.02
-88.33
-85.10
-84.68
≈ -86.60
≥
Model
DLGM 8 leapfrogs[21]
DARN 1hl [23]
DARN 12hl [23]
DRAW [19]
sDBM 2hl
sDBM 3hl
sDBM 4hl
Test LL
≈ -85.51
≈ -84.13
–
–
–
–
–
≥
-88.30
-88.30
-87.72
-80.97
-76.41
-74.58
-66.56
Caltech-101 silhouettes
Caltech-101 silhouettes is a collection of binary silhouette images of various objects [11]. The
dataset contains 4,100 training samples and 2,307 test samples.
Table 2 compares sDBMs with several other models on generation of Caltech-101 silhouettes.
sDBMs outperformed the previous state-of-the-art by NADE trained with reweighted wake-sleep
(RWS) algorithm [28]. The 4-layered sDBM achieved −85.55 nat of test log-likelihood with a
3σ confidence interval of [−85.67, −85.40] nat. This result is the best average test log-likelihood
achieved on Caltech-101 silhouettes to the best of our knowledge.
The depth improves the performance of sDBMs. We believe that less precise parameter tuning
resulted in poor performance of 2-layered model as in experiments with MNIST.
Figure 6 shows samples generated from the best performing 4-layered model. The most samples
proves nice generalization by the network though some samples resemble training examples.
8
Table 2: Comparison of generative performance of various generative models on Caltech-101 silhouettes. We report average test log-likelihood as in Table 1.
Model
RBM [29]
RBM [29]
NADE-2 [26]
NADE-5[26]
6
Test LL
-109.0
-107.8
-108.8
-107.8
Model
NADE-RWS
sDBM 2hl
sDBM 3hl
sDBM 4hl
Test LL
-104.3
≥-92.4
≥-98.7
≥-85.5
Conclusion
In this paper, we proposed a BM architecture that can better exploit the distributed representation.
We proposed a measure for the efficiency of a distributed representation of a BM, the number of
effective mixtures of a BM, which is the number of linear regions of a piecewise linear function that
approximates a free energy function of a BM. We showed inefficiency of DBMs with respect to the
maximal number of effective mixtures. We proposed sDBMs, an extension of DBMs. We showed
that the maximal number of effective mixtures of an sDBM is exponentially larger than that of a
RBM or a DBM. Finally, we experimentally demonstrated high generative performance of sDBMs.
Acknowledgement
This research was supported by JSPS Grant-in-Aid for JSPS Fellows (145500000159). We thank
KyungHyun Cho, Li Yao, Takaki Makino, and Keita Tokuda for valuable discussion.
References
[1] Geoffrey E Hinton. Distributed Representations. In James L McClelland and David E Rumelhart, editors, Parallel Distributed Processing. MIT Press, 1986.
[2] Yoshua Bengio. Learning Deep Architectures for AI. Now Publishers Inc, October 2009.
[3] Razvan Pascanu, Guido Montúfar, and Yoshua Bengio. On the number of response regions of
deep feed forward networks with piece-wise linear activations. arXiv.org, December 2013.
[4] Guido Montúfar, Razvan Pascanu, KyungHyun Cho, and Yoshua Bengio. On the Number
of Linear Regions of Deep Neural Networks. In Advances in Neural Information Processing
Systems 27, 2014.
[5] Paul Smolensky. Information Processing in Dynamical Systems: Foundations of Harmony
Theory. In David E Rumelhart and James L McClelland, editors, Parallel Distributed Processing:Explorations in the Microstructure of Cognition: Foundations, pages 194–281. MIT press,
1986.
[6] Ruslan Salakhutdinov and Geoffrey Hinton. Deep Boltzmann machines. In Proceedings of the
12th International Conference on Artificial Intelligence and Statistics, pages 448–455, 2009.
[7] Geoffrey E Hinton and Terrence J Sejnowski. Learning and Relearning in Boltzmann Machines. In David E Rumelhart and James L McClelland, editors, Parallel Distributed Processing:Explorations in the Microstructure of Cognition: Foundations, pages 282–317. MIT press,
1986.
[8] James Martens, Arkadev Chattopadhyay, Toniann Pitassi, and Richard Zemel. On the Representational Efficiency of Restricted Boltzmann Machines. In Advances in Neural Information
Processing Systems 26, pages 1–21, 2013.
[9] Christopher M Bishop. Pattern Recognition and Machine Learning. Springer, 2006.
[10] Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning
applied to document recognition. In Proceedings of the IEEE, pages 2278–2324, 1998.
[11] Benjamin Marlin and Nando de Freitas. Asymptotic efficiency of deterministic estimators
for discrete energy-based models: Ratio matching and pseudolikelihood. arXiv preprint
arXiv:1202.3746, 2012.
9
[12] Frédéric Bastien, Pascal Lamblin, Razvan Pascanu, James Bergstra, Ian Goodfellow, Arnaud
Bergeron, Nicolas Bouchard, David Warde-Farley, and Yoshua Bengio. Theano: new features
and speed improvements. arXiv.org, November 2012.
[13] Ian J Goodfellow, David Warde-Farley, Pascal Lamblin, Vincent Dumoulin, Mehdi Mirza,
Razvan Pascanu, James Bergstra, Frédéric Bastien, and Yoshua Bengio. Pylearn2: a machine
learning research library. arXiv.org, August 2013.
[14] Tijmen Tieleman. Training restricted Boltzmann machines using approximations to the likelihood gradient. In Proceedings of the 25th International Conference on Machine Learning,
pages 1064–1071. ACM, 2008.
[15] Grégoire Montavon and Klaus-Robert Muller. Deep Boltzmann machines and the centering
trick. In gregoire.montavon.name, pages 621–637. Springer, 2012.
[16] Radford M Neal. Annealed Importance Sampling. Statistics and Computing, 11:125–139,
2001.
[17] Ruslan Salakhutdinov and Iain Murray. On the quantitative analysis of deep belief networks.
In Proceedings of the 25th International Conference on Machine Learning. ACM, July 2008.
[18] James Bergstra and Yoshua Bengio. Random search for hyper-parameter optimization. Journal
of Machine Learning Research, 2012.
[19] Karol Gregor, Ivo Danihelka, Alex Graves, and Daan Wierstra. DRAW: A Recurrent Neural Network For Image Generation. In Proceedings of the 32nd International Conference on
Machine Learning, 2015.
[20] Ruslan R Salakhutdinov and Geoffrey E Hinton. A better way to pretrain deep Boltzmann
machines. In Advances in Neural Information Processing Systems 25, pages 2447–2455, 2012.
[21] Tim Salimans, Diederik P Kingma, and Max Welling. Markov Chain Monte Carlo and Variational Inference: Bridging the Gap . In Proceedings of the 32nd International Conference on
Machine Learning, 2015.
[22] Iain Murray and Ruslan R Salakhutdinov. Evaluating probabilities under high-dimensional
latent variable models. In Advances in Neural Information Processing Systems 21, pages 1137–
1144, 2008.
[23] Karol Gregor, Ivo Danihelka, Andriy Mnih, Charles Blundell, and Daan Wierstra. Deep AutoRegressive Networks. In Proceedings of the 31st International Conference on Machine
Learning, 2014.
[24] Hugo Larochelle and Iain Murray. The neural autoregressive distribution estimator. Journal of
Machine Learning Research, 15:29–37, 2011.
[25] Benigno Uria, Iain Murray, and Hugo Larochelle. A Deep and Tractable Density Estimator. In
Proceedings of the 31st International Conference on Machine Learning, 2014.
[26] Tapani Raiko, Li Yao, KyungHyun Cho, and Yoshua Bengio. Iterative Neural Autoregressive
Distribution Estimator (NADE-k). In Advances in Neural Information Processing Systems 27,
2014.
[27] Danilo Jimenez Rezende, Shakir Mohamed, and Daan Wierstra. Stochastic Backpropagation
and Approximate Inference in Deep Generative Models. In Proceedings of the 31st International Conference on Machine Learning, 2014.
[28] Jorg Bornschein and Yoshua Bengio. Reweighted Wake-Sleep. arXiv.org, June 2014.
[29] KyungHyun Cho, Tapani Raiko, and Alexander Ilin. Enhanced Gradient for Training Restricted Boltzmann Machines. Neural Computation, 25(3):805–831, 2013.
[30] Simon Osindero and Geoffrey E Hinton. Modeling image patches with a directed hierarchy
of Markov random fields. In Advances in Neural Information Processing Systems 21, pages
1121–1128, 2008.
[31] Nitish Srivastava and Ruslan Salakhutdinov. Multimodal Learning with Deep Boltzmann Machines. In Advances in Neural Information Processing Systems 25, 2012.
[32] Geoffrey E Hinton and Terrence J Sejnowski. Optimal perceptual inference. In Proceedings
of IEEE Conference on Computer Vision and Pattern Recognition, pages 448–453. IEEE New
York, 1983.
10
[33] Ruslan Salakhutdinov and Hugo Larochelle. Efficient learning of deep Boltzmann machines.
In AISTATs ’10, pages 693–700, 2010.
[34] Thomas Zaslavsky. Facing up to arrangements: face-count formulas for partitions of space by
hyperplanes. Mem. Amer. Math. Soc., 1(154):vii–102, 1975.
[35] Juergen Schmidhuber. Deep Learning in Neural Networks: An Overview. arXiv.org, May
2014.
[36] Honglak Lee, Chaitanya Ekanadham, and Andrew Y Ng. Sparse deep belief net model for
visual area V2. In Advances in Neural Information Processing Systems 20, 2007.
[37] Daniel J Felleman and David C Van Essen. Distributed Hierarchical Processing in the Primate
Cerebral Cortex. Cerebral Cortex, 1:1–47, 1991.
11
A
Boltzmann Machines
A Boltzmann machine (BM) is a stochastic generative model, which is typically defined over N
binary units xi ∈ {0, 1}. The probability that a BM assigns to a state X = {xi } is defined as
p(X ; θ) =
1
exp(−E(X ; θ)),
Z(θ)
(6)
where the normalization constant, or the partition function of the BM is denoted by Z(θ), and its
energy function is defined as
E(X ; θ) = −
N X
N
X
xi wi,j xj −
N
X
i=1 j=1
bi xi , s
(7)
i=1
where wi,j are symmetric (i.e., wi,j = wj,i , wi,i = 0) connection weights between units i and j, bi
are biases, and θ is the set of the parameters.
A BM with visible and hidden units can have rich representations; visible units vj ∈ v correspond
to data variables, and hidden units hi ∈ H correspond to latent features of data. All the units are
either a visible units or a hidden unit (i.e., X = {H, v}). The numbers of visible and hidden units
are denoted by Nvis and Nhid .
Various network topologies that restrict connections of BMs have attracted great research interests
[5, 6, 30, 31]. Albeit general BMs are a superset of such BMs with restricted connections, general
BMs are rarely used in practice. The main problem with general BMs is the difficulty due to the
intractability of the expectations with respect to data-dependent and model distributions. One approach is to approximate expectations via expensive MCMC [32]. The relaxation time of a Markov
chain can be quite long because general BMs have enormous number of well-separated modes to
be explored. Moreover, dense connections of BMs require generic Gibbs sampling which updates
only one unit at a time. Restriction on connections can alleviate these issues. Particularly, BMs
with layered connection patterns are widely studied because of their appealing properties such as
efficiency in sampling, less-complex energy landscapes, and simplicity of learning algorithms. We
here review two representative layered BMs: Restricted BMs (RBMs) and Deep BMs (DBMs).
A.1
RBMs
An RBM is a BM with a bipartite graph that consists of a visible layer and a hidden layer. Connections within each layer are restricted [5]. The energy function of an RBM is defined as
E({h(1) , v}; θ RBM ) = −
N1 X
N0
X
(1)
(1,0)
hi Wi,j vj −
i=1 j=1
N0
X
(0)
bj v j −
j=1
N1
X
(1) (1)
bi hi ,
(8)
i=1
(1,0)
(0)
(1)
where h(1) denotes the states of the (first) hidden layer, and θ RBM = {Wi,j , bj , bi } are model
parameters. We here use redundant notation with layer indices associated with a superscript to avoid
confusion of notations for models which we shall describe in later sections.
RBMs exhibit a nice property that conditional distributions p(h(1) |v) and p(v|h(1) ) are tractable
and factorized. This allows us to perform fast block Gibbs sampling and makes the data-dependent
expectation tractable.
However, such tractability substantially sacrifices the representation power of RBMs.
A.2
DBMs
DBMs are an extension of RBMs that have multiple hidden layers that form deep hierarchy. Connections within each layer are restricted, and units in a layer are connected to all the units in the
neighboring layers [6]. The energy function of a DBM with L layers is
E(X ; θ DBM ) = −
L−1
k+1 Nk
X NX
X
(k+1)
xi
k=0 i=1 j=1
(k+1,k) (k)
xj
Wi,j
−
Nk
L X
X
k=0 i=1
12
(k) (k)
bi xi ,
(9)
where we number layers s.t. the 0th layer is the visible layer, and the k th layer is the k th hidden
(k)
layer. The state of the k th layer is denoted by x(k) = {xi }, hence the state of the k th hidden layer
(k)
(k)
(k)
(k)
is h = x , (hi = xi ) for 0 < k ≤ L, and the state of the visible layer is v = x(0) , (vj =
PL
(0)
xj ). Let Nk be the number of units in k th layer (i.e., Nvis = N0 , Nhid = k=1 Nk ).
DBMs have several appealing properties. Fast block Gibbs sampling is also applicable to DBMs,
as to RBMs. Particularly, block sampling is highly efficient because conditional distributions of the
even layers given the odd layers and those of the odd layers given the even layers are tractable and
factorized. Moreover, DBMs possess greater representation power than RBMs because of multiple
hidden layers.
However, the improved representation power causes a serious difficulty. The data-dependent expectation needs to be approximated in learning because the conditional distribution p(H|v) is no longer
tractable; stochastic approximation procedure [14] or variational inference [6, 33] is used for approximation. At the appearance of DBMs, Salakhutdinov and Hinton [6] introduced a pre-training
algorithm to ease this problem. Recently, the centering method is proposed for joint training of
DBMs without pre-training [15].
Upon the introduction of DBMs, DBMs would have been expected to be scalable, i.e., great performance improvements can be achieved with DBMs by stacking a layer as in other deep neural
models. However, experiments suggest that this seems not true; improvements are hard to be gained
with very deep BMs with more than 3 hidden layers even with elaborated learning algorithms [6].
It is widely conceived that the poor scalability of DBMs is attributed that we cannot exploit huge
representation capacity of DBMs due to inefficient optimization methods. This will be true to some
extent. We, however, shall provide both empirical and theoretical evidences that the poor scalability
of DBMs is not only due to the optimization issues, but also because of rather limited representation
capacity of DBMs.
B
Proof of Theorems
P
Theorem 2. Let Eres (v) = − log{ H exp(−E(v, H)) − exp(−F̂ (v))}. Then the free energy
F (v) is bounded as:
F̂ (v) − exp(F̂ (v) − Eres (v)) ≤ F (v) ≤ FMF (v) ≤ F̂ (v),
(10)
where FMF is the mean-filed approximation of the free energy.
Proof. We first show the upper bound. For any approximating posterior Q(H|v), We have
F (v) =
X
H
Q(H|v)E(H, v) −
X
Q(H|v) log
H
1
− KL (Q(•|v)|P (•|v)),
Q(H|v)
(11)
where P (H|v) denotes the model’s true posterior distribution. Suppose we have a following appromximating posterior:
1 (H = Ĥ(v)) ,
Q̂(H|v) =
(12)
0 (otherwise)
where we defined Ĥ(v) = arg minH E(v, H). Note that this posterior factorizes. With this posterior, Eq. (11) becomes
F (v) = F̂ (v) − KL Q̂(•|v)|P (•|v) .
(13)
we have F (v) ≤ F̂ (v) because KL Q̂(•|v)|P (•|v) = − log P (Ĥ(v)|v) ≥ 0. The equality
holds if and only if the true posterior has its all the mass on Ĥ(v), i.e., P (H|v) = Q̂(H|v). We
have an inequality FMF (v) ≤ F̂ (v) readily from the definition of the mean-field free energy because
Q̂ is factorized.
13
Next, we prove the lower bound as:
F̂ (v) − F (v) = F̂ (v) + log
X
exp(−E({H, v}))
(14)
H
= log
exp(−F̂ (v)) + exp(−Eres (v))
!
(15)
exp(−F̂ (v))
= log 1 + exp(−Eres (v) + F̂ (v))
(16)
≤ exp(F̂ (v) − Eres (v)),
(17)
where we used log(x) ≤ x−1 in the last line. The equality holds if and only if F̂ (v) = Eres (v).
B.1
On The Number of Effective Mixtures of an RBM
Theorem 5. The maximal number of effective mixtures of an RBM is
PN0
j=0
N1
j
.
PN0 (0)
Proof. The hard-min free energy of an RBM can be written as F̂ (v; θ RBM ) = − j=1
bj vj −
PN1
PN0
(1,0)
(1)
i=1 max(0,
j=1 Wi,j vj + bi )). The number of linear regions of this function is the number
PN0
(1,0)
(1)
of regions separated by N1 hyper-planes each of them satisfies j=1
Wi,j vj + bi = 0 for
PN0 N1
0 < i ≤ N1 . The number of these regions is j=0 j [34]. This proves the claim.
B.2
On The Number of Effective Mixtures of a DBM
Here we provide lower and upper bounds for the maximal number of effective mixtures of DBMs
with respect to the parameters. Let us begin with a lower bound. Because DBMs are a superset
of RBMs, the number of effective mixtures of a DBM can be as large as the maximal number of
effective mixtures of RBMs. This observation leads us to a lower bound:
Proposition
6. The maximal number of effective mixtures of a DBM is lower bounded by
PN0 N1
.
j=0 j
We here outline the idea of the proof of Theorem 7.
A key observation is that the
marginal distribution over visible units of a DBM is written as a summation: p(v; θ DBM ) =
P
(1)
; θ DBM )p(h(1) ; θ DBM ) where p(h(1) ; θ DBM ) is the marginal distribution over h(1) .
h(1) p(v|h
This indicates that the number of the mixing components of a DBM is 2N1 ; this bounds the maximal number of effective mixtures from above . These observations lead to a natural but somewhat
shocking result where the bound only depends on the number of units in the first hidden layer:
Theorem 7. The number of effective mixtures of a DBM with any number of hidden layers is upper
bounded by 2N1 .
Proof. Suppose a set of linear functions S(h(1) ) = {E({h(L) , . . . , h(2) , h(1) , v})|h(k) ∈
N
{0, 1} k for 2 ≤ k ≤ L}. Linear functions within this set f ∈ S(h(1) ) have an identical
PN0
(1)
gradient as f (v; h(1) ) =
)vj + C where C is a constant that only depends on
j=1 αj (h
P
(1)
(1,0)
(0)
N1
{h(2) , . . . , h(L) } and αj (h(1) ) = − i=1
hi Wi,j − bj . Therefore, min S(h(1) ) is a linear
P
N0
function fmin (v; h(1) ) = j=1
αj (h(1) )vj + Cmin with Cmin = minh(2) ,...,h(L) C. The hard-min
free energy of a DBM is F̂ (v; θ DBM ) = minh(1) min S(h(1) ) = minh(1) fmin (v; h(1) ), and its
maximal number of linear regions is bounded above by the number of configurations of h(1) i.e.,
2N1 .
These results depict a serious limitation on the representation power of DBMs. There are two ways
to increase the number of effective mixtures of a DBM. The first way is to stack layers. However,
the number of effective mixtures never become greater than 2N1 , which is solely determined by N1 .
Therefore, depth does not largely help the capacity of DBMs measured in the number of effective
14
mixtures. The second way is to increase N1 . This strategy, however, at least necessitates the presence
of second layer units, which does not improve the bound 2N1 . Otherwise, the DBM is equivalent to
an RBM, and its maximal number of effective mixtures is merely Θ(N1 N0 ). Therefore, the number
of effective mixtures of a DBM is smaller than the upper bound in Proposition 4:
Proposition 8. The number of effective mixture of a DBM with N1 > N0 never achieves the bound
2Nhid .
Proof. First, suppose that the DBM has no hidden layers above the first layer. This DBM is equivalent to an RBM, thus from Theorem 5, the maximal number of effective mixtures of this DBM is
smaller than 2Nhid . Next, suppose that the DBM has more than one hidden units in its third hidden
layer with non-zero connection weights between units in the second hidden layer. From Theorem 7,
the number of effective mixtures of this DBM is bounded above by 2N1 < 2Nhid . This proves the
claim.
B.3
On The Number of Effective Mixtures of an sDBM
Lemma 9. Assume that {w(k,l) }, {b(k) } are computed with SOFT D EEP(M ) for a large integer M .
Then elements of S(L) for 0 < L ≤ M are tangents of a quadratic function with equally spaced
points of tangency.
Proof. We here show the claim with induction with a quadratic function
f (x(0) ) = −0.5(x(0) (x(0) + 1) + 0.25).
(18)
As in main text, let S(L) be a set of linear functions {E(x(0) , x(1:L) )|x(1:L) ∈ {0, 1}L }. Assume
that elements of S(L − 1) are a tangent of f (x(0) ) where the point of tangency is ξx(1:L−1) =
PL−1 (k) k−1
PL−1
2
−0.5, and the slope is − k=1 x(k) 2k−1 . We divide S(L) into two sets Sx(L) =0 (L)
k=1 x
and Sx(L) =1 (L), each of which is a set of lines that correspond to either x(L) = 0 or x(L) = 1.
We can readily show that elements of Sx(L) =0 (L) are a tangent of f (x(0) ) because S(L − 1) =
Sx(L) =0 (L).
We can show the tangency of elements of Sx(L) =1 (L) as follows. Let gx(L) =η (x(0) ; x(1:L−1) ) be an
element of Sx(L) =η (L) with hidden configuration x(1:L−1) for η ∈ {0, 1}, i.e.,
gx(L) =η (x(0) ; x(1:L−1) ) = E(x(0) , . . . , x(L) ; θ gBM(L) )|x(L) =η .
(19)
Let us consider the difference gx(L) =1 (x(0) ; x(1:L−1) ) − gx(L) =0 (x(0) ; x(1:L−1) ) = Bx(1:L−1) x(0) +
Cx(1:L−1) where Bx(1:L−1) and Cx(1:L−1) can be computed as follows:
Bx(1:L−1) = −w(L,0) = −2L−1 ,
(20)
X
(21)
and
Cx(1:L−1) = −
w(L,l) x(l) − b(L)
0<l<L
= −w(L,0)
X
x(l) 2l−1 + 0.5 (w(L,0) )2 − w(L,0)
(22)
0<l<L
= 0.5(w
(L,0) 2
) +w
(L,0)
L−1
X
!
x
(k) k−1
2
− 0.5
(23)
k=1
= 0.5(Bx(1:L−1) )2 + Bx(1:L−1) ξx(1:L−1) ,
(24)
where we used w(L,l) = w(L,0) 2l−1 .
From Eqs. 20 and 24, gx(L) =1 (x(0) ; x(1:L−1) ) is a tangent of f (x) because the difference between yintercepts cα and cα+β of two tangents of a quadratic function ax2 + bx + c with slopes α and α + β
2
is calculated as cα+β − cα = − β4a − βxα where xα is the point of tangency of the line with slope
PL
α. The point of tangency of gx(L) =1 (x(0) ; x(1:L−1) ) is ξx(1:L−1) + w(L,0) = k=1 x(k) 2k−1 − 0.5
15
PL−1
PL
and the slope is − k=1 x(k) 2k−1 − w(L,0) = − k=1 x(k) 2k−1 . Therefore, elements of S(L) are
a tangent of f (x(0) ) if elements of S(L − 1) are a tangent of f (x(0) ).
Observe that S(0) contains only one element g(x(0) ) = 0; this is a tangent of f (x(0) ) at the point of
tangency x(0) = −0.5. Therefore, elements of S(L) are a tangent of f (x(0) ) for any L ≤ M . This
proves the claim.
Lemma 10. The number of effective mixtures of a gBM(L) reaches 2L = 2Nhid , the bound in
Proposition 4, when parameters are properly set.
Proof. Assume a gBM(L) whose parameters are generated with SOFT D EEP(L). From Lemma 9,
an element of S(L) is a tangent of f (x(0) ) = −0.5(x(0) (x(0) + 1) + 0.25) at different points.
Because f is strictly concave, g(x(0) ) ≥ f (x(0) ) where g ∈ S(L) and the equality holds at the point
of tangency. Therefore, for ĝ, g ∈ S(L) (ĝ 6= g), ĝ(x̂) = f (x̂) < g(x̂) where x̂ is the point of
tangency of ĝ. Thus, at a neighbor of x̂, F̂ (x(0) ) = ĝ(x̂). Because elements of S(L) are tangents of
f (x(0) ) at 2L different points, the number of effective mixtures of the gBM(L) is 2L . This proves
the claim.
This result directly indicates that general BMs with more than one visible units can also achieve the
maximal number of effective mixtures 2Nhid with connection weights determined by our construction procedure where visible-hidden connections are replicated for all the visible units.
Figure 7: Illustration of an sDBM, which is used in the proof of Theorem 11.
Theorem 11. Suppose an sDBM with L hidden layers each of which contains M (≤ Nvis ) units.
Then the number of effective mixtures of this sDBM reaches 2M L = 2Nhid , the bound in Proposition 4, with a certain parameter configuration.
Proof. Assume an sDBM constructed as a collection of M independent gBM(L)s each of which has
PM
parameters θ gBM(L) generated with SOFT D EEP(L). Then, F̂ (v; θ sDBM ) = j=1 F̂ (vj ; θ gBM(L) ).
Because each F̂ (vj ; θ gBM(L) ) has 2L linear regions, the number of linear regions of F̂ (v; θ sDBM )
is 2M L . This proves the claim.
C
Connection to Biological Neural Nets
There has been increasingly more intense research interests on the connection between deep neural
networks and biological neural networks [35]. One prevalent aspect is that layers of deep neural
networks correspond to cortical regions that form hierarchy [36]. However, unlike conventional deep
networks, it is widely known that biological neural networks have many connections that bypass
between functionally remote cortical regions (e.g., between V1 and MT) [37]. Because bypassing
16
Energy
6.5
16.0
25.5
35.0 1
1
3
v
5
7
Figure 8: F̂ of gBM(3) displayed in a large size. F̂ is printed in black, and E(v, •) ∈ S(L) are in
gray.
connections do not largely contribute to the representation power of feedforward neural networks
[9], recent great success of deep feedforward networks do not explain the functional role of such
bypassing connections in our brain. Our results on sDBMs may help us to understand this mystery.
D
D.1
Details of Experiments
Parameters
We tuned hyper parameters via random sampling; initial learning rates were sampled from 10−[2,4]
for MNIST and from 10−[2.5,4.5] for Caltech-101 silhouettes, strengths of L2 regularization were
sampled from 10−[4,7] , η was sampled from [0.5, 3.5], and update constants for the centering parameters were sampled from 10−[5,8] . We generated 16 configurations of hyper parameters for each
experiment setting. The number of parameter updates was 106 .
Networks were trained with stochastic maximum likelihood [14]. We did not perform variational
inference [6]. The number of positive phase Markov chain updates per parameter update was 5 for
MNSIT and 1 for Caltech-101 silhouettes. The number of negative phase Markov chain updates per
parameter update was 5. The batch size was set to 100.
D.2
AIS
Throughout the training, we monitored the training and test log-likelihood of models by occasionally
performing AIS. Such monitoring AIS was executed with rather cheap settings of 100 runs and
30,000 intermediate distributions. After training, we performed more expensive AIS on several
best performing models evaluated via cheap AIS to gain thorough estimates. This expensive AIS
17
Table 3: Details of AIS estimates for sDBMs trained on MNIST. Estimated variational lower bounds
on training and test data are reported. 3σ confidence intervals are also reported in parentheses.
Model
sDBM 2hl
sDBM 3hl
sDBM 4hl
-68.80
-71.17
-61.90
Train LL
(-68.91,-68.67)
(-71.58,-70.48)
(-62.36,-61.04)
-76.41
-74.58
-66.56
Test LL
(-76.53,-76.28)
(-74.98,-73.89)
(-67.01,-65.70)
Table 4: Details of AIS estimates for sDBMs trained on Caltech-101 silhouttes as in Table 3
Model
sDBM 2hl
sDBM 3hl
sDBM 4hl
-30.16
-72.62
-38.16
Train LL
(-30.35,-29.92)
(-72.69,-72.56)
(-38.29,-38.02)
-92.37
-98.66
-85.55
Test LL
(-92.56,-92.13)
(-98.72,-98.59)
(-85.67,-85.40)
is executed with at least 1,000 runs and at least 300,000 intermediate distributions. All the figures
reported in the main text were gained with such expensive AIS.
D.3
Samples from sDBMs
Figures 9 and 10 show consecutive samples from the best-performing 4-layered sDBMs. These
figures demonstrate nice mixing of Markov chains between several classes.
Figure 9: Consecutive samples generated from a 4-layered sDBM trained on MNIST.
18
Figure 10: Consecutive samples generated from a 4-layered sDBM trained on Caltech-101 silhouettes.
19
| 9cs.NE
|
arXiv:1603.03836v1 [cs.DS] 12 Mar 2016
Near-Isometric Binary Hashing for Large-scale Datasets
Amirali Aghazadeh
Department of Electrical and Computer Engineering, Rice University, Houston, TX, USA
AMIRALI @ RICE . EDU
Andrew Lan
Department of Electrical and Computer Engineering, Rice University, Houston, TX, USA
MR . LAN @ SPARFA . COM
Anshumali Shrivastava
Department of Computer Science, Rice University, Houston, TX, USA
Richard Baraniuk
Department of Electrical and Computer Engineering, Rice University, Houston, TX, USA
Abstract
We develop a scalable algorithm to learn binary hash codes for indexing large-scale datasets.
Near-isometric binary hashing (NIBH) is a datadependent hashing scheme that quantizes the
output of a learned low-dimensional embedding to obtain a binary hash code. In contrast
to conventional hashing schemes, which typically rely on an `2 -norm (i.e., average distortion) minimization, NIBH is based on a `∞ norm (i.e., worst-case distortion) minimization
that provides several benefits, including superior
distance, ranking, and near-neighbor preservation performance. We develop a practical and efficient algorithm for NIBH based on column generation that scales well to large datasets. A range
of experimental evaluations demonstrate the superiority of NIBH over ten state-of-the-art binary
hashing schemes.
1. Introduction
Hashing, one of the primitive operations in large-scale systems, seeks a low-dimensional binary embedding of a highdimensional data set. Such a binary embedding can increase the computational efficiency of a variety of tasks,
including searching, learning, near-neighbor retrieval, etc.
One of the fundamental challenges in machine learning is
the development of efficient hashing algorithms that embed
data points into compact binary codes while preserving the
geometry of the original dataset.
ANSHUMALI @ RICE . EDU
RICHB @ RICE . EDU
In this paper, we are interested in learning near-isometric
binary embeddings, i.e., hash functions that preserve the
distances between data points up to a given distortion in
the Hamming space. More rigorously, let Z and Y denote
metric spaces with metrics dZ and dY , respectively. An
embedding f : Z → Y is called near-isometric (Plan &
Vershynin, 2014, Def. 1.1) if, for every pair of data points
zi , zj ∈ Z, we have
dZ (zi , zj ) − γ ≤ dY (f (zi ), f (zj )) ≤ dZ (zi , zj ) + γ,
where γ is called the isometry constant. In words, f is nearisometric if and only if the entries of the pairwise-distortion
vector containing the distance distortion between every pair
of data points |dZ (zi , zj ) − dY (f (zi ), f (zj ))|, ∀i > j do
not exceed the isometry constant γ. A near-isometric embedding is approximately distance-preserving in that the
distance between any pairs of data points in the embedded
space Y is approximately equal to their distance in the ambient space Z (Hegde et al., 2015; Shaw & Jebara, 2007;
Weinberger & Saul, 2006).
The simplest and most popular binary hashing scheme,
random projection, simply projects the data into a lowerdimensional (lower-bit) random subspace and then quantizes to binary values. Random projections are known to be
near-isometric with high probability, due to the celebrated
Johnson-Lindenstrauss (JL) lemma (Andoni et al., 2014;
Datar et al., 2004; Plan & Vershynin, 2014). Algorithms
based on the JL lemma belong to the family of probabilistic dimensionality reduction techniques; a notable example
is locality sensitive hashing (LSH) (Andoni et al., 2014;
Datar et al., 2004). Unfortunately, theoretical results on
LSH state that the number of bits required to guarantee an
isometric embedding can be as large as the number of data
points (Datar et al., 2004; Plan & Vershynin, 2014). Even
Near-Isometric Binary Hashing for Large-scale Datasets
(a)
in practice, LSH’s requirement on the number of bits is impractically high for indexing many real-world, large-scale
datasets (Lv et al., 2007).
Consequently, several data-dependent binary hashing algorithms have been developed that leverage the structure of
the data to learn compact binary codes. These methods enable a significant reduction in the number of bits required
to index large-scale datasets compared to LSH; see (Wang
et al., 2014) for a survey. However, learning compact binary codes that preserve the local geometry of the data remains challenging.
These data-dependent hashing algorithms focus on the
choice of the distortion measure. Typically, after finding
the appropriate distortion measure, the hash functions are
learned by minimizing the average distortion, i.e., the `2 norm of the pairwise-distortion vector, which sums the distortion among all pairwise distances with equal weights.
Binary reconstructive embedding (BRE) (Kulis & Darrell,
2009), for example, uses an optimization algorithm to directly minimize the average distortion in the embedded
sapce. Spectral Hashing (SH) (Weiss et al., 2009), Anchor
Graph Hashing (AGH) (Liu et al., 2011), Multidimensional
Spectral Hashing (MDSH) (Weiss et al., 2012), and Scalable Graph Hashing (SGH) (Jiang & Li, 2015) define notions of similarity based on a function of `2 -distance between the data points kzi − zj k2 and use spectral methods
to learn hash functions that keep similar points sufficiently
close. Some other hashing algorithms first project the data
onto its principal components, e.g., PCA Hashing (PCAH)
(Jolliffe, 2002), which embeds with minimal average distortion, and then learn a rotation matrix to minimize the
quantization error (Gong & Lazebnik, 2011) or balance the
variance across the components (Isotropic Hashing (IsoHash) (Kong & Li, 2012)).
While minimizing the average distortion seems natural, this
approach can sacrifice the preservation of certain pairwise
distances in favor of others. As we demonstrate below, this
can lead to poor performance in certain applications, such
as the preservation of nearest neighbors. In response, in
this paper, we develop a new data-driven hashing algorithm
that minimizes the worst-case distortion among the pairwise distances, i.e., the `∞ -norm of the pairwise-distortion
vector.
Figure 1 illustrates the advantages of minimizing the
`∞ -norm of the pairwise-distortion vector instead of
its `2 -norm. Consider three clusters of points in a
two-dimensional space. We compute the optimal onedimensional embeddings of the data points by minimizing
the `∞ -norm and the `2 -norm of the pairwise-distortion
vector using a grid search over the angular orientation of
the line that represents the embedding. We evaluate the
near-neighbor preservation of a given query point in the
Cluster 1
Cluster 2
Cluster 3
L∞
L2
(b)
10
NN(q) = [1-2-3-4-5-6-7-8-9-10]
NN(q) = [10-4-2-1-8-6-3-7-5-9]
0
q = (0,0)
NN(q) = [1-2-3-4-5-6-7-8-9-10]
0
100
200
Figure 1. Comparison of the near-neighbor (NN) preservation
performance of hashing based on minimizing the `∞ -norm
(worst-case distortion) vs. the `2 -norm (average distortion) of
the pairwise distance distortion vector on an illustrative data set.
(a) For a dataset with three clusters (5 circles, 5 squares, and 60
stars), we found the optimal embeddings for both error metrics using grid search. (b) The projection of the data points using the `∞ optimal embedding preserves three well-separated clusters; however the projection using the `2 -optimal embedding mixes circles
and squares, projecting them into a single cluster. For the query
point q = (0, 0), all of its nearest neighbors NN(q) are preserved
with the correct ordering using the worst-based distortion embedding but not the average distortion embedding.
embedded space (shown in Fig. 1 (b)). For a query point
q, located without loss of generality at the origin, the nearest neighbor ranking from the ambient space is destroyed
by the `2 -optimal embedding, since the circle and square
clusters overlap. In contrast, the `∞ -optimal embedding
exactly preserves the rankings.
This illustration emphasizes the importance of preserving
relevant distances in data retrieval tasks. To minimize
the average distortion, the `2 -optimal embedding (dashed
red line) sacrifices the square–circle distances in favor of
the square–star and circle–star distances, which contribute
more to the `2 -norm of the pairwise distance distortion vector. In contrast, the `∞ -optimal embedding focuses on the
hardest distances to preserve (i.e., the worst-case distortion), leading to an embedding with smaller isometry constant than the `2 -optimal embedding. Preservation of these
distances is critical for near-neighbor retrieval.
1.1. Contributions
We make four distinct contributions in this paper. First,
conceptually, we advocate minimizing the worst-case distortion, which is formulated as an `∞ -norm minimization problem, and show that this approach outperforms approaches based on minimizing the average, `2 -norm distortion in a range of computer vision and learning scenarios
(Hartley & Schaffalitzky, 2004).
Second, algorithmically, since `∞ -norm minimization
problems are computationally challenging, especially for
large datasets, we develop two accelerated and scalable al-
Near-Isometric Binary Hashing for Large-scale Datasets
gorithms to find the optimal worst-case embedding. The
first, near-isometric binary hashing (NIBH), is based on
the alternating direction method of multipliers (ADMM)
framework (Boyd et al., 2011). The second, NIBH-CG, is
based on an accelerated greedy extension of the NIBH algorithm using the concept of column generation (Dantzig
& Wolfe, 1960). NIBH-CG can rapidly learn hashing functions from large-scale data sets that require the preservation
of billions of pairwise distances (e.g., MNIST).
Third, theoretically, since current data-dependent hashing
algorithms do not offer any probabilistic guarantees in
terms of preserving near-neighbors, we develop new theory
to prove that, under natural assumptions regarding the data
distribution and with a notion of hardness of near-neighbor
search, NIBH preserves the nearest neighbors with high
probability. Our analysis approach could be of independent interest for obtaining theoretical guarantees for other
data-dependent hashing schemes.
Fourth, experimentally, we demonstrate the superior performance of NIBH as compared to ten state-of-the-art binary hashing algorithms using an exhaustive set of experimental evaluations involving six diverse datasets and three
different performance metrics (near-isometry, Hamming
distance ranking, and kendall τ ranking performance). In
particular, we show that NIBH achieves the same distance
preservation and Hamming ranking performance as stateof-the-art algorithms while using up to 60% fewer bits. Our
experiments clearly show the superiority of the `∞ -norm
formulation over the more classical `2 -norm formulation
that underlies many hashing algorithms, such as BRE and
IsoHash. Our formulation also outperforms recently developed techniques that assume more structure in their hash
functions, such as Spherical Hamming Distance Hashing
(SHD) (Heo et al., 2012) and Circulant Binary Embedding
(CBE) (Yu et al., 2014).
2. Near-Isometric Binary Hashing
The standard formulation for data dependent binary hash
function embeds a data point x ∈ RN into the lowdimensional Hamming space H = {0, 1}M by first multiplying it by an embedding matrix W ∈ RM ×N and then
quantizing the entries of the product Wx to binary values:
h(Wx) =
1 + sgn(Wx)
.
2
(1)
The function sgn(·) operates element-wise on the entries of
Wx, transforming the real-valued vector Wx into a set of
binary codes depending on the sign of the entries in Wx.
2.1. Problem formulation
Consider the design of an embedding f that maps Q
high-dimensional data vectors X = {x1 , x2 , . . . , xQ } in
the ambient space RN into low-dimensional binary codes
H = {h1 , h2 , . . . , hQ } in the Hamming space with hi ∈
{0, 1}M , where hi = f (xi ), i = 1, . . . , Q, and M N .
Define the distortion of the embedding by
δ = inf sup |λdH (hi , hj ) − d(xi , xj )|,
λ>0 (i,j)∈Ω
with Ω = {(i, j) : i, j ∈ {1, 2, . . . , Q}, i > j},
where d(xi , xj ) denotes the Euclidean distance between
the data points xi , xj , dH (hi , hj ) denotes the Hamming
distance between the binary codes hi and hj , and λ is a
positive scaling variable. The distortion δ measures the
worst-case deviation from perfect isometry (i.e., optimal
distance preservation) among all pairs of data points. Define the secant set S(X ) as S(X ) = {xi −xj : (i, j) ∈ Ω},
i.e., the set of all pairwise difference vectors in X . Let
|S(X )| = |Ω| = Q(Q − 1)/2 denote the size of the secant set. Note that the common distortion measure utilized
in
average distortion, i.e.,
P other hashing algorithms is the
2
(λd
(h
,
h
)
−
d(x
,
x
))
/|Ω|.
H
i
j
i
j
i>j
We formulate the problem of minimizing the distortion parameter δ as the following optimization problem:
2
minimize sup λkh(Wxi ) − h(Wxj )k2 − kxi − xj k2 ,
W,λ>0 (i,j)∈Ω
since the squared `2 -distance between a pair of binary
codes is equivalent to their Hamming distance up to a scaling factor that can be absorbed into λ. We can rewrite the
above optimization problem as
(P∗ ) minimize kλv0 (W) − ck∞ ,
W,λ>0
where v0 ∈ NQ(Q−1)/2 is a vector containing the pairwise
Hamming distances between the embedded data vectors
2
kh(xi ) − h(xj )k2 , and c is a vector containing the pairwise `2 -distances between the original data vectors. Intuitively, the `∞ -norm objective optimizes the worst-case
distortion among all pairs of data points.
The problem (P∗ ) is a combinatorial problem with complexity O(Q2M ). To overcome the combinatorial nature of
the problem, we approximate the hash function h(·) by the
sigmoid function (also known as the inverse logit link function) σ(x) = (1 + e−x )−1 . This enables us to approximate
(P∗ ) by the following optimization problem:
(P) minimize kλv(W) − ck∞ ,
W,λ>0
Q(Q−1)/2
where v ∈ R+
is a vector containing the pairwise
`2 distances between the embedded data vectors after sig2
moid relaxation (1 + e−Wxi )−1 − (1 + e−Wxj )−1 2 .
Here the sigmoid function operates element-wise on Wxi .
In practice we use a more general definition of the sigmoid
Near-Isometric Binary Hashing for Large-scale Datasets
function, defined as σα (x) = (1 + e−αx )−1 , where α is the
rate parameter controlling how closely it approximates the
non-smooth function h(·). The following lemma characterizes the quality of such an approximation (see the Appendix
for a proof).
problem:
Lemma 1. Let x be a Gaussian random variable as x ∼
N (µ, σ 2 ). Define the distortion of the sigmoid approximation at x as |h(x) − σα (x)|. Then, the expected distortion is bounded as Ex [|h(x) − σα (x)|] ≤ σ√12πα +
where ρ is the scaling parameter in ADMM and y ∈
RQ(Q−1)/2 is the Lagrange multiplier vector. The NIBH
algorithm proceeds as follows. First, the variables W, λ, u,
and Lagrange multipliers y are initialized randomly. Then,
at each iteration, we optimize over each of the variables
W, u, and λ while holding the other variables fixed. More
specifically, in iteration `, we perform the following four
steps until convergence:
minimize kuk∞
W,u,λ>0
subject to u = λv(W) − c.
(2)
The augmented Lagrangian form of this problem can be
2
written as minimize kuk∞ + ρ2 ku − λv(W) + c + yk2 ,
W,u,λ>0
√
2
2e−( α+c/ασ ) , where c is a positive constant. As α goes
to infinity, the expected distortion goes to 0.
Remark. As has been noted in the machine vision literature (Zoran & Weiss, 2012), a natural model for an image
database is that its images are generated from a mixture of
Gaussian distributions. Lem. 3 bounds the deviation of the
sigmoid approximation from the non-smooth hash function
(1) under this model.
2.2. Near-isometry and nearest neighbor preservation
Inspired by the definition of relative contrast in (He et al.,
2012), we define a more generalized measure of data separability to preserve k-NN that we call the k-order gap
∆k := d(x0 , xk+1 ) − d(x0 , xk ), where x0 is a query point
and xk and xk+1 are its k th and k + 1th nearest neighbors,
respectively. We formally show that if the data is highly
separable (∆k is large), then the above approach preserves
all k nearest neighbors with high probability (see the Appendix for a proof and discussion).
• Optimize
over
W
via
W(`+1)
←
(`)
1
1 P
1
(`)
2
arg min 2 (i,j)∈Ω (uij −λ k 1+e−Wxi − 1+e−Wxj k2 +
W
2
(`)
kxi − xj k2 − yij )2 , where λ(`) denotes the value of λ in
(`)
(`)
the `th iteration. We also use uij and yij to denote the
entries in u(`) and y(`) that correspond to the pair xi and
xj in the dataset X . We show in our experiments below
that using the accelerated first-order gradient descent
algorithm (Nesterov, 2007) to solve this subproblem
results in good empirical convergence performance (see
the Appendix).
• Optimize over u while holding the other variables fixed;
it corresponds to solving the proximal problem of the
`∞ -norm u(`+1) ← arg min kuk∞ + ρ2 ku − λ(`)v(`+1) +
u
c + y(`) k22 . We use the low-cost algorithm described in
(Studer et al., 2014) to perform the proximal operator update.
Theorem 2. Assume that all the data points are independently generated
distribution
PP from a mixture of Gaussian N
i.e., xi ∼
denote a
p=1 πp N (µp , Σp ). Let x0 ∈ R
query data point in the ambient space, and the other data
points xi be ordered so that d(x0 , x1 ) < d(x0 , x2 ) <
. . . < d(x0 , xQ ). Let δ denote the final value of the distortion parameter computed from any binary hashing algorithm, and let»c denote a positive constant. Then, if
Ex [∆k ] ≥ 2δ + 1c log Qk
, the binary hashing algorithm
preserves all the k-nearest neighbors of a data point with
probability at least 1 − .
• Update y via y(`+1)←y(`) + η(u(`+1) − λ(`+1) v(`+1) +
c), where the parameter η controls the dual update step
size.
2.3. The NIBH algorithm
2.4. Accelerated NIBH for large-scale datasets
We now develop an algorithm to solve the optimization
problem (P). We apply the alternating direction method
of multipliers (ADMM) framework (Boyd et al., 2011) to
construct an efficient algorithm to find a (possibly local)
optimal solution of (P). Note that (P) is non-convex, and
therefore no standard optimization method is guaranteed to
converge to a globally optimal solution in general. We introduce an auxiliary variable u to arrive at the equivalent
The ADMM-based NIBH algorithm is efficient for smallscale datasets (e.g., for secant sets of size |S(X )| < 5000
or so). However, the memory requirement of NIBH is
quadratic in |X |, which would be problematic for applications involving large-scale numbers of data points and
secants. In response, we develop an algorithm that approximately solves (P) while scaling very well to largescale problems. The key idea comes from classical results
• Optimize over λ while holding the other variables fixed;
it corresponds to a positive least squares problem, where
λ is updated as λ(`+1)←arg min 21 ku(`+1) −λv(`+1) +c+
λ>0
y(`) k22 . We perform this update using the non-negative
least squares algorithm (Kim & Park, 2007).
Near-Isometric Binary Hashing for Large-scale Datasets
in optimization theory related to column generation (CG)
(Dantzig & Wolfe, 1960; Hegde et al., 2015).
The optimization problem (2) is an `∞ -norm minimization problem with an equality constraint on each secant.
The Karush-Kuhn-Tucker (KKT) condition for this problem states that, if strong duality holds, then the optimal solution is entirely specified by a (typically very small) portion of the constraints. Intuitively, the secants corresponding to these constraints are the pairwise distances that are
harder to preserve in the low-dimensional Hamming space.
We call the set of such secants the active set. In order to
solve (P), it suffices to find the active secants and solve
NIBH with a much smaller number of active constraints.
To leverage the idea of the active set, we iteratively run
NIBH on a small subset of all the secants that violate the
near-isometry condition, as detailed below:
• Solve (P) with a small random subset S0 of all the sec δ̂, and λ̂, initial
cants S(X ) using NIBH to obtain W,
estimates of the parameters. Identify the active set Sa .
Fix λ = λ̂ for the rest of the algorithm.
• Randomly select a new subset Sv ⊂ S of secants that
violate the near isometry condition using the current
c δ̂, and λ̂. Then, form an augmented
estimates of W,
secant set Saug = Sa ∪ Sv .
• Solve (P) with the secants in the set Saug using the
NIBH algorithm.
We dub this approach NIBH-CG. NIBH-CG iterates over
the above steps until no new violating secants are added
to the active set. Since the algorithm searches over all the
secants for violating secants in each iteration before terminating, NIBH-CG ensures that all of the constraints are
satisfied when it terminates. A key benefit of NIBH-CG
is that only the set of active secants (and not all secants)
needs to be stored in memory. This benefit leads to significant improvements in terms of memory complexity over
competing algorithms, since the set of all secants quickly
becomes large-scale and can exceed the system memory
capacity in large-scale applications.
3. Experiments
In this section, we validate the NIBH and NIBH-CG algorithms via experiments using a range of synthetic and realworld datasets, including three small-scale, three mediumscale, and one large-scale datasets with respect to three
metrics. We compare NIBH against ten state-of-the-art
binary hashing algorithms, including binary reconstructive embedding (BRE) (Kulis & Darrell, 2009), spectral
hashing (SH) (Weiss et al., 2009), anchor graph hashing
(AGH) (Liu et al., 2011), multidimensional spectral hashing (MDSH) (Weiss et al., 2012), scalable graph hashing
(SGH) (Jiang & Li, 2015), PCA hashing (PCAH) (Jolliffe,
2002), isotropic hashing (IsoHash) (Kong & Li, 2012),
spherical Hamming distance hashing (SHD) (Heo et al.,
2012), circulant binary embedding (CBE) (Yu et al., 2014),
and locality-sensitive hashing (LSH) (Indyk & Motwani,
1998).
3.1. Performance metrics and datasets
We compare the algorithms using the following three metrics:
Maximum distortion δ = inf ||λv̂ − c||∞ , where the vector
λ>0
v̂ contains the pairwise Hamming distances between the
learned binary codes. This metric quantifies the distance
preservation among all of the pairwise distances after projecting the training data in the ambient space into binary
codes. We also define the maximum distortion for unseen
test data δtest , which measures the distance preservation on
a hold-out test dataset using the hash function learned from
the training dataset.
Mean average precision (MAP) for near-neighbor preservation in the Hamming space. MAP is computed by first
finding the set of k-nearest neighbors for each query point
on a hold-out test data in the ambient space Lk and the
corresponding set LkH in the Hamming space and then calculating the average precision AP = |Lk ∩ LkH |/k. We then
report MAP by calculating the mean value of AP across all
data points.
Kendall τ ranking correlation coefficient. We first rank the
set of k-nearest neighbors for each data point by increasing
distance in the ambient space as T (Lk ) and in the Hamming space as T (LkH ). The Kendall τ correlation coefficient is a scalar τ ∈ [−1, 1] that measures the similarity
between the two ranked sets T (Lk ) and T (LkH ) (Kendall,
1938). The value of τ increases as the similarity between
the two rankings increases and reaches the maximum value
of τ = 1 when they are identical. We report the average
value of τ across all data points in the training dataset.
To compare the algorithms, we use the following standard
datasets from computer vision: Random consists of independently drawn random vectors in R100 from a multivariate Gaussian distribution with zero mean and identity covariance matrix. Translating squares is a synthetic
dataset consisting of 10 × 10 images that are translations
of a 3 × 3 white square on black background (Hegde et al.,
2015). MNIST is a collection of 60,000 28 × 28 greyscale
images of handwritten digits (LeCun & Cortes, 1998).
Photo-Tourism is a corpus of approximately 300,000 image patches, represented using scale-invariant feature transform (SIFT) features (Lowe, 2004) in R128 (Snavely et al.,
Near-Isometric Binary Hashing for Large-scale Datasets
CBE
NIBH
NIBH−CG
AGH
SGH
BRE
Random
3
2.5
δ
Translating squares
3
2
2
2
1.5
1.5
1
1
1
0.5
0.5
0.5
MAP
30
40
50
60
70
1
10
20
30
40
50
60
70
10
20
30
40
50
60
70
1
10
20
30
40
50
60
70
0 1
10
20
30
40
50
60
70
1
0.8
0.8
0.8
0.6
0.6
0.6
0.4
0.4
0.4
0.2
0.2
0.2
0.8
1
10
20
30
40
50
60
70
0
0.8
1
10
20
30
40
50
60
70
0
0.8
0.6
0.6
0.6
0.4
0.4
0.4
0.2
0.2
0.2
0
1
10
20
30
40
50
60
70
0
MNIST
1
1
1
0
Kendall τ
20
IsoHash
LSH
2.5
1.5
10
PCAH
SH
MDSH
3
2.5
1
SHD
1
10
20 30 40 50 60
Number of bits (M)
70
Figure 2. Comparison of the NIBH and NIBH-CG algorithms against several baseline binary hashing algorithms using three small-scale
datasets with 4950 secants (Q = 100). The performance of NIBH-CG closely follows that of NIBH, and both outperform all of the other
algorithms in terms of the maximum distortion δ (superior distance preservation), mean average precision MAP of training samples
(superior nearest neighbor preservation), and Kendall τ rank correlation coefficient (superior ranking preservation).
2006). LabelMe is a collection of over 20,000 images represented using GIST descriptors in R512 (Torralba et al.,
2008). Peekaboom is a collection of 60,000 images represented using GIST descriptors in R512 (Torralba et al.,
2008). Following the experimental approaches of the hashing literature (Kulis & Darrell, 2009; Norouzi & Fleet,
2011), we pre-process the data by subtracting the mean and
then normalizing all points to lie on the unit sphere.
3.2. Small- and medium-scale experiments
We start by evaluating the performance of NIBH and
NIBH-CG using a small-scale subset of the first three
datasets. Small-scale datasets enable us to compare the
performance of NIBH vs. NIBH-CG to verify that they perform similarly. Also they help us assess the asymptotic behavior of algorithms in preserving isometry since the total
of number of secants are small compare to the bit budget in
compact binary codes.
Experimental setup. We randomly select Q = 100 data
points from the Random, Translating squares, and MNIST
datasets. We then apply the NIBH, NIBH-CG, and all the
baseline algorithms on each dataset for different target binary code word lengths M from 1 to 70 bits. We set the
NIBH and NIBH-CG algorithm parameters to the common
choice of ρ = 1 and η = 1.6. To generate hash function of length M for LSH, we draw M random vectors
from a Gaussian distribution with zero mean and an identity covariance matrix. We use the same random vectors
to initialize NIBH and other baseline algorithms. In the
near-neighbor preservation experiments, to show the direct
advantage of minimizing `∞ -norm over `2 -norm, we followed the exact procedure described in BRE (Kulis & Darrell, 2009) to select the training secants, i.e., we apply the
NIBH algorithm on only the lowest 5% of the pairwise distances (which are set to zero as in BRE) combined with the
highest 2% of the pairwise distances.
We follow the continuation approach (Wen et al., 2010) to
Near-Isometric Binary Hashing for Large-scale Datasets
2.3
MNIST
b)
3
2
2.5
1.7
2
δtest
δtest
a)
NIBH
NIBH−CG
BRE
CBE
AGH
SGH
SHD
SH
1.5
1.4
1.1
1
0.8
0.5
10
20
30 40 50
No. of bits (M)
60
70
MDSH
PCAH
IsoHash
LSH
0.5
1
1.5
δ
2
2.5
3
Figure 3. Comparison of NIBH and NIBH-CG against several state-of-the-art binary hashing algorithms in preserving isometry on
MNIST data. (a) NIBH-CG outperforms the other algorithms in minimizes the isometry constant on unseen data δtest . (b) . NIBH and
NIBH-CG provide better isometry guarantee with a small sacrifice to universality.
set the value of α. We start with a small value of α, (e.g.,
α = 1) to avoid becoming stuck in bad local minima, and
then gradually increase α as the algorithm proceeds. As
the algorithm gets closer to convergence and has obtained
a reasonably good estimate of the parameters W and λ, we
set α = 10, which enforces a good approximation of the
sign function (see Lemma 3).
Results. The plots in the top row of Figure 2 illustrate
the value of the distortion parameter δ as a function of
the number of projections (bits) M . The performance of
NIBH and NIBH-CG closely follow each other, indicating that NIBH-CG is a good approximation to NIBH. Both
NIBH and NIBH-CG outperform the other baseline algorithms in terms of the distortion parameter δ. Among these
baselines, LSH has the lowest isometry performance since
random projections are oblivious to the intrinsic geometry
of the training dataset. To achieve δ = 1, NIBH(-CG) requires 60% fewer bits M than CBE and BRE. NIBH(-CG)
also achieves better isometry performance asymptotically,
i.e., up to δ ≈ 0.5, given a sufficient number of bits (M ≥
70), while for most of the other algorithms the performance
plateaus after δ = 1. NIBH’s superior near-isometry performance extends well to unseen data. Figure 3(a) demonstrates that NIBH achieves the lowest isometry constant on
a test dataset δtest compared to other hashing algorithms.
Figure 3(b) further suggests that NIBH’s superior isometry
performance comes with smallest sacrifice to the universality of the hash functions.
The plots in the middle and bottom row of Figure 2 shows
the average precision for retrieving training data and the
Kendall τ correlation coefficient respectively, as a function of the number of bits M . We see that NIBH preserves a higher percentage of nearest neighbors compared
to other baseline algorithms as M increases with better average ranking among k = 10-nearest neighbors.
Now we showcase the performance of NIBH-CG on three
medium-scale, real-world datasets used in (Kulis & Darrell,
2009; Norouzi & Fleet, 2011), including Photo-tourism,
LabelMe, and Peekaboom for the popular machine learning
task of data retrieval. From each dataset we randomly select Q = 1000 training points, following the setup in BRE
(Kulis & Darrell, 2009), and use them to train NIBH-CG
and the other baseline algorithms. We then randomly select a separate set of Q = 1000 data points and use it to
test the performance of NIBH-CG and other baseline algorithms in terms MAP with k = 50. Figure 4 illustrates
the performance of NIBH-CG on these datasets. NIBH-CG
outperforms all the baseline algorithms with large margins
in Hamming ranking performance in term of MAP with
top-50 near-neighbors.
3.3. Large-scale experiments
We now demonstrate that NIBH-CG scales well to largescale datasets. We use the full MNIST dataset with 60,000
training images and augment it with three rotated versions
of each image (rotations of 90◦ , 180◦ , and 270◦ ) to create a larger dataset with Q = 240,000 data points. Next,
we construct 4 training sets with 1,000, 10,000, 100,000,
and 240,000 images out of this large set. We train all algorithms with M = 30 bits and compare their performance
on a test set of 10,000 images. BRE fails to execute on a
standard desktop PC with 12 GB of RAM for training sets
with more than 100,000 points due to the size of the secant
set |X |. The results for all algorithms are given in Table 1;
we tabulate their performance in terms of MAP for the top500 neighbors. The performance of NIBH-CG is significantly better than the baseline algorithms and, moreover,
improves as the size of the training set grows. This emphasizes that NIBH-CG excels at large-scaled problems thanks
to its very small memory requirement; indeed, the memory
requirement of NIBH-CG is linear in the number of active
Near-Isometric Binary Hashing for Large-scale Datasets
MAP
0.6
0.6
Photo-tourism
NIBH−CG
BRE
CBE−opt
AGH
SGH
SHD
0.6
LabelMe
0.5
0.5
0.5
0.4
0.4
0.4
0.3
0.3
0.3
0.2
0.2
0.2
0.1
0.1
0.1
0
1
10
20
30
40
50
0
1
10
20
30
40
Number of bits (M)
50
0
IsoHash
LSH
SH
MDSH
PCAH
Peekaboom
1
10
20
30
40
50
Figure 4. Hamming ranking performance comparison on three medium-scale datasets (Q = 1000). The top-50 neighbors are used to
report MAP over a test data of same size.
secants rather than the total number of secants.
4. Discussion
We have demonstrated that the worst-case, `∞ -norm-based
near-isometric binary hashing (NIBH) algorithm is superior to a wide range of algorithms based on the more traditional average-case, `2 -norm. Despite its non-convexity
and non-smoothness, NIBH admits an efficient optimization algorithm that converges to a high-performing local
minimum. Moreover, NIBH-CG, the accelerated version
of NIBH, provides significant memory advantages over existing algorithms. Our exhaustive experiments with six
datasets, three metrics, and ten algorithms have shown
that NIBH outperforms all of the state-of-the-art datadependent hashing algorithms. The results in this paper
provide a strong motivation for exploring `∞ -norm formulations in binary hashing.
References
Andoni, A., Indyk, P., Nguyen, H. L., and Razenshteyn,
I. Beyond locality-sensitive hashing. In Proc. 25th Annual ACM-SIAM Symposium on Discrete Algorithms, pp.
1018–1028, Jan 2014.
Boyd, S., Parikh, N., Chu, E., Peleato, B., and Eckstein, J.
Distributed optimization and statistical learning via the
alternating direction method of multipliers. Foundations
and Trends in Machine Learning, 3(1):1–122, Jan. 2011.
Cover, T. M. and Thomas, J. A. Elements of information
theory. John Wiley & Sons, 2012.
tributions. In Proc. 20th Annual Symposium on Computational Geometry, pp. 253–262, June 2004.
Gong, Y. and Lazebnik, S. Iterative quantization: A procrustean approach to learning binary codes. In Proc.
IEEE Conf. on Computer Vision and Pattern Recognition, pp. 817–824, June 2011.
Hartley, R. and Schaffalitzky, F. L∞ minimization in geometric reconstruction problems. In Proc. IEEE Conf. on
Computer Vision and Pattern Recognition, pp. 504–509,
June 2004.
He, J., Kumar, S., and Chang, S. On the difficulty of nearest
neighbor search. In Proc. 29th Intl. Conf. on Machine
Learning, pp. 1127–1134, June 2012.
Hegde, C., Sankaranarayanan, A. C., Yin, W., and Baraniuk, R. G. Numax: A convex approach for learning
near-isometric linear embeddings. IEEE Trans. Signal
Processing, 63(22):6109–6121, Nov. 2015.
Heo, J., Lee, Y., He, J., Chang, S., and Yoon, S. Spherical
hashing. In Proc. IEEE Conf. on Computer Vision and
Pattern Recognition, pp. 2957–2964, 2012.
Horn, R. A. and Johnson, C. R. Topics in Matrix Analysis.
Cambridge University Press, 1991.
Indyk, P. and Motwani, R. Approximate nearest neighbors:
Towards removing the curse of dimensionality. In Proc.
30th Annual ACM Symposium on Theory of Computing,
pp. 604–613, May 1998.
Dantzig, G. B. and Wolfe, P. Decomposition principle for
linear programs. Operations Research, 8(1):101–111,
Feb. 1960.
Jiang, Q. Y. and Li, W. J. Scalable graph hashing with
feature transformation. IJCAI, 2015.
Datar, M., Immorlica, N., Indyk, P., and Mirrokni, V. S.
Locality-sensitive hashing scheme based on p-stable dis-
Jolliffe, I. Principal Component Analysis. Wiley Online
Library, 2002.
Near-Isometric Binary Hashing for Large-scale Datasets
Table 1. Comparison of NIBH-CG against several baseline binary hashing algorithms on large-scale MNIST datasets with over 28 billion
secants |S(X )|. We tabulate the Hamming ranking performance in terms of mean average precision MAP for different sizes of the
dataset. All training times are in seconds.
M = 30 bits
Training size Q
Secant size |S(X )|
NIBH-CG
BRE
CBE
SPH
SH
MDSH
AGH
SGH
PCAH
IsoHash
LSH
1K
500K
52.79 (±0.15)
48.33 (±0.65)
38.70 (±1.18)
44.33 (±0.74)
40.12 (±0.00)
41.06 (±0.00)
45.81 (±0.34)
51.32 (±0.07)
39.90 (±0.00)
50.91 (±0.00)
33.69 (±0.94)
MAP / Top-500 ( MNIST + rotations)
10K
100K
240K
50M
5B
28B
54.69 (±0.18) 54.93 (±0.23) 55.52 (±0.11)
50.67(±0.33)
–
–
38.12 (±1.34) 38.50 (±2.05) 38.53 (±0.83)
44.24 (±0.61) 44.37 (±0.71) 44.32 (±0.63)
39.37 (±0.00) 38.79 (±0.00) 38.26 (±0.00)
41.23 (±0.00) 40.80 (±0.00) 40.39 (±0.00)
47.78 (± 0.38) 47.69 (±0.41) 47.38 (±0.32)
51.33 (±0.20) 51.01 (±0.23) 50.66 (±0.76)
38.53 (±0.00) 38.81 (±0.00) 37.50 (±0.00)
50.90 (±0.00) 50.72 (±0.00) 50.55 (±0.00)
33.69 (±0.94) 33.69 (±0.94) 33.69 (±0.94)
Kendall, M. G. A new measure of rank correlation.
Biometrika, 30(1–2):81–93, June 1938.
Kim, H. and Park, H. Sparse non-negative matrix factorizations via alternating non-negativity-constrained least
squares for microarray data analysis. Bioinformatics, 23
(12):1495–1502, Apr. 2007.
Kong, W. and Li, W. J. Isotropic hashing. In Advances in
Neural Information Processing Systems, pp. 1646–1654,
2012.
Kulis, B. and Darrell, T. Learning to hash with binary reconstructive embeddings. In Advances in Neural Information Processing Systems, pp. 1042–1050, Dec. 2009.
LeCun, Y. and Cortes, C. The MNIST database of handwritten digits, 1998.
Ledoux, M. and Talagrand, M. Probability in Banach
Spaces: Isoperimetry and Processes. Springer-Verlag,
1991.
Liu, W., Wang, J., Kumar, S., and Chang, S. Hashing with
graphs. In Proc. 28th intl. Conf. on Machine Learning,
pp. 1–8, July 2011.
Lowe, D. G. Distinctive image features from scaleinvariant keypoints. Intl. Journal of Computer Vision,
60(2):91–110, Nov. 2004.
Lv, Q., Josephson, W., Wang, Z., Charikar, M., and Li, K.
Multi-probe lsh: efficient indexing for high-dimensional
similarity search. In Proceedings of the 33rd international conference on Very large data bases, pp. 950–961.
VLDB Endowment, 2007.
Nesterov, Y. Gradient methods for minimizing composite objective function. Technical report, Université
Catholique de Louvain, Sep. 2007.
Training time
240K
28B
541.43
18685.51
68.94
184.46
3.05
15.00
4.49
5.89
0.08
2.82
2.29 × 10−4
Norouzi, M. and Fleet, D. J. Minimal loss hashing for compact binary codes. In Proc. 28th Intl. Conf. on Machine
Learning, pp. 353–360, June 2011.
Plan, Y. and Vershynin, R. Dimension reduction by random
hyperplane tessellations. Discrete & Computational Geometry, 51(2):438–461, Mar. 2014.
Shaw, B. and Jebara, T. Minimum volume embedding.
In Proc. 11th Intl. Conf. on Artificial Intelligence and
Statistics, pp. 460–467, Mar. 2007.
Snavely, N., Seitz, S. M., and Szeliski, R. Photo tourism:
Exploring photo collections in 3D. ACM Trans. Graphics, 25(3):835–846, July 2006.
Studer, C., Goldstein, T., Yin, W., and Baraniuk, R. G.
Democratic representations. Preprint, 2014. URL
http://www.csl.cornell.edu/~studer/
papers/14TIT-linf-submitted.pdf.
Torralba, A., Fergus, R., and Weiss, Y. Small codes and
large image databases for recognition. In Proc. IEEE
Conf. on Computer Vision and Pattern Recognition, pp.
1–8, June 2008.
Wainwright, M. J. Sharp thresholds for high-dimensional
and noisy sparsity recovery using `1 -constrained
quadratic programming (Lasso). IEEE Trans. Information Theory, 55(5):2183–2202, May 2009.
Wang, J., Shen, H. T., Song, J., and Ji, J. Hashing for similarity search: A survey. arXiv preprint arXiv:1408.2927,
2014.
Weinberger, K. Q. and Saul, L. K. Unsupervised learning
of image manifolds by semidefinite programming. Intl.
Journal of Computer Vision, 70(1):77–90, May 2006.
Near-Isometric Binary Hashing for Large-scale Datasets
Weiss, Y., Torralba, A., and Fergus, R. Spectral hashing.
In Advances in Neural Information Processing Systems,
pp. 1753–1760, Dec. 2009.
Weiss, Y., Fergus, R., and Torralba, A. Multidimensional
spectral hashing. In European Conf. on Computer Vision,
pp. 340–353. Oct. 2012.
Wen, Z., Yin, W., Goldfarb, D., and Zhang, Y. A fast algorithm for sparse reconstruction based on shrinkage, subspace optimization, and continuation. SIAM Journal on
Scientific Computing, 32(4):1832–1857, June 2010.
Yu, F. X., Kumar, S., Gong, Y., and Chang, S. Circulant
binary embedding. In Proc. 31st Intl. Conf. on Machine
Learning, pp. 946–954, June 2014.
Zoran, D. and Weiss, Y. Natural images, gaussian mixtures
and dead leaves. In Advances in Neural Information Processing Systems, pp. 1736–1744, Dec. 2012.
A. Appendix
In the appendix, we prove Lem. 3 and Thm. 4 on the performance of NIBH on k-nearest neighbor preservation. Finally, we include additional numerical simulation results
and discussions on the empirical convergence of the NIBH
algorithm.
Proof of Lem. 3
Lemma 3. Let x be a Gaussian random variable as x ∼
N (µ, σ 2 ). Define the distortion of the sigmoid approximation at x as |h(x) − σα (x)|. Then, the expected distortion
is bounded as
Ex [|h(x) − σα (x)|] ≤
√
2
1
√
+ 2e−( α+c/ασ ) ,
σ 2πα
where c is a positive constant. As α goes to infinity, the
expected distortion goes to 0.
Proof. It is easy to see that the distortion |h(x) − σα (x)|
occurs at x = 0. Therefore, among different values of µ,
µ = 0 gives the largest distortion since the density of x
peaks at x = 0. Therefore, we bound the distortion at setting µ = 0, which is an upper bound of the distortion when
µ 6= 0. By definition (1) in the main text, h(x) can be
written as
ß
1 if x ≥ 0
h(x) =
0 otherwise.
When x ∼ N (0, σ 2 ), we have
Z ∞
Ex [|h(x) − σα (x)|] =
|h(x) − σα (x)| N (x; 0, σ 2 )dx
−∞
Z ∞
=2
(h(x) − σα (x))N (x; 0, σ 2 )dx
(3)
0
Z x0
=2
(h(x) − σα (x))N (x; 0, σ 2 )dx
0
Z ∞
+2
(h(x) − σα (x))N (x; 0, σ 2 )dx
x0
Z x0
Z ∞
1
1
2
N (x; 0, σ )dx+2
N (x; 0, σ 2 )dx
≤2
2
1
+
eαx0
0
x0
(4)
2
2
x0
e−cx0 /σ
≤√
+2
1 + eαx0
2πσ
√
2
1
≤ √
+ 2e−( α+c/ασ ) ,
σ 2πα
(5)
(6)
when we set x0 = √1α and c is a positive constant. In (3),
we used the fact that σα (x) and h(x) are symmetric with
respect to the point (0, 21 ). (4) is given by the properties of
the sigmoid function, (5) is given by the Gaussian concentration inequality (Ledoux & Talagrand, 1991), and (6) is
Near-Isometric Binary Hashing for Large-scale Datasets
given by the inequality 1/(1 + eαx0 ) ≤ e−αx0 . The fact
that Ex [|h(x) − σα (x)|] → 0 as α → ∞ is obvious from
the bound above.
Proof of Thm. 4
dH (x0 , xm ) > dH (x0 , xn ) with m ∈ {1, . . . , k} and n ∈
{k + 1, . . . , Q}. Then, using the union bound (Cover &
Thomas, 2012), we have
X
P (E) ≤
P (em,n ) ≤ k(Q − k)P (ek,k+1 )
m,n
Theorem 4. Assume that all the data points are independently generated
PP from a mixture of Gaussian distribution,
N
denote a
i.e., xi ∼
p=1 πp N (µp , Σp ). Let x0 ∈ R
query data point in the ambient space, and the other data
points xi be ordered so that d(x0 , x1 ) < d(x0 , x2 ) <
. . . < d(x0 , xQ ). Let δ denote the final value of the distortion parameter computed from any binary hashing algorithm, and let»c denote a positive constant. Then, if
Ex [∆k ] ≥ 2δ + 1c log Qk
, the binary hashing algorithm
preserves the k-nearest neighbors of a point with probability at least 1 − .
= k(Q − k)P (dH (x0 , xk ) > dH (x0 , xk+1 ))
= k(Q − k)P (dH (x0 , xk+1 ) < dH (x0 , xk )),
where we have used the fact that the most possible event
among all em,n events is the one corresponding to the
order mismatch between the k th and k + 1th nearest
neighbor. Now, note that the NIBH output δ satisfies
maxi,j |dH (xi , xj ) − d(xi , xj )| ≤ δ 1 . Observe that ∆k =
d(x0 , xk+1 ) − d(x0 , xk ) ≥ 2δ is a sufficient condition for
dH (x0 , xk+1 ) ≥ dH (x0 , xk ), since
dH (x0 , xk+1 ) − dH (x0 , xk )
In order to prove this theorem, we need the following
Lemma:
Lemma 5. Let x0 , . . . , xN and ∆k be defined as in Thm. 4.
Then, there exist a constant c such that P (∆k − Ex [∆k ] <
2
t) ≤ e−ct for t > 0.
≥ d(x0 , xk+1 ) − δ − d(x0 , xk ) − δ
≥ 2δ − 2δ = 0,
by the triangular inequality. This leads to
P (dH (x0 , xk+1 ) < dH (x0 , xk ))
Proof. Since the data points x0 , xk and xk+1 are independently generated from a finite mixture of Gaussian
distributions, the random variable of their concatenation
y = [xT0 , xTk , xTk+1 ]T ∈ R3N is sub-Gaussian (Wainwright, 2009). Then, we have
∆k (y) = kx0 − xk+1 k2 − kx0 − xk k2
I
=k 0
0
0
0
0
0
I
0 yk2 − k 0
−I
0
2I 0
≤ k 0 −I
0
0
0 0
−I 0 yk2
0 0
= 1 − P (dH (x0 , xk+1 ) ≥ dH (x0 , xk ))
≤ 1 − P (∆k ≥ 2δ) = P (∆k < 2δ).
Therefore, combining all the above and Lem. 5, the probability that the k-nearest neighbor is not preserved is
bounded by
P (E) ≤ k(Q − k)P (dH (x0 , xk+1 ) < dH (x0 , xk ))
≤ k(Q − k)P (∆k < 2δ)
= k(Q − k)P (∆k − Ex [∆k ] < −(Ex [∆k ] − 2δ))
0
0 yk2
−I
≤ 2kyk2 ,
where we have used the triangular inequality in the second to last step, the Rayleigh-Ritz theorem (Horn & Johnson, 1991), and the fact that the maximum singular value
of the matrix in the step before is 2. This result means
that ∆k (y) is a Lipschitz function of y. Thus, by Talagrand’s inequality (Ledoux & Talagrand, 1991), we have
2
that P (∆k − Ex [∆k ] < −t) ≤ e−ct for some positive
constant c and t > 0, since y is sub-Gaussian.
Now we are ready to prove Thm. 4.
Proof. Let E denote the event that the set of top-k nearest
neighbors is not preserved in the Hamming space. Then,
we have E = ∪em,n , where em,n denote the event that
2
≤ k(Q − k)e−c(Ex [∆k ]−2δ)
2
≤ kQe−c(Ex [∆k ]−2δ) .
2
Now, let kQe−c(Ex [∆k ]−2δ) ≤ , we have that the requirement for the k-nearest neighbors to be exactly preserved
with probability at least 1 − is
…
1
Qk
log
.
Ex [∆k ] ≥ 2δ +
c
Remark Note that our bound on the number of nearest neighbor preserved k depends on the final outcome of
the NIBH algorithm in the value of δ. In order to relate our result to the number of binary hash functions M
required, we can make use of (Plan & Vershynin, 2014,
1
Here we assume λ = 1 without loss of generality.
Near-Isometric Binary Hashing for Large-scale Datasets
Thm. 1.10). For a bounded set K ⊂ RN with diameter 1,
let M ≥ Cδ −6 w(K)2 where w(K) = Ex [supx∈K hg, xi]
denotes the Gaussian width of K and some constant C.
Then, (Plan & Vershynin, 2014, Thm. 1.10) states that,
with high probability, h(x) as defined in (1) with a random
matrix W whose entries are independently generated from
N (0, 1) is a δ0 -isometric embedding. Therefore, if we initialize NIBH with such a random W which is likely to be
δ0 -isometric, then empirically (see Figure 5), the NIBH algorithm will learn a better embedding that is δ-isometric
with δ < δ0 . Therefore, we have that the number of hash
functions M required for k-nearest
neighbor preservation
p
is at least M ∼ (Ex [∆k ] − log(kQ/)−6 w(X)2 assuming that the training dataset X is properly normalized.
Empirical convergence of the NIBH
algorithm
Figure 5 shows the empirical loss and the actual distortion parameter δ as a function of the iteration count ` in
the NIBH algorithm as applied on 4950 secants (i.e., Q =
100) from the MNIST dataset. The behavior of the empirical loss function closely matches that of δ as they gradually converge. The curve empirically confirms that minimizing the loss function in each iteration of NIBH (using
the ADMM framework) directly penalizes the non-convex
loss function (distortion parameter δ). After initializing the
NIBH algorithm with random entries for W, the value of
the distortion parameter δ significantly drops in the first few
iterations, empirically conforming that NIBH learns an embedding with significantly lower distortion parameter after
a few iterations.
||λv−c||
Objective value
2.5
∞
δ
2
1.5
1
0.5
0
200
400
600
Iteration
800
1000
Figure 5. Empirical convergence behavior of the NIBH algorithm.
Both the maximum distortion parameter δ and the loss function
||λv − c||∞ that approximates δ gradually decrease and converge
as the number of iterations increases. We see that the loss function of NIBH closely matches the behavior of the actual distortion
parameter in each iteration.
| 8cs.DS
|
CSA++: Fast Pattern Search for Large Alphabets
Simon Gog1,2 , Alistair Moffat1 , and Matthias Petri1
arXiv:1605.05404v1 [cs.DS] 18 May 2016
1
Dept. Computing and Information Systems, The University of Melbourne, Australia
2 Inst. Theoretical Informatics, Karlsruhe Institute of Technology, Germany
Abstract. Indexed pattern search in text has been studied for many decades. For
small alphabets, the FM-Index provides unmatched performance, in terms of both
space required and search speed. For large alphabets – for example, when the
tokens are words – the situation is more complex, and FM-Index representations
are compact, but potentially slow. In this paper we apply recent innovations from
the field of inverted indexing and document retrieval to compressed pattern search,
including for alphabets into the millions. Commencing with the practical compressed suffix array structure developed by Sadakane, we show that the Elias-Fano
code-based approach to document indexing can be adapted to provide new tradeoff
options in indexed pattern search, and offers significantly faster pattern processing compared to previous implementations, as well as reduced space requirements.
We report a detailed experimental evaluation that demonstrates the relative advantages of the new approach, using the standard Pizza&Chili methodology and files,
as well as applied use-cases derived from large-scale data compression, and from
natural language processing. For large alphabets, the new structure gives rise to
space requirements that are close to those of the most highly-compressed FMIndex variants, in conjunction with unparalleled search throughput rates.
Keywords: String search, pattern matching, suffix array, Burrows-Wheeler transform, succinct data structure, experimental evaluation.
1
Introduction and Background
We study a well-known problem: given a static text T[0, n − 2] over an alphabet Σ of size
σ followed by a symbol T[n − 1] = $, with $ 6∈ Σ , preprocess T so that a sequence of
patterns P[0, m − 1], also over Σ , can be efficiently searched for, with the purpose of each
search being to identify the number of occurrences nocc of P in T. A variety of options
exist for this problem, providing different trade-offs between construction cost, memory
space required during pattern search operations, and search cost, both asymptotically and
in practical terms. Example structures include the suffix tree [3, 26] and suffix array [16].
The suffix array of T, denoted SA, requires O n log n bits of space in addition to the
O n log σ bits occupied by T, and uses that space to store the offsets SA[0, n−1] of all n
suffixes of T (denoted as T[i, ]) in lexicographic order such that T[SA[i], ] < T[SA[i+1], ]
for i ∈ [0,n − 1]. Using SA, the number of occurrences of P in T can be identified in
O m log n time, via two binary searches that determine the range (sp, ep) such that all
suffixes SA[sp, ep] are prefixed
by P. Thus, nocc = ep − sp + 1. The search cost can be
reduced to O m + log n if information about longest common prefixes is also available.
Storing this information for
all possible intervals SA[i, j] occurring in the binary search
process requires O n log n bits of additional space.
Compressed Indexes. In a compressed suffix array, or CSA, the space required is proportional to the compressed size of T. Sadakane [23] (see also Grossi and Vitter [12]) describes a CSA based on the observation that the function ψ[i] = SA−1 [(SA[i]+1) mod n]
consists of σ increasing sequences (or segments) of integers, and that each of those seg
ments is likely to be compressible, yielding a space usage of nHk (T) + O n log log σ
bits [19], where Hk denotes to the order-k empirical entropy of T. Occurrences of P are
located by performing a backward search to find the range SA[spi , epi ] matching each
suffix P[i, ], stopping if epi < spi , or if all of P has been processed.
An alternative compressed indexed is due to Ferragina and Manzini [5], and is based
on the Burrows Wheeler Transform (BWT), defined as BWT[i] = T[SA[i] − 1 mod n].
In an FM-Index the BWT
is generally encoded using a wavelet tree [11], and accessed
using Rank BWT, i, c , which returns the number of times symbol c occurs in the prefix
BWT[0, i − 1]. Again, P is processed in reverse order. Suppose SA[spi , epi ] refers to the
range in SA prefixed by P[i, ], and that P[i − 1] = c. An array C of σ log n bits stores the
number of symbols c in T smaller than c; using it, spi−1 = C[c] + Rank BWT, spi , c
and epi−1 = C[c] + Rank BWT, epi + 1, c − 1 can be computed. Overall, SA[sp, ep] is
identified using 2m Rank operations on the BWT; and when stored using a wavelet
tree, O m log σ time. For more information about these structures, and the time/space
trade-offs that they allow, see Navarro and Mäkinen [19] and Ferragina et al. [6].
In Practice. Implementations of the CSA and the FM-Index have been developed and
measured using a range of data. When σ is small – for example, σ = 4 for DNA, and
σ ≈ 100 for plain ASCII text – both provide fast pattern search based on compact
memory footprints, usually requiring half or less of the space initially occupied by T,
depending on a range of secondary structures and parameter choices [9, 13], and with
the FM-Index typically requiring less space that the CSA. But when σ is large – for
6
example, when the alphabet is words in a natural language
and σ ≈ 10 or greater –
the situation is more complex. In particular, the O log σ factor associated with the
FM-Index’s wavelet tree is a count of random accesses (as distinct from cache-friendly
accesses) and means that search costs increase with alphabet size, negating its space
advantage. In contrast, standard CSA implementations are relatively unaffected by σ ,
but each backward search step in a CSA has a dependency on log nc , where nc is the
frequency in T of the current symbol c = P[i]. Hence, if σ is fixed and does not grow
with n, CSA pattern match times will grow as T becomes longer.
Our Contribution. We introduce several improvements to the CSA index:
– We adapt and extend the uniform partitioned Elias-Fano (UEF) code of Ottaviano
and Venturini [21] to the storage of the ψ function, allowing faster backwards search
compared to previous implementations;
– We add a fourth UEF block type compared to Ottaviano and Venturini, and include
the option of coding sections of the ψ function in a runlength mode;
– We describe a way of segregating the short segments in ψ, allowing improved
compression when σ is large and many of the symbols in Σ are rare;
– We carry out detailed “at scale” experiments, including both synthetic query streams
and logs derived from use-cases, covering all of small, medium, and large alphabets.
The result is a pattern search index that we refer to as “CSA++”. It represents a significant
shift in the previous relativities between compressed index structures; and, for large
alphabets in particular, gives rise to space needs close to those of the most highlycompressed FM-Index variants, with unparalleled search throughput rates.
2
Storing Integer Lists
Operations Required. The function ψ[i] = SA−1 [(SA[i] + 1) mod n] is a critical – and
costly – component of a CSA. It can be thought of as consisting of a concatenation of
σ segments, the c th of which is a sorted list of the locations in BWT at which the c th
symbol in Σ appear. That is, each segment of ψ can be interpreted as a postings list
of occurrences of symbol
c. The key operation required to enable backwards search
is that of GEQ c, pos , which returns the smallest position pos0 such that ψ[pos0 ] is
in the c th segment, and such that ψ[pos0 ] ≥ pos. Starting with sp = 0 and ep = n − 1,
the (sp, ep) bounds are narrowed via a sequence of m pairs of sp = GEQ c, sp and
ep = GEQ c, ep + 1 − 1 operations, as c takes on values from P[m − 1] through to P[0].
The equivalence
of the CSA and FM-Index
search processes can be seen by noting that
GEQ c, pos = C[c] + Rank BWT, pos, c , and that all of the (sp, ep) pairs computed
are identical between the two. Note also that, by construction, symbol occurrences in
the BWT string are likely to appear in clusters, and hence ψ is likely to contain runs of
consecutive or near-consecutive integers, separated by large intervals, and to contain at
most σ “disruption” points at which ψ[i] > ψ[i + 1].
Integer Codes. One common way of storing postings lists is to compute gaps, or differences, and then store them using a suitable code for integers; clusters in BWT then gives
rise to runs of small or unit gaps in ψ. A range of integer codes have been developed
for this type of distribution, including Elias γ and δ codes, Rice and Golomb codes, and
the Binary Interpolative Code (see Moffat and Turpin [18, Chapter 3] for descriptions).
Several of these have been used in previous CSA implementations [23].
There has been recent interest in Elias-Fano codes (EF codes) for postings list
compression, a result of work by Vigna [25] (see also Anh and Moffat [2] for earlier
application, and Gog et al. [9] for preliminary experimentation with compressed suffix
arrays). Given a non-decreasing set of k integers in the range 0 . . . 2U − 1 for some
universe size 2U , a parameter ` is selected, and each integer is split into a high part (the
most significant U − ` bits) and a low part (the ` low-order bits). Groups are formed for
values that have the same high parts. A code for the block of k values is then constructed
by representing the size of each of the 2U−` possible groups in unary, followed by the
concatenation in order of the k low parts. For example, if U = 4 and k = 3, the sequence
[6, 7, 10] (that is, [0110, 0111, 1010] in binary) would be coded using ` = 2, and split into
high parts, [01, 01, 10], coded as group sizes in unary as 0:110:10:0; and into low parts
coded in binary, 10:11:10, where the “:”s are purely indicative, and do not appear in
the output. The EF code achieves representations close to the combinatorial minimum if
` = blog2 (2U /k)c; moreover, the length of the coded block is easily computed: k + 2U−`
bits are required for the high/unary parts, and k · ` bits for the low/binary parts.
One useful aspect of the EF code is that the unary parts can be searched via Select
operations over their “0” bits, and then the number of binary parts through until that
point computed. For example, in the unary sequence shown above, any elements from the
underlying sequence in the range 8 . . . 11 must fall in the third bucket, and Select0 (2) −
2 = 4 − 2 = 2 indicates that there are in total two binary parts contained within the first
two buckets, and hence that the binary parts associated with the third bucket (if any)
must commence from the third element of the low/binary part. On average there is O 1
item per bucket, and linear search can be used to scan them; if a worst-case bound is
required, binary search can be used if there are more than log2 n “1” bits between the
relevant pair of consecutive “0” bits, and linear search employed otherwise.
Another feature of EF codes is that in the binary part all components are of the
same bit-length `, meaning that there are no dependencies that would hinder vectorized
processing and loop-unrolling techniques and prevent them from achieving their full
potential. This is not the case with, for example Elias δ codes, which are based upon
gaps and are also of variable length, and hence must be decoded sequentially.
Partitioned Elias-Fano Codes. The term occurrences in long postings lists tend to
be clustered, a pattern that has been used as the basis for a range of improved index
compression techniques [18]. Ottaviano and Venturini [21] demonstrated that EF codes
could capture much of this effect if postings lists were broken into blocks of k values,
and then the document identifiers in each block mapped to the range 0 . . . 2U − 1 for
some suitable per-block choice of U. Ottaviano and Venturini further observed that in
some cases EF codes are less efficient than other options, and that it was helpful for
blocks to be coded in one of three distinct modes: (i) those consisting of an ascending
run of k consecutive document identifiers, in which case no further code bits are required
at all (NIL blocks); (ii) those where the document identifiers are sufficiently clustered
(but not consecutive) that a 2U -bit vector is the most economical approach (BV blocks);
and (iii) those that are best represented using EF codes, taking 2U−` + k · (1 + `) bits.
Note that the decision between these options can be made based solely on k and U.
The combination of fixed-k blocks and range-based code selection is referred to as
Uniform Elias-Fano (UEF) coding. Ottaviano and Venturini also describe a mechanism
for partitioning postings lists into approximately-homogeneous variable-length blocks
in a manner that benefits EF codes that we do not employ here.
Overall Structure of a CSA. With gaps in ψ represented by variable-length codewords,
the ability to directly identify and then search segments of ψ is lost. Instead, pseudorandom access is provided via a set of samples: ψ is broken into fixed-length blocks;
the first ψ value in each block is retained uncompressed in a sample index; and the
remaining values in that block
are coded as gaps starting from that first value [20, 23].
Computation of GEQ c, pos then involves identification of the region in the sample
index associated with the segment for symbol c, binary search in that section of the
sample index to identify the single block that contains pos or the next ψ value greater
than it; and then sequential decoding of that whole block, to reconstruct values of ψ in
order to determine the exact value. If symbol c occurs nc times in T, and if samples
are
extracted every k values, then searching the sample index requires O log(nc /k) time, a
cost that must be balanced against the
O k cost of linear search within the block. Small
values of k give faster GEQ c, pos operations, but also increase the size of the sample
index, and hence the size of the CSA.
3
Representing ψ
We store the ψ function of a CSA using the UEF approach of Ottaviano and Venturini,
using a blocksize of k as the basis for both the UEF code and the sample index [9]. A
number of further enhancements to previous implementations are now described.
Independent Structures. Rather than storing the whole of ψ as a single entity split
into blocks, we treat each segment independently, and genuinely form an inverted index
for the symbols c in BWT. The σ log n-bit array C of cumulative symbol frequencies
is retained, and hence nc = C[c + 1] − C[c]. A UEF-structured postings list of dnc /ke
blocks is then created for symbol c, with its own sample index constructed from the
first (smallest) value in each of the blocks, and also represented using an EF code, with
U 0 = dlog2 ne as the universe size for this “top level” structure, and k0 = dnc /ke the
number of values to be coded within it.
One risk with this “separate structures” approach is that symbols c for which nc is
small may incur relatively high overheads; a mechanism for addressing this concern is
presented shortly. Another potential issue is the cost of the mapping needed to provide
access to the c th of these structures, given a symbol identifier c; that process is also
described in more detail later in this section.
RL Blocks. Ottaviano and Venturini [21] employ three block types, to which we add
a fourth: run-length encoded blocks (RL blocks). The NIL blocks of Ottaviano and
Venturini account for runs of k consecutive ψ values; but there are also many instances
of shorter runs that do not span a whole block. In an RL block, the (strictly positive)
gaps between consecutive ψ values are represented using the Elias δ code. Any unit
gaps are followed by a second δ code to indicate a repeat counter, while non-unit gaps
are left as is. For example, [27, 28, 29, 45, 46, 47, 48, 70, 71, 73] would be represented as
[(+1, 2), +16, (+1, 3), +22, (+1, 1), +2], with the plus symbols and parentheses indicative only, and with the sampled value 27 held in the top-level structure.
To decide whether to apply RL mode to any given block, the space that it would
consume is found by summing the lengths of the δ codes, and comparing against the
(calculated) cost of the BV and EF alternatives. Because δ is slower to decode than
EF codes, a “relative advantage” test is applied, and blocks are coded using the RL
approach only if the RL size is less than half the size of the smaller of an equivalent BV
or EF-coded block. A flag bit at the start of each block informs the decoder which mode
is in use for that block.
Low-Frequency Symbols. When σ is large it is likely that many symbols in Σ have
relatively low frequencies and hence notably different values in ψ; and having a small
number of widely-spaced values in a block that is otherwise tightly clustered increases
the cost of every codeword in the block, because of the non-adaptive nature of the EF
code. In the “separate structures” approach we are adopting, there is also a level of persegment overhead that is relatively expensive for short segments. To address this issue,
we add a further option for storing the ψ values for low-frequency symbols, and do
not build an independent UEF structure for them. For example, consider a symbol c of
frequency nc = 2. Its segment in ψ is only two symbols long, and it is far more effective
to segregate those two values into two elements of a separate array using dlog2 ne bits
each than it is to construct a UEF structure and the associated sample index. In particular,
if those two elements are within a larger array in which all of the values for all symbols
for which nc = 2 are stored, the overhead space can be kept small.
The array C has already been mentioned, it allows nc to be computed for a symbol c.
A bitvector D of size σ with Rank support is added, with D[c] = 1 if symbol c is being
stored as a full UEF structure, and D[c] = 0 if nc ≤ L for some threshold L. We use D to
map from Σ to Σ 0 = {c | nc ≤ L}. The next component required is a wavelet tree over
the values nc , where c ∈ Σ 0 , to support Rank operations and hence determine how many
symbols c0 < c in Σ 0 have nc0 = nc . Finally, a set of L arrays are maintained, one for each
symbol frequency between 1 and L. We suppose that Ai is the i th of those arrays. With
those components available, locating the segment of ψ values corresponding to symbol
c is carried out as follows. First, D[c] is accessed and nc = C[c + 1] −C[c] is determined.
If D[c] is zero, the wavelet tree is used to compute s = |{c0 | 1 ≤ c0 < c and nc0 = nc }|,
and the nc required values of ψare at Anc [nc · s . . . nc · s + nc − 1]. On the other hand, if
D[c] = 1, then s = Rank D, c, 1 is computed, and the s th of the full UEF structures is
used to access the c th segment of ψ.
In the experiments reported in the next section we take L = k, where k is the UEF
block size and also the sample interval. That is, any symbols c for which nc ≤ k and less
than one full UEF block would be required are stored in uncompressed form as binary
values in the range 0 . . . n − 1, in contiguous sections of shared arrays. Note that as a
further small optimization the groups of nc elements that collectively comprise each of
the arrays Anc could themselves be stored using EF codes when nc ≥ 2, since the EFcompressed length of each such group is both readily calculable and identical. However,
given that naturally-occurring large-alphabet frequency distributions typically have long
tails of very low symbol frequencies, the average cost of such EF codes might be close
to dlog2 ne bits per ψ value anyway, in which case we would expect the additional gains
to be modest. We leave detailed exploration of this idea for future work.
Eliminating Double Search. As described earlier, each symbol that is processed in P
gives rise to two GEQ operations over ψ. It is thus tempting to compute these via two
calls to the same function. But much of the computation between the two calls can
be
shared, and it is more efficient to perform the first GEQ call to identify GEQ c, sp , and
then perform a finger-search from that point to compute the equivalent of GEQ c, ep .
4
Experiments
Methodology and Implementation. The baselines and CSA++ are written in C++14 on
top of the SDSL library [7] and compiled with optimizations using gcc 5.2.1.3 We also
make use of Sadakane’s source code as a further reference point [23]. The experimental
results were generated using a Intel Xeon E5640 CPU using 144 GiB RAM. All timings
reported are averaged over five runs; the variance was low and all measurements lie
3
To ensure the reproducibility of our results, our complete experimental setup, including data
files, is available at github.com/mpetri/benchmark-suffix-array/.
within approximately 10% of each reported value. All space usages reported are those
of the serialized data structures on disk.
Data Sets, Queries and Test Environment. Our experiments make use of texts T from
two different sources: four 200 MiB files drawn from the Pizza&Chili corpus4 , selected
to illustrate a range of alphabet sizes σ ; plus two 2 GiB files of natural language text,
one in German, and one in Spanish. The latter were extracted from a sentence-parsed
prefix of the German and Spanish sections of the CommonCrawl5 . The four 200 MiB
Pizza&Chili files are treated as byte streams, with σ ≤ 256 in all cases; the two larger
files are parsed in to word tokens, and then those tokens mapped to integers. There were
σ = 5,039,965 distinct words (integers) in the German-language file, and σ = 2,956,209
distinct words in the Spanish-language file.
The primary query streams applied to these files were generated by randomly selecting 50,000 locations in T and extracting m = 20-character strings for the Pizza&Chili
files, and extracting m = 4-symbol/word strings for the two natural language files. This
follows the methodology adopted by other similar experimentation carried out in the
past. As secondary query streams, we also make use of the strings generated by two
specific use-cases, described later in this section, in part as a response to the concerns
explored by Moffat and Gog [17].
Pattern Search, Small Alphabets. Figure 1 depicts the relative performance of two previous CSA implementations, and a total four of FM-Index options. The method marked
CSA reflects the description of [23], as implemented in the SDSL library; it stores the
ψ function using Elias γ codes as a single stream of gaps, with the disruptive elements
at the start of each segment represented as very large values rather than as negative
gaps, and with the samples stored uncompressed. Method CSA-SADA is Sadakane’s
implementation of the same mechanism. The CSA++ is the approach described here.
We compare against two versions of each of two FM-Index approaches. The first
pair, prefixed FM-HF, use a Huffman-shaped wavelet tree (WT) for the whole BWT [15].
The first version of this approach represents the WT by an uncompressed bitvector and
a cache-friendly rank structure (FM-HF-BVIL), and seeks to provide fast querying at
the expense of memory space; the second one uses entropy-compressed bitvectors (FMHF-RRR) to represent the WT, and is at the other extreme of the space/speed tradeoff.
The second pair of FM-Indexes are based on fixed-block compression boosting, prefixed
FM-FB. The BWT is partitioned into fixed-length blocks and a WT is created for each
block. We use a recent implementation by Gog et al. [8], and plug-in an uncompressed
bitvector and rank structure (FM-FB-BVIL), and a hybrid bitvector (FM-FB-HYB) [14].
We did not have access to an implementation of another recent CSA proposal [1].
In Figure 1, index size on the horizontal axis is expressed as a percentage relative
to the original text size, which in the case of these four files, is always 200 MiB. To
measure search times, plotted on the vertical axis, the corresponding query streams were
executed in entirety to determine an nocc count for each query, and then the overall
execution time for the stream was divided by the total number of query characters, to
4
5
See http://pizzachili.dcc.uchile.cl/texts.html.
See http://data.statmt.org/ngrams/deduped/
4k
dna.200MB
proteins.200MB
dblp.xml.200MB
english.200MB
Count time per character [ns]
3k
2k
1k
0k
4k
3k
2k
1k
0k
25%
50%
75%
100%
25%
50%
75%
100%
Index size [% of original text size]
Index
CSA
CSA++
FM-HF-RRR
CSA-SADA
FM-HF-BVIL
FM-FB-BVIL
FM-FB-HYB
Fig. 1. Cost of indexed pattern search for a set of small- and medium-alphabet Pizza&Chili files,
each 200 MiB. The preferred zone is at the lower-left.
obtain a computation time per query byte. Where there is more than one point shown
for a method, the blocksize k is the parameter being varied. As can be seen from the
four graphs in the figure, in general, the best of the FM-Indexes tested were the two
FM-FB variants, and they also outperformed the two CSA implementations. The CSA++
outperforms both implementations of the earlier CSA approach on all four files.
Pattern Search, Large Alphabets. Figure 2 shows the same experiment, applied to the
large-alphabet natural-language texts. A total of six FM-Index methods suited to large
alphabets are compared to the previous CSA (the SDSL version) and the new CSA++:
an alphabet partitioned (FM-AP) index [4] which provides O(log log σ ) rank time, and
a variant FM-AP-HYB which uses a hybrid bitvector [14]; two versions of Golynski
et al.’s [10] rank structure (GMR-RS and GMR); and again a huffman shaped WT using
either a plain bitvector (FM-HF-BVIL) or a hybrid bitvectors (FM-HF-HYB). In this
environment the CSA++ dominates all of the alternative mechanisms, requiring either
substantially less space, or offering greatly improved query rates. The careful attention
paid to the representation of infrequent terms is clearly beneficial.
Figure 3 helps explain the situation. The great majority of the symbols in Σ occur
fewer than k = 128 times; indeed, 25% of them appear only once. Reducing the per-term
overhead is thus very important. However, as is shown in the right pane, those terms
are a small percentage of the ψ array, and storing them in binary is not detrimental to
overall performance.
Count time per character [ns]
german-2048
10 k
spanish-2048
5k
2k
1k
500
40%
80%
120%
160%
40%
80%
120%
160%
Index size [% of original text size]
Index
CSA
FM-AP
FM-GMR
FM-HF-BVIL
CSA++
FM-AP-HYB
FM-GMR-RS
FM-HF-HYB
Fig. 2. Cost of indexed pattern search two 2 GiB files of natural language text, parsed in to word
tokens. The preferred zone is at the lower-left. Note that the vertical axis is logarithmic.
Ψ list lengths [% of n]
Count [% of σ ]
30%
25%
20%
15%
10%
5%
0%
0
5
10
15
20
Word bucket [b]
25
30
30%
25%
20%
15%
10%
5%
0%
0
5
10
15
20
25
30
Word bucket [b]
Fig. 3. Frequency statistics for german-2048. Bucket b contains words which occur between 2b
and 2b+1 − 1 times, with bucket b = 0 covering words that occur exactly once. The left pane shows
the percentage of σ accounted for by each bucket, and the right pane the percentage of n. The
low-frequency part of each distribution (less than k = 128 word occurrences) is marked in red.
Detailed Space Breakdown. Table 1 provide details of the space required by various
components of the improved CSA, for a small-alphabet file, a mid-alphabet file, and a
large-alphabet file. The two columns associated with each of the three files show the
space required by the named component, preceded by, where appropriate, the fraction of
the values in ψ that are handled via that option. The EF-coded samples require around
1–2% of the original space; and various other access structures, including the wavelet
tree for low-nc symbols, require a further 2–3%. The four different block types play
different roles across the three files. For the DNA data, the great majority of ψ values
are included in BV blocks; for the XML data, the emphasis is on NIL blocks; and for
the word-based large-alphabet data it is EF blocks that dominate. In the latter case, a
small but important fraction of the ψ values are coded in plain binary, as shown above
in Figure 3. The effect of this alphabet partitioning is better compression for the EFcoded values, which on this file are the dominant type; confirming that this option is
Method Component
CSA++ Samples
NIL-blocks
BV-coded blocks
RL-coded blocks
EF-coded blocks
Binary values
Other structures
Total space
DNA (200 MiB)
XML (200 MiB)
German (2 GiB)
%ψ
MiB
%ψ
MiB
%ψ
MiB
–
0.2
78.0
2.5
19.3
0.0
–
–
2.3
0.0
61.7
0.2
22.6
0.0
5.9
92.7
–
62.0
10.8
14.4
12.7
0.0
–
–
3.1
0.0
5.9
4.3
20.4
0.0
4.8
38.5
–
15.7
16.4
3.8
59.6
4.4
–
–
36.8
0.0
32.1
13.6
626.3
115.5
43.0
867.2
CSA
–
91.4
–
56.7
–
1061
FM-FB-HYB
–
51.3
–
25.6
–
–
FM-HF-HYB
–
51.8
–
32.4
–
1411
FM-AP
–
–
–
–
–
903.3
FM-AP-HYB
–
–
–
–
–
778.5
Table 1. Comparing the space costs of different pattern search indexes, using a blocksize of
k = 128 throughout. The methods listed in the lower part of the table are from the SDSL library.
Note that not all of the methods are applicable to all of the files.
an important component of the large-alphabet situations handled so well by the CSA++.
Table 1 also lists the space needed by several other compressed pattern search structures,
to provide further context for these results.
Case Study, Text Factorization. The RelaRandom
RLZ factors
tive Lempel-Ziv (RLZ) compression mecha- Blocksize
CSA CSA++ CSA CSA++
nism represents a string STR as a sequence
of factors from a dictionary D, see Petri et
k = 64 1.84 0.74 1.68 0.56
al. [22] for a description and experimental re- k = 128 2.89 0.76 2.73 0.59
sults. To greedily determine longest factors
k = 256 5.10 0.88 4.90 0.73
using a CSA, we take T = Dr , the reverse of
D, and build a compressed index. The string Table 2. Per-character time in microsecis then processed against T taking symbols onds for RLZ factorization, compared to 23from STR in left-to-right order, and perform- character random patterns.
ing a backward search in T; if a prefix of length p from STR is sufficient to ensure that
the (sp, ep) range becomes empty, then the next factor emitted is of length p − 1. That
is, the factorization process can be regarded as applying variable-length patterns to a
text T, with each pattern being as short as possible without appearing in T. To carry out
an application-driven experiment, we took the 64 GiB prefix of the GOV2 document
collection used by Petri et al., and built a set of patterns, each of which is one factor, plus
the next character from STR. The first 1,901,131,365 patterns from that set, representing
4 GiB of text, were used as queries. The average factor length was 23.6 characters, with
nocc = 0 in T in all cases. We then applied those patterns to an 256 MiB dictionary D
constructed from the whole 64 GiB, to compute the per-character cost of performing the
specified searches, and compared against the per-character cost associated with search
for randomly selected patterns. Table 2 shows the cost of backward search step in both
scenarios and confirms both that CSA++ significantly outperforms CSA, and also that
for count queries, random strings are a reasonable experimental methodology.
Case Study, Language Modeling. A comRandom
NL search
mon operation on natural language files Blocksize
CSA CSA++ CSA CSA++
is to identify informative phrases as sentences are parsed [24]. We built variablek = 64 1.86 1.05 1.67 0.63
length queries for the file german-2048, and
k = 128 2.90 0.99 2.98 0.62
measured the per-symbol processing time, k = 256 5.50 0.99 5.99 0.63
comparing actual-use queries and randomlyselected-string queries for CSA and CSA++. Table 3. Per-word time in microseconds for
In total 1,521,869 queries of average length phrase search, compared to 4-word random
3.4 words were extracted from the machine patterns.
translation process described by Shareghi et al., corresponding to 40,000 sentences randomly selected from the German part of Common Crawl. Table 3 shows the cost of
those count queries over the german-2048 file. The results again align with the performance of pattern searches for random queries extracted from the text, as was shown in
Figure 2. Note in particular that CSA++ performance is largely unaffected by k, whereas
the performance of CSA substantially decreases as k increases. As pattern search is a
major part of the cost of the machine translation process described by Shareghi et al.
[24], utilizing CSA++ leads to a significant speedup in practical performance.
5
Conclusion
We have described several enhancement’s to Sadakane’s CSA, and have demonstrated
improvements both in terms of compression effectiveness, and also in terms of query
throughput for count queries, especially for large-alphabet applications. If locate queries
are also required, all of the structures explored here must be augmented with SA samples,
to allow (sp, ep) ranges to be converted to offsets in T; as future work, we plan to
investigate space-speed tradeoffs in that regard as well.
Acknowledgment. This work was supported under Australian Research Council’s Discovery Projects funding scheme (project number DP140103256).
References
[1]
[2]
[3]
[4]
R. Agarwal, A. Khandelwal, and I. Stoica. “Succinct: Enabling Queries on Compressed
Data”. In: USENIX Symp. Networked Systems Design and Impl. 2015, pp. 337–350.
V. N. Anh and A. Moffat. “Compressed Inverted Files with Reduced Decoding Overheads”.
In: Proc. ACM SIGIR Int. Conf. Information Retrieval. 1998, pp. 290–297.
A. Apostolico, M. Crochemore, M. Farach-Colton, Z. Galil, and S. Muthukrishnan. “Forty
Years of Suffix Trees”. In: C. ACM 59.4 (Mar. 2016), pp. 66–73.
J. Barbay, T. Gagie, G. Navarro, and Y. Nekrich. “Alphabet Partitioning for Compressed
Rank/Select and Applications”. In: Proc. Int. Symp. Alg. and Comp. 2010, pp. 315–326.
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
P. Ferragina and G. Manzini. “Opportunistic Data Structures with Applications”. In: Proc.
IEEE Symp. Foundations of Comp. Science. 2000, pp. 390–398.
P. Ferragina, R. González, G. Navarro, and R. Venturini. “Compressed Text Indexes: From
Theory to Practice”. In: J. Exp. Alg. 13 (2008).
S. Gog, T. Beller, A. Moffat, and M. Petri. “From Theory to Practice: Plug and Play with
Succinct Data Structures”. In: Proc. Symp. Experimental Alg. 2014, pp. 326–337.
S. Gog, J. Kärkkäinen, D. Kempa, M. Petri, and S. J. Puglisi. “Faster, Minuter”. In: Proc.
Data Compression Conf. 2016, pp. 53–62.
S. Gog, G. Navarro, and M. Petri. “Improved and Extended Locating Functionality on
Compressed Suffix Arrays”. In: J. Discrete Alg. 32 (2015), pp. 53–63.
A. Golynski, J. I. Munro, and S. S. Rao. “Rank/Select Operations on Large Alphabets: A
Tool for Text Indexing”. In: Proc. ACM-SIAM Symp. Discrete Alg. 2006, pp. 368–373.
R. Grossi, A. Gupta, and J. S. Vitter. “High-Order Entropy-Compressed Text Indexes”. In:
Proc. ACM-SIAM Symp. Discrete Alg. 2003, pp. 841–850.
R. Grossi and J. S. Vitter. “Compressed Suffix Arrays and Suffix Trees with Applications
to Text Indexing and String Matching”. In: Proc. ACM Symp. Theory of Comput. 2000,
pp. 397–406.
H. Huo, L. Chen, J. S. Vitter, and Y. Nekrich. “A Practical Implementation of Compressed
Suffix Arrays with Applications to Self-Indexing”. In: Proc. Data Compression Conf.
2014, pp. 292–301.
J. Kärkkäinen, D. Kempa, and S. J. Puglisi. “Hybrid Compression of Bitvectors for the
FM-Index”. In: Proc. Data Compression Conf. 2014, pp. 302–311.
V. Mäkinen and G. Navarro. “Succinct Suffix Arrays Based on Run-Length Encoding”. In:
Proc. Symp. Combinatorial Pattern Matching. 2005, pp. 45–56.
U. Manber and G. W. Myers. “Suffix Arrays: A New Method For On-Line String Searches”.
In: SIAM J. Comp. 22.5 (1993), pp. 935–948.
A. Moffat and S. Gog. “String Search Experimentation Using Massive Data”. In: Philosophical Trans. Royal Society A 372.8 (2014).
A. Moffat and A. Turpin. Compression and Coding Algorithms. Boston, MA: Kluwer
Academic Publishers, 2002.
G. Navarro and V. Mäkinen. “Compressed Full-Text Indexes”. In: ACM Comp. Surveys
39.1 (2007).
D. Okanohara and K. Sadakane. “Practical Entropy-Compressed Rank/Select Dictionary”.
In: Proc. Wkshp. Alg. Engineering and Experiments. 2007.
G. Ottaviano and R. Venturini. “Partitioned Elias-Fano Indexes”. In: Proc. ACM SIGIR Int.
Conf. Information Retrieval. 2014, pp. 273–282.
M. Petri, A. Moffat, P. C. Nagesh, and A. Wirth. “Access Time Tradeoffs in Archive
Compression”. In: Proc. Asian IR Societies Conf. 2015, pp. 15–28.
K. Sadakane. “New Text Indexing Functionalities of the Compressed Suffix Arrays”. In: J.
Alg. 48.2 (2003), pp. 294–313.
E. Shareghi, M. Petri, G. Haffari, and T. Cohn. “Compact, Efficient and Unlimited Capacity:
Language Modeling with Compressed Suffix Trees”. In: Proc. Conf. Empirical Methods
in Natural Language Proc. 2015, pp. 2409–2418.
S. Vigna. “Quasi-Succinct Indices”. In: Proc. ACM Conf. Web Search & Data Min. 2013,
pp. 83–92.
P. Weiner. “Linear Pattern Matching Algorithms”. In: Proc. SWAT. 1973, pp. 1–11.
Appendix
Details of Implementations
Table 4 provides details of the methods compared in Section 4. The CSA-SADA results
were obtained by executing code authored by Kunihiko Sadakane, available from the
Pizza&Chili web site.
Abbreviation
CSA
FM-HF-BVIL
FM-HF-HYB
FM-HF-RRR
FM-AP
FM-AP-HYB
FM-GMR
FM-GMR-RS
FM-FB-BVIL
FM-FB-HYB
CSA++
Composition
csa_sada<enc_vector<coder::elias_gamma,sΨ >,
1<<20,1<<20,sa_order_sa_sampling<>,isa_sampling<>>
csa_wt<wt_huff<bit_vector_il<bs>>,1<<20,1<<20>
csa_wt<wt_huff<hyb_vector<>>,1<<20,1<<20>
csa_wt<wt_huff<rrr_vector<b>>,1<<20,1<<20>
csa_wt_int<wt_ap< wt_huff<bit_vector,rank_support_v5<1>,
select_support_scan<1>,select_support_scan<0>>,
wm_int<bit_vector,rank_support_v5<1>,
select_support_scan<1>,select_support_scan<0>>>,
1<<20,1<<20>
csa_wt_int<wt_ap< wt_huff<hyb_vector<>>,
wm_int<hyb_vector<>> >,1<<20,1<<20>
csa_wt_int<wt_gmr<>,1<<20,1<<20>
csa_wt_int<wt_gmr_rs<>,1<<20,1<<20>
csa_wt<wt_fbb<bit_vector_il<bs>>,1<<20,1<<20>
csa_wt<wt_fbb<hyb_vector<>>,1<<20,1<<20>
csa_sada2<hyb_sd_vector<s>,1<<20,1<<20,
sa_order_sa_sampling<>,isa_sampling<>>
Table 4. SDSL descriptions of methods used in experiments. Sampling parameters b ∈
{15, 31, 63, 127}, bs ∈ {128, 256, 512, 1024}, s ∈ {16, 32, 64, 128, 256, 512, 1024}, and sΨ ∈
{16, 32, 64, 128, 512, 1024} were varied in the experiments to get different time-space trade-offs.
The last three class definitions are available in the hyb_sd_vector branch of the library.
| 8cs.DS
|
The Refinement Calculus of Reactive Systems∗
Viorel Preoteasa
Iulia Dragomir
Stavros Tripakis
arXiv:1710.03979v2 [cs.LO] 8 Feb 2018
February 9, 2018
Abstract
The Refinement Calculus of Reactive Systems (RCRS) is a compositional formal framework for modeling and reasoning about reactive systems. RCRS provides a language which allows to describe atomic
components as symbolic transition systems or QLTL formulas, and composite components formed using
three primitive composition operators: serial, parallel, and feedback. The semantics of the language
is given in terms of monotonic property transformers, an extension to reactive systems of monotonic
predicate transformers, which have been used to give compositional semantics to sequential programs.
RCRS allows to specify both safety and liveness properties. It also allows to model input-output systems
which are both non-deterministic and non-input-receptive (i.e., which may reject some inputs at some
points in time), and can thus be seen as a behavioral type system. RCRS provides a set of techniques
for symbolic computer-aided reasoning, including compositional static analysis and verification. RCRS
comes with a publicly available implementation which includes a complete formalization of the RCRS
theory in the Isabelle proof assistant.
Contents
1 Introduction
1.1 Novel contributions of this paper and relation to our prior work . . . . . . . . . . . . . . . . .
3
4
2 Preliminaries
5
3 Language
3.1 An Algebra of Components . . . . . . . . . . . .
3.2 Symbolic Transition System Components . . . .
3.2.1 General STS Components . . . . . . . . .
3.2.2 Variable Name Scope . . . . . . . . . . .
3.2.3 Stateless STS Components . . . . . . . .
3.2.4 Deterministic STS Components . . . . . .
3.2.5 Stateless Deterministic STS Components
3.3 Quantified Linear Temporal Logic Components .
3.3.1 QLTL . . . . . . . . . . . . . . . . . . . .
3.3.2 QLTL Components . . . . . . . . . . . . .
3.4 Well Formed Composite Components . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
6
6
7
7
9
10
10
11
11
12
13
14
∗ The bulk of this work was done while Preoteasa and Dragomir were at Aalto University. Preoteasa is currently at Space
Systems Finland. Dragomir is currently at Verimag. Tripakis is affiliated with Aalto University and the University of California
at Berkeley. This work was partially supported by the Academy of Finland and the U.S. National Science Foundation (awards
#1329759 and #1139138). Dragomir was supported during the writing of this paper by the Horizon 2020 Programme Strategic
Research Cluster (grant agreement #730080 and #730086).
1
4 Semantics
4.1 Monotonic Property Transformers . . . . . . . . . . . . . . . . . . . . . . . . .
4.1.1 Some Commonly Used MPTs . . . . . . . . . . . . . . . . . . . . . . . .
4.1.2 Operators on MPTs: Function Composition, Product, and Fusion . . .
4.1.3 Novel Operators Used in Semantical Definition of Feedback . . . . . . .
4.1.4 Refinement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 Subclasses of MPTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2.1 Relational MPTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2.2 Guarded MPTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2.3 Other subclasses and overview . . . . . . . . . . . . . . . . . . . . . . .
4.3 Semantics of Components as MPTs . . . . . . . . . . . . . . . . . . . . . . . . .
4.3.1 Example: Two Alternative Derivations of the Semantics of Diagram Sum
4.3.2 Characterization of Legal Input Traces . . . . . . . . . . . . . . . . . . .
4.3.3 Semantic Equivalence and Refinement for Components . . . . . . . . . .
4.3.4 Compositionality Properties . . . . . . . . . . . . . . . . . . . . . . . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
of Fig.
. . . .
. . . .
. . . .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
2.
. .
. .
. .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
15
15
15
17
17
18
19
19
20
20
21
22
23
24
24
5 Symbolic Reasoning
5.1 Symbolic Transformation of STS Components to QLTL Components . . . . . . . . . . . . . .
5.2 Symbolic Transformations of Special Atomic Components to More General Atomic Components
5.3 Symbolic Computation of Serial Composition . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1 Symbolic Serial Composition of Two QLTL Components . . . . . . . . . . . . . . . . .
5.3.2 Symbolic Serial Composition of Two General STS Components . . . . . . . . . . . . .
5.3.3 Symbolic Serial Composition of Two Stateless STS Components . . . . . . . . . . . .
5.3.4 Symbolic Serial Composition of Two Deterministic STS Components . . . . . . . . . .
5.3.5 Symbolic Serial Composition of Two Stateless Deterministic STS Components . . . .
5.3.6 Symbolic Serial Composition of Two Arbitrary Atomic Components . . . . . . . . . .
5.3.7 Correctness of Symbolic Serial Composition . . . . . . . . . . . . . . . . . . . . . . . .
5.4 Symbolic Computation of Parallel Composition . . . . . . . . . . . . . . . . . . . . . . . . . .
5.4.1 Symbolic Parallel Composition of Two QLTL Components . . . . . . . . . . . . . . .
5.4.2 Symbolic Parallel Composition of Two General STS Components . . . . . . . . . . . .
5.4.3 Symbolic Parallel Composition of Two Stateless STS Components . . . . . . . . . . .
5.4.4 Symbolic Parallel Composition of Two Deterministic STS Components . . . . . . . . .
5.4.5 Symbolic Parallel Composition of Two Stateless Deterministic STS Components . . .
5.4.6 Symbolic Parallel Composition of Two Arbitrary Atomic Components . . . . . . . . .
5.4.7 Correctness of Symbolic Parallel Composition . . . . . . . . . . . . . . . . . . . . . . .
5.5 Symbolic Computation of Feedback Composition for Decomposable Deterministic STS Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.5.1 Decomposable Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.5.2 Symbolic Feedback of a Decomposable Deterministic STS Component . . . . . . . . .
5.5.3 Symbolic Feedback of a Decomposable Stateless Deterministic STS Component . . . .
5.5.4 Correctness of Symbolic Feedback Composition . . . . . . . . . . . . . . . . . . . . . .
5.6 Closure Properties of MPT Subclasses w.r.t. Composition Operators . . . . . . . . . . . . . .
5.7 Symbolic Simplification of Arbitrary Composite Components . . . . . . . . . . . . . . . . . .
5.7.1 Deterministic and Algebraic Loop Free Composite Components . . . . . . . . . . . . .
5.7.2 Correctness of the Simplification Algorithm . . . . . . . . . . . . . . . . . . . . . . . .
5.8 Checking Validity and Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.9 Checking Input-Receptiveness and Computing Legal Inputs Symbolically . . . . . . . . . . .
5.10 Checking Refinement Symbolically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
25
26
27
27
28
28
28
28
28
28
29
30
30
30
30
30
30
30
6 Toolset and Case Studies
39
7 Related Work
41
2
31
31
31
31
31
32
32
33
34
36
37
37
8 Conclusion
1
43
Introduction
This paper presents the Refinement Calculus of Reactive Systems (RCRS), a comprehensive framework for
compositional modeling of and reasoning about reactive systems. RCRS originates from the precursor theory
of synchronous relational interfaces [78, 79], and builds upon the classic refinement calculus [10]. A number
of conference publications on RCRS exist [66, 31, 67, 65, 33]. This paper collects some of these results and
extends them in significant ways. The novel contributions of this paper and relation to our previous work
are presented in §1.1.
The motivation for RCRS stems from the need for a compositional treatment of reactive systems. Generally speaking, compositionality is a divide-and-conquer principle. As systems grow in size, they grow in
complexity. Therefore dealing with them in a monolithic manner becomes unmanageable. Compositionality
comes to the rescue, and takes many forms. Many industrial-strength systems have employed for many years
mechanisms for compositional modeling. An example is the Simulink tool from the Mathworks. Simulink is
based on the widespread notation of hierarchical block diagrams. Such diagrams are both intuitive, and naturally compositional: a block can be refined into sub-blocks, sub-sub-blocks, and so on, creating hierarchical
models of arbitrary depth. This allows the user to build large models (many thousands of blocks) while at
the same time managing their complexity (at any level of the hierarchy, only a few blocks may be visible).
But Simulink’s compositionality has limitations, despite its hierarchical modeling approach. Even relatively simple problems, such as the problem of modular code generation (generating code for a block
independently from context) require techniques not always available in standard code generators [53, 52].
Perhaps more serious, and more relevant in the context of this paper, is Simulink’s lack of formal semantics, and consequent lack of rigorous analysis techniques that can leverage the advances in the fields of
computer-aided verification and programming languages.
RCRS provides a compositional formal semantics for Simulink in particular, and hierarchical block diagram notations in general, by building on well-established principles from the formal methods and programming language domains. In particular, RCRS relies on the notion of refinement (and its counterpart,
abstraction) which are both fundamental in system design. Refinement is a binary relation between components, and ideally characterizes substitutability: the conditions under which some component can replace
another component, without compromising the behavior of the overall system. RCRS refinement is compositional in the sense that it is preserved by composition: if A0 refines A and B 0 refines B, then the composition
of A0 and B 0 refines the composition of A and B.
RCRS can be viewed as a refinement theory. It can also be viewed as a behavioral type system, similar to
type systems for programming languages, but targeted to reactive systems. By behavioral we mean a type
system that can capture not just data types of input and output ports of components (bool, int, etc.), but
also complete specifications of the behavior of those components. As discussed more extensively in [79], such
a behavioral type system has advantages over a full-blown verification system, as it is more lightweight: for
instance, it allows type checking, which does not require the user to provide a formal specification of the
properties that the model must satisfy, the model must simply type-check.
To achieve this, it is essential, as argued in [79], for the framework to be able to express non-inputreceptive (also called non-input-enabled or non-input-complete) components, i.e., components that reject
some input values. RCRS allows this. For example, a square-root component can be described√in RCRS
alternatively as: (1) a non-input-receptive component C1 with input-output contract x ≥ 0 ∧ y = x (where
x, y are the input
√ and output variables, respectively); or (2) an input-receptive component C2 with contract
x ≥ 0 → y = x. Simple examples of type-checking in the RCRS context are the following: Connecting the
non-input-receptive square-root component C1 to a component which outputs x = −1 results in a type error
(incompatibility). Connecting C1 to a non-deterministic component which outputs an arbitrary value for x
(this can be specified by the formula/contract true) also results in a type error. Yet, in both of the above
cases C2 will output a non-deterministically chosen value, even though the input constraint is not satisfied.
RCRS allows both non-input-receptive and non-deterministic components. This combination results in a
3
game-theoretic interpretation of the composition operators, like in interface theories [22, 79]. Refinement also
becomes game-theoretic, as in alternating refinement [7]. Game-theoretic composition can be used for an
interesting form of type inference. For example, if we connect the non-input-receptive square-root component
C1 above to a non-deterministic component C3 with input-output contract x ≥ u + 1 (where x is the output
of C3 , and u its input), and apply the (game-theoretic) serial composition of RCRS, we obtain the condition
u ≥ −1 on the external input of the overall composition. The constraint u ≥ −1 represents the weakest
condition on u which ensures compatibility of the connected components.
In a nutshell, RCRS consists of the following elements:
1. A modeling language (syntax), which allows to describe atomic components, and composite components
formed by a small number of primitive composition operators (serial, parallel, and feedback). The
language is described in §3.
2. A formal semantics, presented in §4. Component semantics are defined in terms of monotonic property
transformers (MPTs). MPTs are extensions of monotonic predicate transformers used in theories of
programming languages, and in particular in refinement calculus [10]. Predicate transformers transform
sets of post-states (states reached by the program after its computation) into sets of pre-states (states
where the program begins). Property transformers transform sets of a component’s output traces
(infinite sequences of output values) into sets of input traces (infinite sequences of input values). Using
this semantics we can express both safety and liveness properties.
3. A set of symbolic reasoning techniques, described in §5. In particular, RCRS offers techniques to
• compute the symbolic representation of a composite component from the symbolic representations
of its sub-components;
• simplify composite components into atomic components;
• reduce checking refinement between two components to checking satisfiability of certain logical
formulas;
• reduce input-receptiveness and compatibility checks to satisfiability;
• compute the legal inputs of a component symbolically.
We note that these techniques are for the most part logic-agnostic, in the sense that they do not depend
on the particular logic used to represent components.
4. A toolset, described briefly in §6. The toolset consists mainly of:
• a full implementation of the RCRS theory in the Isabelle proof assistant [61];
• a translator of Simulink diagrams into RCRS code.
Our implementation is open-source and publicly available from http://rcrs.cs.aalto.fi.
1.1
Novel contributions of this paper and relation to our prior work
Several of the ideas behind RCRS originated in the theory of synchronous relational interfaces [78, 79]. The
main novel contributions of RCRS w.r.t. that theory are: (1) RCRS is based on the semantic foundation
of monotonic property transformers, whereas relational interfaces are founded on relations; (2) RCRS can
handle liveness properties, whereas relational interfaces can only handle safety; (3) RCRS has been completely
formalized and most results reported in this and other RCRS papers have been proven in the Isabelle proof
assistant; (4) RCRS comes with a publicly available toolset (http://rcrs.cs.aalto.fi) which includes
the Isabelle formalization, a Translator of Simulink hierarchical block diagrams [31, 33], and a Formal
Analyzer which performs, among other functions, compatibility checking, refinement checking, and automatic
simplification of RCRS contracts.
4
RCRS was introduced in [66], which focuses on monotonic property transformers as a means to extend
relational interfaces with liveness properties. [66] covers serial composition, but not parallel nor feedback. It
also does not cover symbolic reasoning nor the RCRS implementation. Feedback is considered in [67], whose
aim is in particular to study instantaneous feedback for non-deterministic and non-input-receptive systems.
The study of instantaneous feedback is an interesting problem, but beyond the scope of the current paper.
In this paper we consider non-instantaneous feedback, i.e., feedback for systems without same-step cyclic
dependencies (no algebraic loops).
[31] presents part of the RCRS implementation, focusing on the translation of Simulink (and hierarchical
block diagrams in general) into an algebra of components with three composition primitives, serial, parallel,
and feedback, like RCRS. As it turns out, there is not a unique way to translate a graphical notation like
Simulink into an algebraic formalism like RCRS. The problem of how exactly to do it and what are the
trade-offs is an interesting one, but beyond the scope of the current paper. This problem is studied in
depth in [31] which proposes three different translation strategies and evaluates their pros and cons. [31]
leaves open the question whether the results obtained by the different translations are equivalent. [64] settles
this question, by proving that a class of translations, including the ones proposed in [31] are semantically
equivalent for any input block diagram. [65] also concerns the RCRS implementation, discussing solutions
to subtle typing problems that arise when translating Simulink diagrams into RCRS/Isabelle code.
In summary, the current paper does not cover the topics covered in [31, 64, 65, 67] and can be seen as a
significantly revised and extended version of [66]. The main novel contributions with respect to [66] are the
following: (1) a language of components (§3); (2) a revised MPT semantics (§4), including in particular novel
operators for feedback (§4.1.3) and a classification of MPT subclasses (§4.2); (3) a new section of symbolic
reasoning (§5).
2
Preliminaries
Sets, types. We use capital letters X, Y , Σ, . . . to denote types or sets, and small letters to denote
elements of these types x ∈ X, y ∈ Y , etc. We denote by B the type of Boolean values true and false. We
use ∧, ∨, ⇒, and ¬ for the Boolean operations. The type of natural numbers is denoted by N, while the
type of real numbers is denoted by R. The Unit type contains a single element denoted ().
Cartesian product. For types X and Y , X × Y is the Cartesian product of X and Y , and if x ∈ X and
y ∈ Y , then (x, y) is a tuple from X × Y . The empty Cartesian product is Unit. We assume that we have
only flat products X1 × . . . × Xn , and then we have
(X1 × . . . × Xn ) × (Y1 × . . . × Ym ) = X1 × . . . × Xn × Y1 × . . . × Ym
Functions. If X and Y are types, X → Y denotes the type of functions from X to Y . The function type
constructor associates to the right (e.g., X → Y → Z = X → (Y → Z)) and the function interpretation
associates to the left (e.g., f (x)(y) = (f (x))(y)). In order to construct functions we use lambda notation,
e.g., (λx, y : x + y + 1) : N → N → N. Similarly, we can have tuples in the definition of functions, e.g.,
(λ(x, y) : x + y + 2) : (N × N) → N. The composition of two functions f : X → Y and g : Y → Z, is a
function denoted g ◦ f : X → Z, where (g ◦ f )(x) = g(f (x)).
Predicates. A predicate is a function returning Boolean values, e.g., p : X → Y → B, p(x)(y) = (x = y).
We define the smallest predicate ⊥ : X → B where ⊥(x) = false for all x ∈ X. The greatest predicate is
> : X → B, with >(x) = true for all x ∈ X. We will often interpret predicates as sets. A predicate p : X → B
can be viewed as the set of all x ∈ X such that p(x) = true. For example, viewing two predicates p, q as sets,
we can write p ⊆ q, meaning that for all x, p(x) ⇒ q(x).
5
Relations. A relation is a predicate with at least two arguments, e.g., r : X → Y → B. For such a relation
r, we denote by in(r) : X → B the predicate in(r)(x) = (∃y : r(x)(y)). If the relation r has more than two
arguments, then we define in(r) similarly by quantifying over the last argument.
We extend point-wise all operations on Booleans to operations on predicates and relations. For example,
if r, r0 : X → Y → B are two relations, then r ∧ r0 and r ∨ r0 are the relations given by (r ∧ r0 )(x)(y) =
r(x)(y) ∧ r0 (x)(y) and (r ∨ r0 )(x)(y) = r(x)(y) ∨ r0 (x)(y). We also introduce the order on relations r ⊆ r0 =
(∀x, y : r(x)(y) ⇒ r0 (x)(y)).
The composition of two relations r : X → Y → B and r0 : Y → Z → B is a relation (r ◦ r0 ) : X → Z → B,
where (r ◦ r0 )(x)(z) = (∃y : r(x)(y) ∧ r0 (y)(z)).
Infinite sequences. If Σ is a type, then Σω = (N → Σ) is the set of all infinite sequences over Σ, also
called traces. For a trace σ ∈ Σω , let σi = σ(i) be the i-th element in the trace. Let σ i ∈ Σω denote the
suffix of σ starting from the i-th step, i.e., σ i = σi σi+1 · · · . We often view a pair of traces (σ, σ 0 ) ∈ Σω × Σ0ω
as being also a trace of pairs (λi : (σi , σi0 )) ∈ (Σ × Σ0 )ω .
Properties. A property is a predicate p over a set of infinite sequences. Formally, p ∈ (Σω → B). Just
like any other predicate, a property can also be viewed as a set. In particular, a property can be viewed as
a set of traces.
3
Language
3.1
An Algebra of Components
We model systems using a simple language of components. The grammar of the language is as follows:
component
atomic component
STS component
::=
::=
::=
composite component
::=
atomic component | composite component
STS component | QLTL component
GEN STS component | STATELESS STS component
| DET STS component | DET STATELESS STS component
component ; component | component k component | fdbk(component)
The elements of the above grammar are defined in the remaining of this section, where examples are
also given to illustrate the language. In a nutshell, the language contains atomic components of two kinds:
atomic components defined as symbolic transition systems (STS component), and atomic components defined
as QLTL formulas over input and output variables (QLTL component).
STS components are split in four categories: general STS components, stateless STS components, deterministic STS components, and deterministic stateless STS components. Semantically, the general STS
components subsume all the other more specialized STS components, but we introduce the specialized syntax
because symbolic compositions of less general components become simpler, as we shall explain in the sequel
(see §5).
Also, as it turns out, atomic components of our framework form a lattice, shown in Fig. 5, from the
more specialized ones, namely, deterministic stateless STS components, to the more general ones, namely
QLTL components. The full definition of this lattice will become apparent once we provide a symbolic
transformation of STS to QLTL components, in §5.1.
Apart from atomic components, the language also allows to form composite components, by composing
(atomic or other composite) components via three composition operators: serial ;, parallel k, and feedback
fdbk, as depicted in Fig. 1. The serial composition of two components C, C 0 is formed by connecting the
output(s) of C to the input(s) of C 0 . Their parallel composition is formed by “stacking” the two components
on top of each other without forming any new connections. The feedback of a component C is obtained by
connecting the first output of C to its first input.
Our language is inspired by graphical notations such as Simulink, and hierarchical block diagrams in
general. But our language is textual, not graphical. An interesting question is how to translate a graphical
6
x
x
y
C
y
C
0
z
u
(a) Serial composition: C ; C 0
y
x1
C
x2
..
.
v
C0
(b) Parallel composition: C k C 0
y1
C
y2
..
.
(c) Feedback composition: fdbk(C)
Figure 1: The three composition operators of RCRS.
block diagram into a term in our algebra. We will not address this question here, as the issue is quite
involved. We refer the reader to [31], which includes an extensive discussion on this topic. Suffice it to say
here that there are generally many possible translations of a graphical diagram into a term in our algebra (or
generally any algebra that contains primitive serial, parallel, and feedback composition operators). These
translations achieve different tradeoffs in terms of size, readability, computational properties, and so on.
See [31] for details.
1
1
In
z
Add
UnitDelay
1
Out
Figure 2: A Simulink diagram modeling the 1-step delayed sum of its input In. Each atomic block as well as
the entire system can be formalized as STS components (see §3.2). The entire system can also be formalized
as a composite component (see below).
As an example, consider the Simulink diagram shown in Fig. 2. This diagram can be represented in our
language as a composite component Sum defined as
Sum = fdbk(Add ; UnitDelay ; Split)
where Add, UnitDelay, and Split are atomic components (for a definition of these atomic components see
§3.2). Here Split models the “fan-out” element in the Simulink diagram (black bullet) where the output
wire of UnitDelay splits in two wires going to Out and back to Add.1
3.2
Symbolic Transition System Components
We introduce all four categories of STS components and at the same time provide syntactic mappings from
specialized STS components to general STS components.
3.2.1
General STS Components
A general symbolic transition system component (general STS component) is a transition system described
symbolically, with Boolean expressions over input, output, state, and next state variables defining the initial
states and the transition relation. When we say “Boolean expression” (here and in the definitions that
follow) we mean an expression of type B, in some arbitrary logic, not necessarily restricted to propositional
logic. For example, if x is a variable of numerical type, then x > 0 is a Boolean expression. In the definition
that follows, s0 denotes the primed, or next state variable, corresponding to the current state variable s. Both
1 Note that the Simulink input and output ports In and Out are not explicitly represented in Sum. They are represented
implicitly: In corresponds to the second input of Add, which carries over as the unique external input of Sum (thus, Sum is an
“open system” in the sense that it has open, unconnected, inputs); Out corresponds to the second output of Split, which carries
over as the unique external output of Sum.
7
can be vectors of variables. For example, if s = (s1 , s2 ) then s0 = (s01 , s02 ). We assume that s0 has the same
type as s.
Definition 1 (STS component). A (general) STS component is a tuple
sts(x : Σx , y : Σy , s : Σs , init exp : B, trs exp : B)
where x, y, s are input, output and state variables (or tuples of variables) of types Σx , Σy , Σs , respectively,
init exp is a Boolean expression on s (in some logic), and trs exp is a Boolean expression on x, y, s, s0 (in
some logic).
Intuitively, an STS component is a non-deterministic system which for an infinite input sequence σx ∈ Σω
x
produces as output an infinite sequence σy ∈ Σω
y . The system starts non-deterministically at some state
σs (0) satisfying init exp. Given first input σx (0), the system non-deterministically computes output σy (0)
and next state σs (1) such that trs exp holds (if no such values exist, then the input σx (0) is illegal, as
discussed in more detail below). Next, it uses the following input σx (1) and state σs (1) to compute σy (1)
and σs (2), and so on.
We will sometimes use the term contract to refer to the expression trs exp. Indeed, trs exp can be seen
as specifying a contract between the component and its environment, in the following sense. At each step in
the computation, the environment must provide input values that do not immediately violate the contract,
i.e., for which we can find values for the next state and output variables to satisfy trs exp. Then, it is the
responsibility of the component to find such values, otherwise it is the component’s “fault” if the contract
is violated. This game-theoretic interpretation is similar in spirit with the classic refinement calculus for
sequential programs [10].
We use Σx , Σy , Σs in the definition above to emphasize the types of the input, output and the state, and
the fact that, when composing components, the types should match. However, in practice we often omit the
types, unless they are required to unambiguously specify a component. Also note that the definition does not
fix the logic used for the expressions init exp and trs exp. Indeed, our theory and results are independent
from the choice of this logic. The choice of logic matters for algorithmic complexity and decidability. We
will return to this point in §5. Finally, for simplicity, we often view the formulas init exp and trs exp as
semantic objects, namely, as predicates. Adopting this view, init exp becomes the predicate init : Σs → B,
and trs exp the predicate trs exp : Σs → Σx → Σs → Σy → B. Equivalently, trs exp can be interpreted as
a relation trs exp : (Σs × Σx ) → (Σs × Σy ) → B.
Throughout this paper we assume that init exp is satisfiable, meaning that there is at least one valid
initial state.
Examples. In the examples provided in this paper, we often specify systems that have tuples as input,
state and output variables, in different equivalent ways. For example, we can introduce a general STS
component with two inputs as sts((n : N, x : R), s : R, y : R, s > 0, s0 > s ∧ y + s = xn ), but also as
sts((n, x) : N × R, s : R, y : R, s > 0, s0 > s ∧ y + s = xn ), or sts(z : N × R, y : R, s : R, s > 0, s0 > s ∧ y + s =
snd(z)fst(z) ), where fst and snd return the first and second elements of a pair.
Let us model a system that at every step i outputs the input received at previous step i − 1 (assume
that the initial output value is 0). This corresponds to Simulink’s commonly used UnitDelay block, which
is also modeled in the diagram of Fig. 2. This block can be represented by an STS component, where a state
variable s is needed to store the input at moment i such that it can be used at the next step. We formally
define this component as
UnitDelay = sts(x, y, s, s = 0, y = s ∧ s0 = x).
We use first-order logic to define init exp and trs exp. Here init exp is s = 0, which initializes the state
variable s with the value 0. The trs exp is y = s ∧ s0 = x, that is at moment i the current state variable s
which stores the input x received at moment i − 1 is outputed and its value is updated.
As another example, consider again the composite component Sum modeling the diagram of Fig. 2. Sum
could also be defined as an atomic STS component:
Sum = sts(x, y, s, s = 0, y = s ∧ s0 = s + x).
8
In §5 we will show how we can automatically and symbolically simplify composite component terms such
as fdbk(Add ; UnitDelay ; Split), to obtain syntactic representations of atomic components such as the one
above.
These examples illustrate systems coming from Simulink models. However, our language is more general,
and able to accommodate the description of other systems, such as state machines à la nuXmv [16], or
input/output automata [54]. In fact, both UnitDelay and Sum are deterministic, so they could also be
defined as deterministic STS components, as we will see below. Our language can capture non-deterministic
systems easily. An example of a non-deterministic STS component is the following:
C = sts(x, y, s, s = 0, x + s ≤ y).
For an input sequence σx ∈ Nω , C outputs a non-deterministically chosen sequence σy such that the transition
expression x + s ≤ y is satisfied. Since there is no formula in the transition expression tackling the next state
variable, this is updated also non-deterministically with values from N.
Our language can also capture non-input-receptive systems, that is, systems which disallow some input
values as illegal. For instance, a component performing division, but disallowing division by zero, can be
specified as follows:
x
Div = sts((x, y), z, (), true, y 6= 0 ∧ z = ).
y
Note that Div has an empty tuple of state variables, s = (). Such components are called stateless, and are
introduced in the sequel.
Even though RCRS is primarily a discrete-time framework, we have used it to model and verify continuoustime systems such as those modeled in Simulink (see §6). We do this by discretizing time using a time step
parameter ∆t > 0 and applying Euler numerical integration. Then, we can model Simulink’s Integrator
block in RCRS as an STS component parameterized by ∆t:
Integrator∆t
= sts x, y, s, s = 0, y = s ∧ s0 = s + x · ∆t
More complex dynamical system blocks can be modeled in a similar fashion. For instance, Simulink’s
Transfer Fcn block, with transfer function
s2 + 2
0.5s2 + 2s + 1
can be modeled in RCRS as the following STS component parameterized by ∆t:
TransferFcn∆t
where
= sts x, y, (s1 , s2 ), s1 = 0 ∧ s2 = 0, trs)
trs =
(y = −8 · s1 + 2 · x) ∧
(s01 = s1 + (−4 · s1 − 2 · s2 + x) · ∆t) ∧
(s02 = s2 + s1 · ∆t)
3.2.2
Variable Name Scope
We remark that variable names in the definition of atomic components are local. This holds for all atomic
components in the language of RCRS (including STS and QLTL components, defined in the sequel). This
means that if we replace a variable with another one in an atomic component, then we obtain a semantically equivalent component. For example, the two STS components below are equivalent (the semantical
equivalence symbol ≡ will be defined formally in Def. 20, once we define the semantics):
sts((x, y), z, s, s > 0, z > s + x + y) ≡ sts((u, v), w, t, t > 0, w > t + u + v)
9
3.2.3
Stateless STS Components
A special STS component is one that has no state variables:
Definition 2 (Stateless STS component). A stateless STS component is a tuple
C = stateless(x : Σx , y : Σy , io exp : B)
where x, y are the input and output variables, and io exp is a Boolean expression on x and y. Stateless STS
components are special cases of general STS components, as defined by the mapping stateless2sts:
stateless2sts(C) = sts(x, y, (), true, io exp).
Examples. A trivial stateless STS component is the one that simply transfers its input to its output (i.e.,
a “wire”). We denote such a component by Id, and we formalize it as
Id = stateless(x, y, y = x).
Another simple example is a component with no inputs and a single output, which always outputs a
constant value c (of some type). This can be formalized as the following component parameterized by c:
Constc = stateless((), y, y = c).
Component Add from Fig. 2, which outputs the sum of its two inputs, can be modeled as a stateless STS
component:
Add = stateless((x, y), z, z = x + y).
Component Split from Fig. 2 can also be modeled as a stateless STS component:
Split = stateless(x, (y, z), y = x ∧ z = x).
The Div component introduced above is stateless, and therefore can be also specified as follows:
x
.
Div = stateless (x, y), z, y 6= 0 ∧ z =
y
The above examples are not only stateless, but also deterministic. We introduce deterministic STS
components next.
3.2.4
Deterministic STS Components
Deterministic STS components are those which, for given current state and input, have at most one output
and next state. Syntactically, they are introduced as follows:
Definition 3 (Deterministic STS component). A deterministic STS component is a tuple
det(x : Σx , s : Σs , a : Σs , inpt exp : B, next exp : Σs , out exp : Σy )
where x, s are the input and state variables, a ∈ Σs is the initial value of the state variable, inpt exp is a
Boolean expression on s and x defining the legal inputs, next exp is an expression of type Σs on x and s
defining the next state, and out exp is an expression of type Σy on x and s defining the output. Deterministic
STS components are special cases of general STS components, as defined by the mapping det2sts:
det2sts(C) = (x, y, s, s = a, inpt exp ∧ s0 = next exp ∧ y = out exp)
where y is a new variable name (or tuple of new variable names) of type Σy .
Note that a deterministic STS component has a separate expression inpt exp to define legal inputs. A
separate such expression is not needed for general STS components, where the conditions for legal inputs
are part of the expression trs exp. For example, compare the definition of Div as a general STS above, and
as a stateless deterministic STS below (see §3.2.5).
10
Examples. As mentioned above, all three components, UnitDelay, Add, and Split from Fig. 2, as well as
Div and Const, are deterministic. They could therefore be specified in our language as deterministic STS
components, instead of general STS components:
UnitDelay = det x, s, 0, true, x, s
Constc = det (), (), (), true, (), c
Add = det (x, y), (), (), true, (), x + y
Split = det x, (), (), true, (), (x, x)
x
Div = det (x, y), (), (), y 6= 0, (),
y
The component Sum modeling the entire system is also deterministic, and could be defined as a deterministic STS component:
Sum = det(x, s, 0, true, s + x, s).
Note that these alternative specifications for each of those components, although syntactically distinct,
will turn out to be semantically equivalent by definition, when we introduce the semantics of our language,
in §4.
3.2.5
Stateless Deterministic STS Components
STS components which are both deterministic and stateless can be specified as follows:
Definition 4 (Stateless deterministic STS component). A stateless deterministic STS component is a tuple
C = stateless det(x : Σx , inpt exp : B, out exp : Σy )
where x is the input variable, inpt exp is a Boolean expression on x defining the legal inputs, and out exp is
an expression of type Σy on x defining the output. Stateless deterministic STS components are special cases
of both deterministic STS components, and of stateless STS components, as defined by the mappings
stateless det2det(C)
=
det(x, (), (), inpt exp, (), out exp)
stateless det2stateless(C)
=
stateless(x, y, inpt exp ∧ y = out exp)
where y is a new variable name or a tuple of new variable names.
Examples. Many of the examples introduced above are both deterministic and stateless. They could be
specified as follows:
Id
= stateless det x, true, x
Constc = stateless det (), true, c
Add
= stateless det (x, y), true, x + y
Split = stateless det x, true, (x, x)
x
Div
= stateless det (x, y), y 6= 0,
y
3.3
Quantified Linear Temporal Logic Components
Although powerful, STS components have limitations. In particular, they cannot express liveness properties [4]. To remedy this, we introduce another type of components, based on Linear Temporal Logic
(LTL) [63] and quantified propositional LTL (QPTL) [76, 48], which extends LTL with ∃ and ∀ quantifiers
over propositional variables. In this paper we use quantified first-order LTL (which we abbreviate as QLTL).
QLTL further extends QPTL with functional and relational symbols over arbitrary domains, quantification
11
of variables over these domains, and a next operator applied to variables.2 We need this expressive power
in order to be able to handle general models (e.g., Simulink) which often use complex arithmetic formulas,
and also to be able to translate STS components into semantically equivalent QLTL components (see §5.1).
3.3.1
QLTL
QLTL formulas are generated by the following grammar. We assume a set of constants and functional
symbols (0, 1, . . ., true, false, +, . . .), a set of predicate symbols (=, ≤, <, . . .), and a set of variable names
(x, y, z, . . .).
Definition 5 (Syntax of QLTL). A QLTL formula ϕ is defined by the following grammar:
term ::=
ϕ
::=
x | y | ... |
(variable names)
0 | 1 | . . . | true | . . . |
(constants)
term + term | . . . |
(functional symbol application)
# term
(next applied to a term)
term = term | (term ≤ term) | . . . | (atomic QLTL formulas)
¬ϕ |
(negation)
ϕ∨ψ |
(disjunction)
ϕUψ|
(until)
∀x : ϕ
(forall)
As in standard first order logic, the bounded variables of a formula ϕ are the variables in scope of the
universal quantifier ∀, and the free variables of ϕ are those that are not bounded. The logic connectives ∧,
⇒ and ⇔ can be expressed with ¬ and ∨. Quantification is over atomic variables. The existential quantifier
∃ can be defined via the universal quantifier usually as ¬∀¬. The primitive temporal operators are next for
terms (# ) and until ( U ). As is standard, QLTL formulas are evaluated over infinite traces, and ϕ U ψ
intuitively means that ϕ continuously holds until some point in the trace where ψ holds.
Formally, we will define the relation σ |= ϕ (σ satisfies ϕ) for a QLTL formula ϕ over free variables x, y, . . .,
and an infinite sequence σ ∈ Σω , where Σ = Σx × Σy × . . ., and Σx , Σy , . . . are the types (or domains) of
variables x, y, . . .. As before we assume that σ can be written as a tuple of sequences (σx , σy , . . .) where
ω
σ x ∈ Σω
x , σy ∈ Σy , . . .. The semantics of a term t on variables x, y, . . . is a function from infinite sequences
to infinite sequences hhtii : Σω → Σω
t , where Σ = Σx × Σy × . . ., and Σt is the type of t. When giving the
semantics of terms and formulas we assume that constants, functional symbols, and predicate symbols have
the standard semantics. For example, we assume that +, ≤, . . . on numeric values have the semantics of
standard arithmetic.
Definition 6 (Semantics of QLTL). Let x be a variable, t, t0 be terms, ϕ, ψ be QLTL formulas, P be a
predicate symbol, f be a functional symbol, c be a constant, and σ ∈ Σω be an infinite sequence.
hhxii(σ)
hhcii(σ)
hhf (t, t0 )ii(σ)
hh# tii(σ)
σ
σ
σ
σ
σ
|= P (t, t0 )
|= ¬ϕ
|= ϕ ∨ ψ
|= ϕ U ψ
|= (∀x : ϕ)
:= σx
:= (λi : c)
:= (λi : f (hhtii(σ)(i), hht0 ii(σ)(i)))
:= hhtii(σ 1 )
:=
:=
:=
:=
:=
P (hhtii(σ)(0), hht0 ii(σ)(0))
¬ σ |= ϕ
σ |= ϕ ∨ σ |= ψ
(∃n ≥ 0 : (∀ 0 ≤ i < n : σ i |= ϕ) ∧ σ n |= ψ)
(∀σx ∈ Σω
x : (σx , σ) |= ϕ)
Other temporal operators can be defined as follows. Eventually (F ϕ = true U ϕ) states that ϕ must
hold in some future step. Always (G ϕ = ¬F ¬ϕ) states that ϕ must hold at all steps. The next operator for
2 A logic similar to the one that we use here is presented in [47], however in [47] the next operator can be applied only once
to variables, and the logic from [47] uses also past temporal operators.
12
formulas X can be defined using the next operator for terms # . The formula X ϕ is obtained by replacing
all occurrences of the free variables in ϕ by their next versions (i.e., x is replaced by # x, y by # y, etc.).
For example the propositional LTL formula X (x ∧ X y ⇒ G z) can be expressed as
(# x = true ∧ (# # y = true) ⇒ G (# z = true)).
We additionally introduce the operator: ϕ L ψ := ¬(ϕ U ¬ψ). Intuitively, ϕ L ψ holds if whenever ϕ
holds continuously up to some step n − 1, ψ must hold at step n.
Two QLTL formulas ϕ and ψ are semantically equivalent, denoted ϕ ⇐⇒ ψ, if
∀σ : (σ |= ϕ) ⇐⇒ (σ |= ψ).
Lemma 1. Let ϕ be a QLTL formula. Then:
1. (∃x : G ϕ) ⇐⇒ G (∃x : ϕ) when ϕ does not contain temporal operators.
2. ϕ L ϕ ⇐⇒ G ϕ
3. true L ϕ ⇐⇒ G ϕ
4. ϕ L true ⇐⇒ true
5. ϕ L false ⇐⇒ false
6. ∀y : (ϕ L ψ) ⇐⇒ (∃y : ϕ) L ψ, when ϕ does not contain temporal operators and y is not free in ψ.
The proof of the above result, as well as of most results that follow, is omitted. All omitted proofs have
been formalized and proved in the Isabelle proof assistant, and are available as part of the public distribution
of RCRS from http://rcrs.cs.aalto.fi. In particular, all results contained in this paper can be accessed
from the theory RCRS Overview.thy – either directly in that file or via references to the other RCRS files.
Examples. Using QLTL we can express safety, as well as liveness requirements. Informally, a safety
requirement expresses that something bad never happens. An example is the formula
thermostat = G (180◦ ≤ t ∧ t ≤ 220◦ ),
which states that the thermostat-controlled temperature t stays always between 180◦ and 220◦ .
A liveness requirement informally says that something good eventually happens. An example is the
formula F (t > 200◦ ) stating that the temperature t is eventually over 200◦ .
A more complex example is a formula modeling an oven that starts increasing the temperature from an
initial value of 20◦ until it reaches 180◦ , and then keeps it between 180◦ and 220◦ .
oven = (t = 20◦ ∧ ((t < # t ∧ t < 180) U thermostat)).
In this example the formula t < # t specifies that the temperature increases from some point to the next.
3.3.2
QLTL Components
A QLTL component is an atomic component where the input-output behavior is specified by a QLTL formula:
Definition 7 (QLTL component). A QLTL component is a tuple qltl(x : Σx , y : Σy , ϕ), where x, y are
input and output variables (or tuples of variables) of types Σx , Σy , and ϕ is a QLTL formula over x and y.
Intuitively a QLTL component C = qltl(x, y, ϕ) represents a system that takes as input an infinite
ω
sequence σx ∈ Σω
x and produces as output an infinite sequence σy ∈ Σy such that (σx , σy ) |= ϕ. If there
is no σy such that (σx , σy ) |= ϕ is true, then input σx is illegal for C, i.e., C is not input-receptive. There
could be many possible σy for a single σx , in which case the system is non-deterministic.
As a simple example, we can model the oven as a QLTL component with no input variables and the
temperature as the only output variable:
qltl((), t, oven)
13
3.4
Well Formed Composite Components
Not all composite components generated by the grammar introduced in §3.1 are well formed. Two components C and C 0 can be composed in series only if the number of outputs of C matches the number of inputs
of C 0 , and in addition the input types of C 0 are the same as the corresponding output types of C. Also,
fdbk can be applied to a component C if the type of the first output of C is the same as the type of its first
input. Formally, for every component C we define below Σin (C) - the input type of C, Σout (C) - the output
type of C, and wf (C) - the well-formedness of C, by induction on the structure of C:
Σin (sts(x : Σx , y : Σy , s : Σs , init, trs))
Σin (stateless(x : Σx , y : Σy , trs))
Σin (det(x : Σx , s : Σs , a, inpt, next, out : Σy ))
Σin (stateless det(x : Σx , inpt, out : Σy ))
Σin (qltl(x : Σx , y : Σy , ϕ))
Σin (C ; C 0 )
Σin (C k C 0 )
Σin (fdbk(C))
Σout (sts(x : Σx , y : Σy , s : Σs , init, trs))
Σout (stateless(x : Σx , y : Σy , trs))
Σout (det(x : Σx , s : Σs , a, inpt, next, out : Σy ))
Σout (stateless det(x : Σx , inpt, out : Σy ))
Σout (qltl(x : Σx , y : Σy , ϕ))
Σout (C ; C 0 )
Σout (C k C 0 )
Σout (fdbk(C))
wf (sts(x, y, s, init, trs))
=
wf (stateless(x, y, trs))
=
wf (det(x, s, a, inpt, next, out))
=
wf (stateless det(x, inpt, out)) =
wf (qltl(x, y, ϕ))
=
wf (C ; C 0 )
=
wf (C k C 0 )
=
wf (fdbk(C))
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
Σx
Σx
Σx
Σx
Σx
Σin (C)
Σin (C) × Σin (C 0 )
X2 × · · · × Xn provided Σin (C) = X1 × · · · × Xn
for some n ≥ 1
Σy
Σy
Σy
Σy
Σy
Σout (C 0 )
Σout (C) × Σout (C 0 )
Y2 × · · · × Yn provided Σout (C) = Y1 × · · · × Yn
for some n ≥ 1
true
true
true
true
true
wf (C) ∧ wf (C 0 ) ∧ Σout (C) = Σin (C 0 )
wf (C) ∧ wf (C 0 )
wf (C) ∧ Σin (C) = X × X1 · · · × Xn
∧ Σout (C) = X × Y1 · · · × Ym , for some n, m ≥ 0.
In the definition above, both n and m are natural numbers. If n = 0 then X1 × · · · × Xn denotes the Unit
type.
Note that atomic components are by definition well-formed. The composite components considered in
the sequel are required to be well-formed too.
We note that the above well-formedness conditions are not restrictive. Components that do not have
matching inputs and outputs can still be composed by adding appropriate switching components which
reorder inputs, duplicate inputs, and so on. An example of such a component is the component Split,
introduced earlier. As another example, consider the diagram in Fig. 3:
This diagram can be expressed in our language as the composite component:
A ; Switch1 ; (B k Id) ; Switch2 ; (C k Id)
14
A
B
C
Figure 3: Another block diagram.
where
Switch1 = stateless det((x, y), true, (x, y, x))
Switch2 = stateless det((u, v, x), true, (u, x, v))
4
Semantics
In RCRS, the semantics of components is defined in terms of monotonic property transformers (MPTs).
This is inspired by classical refinement calculus [10], where the semantics of sequential programs is defined in
terms of monotonic predicate transformers [28]. Predicate transformers are functions that transform sets of
post-states (states reached after the program executes) into sets of pre-states (states from which the program
begins). Property transformers map sets of output traces (that a component produces) into sets of input
traces (that a component consumes).
In this section we define MPTs formally, and introduce some basic operations on them, which are necessary for giving the semantics of components. The definitions of some of these operations (e.g., product
and fusion) are simple extensions of the corresponding operations on predicate transformers [10, 9]. Other
operations, in particular those related to feedback, are new (§4.1.3). The definition of component semantics
is also new (§4.3).
4.1
Monotonic Property Transformers
ω
A property transformer is a function S : (Σω
y → B) → (Σx → B), where Σx , Σy are input and output types
of the component in question. Note that x is the input and y is the output. A property transformer has
a weakest precondition interpretation: it is applied to a set of output traces Q ⊆ Σω
y , and returns a set of
,
such
that
all
traces
in
P
are
legal
and,
when
fed
to
the
component,
are guaranteed to
input traces P ⊆ Σω
x
produce only traces in Q as output.
Interpreting properties as sets, monotonicity of property transformers simply means that these functions
are monotonic with respect to set inclusion. That is, S is monotonic if for any two properties q, q 0 , if q ⊆ q 0
then S(q) ⊆ S(q 0 ).
For an MPT S we define its set of legal input traces as legal(S) = S(>), where > is the greatest predicate
extended to traces. Note that, because of monotonicity, and the fact that q ⊆ > holds for any property q,
we have that S(q) ⊆ legal(S) for all q. This justifies the definition of legal(S) as a “maximal” set of input
traces for which a system does not fail, assuming no restrictions on the post-condition. An MPT S is said
to be input-receptive if legal(S) = >.
4.1.1
Some Commonly Used MPTs
Definition 8 (Skip). Skip is defined to be the MPT such that for all q, Skip(q) = q.
Skip models the identity function, i.e., the system that accepts all input traces and simply transfers them
unchanged to the output (this will become more clear when we express Skip in terms of assert or update
transformers, below). Note that Skip is different from Id, defined above, although the two are strongly
related: Id is a component, i.e., a syntactic object, while Skip is an MPT, i.e., a semantic object. As we
shall see in §4.3, the semantics of Id is defined as Skip.
Definition 9 (Fail). Fail is defined to be the MPT such that for all q, Fail(q) = ⊥.
15
Recall that ⊥ is the predicate that returns false for any input. Thus, viewed as a set, ⊥ is the empty set.
Consequently, Fail can be seen to model a system which rejects all inputs, i.e., a system such that for any
output property q, there are no input traces that can produce an output trace in q.
Definition 10 (Assert). Let p ∈ Σω → B be a property. The assert property transformer {p} : (Σω → B) →
(Σω → B) is defined by
{p}(q) = p ∧ q.
The assert transformer {p} can be seen as modeling a system which accepts all input traces that satisfy
p, and rejects all others. For all the traces that it accepts, the system simply transfers them, i.e., it behaves
as the identity function.
To express MPTs such as assert transformers syntactically, let us introduce some notation. First, we can
use lambda notation for predicates, as in λ(σ, σ 0 ) : (σ = σ 0 ) for some predicate p : Σω → Σω → B which
returns true whenever it receives two equal traces. Then, instead of writing {λ(σ, σ 0 ) : (σ = σ 0 )} for the
corresponding assert transformer {p}, we will use the slightly lighter notation {σ, σ 0 | σ = σ 0 }.
ω
Definition 11 (Demonic update). Let r : Σω
x → Σy → B be a relation. The demonic update property
ω
ω
transformer [r] : (Σy → B) → (Σx → B) is defined by
[r](q) = {σ | ∀σ 0 : r(σ)(σ 0 ) ⇒ σ 0 ∈ q}.
That is, [r](q) contains all input traces σ which are guaranteed to result into an output trace in q when
fed into the (generally non-deterministic) input-output relation r. The term “demonic update” comes from
the refinement calculus literature [10].
Similarly to assert, we introduce a lightweight notation for the demonic update. If r is an expression in σ
and σ 0 , then [σ ; σ 0 | r] = [λ(σ, σ 0 ) : r]. For example, [σx , σy ; σz | ∀i : σz (i) = σx (i) + σy (i)] is the system
which produces as output the sequence σz = (λi : σx (i) + σy (i)), where σx and σy are the input sequences.
If e is an expression in σ, then [σ ; e] is defined to be [σ ; σ 0 | σ 0 = e], where σ 0 is a new variable different
from σ and which does not occur free in e. For example, [σ ; (λi : σ(i) + 1)] = [σ ; σ 0 | σ 0 = (λi : σ(i) + 1)].
The following lemma states that Skip can be defined as an assert transformer, or as a demonic update
transformer.
Lemma 2. Skip = [σ ; σ 0 | σ = σ 0 ] = {>} = {σ | true}.
In general Skip, Fail, and other property transformers are polymorphic with respect to their input and
output types. In Skip the input and output types must be the same. Fail, on the other hand, may have an
input type and a different output type.
ω
Definition 12 (Angelic update). Let r : Σω
x → Σy → B be a relation. The angelic update property
ω
ω
transformer {r} : (Σy → B) → (Σx → B) is defined by
{r}(q) = {σ | ∃σ 0 : r(σ)(σ 0 ) ∧ σ 0 ∈ q}.
An input sequence σ is in {r}(q) if there exists an output sequence σ 0 such that r(σ)(σ 0 ) and σ 0 ∈ q.
Notice the duality between the angelic and demonic update transformers. Consider, for example, a relation
r = {(σ, σ 0 ), (σ, σ 00 )}. If q = {σ 0 , σ 00 }, then {r}(q) = [r](q) = {σ}. If q = {σ 0 } then {r}(q) = {σ}, while
[r](q) = ∅.
We use a lightweight notation for the angelic update transformer, similar to the one for demonic update.
If r is an expression in σ and σ 0 , then {σ ; σ 0 | r} = {λ(σ, σ 0 ) : r}.
Lemma 3. Assert is a particular case of angelic update: {p} = {σ ; σ 0 | p(σ) ∧ σ = σ 0 }.
16
4.1.2
Operators on MPTs: Function Composition, Product, and Fusion
As we shall see in §4.3, the semantics of composition operators in the language of components will be defined
by the corresponding composition operators on MPTs. We now introduce the latter operators on MPTs.
First, we begin by the operators that have been known in the literature, and are recalled here. In §4.1.3 we
introduce some novel operators explicitly designed in order to handle feedback composition.
Serial composition of MPTs (and property transformers in general) is simply function composition. Let
ω
ω
ω
S : (Σω
y → B) → (Σx → B) and T : (Σz → B) → (Σy → B) be two property transformers. Then
ω
ω
S ◦ T : (Σz → B) → (Σx → B), is the function composition of S and T , i.e., ∀q : (S ◦ T )(q) = S(T (q)). Note
that serial composition preserves monotonicity, so that if S and T are MPTs, then S ◦ T is also an MPT.
Also note that Skip is the neutral element for serial composition, i.e., S ◦ Skip = Skip ◦ S = S.
To express parallel composition of components, we need a kind of Cartesian product operation on property
transformers. We define such an operation below. Similar operations for predicate transformers have been
proposed in [9].
ω
ω
ω
Definition 13 (Product). Let S : (Σω
y → B) → (Σx → B) and T : (Σv → B) → (Σu → B). The product of
ω
ω
ω
ω
S and T , denoted S ⊗ T : (Σy × Σv → B) → (Σx × Σu → B), is given by
0
ω
0
0
0
(S ⊗ T )(q) = {(σ, σ 0 ) | ∃p : Σω
y → B, p : Σv → B : p × p ⊆ q ∧ σ ∈ S(p) ∧ σ ∈ T (p )}
where (p × p0 )(σy , σv ) = p(σy ) ∧ p0 (σv ).
Lemma 4. For arbitrary S and T , S ⊗ T is monotonic.
The neutral element for the product composition is the Skip MPT that has Unit as input and output
type.
In order to define a feedback operation on MPTs, we first define two auxiliary operations: Fusion and
IterateOmega. Fusion is an extension of a similar operator introduced previously for predicate transformers
in [9]. IterateOmega is a novel operator introduced in the sequel.
ω
Definition 14 (Fusion). If S = {Si }i∈I , Si : (Σω
y → B) → (Σx → B) is a collection of MPTs, then the
ω
ω
fusion of S is the MPT Fusioni∈I (Si ) : (Σy → B) → (Σx → B) defined by
\
\
(Fusioni∈I (Si ))(q) = {σ | ∃p : I → Σω
pi ⊆ q ∧ σ ∈
Si (pi )}
y →B:
i
i
The Fusion operator satisfies the following property.
Lemma 5. For I 6= ∅ we have
Fusioni∈I ({pi } ◦ [ri ]) = {
\
i∈I
4.1.3
pi } ◦ [
\
ri ].
i∈I
Novel Operators Used in Semantical Definition of Feedback
The IterateOmega operator is defined as follows:
Definition 15 (IterateOmega).
IterateOmega(S) = Fusionn∈N (S n ◦ [σ ; σ 0 | ∀i : i + 1 < n ⇒ σi = σi0 ])
The feedback operator consists of connecting the first output of an MPT S with its first input. Formally,
feedback is defined as follows.
ω
Definition 16 (Feedback). Let S : (Σu × Σω
y → B) → (Σu × Σx → B) be an MPT. The feedback operator
on S, denoted Feedback(S), is given by the MPT
Feedback(S)
=
{σx ; σu , σy , σx }
◦ IterateOmega([σu , σy , σx ; σu , σx , σx ] ◦ (S ⊗ Skip))
◦ [σu , σy , σx ; σy ]
17
Example. As an example we show how to derive Feedback(S) for S = [σu , σx ; 0 · σx + 0 · σu , 0 · σx + 0 · σu ],
where σ + σ 0 = (λi : σ(i) + σ 0 (i)), and 0 · σ is 0 concatenated with σ. For now, we note that S is the semantics
of the composite component Add ; UnitDelay ; Split, which corresponds to the inner part of the diagram of
Fig. 2, before applying feedback. We will complete the formal definition of the the semantics of this diagram
in §4.3. For now, we focus on deriving Feedback(S), in order to illustrate how the Feedback operator works.
Let
T = [σu , σy , σx ; σu , σx , σx ] ◦ (S ⊗ Skip) = [σu , σy , σx ; 0 · σx + 0 · σu , 0 · σx + 0 · σu , σx ]
Then, we have
T ◦T
...
Tn
=
=
[σu , σy , σx ; 0 · σx + 0 · 0 · σx + 0 · 0 · σu , 0 · σx + 0 · 0 · σx + 0 · 0 · σu , σx ]
[σu , σy , σx ; 0 · σx + . . . + 0n · σx + 0n · σu , 0 · σx + . . . + 0n · σx + 0n · σu , σx ]
where 0n is a finite sequence of n 0s. We also have
=
T n ◦ [σ ; σ 0 | ∀i : i + 1 < n ⇒ σi = σi0 ]
[σu , σy , σx ; σ | ∀i : i + 1 < n ⇒ σ(i) = (Σj<i σx (j), Σj<i σx (j), σx (i))]
Then
Feedback(S)
=
=
=
=
{σx ; σu , σy , σx } ◦ IterateOmega(T ) ◦ [σu , σy , σx ; σy ]
{σx ; σu , σy , σx } ◦ Fusionn∈N (T n ◦ [σ ; σ 0 | ∀i : i + 1 < n ⇒ σi = σi0 ]) ◦ [σu , σy , σx ; σy ]
{σx ; σu , σy , σx } ◦ [σu , σy , σx ; σ | ∀i : σ(i) = (Σj<i σx (j), Σj<i σx (j), σx (i))] ◦ [σu , σy , σx ; σy ]
[σx ; σy | ∀i : σy (i) = Σj<i σx (j)]
Finally we obtain
Feedback(S) = [σx ; σy | ∀i : σy (i) = Σj<i σx (j)]
(1)
This is the system that outputs the trace (λi : Σj<i σx (j)) for input trace σx .
4.1.4
Refinement
A key element of RCRS, as of other compositional frameworks, is the notion of refinement, which enables
substitutability and other important concepts of compositionality. Semantically, refinement is defined as
follows:
ω
Definition 17 (Refinement). Let S, T : (Σω
y → B) → (Σx → B) be two MPTs. We say that T refines S (or
that S is refined by T ), written S v T , if and only if ∀q : S(q) ⊆ T (q).
All operations introduced on MPTs preserve the refinement relation:
Theorem 1. If S, T, S 0 , T 0 are MPTs of appropriate types such that S v S 0 and T v T 0 , then
1. S ◦ T v S 0 ◦ T 0 and S ⊗ T v S 0 ⊗ T 0 and Fusion(S, T ) v Fusion(S 0 , T 0 ) ([9, 10])
2. IterateOmega(S) v IterateOmega(S 0 )
3. Feedback(S) v Feedback(S 0 )
18
4.2
Subclasses of MPTs
Monotonic property transformers are a very rich and powerful class of semantic objects. In practice, the
systems that we deal with often fall into restricted subclasses of MPTs, which are easier to represent syntactically and manipulate symbolically. We introduce these subclasses next.
4.2.1
Relational MPTs
Definition 18 (Relational property transformers). A relational property transformer (RPT) S is an MPT
of the form {p} ◦ [r]. We call p the precondition of S and r the input-output relation of S.
Relational property T
transformers
T correspond to conjunctive transformers [10]. A transformer S is conjunctive if it satisfies S( i∈I qi ) = i∈I S(qi ) for all (qi )i∈I and I 6= ∅.
Fail, Skip, any assert transformer {p}, and any demonic update transformer [r], are RPTs. Indeed, Fail
can be written as {σ | false} ◦ [σ ; σ 0 | true]. Skip can be written as {σ | true} ◦ [σ ; σ]. The assert
transformer {p} can be written as the RPT {p} ◦ [σ ; σ]. Finally, the demonic update transformer [r] can
be written as the RPT {σ | true} ◦ [r]. Angelic update transformers are generally not RPTs: the angelic
update transformer {σ ; σ 0 | true} is not an RPT, as it is not conjunctive.
Examples. Suppose we wish to specify a system that performs division. Here are two possible ways to
represent this system with RPTs:
S1 = {>} ◦ [σx , σy ; σz | ∀i : σy (i) 6= 0 ∧ σz (i) =
σx (i)
]
σy (i)
S2 = {σx , σy | ∀i : σy (i) 6= 0} ◦ [σx , σy ; σz | σz (i) =
σx (i)
]
σy (i)
Although S1 and S2 are both relational, they are not equivalent transformers. S1 is input-receptive: it accepts
all input traces. However, if at some step i the input σy (i) is 0, then the output σz (i) is arbitrary (nondeterministic). In contrast, S2 is non-input-receptive as it accepts only those traces σy that are guaranteed
to be non-zero at every step, i.e., those that satisfy the condition ∀i : σy (i) 6= 0.
Theorem 2 (RPTs are closed under serial, product and fusion compositions). Let S = {p} ◦ [r] and
S 0 = {p0 } ◦ [r0 ] be two RPTs, with p, p0 , r and r0 of appropriate types. Then
S ◦ S 0 = {σ | p(σ) ∧ (∀σ 0 : r(σ)(σ 0 ) ⇒ p0 (σ 0 ))} ◦ [r ◦ r0 ]
and
and
S ⊗ S 0 = {σx , σy | p(σx ) ∧ p0 (σy )} ◦ [σx , σy ; σx0 , σy0 | r(σx )(σx0 ) ∧ r0 (σy )(σy0 )]
Fusion(S, S 0 ) = {p ∧ p0 } ◦ [r ∧ r0 ]
RPTs are not closed under Feedback. For example, we have
Feedback([σx , σz ; σx , σx ]) = {σ ; σ 0 | true}
which is a non-relational angelic update transformer as we said above.
Next theorem shows that the refinement of RPTs can be reduced to proving a first order property.
Theorem 3. For p, p0 , r, r0 of appropriate types we have.
{p} ◦ [r] v {p0 } ◦ [r0 ] ⇐⇒ (p ⊆ p0 ∧ (∀σx : p(σx ) ⇒ r0 (σx ) ⊆ r(σx )))
19
4.2.2
Guarded MPTs
Relational property transformers correspond to systems that have natural syntactic representations, as the
composition {p} ◦ [r], where the predicate p and the relation r can be represented syntactically in some
logic. Unfortunately, RPTs are still too powerful. In particular, they allow system semantics that cannot
be implemented. For example, consider the RPT Magic = [σ ; σ 0 | false]. It can be shown that for any
output property q (including ⊥), we have Magic(q) = >. Recall that, viewed as a set, > is the set of all
traces. This means that, no matter what the post-condition q is, Magic somehow manages to produce output
traces satisfying q no matter what the input trace is (hence the name “magic”). In general, an MPT S is
said to be non-miraculous (or to satisfy the law of excluded miracle) if S(⊥) = ⊥. We note that in [28],
sequential programs are modeled using predicate transformers that are conjunctive and satisfy the low of
excluded miracle.
We want to further restrict RPTs so that miraculous behaviour does not arise. Specifically, for an RPT
S = {p} ◦ [r] and an input sequence σ, if there is no σ 0 such that r(σ)(σ 0 ) is satisfied, then we want σ to be
illegal, i.e., we want p(σ) = false. We can achieve this by taking p to be in(r). Recall that if r : X → Y → B,
then in(r)(x) = (∃y : r(x)(y)). Taking p to be in(r) effectively means that p and r are combined into a
single specification r which can also restrict the inputs. This is also the approach followed in the theory of
relational interfaces [79].
Definition 19 (Guarded property transformers). The guarded property transformer (GPT) of a relation r
is an RPT, denoted {r], defined by {r] = {in(r)} ◦ [r].
It can be shown that an MPT S is a GPT if and only if S is conjunctive and non-miraculous [10]. Fail,
Skip, and any assert property transformer are GPTs. Indeed, Fail = {⊥] and Skip = {σ ; σ | >]. The
assert transformer can be written as {p} = {σ ; σ | p(σ)]. The angelic and demonic update property
transformers are generally not GPTs. The angelic update property transformer is not always conjunctive in
order to be a GPT. The demonic update property transformer is not in general a GPT because is not always
non-miraculous (Magic(⊥) = > =
6 ⊥). The demonic update transformer [r] is a GPT if and only if in(r) = >
and in this case we have [r] = {r].
Theorem 4 (GPTs are closed under serial and parallel compositions). Let S = {r] and S 0 = {r0 ] be two
GPTs with r and r0 of appropriate types. Then
S ◦ S 0 = {σx ; σz | in(r)(σx ) ∧ ∀σy : r(σx )(σy ) ⇒ in(r0 )(σy ) ∧ (r ◦ r0 )(σx , σz )]
and
S ⊗ S 0 = {σx , σy ; σx0 , σy0 | r(σx )(σx0 ) ∧ r0 (σy )(σy0 )]
GPTs are not closed under Fusion neither Feedback. Indeed, we have already seen in the previous section
that Feedback applied to the GPT [σx , σz ; σx , σx ] is not an RPT, and therefore not a GPT either. For the
fusion operator, we have Fusion([x ; 0], [x ; 1]) = [⊥], which is not a GPT.
A corollary of Theorem 3 is that refinement of GPTs can be checked as follows:
Corollary 1.
{r] v {r0 ] ⇐⇒ (in(r) ⊆ in(r0 ) ∧ (∀σx : in(r)(σx ) ⇒ r0 (σx ) ⊆ r(σx )))
4.2.3
Other subclasses and overview
The containment relationships among the various subclasses of MPTs are illustrated in Fig. 4. In addition
to the subclasses discussed above, we introduce several more subclasses of MPTs in the sections that follow,
when we assign semantics (in terms of MPTs) to the various atomic components in our component language.
For instance, QLTL components give rise to QLTL property transformers. Similarly, STS components,
stateless STS components, etc., give rise to corresponding subclasses of MPTs. The containment relationships
between these classes will be proven in the sections that follow. For ease of reference, we provide some forward
links to these results also here. The fact that QLTL property transformers are GPTs follows by definition
20
of the semantics of QLTL components: see §4.3, equation (2). The fact that STS property transformers are
a special case of QLTL property transformers follows from the transformation of an STS component into a
semantically equivalent QLTL component: see §5.1 and Theorem 7. The inclusions for subclasses of STS
property transformers follow by definition of the corresponding components (see also Fig. 5).
Monotonic Property Transformers
Relational Property Transformers
Guarded Property Transformers
QLTL Property Transformers
STS Property Transformers
Stateless STS Property Transformers
Deterministic STS Property Transformers
Figure 4: Overview of the property transformer classes and their containment relations.
4.3
Semantics of Components as MPTs
We are now ready to define the semantics of our language of components in terms of MPTs. Let C be a well
formed component. The semantics of C, denoted [[C]], is a property transformer of the form:
[[C]] : ((Σout (C))ω → B) → ((Σin (C))ω → B).
We define [[C]] by induction on the structure of C. First we give the semantics of QLTL components and
composite components:
[[qltl(x, y, ϕ)]]
0
=
{σx ; σy | (σx , σy ) |= ϕ]
(2)
0
[[C ; C ]]
=
[[C]] ◦ [[C ]]
(3)
[[C k C 0 ]]
=
[[C]] ⊗ [[C 0 ]]
(4)
[[fdbk(C)]]
=
Feedback([[C]])
(5)
The semantics of QLTL components satisfies the following property:
Lemma 6. If ϕ is a LTL formula on variables x and y, we have:
[[qltl(x, y, (∃y : ϕ) ∧ ϕ)]] = [[qltl(x, y, ϕ)]]
To define the semantics of STS components, we first introduce some auxiliary notation.
ω
Consider an STS component C = sts(x, y, s, init exp, trs exp). We define the predicate runC : Σω
s × Σx ×
ω
Σy → B as
runC (σs , σx , σy ) = (∀i : trs exp(σs (i), σx (i))(σs (i + 1), σy (i))).
ω
ω
Intuitively, if σx ∈ Σω
x is the input sequence, σy ∈ Σy is the output sequence, and σs ∈ Σs is the sequence
of values of state variables, then runC (σs , σx , σy ) holds if at each step of the execution, the current state,
current input, next state, and current output, satisfy the trs exp predicate.
21
We also formalize the illegal input traces of STS component C as follows:
illegalC (σx ) = (∃σs , σy , k : init exp(σs (0)) ∧ (∀i < k : trs exp(σs (i), σx (i))(σs (i + 1), σy (i))) ∧
¬in(trs exp)(σs (k), σx (k)))
Essentially, illegalC (σx ) states that there exists some point in the execution where the current state and
current input violate the precondition in(trs exp) of predicate trs exp, i.e., there exist no output and next
state to satisfy trs exp for that given current state and input.
Then, the semantics of an STS component C is given by:
[[C]] = {¬illegalC } ◦ [σx ; σy | (∃σs : init exp(σs (0)) ∧ runC (σs , σx , σy ))]
(6)
We give semantics to stateless and/or deterministic STS components using the corresponding mappings
from general STS components. If C is a stateless STS, C 0 is a deterministic STS, and C 00 is a stateless
deterministic STS, then:
[[C]]
0
[[C ]]
00
[[C ]]
=
=
=
[[stateless2sts(C)]]
(7)
0
[[det2sts(C )]]
(8)
00
[[stateless det2det(C )]]
(9)
Note that the semantics of a stateless deterministic STS component C 00 is defined by converting C 00 into
a deterministic STS component, by Equation (9) above. Alternatively, we could have defined the semantics
of C 00 by converting it into a stateless STS component, using the mapping stateless det2stateless. In
order for our semantics to be well-defined, we need to show that regardless of which conversion we choose,
we obtain the same result. Indeed, this is shown by the lemma that follows:
Lemma 7. For a stateless deterministic STS C 00 we have:
[[stateless det2det(C 00 )]] = [[stateless det2stateless(C 00 )]]
(10)
Observe that, by definition, the semantics of QLTL components are GPTs. The semantics of STS
components are defined as RPTs. However, they will be shown to be GPTs in §5.1. Therefore, the semantics
of all atomic RCRS components are GPTs. This fact, and the closure of GPTs w.r.t. parallel and serial
composition (Theorem 4), ensure that we stay within the GPT realm as long as no feedback operations are
used. In addition, as we shall prove in Corollary 2, components with feedback are also GPTs, as long as
they are deterministic and do not contain algebraic loops. An example of a component whose semantics is
not a GPT is:
C = fdbk(stateless((x, z), (y1 , y2 ), y1 = x ∧ y2 = x))
Then, we have [[C]] = Feedback([σx , σz ; σx , σx ]). As stated earlier, Feedback([σx , σz ; σx , σx ]) is equal to
{σ ; σ 0 | true}, which is not a GPT neither an RPT. The problem with C is that it contains an algebraic
loop: the first output y1 of the internal stateless component where feedback is applied directly depends on
its first input x. Dealing with such components is beyond the scope of this paper, and we refer the reader
to [67].
4.3.1
Example: Two Alternative Derivations of the Semantics of Diagram Sum of Fig. 2
To illustrate our semantics, we provide two alternative derivations of the semantics of the Sum system of
Fig. 2.
First, let us consider Sum as a composite component:
Sum = fdbk(Add ; UnitDelay ; Split)
22
where
Add
=
UnitDelay =
Split
=
stateless det((u, x), true, u + x)
det(x, s, 0, true, x, s)
stateless det(x, true, (x, x))
We have
[[Sum]]
= [[fdbk(Add ; UnitDelay ; Split)]]
= Feedback([[Add]] ◦ [[UnitDelay]] ◦ [[Split]])
For Add, UnitDelay and Split, all inputs are legal,
After simplifications, we get:
[[Add]]
=
[[UnitDelay]] =
[[Split]]
=
The semantics of Sum is given by
so illegalC = ⊥ for all C ∈ {Add, UnitDelay, Split}.
[σu , σx ; σu + σx ]
[σx ; 0 · σx ]
[σx ; σx , σx ]
[[Sum]]
=
Feedback([[Add]] ◦ [[UnitDelay]] ◦ [[Split]]
=
=
=
We obtain:
Feedback([σu , σx ; σu + σx ] ◦ [σx ; 0 · σx ] ◦ [σx ; σx , σx ])
Feedback([σu , σx ; 0 · σx + 0 · σu , 0 · σx + 0 · σu ])
{Using (1)}
[σx ; σy | ∀i : σy (i) = Σj<i σx (j)]
[[Sum]] = [σx ; σy | ∀i : σy (i) = Σj<i σx (j)].
Next, let us assume that the system has been characterized already as an atomic component:
SumAtomic = sts(x, y, s, s = 0, y = s ∧ s0 = s + x).
The semantics of SumAtomic is given by
[[SumAtomic]] = {¬illegalSumAtomic } ◦ [σx ; σy | ∃σs : σs (0) = 0 ∧ runSumAtomic (σs , σx , σy )]
where illegalSumAtomic = ⊥ because there are no restrictions on the inputs of SumAtomic, and
runSumAtomic (σs , σx , σy ) = ∀i : σy (i) = σs (i) ∧ σs (i + 1) = σs (i) + σx (i)
We have
[[SumAtomic]] = [σx ; σy | ∃σs : σs (0) = 0 ∧ ∀i : σy (i) = σs (i) ∧ σs (i + 1) = σs (i) + σx (i) ]
which is equivalent to (11).
4.3.2
Characterization of Legal Input Traces
The following lemma characterizes legal input traces for various types of MPTs:
Lemma 8. The set of legal input traces of an RPT {p} ◦ [r] is p:
legal({p} ◦ [r]) = p.
23
(11)
The set of legal input traces of a GPT {r] is in(r):
legal({r]) = in(r).
The set of legal input traces of an STS component C = sts(x, y, s, init, r) is equal to ¬illegalC :
legal([[C]]) = ¬illegalC .
The set of legal input traces of a QLTL component C = qltl(x, y, ϕ) is:
legal([[C]]) = {σx | σx |= ∃y : ϕ}.
4.3.3
Semantic Equivalence and Refinement for Components
Definition 20. Two components C and C 0 are (semantically) equivalent, denoted C ≡ C 0 , if [[C]] = [[C 0 ]].
Component C is refined by component C 0 , denoted C C 0 , if [[C]] v [[C 0 ]].
The relation ≡ is an equivalence relation, and is a preorder relation (i.e., reflexive and transitive). We
also have
(C C 0 ∧ C 0 C) ⇐⇒ (C ≡ C 0 )
4.3.4
Compositionality Properties
Several desirable compositionality properties follow from our semantics:
Theorem 5. Let C1 , C2 , C3 , and C4 be four (possibly composite) components. Then:
1. (Serial composition is associative:) (C1 ; C2 ) ; C3 ≡ C1 ; (C2 ; C3 ).
2. (Parallel composition is associative:) (C1 k C2 ) k C3 ≡ C1 k (C2 k C3 ).
3. (Parallel composition distributes over serial composition:) If [[C1 ]] and [[C2 ]] are GPTs and [[C3 ]] and
[[C4 ]] are RPTs, then (C1 k C2 ) ; (C3 k C4 ) ≡ (C1 ; C3 ) k (C2 ; C4 ).
4. (Refinement is preserved by composition:) If C1 C2 and C3 C4 , then:
(a) C1 ; C3 C2 ; C4
(b) C1 k C3 C2 k C4
(c) fdbk(C1 ) fdbk(C2 )
In addition to the above, requirements that a component satisfies are preserved by refinement. Informally,
if C satisfies some requirement ϕ and C C 0 then C 0 also satisfies ϕ. Although we have not formally defined
what requirements are and what it means for a component to satisfy a requirement, these concepts are
naturally captured in the RCRS framework via the semantics of components as MPTs. In particular, since
our components are generally open systems (i.e., they have inputs), we can express requirements using Hoare
triples of the form p{C}q, where C is a component, p is an input property, and q is an output property. Then,
p{C}q holds iff the outputs of C are guaranteed to satisfy q provided the inputs of C satisfy p. Formally:
p{C}q ⇐⇒ p ⊆ [[C]](q).
Theorem 6. C C 0 iff ∀p, q : p{C}q ⇒ p{C 0 }q.
Theorem 6 shows that refinement is equivalent to substitutability. Substitutability states that a component
C 0 can replace another component C in any context, i.e., ∀p, q : p{C}q ⇒ p{C 0 }q.
24
5
Symbolic Reasoning
So far we have defined the syntax and semantics of RCRS. These already allow us to specify and reason about
systems in a compositional manner. However, such reasoning is difficult to do “by hand”. For example, if
we want to check whether a component C is refined by another component C 0 , we must resort to proving
the refinement relation [[C]] v [[C 0 ]] of their corresponding MPTs, [[C]] and [[C 0 ]]. This is not an easy task,
as MPTs are complex mathematical objects. Instead, we would like to have computer-aided, and ideally
fully automatic techniques. In the above example of checking refinement, for instance, we would like ideally
to have an algorithm that takes as input the syntactic descriptions of C and C 0 and replies yes/no based
on whether [[C]] v [[C 0 ]] holds. We say “ideally” because we know that in general such an algorithm cannot
exist. This is because we are not making a-priori any restrictions on the logics used to describe C and C 0 ,
which means that the existence of an algorithm will depend on decidability of these logics. In this section,
we describe how reasoning in RCRS can be done symbolically, by automatically manipulating the formulas
used to specify the components involved. As we shall show, most problems can be reduced to checking
satisfiability of first-order formulas formed by combinations of the formulas of the original components. This
means that the problems are decidable whenever the corresponding first-order logics are decidable.
5.1
Symbolic Transformation of STS Components to QLTL Components
Our framework allows the specification of several types of atomic components, some of which are special
cases of others, as summarized in Fig. 5. In §3, we have already shown how the different types of STS
components are related, from the most specialized deterministic stateless STS components, to the general
STS components. By definition, the semantics of the special types of STS components is defined via the
semantics of general STS components (see §4). In this subsection, we show that STS components can be
viewed as special cases of QLTL components.
qltl
sts
stateless
det
stateless det
Figure 5: Lattice of atomic components: lower types are special cases of higher types.
Specifically, we show how an STS component can be transformed into a semantically equivalent QLTL
component. This transformation also shows that STS property transformers are a special case of QLTL
property transformers, as already claimed in Fig. 4. Note that this containment is not obvious simply by
looking at the definitions of these MPT subclasses (c.f. §4.3), as QLTL property transformers are defined as
GPTs (equation 2), whereas STS property transformers are defined as RPTs (equation 6). Although RPTs
are generally a superclass, not a subclass, of GPTs, the transformation proposed below shows that the RPTs
obtained from STS components can indeed be captured as GPTs. The transformation of STS into QLTL
components also enables us to apply several algorithms which are available for QLTL components to STS
components as well.
Consider an STS component C = sts(x, y, s, init, trs). We can transform C into a QLTL component
using the mapping sts2qltl:
sts2qltl(C) = qltl(x, y, (∀s, y : init ⇒ (ϕ L ϕ0 )) ∧ (∃s : init ∧ G ϕ))
where ϕ = trs[s0 := # s] and ϕ0 = (∃s0 , y : trs).
The theorem that follows demonstrates the correctness of the above transformation:
25
(12)
Theorem 7. For any STS component C = sts(x, y, s, init, trs) s.t. init is satisfiable, C ≡ sts2qltl(C).
Example. It is instructive to see how the above transformation specializes to some special types of STS
components. In particular, we will show how it specializes to stateless STS components.
Let C = stateless(x, y, trs) and let C 0 = stateless2sts(C) = sts(x, y, (), true, trs). Applying the
sts2qltl transformation to C 0 , for which s = () and init = true, we obtain:
sts2qltl(C 0 ) = qltl x, y, (∀y : (ϕ L ϕ0 )) ∧ G ϕ)
where ϕ = trs[() := # ()] = trs and ϕ0 = (∃y : trs). Using the properties of Lemma 1, and the fact that
semantically equivalent LTL formulas result in semantically equivalent QLTL components, we can simplify
sts2qltl(C 0 ) further:
sts2qltl(C 0 )
= {Definition of sts2qltl}
qltl x, y, (∀y : (trs L (∃y : trs))) ∧ G trs
≡
{Lemma 1, trs does not contain temporal operators, and y is not free in (∃y : trs)}
qltl x, y, ((∃y : trs) L (∃y : trs)) ∧ G trs
≡
{Lemma 1}
qltl x, y, G (∃y : trs) ∧ G trs
≡
{Lemma 1 and trs does not contain temporal operators}
qltl x, y, (∃y : G trs) ∧ G trs
≡
{Lemma 6}
qltl x, y, G trs
Note that in the above derivation we use the equivalence symbol ≡, in addition to the equality symbol =.
Recall that ≡ stands for semantical equivalence of two components (c.f. §4.3.3). On the other hand, = for
components means syntactic equality. By definition of the semantics, if two QLTL formulas are equivalent,
then the corresponding QLTL components are equivalent.
Based on the above, we define the transformation stateless2qltl of a stateless component C =
stateless(x, y, trs), into a QLTL component as follows:
stateless2qltl(C) = qltl x, y, G trs
5.2
Symbolic Transformations of Special Atomic Components to More General
Atomic Components
Based on the lattice in Fig. 5, we define all remaining mappings from more special atomic components to more
general atomic components, by composing the previously defined mappings sts2qltl, stateless2qltl,
stateless2sts, det2sts, stateless det2stateless and stateless det2det, as appropriately.
For mapping stateless deterministic STS components to QLTL components, we have two possibilities:
stateless det → det → sts → qltl and stateless det → stateless → qltl. We choose the transformation stateless det → stateless → qltl because it results in a simpler formula:
stateless det2qltl(C) = stateless2qltl(stateless det2stateless(C)).
Examples.
Consider the following STS components:
C1
C2
UnitDelay
= stateless x, y, y > x
= stateless x, (), x > 0
= det x, s, 0, true, x, s
26
Then:
stateless2qltl(C1 )
= qltl x, y, G y > x
stateless2qltl(C2 )
= qltl x, (), G x > 0
det2qltl(UnitDelay)
= qltl x, y, (∀s, y : s = 0 ⇒
(true ∧ # s = x ∧ y = s) L (∃s0 , y : true ∧ s0 = x ∧ y = s)) ∧
(∃s : s = 0 ∧ G (true ∧ # s = x ∧ y = s))
Because (∃s0 , y : true ∧ s0 = x ∧ y = s)) ⇐⇒ true, using Lemma 1 and logical simplifications we obtain:
det2qltl(UnitDelay) ≡ qltl x, y, (∃s : s = 0 ∧ G (# s = x ∧ y = s))
≡ qltl x, y, (∃s : s = 0 ∧ G (# y = x ∧ y = s))
≡ qltl x, y, (∃s : s = 0 ∧ G (y = s) ∧ G (# y = x))
≡ qltl x, y, (∃s : y = 0 ∧ G (y = s) ∧ G (# y = x))
≡ qltl x, y, (∃s : G (y = s)) ∧ y = 0 ∧ G (# y = x)
≡ qltl x, y, G (∃s : y = s) ∧ y = 0 ∧ G (# y = x)
≡ qltl x, y, y = 0 ∧ G (# y = x)
5.3
Symbolic Computation of Serial Composition
Given a composite component C formed as the serial composition of two components C1 and C2 , i.e.,
C = C1 ; C2 , we would like to compute a new, atomic component Ca , such that Ca is semantically equivalent
to C. Because atomic components are by definition represented syntactically (and symbolically), being able
to reduce composite components into atomic components means that we are able to symbolically compute
composition operators.
We start by defining the symbolic serial composition of components of the same type.
5.3.1
Symbolic Serial Composition of Two QLTL Components
Let C = qltl(x, y, ϕ) and C 0 = qltl(y, z, ϕ0 ) such that C ; C 0 is well formed. Then their symbolic serial
composition, denoted serial(C, C 0 ), is the QLTL component defined by
serial(C, C 0 ) = qltl x, z, (∀y : ϕ ⇒ (∃z : ϕ0 )) ∧ (∃y : ϕ ∧ ϕ0 )
(13)
Note that in the above definition (as well as the ones that follow) we assume that the output variable
of C and the input variable of C 0 have the same name (y) and that the names x, y and z are distinct. In
general, this may not be the case. This is not a problem, as we can always rename variables such that this
condition is met. Note that variable renaming does not change the semantics of components (c.f. §3.2.2).
The intuition behind the formula in (13) is as follows. The second conjunct ∃y : ϕ ∧ ϕ0 ensures that
the both contracts ϕ and ϕ0 of the two components are enforced in the composite contract. The reason
we use ∃y : ϕ ∧ ϕ0 instead of just the conjunction ϕ ∧ ϕ0 is that we want to eliminate (“hide”) internal
variable y. (Alternatively, we could also have chosen to output y as an additional output, but would then
need an additional hiding operator to remove y.) The first conjunct ∀y : ϕ ⇒ (∃z : ϕ0 ) is a formula on
the input variable x of the composite component (since all other variables y and z are quantified). This
formula restricts the legal inputs of C to those inputs for which, no matter which output C produces, this
output is guaranteed to be a legal input for the downstream component C 0 . For an extensive discussion of
the intuition and justification behind this definition, see [79].
27
5.3.2
Symbolic Serial Composition of Two General STS Components
Let C = sts(x, y, s, init, trs) and C 0 = sts(y, z, t, init0 , trs0 ) be two general STS components such that
C ; C 0 is well formed. Then:
serial(C, C 0 ) = sts x, z, (s, t), init∧init0 , (∃s0 , y : trs)∧(∀s0 , y : trs ⇒ (∃t0 , z : trs0 ))∧(∃y : trs∧trs0 ) (14)
5.3.3
Symbolic Serial Composition of Two Stateless STS Components
Let C = stateless(x, y, trs) and C 0 = stateless(y, z, trs0 ) be two stateless STS components such that
C ; C 0 is well formed. Then
serial(C, C 0 ) = stateless x, z, (∀y : trs ⇒ (∃z : trs0 )) ∧ (∃y : trs ∧ trs0 )
(15)
5.3.4
Symbolic Serial Composition of Two Deterministic STS Components
Let C = det(x, s, a, p, next, out) and C 0 = det(y, t, b, p0 , next0 , out0 ) be two deterministic STS components
such that their serial composition C ; C 0 is well formed. Then:
serial(C, C 0 ) = det(x, (s, t), (a, b), p ∧ p0 [y := out], (next, next0 [y := out]), out0 [y := out])
(16)
where e[z := e0 ] denotes the substitution of all free occurences of variable z by expression e0 in expression e.
5.3.5
Symbolic Serial Composition of Two Stateless Deterministic STS Components
Finally, let C = stateless det(x, p, out) and C 0 = stateless det(y, p0 , out0 ) be two stateless deterministic
STS components such that their serial composition C ; C 0 is well formed. Then:
serial(C, C 0 ) = stateless det(x, p ∧ p0 [y := out], out0 [y := out])
5.3.6
(17)
Symbolic Serial Composition of Two Arbitrary Atomic Components
In general, we define the symbolic serial composition of two atomic components C and C 0 by using the
mappings of less general components to more general components (Fig. 5), as appropriate. For example, if C is a deterministic STS component and C 0 is a stateless STS component, then serial(C, C 0 ) =
serial(det2sts(C), stateless2sts(C 0 )). Similarly, if C is a QLTL component and C 0 is a deterministic STS component, then serial(C, C 0 ) = serial(C, det2qltl(C 0 )). Formally, assume that atm, atm 0 ∈
{qltl, sts, stateless, det, stateless det} are the types of the components C and C 0 , and common =
atm ∨ atm 0 is the least general component type that is more general than atm and atm 0 as defined in Fig. 5.
Then
serial(C, C 0 ) = serial(atm2common(C), atm 0 2common(C 0 )).
5.3.7
Correctness of Symbolic Serial Composition
The following theorem demonstrates that our symbolic computations of serial composition are correct, i.e.,
that the resulting atomic component serial(C, C 0 ) is semantically equivalent to the original composite component C ; C 0 :
Theorem 8. If C and C 0 are two atomic components, then
C ; C 0 ≡ serial(C, C 0 ).
28
Examples.
Consider the following STS components:
C1
= stateless(u, (x, y), true)
C2
x
= stateless det((x, y), y 6= 0, )
y
Then:
serial(C1 , C2 )
= serial(C1 , stateless det2stateless(C2 ))
= serial(stateless(u, (x, y), true), stateless((x, y), z, y 6= 0 ∧ z =
= stateless(u, z, (∀x, y : true ⇒ (∃z : y 6= 0 ∧ z =
∧ (∃x, y : true ∧ y 6= 0 ∧ z =
x
))
y
x
))
y
x
)))
y
≡ stateless(u, z, false)
As we can see, the composition results in a stateless STS component with input-output formula false. The
semantics of such a component is Fail, indicating that C1 and C2 are incompatible. Indeed, in the case of
C1 ; C2 , the issue is that C2 requires its second input, y, to be non-zero, but C1 cannot guarantee that. The
reason is that the input-output formula of C1 is true, meaning that, no matter what its input u is, C1 may
output any value for x and y, non-deterministically. This violates the input requirements of C2 , causing
an incompatibility. We will return to this point in §5.8. We also note that this type of incompatibility is
impossible to prevent, by controlling the input u. In the example that follows, we see a case where the two
components are not incompatible, because the input requirements of the downstream component can be met
by strengthening the input assumptions of the upstream component:
Consider the following QLTL components:
C3
= qltl(x, y, G (x ⇒ F y))
C4
= qltl(y, (), G F y)
Then:
serial(C3 , C4 )
= serial(qltl(x, y, G (x ⇒ F y)), qltl(y, (), G F y))
= qltl(x, (), (∀y : (G (x ⇒ F y)) ⇒ G F y) ∧ (∃y : G (x ⇒ F y) ∧ G F y))
≡ qltl(x, (), G F x)
In this example, the downstream component C4 requires its input y to be infinitely often true (G F y).
This can be achieved only if the input x of the upstream component is infinitely often true, which is the
condition derived by the serial composition of C3 and C4 (G F x). Notice that C3 does not impose any apriori requirements on its input. However, its input-output relation is the so-called request-response property
which can be expressed as: whenever the input x is true, the output y will eventually become true afterwards
(G (x ⇒ F y)). This request-response property implies that in order for y to be infinitely-often true, x must
be infinitely-often true. Moreover, this is the weakest possible condition that can be enforced on x in order
to guarantee that the condition on y holds.
5.4
Symbolic Computation of Parallel Composition
Given a composite component formed as the parallel composition of two components, C = C1 k C2 , we
would like to compute an atomic component Ca , such that Ca is semantically equivalent to C. We show
how this can be done in this subsection. The symbolic computation of parallel composition follows the same
pattern as the one for serial composition (§5.3).
29
5.4.1
Symbolic Parallel Composition of Two QLTL Components
Let C = qltl(x, y, ϕ) and C 0 = qltl(u, v, ϕ0 ).
parallel(C, C 0 ), is the QLTL component defined by
Then their symbolic parallel composition, denoted
parallel(C, C 0 ) = qltl (x, u), (y, v), ϕ ∧ ϕ0
(18)
As in the case of symbolic serial composition, we assume that variable names x, y, u, v are all distinct. If
this is not the case, then we rename variables as appropriately.
5.4.2
Symbolic Parallel Composition of Two General STS Components
Let C = sts(x, y, s, init, trs) and C 0 = sts(u, v, t, init0 , trs0 ). Then:
parallel(C, C 0 ) = sts (x, u), (y, v), (s, t), init ∧ init0 , trs ∧ trs0
5.4.3
(19)
Symbolic Parallel Composition of Two Stateless STS Components
Let C = stateless(x, y, trs) and C 0 = stateless(u, v, trs0 ). Then
parallel(C, C 0 ) = stateless (x, u), (y, v), trs ∧ trs0
5.4.4
(20)
Symbolic Parallel Composition of Two Deterministic STS Components
Let C = det(x, s, a, p, next, out) and C 0 = det(u, t, b, p0 , next0 , out0 ). Then:
parallel(C, C 0 ) = det (x, u), (s, t), (a, b), p ∧ p0 , (next, next0 ), (out, out0 )
5.4.5
(21)
Symbolic Parallel Composition of Two Stateless Deterministic STS Components
Let C = stateless det(x, p, out) and C 0 = stateless det(u, p0 , out0 ). Then:
parallel(C, C 0 ) = stateless det (x, u), p ∧ p0 , (out, out0 )
5.4.6
(22)
Symbolic Parallel Composition of Two Arbitrary Atomic Components
Similar to the symbolic serial composition, we define the symbolic parallel composition of two atomic components C and C 0 by using the mappings of less general components to more general components (Fig. 5), as
appropriate. Formally, assume that atm, atm 0 ∈ {qltl, sts, stateless, det, stateless det} are the types
of the components C and C 0 , and common = atm ∨ atm 0 is the least general component type that is more
general than atm and atm 0 as defined in Fig. 5. Then
parallel(C, C 0 ) = parallel(atm2common(C), atm 0 2common(C 0 )).
5.4.7
Correctness of Symbolic Parallel Composition
The following theorem demonstrates that our symbolic computations of parallel composition are also correct,
i.e., that the resulting atomic component parallel(C, C 0 ) is semantically equivalent to the original composite
component C k C 0 :
Theorem 9. If C and C 0 are two atomic components, then
C k C 0 ≡ parallel(C, C 0 ).
30
5.5
5.5.1
Symbolic Computation of Feedback Composition for Decomposable Deterministic STS Components
Decomposable Components
We provide a symbolic closed-form expression for the feedback composition of a deterministic STS component, provided such a component is decomposable. Intuitively, decomposability captures the fact that the
first output of the component, y1 , does not depend on its first input, x1 . This ensures that the feedback
composition (which connects y1 to x1 ) does not introduce any circular dependencies.
Definition
21
(Decomposability).
Let
C
be
a
deterministic
STS
det (x1 , . . . , xn ), s, a, p, next, (e1 , . . . , em ) or
a
stateless
deterministic
STS
stateless det (x1 , . . . , xn ), p, (e1 , . . . , em ) . C is called decomposable if x1 is not free in e1 .
component
component
e1
x1
x2 , . . . , x n
•
e2
...
em
e1
x2 , . . . , x n
(a)
•
x1
e2
...
em
(b)
Figure 6: (a) Decomposable deterministic component; (b) the same component after applying feedback,
connecting its first output to x1 .
Decomposability is illustrated in Fig. 6a. The figure shows that expression e1 depends only on inputs
x2 , . . . , x n .
5.5.2
Symbolic Feedback of a Decomposable Deterministic STS Component
For a decomposable deterministic STS component C = det((x1 , . . . , xn ), s, a, p, next, (e1 , . . . , em )), its symbolic feedback composition, denoted feedback(C), is the deterministic STS component defined by
feedback(C) = det (x2 , . . . , xn ), s, a, p[x1 := e1 ], next[x1 := e1 ], (e2 [x1 := e1 ], . . . , em [x1 := e1 ])
(23)
Thus, computing feedback symbolically consists in removing the first input of the component and replacing
the corresponding variable x1 by the expression of the first output, e1 , everywhere where x1 appears. The
feedback operator is illustrated in Fig. 6b.
5.5.3
Symbolic Feedback of a Decomposable Stateless Deterministic STS Component
For a decomposable stateless deterministic STS component C = stateless det((x1 , . . . , xn ), p, (e1 , . . . , em )),
feedback(C) is the stateless deterministic STS component defined by
feedback(C) = stateless det (x2 , . . . , xn ), p[x1 := e1 ], (e2 [x1 := e1 ], . . . , em [x1 := e1 ])
(24)
5.5.4
Correctness of Symbolic Feedback Composition
Theorem 10. If C is a decomposable deterministic STS component, then
fdbk(C) ≡ feedback(C)
31
Providing closed-form symbolic computations of feedback composition for general components, including
possibly non-deterministic STS and QLTL components, is an open problem, beyond the scope of the current
paper. We remark that the straightforward idea of adding to the contract the equality constraint x = y
where y is the output connected in feedback to input x, does not work.3
In fact, even obtaining a semantically consistent compositional definition of feedback for non-deterministic
and non-input-receptive systems is a challenging problem [67]. Nevertheless, the results that we provide here
are sufficient to cover the majority of cases in practice. In particular, the symbolic operator feedback can
be used to handle Simulink diagrams, provided these diagrams do not contain algebraic loops, i.e., circular
dependencies (see §5.7).
5.6
Closure Properties of MPT Subclasses w.r.t. Composition Operators
In addition to providing symbolic computation procedures, the results of the above subsections also prove
closure properties of the various MPT subclasses of RCRS with respect to the three composition operators.
These closure properties are summarized in Tables 1 and 2.
In a nutshell, both serial and parallel composition preserve the most general type of the composed
components, according to the lattice in Fig. 5. For instance, the serial (or parallel) composition of two
stateless STS components is a stateless STS component; the serial (or parallel) composition of a stateless
STS component and a general STS component is a general STS component; and so on. Feedback preserves
the type of its component (deterministic or stateless deterministic).
; and k
qltl
sts
stateless
det
stateless det
qltl
qltl
qltl
qltl
qltl
qltl
sts
qltl
sts
sts
sts
sts
stateless
qltl
sts
stateless
sts
stateless
det
qltl
sts
sts
det
det
stateless det
qltl
sts
stateless
det
stateless det
Table 1: Closure properties of serial and parallel compositions. The table is to be read as follows: given
atomic components C1 , C2 of types as specified in a row/column pair, the serial or parallel composition of
C1 and C2 is an atomic component of type as specified in the corresponding table entry.
fdbk
det and decomposable
det
stateless det and decomposable
stateless det
Table 2: Closure properties of feedback composition.
5.7
Symbolic Simplification of Arbitrary Composite Components
The results of the previous subsections show how to simplify into an atomic component the serial or parallel
composition of two atomic components, or the feedback composition of an atomic decomposable component. We can combine these techniques in order to provide a general symbolic simplification algorithm: the
algorithm takes as input an arbitrarily complex composite component, and returns an equivalent atomic
component. The algorithm is shown in Fig. 7.
The algorithm fails only in case it encounters the feedback of a non-decomposable component. Recall
that decomposability implies determinism (c.f. §5.5.1), which means that the test C 00 is decomposable means
3 One of several problems of this definition is that it does not preserve refinement. For example, the stateless component
with contract x 6= y refines the stateless component with contract true. Adding the constraint x = y to both contracts yields
the components with contracts x = y and false, respectively, where the latter no longer refines the former. For a more detailed
discussion, see [67].
32
atomic(C) :
if C is atomic then
return C
else if C is C 0 ; C 00 then
return serial(atomic(C 0 ), atomic(C 00 ))
else if C is C 0 k C 00 then
return parallel(atomic(C 0 ), atomic(C 00 ))
else if C is fdbk(C 0 ) then
C 00 := atomic(C 0 )
if C 00 is decomposable then
return feedback(C 00 )
else
fail
else /* impossible by definition of syntax */
fail
Figure 7: Simplification algorithm for arbitrary composite components.
that C 00 is of the form det((x1 , . . .), s, a, p, next, (e1 , . . .)) or stateless det((x1 , . . .), p, (e1 , . . .)) and x1 is
not free in e1 .
We note that in practice, our RCRS implementation on top of Isabelle performs more simplifications in
addition to those performed by the procedure atomic. For instance, our implementation may be able to
simplify a logical formula φ into an equivalent but simpler formula φ0 (e.g., by eliminating quantifiers from
φ), and consequently also simplify a component, say, qltl(x, y, φ) into an equivalent but simpler component
qltl(x, y, φ0 ). These simplifications very much depend on the logic used in the components. Describing the
simplifications that our implementation performs is outside the scope of the current paper, as it belongs in
the realm of computational logic. It suffices to say that our tool is not optimized for this purpose, and could
leverage specialized tools and relevant advances in the field of computational logic.
5.7.1
Deterministic and Algebraic Loop Free Composite Components
In order to state and prove correctness of the algorithm, we extend the notion of determinism to a composite
component. We also introduce the notion of algebraic loop free components, which capture systems with no
circular and intantaneous input-output dependencies.
A (possibly composite) component C is said to be deterministic if every atomic component of C is either
a deterministic STS component or a stateless deterministic STS component. Formally, C is deterministic iff
determ(C) is true, where determ(C) is defined inductively on the structure of C:
determ(det(x, s, a, p, n, e))
=
determ(stateless det(x, p, e)) =
determ(sts(x, y, s, init, trs))
=
determ(stateless(x, y, trs))
=
determ(C ; C 0 )
=
determ(C k C 0 )
=
determ(fdbk(C))
=
true
true
false
false
determ(C) ∧ determ(C 0 )
determ(C) ∧ determ(C 0 )
determ(C)
Notice that this notion of determinism applies to a generally composite component C, i.e., a syntactic term
in our algebra of components, involving atomic components possibly composed via the three composition operators. This notion of determinism is the generalization of the syntactically deterministic STS components,
33
which are atomic. This notion of determinism is also distinct from any semantic notion of determinism
(which we have not introduced at all in this paper, as it is not needed).
For a deterministic component we define its output input dependency relation. Let C be deterministic,
and let Σin (C) = X1 × . . . × Xn and Σout (C) = Y1 × . . . × Ym . The relation OI(C) ⊆ {1, . . . , m} × {1, . . . , n}
is defined inductively on the structure of C:
OI(det((x1 , . . . , xn ), s, a, p, next, (e1 , . . . , em )))
=
OI(stateless det((x1 , . . . , xn ), p, (e1 , . . . , em ))) =
OI(C ; C 0 )
=
OI(C k C 0 )
=
OI(fdbk(C))
=
{(i, j) | xj is free in ei }
{(i, j) | xj is free in ei }
OI(C 0 ) ◦ OI(C)
OI(C) ∪ {(i + m, j + n) | (i, j) ∈ OI(C 0 )}
where Σin (C) = X1 × . . . × Xn
and Σout (C) = Y1 × . . . × Ym
{(i, j) | i > 0 ∧ j > 0 ∧ ((i + 1, j + 1) ∈ OI(C)
∨ ((i + 1, 1) ∈ OI(C) ∧ (1, j + 1) ∈ OI(C)))}
The intuition is that (i, j) ∈ OI(C) iff the i-th output of C depends on its j-th input.
The OI relation is preserved by the symbolic operations, as shown by the following lemma:
Lemma 9. If C and C 0 are deterministic STS components, then
OI(C ; C 0 )
OI(C k C 0 )
= OI(serial(C, C 0 ))
= OI(parallel(C, C 0 )).
If C is also decomposable, then
OI(fdbk(C))
= OI(feedback(C)).
We introduce now the the notion of algebraic loop free component. Intuitively, a (possibly composite)
deterministic component C is algebraic loop free if, whenever C contains a subterm of the form fdbk(C 0 ),
the first output of C 0 does not depend on its first input. This implies that whenever a feedback connection
is formed, no circular dependency is introduced. It also ensures that the simplification algorithm will never
fail. Formally, for a component C such that determ(C) is true, loop-free(C) is defined inductively on the
structure of C:
loop-free(C)
=
loop-free(C)
=
loop-free(C ; C 0 )
=
loop-free(C k C 0 )
=
loop-free(fdbk(C)) =
5.7.2
true if C = det(x, s, a, p, next, out)
true if C = stateless det(x, p, out)
loop-free(C) ∧ loop-free(C 0 )
loop-free(C) ∧ loop-free(C 0 )
loop-free(C) ∧ (1, 1) 6∈ OI(C)
Correctness of the Simplification Algorithm
Theorem 11. Let C be a (possibly composite) component.
1. If C does not contain any fdbk operators then atomic(C) does not fail and returns an atomic component such that atomic(C) ≡ C.
2. If determ(C) ∧ loop-free(C) is true then atomic(C) does not fail and returns an atomic component
such that atomic(C) ≡ C. Moreover, atomic(C) is a deterministic STS component and
OI(C) = OI(atomic(C)).
Proof. The first part of the theorem is a consequence of the fact that the symbolic serial and parallel
compositions are defined for all atomic components and return equivalent atomic components, by Theorems 8
and 9.
34
For the second part, since we have a recursive procedure, we prove its correctness by asumming the
correctness of the recursive calls. Additionally, the termination of this procedure is ensured by the fact
that all recursive calls are made on “smaller” components. Specifically: we assume that both determ(C)
and loop-free(C) hold; and we prove that atomic(C) does not fail, atomic(C) is a deterministic STS
component, atomic(C) ≡ C, and OI(C) = OI(atomic(C)).
We only consider the case C = fdbk(C 0 ). All other cases are similar, but simpler. Because determ(C)
and loop-free(C) hold, we have that determ(C 0 ) and loop-free(C 0 ) also hold, and in addition (1, 1) 6∈
OI(C 0 ). Using the correctness assumption for the recursive call we have that atomic(C 0 ) does not fail,
C 00 = atomic(C 0 ) is a deterministic STS component, C 00 ≡ C 0 , and OI(C 00 ) = OI(C 0 ).
Because C 00 is a deterministic STS component and (1, 1) 6∈ OI(C 0 ) = OI(C 00 ), C 00 is decomposable. From
this we have that D := feedback(C 00 ) is defined. Therefore, atomic(C) returns D and does not fail. It
remains to show that D has the desired properties. By the definition of feedback(C 00 ) and the fact that C 00
is a decomposable deterministic STS component, D is also a deterministic STS component. We also have:
D = feedback(C 00 ) ≡ fdbk(C 00 ) ≡ fdbk(C 0 ) = C
where feedback(C 00 ) ≡ fdbk(C 00 ) follows from Theorem 10 and fdbk(C 00 ) ≡ fdbk(C 0 ) follows from C 00 ≡ C 0
and the semantics of fdbk.
Finally, using Lemma 9 and OI(C 00 ) = OI(C 0 ), we have
OI(D) = OI(feedback(C 00 )) = OI(fdbk(C 00 )) = OI(fdbk(C 0 )) = OI(C)
Corollary 2. If a component C does not contain any fdbk operators or if determ(C) ∧ loop-free(C) is
true, then [[C]] is a GPT.
Note that condition determ(C) ∧ loop-free(C) is sufficient, but not necessary, for [[C]] to be a GPT.
For example, consider the following components:
Constfalse = stateless det x, true, false
And
= stateless det (x, y), true, (x ∧ y, x ∧ y)
C
= Constfalse ; fdbk(And)
Constfalse outputs the constant false. And is a version of logical and with two identical outputs (we need two
copies of the output, because one will be eliminated once we apply feedback). C is a composite component,
formed by first connecting the first output of And in feedback to its first input, and then connecting the
output of Constfalse to the second input of And (in reality, to the only remaining input of fdbk(And)).
Observe that C has algebraic loops, that is, loop-free(C) does not hold. Yet it can be shown that [[C]] is a
GPT (in particular, we can show that C ≡ Constfalse ).
Example.
The simplification algorithm applied to the component from Fig. 2 results in
atomic(Sum) = atomic(fdbk(Add ; UnitDelay ; Split)) = det(y, s, 0, s + y, s).
35
To see how the above is derived, let us first calculate atomic(Add ; UnitDelay ; Split):
atomic(Add ; UnitDelay ; Split)
=
serial(atomic(Add ; UnitDelay), Split)
=
serial(serial(Add, UnitDelay), Split)
= {Expanding Add and UnitDelay and choosing suitable variable names}
serial(serial(stateless det((x, y), true, x + y), det(z, s, 0, true, z, s)), Split)
=
{Computing inner serial}
serial(det((x, y), s, 0, true, x + y, s), Split)
=
{Expanding Split and choosing suitable variable names}
serial(det((x, y), s, 0, true, x + y, s), stateless det(z, true, (z, z)))
=
{Computing remaining serial}
det((x, y), s, 0, true, x + y, (s, s))
We calculate now atomic(fdbk(det((x, y), s, 0, true, x + y, (s, s)))):
atomic(fdbk(det((x, y), s, 0, true, x + y, (s, s))))
= {x is not free in s}
feedback(det((x, y), s, 0, true, x + y, (s, s)))
= {Computing feedback}
det(y, s, 0, true, s + y, s)
5.8
Checking Validity and Compatibility
Recall the example given in §5.3.7, of the serial composition of components C1 and C2 , resulting in a
component with input-output relation false, implying that [[C1 ; C2 ]] = Fail. When this occurs, we say that
C1 and C2 are incompatible. We would like to catch such incompatibilities. This amounts to first simplifying
the serial composition C1 ; C2 into an atomic component C, and then checking whether [[C]] = Fail.
In general, we say that a component C is valid if [[C]] 6= Fail. Given a component C, we can check
whether it is valid, as follows. First, we simplify C to obtain an atomic component C 0 = atomic(C). If C 0
is a QLTL component of the form qltl(x, y, ϕ) then C 0 is valid iff ϕ is satisfiable. The same is true if C 0 is
a stateless STS component of the form stateless(x, y, ϕ). If C 0 is a general STS component then we can
first transform it into a QLTL component and check satisfiability of the resulting QLTL formula.
Theorem 12. If C is an atomic component of the form qltl(x, y, ϕ) or stateless(x, y, ϕ), then [[C]] 6= Fail
iff ϕ is satisfiable.
As mentioned in the introduction, one of the goals of RCRS is to function as a behavioral type system
for reactive system modeling frameworks such as Simulink. In the RCRS setting, type checking consists
in checking properties such as compatibility of components, as in the example C1 ; C2 of §5.3.7. When
components are compatible, by computing new (stronger) input preconditions like in the example C3 ; C4
of §5.3.7, RCRS can be seen as enabling to perform behavioral type inference. Indeed, the new derived
condition G F x in the above example can be seen as an inferred type of the composite component C3 ; C4 .
We note that the decidability of the satisfiability question for ϕ depends on the logic used and the domains
of the variables in the formula. For instance, although ϕ can be a QLTL formula, if it restricts the set of
36
constants to true, has no functional symbols, and only equality as predicate symbol, then it is equivalent to
a QPTL formula,4 for which we can use available techniques [76].
5.9
Checking Input-Receptiveness and Computing Legal Inputs Symbolically
Given a component C, we often want to check whether it is input-receptive, i.e., whether legal([[C]]) = >,
or equivalently, [[C]](>) = >. More generally, we may want to compute the legal input values for C, which
is akin to type inference as discussed above. To do this, we will provide a symbolic method to compute
legal([[C]]) as a formula legal(C). Then, checking that C is input-receptive amounts to checking that the
formula legal(C) is valid, or equivalently, checking that ¬legal(C) is unsatisfiable. We assume that C is
atomic (otherwise, we first simplify C using the algorithm of §5.7).
Definition 22. Given an atomic component C, we define legal(C), a formula characterizing the legal inputs
of C. legal(C) is defined based on the type of C:
legal qltl(x, y, ϕ) = (∃y : ϕ)
(25)
0
legal sts(x, y, s, init, trs) = (∀s, y : init ⇒ (ϕ L ϕ ))
(26)
legal stateless(x, y, trs) = G (∃y : trs)
(27)
legal det(x, s, a, p, next, out) = (∀s, y : s = a ⇒ (# s = next ∧ y = out) L p)
(28)
(29)
legal stateless det(x, p, out) = G p
where ϕ = trs[s0 := # s] and ϕ0 = (∃s0 , y : trs).
The next theorem shows that legal correctly characterizes the semantic predicate legal:
Theorem 13. If C is an atomic component , then
legal([[C]]) = {σx | σx |= legal(C)}.
It follows from Theorem 13 that a component C is input-receptive iff the formula legal(C) is valid.
5.10
Checking Refinement Symbolically
We end this section by showing how to check whether a component refines another component. Again, we
will assume that the components in question are atomic (if not, they can be simplified using the atomic
procedure).
Theorem 14. Let C1 = sts(x, y, s, init, r1 ), C10 = sts(x, y, s, init0 , r10 ), C2 = stateless(x, y, r2 ), C20 =
stateless(x, y, r20 ), C3 = qltl(x, y, ϕ), and C30 = qltl(x, y, ϕ0 ). Then:
1. C1 is refined by C10 if the formula
(init0 ⇒ init) ∧ ((∃s0 , y : r1 ) ⇒ (∃s0 , y : r10 )) ∧ ((∃s0 , y : r1 ) ∧ r10 ⇒ r)
is valid.
2. C2 is refined by C20 if and only if the formula
(∃y : r2 ) ⇒ (∃y : r20 ) ∧ (∃y : r2 ) ∧ r20 ⇒ r2
is valid.
4
For example, the atomic QLTL formula # # x = # y can be translated into the LTL formula X X x ⇔ X y, and the
formula # # # x = true into X X X x.
37
3. C3 is refined by C30 if and only if the formula
(∃y : ϕ) ⇒ (∃y : ϕ0 ) ∧ ((∃y : ϕ) ∧ ϕ0 ) ⇒ ϕ
is valid.
As the above theorem shows, checking refinement amounts to checking validity (or equivalently, satisfiability of the negation) of first-order formulas formed by the various symbolic expressions in the component
specifications. The exact logic of these formulas depends on the logics used by the components. For example,
if C3 and C30 both use quantifier-free LTL for φ and φ0 , then in order to check refinement we need to check
satisfiability of a first-order QLTL formula.
Examples.
Consider again the QLTL component C = qltl((), t, oven), introduced in §3.3, where
oven =
(t = 20 ∧ ((t < # t ∧ t < 180) U thermostat))
thermostat = G (180 ≤ t ∧ t ≤ 220)
Let us introduce a refined version C 0 of C:
C0
=
sts((), t, (s, sw), init, trs) where
init =
s = 20 ∧ sw = on
trs
(t = s) ∧
=
(if sw = on then s < s0 < s + 5 else (if s > 10 then s − 5 < s0 < s else s0 = s)) ∧
(if sw = on ∧ s > 210 then sw0 = off else
(if sw = off ∧ s < 190 then sw0 = on else sw0 = sw))
C 0 is an STS component with no input variables, output variable t, and state variables s and sw, recording
the current temperature of the oven, and the on/off status of the switch, respectively. When sw is on, the
temperature increases nondeterministically by up to 5 units, otherwise the temperature decreases nondeterministically by up to 5 units. When the temperature exceeds 210, the switch is turned off; when the
temperature is below 190, the switch is turned on; otherwise sw remains unchanged. The output t is always
equal to the current state s. Initially the temperature is 20, and sw is on.
Using Theorem 14, and the properties of sts2qltl we have:
C C0
⇐⇒
C sts2qltl(C 0 )
⇐⇒
qltl((), t, oven) qltl((), t, (∀s, sw, t : init ⇒ (ϕ L ϕ0 )) ∧ (∃s, sw : init ∧ G ϕ))
⇐⇒
where ϕ = trs[s0 , sw0 := # s, # sw] and ϕ0 = (∃s0 , sw0 , t : trs)
{Using Lemma 1, because ϕ0 ⇐⇒ true}
qltl((), t, oven) qltl((), t, (∃s, sw : init ∧ G ϕ))
⇐⇒
{Using Theorem 14}
(∃t : oven) ⇒ (∃t, s, sw : init ∧ G ϕ) ∧ ((∃t : oven) ∧ (∃s, sw : init ∧ G ϕ)) ⇒ oven is valid
⇐⇒
{Because (∃t : oven) ⇐⇒ true and (∃t, s, sw : init ∧ G ϕ) ⇐⇒ true}
(∃s, sw : init ∧ G ϕ) ⇒ oven is valid
Thus, checking whether C 0 refines C amounts to checking whether the QLTL formula (∃s, sw : init∧G ϕ) ⇒
oven is valid. This indeed holds for this example and can be shown using logical reasoning.
38
The above example is relatively simple in the sense that in the end refinement reduces to checking
implication between the corresponding contracts. Indeed, this is always the case for input-receptive systems,
as in the example above. However, refinement is not equivalent to implication in the general case of noninput-receptive systems. For example, consider the components:
C1
= stateless(x, y, x ≥ 0 ∧ y ≥ x)
C2
= stateless(x, y, x ≤ y ≤ x + 10)
Using Theorem 14, we have:
C1 C2
⇐⇒
{Theorem 14}
((∃y : x ≥ 0 ∧ y ≥ x) ⇒ (∃y : x ≤ y ≤ x + 10)) ∧
((∃y : x ≥ 0 ∧ y ≥ x) ∧ x ≤ y ≤ x + 10 ⇒ x ≥ 0 ∧ y ≥ x) is valid
⇐⇒
{Arithmetic and logical reasoning}
true
Note that the second and third parts of Theorem 14 provide necessary and sufficient conditions, while
the first part only provides a sufficient, but generally not necessary condition. Indeed, the condition is
generally not necessary in the case of STS components with state, as state space computation is ignored by
the condition. This can be remedied by transforming STS components into equivalent QLTL components
and then applying the second part of the theorem. An alternative which may be more tractable, particularly
in the case of finite-state systems, is to use techniques akin to strategy synthesis in games, such as those
proposed in [79] for finite-state relational interfaces.
Another limitation of the first part of Theorem 14 is that it requires the two STS components to have
the same state space, i.e., the same state variable s. This restriction can be lifted using the well-known idea
of data refinement [44, 8].
Theorem 15. Let C1 = sts(x, y, s, init, r), C2 = sts(x, y, t, init0 , r0 ) be two STS components, and D a
(data refinement) expression on variables s and t. Let p = (∃s0 , y : r) and p0 = (∃t0 , y : r0 ). If the formulas
(∀t : init0 ⇒ (∃s : D ∧ init))
(∀t, x, s : D ∧ p ⇒ p0 )
(∀t, x, s, t0 , y : D ∧ p ∧ r0 ⇒ (∃s0 : D[t, s := t0 , s0 ] ∧ r))
are valid, then C1 is refined by C2 .
6
Toolset and Case Studies
The RCRS framework comes with a toolset, illustrated in Fig. 8. The toolset is publicly available under
the MIT license and can be downloaded from http://rcrs.cs.aalto.fi. The toolset is described in tool
papers [32, 33] ([32] contains additional material over [33], specifically, a six-page appendix describing a
demo of the RCRS toolset). In summary, the toolset consists of:
• A full implementation of the RCRS theory in Isabelle [61]. The implementation consists of 22 theory
files and a total of 27588 lines of Isabelle code. A detailed description of the implementation can be
found in the file document.pdf available in the public distribution of RCRS.
• A formal Analyzer, which is a set of procedures implemented on top of Isabelle and the functional
programming language SML. The Analyzer performs compatibility checking, automatic contract simplification, and other functions.
39
Options
(translation strategy, etc.)
Fuel Control System Model
RCRS theory and component library
(Isabelle theory files)
This model uses only the ODEs to implement the dynamics.
theta [0 90]
1
throttle input (deg)
[0, 81.2]
1
.1s+1
1
A/F
Throttle del ay1
1
s
f(u)
8.8
ODE1
Base opening angle
~=
1
s
1
s
f(u)
pe
ODE4 Closed
double
2
~=
Fuel Cmd Open Pwr
Analyzer
f(u)
0.0
f(u)
airbyfuel_ref
14.7
lambda
f(u)
ODE3
incompatiblity detection
12.5
p
f(u)
ODE2
ODE4 Open
~=
Fuel Cmd Open
1
s
~=
i
f(u)
f(u)
Fuel Cmd Closed
InputPoly
2
engine speed (rpm)
[900,1100]
pi/30
AND
(rpm) to (rad/s)
internal variable elimination
Power Mode Guard
boolean
Starup Mode
1: Failure
0: Normal
In
Out
Startup Mode Latch
boolean
FaultInjection
In
Out
Sensor Failure Detection Latch
OR
3
controller_mode
NOT
Powertrain Control Benchmark Model
Toyota Technial Center
2014
This is a model of a hybrid automaton with polynomial dynamics, and an implementation of the 3rd model that appears in
"Powertrain Control Verification Benchmark", 2014 Hybrid Systems: Computation and Control,
X. Jin, J. V. Deshmukh, J.Kapinski, K. Ueda, and K. Butts
Simulink
diagram
Translator
RCRS model
of the diagram
(built on top of
Isabelle
theorem prover)
auto generated top-level contract
refinement checking
...
Figure 8: The RCRS toolset.
• A formalization of Simulink characterizing basic Simulink blocks as RCRS components and implementing those as a library of RCRS/Isabelle. At the time of writing this paper, 48 of Simulink’s blocks can
be handled.
• A Translator : a Python program translating Simulink hierarchical block diagrams into RCRS code.
We implemented in Isabelle a shallow embedding [14] of the language introduced in §3. The advantage of
a shallow embedding is that all datatypes of Isabelle are available for specification of components, and we
can use the existing Isabelle mechanism for renaming bound variables in compositions. The disadvantage
of this shallow embedding is that we cannot express Algorithm 7 within Isabelle (hence the “manual” proof
that we provide for Theorem 11). A deep embedding, in which the syntax of components is defined as a
datatype of Isabelle, is possible, and is left as an open future work direction.
We implemented Algorithm 7 in SML, the meta-language of Isabelle. The SML program takes as input
a component C and returns not only a simplified atomic component atomic(C), but also a proved Isabelle
theorem of the fact C ≡ atomic(C). The simplification program, as well as a number of other procedures
to perform compatibility checking, validity checking, etc., form what we call the Analyzer in Fig. 8.
The Translator takes as input a Simulink model and produces an RCRS/Isabelle theory file containing: (1)
the definition of all atomic and composite components representing the Simulink diagram; and (2) embedded
bottom-up simplification procedures and the corresponding correctness theorems. By running this theory
file in Isabelle, we obtain an atomic component corresponding to the top-level Simulink model, equivalent to
the original composite component. As a special case, if the Simulink diagram contains inconsistencies (e.g.,
division by zero), these are detected by obtaining Fail as the top-level atomic component. The error can be
localized by finding earlier points in the Simulink hierarchy (subsystems) which already resulted in Fail.
As mentioned earlier, how to obtain a composite component from a graphical block diagram is an interesting problem. This problem is studied in depth in [31], where several translation strategies are proposed.
These various strategies all yield semantically equivalent components, but with different trade-offs in terms
of size, readability, effectiveness of the simplification procedures, and so on. The Translator implements all
these translation strategies, allowing the user to explore these trade-offs. Further details on the translation
problem are provided in [31, 65]. A proof that the translation strategies yield semantically equivalent components is provided in [64]. This proof, which has been formalized in Isabelle, is a non-trivial result: the
entire formalization of the translation algorithms and the proof is 13579 lines of Isabelle code.
We have used the RCRS toolset on several case studies, including a real-life benchmark provided by
the Toyota motor company. The benchmark involves a Fuel Control System (FCS) described in [45, 46].
FCS aims at controlling the air mass and injected fuel in a car engine such that their ratio is always
optimal. This problem has important implications on lowering pollution and costs by improving the engine
performance. Toyota has made several versions of FCS publicly available as Simulink models at https:
//cps-vo.org/group/ARCH/benchmarks.
We have used the RCRS toolset to process two of the three Simulink models in the FCS benchmark suite
(the third model contains blocks that are currently not implemented in the RCRS component library). A
40
typical model in this set has a 3-layer hierarchy with a total of 104 Simulink block instances (97 basic blocks
and 7 subsystems), and 101 connections out of which 8 are feedbacks. Each basic Simulink block is modeled in
our framework by an atomic STS component (possibly stateless). These atomic STS components are created
once, and form part of the RCRS implementation, which is reused for different Simulink models. The
particular FCS diagram is translated into RCRS using the Translator, and simplified within Isabelle using
our SML simplification procedure. After simplification, we obtain an atomic deterministic STS component
with no inputs, 7 outputs, and 14 state variables. Its contract (which is 8337 characters long) includes a
condition on the state variables, in particular, that a certain state variable must always be non-negative (as
its value is fed into a square-root block). This condition makes it not immediately obvious that the whole
system is valid (i.e., not Fail). However, we can show after applying the transformation sts2qltl that the
resulting formula is satisfiable, which implies that the original model is consistent (i.e., no connections result
in incompatibilities, there are no divisions by zero, etc.). This illustrates the use of RCRS as a powerful
static analysis tool. More details on the FCS case study are provided in [31, 65, 32].
7
Related Work
Several formal compositional frameworks exist in the literature. Most closely related to RCRS are the
frameworks of FOCUS [15], input-output automata [54], reactive modules [6], interface automata [22], and
Dill’s trace theory [29]. RCRS shares with these frameworks many key compositionality principles, such as
the notion of refinement. At the same time, RCRS differs and complements these frameworks in important
ways. Specifically, FOCUS, IO-automata, and reactive modules, are limited to input-receptive systems,
while RCRS is explicitly designed to handle non-input-receptive specifications. The benefits of non-inputreceptiveness are discussed extensively in [79] and will not be repeated here. Interface automata are a
low-level formalism whereas RCRS specifications and reasoning are symbolic. For instance, in RCRS one
can naturally express systems with infinite state-spaces, input-spaces, or output-spaces. (Such systems can
even be handled automatically, provided the corresponding logic they are expressed in is decidable.) Both
interface automata and Dill’s trace theory use a single form of asynchronous parallel composition, whereas
RCRS has three primitive composition operators (serial, parallel, feedback) with synchronous semantics.
Our work adapts and extends to the reactive system setting many of the ideas developed previously in a
long line of research on correctness and compositionality for sequential programs. This line of research goes
back to the works of Floyd, Hoare, Dijkstra, and Wirth, on formal program semantics, weakest preconditions,
program development by stepwise refinement, and so on [34, 43, 27, 81]. It also goes back to game-theoretic
semantics of sequential programs as developed in the original refinement calculus [10], as well as to contractbased design [57]. Many of the concepts used in our work are in spirit similar to those used in the above
works. For instance, an input-output formula φ used in an atomic component in our language can be seen
as a contract between the environment of the component and the component itself: the environment must
satisfy the contract by providing to the component legal inputs, and the component must in turn provide
legal outputs (for those inputs). On the other hand, several of the concepts used here come from the world
of reactive systems and as such do not have a direct correspondence in the world of sequential programs.
For instance, this is the case with feedback composition.
RCRS extends refinement calculus from predicate to property transformers. Extensions of refinement
calculus to infinite behaviors have also been proposed in the frameworks of action systems [11], fair action
systems [12], and Event B [3]. These frameworks use predicate (not property) transformers as semantic
foundation; they can handle certain property patterns (e.g., fairness) by providing proof rules for these
properties, but they do not treat livenes and LTL properties in general [12, 82, 42]. The Temporal Logic of
Actions [49] can be used to specify liveness properties, but does not distinguish between inputs and outputs,
and as such cannot express non-input-receptive components.
Our specifications can be seen as “rich”, behavioral types [50, 22]. Indeed, our work is closely related to
programming languages and type theory, specifically, refinement types [35], behavioral types [60, 51, 26], and
liquid types [69].
Behavioral type frameworks have also been proposed in reactive system settings. In the SimCheck
41
framework [70], Simulink blocks are annotated with constraints on input and output variables, much like
stateless components in RCRS. RCRS is more general as it also allows to specify stateful components. RCRS
is also a more complete compositional framework, with composition operators and refinement, which are not
considered in [70]. Other behavioral type theories for reactive systems have been proposed in [23, 18, 30].
Compared to RCRS, these works are less general. In particular, [23, 30] are limited to specifications which
separate the assumptions on the inputs from the guarantees on the outputs, and as such cannot capture
input-output relations. [18] considers a synchronous model which allows to specify legal values of inputs and
outputs at the next step, given the current state. This model does not allow to capture relations between
inputs and outputs within the same step, which RCRS allows.
Our work is related to formal verification frameworks for hybrid systems [5]. Broadly speaking, these
can be classified into frameworks following a model-checking approach, which typically use automata-based
specification languages and state-space exploration techniques, and those following a theorem-proving approach, which typically use logic-based specifications. More closely related to RCRS are the latter, among
which, CircusTime [17], KeYmaera [37], and the PVS-based approach in [2]. CircusTime can handle a larger
class of Simulink diagrams than the current implementation of RCRS. In particular, CircusTime can handle
multi-rate diagrams, where different parts of the model work at different rates (periods). On the other hand,
CircusTime is based on predicate (not property) transformers, and as such cannot handle liveness properties. KeYmaera is a theorem prover based on differential dynamic logic [62], which is itself based on dynamic
logic [39]. The focus of both KeYmaera and the work in [2] is verification, and not compositionality. For
instance, these works do not distinguish between inputs and outputs and do not investigate considerations
such as input-receptiveness. The work of [68] distinguishes inputs and outputs, but provides a system model
where the output relation is separated from the transition relation, and where the output relation is assumed
to be total, meaning that there exists an output for every input and current state combination. This does
not allow to specify non-input-receptive stateless components, such as for example the Div component from
§3.
Our component algebra is similar to the algebra of flownomials [77] and to the relational model for nondeterministic dataflow [41]. In [20], graphs and graph operations which can be viewed as block diagrams
are represented by algebraic expressions and operations, and a complete equational axiomatization of the
equivalence of the graph expressions is given. This is then applied to flow-charts as investigated in [72]. The
translation of block diagrams in general and Simulink in particular has been treated in a large number of
papers, with various goals, including verification and code generation (e.g., see [80, 56, 19, 52, 73, 13, 83, 84,
85, 58]). Although we share several of the ideas of the above works, our main goal here is not to formalize
the language of block diagrams, neither their translation to other formalisms, but to provide a complete
compositional framework for reasoning about reactive systems.
RCRS is naturally related to compositional verification frameworks, such as [38, 1, 55, 74, 40, 24, 25].
In particular, compositional verification frameworks often make use of a refinement relation such as trace
inclusion or simulation [74, 40]. However, the focus of these frameworks is different than that of RCRS.
In compositional verification, the focus is to “break down” a large (and usually computationally expensive)
verification task into smaller (and hopefully easier to calculate) subtasks. For this purpose, compositional
verification frameworks employ several kinds of decomposition rules. An example of such a rule is the socalled precongruence rule (i.e., preservation of refinement by composition): if P1 refines Q1 , and P2 refines
Q2 , then the composition P1 kP2 refines Q1 kQ2 . This, together with preservation of properties by refinement,
allows us to conclude that P1 kP2 satisfies some property φ, provided we can prove that Q1 kQ2 satisfies φ.
The latter might be a simpler verification task, if Q1 and Q2 are smaller than P1 and P2 . The essence of
compositional verification is in finding such abstract versions Q1 and Q2 of the concrete processes in question,
P1 and P2 , and employing decomposition rules like the one above in the hope of making verification simpler.
RCRS can also be used for compositional verification: indeed, RCRS provides both the precongruence rule,
and preservation of properties by refinement. Note that, in traditional settings, precongruence is not always
powerful enough, and for this reason most compositional verification frameworks employ more complex
decomposition rules (e.g., see [59]). In settings which allow non-input-receptive components, such as ours,
there are indications that the precongruence rule is sufficient for compositional verification purposes [75],
42
although more work is required to establish this in the specific context of RCRS. Such work is beyond the
scope of the current paper. We also note that, beyond compositional verification with precongruence, RCRS
provides a behavioral type theory which allows to state system properties such as compatibility, which is
typically not available in compositional verification frameworks.
Refinement can be seen as the inverse of abstraction, and as such our framework is related to general
frameworks such as abstract interpretation [21]. Several abstractions have been proposed in reactive system
settings, including relational abstractions for hybrid systems, which are related to Simulink [71]. The focus
of these works is verification, and abstraction is used as a mechanism to remove details from the model
that make verification harder. In RCRS, the simplification procedure that we employ can be seen as an
abstraction process, as it eliminates internal variable information. However, RCRS simplification is an exact
abstraction, in the sense that it does not lose any information: the final system is equivalent to the original
one, and not an over- or under-approximation, as is usually the case with typical abstractions for verification
purposes.
8
Conclusion
We presented RCRS, a compositional framework for modeling and reasoning about reactive systems. This
paper focuses on the theory and methodology of RCRS, its formal semantics, and techniques for symbolic
and computer-aided reasoning.
RCRS is an ongoing project, and a number of problems remain open. Future work directions include:
• An extension of the framework to systems with algebraic loops, which necessitates handling instantaneous feedback. Here, the preliminary ideas of [67] can be helpful in defining the semantics of instantaneous feedback. However, [67] does not provide solutions on how to obtain symbolic closed-form
expression for the feedback of general components.
• Extension of the results of §5.5 to general components, possibly non-deterministic or non-decomposable.
• An extension of the framework to acausal systems, i.e., systems without a clear distinction of inputs
and outputs [36].
• The development of better symbolic reasoning techniques, such as simplification of logical formulas,
decision procedures, etc.
References
[1] M. Abadi and L. Lamport. Conjoining specifications. ACM Trans. Program. Lang. Syst., 17(3):507–535,
1995.
[2] E. Ábrahám-Mumm, M. Steffen, and U. Hannemann. Verification of hybrid systems: Formalization
and proof rules in PVS. In 7th Intl. Conf. Engineering of Complex Computer Systems (ICECCS 2001),
pages 48–57, 2001.
[3] J.-R. Abrial. Modeling in Event-B: System and Software Engineering. Cambridge University Press, New
York, NY, USA, 1st edition, 2010.
[4] B. Alpern and F. B. Schneider. Defining liveness. Information Processing Letters, 21(4):181 – 185, 1985.
[5] R. Alur, C. Courcoubetis, N. Halbwachs, T. Henzinger, P. Ho, X. Nicollin, A. Olivero, J. Sifakis, and
S. Yovine. The algorithmic analysis of hybrid systems. Theoretical Computer Science, 138:3–34, 1995.
[6] R. Alur and T. Henzinger. Reactive modules. Formal Methods in System Design, 15:7–48, 1999.
43
[7] R. Alur, T. Henzinger, O. Kupferman, and M. Vardi. Alternating refinement relations. In CONCUR’98,
volume 1466 of LNCS. Springer, 1998.
[8] R. J. Back. Correctness preserving program refinements: proof theory and applications, volume 131 of
Mathematical Centre Tracts. Mathematisch Centrum, Amsterdam, 1980.
[9] R.-J. Back and M. Butler. Exploring summation and product operators in the refinement calculus, pages
128–158. Springer Berlin Heidelberg, Berlin, Heidelberg, 1995.
[10] R.-J. Back and J. von Wright. Refinement Calculus: A Systematic Introduction. Springer, 1998.
[11] R.-J. Back and J. Wright. Trace refinement of action systems. In B. Jonsson and J. Parrow, editors,
CONCUR ’94: Concurrency Theory, volume 836 of Lecture Notes in Computer Science, pages 367–384.
Springer Berlin Heidelberg, 1994.
[12] R.-J. Back and Q. Xu. Refinement of fair action systems. Acta Informatica, 35(2):131–165, 1998.
[13] P. Boström. Contract-Based Verification of Simulink Models. In S. Qin and Z. Qiu, editors, Formal
Methods and Software Engineering, volume 6991 of Lecture Notes in Computer Science, pages 291–306.
Springer Berlin Heidelberg, 2011.
[14] R. J. Boulton, A. Gordon, M. J. C. Gordon, J. Harrison, J. Herbert, and J. V. Tassel. Experience with
embedding hardware description languages in HOL. In IFIP TC10/WG 10.2 Intl. Conf. on Theorem
Provers in Circuit Design, pages 129–156. North-Holland Publishing Co., 1992.
[15] M. Broy and K. Stølen. Specification and development of interactive systems: focus on streams, interfaces, and refinement. Springer, 2001.
[16] R. Cavada, A. Cimatti, M. Dorigatti, A. Griggio, A. Mariotti, A. Micheli, S. Mover, M. Roveri, and
S. Tonetta. The nuxmv symbolic model checker. In A. Biere and R. Bloem, editors, Computer Aided
Verification: 26th International Conference, CAV 2014,, pages 334–342, Cham, 2014. Springer.
[17] A. L. C. Cavalcanti, A. Mota, and J. C. P. Woodcock. Simulink timed models for program verification.
In Z. Liu, J. C. P. Woodcock, and H. Zhu, editors, Theories of Programming and Formal Methods Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday, volume 8051 of Lecture Notes in
Computer Science, pages 82–99. Springer, 2013.
[18] A. Chakrabarti, L. de Alfaro, T. Henzinger, and F. Mang. Synchronous and bidirectional component
interfaces. In CAV, LNCS 2404, pages 414–427. Springer, 2002.
[19] C. Chen, J. S. Dong, and J. Sun. A formal framework for modeling and validating Simulink diagrams.
Formal Aspects of Computing, 21(5):451–483, 2009.
[20] B. Courcelle. A representation of graphs by algebraic expressions and its use for graph rewriting
systems. In H. Ehrig, M. Nagl, G. Rozenberg, and A. Rosenfeld, editors, Graph-Grammars and Their
Application to Computer Science, 3rd International Workshop, Warrenton, Virginia, USA, December
2-6, 1986, volume 291 of Lecture Notes in Computer Science, pages 112–132. Springer, 1986.
[21] P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs
by construction or approximation of fixpoints. In 4th ACM Symp. POPL, 1977.
[22] L. de Alfaro and T. Henzinger. Interface automata. In Foundations of Software Engineering (FSE).
ACM Press, 2001.
[23] L. de Alfaro and T. Henzinger. Interface theories for component-based design. In EMSOFT’01. Springer,
LNCS 2211, 2001.
44
[24] W. de Roever, H. Langmaack, and A. E. Pnueli. Compositionality: The Significant Difference. LNCS.
Springer, 1998.
[25] W.-P. de Roever, F. de Boer, U. Hanneman, J. Hooman, Y. Lakhnech, M. Poel, and J. Zwiers. Concurrency Verification: Introduction to Compositional and Non-compositional Methods. Cambridge University Press, 2012.
[26] K. Dhara and G. Leavens. Forcing behavioral subtyping through specification inheritance. In ICSE’96:
18th Intl. Conf. on Software Engineering, pages 258–267. IEEE Computer Society, 1996.
[27] E. Dijkstra. Notes on structured programming. In O. Dahl, E. Dijkstra, and C. Hoare, editors, Structured
programming, pages 1–82. Academic Press, London, UK, 1972.
[28] E. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Comm. ACM,
18(8):453–457, 1975.
[29] D. Dill. Trace theory for automatic hierarchical verification of speed-independent circuits. MIT Press,
Cambridge, MA, USA, 1987.
[30] L. Doyen, T. Henzinger, B. Jobstmann, and T. Petrov. Interface theories with component reuse. In 8th
ACM & IEEE International conference on Embedded software, EMSOFT, pages 79–88, 2008.
[31] I. Dragomir, V. Preoteasa, and S. Tripakis. Compositional Semantics and Analysis of Hierarchical Block
Diagrams. In SPIN, pages 38–56. Springer, 2016.
[32] I. Dragomir, V. Preoteasa, and S. Tripakis. The Refinement Calculus of Reactive Systems Toolset.
CoRR, abs/1710.08195, 2017.
[33] I. Dragomir, V. Preoteasa, and S. Tripakis. The Refinement Calculus of Reactive Systems Toolset. In
TACAS, 2018.
[34] R. Floyd. Assigning meanings to programs. In In. Proc. Symp. on Appl. Math. 19, pages 19–32.
American Mathematical Society, 1967.
[35] T. Freeman and F. Pfenning. Refinement Types for ML. SIGPLAN Not., 26(6):268–277, May 1991.
[36] P. Fritzson. Principles of Object-Oriented Modeling and Simulation with Modelica 3.3: A Cyber-Physical
Approach. Wiley, 2 edition, 2014.
[37] N. Fulton, S. Mitsch, J.-D. Quesel, M. Völp, and A. Platzer. KeYmaera X: An axiomatic tactical
theorem prover for hybrid systems. In A. P. Felty and A. Middeldorp, editors, CADE, volume 9195 of
LNCS, pages 527–538. Springer, 2015.
[38] O. Grumberg and D. Long. Model checking and modular verification. ACM Trans. Program. Lang.
Syst., 16(3):843–871, 1994.
[39] D. Harel, J. Tiuryn, and D. Kozen. Dynamic Logic. MIT Press, 2000.
[40] T. Henzinger, S. Qadeer, and S. Rajamani. You assume, we guarantee: Methodology and case studies.
In CAV’98, volume 1427 of LNCS. Springer-Verlag, 1998.
[41] T. T. Hildebrandt, P. Panangaden, and G. Winskel. A relational model of non-deterministic dataflow.
Mathematical Structures in Computer Science, 14(5):613–649, 10 2004.
[42] T. S. Hoang and J.-R. Abrial. Reasoning About Liveness Properties in Event-B. In Proceedings of the
13th International Conference on Formal Methods and Software Engineering, ICFEM’11, pages 456–471,
Berlin, Heidelberg, 2011. Springer-Verlag.
45
[43] C. A. R. Hoare. An axiomatic basis for computer programming. Comm. ACM, 12(10):576–580, 1969.
[44] C. A. R. Hoare. Proof of correctness of data representations. Acta Informatica, 1(4), Dec. 1972.
[45] X. Jin, J. Deshmukh, J. Kapinski, K. Ueda, and K. Butts. Benchmarks for model transformations
and conformance checking. In 1st Intl. Workshop on Applied Verification for Continuous and Hybrid
Systems (ARCH), 2014.
[46] X. Jin, J. V. Deshmukh, J. Kapinski, K. Ueda, and K. Butts. Powertrain Control Verification Benchmark. In Proceedings of the 17th International Conference on Hybrid Systems: Computation and Control, HSCC’14, pages 253–262. ACM, 2014.
[47] Y. Kesten, Z. Manna, and A. Pnueli. Temporal verification of simulation and refinement. In J. W.
de Bakker, W. P. de Roever, and G. Rozenberg, editors, A Decade of Concurrency Reflections and
Perspectives: REX School/Symposium, pages 273–346. Springer, 1994.
[48] Y. Kesten and A. Pnueli. Complete Proof System for QPTL. Journal of Logic and Computation,
12(5):701, 2002.
[49] L. Lamport. The temporal logic of actions. ACM Trans. Program. Lang. Syst., 16(3):872–923, May
1994.
[50] E. Lee and Y. Xiong. System-level types for component-based design. In EMSOFT’01: 1st Intl.
Workshop on Embedded Software, pages 237–253. Springer, 2001.
[51] B. Liskov and J. Wing. A behavioral notion of subtyping. ACM Trans. Program. Lang. Syst., 16(6):1811–
1841, 1994.
[52] R. Lublinerman, C. Szegedy, and S. Tripakis. Modular code generation from synchronous block diagrams
– modularity vs. code size. In 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages (POPL’09), pages 78–89. ACM, Jan. 2009.
[53] R. Lublinerman and S. Tripakis. Modularity vs. reusability: Code generation from synchronous block
diagrams. In Design, Automation, and Test in Europe (DATE’08), pages 1504–1509. ACM, Mar. 2008.
[54] N. Lynch and M. Tuttle. An introduction to input/output automata. CWI Quarterly, 2:219–246, 1989.
[55] K. McMillan. A compositional rule for hardware design refinement. In Computer Aided Verification
(CAV’97), volume 1254 of LNCS. Springer-Verlag, 1997.
[56] B. Meenakshi, A. Bhatnagar, and S. Roy. Tool for Translating Simulink Models into Input Language of
a Model Checker. In Formal Methods and Software Engineering, volume 4260 of LNCS, pages 606–620.
Springer, 2006.
[57] B. Meyer. Applying “Design by Contract”. Computer, 25(10):40–51, 1992.
[58] S. Minopoli and G. Frehse. SL2SX Translator: From Simulink to SpaceEx Verification Tool. In 19th
ACM International Conference on Hybrid Systems: Computation and Control (HSCC), 2016.
[59] K. S. Namjoshi and R. J. Trefler. On the completeness of compositional reasoning methods. ACM
Trans. Comput. Logic, 11(3), 2010.
[60] O. Nierstrasz. Regular types for active objects. SIGPLAN Not., 28(10):1–15, 1993.
[61] T. Nipkow, L. C. Paulson, and M. Wenzel. Isabelle/HOL — A Proof Assistant for Higher-Order Logic.
LNCS 2283. Springer, 2002.
[62] A. Platzer. Differential dynamic logic for hybrid systems. J. Autom. Reas., 41(2):143–189, 2008.
46
[63] A. Pnueli. The Temporal Logic of Programs. In 18th Annual Symposium on Foundations of Computer
Science, Providence, Rhode Island, USA, 31 October - 1 November 1977, pages 46–57. IEEE Computer
Society, 1977.
[64] V. Preoteasa, I. Dragomir, and S. Tripakis. A nondeterministic and abstract algorithm for translating
hierarchical block diagrams. CoRR, abs/1611.01337, 2016.
[65] V. Preoteasa, I. Dragomir, and S. Tripakis. Type Inference of Simulink Hierarchical Block Diagrams in
Isabelle. In 37th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects,
Components, and Systems (FORTE), 2017.
[66] V. Preoteasa and S. Tripakis. Refinement calculus of reactive systems. In Embedded Software (EMSOFT), 2014 International Conference on, pages 1–10, Oct 2014.
[67] V. Preoteasa and S. Tripakis. Towards Compositional Feedback in Non-Deterministic and Non-InputReceptive Systems. In 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS),
2016.
[68] G. Reissig, A. Weber, and M. Rungger. Feedback refinement relations for the synthesis of symbolic
controllers. IEEE Trans. Automat. Contr., 62(4):1781–1796, 2017.
[69] P. M. Rondon, M. Kawaguci, and R. Jhala. Liquid types. In 29th ACM SIGPLAN Conference on
Programming Language Design and Implementation, PLDI ’08, pages 159–169, New York, NY, USA,
2008. ACM.
[70] P. Roy and N. Shankar. SimCheck: An expressive type system for Simulink. In C. Muñoz, editor,
2nd NASA Formal Methods Symposium (NFM 2010), NASA/CP-2010-216215, pages 149–160, Langley
Research Center, Hampton VA 23681-2199, USA, Apr. 2010. NASA.
[71] S. Sankaranarayanan and A. Tiwari. Relational abstractions for continuous and hybrid systems. In
Computer Aided Verification: 23rd International Conference, CAV 2011, pages 686–702. Springer, 2011.
[72] H. Schmeck. Algebraic characterization of reducible flowcharts. Journal of Computer and System
Sciences, 27(2):165 – 199, 1983.
[73] V. Sfyrla, G. Tsiligiannis, I. Safaka, M. Bozga, and J. Sifakis. Compositional translation of Simulink
models into synchronous BIP. In Industrial Embedded Systems (SIES), 2010 International Symposium
on, pages 217–220, July 2010.
[74] N. Shankar. Lazy compositional verification. In COMPOS’97: Revised Lectures from the International Symposium on Compositionality: The Significant Difference, pages 541–564, London, UK, 1998.
Springer-Verlag.
[75] A. Siirtola, S. Tripakis, and K. Heljanko. When do we not need complex assume-guarantee rules? ACM
Trans. Embed. Comput. Syst., 16(2):48:1–48:25, Jan. 2017.
[76] A. P. Sistla, M. Y. Vardi, and P. Wolper. The Complementation Problem for Büchi Automata with
Applications to Temporal Logic. Theoretical Computer Science, 49:217–237, 1987.
[77] G. Stefănescu. Network Algebra. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2000.
[78] S. Tripakis, B. Lickly, T. Henzinger, and E. Lee. On Relational Interfaces. In Proceedings of the 9th ACM
& IEEE International Conference on Embedded Software (EMSOFT’09), pages 67–76. ACM, 2009.
[79] S. Tripakis, B. Lickly, T. A. Henzinger, and E. A. Lee. A Theory of Synchronous Relational Interfaces.
ACM Trans. Program. Lang. Syst., 33(4):14:1–14:41, July 2011.
47
[80] S. Tripakis, C. Sofronis, P. Caspi, and A. Curic. Translating Discrete-time Simulink to Lustre. ACM
Trans. Embed. Comput. Syst., 4(4):779–818, Nov. 2005.
[81] N. Wirth. Program development by stepwise refinement. Comm. ACM, 14(4):221–227, 1971.
[82] D. Yadav and M. Butler. Verification of liveness properties in distributed systems. In Contemporary Computing, volume 40 of Communications in Computer and Information Science, pages 625–636.
Springer Berlin Heidelberg, 2009.
[83] C. Yang and V. Vyatkin. Transformation of Simulink models to IEC 61499 Function Blocks for verification of distributed control systems. Control Engineering Practice, 20(12):1259–1269, 2012.
[84] C. Zhou and R. Kumar. Semantic Translation of Simulink Diagrams to Input/Output Extended Finite
Automata. Discrete Event Dynamic Systems, 22(2):223–247, 2012.
[85] L. Zou, N. Zhany, S. Wang, M. Franzle, and S. Qin. Verifying Simulink diagrams via a Hybrid Hoare
Logic Prover. In Embedded Software (EMSOFT), Sept 2013.
48
| 6cs.PL
|
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
arXiv:1502.03434v3 [math.CV] 9 Sep 2015
DUSTY GRUNDMEIER AND JIŘÍ LEBL
Abstract. We study a new biholomorphic invariant of holomorphic maps between domains in different dimensions based on generic initial ideals. We start with the standard
generic monomial ideals to find invariants for rational maps of spheres and hyperquadrics,
giving a readily computable invariant in this important case. For example, the generic initial
monomials distinguish all four inequivalent rational proper maps from the two to the three
dimensional ball. Next, we associate to each subspace X ⊂ O(U ) a generic initial monomial subspace, which is invariant under biholomorphic transformations and multiplication
by nonzero functions. The generic initial monomial subspace is a biholomorphic invariant for holomorphic maps if the target automorphism is linear fractional as in the case of
automorphisms of spheres or hyperquadrics.
1. Introduction
Let U ⊂ Cn and V ⊂ Cm be domains. Denote by O(U, V ) the set of holomorphic maps
f : U → V.
(1)
Write O(U) = O(U, C) as usual. A fundamental problem in several complex variables is to
understand maps in O(U, V ) up to automorphisms; that is, f : U → V and g : U → V are
equivalent if there exist biholomorphisms τ ∈ Aut(U) and χ ∈ Aut(V ) such that
f ◦ τ = χ ◦ g.
(2)
A particularly important case is when the maps are proper. A map f : U → V is proper
if for every compact K ⊂⊂ V , the set f −1 (K) is compact. If f extends continuously to
the boundary, then the proper map f takes boundary to boundary. The map f restricted
to the boundary gives a CR map, and therefore, we have a problem in CR geometry. It
is important to understand those situations where V has a large automorphism group, and
thus we focus most of our attention on the unit ball of a certain signature. For a pair of
integers (a, b), a ≥ 1, the unit ball of signature b is given by
Ba+b
b
b
a+b
o
n
X
X
2
a+b
|zj |2 < 1 .
= z = (z1 , . . . , za+b ) ∈ C
:−
|zj | +
j=1
(3)
j=1+b
is the
The ball Bn0 with signature 0 is the standard unit ball Bn . The boundary of Ba+b
b
hyperquadric
b
a+b
o
n
X
X
2
a+b
|zj |2 = 1 .
(4)
Q(a, b) = z ∈ C
:−
|zj | +
j=1
j=1+b
Date: September 9, 2015.
The second author was in part supported by NSF grant DMS-1362337 and Oklahoma State University’s
DIG and ASR grants.
1
2
DUSTY GRUNDMEIER AND JIŘÍ LEBL
Hyperquadrics are the model hypersurfaces for Levi-nondegenerate surfaces. The hyperquadrics are also the flat models in CR geometry from the point of view of Riemannian
geometry.
The CR geometry problem of maps into hyperquadrics has a long history beginning with
Webster who in 1978 [17] proved that every algebraic hypersurface can be embedded into
a hyperquadric for large enough a and b. On the other hand Forstnerič [8] proved that in
general a CR submanifold will not map to a finite dimensional hyperquadric. Thus not every
CR submanifold can be realized as a submanifold of the flat model (i.e. the hyperquadric).
The mapping problem has been studied extensively for proper maps between balls, where
the related CR question is to classify the CR maps between spheres. That is, suppose
f : Bn → BN is a proper holomorphic map. Two such maps f and g are spherically equivalent
if there exist automorphisms τ ∈ Aut(Bn ) and χ ∈ Aut(BN ) such that f ◦ τ = χ ◦ g.
There has been considerable progress in the classification of such maps, especially for small
codimensional cases; see for example [1, 3, 4, 6, 9, 14] and the many references within.
In particular, Forstnerič [9] proved that given sufficient boundary regularity, the map
is rational and the degree bounded in terms of the dimensions only. The degree is an
invariant under spherical equivalence and the sharp bounds for the degree were conjectured
by D’Angelo [5].
In this article we introduce a new biholomorphic invariant that is far more general than
degree. When the map is rational and the domain and target are balls (possibly of nonzero
signature), we obtain invariants via generic initial ideals from commutative algebra. For
arbitrary domains and maps, we generalize the smallest degree part of the ideal.
The techniques center on the idea of generic initial monomial ideals; see e.g. Green [12].
Given a homogoeneous ideal I, the monomial ideal in(I) is generated by the initial monomials of elements of I (see section 3 for precise definitions). The generic initial ideal, denoted
gin(I), is an initial monomial ideal after precomposing I with a generic invertible linear
map. Grauert was the first to introduce generic initial ideals to several complex variables
(see [10]), and they have been used extensively for understanding singularities of varieties.
For rational maps of balls of the form fg , we homogenize f and g, and we then look at
the ideal generated by the components. We prove that the generic initial ideal generated by
the homogenizations of f and g is invariant under spherical equivalence. More precisely, the
first main result is the following.
Theorem 1.1. Suppose f1 : Bn → BN and f2 : Bn → BN are rational proper maps that are
spherically equivalent. Let F1 and F2 be the respective homogenizations. Then
gin I(F1 ) = gin I(F2 ) .
(5)
In section 3, we prove this result, and compute this new invariant for a number of wellknown examples. In particular we show how this invariant distinguishes many of these maps.
In section 4, we obtain a further invariant by considering the holomorphic decomposition of
the quotient
kf (z)k2 − |g(z)|2
.
(6)
kzk2 − 1
To generalize these results to arbitrary holomorphic maps we improve a result proved in
Grundmeier-Lebl-Vivas [13] that itself is a version of Galligo’s theorem for vector subspaces
of O(U). Given a subspace X ⊂ O(U), we precompose with a generic affine map τ , and
define the generic initial monomial subspace as the space spanned by the initial monomials of
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
3
elements of X ◦ τ , denoted gin(X). Let X be the affine span of the components of a holomorphic map F : U → CN , denoted by affine-span F . See section 5 for precise definitions. We
obtain an invariant under biholomorphic transformations of U and invertible linear fractional
transformations of CN . By using affine rather than just linear maps we obtain invariants of
the map without having a distinguished point. The second main result says this is, indeed,
an invariant.
Theorem 1.2. Let M, M ′ ⊂ Cn be connected real-analytic CR submanifolds. Suppose
F : M → Q(a, b) and G : M ′ → Q(a, b) are real-analytic CR maps equivalent in the sense
that there exists a real-analytic CR isomorphism τ : M ′ → M and a linear fractional automorphism χ of Q(a, b) such that
F ◦ τ = χ ◦ G.
(7)
Then
gin(affine-span F ) = gin(affine-span G).
(8)
In sections 5 and 6, we give precise definitions and lemmas. In particular we prove the
extended version of Galligo’s theorem for our setting. In section 7, we prove the second major
theorem of this paper, and we give examples where we compute this invariant. Finally, in
section 8 we define the generic initial subspace for the analogue of the quotient (6) for CR
maps between spheres and hyperquadrics.
The authors would like to acknowledge John D’Angelo for many conversations on the
subject.
2. The projective setting
Before we work with arbitrary maps, we consider the special case of rational maps between
hyperquadrics and spheres. In this case we directly apply the standard theory of generic
initial ideals to obtain invariants.
For z, w ∈ Ca+b define
def
hz, wib = hIb z, wi = −
b
X
zj w̄j +
j=1
a+b
X
zj w̄j
and
j=b+1
def
kzk2b = hz, zib .
(9)
By Ib we mean the (a + b) × (a + b) diagonal matrix with b (−1)’s and a 1’s on the diagonal.
We use the same definition for the homogeneous case when the index on the variables starts
with a zero. In this case the subscript still refers to the number of negatives. That is, for
Z = (Z0 , . . . , Za+b ) ∈ Ca+b+1 we write
def
hZ, W ib+1 = hIb+1 Z, W i = −
b
X
j=0
Zj W̄j +
a+b
X
j=b+1
Zj W̄j
and
def
kZk2b+1 = hZ, Zib+1. (10)
Let us homogenize Q(a, b). We add a variable Z0 and work with the homogeneous coordinates [Z0 , Z1 , . . . , Zn ] in Pn . Homogenize the equation above to obtain
def
(11)
HQ(a, b + 1) = Z ∈ Pa+b : kZk2b+1 = 0 .
If we think of Ca+b ⊂ Pa+b , then Q(a, b) is a subset of Pa+b and HQ(a, b + 1) is the closure
of Q(a, b) in Pa+b .
4
DUSTY GRUNDMEIER AND JIŘÍ LEBL
Automorphisms of Pa+b can be represented as invertible linear maps on Ca+b+1 . The
automorphisms of HQ(a, b + 1) are those linear maps T that preserve the form in (11) up
to a real scalar λ 6= 0, that is
(12)
kT Zk2b+1 = λ kZk2b+1 .
p
If we represent T as a matrix, then the condition above is T ∗ Ib+1 T = µIb , where µ is ± |λ|.
If a 6= b + 1, then λ > 0. If λ < 0, then the automorphism swaps the sides of HQ(a,
b + 1).
a+b
Write the set of the corresponding automorphisms of P
as Aut HQ(a, b + 1) . As usual
the point Z ∈ Pa+b is an equivalence class of points of Ca+b+1 up to complex multiple. Thus
(as long as a 6= b + 1) the group Aut HQ(a, b + 1) is the group SU(a, b + 1)/K where K is
the subgroup of matrices ζI where ζ a+b+1 = 1. If a = b + 1, we need to include the matrix
that switches sides. The important fact for us is that automorphisms are represented by
matrices.
Fix (a, b) and (A, B). A rational map F : Pa+b 99K PA+B is represented by a homogeneous
polynomial map of Ca+b+1 to CA+B+1 . The equivalence we wish to consider is the following.
a+b
Two rational maps
99K PA+B and G : Pa+b 99K PA+B are equivalent if there exists
F: P
a+b+1
τ ∈ Aut P
and χ ∈ Aut PA+B+1 such that
F ◦ τ = χ ◦ G.
(13)
In the applications we will have τ ∈ Aut HQ(a, b + 1) and χ ∈ Aut HQ(A, B + 1) .
If f : Bn → BN is a rational proper map of balls, its homogenization F : Pn 99K PN takes
HQ(n, 1) to HQ(N,
1)
1). The equivalence on such maps F using the groups Aut HQ(n,
n
and Aut HQ(N, 1) is precisely the standard spherical equivalence on f ; that is, f : B → BN
and g : Bn → BN are spherically equivalent if there exist automorphisms τ and χ of Bn and
BN respectively such that f ◦ τ = χ ◦ g.
3. Generic initial ideals and rational maps
In this section we briefly introduce the relevant definitions and results from commutative
algebra. We use the setup from Green [12], and in a later section we use the techniques
developed by the authors in [13]. To be consistent with these two papers, we use the slightly
unusual monomial ordering as used by Green.
Let Z0 , Z1 , . . . , Zn denote our variables. Given a multi-index α ∈ Nn+1
we write Z α to
0
mean Z0α0 Z1α1 · · · Znαn as usual, and let |α| = α0 + · · · + αn denote the total degree. A
multiplicative monomial order is a total ordering on all monomials Z α , such that
(i) Z0 > Z1 > · · · > Zn ,
(ii) Z α > Z β ⇒ Z γ Z α > Z γ Z β ,
(iii) |α| < |β| ⇒ Z α > Z β .
Such orderings are not unique. Using the so-called graded reverse lexicographic ordering
when n = 2, we obtain
1 > Z0 > Z1 > Z2 > Z02 > Z0 Z1 > Z12 > Z0 Z2 > Z1 Z2 > Z22 > · · · .
(14)
Fix a certain monomial order. Given a set S of monomials, then the initial monomial is
the maximal monomial in S according to the ordering. For a homogeneous polynomial P ,
write
def
in(P ) = initial monomial of P .
(15)
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
5
Let I be a homogeneous ideal. Define the initial monomial ideal in(I) as the smallest ideal
such that z α ∈ in(I) whenever z α = in(P ) for some P ∈ I.
Galligo’s theorem implies that for an open dense set of linear maps T , in(I) = in(I ◦ T ).
Let T be such a generic linear map and define
def
gin(I) = in(I ◦ T ).
(16)
I(F ) = ideal generated by components of F in homogeneous coordinates.
(17)
F ◦ τ = χ ◦ G.
(18)
n
Finally, for a rational map F : P 99K P
N
define
Proposition 3.1. Suppose
F : Pn 99K PNand G : Pn 99K PN are equivalent in the sense that
n
there exist τ ∈ Aut P and χ ∈ Aut PN such that
Then
gin I(F ) = gin I(G) .
(19)
Proof. By definition of the generic initial ideal, gin I(F ◦ τ ) = gin I(F ) , as τ is an
invertible linear map. The ideal generated by linear combinations of G is the
same as the
one
generated by G, and χ is also an invertible linear map. So, gin I(χ ◦ G) = gin I(G) .
In the important special case of rational proper maps of balls we get the first main theorem
from the introduction.
Corollary 3.2. Suppose f : Bn → BN and g : Bn → BN are rational proper maps that are
spherically equivalent. Let F and G be the respective homogenizations. Then
gin I(F ) = gin I(G) .
(20)
We close this section with several examples. The following computations are done with
Macaulay2 [11] with the GenericInitialIdeal package using the standard graded reverse
lex ordering unless stated otherwise. One advantage of using gins as invariants is that they
are very simple to compute using computer algebra systems.
Example 3.3. Generic initial ideals distinguish all the maps from B2 to B3 . Faran [6] proved
that all maps sufficiently smooth up to the boundary are spherically equivalent to one of the
following 4 maps:
(i) (z1 , z2 ) 7→ (z1 , z2 , 0),
(ii) (z1 , z2 ) 7→ (z1 , z√1 z2 , z22 ),
(iii) (z1 , z2 ) 7→ (z12 , √2z1 z2 , z22 ),
(iv) (z1 , z2 ) 7→ (z13 , 3z1 z2 , z23 ).
Let us list the results in a table. The first column gives the map itself. The second column
gives the map homogenized by adding the Z0 variable. The last column gives the generators
of the generic initial ideal.
Map
Homogenized
gin
(z1 , z2 , 0)
(Z0 , Z1 , Z2 , 0)
(Z0 , Z1 , Z2 )
2
2
2
(z1 , z√1 z2 , z2 )
(Z0 , Z1 Z√
(Z02 , Z0 Z1 , Z12 , Z0 Z2 , Z1 Z22 )
0 , Z1 Z2 , Z2 )
(z12 , √2z1 z2 , z22 ) (Z02 , Z12 , √2Z1 Z2 , Z22 )
(Z02 , Z0 Z1 , Z12 , Z0 Z2 , Z23 )
3
3
3
3
3
(z1 , 3z1 z2 , z2 ) (Z0 , Z1 , 3Z1 Z2 Z0 , Z2 ) (Z03 , Z02 Z1 , Z0 Z12 , Z02 Z2 ,
Z14 , Z13 Z2 , Z0 Z1 Z22 , Z12 Z22 ,
Z0 Z24 , Z1 Z24 , Z25 )
6
DUSTY GRUNDMEIER AND JIŘÍ LEBL
Notice that the generic initial ideals are all different. In particular, we distinguish the two
very similar second degree maps using the third degree part of the ideal.
Example 3.4. In [7] it was proved that the proper map of B2 to B4 given by
q
2
3
z
1
−
|a|
√
− a) 2
(z1 , z2 ) 7→ z12 , 2z1 z2 ,
,
1 − āz1
1 − āz1
z22 (z1
(21)
is spherically equivalent to a polynomial map if and only if a = 0. This map is the homogeneous second degree map from Faran’s theorem above with the last component tensored by
an automorphism of the ball B2 taking a to 0. If a = 0, then the generic initial ideal is
(Z03 , Z02 Z1 , Z0 Z12 , Z13 , Z02 Z2 , Z0 Z1 Z22 , Z12 Z22 , Z0 Z24 ).
(22)
If a = 21 , we obtain a different generic initial ideal
(Z03 , Z02 Z1 , Z0 Z12 , Z13 , Z02 Z2 , Z0 Z1 Z22 , Z12 Z22 , Z0 Z23 ).
(23)
Example 3.5. In [15] the second author classified all the maps from the two sphere, Q(2, 0),
to the hyperquadric Q(2, 1) (see also Reiter [16] for a different approach to the classification).
There are 7 equivalence classes of maps:
(i) (z1 , z2 ) 7→ (0, z1 , z2√),
(ii) (z1 , z2 ) 7→
(z22 , z12 , 2z2 ),
z2
(iii) (z1 , z2 ) 7→ zz22 , z11 , z22 ,
12 √ 1 2
√
√
z − 3 z z +z −z z 2 + 3 z z +z 2 −z z 2 +z − 3 z −1
(iv) (z1 , z2 ) 7→ 1z 2 +z +1 √23 z 2−1 1 , 1z 2 +z +1 √23 z 2−1 1 , z22 +z1 +√3 z2 −1 ,
2
2
2
1
2
2 1
√4 2 1
√
√
2(z1 z2 +iz1 ) 4 2(z1 z2 −iz1 ) z22 − 2 iz2 +1
√
√
√
(v) (z1 , z2 ) 7→ z 2 + 2 iz +1 , z 2 + 2 iz +1 , z 2 + 2 iz +1 ,
2
2
2
2
√2
2
z2 z12 −z2
2z23
z13 +3z1
(vi) (z1 , z2 ) 7→
3 3z 2 +1 , 3z 2 +1 , 3z 2 +1 ,
1
1
1
(vii) (z1 , z2 ) 7→ g(z1 , z2 ), g(z1 , z2 ), 1 for an arbitrary holomorphic function g.
Note that the maps are written slightly differently from [15] as we are ordering the negative
components first.
We list the generic initial ideal for each of the first 6 classes of maps. The final 7th class
is already distinguished as it is not transversal; that is, it maps an open neighborhood into
Q(2, 1).
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
Map
(i)
(ii)
(iii)
(iv)
(v)
Homogenized
(Z0 , 0, Z1 , Z2√
)
2
2
2
(Z0 , Z2 , Z1 , 2Z2 Z0 )
2
(Z12 , Z2 Z0 , Z1Z√
0 , Z2 )
(Z22 + Z
3Z2 Z0 − Z02 ,
1 Z0 +
√
Z12 − √3Z1 Z2 + Z22 − Z1 Z0 ,
Z12 + 3Z1 Z2√
+ Z22 − Z1 Z0 ,
2
Z22 + Z
√1 Z0 − 3Z22Z0 − Z0 )
2
(Z
2iZ2 Z0 + Z0 ,
2 +
√
4
2(Z1 Z2 + iZ1 Z0 ),
√
4
2(Z√
1 Z2 − iZ1 Z0 ),
2
2
Z2 − 2iZ2 Z√
0 + Z0 )
(3Z12 Z0 + Z03 , 3(Z2 Z12 − Z2 Z02 ),
2Z23 , Z13 + 3Z1 Z02 )
7
gin
(Z0 , Z1 , Z2 )
(Z02 , Z0 Z1 , Z12 , Z0 Z2 , Z1 Z22 , Z23 )
(Z02 , Z0 Z1 , Z12 , Z0 Z2 , Z1 Z22 )
(Z02 , Z0 Z1 , Z12 , Z0 Z2 , Z1 Z22 )
(Z02 , Z0 Z1 , Z12 , Z0 Z2 , Z1 Z22 )
(Z03 , Z02 Z1 , Z0 Z12 , Z02 Z2 ,
Z14 , Z0 Z1 Z22 , Z12 Z22 , Z13 Z2 ,
Z0 Z24 , Z1 Z24 , Z25 )
We distinguish some maps, but not all. It is to be expected that not all maps can be
distinguished. After all, computing a generic initial ideal throws away much information
about the map. It should be noted that we only looked at small degree examples, where the
number of different possible gins is limited.
(vi)
Example 3.6. The particular monomial ordering may make a difference, even in simple
situations. It might be possible to tell some ideals (and hence maps) apart using one ordering,
but not using another. Let us give a very simple example. In P2 , the ideal generated by
(Z02 , Z1 Z2 ) has the gin
(Z02 , Z0 Z1 , Z13 )
in graded reverse lex ordering,
(Z02 , Z0 Z1 , Z0 Z22 , Z14 )
in graded lex ordering.
(24)
However, the ideal generated by (Z02 , Z12 ) has the same gin in both orderings:
(Z02 , Z0Z1 , Z13 ).
(25)
4. Invariants of the quotient for rational maps
Let F : Pa+b 99K PA+B be a rational map that takes HQ(a, b + 1) to HQ(A, B + 1), where
defined. Identify F with the homogeneous polynomial map taking Ca+b+1 to CA+B+1 . Write
kF (Z)k2B+1 = kZk2b+1 q(Z, Z̄),
(26)
q(Z, Z̄) = kh+ (Z)k2 − kh− (Z)k2 ,
(27)
H(q) = {h+ , h− }
(28)
where the quotient q is a bihomogeneous polynomial in Z. Find the holomorphic decomposition (see p. 101 of [2]) of q as
where h+ and h− are homogeneous holomorphic polynomial maps. Write
for the set of functions in the holomorphic decomposition of q. The holomorphic decomposition is not unique. However, the linear span of H(q) is unique,
and therefore the ideal
generated by H(q) is unique.
We thus study the ideal I H(q) and furthermore the generic
initial ideal gin I H(q) .
8
DUSTY GRUNDMEIER AND JIŘÍ LEBL
The reason for looking at q is that it may reveal further information about the map that
is not immediately visible from F . For example the quotient q was critically used in [5] for
the degree estimates problem. The number of functions in the decomposition of q is often
larger than the number of components of F as many of these components may cancel out
once multiplied with kZk2b+1 .
Suppose F : Pa+b 99K PA+B and G : Pa+b 99K PA+B are equivalent as before; i.e. F ◦τ = χ◦
G, where τ and χ are automorphisms preserving HQ(a, b+1) and HQ(A, B +1) respectively.
Let qF and qG be the corresponding quotients of F and G respectively. We regard τ and χ
as linear maps, which we also rescale, such that kτ Zk2b+1 = ± kZk2b+1 for Z ∈ Ca+b+1 and
kχW k2B+1 = ± kW k2B+1 for W ∈ CA+B+1 . The ± is there in case a = b + 1 or A = B + 1
and the sides are swapped, otherwise it would be a +.
As F and G are equivalent, kF (τ Z)k2B+1 = kχ ◦ G(Z)k2B+1 . Then
kZk2b+1 qF (τ Z, τ Z) = ± kτ Zk2b+1 qF (τ Z, τ Z) = ± kF (τ Z)k2B+1 =
= ± kχ ◦ Gk2B+1 = ± kG(Z)k2B+1 = ± kZk2b+1 qG (Z, Z̄). (29)
In other words qF (τ Z, τ Z) = ±qG (Z, Z̄).
a+b
Proposition 4.1. Suppose F : Pa+b 99K PA+B
99K PA+B are equivalent in the
and G : P
sense that there exist τ ∈ Aut HQ(a, b + 1) and χ ∈ Aut HQ(A, B + 1) such that
F ◦ τ = χ ◦ G.
Let qF and qG be the corresponding quotients. Then
gin I H(qF ) = gin I H(qG ) .
(30)
(31)
Proof. Above we proved qF (τ Z, τ Z) = ±qG (Z, Z̄). As we are talking about gins, the τ is not
relevant. The ± does not change the components of the holomorphic decomposition.
Again, in the important special case of rational proper maps of balls we get:
Corollary 4.2. Suppose f : Bn → BN and g : Bn → BN are rational proper maps that are
spherically equivalent. Let F and G be the respective homogenizations and let qF and qG be
the corresponding quotients. Then
gin I H(qF ) = gin I H(qG ) .
(32)
√
Example 4.3. Let us consider the Faran map (z1 , z2 ) 7→ (z13 , 3z1 z2 , z23 ) that takes B2 to
B3 . We compute the quotient
√
2
2
2
|z13 | + 3z1 z2 + |z23 | − 1
2
2
(33)
= z12 + z22 − |z1 z2 |2 + |z1 |2 + |z2 |2 + 1.
2
2
|z1 | + |z2 | − 1
Bihomogenizing the quotient, we obtain all the degree-two monomials in H(q). Therefore
the gin is generated by all the degree-two monomials:
gin I H(q) = (Z02 , Z0 Z1 , Z12 , Z0Z2 , Z1 Z2 , Z22 ).
(34)
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
9
5. Affine spans and automorphisms of the target
To deal with nonrational maps we switch to the affine setting. We work in CN and treat
it as a subset of PN . From now on z = (z1 , . . . , zN ) will be the inhomogeneous coordinates
on PN , that is, coordinates on CN . In other words, we fix a specific embedding ι : CN → PN .
For equivalence of maps F : U → CN we consider the target automorphisms to be the linear
fractional automorphisms of Aut(PN ) and consider CN ⊂ PN as above. Take χ ∈ Aut(PN ),
F : U → CN , and G : U → CN . When we write an equation such as χ ◦ G = F , we mean
χ ◦ ι ◦ G = ι ◦ F , where ι is the embedding above. That is, we consider F to be valued in PN
using the embedding ι : CN → PN . Note that after composing with automorphisms of PN
given as linear fractional maps, it may happen that the new map has poles in U. In fact,
when looking at linear fractional automorphisms of Q(a, b), there will in general be poles
that intersect Q(a, b).
The reason for not simply working in projective space is that the components in nonrational
holomorphic maps F : U → CN cannot be homogenized; the degree is unbounded. For this
same reason, we have to work with affine span instead of just linear span.
Definition 5.1. Given a collection of holomorphic functions F , the affine span of F is
affine-span F = span F ∪ {1} .
(35)
If F is a map, then affine-span F is the affine span of the components of F . Let X ⊂ O(U)
be a vector subspace and ϕ ∈ O(U). Denote by ϕX the vector subspace obtained by
multiplying every element in X by ϕ.
Lemma 5.2. Suppose F : U ⊂ Cn → CN and G : U ⊂ Cn → CN are such that there exists
χ ∈ Aut(PN ) such that F = χ ◦ G. Then there exists ϕ ∈ affine-span G such that
affine-span G = ϕ affine-span F.
(36)
P (w)
◦G(z)
Proof. Let χ(w) = Q(w)
be the linear fractional automorphism such that F (z) = PQ◦G(z)
for
N
N
N
z ∈ U. Here P : C → C and Q : C → C are affine maps. Therefore (Q ◦ G)F = P ◦ G.
Therefore the components of (Q ◦ G)F are in the affine span of G. Also Q ◦ G is in the affine
span of G. The span of the components of (Q ◦ G)F and the function (Q ◦ G) is exactly
(Q ◦ G) affine-span F , and therefore (Q ◦ G) affine-span F ⊂ affine-span G.
Clearly dim affine-span F ≤ dim affine-span G. By inverting χ and applying the argument
in reverse we get dim affine-span G ≤ dim affine-span F . Therefore, (Q ◦ G) affine-span F =
affine-span G.
The point of the lemma is to eliminate the target automorphism by looking at the vector
space generated by F1 , . . . , FN and 1, up to multiplication by a scalar-valued function. To find
invariants of the map F we need to find invariants of this new object under biholomorphisms
of the source.
6. Generic initial vector space
In this section we define the gin of a vector subspace of holomorphic maps. The idea is to
generalize the generic initial ideals to the setting of vector spaces of holomorphic functions
using affine maps instead of linear maps. We generalize the setup from Green [12], using the
techniques developed by the authors in [13].
10
DUSTY GRUNDMEIER AND JIŘÍ LEBL
Let monomial order be defined on z1 , . . . , zn in the same way as above. That is, given a
multi-index α ∈ Nn0 we write z α to mean z1α1 z2α2 · · · znαn , and |α| = α1 + · · · + αn is the total
degree. We require the order to be multiplicative:
(i) z1 > z2 > · · · > zn ,
(ii) z α > z β ⇒ z γ z α > z γ z β ,
(iii) |α| < |β| ⇒ z α > z β .
In the following definitions we fix a point. We assume this point is 0 ∈ Cn , although any
point can be used after translation.
Definition 6.1. Fix a monomial order. By an initial monomial from a collection we mean
the largest monomial in the order. Given a Taylor series T , the initial monomial of T is
the largest monomial in T with a nonzero coefficient. Suppose U ⊂ Cn and 0 ∈ U. For
f ∈ O(U), let T0 f be the Taylor series for f at 0 and
def
in(f ) = initial monomial of T0 f .
(37)
Given X ⊂ O(U) a vector subspace, define the initial monomial subspace
def
in(X) = span{z α : z α = in(f ) for some f ∈ X}.
(38)
A subspace X ⊂ O(U) is a monomial subspace if X admits an algebraic basis consisting of
monomials.
If X is a monomial subspace then the basis of monomials defining it is unique. Therefore,
there is a one-to-one equivalence between monomial subspaces and subsets of the set of all
monomials.
A set S of monomials is affine-Borel-fixed if whenever z α ∈ S and zj |z α , then for all ℓ < j,
the monomials z α z1j and z α zzjℓ are in S. If X ⊂ O(U) is a monomial subspace, then we say
that X is affine-Borel-fixed if the basis of monomials that generates X is affine-Borel-fixed.
Take an invertible affine self map τ of Cn such that τ (0) ∈ U. For a subspace X ⊂ O(U),
define a subspace X ◦ τ ⊂ O(U ′ ) where U ′ = τ −1 (U). Notice that 0 ∈ U ′ and we may again
talk about initial monomials as above.
The initial monomial space in(X) is not always preserved under such precomposition with
affine maps. For example, let X be the span of {1, z2 }, so X = in(X). For a generic choice of
an affine map τ we have in(X ◦ τ ) = span{1, z1 }. Notice that {1, z2 } is not affine-Borel-fixed,
but in(X ◦ τ ) is.
We need to prove an analogue to Galligo’s Theorem (see Theorem 1.27 in [12]). The finite
dimensional version of the result is proved in [13].
2
The set Aff(n) of affine self maps of Cn can be parametrized as Mn (C) × Cn , or Cn × Cn .
We use the standard topology on this set.
Theorem 6.2. Suppose U ⊂ Cn and 0 ∈ U, and let X ⊂ O(U) be a vector subspace.
There is some neighbourhood N of the identity in Aff(n) and A ⊂ N of second category
(countable intersection of open dense subsets of N ), such that for τ ∈ A, the space in(X ◦ τ )
is affine-Borel-fixed. Furthermore, in(X ◦ τ ) = in(X ◦ τ ′ ) for any two affine τ and τ ′ in A.
Finally, if X is finite dimensional, A is open and dense in N .
So after a generic affine transformation the initial monomial subspace is always the same
space. It will also not be necessary to assume 0 ∈ U. We pick a generic affine τ such that
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
11
τ (0) ∈ U. Then 0 ∈ τ −1 (U), and so it makes sense to take in(X ◦ τ ) for X ⊂ O(U). Before
we prove the theorem, let us make the following definition.
Definition 6.3. Let U ⊂ Cn and let X ⊂ O(U) be a subspace. Take a generic affine τ such
that τ (0) ∈ U. Define the generic initial monomial subspace
gin(X) = in(X ◦ τ ).
(39)
Remark 6.4. While the proof of the theorem may seem formal, we are using affine transformations and precomposing formal power series with affine transformations may not make
sense.
Proof of Theorem 6.2. The finite dimensional version of the theorem is proved in [13] as
Proposition 1 (or Proposition 5.5 on arXiv).
Suppose X is not finite dimensional. The space O(U) is a separable Frechét space. For
the subspace X ⊂ O(U), pick a countable set {fk }∞
k=1 in X such that if
Xm = span{f1 , f2 , . . . , fm },
(40)
[
(41)
then
m
Xm ⊂ X ⊂ X =
[
Xm .
m
Apply the finite dimensional result to Xm for each m. The τ varies over countably many
open dense sets and the intersection of those sets is a second category set as claimed.
Given any k, the initial k monomials in {f1 , f2 , . . . , fm } must stabilize as m grows. That
is, the first k monomials are the same for all large enough m. We therefore obtain a sequence
of initial monomials. To obtain the first k monomials, simply go far enough
S until the initial
k monomials stabilize. Then z α is in this sequence if and only if z α ∈ in m Xm .
It is left to show that
[
[
Xm = in
Xm .
(42)
in X = in
m
m
α
α
Suppose this is not
true.
Find
the
first
(maximal)
monomial
z
such
that
z
∈
in
X
, but
S
α
α
z 6∈ in m Xm . Suppose z is the kth monomial in the ordering given. Let πk be the
projection of O(U) onto the space spanned by the
first k monomials. By Cauchy’s formula,
SM
πk is continous. The dimension of πk m=1 Xm stabilizes as M grows, and hence for large
enough M
[
∞
πk XM = πk
(43)
Xm = πk X .
m=1
α
There exists an f ∈ X with z = in(f ). By the above equality there must exist a g ∈ XM
such that z α = in(g). That is a contradiction.
We now generalize the gins to biholomorphic maps. Let X ⊂ O(U) be a subspace and
let f : U ′ → U be a holomorphic map. Define X ◦ f to be the vector subspace of O(U ′ )
consisting of all F ◦ f for F ∈ X.
Lemma 6.5. Let X be a vector subspace of O(U) and let f : U ′ → U be a biholomorphic
map. Then gin(X) = gin(X ◦ f ).
12
DUSTY GRUNDMEIER AND JIŘÍ LEBL
Proof. Suppose 0 is in both U ′ and U, and suppose f (0) = 0. Composing f with an invertible
linear map does not change the gin (we must change U appropriately). Hence, assume f ′ (0)
is the identity. Let
f (z) = z + E(z),
(44)
where E is of order 2 and higher. We only need to show that in(X) = in(X ◦ f ).
Suppose z α ∈ in(X), that is, there exists an element of X of the form
X
cβ z β .
(45)
g(z) = z α +
β<α
In (g ◦ f ), the terms from E create monomials of degree strictly higher than |α|. So
X
dβ z β .
(g ◦ f )(z) = z α +
(46)
β<α
α
for some dβ . Therefore z ∈ in(X ◦ f ).
Since f −1 (z) = z + F (z) for some F or higher order we obtain by symmetry that if
α
z ∈ in(X ◦ f ) then if z α ∈ in(X ◦ f ◦ f −1 ) = in(X).
Lemma 6.6. Let X be a vector subspace of O(U), 0 ∈ U, and let ϕ : U → C be a holomorphic
function that is not identically zero. Then gin(X) = gin(ϕX).
Proof. As we are talking about gins, we precompose with a generic affine map, which also
precomposes ϕ, and therefore we assume that ϕ(0) 6= 0. In fact, without loss of generality
we assume ϕ(0) = 1. Suppose z α ∈ in(X), that is, there is a g ∈ X of the form
X
g(z) = z α +
cβ z β .
(47)
β<α
Then
ϕ(z)g(z) = z α +
X
dβ z β ,
(48)
β<α
for some dβ by multiplicativity of the monomial ordering. Therefore z α ∈ in(ϕX). By
symmetry, in(X) = in(ϕX).
7. Gins as invariants of maps
If X ⊂ O(U) is a subspace and U ′ ⊂ U is an open set then the restriction X|U ′ (the space
of restrictions of maps from X to U ′ ) clearly has the same gin as X. Let us extend gins to
complex manifolds. Let X ⊂ O(U) be a subspace where U is a connected complex manifold
of dimension n. As gin is invariant under biholomorphic transformations, it is well-defined
on every chart for U. If two (connected) charts overlap, then the gin must be the same
(compute the gin on the intersection). Therefore, gin(X) is well-defined.
Theorem 7.1. Let U, W be connected complex manifolds of dimension n. Suppose F : U →
CN and G : W → CN are equivalent in the sense that there exists a biholomorphic map
τ : W → U and a linear fractional automorphism χ ∈ Aut(PN ) such that
Then
F ◦ τ = χ ◦ G.
(49)
gin(affine-span F ) = gin(affine-span G).
(50)
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
13
Proof. As noted above, we take two charts of U and W , and therefore, without loss of
generality we assume that U and W are domains in Cn .
As F ◦ τ and G are equivalent via a target automorphism, Lemma 5.2 says
affine-span(F ◦ τ ) = ϕ affine-span G.
As affine-span(F ◦ τ ) = (affine-span F ) ◦ τ , Lemma 6.5 says
gin affine-span(F ◦ τ ) = gin(affine-span F ).
(51)
(52)
Via Lemma 6.6, we get
gin(ϕ affine-span G) = gin(affine-span G).
The result follows.
(53)
The same proof is used for the following CR version. In the CR version we start with realanalytic CR maps. Since real-analytic CR maps extend to holomorphic maps, we therefore
work with the extended holomorphic maps when taking gins and affine spans.
Corollary 7.2. Let M, M ′ ⊂ Cn be connected real-analytic CR submanifolds. Suppose
F : M → Q(a, b) and G : M ′ → Q(a, b) are real-analytic CR maps equivalent in the sense
that there exists a real-analytic CR isomorphism τ : M ′ → M and a linear fractional automorphism χ of Q(a, b) such that
F ◦ τ = χ ◦ G.
(54)
Then
gin(affine-span F ) = gin(affine-span G).
(55)
Again we may take M and M ′ to be submanifolds of a complex manifold of dimension n
instead of Cn .
For examples we need only look at rational maps. If the map is rational we homogenize
with Z0 as before. The generic initial monomial vector space is simply the lowest degree part
of the generic initial ideal generated by the components of the homogenized map. That is
because the lowest degree part of the ideal is the linear span of the components of the map.
We must be careful that the ordering is compatible. In particular, the ordering must respect
the “grading” above, that is in each degree if we set Z0 = 1 we must still get a multiplicative
monomial ordering. For example the standard reverse lex ordering in each degree will not
work, although the lex order will.
√
3
As an example
take
the
Faran
map
F
(z)
=
(z
,
3z1 z2 , z23 ). We add 1 and homogenize to
1
√
3
3
3
get (Z0 , Z1 , 3Z0 Z1 Z2 , Z2 ). We compute the gin in the graded lex order. The degree 3 part
of the gin is generated by
Z03 , Z02 Z1 , Z02 Z2 , Z0 Z12 .
(56)
Therefore,
gin(affine-span F ) = span{1, z1 , z2 , z12 }.
(57)
8. Invariants of the quotient of a hyperquadric map
When the source is either the ball Ba+b
in the holomorphic case or Q(a, b) in the CR case,
b
we obtain further invariants by considering the quotient of the function composed with the
defining function of the target divided by the defining function of the source as we did in
the rational case.
14
DUSTY GRUNDMEIER AND JIŘÍ LEBL
P
P
2
Recall the definition kzk2b = − bj=1 |zj |2 + a+b
j=b+1 |zj | . The defining function for Q(a, b)
is then kzk2b − 1 = 0. Suppose F : U ⊂ Q(a, b) → Q(A, B) is a real-analytic CR map. A
real-analytic CR map is a holomorphic map of a neighborhood of U, and so we will identify
F with this holomorphic map. Define the quotient q via
kF (z)k2B − 1 = kzk2b − 1 q(z, z̄).
(58)
Near some point find the holomorphic decomposition of q:
q(z, z̄) = kh+ (z)k2 − kh− (z)k2 ,
(59)
H(q) = {h+ , h− }
(60)
where h+ and h− are possibly ℓ2 valued holomorphic maps. Write
for the set of functions in the holomorphic decomposition of q. The holomorphic decomposition is not unique and depends on the point. However we do have the following lemma.
Lemma 8.1. Suppose q : U ⊂ Cn → R is real-analytic and U is a connected open set. If
H1 (q) and H2 (q) are two holomorphic decompositions at two points of U, then
(61)
gin span H1 (q) = gin span H2 (q) .
Proof. By a standard connectedness argument using a path between the two points we only
need to consider the case where the domains of convergence of H1 and H2 overlap. Assume
that we work on this intersection. So we only need to show that if
kh+ (z)k2 − kh− (z)k2 = h′+ (z)
2
− h′− (z)
2
(62)
′
′
for maps h+ , h− , h′+ , h′− converging on a fixed open set, with {h+ , h
− } and {h+ , h− } lin′
′
early independent sets, then gin span{h+ , h− } = gin span{h+ , h− } . From (62) we have
span{h+ , h− } = span{h′+ , h′− }, and so the result follows.
Thus, we do not need to specify which point and which decomposition is used.
Theorem 8.2. Suppose F : U ⊂ Q(a, b) → Q(A, B) and G : V ⊂ Q(a, b) → Q(A, B) are
real-analytic CR maps equivalent in the sense that there exists a linear fractional automorphism τ of Q(a, b) and a linear fractional automorphism χ of Q(A, B) such that
Define the quotients qF and qG via
kF (z)k2B − 1 = kzk2b − 1 qF (z, z̄)
F ◦ τ = χ ◦ G.
kG(z)k2B − 1 = kzk2b − 1 qG (z, z̄).
and
(63)
(64)
Then taking holomorphic decompositions of qF and qG at any point in U and V respectively
gin span H(qF ) = gin span H(qG ) .
(65)
Proof. Write the linear fractional maps τ and χ as
τ′
χ′
τ = ′′
and
χ = ′′ .
τ
χ
′
′′
′
′′
for affine maps τ , τ , χ , and χ . Then
2
so
2
kτ ′ (z)kb − |τ ′′ (z)| = ±(kzk2b − 1)
2
|τ ′′ (z)| (kτ (z)k2b − 1) = ±(kzk2b − 1).
(66)
(67)
(68)
INITIAL MONOMIAL INVARIANTS OF HOLOMORPHIC MAPS
15
The ± is there again in case τ switches the sides of Q(a, b). We have the same equation for
w and χ with A, B instead of a, b.
We have kF (τ (z))k2B + 1 = kχ ◦ G(z)k2B + 1. Then
2
(kzk2b − 1)qF τ (z), τ (z) = ± |τ ′′ (z)| kτ (z)k2b − 1 qF τ (z), τ (z)
2
= ± |τ ′′ (z)| kF (τ (z))k2B − 1
2
= ± |τ ′′ (z)| kχ ◦ G(z)k2B − 1
τ ′′ (z)
= ± ′′
χ G(z)
In other words
τ ′′ (z)
= ± ′′
χ G(z)
2
kG(z)k2B − 1
(69)
2
kzk2b − 1 qG (z, z̄).
2
τ ′′ (z)
qG (z, z̄).
qF τ (z), τ (z) = ± ′′
(70)
χ G(z)
Multiplying by absolute value squared of a holomorphic function multiplies the elements
of the holomorphic decomposition by that function and so does not change the gin by
Lemma 6.6. Similarly composing with τ does not change the gin either by Lemma 6.5.
There is an equivalent theorem for holomorphic maps, when the automorhphism maps on
the source are simply the linear fractional automorphisms of Ba+b
b , that is, automorphisms of
a+b
a+b
a+b
P
preserving the closure of Bb in P . We lose no generality if we also allow swapping
sides (when a = b + 1) and hence we consider all linear fractional automorphisms of Q(a, b),
that is, self maps of Pa+b preserving HQ(a, b + 1).
Theorem 8.3. Suppose F : U ⊂ Ca+b → CA+B and G : V ⊂ Ca+b → CA+B are holomorphic
maps equivalent in the sense that there exists a linear fractional automorphism τ of Q(a, b),
where τ (V ) = U, and a linear fractional automorphism χ of Q(A, B) such that
F ◦ τ = χ ◦ G.
Define the quotients qF and qG as before:
and
kF (z)k2B − 1 = kzk2b − 1 qF (z, z̄)
kG(z)k2B − 1 = kzk2b − 1 qG (z, z̄).
(71)
(72)
Then taking holomorphic decompositions of qF and qG at any point in U and V respectively
gin span H(qF ) = gin span H(qG ) .
(73)
9. Gins of real-analytic functions
We end the article with a remark that Lemma 8.1 may be of independent interest, not
only for mapping questions. Let us consider the gin of a holomorphic decomposition of realanalytic functions. That is, for a domain U ⊂ Cn , consider two real-analytic functions of realanalytic functions r1 : U → R and r2 : U → R. Then say the functions are biholomorphically
equivalent if there exists a biholomorphism F : U → U, such that r1 = r2 ◦ F .
If we take H(rj ) to be the holomorphic decomposition of rj at any point of U, then
Lemma 8.1 says that if r1 and r2 are equivalent as above, then
gin affine-span H(r1 ) = gin affine-span H(r2 ) .
(74)
16
DUSTY GRUNDMEIER AND JIŘÍ LEBL
The gin as defined above is not a pointwise invariant. That is, a real-analytic function
defined on a connected open set has the same gin near every point. By the same argument as
before we can also define the gin of a real-analytic function on a connected complex manifold
U by noting that the gin is already well-defined if we take any connected chart.
References
[1] H. Alexander, Proper holomorphic mappings in C n , Indiana Univ. Math. J. 26 (1977), no. 1, 137–146.
MR0422699
[2] John P. D’Angelo, Several complex variables and the geometry of real hypersurfaces, Studies in Advanced
Mathematics, CRC Press, Boca Raton, FL, 1993. MR1224231
[3]
, Polynomial proper maps between balls, Duke Math. J. 57 (1988), no. 1, 211–219, DOI
10.1215/S0012-7094-88-05710-9. MR952233
, Hermitian analysis, Cornerstones, Birkhäuser/Springer, New York, 2013. From Fourier series
[4]
to Cauchy-Riemann geometry. MR3134931
[5] John P. D’Angelo, Šimon Kos, and Emily Riehl, A sharp bound for the degree of proper monomial mappings between balls, J. Geom. Anal. 13 (2003), no. 4, 581–593, DOI 10.1007/BF02921879. MR2005154
[6] James J. Faran, Maps from the two-ball to the three-ball, Invent. Math. 68 (1982), no. 3, 441–475, DOI
10.1007/BF01389412. MR669425
[7] James Faran, Xiaojun Huang, Shanyu Ji, and Yuan Zhang, Polynomial and rational maps between balls,
Pure Appl. Math. Q. 6 (2010), no. 3, 829–842, DOI 10.4310/PAMQ.2010.v6.n3.a10. MR2677315
[8] Franc Forstnerič, Embedding strictly pseudoconvex domains into balls, Trans. Amer. Math. Soc. 295
(1986), no. 1, 347–368, DOI 10.2307/2000160. MR831203
[9]
, Extending proper holomorphic mappings of positive codimension, Invent. Math. 95 (1989), no. 1,
31–61. MR969413
[10] Hans Grauert, Über die Deformation isolierter Singularitäten analytischer Mengen, Invent. Math. 15
(1972), 171–198 (German). MR0293127
[11] Daniel R. Grayson and Michael E. Stillman, Macaulay2, a software system for research in algebraic
geometry. Available at http://www.math.uiuc.edu/Macaulay2/.
[12] Mark Green, Generic initial ideals, Six lectures on commutative algebra (Bellaterra, 1996), Progr. Math.,
vol. 166, Birkhäuser, Basel, 1998, pp. 119–186. MR1648665
[13] Dusty Grundmeier, Jiřı́ Lebl, and Liz Vivas, Bounding the rank of Hermitian forms and rigidity for CR
mappings of hyperquadrics, Math. Ann. 358 (2014), no. 3-4, 1059–1089, DOI 10.1007/s00208-013-0989-z.
MR3175150
[14] Xiaojun Huang, Shanyu Ji, and Wanke Yin, On the third gap for proper holomorphic maps between
balls, Math. Ann. 358 (2014), no. 1-2, 115–142, DOI 10.1007/s00208-013-0952-z. MR3157993
[15] Jiřı́ Lebl, Normal forms, Hermitian operators, and CR maps of spheres and hyperquadrics, Michigan
Math. J. 60 (2011), no. 3, 603–628, DOI 10.1307/mmj/1320763051. MR2861091
[16] Michael Reiter, Classification of Holomorphic Mappings of Hyperquadrics from C2 to C3 , to appear in
J. Geom. Anal. arXiv:1409.5968.
[17] S. M. Webster, Some birational invariants for algebraic real hypersurfaces, Duke Math. J. 45 (1978),
no. 1, 39–46. MR0481086
[18] Hassler Whitney, Complex analytic varieties, Addison-Wesley Publishing Co., Reading, Mass.-LondonDon Mills, Ont., 1972. MR0387634
Department of Mathematics, Ball State University, Muncie, IN 47306, USA
Current address: Department of Mathematics, Harvard University, Cambridge MA 02138, USA
E-mail address: [email protected]
Department of Mathematics, Oklahoma State University, Stillwater, OK 74078, USA
E-mail address: [email protected]
| 0math.AC
|
Quantum Recursion and Second Quantisation
Mingsheng Ying
arXiv:1405.4443v2 [quant-ph] 6 Aug 2014
University of Technology, Sydney, Australia
and
Tsinghua University, China
[email protected]; [email protected]
Abstract. This paper introduces a new notion of quantum recursion of which
the control flow of the computation is quantum rather than classical as in the notions of recursion considered in the previous studies of quantum programming.
A typical example is recursive quantum walks, which are obtained by slightly
modifying the construction of the ordinary quantum walks. The operational and
denotational semantics of quantum recursions are defined by employing the second quantisation method, and they are proved to be equivalent.
Keywords: Quantum case statement, quantum choice, quantum recursion, recursive quantum walks, second quantisation, Fock space
1 Introduction
Recursion is one of the central ideas of computer science. Most programming languages
support recursion or at least a special form of recursion such as while-loop. Recursion
has also been considered since the very beginning of the studies of quantum programming; for example, Selinger [18] introduced the notion of recursive procedure in his
functional quantum programming language QPL and defined the denotational semantics of recursive procedures in terms of complete partial orders of super-operators. Termination of quantum while-loops were analysed by Ying and Feng [20] in the case of
finite-dimensional state spaces. A quantum generalisation of Etessami and Yannakakis’s
recursive Markov chains was proposed by Feng et. al. [11]. But the control flows of
all of the quantum recursions studied in the previous literatures are classical because
branchings in them are determined by the outcomes of certain quantum measurements,
which are classical information. So, they can be appropriately called classical recursion
of quantum programs.
Quantum control flow was first introduced by Altenkirch and Grattage [3] by defining a quantum case statement in their quantum programming language QML that implements a unitary transformation by decomposing it into two orthogonal branches along
an orthonormal basis of a chosen qubit. Motivated by the construction of quantum walks
[1], [2], a different approach to quantum control flow was proposed by the author in
[21], [22] where a kind of quantum case statement was defined by employing an external quantum “coin”. Furthermore, the notion of quantum choice was defined as the
sequential composition of a “coin tossing” program and a quantum case statement. The
quantum control flow of programs is clearly manifested in these quantum case statement
and quantum choice.
2
Ying
This paper introduces a new notion of quantum recursion using quantum case statements and quantum choices. In contrast to the recursions in quantum programming
considered before, the control flows of this kind of quantum recursions are quantum
rather than classical. Interestingly, this notion of quantum recursion enables us to construct a new class of quantum walks, called recursive quantum walks, whose behaviours
seem very different from the quantum walks defined in the previous literatures.
In this paper, we define the operational and denotational semantics of quantum recursions. The equivalence between these two semantics of quantum recursions are established. Obviously, how to define the semantics of quantum recursions is a question
that can be asked within the basic framework of quantum mechanics. But surprisingly,
answering it requires the mathematical tools from second quantisation [8] because variable number of identical particles are employed to implement the quantum “coins”
involved in the computation of a quantum recursion.
This paper is organised as follows. To make the paper self-contained, in Section 2
we recall the notions of quantum case statement and quantum choice from [21], [22].
The syntax of quantum recursive programs is defined in Section 3. To give the reader
a clearer picture, we choose not to include quantum measurements in the declarations
of quantum recursions in this paper. It seems that quantum measurements can be added
by combining the ideas used in this paper and those in [21], [22], but the presentation
will be very complicated. In Section 4, recursive quantum walks are considered as an
example for further motivating the notion of quantum recursion. In particular, it is carefully explained that a formal description of the behaviour of recursive quantum walks
requires the second quantisation method - a mathematical framework in which we are
able to depict quantum systems with variable number of particles. For convenience of
the reader, the basics of second quantisation is briefly reviewed in Section 5. We define
the semantics of quantum recursions in two steps. The first step is carried out in Section
6 where we construct a domain of operators in the free Fock space and prove continuity
of semantic functionals of quantum programs with procedure identifiers. Then recursive
equations are solved in the free Fock space by introducing the creation functional and
by employing the standard fixed point theorem. The second step is completed in Section
7 where the solutions of recursive equations are symmetralised so that they can apply in
the physically meaningful framework, namely the symmetric and antisymmetric Fock
spaces of bosons and fermions. A special class of quantum recursions, namely quantum
while-loops with quantum control flow are examined in Section 8. A short conclusion
is drawn in Section 9 with several problems for further studies.
2 Quantum Case Statement and Quantum Choice
Case statement in classical programming languages is a very useful program construct
for case analysis, see [9] for example. A quantum extension of case statement was defined in terms of measurements in various quantum programming languages, for example, Sanders and Zuliani’s qGCL [17], [24] and Selinger’s QPL [18]. The author defined
another quantum case statement using external quantum “coin” and further introduced
quantum choice as a variant of quantum case statement in [21], [22]. In this section, we
recall these two program constructs from [22].
Quantum Recursion and Second Quantisation
3
2.1 Quantum “if...then...else”
Let us start from the simplest case - a quantum counterpart of “if...then...else”. Assume
that c is a qubit of which the state Hilbert space Hc has |0i, |1i as an orthonormal
basis. Furthermore, assume that U0 and U1 are two unitary transformations acting on
a quantum system q of which the state Hilbert space is Hq . The system q is called the
principal quantum system. The action of U0 on system q can be thought of as a quantum
program and is denoted U0 [q]. Similarly, we write U1 [q] for the action of U1 on q. Then
a kind of quantum “if...then...else” can be defined by employing qubit c as a “quantum
coin”, and it is written as:
qif [c] |0i → U0 [q]
fiq
|1i → U1 [q]
(1)
in a way similar to Dijktra’s guarded commands [9]. The semantics of statement (1) is
an unitary operator
△
U = (|0i → U0 )(|1i → U1 )
on the tensor product Hc ⊗ Hq (i.e. the state Hilbert space of the composed system of
“coin” c and principal system q) defined by
U |0, ψi = |0iU0 |ψi,
U |1, ψi = |1iU1 |ψi
for any |ψi in Hq . It can be represented by the following diagonal matrix
U0 0
.
U = |0ih0| ⊗ U0 + |1ih1| ⊗ U1 =
0 U1
We call U the guarded composition of U0 and U1 along with basis |0i, |1i. Moreover,
let V be a unitary operator in the state Hilbert space Hc of the “coin” c. The action of V
on c can also be thought of as a program and is denoted V [c]. Then the quantum choice
of U0 [q] and U1 [q] with “coin-tossing” V [c] is defined to be
V [c]; qif [c] |0i → U0 [q]
fiq
|1i → U1 [q]
(2)
Here and in the sequel, P ; Q denotes the sequential composition of programs P and
Q; that is, program P followed by program Q. Using a notation similar to probabilistic
choice in a probabilistic programming language like pGCL [15], program (2) can be
written as
U0 [q] ⊕V [c] U1 [q]
(3)
Obviously, the semantics of quantum choice (3) is the unitary matrix U (V ⊗ Iq ), where
Iq is the identity operator in Hq .
The idea of defining quantum “if...then...else” using “quantum coin” was actually
borrowed from quantum walks. Here, let us consider the one-dimensional quantum
walks [2] as an example.
4
Ying
Example 1 The simplest random walk is the one-dimensional walk in which a particle
moves on a lattice marked by integers Z, and at each step it moves one position left or
right, depending on the flip of a fair coin. The Hadamard walk is a quantum variant
of the one-dimensional random walk. Its state Hilbert space is Hd ⊗ Hp , where Hd =
span{|Li, |Ri}, L, R are used to indicate the direction Left and Right, respectively,
Hp = span{|ni : n ∈ Z}, and n indicates the position marked by integer n. One step
of the Hadamard walk is represented by the unitary operator W = T (H ⊗ I), where
the translation T is a unitary operator in Hd ⊗ Hp defined by
T |L, ni = |L, n − 1i,
for every n ∈ Z,
1
H= √
2
T |R, ni = |R, n + 1i
1 1
1 −1
is the Hadamard transform in the direction space Hd , and I is the identity operator in
the position space Hp . The Hadamard walk is described by repeated applications of
operator W .
Now let us see how the idea of quantum case statement and quantum choice disguises in the construction of the Hadamard walk. If we define the left and right translation operators TL and TR in the position space Hp by
TL |ni = |n − 1i,
TR |ni = |n + 1i
for each n ∈ Z, then the translation operator T can be broken into a quantum case
statement of TL and TR :
T = qif [d] |Li → TL [p]
fiq
|Ri → TR [p]
(4)
where d is a “direction coin”, and p is a variable used to denote the position. Furthermore, the single-step walk operator W can be seen as the quantum choice
TL [p] ⊕H[d] TR [p].
Recently, physicists have been very interested in implementing quantum control for
unknown subroutines [23], [7], [12], which is essentially a quantum “if...then...else”or
a quantum choice.
2.2 Quantum Case Statement and Quantum Choice with Multiple Branches
We now generalise the quantum case statement (1) and quantum choice (2) to the case
with more than two branches. Let n ≥ 2 and c denote an n−level quantum system
with state Hilbert space Hc = span{|0i, |1i, ..., |n − 1i}. For each 0 ≤ i < n, let Ui
Quantum Recursion and Second Quantisation
5
be a unitary operator or the zero operator in the state Hilbert space Hq of the principal
system q. Using system c as a “quantum coin”, we can define a quantum case statement:
qif [c] (i · |ii → Ui [q]) qif = qif [c] |0i → U0 [q]
|1i → U1 [q]
..........
fiq
(5)
|n − 1i → Un−1 [q]
The reason for allowing some of Ui ’s being the zero operator is that if Ui [q] is a program
containing recursion then it may not terminate. In the case that Ui is the zero operator,
we usually drop of the ith branch of the statement (5). Furthermore, let V be a unitary
operator in the “coin” space Hc . Then we can define a quantum choice:
M
|ii → Ui [q]) = V [c]; qif [c] (i · |ii → Ui [q]) qif
(6)
V [c] (
i
The semantics of quantum case statement (5) is the unitary operator
△
U = (c, |ii → Ui )
in Hc ⊗ Hq defined by U |i, ψi = |iiUi |ψi for any 0 ≤ i < n and |ψi in Hq . The operator U is called the guarded composition of Ui ’s along with basis {|ii}. It is represented
by the diagonal matrix
U0
0
n−1
X
U1
(7)
(|iic hi| ⊗ Ui ) = diag(U0 , U1 , ..., Un−1 ) =
U=
...
i=0
0
Un−1
The semantics of quantum choice (6) is then the operator U (V ⊗ Iq ), where Iq is the
identity operator in Hq .
Quantum walks on a graph [1] can be conveniently expressed in terms of the above
generalised quantum case statement and choice, as shown in the following:
Example 2 A random walk on a directed graph G = (V, E) is described by repeated
applications of stochastic matrix P = (Puv )u,v∈V , where
(
1
if (u, v) ∈ E,
Puv = du
0
otherwise
where du is the outgoing degree of u, i.e. the number of edges outgoing from u. In
particular, if G is d−regular, i.e. all nodes have the same degree d, then Puv = d1 for
all u, v ∈ V . A quantum walk on graph G is a quantum counterpart of the random walk.
Let HV = span{|vi : v ∈ V } be the Hilbert space spanned by states corresponding
to the vertices in G. We now assume that G is d−regular. Then each edge in G can be
labelled by a number among 1, 2, ..., d so that for any 1 ≤ a ≤ d, the edges labelled a
6
Ying
form a permutation. Let HA = span{|1i, |2i, ..., |di} be an auxiliary Hilbert space of
dimension d, called the “coin space”. The shift operator S is defined in HA ⊗ HV by
S|a, vi = |a, va i
for 1 ≤ a ≤ d and v ∈ V , where va is the a−th neighbour of v, i.e. the vertex
reached from v through the outgoing edge labelled a. Furthermore, let C be a unitary
operator in HA , called the “coin-tossing operator”. Then one step of the quantum walk
is modelled by the operator W = S(C ⊗ I), where I is the identity operator in HV .
The quantum walk is described by repeated applications of W .
If for each 1 ≤ a ≤ d, we define the a−th shift operator Sa in HV by
Sa |vi = |va i
for any v ∈ V , then the shift operator S can be seen as a quantum case statement:
S = qif [c] (a · |ai → Sa [q]) qif
= qif [c] |1i → S1 [q]
|2i → S2 [q]
fiq
..........
|di → Sd [q]
where c and q are two variables denoting quantum systems with state spaces HA
and HV , respectively. Consequently, the single-step walk operator W is the quantum
choice:
M
W = C[c](
|ai → Sa [q])
a
The quantum case statement (5) and quantum choice (6) can be further generalised
to the case where unitary transformations U0 [q], U1 [q], ..., Un−1 [q] are replaced by general quantum programs that may contain quantum measurements. It is quite involved to
define the semantics of such general quantum case statement and choice; for details we
refer to [21], [22].
3 Syntax of Quantum Recursive Programs
A new notion of quantum recursion with quantum control flow can be defined based on
quantum case statement and quantum choice discussed in the last section. In this short
section, we formally define the syntax of quantum recursive programs.
We assume two sets of quantum variables: principal system variables, ranged over
by p, q, ..., and “coin” variables, ranged over by c, d, .... These two sets are required to
be disjoint. We also assume a set of procedure identifiers, ranged over by X, X1 , X2 , ....
Then program schemes are defined by the following syntax:
P ::= X | abort | skip | P1 ; P2 | U [c, q] | qif [c](i · |ii → Pi ) fiq
where:
Quantum Recursion and Second Quantisation
7
– X is a procedure identifier; programs abort and skip are the same as in a classical
programming language; P1 ; P2 is the sequential composition of P1 and P2 .
– In unitary transformation U [c, q], c a sequence of “coin” variables, q is a sequence
of principal system variables, and U is a unitary operator in the state Hilbert space
of the system consisting of c and q. We will always put “coin” variables before principal system variables. Both of c and q are allowed to be empty. When c is empty,
we simply write U [q] for U [c, q] and it describes the evolution of the principal system q; when q is empty, we simply U [c] for U [c, q] and it describes the evolution of
the “coins” c. If both c and q are not empty, then U [c, q] describes the interaction
between “coins” c the principal system q.
– In quantum case statement qif [c](i · |ii → Pi ) fiq, c is a “coin” variable, and
{|ii} is an orthonormal basis of the state Hilbert space of c. It is required not to
occur in all the subprograms Pi ’s because according to its physical interpretation,
a “coin” is always external to the principal system. This program construct is a
generalisation of equation (5).
As a generalisation of equation (6), the program construct of quantum choice can be
defined in terms of quantum case statement and sequential composition. Let P be a program contains only “coin” c, let {|ii} be an orthonormal basis of the state Hilbert space
of c, and let Pi be a program for each i . Then the quantum choice of Pi ’s according to
P along the basis {|ii} is defined as
[P (c)]
M
i
△
(|ii → Pi ) = P ; qif [c] (i · |ii → Pi ) fiq.
(8)
If the “coin” is a qubit, then quantum choice (8) can be abbreviated as
P0 ⊕P P1 .
Intuitively, quantum choice (8) runs a “coin-tossing” subprogram P followed by an
alternation of a family of subprograms P0 , P1 , .... The “coin-tossing” subprogram P
creates a superposition of the execution paths of P0 , P1 , ..., and during the execution of
the alternation, each Pi is running along its own path, but the whole program is executed
in a superposition of execution paths of P0 , P1 , .... This picture can be imaginatively
termed as the superposition-of-programs paradigm.
The semantics of quantum programs without procedure identifiers (and thus without
recursion) can be easily defined. The principal system of a quantum program P is the
composition of the systems denoted by principal variables appearing in P . We write H
for the state Hilbert space of the principal system.
Definition 1 The semantics JP K of a program P without procedure identifiers is inductively defined as follows:
1. If P = abort, then JP K = 0 (the zero operator in H), and if P = skip, then
JP K = I (the identity operator in H);
2. If P is an unitary transformation U [c, q], then JP K is the unitary operator U (in the
state Hilbert space of the system consisting of c and q);
3. If P = P1 ; P2 , then JP K = JP2 K · JP1 K;
8
Ying
4. If P = qif [c](i · |ii → Pi ) fiq, then
△
JP K = (c, |ii → JPi K) =
X
i
(|iic hi| ⊗ JPi K)
(see equation (7) for the special case of unitary operators).
Finally, we can define the syntax of quantum recursive programs. If a program
scheme contains at most the procedure identifiers X1 , ..., Xm , then we write P =
P [X1 , ..., Xm ].
Definition 2 1. Let X1 , ..., Xm be different procedure identifiers. A declaration for
X1 , ..., Xm is a system of equations:
X1 ⇐ P1 ,
D:
......
Xm ⇐ Pm ,
where for every 1 ≤ i ≤ m, Pi = Pi [X1 , ..., Xm ] is a program scheme containing
at most procedure identifiers X1 , ..., Xm .
2. A recursive program consists of a program scheme P = P [X1 , ..., Xm ], called
the main statement, and a declaration D for X1 , ..., Xm such that all “coin” variables in P do not appear in D; that is, they do not appear in the procedure bodies
P1 , ..., Pm .
The requirement in the above definition that the “coins” in the main statement P
and those in the declaration D are distinct is obviously necessary because a “coin” used
to define a quantum case statement is always considered to be external to its principal
system.
Now the question is: how to define the semantics of quantum recursive programs?
4 Motivating Example: Recursive Quantum Walks
As a motivating example of quantum recursive program, let us consider a variant of
quantum walks, called recursive quantum walks. For simplicity, we focus on the recursive Hadamard walk - a modification of Example 1. Recursive quantum walks on a
graph can be defined by modifying Example 2 in a similar way.
4.1 Specification of Recursive Quantum Walks
Recall that the single-step operator W of the Hadamard walk is a quantum choice,
which is the sequential composition of a “coin-tossing” Hadamard operator H on the
“direction coin” d and translation operator T on the position variable p. The translation
T [p] is a quantum case statement that selects left or right translations according to the
basis states |Li, |Ri of the “coin” d. If d is in state |Li then the walker moves one
position left, and if d is in state |Ri then it moves one position right. An essential
Quantum Recursion and Second Quantisation
9
difference between a random walk and a quantum walk is that the “coin” of the latter
can be in a superposition of the basis states |Li, |Ri, and thus a superposition of left and
right translations TL [p] and TR [p] is created. The Hadamard walk is then defined in a
simple way of recursion with the single-step operator W , namely repeated applications
of W . Now we modify slightly the Hadamard walk using a little bit more complicated
recursion.
Example 3 1. The unidirectionally recursive Hadamard walk first runs the “cointossing” Hadamard operator H[d] and then a quantum case statement: if the “direction coin” d is in state |Li then the walker moves one position left, and if d is
in state |Ri then it moves one position right, followed by a procedure behaving as
the recursive walk itself. In the terminology of programming languages, the recursive Hadamard walk is defined to a program X declared by the following recursive
equation:
X ⇐ TL [p] ⊕H[d] (TR [p]; X)
(9)
where d, p are the direction and position variables, respectively.
2. The bidirectionally recursive Hadamard walk first runs the “coin-tossing” Hadamard
operator H[d] and then a quantum case statement: if the “direction coin” d is in
state |Li then the walker moves one position left, followed by a procedure behaving as the recursive walk itself, and if d is in state |Ri then it moves one position
right, also followed by a procedure behaving as the recursive walk itself. More
precisely, the walk can be defined to be the program X declared by the following
two recursive equations:
X ⇐ (TL [p]; X) ⊕H[d] (TR [p]; X).
(10)
3. A variant of the bidirectionally recursive Hadamard walk is the program X (or Y )
declared by the following system of recursive equations:
(
X ⇐ TL [p] ⊕H[d] (TR [p]; Y ),
(11)
Y ⇐ (TL [p]; X) ⊕H[d] TR [p].
4. Note that we used the same “coin” d in the two equations of (11). If two different “coins” d and e are used, then we have another variant of the bidirectionally
recursive Hadamard walk specified by
(
X ⇐ TL [p] ⊕H[d] (TR [p]; Y ),
Y ⇐ (TL [p]; X) ⊕H[e] TR [p].
5. We can define a recursive quantum walk in another way if quantum case statement
with three branches is employed:
X ⇐ U [d]; qif [d] |Li → TL [p]
fiq
|Ri → TR [p]
|Ii → X
10
Ying
where d is not a qubit but a qutrit with state space Hd = span{|Li, |Ri, |Ii}, L, R
stand for the directions Left and Right, respectively, and I for Iteration, and U is a
3 × 3 unitary matrix, e.g. the 3−dimensional Fourier transform:
1 1
1
4
2
F3 = 1 e 3 πi e 3 πi .
4
2
1 e 3 πi e 3 πi
Now let us have a glimpse of the behaviours of recursive quantum walks. We use
E to denote the empty program or termination. A configuration is defined to be a pair
(P, |ψi) with P being a program or the empty program E, and |ψi a pure state of the
quantum system. Then the behaviour of a program can be visualised by a sequence of
transitions between superpositions of configurations. Here, we only consider the unidirectionally recursive quantum walk X declared by equation (9). Assume that it is
initialised in state |Lid |0ip ; that is, the “coin” is in direction L and the walker is at
position 0. Then we have:
1
1
(X, |Lid |0ip ) → √ (E, |Lid | − 1ip ) + √ (X, |Rid |1ip )
2
2
1
1
1
→ √ (E, |Lid | − 1ip ) + (E, |Rid |Lid1 |0ip ) + (X, |Rid |Rid1 |2ip )
2
2
2
→ ......
n
X
1
√
(E, |Rid0 ...|Ridi−1 |Lidi |i − 1ip )
→
2i+1
i=0
1
(X, |Rid0 ...|Ridn−1 |Ridn |n + 1ip )
+√
2n+1
(12)
Here, d0 = d, and new quantum “coins” d1 , d2 , ... that are identical to the original
“coin” d are introduced in order to avoid the conflict of variables for “coins”.
The above recursive quantum walks are good examples of quantum recursion, but
their behaviours are not very interesting. It has been well-understood that the major
difference between the behaviours of classical random walks and quantum walks is
caused by quantum interference - two separate paths leading to the same point may be
out of phase and cancel one another [2]. It is clear from equation (12) that quantum
interference does not happen in the unidirectionally recursive quantum walk. Similarly,
no quantum interference occurs in the bidirectionally recursive quantum walks defined
in the above example. The following is a much more interesting recursive quantum walk
that shows a new phenomenon of quantum interference: the paths that are cancelled in
a quantum walk are finite. However, it is possible that infinite paths are cancelled in a
recursive quantum walk.
Example 4 Let n ≥ 2. A variant of unidirectionally recursive quantum walk can be
defined as the program X declared by the following recursive equation:
X ⇐ (TL [p] ⊕H[d] TR [p])n ; ((TL [p]; X) ⊕H[d] (TR [p]; X))
(13)
Quantum Recursion and Second Quantisation
11
Here, we use P n to denote the sequential composition of n P ’s. Now let us look at the
behaviour of this walk. We assume that the walk is initialised in state |Lid |0ip . Then
the first three steps of the walk are given as follows:
1
(X, |Lid |0ip ) → √ [(X1 , |Lid | − 1ip + (X1 , |Rid |1ip )]
2
1
→ [(X2 , |Lid | − 2ip ) + (X2 , |Rid |0ip ) + (X2 , |Lid |0ip ) − (X2 , |Rid |2ip )]
2
1
→ √ [(X3 , |Lid | − 3ip ) + (X3 , |Rid | − 1ip ) + (X3 , |Lid | − 1ip ) − (X3 , |Rid |1ip )
2 2
+ (X3 , |Lid | − 1ip ) + (X3 , |Rid |1ip ) − (X3 , |Lid |1ip ) + (X3 , |Rid |3ip )]
1
= √ [(X3 , |Lid | − 3ip ) + (X3 , |Rid | − 1ip ) + 2(X3 , |Lid | − 1ip )
2 2
− (X3 , |Lid |1ip ) + (X3 , |Rid |3ip )]
(14)
where
Xi = (TL [p] ⊕H[d] TR [p])n−i ; ((TL [p]; X) ⊕H[d] (TR [p]; X))
for i = 1, 2, 3. We observe that in the last step of equation (14) two configurations
−(X, |Rid |1ip ) and (X, |Rid |1ip ) cancel one another in the last part of the above
equation. It is clear that both of them can generate infinite paths because they contain
the recursive walk X itself.
The behaviour of the recursive program specified by the following equation:
X ⇐ (TL [p] ⊕H[d] TR [p])n ; ((TL [p]; X) ⊕H[d] (TR [p]; X))
(15)
is even more puzzling. Note that equation (15) is obtained from equation (13) by changing the order of the two subprograms in its right-hand side.
4.2 How to solve recursive quantum equations?
We have already seen the first steps of the recursive quantum walks. But a precise
description of their behaviours amounts to solving recursive equations (9), (10), (11)
and (13). In mathematics, a standard method for finding the least solution to an equation
x = f (x) with f being a function from a lattice into itself is as follows: let x0 be the
least element of the lattice. We take the iterations of f starting from x0 :
(
x(0) = x0 ,
x(n+1) = f (x(n) ) for n ≥ 0.
If f is monotone and the lattice is complete, then the limit limn→∞ x(n) of iterations
exists; and furthermore if f is continuous, then this limit is the least solution of the
equation. In the theory of programming languages [4], a syntactic variant of this method
12
Ying
is employed to define the semantics of a recursive program declared by, say, equation
X ⇐ F (X), where F (·) is presented in a syntactic rather than semantic way: let
(
X (0) = Abort,
X (n+1) = F [X (n) /X] for n ≥ 0.
where F [X (n) /X] is the result of substitution of X in F (X) by X (n) . The program
X (n) is called the nth syntactic approximation of X. Roughly speaking, the syntactic
approximations X (n) (n = 0, 1, 2, ...) describe the initial fragments of the behaviour of
the recursive program X. Then the semantics JXK of X is defined to be the limit of the
semantics JX (n) K of its syntactic approximations X (n) :
JXK = lim JX (n) K.
n→∞
Now we apply this method to the unidirectionally recursive Hadamard walk and construct its syntactic approximations as follows:
X (0) = abort,
X (1) = TL [p] ⊕H[d] (TR [p]; abort),
X (2) = TL [p] ⊕H[d] (TR [p]; TL [p] ⊕H[d1 ] (TR [p]; abort)),
X (3) = TL [p] ⊕H[d] (TR [p]; TL [p] ⊕H[d1 ] (TR [p]; TL [p] ⊕H[d2 ] (TR [p]; abort))),
............
(16)
However, a problem arises in constructing these approximations: we have to continuously introduce new “coin” variables in order to avoid variable conflict; that is, for every
n = 1, 2, ..., we introduce a new “coin” variable dn in the (n + 1)th syntactic approximation. Obviously, variables d, d1 , d2 , ... must denote identical particles. Moreover, the
number of the “coin” particles that are needed in running the recursive Hadamard walk
is usually unknown beforehand because we do not know when the walk terminates. It
is clear that this problem appears only in the quantum case but not in the theory of
classical programming languages because it is caused by employing an external “coin”
system in defining a quantum case statement. Therefore, a solution to this problem requires a mathematical framework in which we can deal with quantum systems where
the number of particles of the same type - the “coins” - may vary.
5 Second Quantisation
Fortunately, physicists had developed a formalism for describing quantum systems with
variable particle number, namely second quantisation, more than eighty years ago. For
convenience of the reader, we recall basics of the second quantum method in this section.
Quantum Recursion and Second Quantisation
13
5.1 Fock Spaces
Let H be the state Hilbert space of one particle. For any n ≥ 1, we write H⊗n for
the n−fold tensor product of H. If we introduce the vacuum state |0i, then the 0−fold
tensor product of H can be defined as the one-dimensional space H⊗0 = span{|0i}.
Furthermore, the free Fock space over H is defined to be the direct sum [5]:
F (H) =
∞
M
n=0
H⊗n .
The principle of symmetrisation in quantum physics [8] indicates that the states
of n identical particles are either completely symmetric or completely antisymmetric
with respect to the permutations of the particles. These particles are called bosons in
the symmetric case and fermions in the antisymmetric case. For each permutation π of
1, ..., n, we define the permutation operator Pπ in H⊗n by
Pπ |ψ1 ⊗ ... ⊗ ψn i = |ψπ(1) ⊗ ... ⊗ ψπ(n) i
for all |ψ1 i, ..., |ψn i in H. Furthermore, we define the symmetrisation and antisymmetrisation operators in H⊗n as follows:
S+ =
1 X
Pπ ,
n! π
S− =
1 X
(−1)π Pπ
n! π
where π ranges over all permutations of 1, ..., n, and (−1)π is the signature of the
permutation π. For v = +, − and any |ψ1 i, ..., |ψn i in H, we write
|ψ1 , ..., ψn iv = Sv |ψ1 ⊗ ... ⊗ ψn i.
Then the state space of n bosons and that of fermions are
Hv⊗n = Sv H⊗n = span{|ψ1 , ..., ψn iv : |ψ1 i, ..., |ψn i are in H}
for v = +, −, respectively. If we set Hv⊗0 = H⊗0 , then the space of the states of
variable particle number is the symmetric or antisymmetric Fock space:
Fv (H) =
∞
M
n=0
Hv⊗n
where v = + for bosons and v = − for fermions. The elements of the Fock space
Fv (H) (resp. the free Fock space F (H)) are of the form
|Ψ i =
∞
X
n=0
|Ψ (n)i
with |Ψ (n)i ∈ Hv⊗n (resp. |Ψ (n)i ∈ H⊗n ) for n = 0, 1, 2, ... and
∞.
P∞
n=0 hΨ (n)|Ψ (n)i
<
14
Ying
5.2 Operators in the Fock Spaces
For each n ≥ 1, let A(n) be an operator in H⊗n . Then operator
A=
∞
X
A(n)
(17)
n=0
is defined in the free Fock space F (H) as follows:
A
∞
X
n=0
|Ψ (n)i =
∞
X
A(n)|Ψ (n)i
n=0
P∞
for any |Ψ i = n=0 |Ψ (n)i in F (H), where A(0) = 0; that is, the vacuum state is
considered to be an eigenvector of operator A with eigenvalue 0.
If for each n ≥ 0 and for each permutation π of 1, ..., n, Pπ and A(n) commute;
that is,
Pπ A(n) = A(n)Pπ ,
P∞
then operator A is said to be symmetric. A symmetric operator A = n=0 A(n) is an
operator both in the symmetric Fock space F+ (H) and in the antisymmetric Fock space
F− (H): A(Fv (H)) ⊆ Fv (H) for v = +,P−. We can introduce the symmetrisation
∞
functional S that maps every operator A = n=0 A(n) to a symmetric operator:
S(A) =
∞
X
S(A(n))
(18)
n=0
where for each n ≥ 0,
S(A(n)) =
1 X
Pπ A(n)Pπ−1
n! π
(19)
with π traversing over all permutations of 1, ..., n.
Observables in the Fock Spaces If for each n ≥ 1, the operator A(n) in equation
(17) is an observable of n particles, then A is an extensive observable in the free Fock
space F(H). In particular, let us consider one-body observables. Assume that A is a
single-particle observable. Then we can define one-body observable
X (n)
Aj
A(n) =
j
(n)
for the system of n particles, where Aj = I ⊗(n−1) ⊗ A ⊗ I ⊗(n−j) (with I being the
identity operator in H) is the action of A on the jth factor of the tensor product H⊗n ;
that is,
(n)
Aj |ψ1 ⊗ ... ⊗ ψn i = |ψ1 ⊗ ... ⊗ ψj−1 ⊗ Aψj ⊗ ψj+1 ⊗ ... ⊗ ψn i
Quantum Recursion and Second Quantisation
15
for all |ψ1 i, ...|ψn i in H. It is easy to see that A(n) commutes with the permutations:
A(n)|ψ1 , ..., ψn iv =
n
X
j=1
|ψ1 , ..., ψj−1 , Aψj , ψj+1 , ..., ψn iv .
P
Therefore, A = ∞
n=0 A(n) is symmetric. It is called a one-body observable in the
Fock space Fv (H) for v = +, −. Similarly, we can define a k−body observable with
k ≥ 2.
Evolutions in the Fock Spaces Let the (discrete-time) evolution of one particle is
represented by unitary operator U . Then the evolution of n particles without mutual
interactions can be described by operator U(n) = U ⊗n in H⊗n :
U(n)|ψ1 ⊗ ... ⊗ ψn i = |U ψ1 ⊗ ... ⊗ U ψn i
(20)
for all |ψ1 i, ..., |ψn i in H. It is easy to verify that U(n) commutes with the permutations:
U(n)|ψ1 , ..., ψn iv = |U ψ1 , ..., U ψn iv .
P
So, the symmetric operator U = ∞
n=0 U(n) depicts the evolution of particles without
mutual interactions in the Fock space Fv (H) for v = +, −.
Creation and Annihilation of Particles The operator U defined by equation (17)
maps states of n particles to states of particles of the same number. The transitions between states of different particle numbers are described by the creation and annihilation
operators. To each one-particle state |ψi in H, we associate the creation operator a† (ψ)
in Fv (H) defined by
√
a† (ψ)|ψ1 , ..., ψn iv = n + 1|ψ, ψ1 , ..., ψn iv
for any n ≥ 0 and all |ψ1 i, ..., |ψn i in H. This operator adds a particle in the individual
state |ψi to the system of n particles without modifying their respective states. The
annihilation operator a(ψ) is defined to be the Hermitian conjugate of a† (ψ), and it is
not difficult to show that
a(ψ)|0i = 0,
n
1 X i−1
(v) hψ|ψi i|ψ1 , ..., ψi−1 , ψi+1 , ..., ψn iv
a(ψ)|ψ1 , ..., ψn iv = √
n i=1
Intuitively, operator a(ψ) decreases the number of particles by one unit, while preserving the symmetry of the state.
6 Solving Recursive Equations in the Free Fock Space
Second quantisation provides us with the necessary tool for defining the semantics of
quantum recursions. We first show how to solve recursive equations in the free Fock
spaces without considering symmetry or antisymmetry of the particles that are used to
implement the quantum “coins”.
16
Ying
6.1 A Domain of Operators in the Free Fock Space
Let C be a set of quantum “coins”. For each c ∈ C, let Hc be the state Hilbert space of
“coin” c and F (Hc ) the free Fock space over Hc . We write
O
G(HC ) =
F (Hc ).
c∈C
We also assume that H is the state Hilbert space of the principal system. Let ω be the
set of nonnegative integers. Then ω C is the set of C−indexed tuples of nonnegative
integers: n = {nc }c∈C with nc ∈ ω for all c ∈ C, and we have:
!
M O
⊗nc
G(HC ) ⊗ H ≡
Hc ⊗ H .
n∈ω C
c∈C
We write O(G(HC ) ⊗ H) for the set of all operators of the form
X
A=
A(n),
n∈ω C
N
where A(n) is an operator in c∈C Hc⊗nc ⊗ H for each n ∈ ω C . Recall that a binary
relation ⊑ on a nonempty set S if it is reflexive, transitive and antisymmetric. In this
case, we often call (S, ⊑) or even simply S a partial order. We define a partial order ≤
on ω C as follows: n ≤ m if and only if nc ≤ mc for all c ∈ C. A subset Ω ⊆ ω C is
said to be below-closed if n ∈ Ω and m ≤ n imply
the flat order ⊑
P∞ m ∈ Ω. We defineP
∞
on O(G(HC ) ⊗ H) as follows: for any A = n∈ωC A(n) and B = n∈ωC B(n) in
O(G(HC ) ⊗ H),
– A ⊑ B if and only if there exists a below-closed subset Ω ⊆ ω C such that A(n) =
B(n) for all n ∈ Ω and A(n) = 0 for all n ∈ ω C \ Ω.
Let (S, ⊑) be a partial order. A nonempty subset T ⊆ S is called a chain if for any
x, y ∈ T , it holds that x ⊑ y or y ⊑ x. A partial order is said to be
F complete if it has
the least element and every chain T in it has the least upper bound T .
Lemma 1 (O(G(HC ) ⊗ H), ⊑) is a complete partial order (CPO).
Proof. First, ⊑ is reflexive because ω C itself is below-closed. To show that ⊑ is transitive, we assume that A ⊑ B and B ⊑ C. Then there exist below-closed Ω, Γ ⊆ ω C
such that
1. A(n) = B(n) for all n ∈ Ω and A(n) = 0 for all n ∈ ω C \ Ω;
2. B(n) = C(n) for all n ∈ Γ and B(n) = 0 for all n ∈ ω C \ Γ .
Clearly, Ω ∩ Γ is below-closed, and A(n) = B(n) = C(n) for all n ∈ Ω ∩ Γ . On the
other hand, if n ∈ ω C \ (Ω ∩ Γ ) = (ω C \ Ω) ∪ [Ω ∩ (ω C \ Γ )], then either n ∈ ω C \ Ω
and it follows from clause 1 that A(n) = 0, or n ∈ Ω ∩ (ω C \ Γ ) and by combining
clauses 1 and 2 we obtain A(n) = B(n) = 0. Therefore, A ⊑ C. Similarly, we can
prove that ⊑ is antisymmetric. So, (O(G(HC ) ⊗ H), ⊑) is a partial order.
Quantum Recursion and Second Quantisation
17
P
the operator A = n∈ωC A(n) with A(n) = 0 (the zero operator in
N Obviously,
⊗nc
⊗ H) for all n ∈ ω C is the least element of (O(G(HC ) ⊗ H), ⊑). Now it
c∈C Hc
suffices to show that any chain {Ai } in (O(G(HC ) ⊗ H), ⊑) has the least upper bound.
For each i, we put
∆i = {n ∈ ω C : Ai (n) = 0},
∆i ↓ = {m ∈ ω C : m ≤ n for some n ∈ ∆i }.
Here
P ∆i ↓ is the below-completion of ∆i . Furthermore, we define operator A =
m∈ω C A(n) as follows:
(
Ai (n) if n ∈ ∆i ↓ for some i,
S
A(n) =
0
if n ∈
/ i (∆i ↓).
Claim 1: A is well-defined; that is, if n ∈ ∆i ↓ and n ∈ ∆j ↓, then Ai (n) =
Aj (n). In fact, since {Ai } is a chain, we have Ai ⊑ Aj or Aj ⊑ Ai . We only
consider the case of Ai ⊑ Aj (the case of Aj ⊑ Ai is proved by duality). Then there
exists below-closed Ω ⊆ ω C such that Ai (n) = Aj (n) for all n ∈ Ω and A(n) = 0
for all n ∈ ω C \ Ω. It follows from n ∈ ∆i ↓ that n ⊑ m for some m with Ai (m) 6= 0.
/ ω C \ Ω, i.e. m ∈ Ω, we have n ∈ Ω because Ω is below-closed. So,
Since m ∈
Ai (n) = Aj (n). F
Claim 2: A = i Ai . In fact, for each i, ∆i ↓ is below-closed, and Ai (n) = A(n)
for all n ∈ ∆i ↓ and Ai (n) = 0 for all n ∈ ω C \(∆i ↓). So, Ai ⊑ A, and A is an upper
bound of {Ai }. Now assume that B is an upper bound of {Ai }: for all i, Ai ⊑ B; that
is, there exists below-closed Ωi ⊆ ω C such that Ai (n) = B(n) for all n ∈ Ωi and
Ai (n) = 0 for all n ∈ ω C \ Ωi . By theSdefinition of ∆i and below-closeness of Ωi ,
we know that ∆i ↓⊆ Ωi . We take Ω = i (∆i ↓). Clearly, Ω is below-closed, and if
n ∈ ω C \ Ω, then A(n) = 0. On the other hand, if n ∈ Ω, then for some i, we have
n ∈ ∆i ↓, and it follows that n ∈ Ωi and A(n) = Ai (n) = B(n). Therefore, A ⊑ B.
P
P
For any operators A = n∈ωC A(n) and B = n∈ωC B(n) in O(G(HC ) ⊗ H),
their product is naturally defined as
X
(A(n) · B(n)) ,
A·B=
(21)
n∈ω C
which is also in O(G(HC ) ⊗ H). We can define guarded composition of operators in
Fock spaces by extending
equation (7). Let c ∈ C and {|ii} be an orthonormal basis of
P
Hc , and let Ai = n∈ωC Ai (n) be an operator in O(G(HC ) ⊗ H) for each i. Then
the guarded composition of Ai ’s along with the basis {|ii} is
!
X X
(c, |ii → Ai ) =
(|iic hi| ⊗ Ai (n)) .
(22)
n∈ω C
Note that for each n ∈ ω C ,
P
i
(|iic hi| ⊗ Ai (n)) is an operator in
O
Hdnd ⊗ H,
Hc⊗(nc +1) ⊗
i
d∈C\{c}
18
Ying
and thus (c, |ii → Ai ) ∈ O(G(HC ) ⊗ H). Recall that a mapping f from a CPO
(S1 , ⊑) into another CPO (S2 , ⊑) is said to be continuous if for any chainFT in S1 ,
its F
image f (T ) = {f (x) : x ∈ T } under f has the least upper bound and f (T ) =
f ( T ). The following lemma shows that both product and guarded composition of
operators in the free Fock space are continuous.
Lemma 2 Let {Aj }, {Bj } and {Aij } for each i be chains in (O(G(HC ) ⊗ H), ⊑).
Then
F
F
F
.
·
B
A
1. j (Aj · Bj ) =
j
j
j
j
F
F
.
2. j (c, |ii → Aij ) = c, |ii →
j Aij
Proof. We only prove part 2. The proof of part 1 is similar. For each i, we assume that
X
G
Aij = Ai =
Ai (n).
j
n∈ω C
By the construction of least upper
P bound in (O(G(HC ) ⊗ H), ⊑) given in
Sthe proof of
Lemma 1, we can write Aij = n∈Ωij Ai (n) for some Ωij ⊆ ω C with j Ωij = ω C
for every i. By appending zero operators to the end of shorter summations, we may
further ensure that Ωij ’s for all i are the same, say Ωj . Then by the defining equation
(22) we obtain:
!
G X X
G
(|iic hi| ⊗ Ai (n))
(c, |ii → Aij ) =
j n∈Ωj
j
=
X
n∈ω C
i
X
i
!
(|iic hi| ⊗ Ai (n))
= (c, |ii → Ai ) .
6.2 Semantic Functionals of Program Schemes
Let P = P [X1 , ..., Xm ] be a program scheme. We write C for the set of “coins” occuring in P . For each c ∈ C, let Hc be the state Hilbert space of quantum “coin” c. As
said in Section 3, the principal system of P is the composition of the systems denoted
by principal variables appearing in P . Let H be the state Hilbert space of the principal
system.
Definition 3 The semantic functional of program scheme P is a mapping
JP K : O(G(HC ) ⊗ H)m → O(G(HC ) ⊗ H).
For any operators A1 , ..., Am ∈ O(G(HC ) ⊗ H), JP K(A1 , ..., Am ) is inductively defined as follows:
P
1. If P = abort, then JP K(A1 , ..., AmN
) is the zero operator in A = n∈ωC A(n)
with A(n) = 0 (the zero operator in c∈C Hc⊗nc ⊗ H) for all n ∈ ω C ;
Quantum Recursion and Second Quantisation
19
P
2. If P = skip, then JP K(A1 , ..., Am ) is the
A = n∈ωC A(n)
Nidentity⊗noperator
with A(n) = I (the identity operator in c∈C Hc c ⊗ H) for all n ∈ ω C with
nc 6= 0 for every c ∈ C;
3. P
If P = U [c, q], then JP K(A1 , ..., Am ) is the cylindrical extension of U : A =
n∈ω C A(n) with A(n) = I1 ⊗ I2 (n) ⊗ U ⊗ I3 , where:
(a) I1 is the identity operator in the state Hilbert space of those “coins” that are
not in c;
N
⊗(n −1)
(b) I2 (n) is the identity operator in c∈c Hc c ; and
(c) I3 is the identity operator in the state Hilbert space of those principal variables
that are not in q for all n ≥ 1 ;
4. If P = Xj (1 ≤ j ≤ m), then JP K(A1 , ..., Am ) = Aj ;
5. If P = P1 ; P2 , then
JP K(A1 , ..., Am ) = JP2 K(A1 , ..., Am ) · JP1 K(A1 , ..., Am )
(see the defining equation (21) of product of operators in the free Fock space);
6. If P = qif [c](i · |ii → Pi ) fiq, then
JP K(A1 , ..., Am ) = (c, |ii → JPi K(A1 , ..., Am ))
(see the defining equation (22) of guarded composition of operators in the free Fock
space).
Whenever m = 0; that is, P contains no procedure identifiers, then the above definition degenerates to Definition 1.
The cartesian power O(G(HC ) ⊗ H)m is naturally equipped with the order ⊑ defined componently from the order in O(G(HC )⊗H): for any A1 , ..., Am , B1 , ..., Bm ∈
O(G(HC ) ⊗ H),
– (A1 , ..., Am ) ⊑ (B1 , ..., Bm ) if and only if for every 1 ≤ i ≤ m, Ai ⊑ Bi .
Then (O(G(HC ) ⊗ Hq )m , ⊑) is a CPO too. Furthermore, we have:
Theorem 1 (Continuity of Semantic Functionals) The semantic functional JP K : (O(G(HC )⊗
H)m , ⊑) → (O(G(HC ) ⊗ H), ⊑) is continuous.
Proof. It can be easily proved by induction on the structure of P using Lemma 2.
For each “coin” c ∈ C, we introduce the creation functional:
Kc : O(G(HC ) ⊗
P
H) → O(G(HC ) ⊗ H) defined as follows: for any A = n∈ωC A(n) ∈ O(G(HC ) ⊗
H),
X
(Ic ⊗ A(n))
Kc (A) =
n∈ω C
N
where Ic is the identity operator in Hc . We observe that A(n) is an operator in d∈C
N
⊗(n +1)
Hd⊗nd ⊗ H, whereas Ic ⊗ A(n) is an operator in Hc c
⊗ d∈C\{d} Hd⊗nd ⊗ H.
Intuitively, the creation functional Kc moves all copies of Hc one position to the right
so that ith copy becomes (i + 1)th copy for all i = 0, 1, 2, .... Thus, a new position is
created at the left end for a new copy of Hc . For other “coins” d, Kc does not move
20
Ying
any copy of Hd . It is clear that for any two “coins” c, d, Kc and Kd commute; that
is, Ka ◦ Kd = Kd ◦ Kc . Note that the set C of “coins” in P is finite. Suppose that
C = {c1 , c2 , ..., ck }. Then we can define the creation functional
KC = Kc1 ◦ Kc2 ◦ ... ◦ Kck .
For the special case where the set C of “coins” is empty, C is the identity functional;
that is, C(A) = A for all A.
Lemma 3 For each c ∈ C, the creation functionals Kc and KC : (O(G(HC ) ⊗ H),
⊑) → (O(G(HC ) ⊗ H), ⊑) are continuous.
Proof. Straightforward by definition.
Combining continuity of semantic functional and the creation functional (Theorem
1 and Lemma 3), we obtain:
Corollary 1 Let P = P [X1 , ..., Xm ] be a program scheme and C the set of “coins”
occurring in P . Then the functional:
m
Km
C ◦ JP K : (O(G(HC ) ⊗ H) , ⊑) → (O(G(HC ) ⊗ H), ⊑),
m
(KC ◦ JP K)(A1 , ..., Am ) = JP K(KC (A1 ), ..., KC (Am ))
for any A1 , ..., Am ∈ O(G(HC ) ⊗ H), is continuous.
6.3 Fixed Point Semantics
Now we are ready to define the denotational semantics of recursive programs using the
standard fixed point technique. Let us consider a recursive program P declared by the
system of recursive equations:
X1 ⇐ P1 ,
D:
(23)
......
Xm ⇐ Pm ,
where Pi = Pi [X1 , ..., Xm ] is a program scheme containing at most procedure identifiers X1 , ..., Xm for every 1 ≤ i ≤ m. The system D of recursive equations naturally
induces a semantic functional:
JDK : O(G(HC ) ⊗ H)m → O(G(HC ) ⊗ H)m ,
JDK(A1 , ..., Am ) = ((Km
C ◦ JP1 K)(A1 , ..., Am ), ...,
(Km
C ◦ JPm K)(A1 , ..., Am ))
(24)
for all A1 , ..., Am ∈ O(G(HC ) ⊗ H), where C is the set of “coins” appearing in D;
that is, in one of P1 , ..., Pm . It follows from Theorem 4.20 in [14] and Corollary 1
that JDK : (O(G(HC ) ⊗ H)m , ⊑) → (O(G(HC ) ⊗ H)m , ⊑) is continuous. Then the
Knaster-Tarski Fixed Point Theorem asserts that JDK has the least fixed point µJDK.
Quantum Recursion and Second Quantisation
21
Definition 4 The fixed point (denotational) semantics of the recursive program P declared by D is
JP Kf ix = JP K(µJDK);
that is, if µJDK = (A∗1 , ..., A∗m ) ∈ O(G(HC )⊗ H)m , then JP Kf ix = JP K(A∗1 , ..., A∗m )
(see Definition 3).
6.4 Syntactic Approximation
We now turn to consider the syntactic approximation technique for defining the semantics of recursive programs. As discussed at the end of Section 4 and further clarified
in Example 5, a problem that was not present in the classical case is that we have to
carefully avoid the conflict of quantum “coin” variables when defining the notion of
substitution. To overcome it, we assume that each “coin” variable c ∈ C has infinitely
many copies c0 , c1 , c2 , ... with c0 = c. The variables c1 , c2 , ... are used to represent a
sequence of particles that are all identical to the particle c0 = c. Then the notion of
program scheme defined in Section 3 will be used in a slightly broader way: a program
scheme may contain not only a “coin” c but also some of its copies c1 , c2 , .... If such a
generalised program scheme contains no procedure identifiers, then it is called a generalised program. With these assumptions, we can introduce the notion of substitution.
Definition 5 Let P = P [X1 , ..., Xm ] be a generalised program scheme that contains
at most procedure identifiers X1 , ..., Xm , and let Q1 , ..., Qm be generalised programs
without any procedure identifier. Then the simultaneous substitution P [Q1 /X1 , ..., Qm /
Xm ] of X1 , ..., Xm by Q1 , ..., Qm in P is inductively defined as follows:
1. If P = abort, skip or an unitary transformation, then P [Q1 /X1 , ..., Qm /Xm ] =
P;
2. If P = Xi (1 ≤ i ≤ m), then P [Q1 /X1 , ..., Qm /Xm ] = Qi ;
3. If P = P1 ; P2 , then
P [Q1 /X1 , ..., Qm /Xm ] = P1 [Q1 /X1 , ..., Qm /Xm ]; P2 [Q1 /X1 , ..., Qm /Xm ].
4. If P = qif [c](i · |ii → Pi ) fiq, then
P [Q1 /X1 , ..., Qm /Xm ] = qif [c](i · |ii → Pi′ ) fiq
where for every i, Pi′ is obtained through replacing the jth copy cj of c in Pi [Q1 /X1 ,
..., Qm /Xm ] by the (j + 1)th copy cj+1 of c for all j.
Note that in Clause 4 of the above definition, since P is a generalised program
scheme, the “coin” c may not be an original “coin” but some copy dk of an original
“coin” d ∈ C. In this case, the jth copy of c is actually the (k + j)th copy of d:
cj = (dk )j = dk+j for j ≥ −d.
The semantics of a generalised program P can be given using Definition 1 in the
way where a “coin” c and its copies c1 , c2 , ... are treated as distinct variables to each
other. For each “coin” c, let nc be the greatest index
N n such that the copy cn appears in
P . Then the semantics JP K of P is an operator in c∈C Hc⊗nc ⊗ H. Furthermore, it can
22
Ying
P
be identified with its cylindrical extension in O(G(HC ) ⊗ H): N m∈ωC (I(m) ⊗ JP K) ,
where for each m ∈ ω C , I(m) is the identity operator in c∈C Hc⊗mc . Based on
this observation, the semantics of substitution defined above is characterised by the
following:
Lemma 4 For any (generalised) program scheme P = P [X1 , ..., Xm ] and (generalised) programs Q1 , ..., Qm , we have:
JP [Q1 /X1 , ..., Qm /Xm ]K = (Km
C ◦ JP K)(JQ1 K, ..., JQm K)
= JP K(KC (JQ1 K), ..., KC (JQm K)),
where KC is the creation functional with C being the set of “coins” in P .
Proof. We prove the lemma by induction on the structure of P .
Case 1. P = abort, skip or an unitary transformation. Obvious.
Case 2. P = Xj (1 ≤ j ≤ m). Then P [Q1 /X1 , ..., Qm /Xm ] = Qm . On the other
hand, since the set of “coins” in P is empty, KC (JQi K) = JQi K for all 1 ≤ i ≤ m.
Thus, by clause 4 of Definition 3 we obtain:
JP [Q1 /X1 ,..., Qm /Xm ]K = JQm K
= JP K(JQ1 K, ..., JQm K) = JP K(KC (JQ1 K), ..., KC (JQm K)).
Case 3. P = P1 ; P2 . Then by clause 3 of Definition 1, clause 5 of Definition 3 and
the induction hypothesis, we have:
JP [Q1 /X1 ,..., Qm /Xm ]K = JP1 [Q1 /X1 , ..., Qm /Xm ]; P2 [Q1 /X1 , ..., Qm /Xm ]K
= JP2 [Q1 /X1 , ..., Qm /Xm ]K · JP1 [Q1 /X1 , ..., Qm /Xm ]K
= JP2 K(KC (JQ1 K), ..., KC (JQm K)) · JP1 K(KC (JQ1 K), ..., KC (JQm K))
= JP1 ; P2 K(KC (JQ1 K), ..., KC (JQm K))
= JP K(KC (JQ1 K), ..., KC (JQm K)).
Case 4. P = qif [c](i · |ii → Pi ) fiq. Then
P [Q1 /X1 , ..., Qm /Xm ] = qif [c](i · |ii → Pi′ ) fiq,
where Pi′ is obtained according to clause 4 of Definition 5. For each i, by the induction
hypothesis we obtain:
JPi [Q1 /X1 , ..., Qm /Xm ]K = JPi K(KC\{c} (JQ1 K), ..., KC\{c} (JQm K))
because the “coin” c does not appear in Pi′ . Furthermore, it follows that
JPi′ K = Kc (JPi [Q1 /X1 , ..., Qm /Xm ]K)
= Kc (JPi K(KC\{c} (JQ1 K), ..., KC\{c} (JQm K)))
= JPi K((Kc ◦ KC\{c} )(JQ1 K), ..., (Kc ◦ KC\{c} )(JQm K))
= JPi K(KC (JQ1 K), ..., KC (JQm K)).
Quantum Recursion and Second Quantisation
23
Therefore, by clause 4 of Definition 1, clause 6 of Definition 3 and equation (22), we
have:
X
JP [Q1 /X1 , ..., Qm /Xm ]K =
(|iihi| ⊗ JPi′ K)
i
= (c, |ii → JPi K(KC (JQ1 K), ..., KC (JQm K))
= JP K(KC (JQ1 K), ..., KC (JQm K)).
The notion of syntactic approximation can be defined based on Definition 5.
Definition 6 1. Let X1 , ..., Xm be procedure identifiers declared by the system D of
recursive equations (23). Then for each 1 ≤ k ≤ m, the nth syntactic approxima(n)
tion Xk of Xk is inductively defined as follows:
(
(0)
Xk = abort,
(n+1)
(n)
(n)
Xk
= Pk [X1 /X1 , ..., Xm /Xm ] for n ≥ 0.
2. Let P = P [X1 , ..., Xm ] be a recursive program declared by the system D of equations (23). Then for each n ≥ 0, its nth syntactic approximation P (n) is inductively
defined as follows:
(
P (0) = abort,
(n)
(n)
P (n+1) = P [X1 /X1 , ..., Xm /Xm ] for n ≥ 0.
Syntactic approximation actually gives an operational semantics of quantum recursive programs. As in the theory of classical programming, substitution represents an
application of the so-called copy rule - at runtime a procedure call is treated like the
procedure body inserted at the place of call (see, for example, [13]). Of course, sim(n)
plification may happen within Xk by operations of linear operators; for example,
C[q1 , q2 ]; X[q2 ]; C[q1 , q2 ] can be replaced by X[q2 ], where q1 , q2 are principal system
variables, C is the CNOT gate and X is the NOT gate. To simplify the presentation, we
choose not to explicitly describe simplification.
The major difference between the classical case and the quantum case is that in
the latter we need to continuously introduce new “coin” variables to avoid variable
conflict when we unfold a quantum recursive program using its syntactic approximations: for each n ≥ 0, a new copy of each “coin” in Pk is created in the substitu(n+1)
(n)
(n)
tion Xk
= P [X1 /X1 , ..., Xm /Xm ] (see Clause 4 of Definition 5). Thus, a
quantum recursive program should be understood as a quantum system with variable
particle number and described in the second quantisation formalism. Note that for all
(n)
1 ≤ k ≤ m and n ≥ 0, the syntactic approximation Xk is a generalised program con(n)
taining no procedure identifiers. Thus, its semantics JXk K can be given by a slightly
extended version of Definition 1: a “coin”c and its copies c1 , c2 , ... are allowed to appear in the same (generalised) program and they are considered as distinct variables.
As before, the principal system is the composite system of the subsystems denoted by
principal variables appearing in P1 , ..., Pm and its state Hilbert space is denoted by H.
24
Ying
Assume that C is the set of “coin” variables appearing in P1 , ..., Pm . For each c ∈ C,
we write Hc for the state Hilbert space of quantum “coin” c. Then it is easy to see
Ln
N
(n)
⊗n
that JXk K is an operator in j=0 HC
⊗ H , where HC = c∈C Hc . So, we can
(n)
imagine that JXk K ∈ O(G(HC ) ⊗ H). Furthermore, we have:
(n)
Lemma 5 For each 1 ≤ k ≤ m, {JXk K}∞
n=0 is an increasing chain and thus
(∞)
JXk
(n)
△
K = lim JXk K =
n→∞
∞
G
(n)
JXk K
(25)
n=0
exists in (O(G(HC ) ⊗ H), ⊑).
(n)
(n+1)
Proof. We show that JXk K ⊑ JXk
K by induction on n. The case of n = 0 is
(0)
trivial because JXk K = JabortK = 0. In general, by the induction hypothesis on
n − 1 and Corollary 1, we have:
(n)
(n−1)
JXk K = JPk K(KC (JX1
(n−1)
K))
K), ..., KC (JXm
(n)
(n+1)
(n)
⊑ JPk K(KC (JX1 K), ..., KC (JXm
K)) = JXk
K,
where C is the set of “coins” in D. Then existence of the least upper bound (25) follows
immediately from Lemma 1.
Definition 7 Let P be a recursive program declared by the system D of equations (23).
Then its operational semantics is
(∞)
JP Kop = JP K(JX1
(∞)
K, ..., JXm
K).
The operational semantics of recursive program P can be characterised by the limit
of its syntactic approximations (with respect to its declaration D).
Proposition 1 JP Kop =
F∞
n=0 JP
(n)
K.
Proof. It follows from Lemma 4 that
∞
G
JP (n) K =
n=0
=
=
∞
G
JP (n) K
n=0
∞
G
(n)
(n)
JP [X1 /X1 , ..., Xm
/Xm ]K
n=0
∞
G
(n)
(n)
JP K(KC (JX1 K), ..., KC (JXm
K))
n=0
where KC is the creation functional with respect to the “coins” C in P . However, all
(n)
(n)
the “coins” C in P do not appear in X1 , ..., Xm (see the condition in Definition 2.2).
Quantum Recursion and Second Quantisation
(n)
25
(n)
So, KC (JXk K) = JXk K for every 1 ≤ k ≤ m, and by Theorem 1 we obtain:
∞
G
JP (n) K =
n=0
∞
G
(n)
(n)
JP K(JX1 K, ..., JXm
K)
n=0
∞
G
= JP K
(n)
JX1 K, ...,
n=0
∞
G
!
(n)
JXm
K
n=0
∞
= JP K(JX1∞ K, ..., JXm
K) = JP Kop .
The equivalence between denotational and operational semantics of recursive programs is established in the following:
Theorem 2 (Equivalence of Denotational Semantics and Operational Semantics) For
any recursive program P , we have JP Kf ix = JP Kop .
(∞)
(∞)
Proof. By Definitions 4 and 7, it suffices to show that (JX1 K, ..., JXm K) is the
least fixed point of semantic functional JDK, where D is the declaration of procedure
identifiers in P . With Theorem 1 and Lemmas 3 and 4, we obtain:
(∞)
JXk K
=
∞
G
(n)
JXk K
n=0
=
=
∞
G
n=0
∞
G
(n)
(n)
/Xm ]K
JPk [X1 /X1 , ..., Xm
(n)
(n)
JPk K(KC (JX1 K), ..., KC (JXm
K))
n=0
=
=
∞
G
∞
G
(n)
(n)
JPk K KC
JX1 K , ..., KC
JXm
K
n=0
n=0
(∞)
(∞)
JPk K(KC (JX1 K), ..., KC (JXm
K))
!
!!
(∞)
(∞)
for every 1 ≤ k ≤ m, where C is the set of “coins” in D. So, (JX1 K, ..., JXm K)
is a fixed point of JDK. On the other hand, if (A1 , ..., Am ) ∈ O(G(HC ) ⊗ H)m is a
(n)
(n)
fixed point of JDK, then we can prove that for every n ≥ 0, (JX1 K, ..., JXm K) ⊑
(A1 , ..., Am ) by induction on n. Indeed, the case of n = 0 is obvious. In general, using
the induction hypothesis on n − 1, Corollary 1 and Lemma 4 we obtain:
(A1 , ..., Am ) = JDK(A1 , ..., Am )
m
= ((Km
C ◦ JP1 K)(A1 , ..., Am ), ..., (KC ◦ JPm K)(A1 , ..., Am ))
(n−1)
⊒ ((Km
C ◦ JP1 K)(JX1
(n)
(n)
= (JX1 K, ..., JXm
K).
(n−1)
(n−1)
K, ..., JXm
K), ..., (Km
C ◦ JPm K)(JX1
(n−1)
K, ..., JXm
K))
Therefore, it holds that
(∞)
(∞)
(JX1 K, ..., JXm
K)
=
∞
G
(n)
(n)
(JX1 K, ..., JXm
K) ⊑ (A1 , ..., Am ),
n=0
(∞)
and (JX1
(∞)
K, ..., JXm K) is the least fixed point of JDK.
26
Ying
In light of this theorem, we will simply write JP K for both the denotational (fixed
point) and operational semantics of a recursive program P . But we should carefully distinguish the semantics JP K ∈ O(G(HC )⊗H) of a recursive program P = P [X1 , ..., Xm ]
declared by a system of recursive equations about X1 , ..., Xm from the semantic functional JP K : O(G(HC )⊗H)m → O(G(HC )⊗H) of program scheme P = P [X1 , ..., Xm ].
Usually, such a difference can be recognised from the context.
6.5 Examples
Now let us reconsider the recursive quantum walks defined in Section 4.
Example 5 (Unidirectionally recursive Hadamard walk) The semantics of the nth approximation of the unidirectionally recursive Hadamard walk specified by equation (9)
is
i−1
n−1
O
X
(26)
|Ridj hR| ⊗ |Lidi hL| H(i) ⊗ TL TRi
JX (n) K =
i=0
j=0
where d0 = d, H(i) is the operator in Hd⊗i defined from the Hadamard operator H
by equation (20). This can be easily shown by induction on n, starting from the first
three approximations displayed in equation (16). Therefore, the semantics of the unidirectionally recursive Hadamard walk is the operator:
JXK = lim JX (n) K
n→∞
∞
i−1
X
O
|Ridj hR| ⊗ |Lidi hL| H(i) ⊗ TL TRi
=
i=0
j=0
(27)
∞
i−1
X
O
=
|Ridj hR| ⊗ |Lidi hL| ⊗ TL TRi (H ⊗ I)
i=0
j=0
in F (Hd ) ⊗ Hp , where Hd = span{L, R}, Hp = span{|ni : n ∈ Z}, I is the
identity
P operator in the position Hilbert space Hp , H(i) is as in equation (26), and
H= ∞
i=0 H(i) is the extension of H in the free Fock space F (Hd ) over the direction
Hilbert space Hd .
Example 6 (Bidirectionally recursive Hadamard walk) Let us consider the semantics
of the bidirectionally recursive Hadamard walk declared by equation (11). For any
string Σ = σ0 σ1 ...σn−1 of L and R, its dual is defined to be Σ = σ0 σ1 ...σn−1 , where
L = R and R = L. Moreover, we write |Σi = |σ0 id0 ⊗ |σ1 id1 ⊗ ... ⊗ |σn−1 idn−1 ,
TΣ = Tσn−1 ...Tσ1 Tσ0 and
ρΣ = |ΣihΣ| =
n−1
O
j=0
|σj idj hσj |.
Quantum Recursion and Second Quantisation
Then the semantics of procedures X and Y are
"∞
#
X
JXK =
(ρΣn ⊗ Tn ) (H ⊗ Ip ) ,
JY K =
n=0
∞
X
"
n=0
#
′
ρΣ n ⊗ T n
where H is as in Example 5, and
(
27
(28)
(H ⊗ Ip ) ,
(RL)k L
if n = 2k + 1,
k
(RL) RR if n = 2k + 2,
(
TL if n is odd,
Tn = TΣn =
TR2 if n is even,
(
TR if n is odd,
′
Tn = TΣn =
TL2 if n is even.
Σn =
It is clear from equations (27) and (28) that the behaviours of unidirectionally and
bidirectionally recursive Hadamard walks are very different: the unidirectionally one
can go to any one of the positions −1, 0, 1, 2, ..., but the bidirectionally walk X can
only go to the positions −1 and 2, and Y can only go to the positions 1 and −2.
7 Recovering Symmetry and Antisymmetry
The solutions of recursive equations found in the free Fock space using the techniques
developed in the last section cannot directly apply to the symmetric Fock space for
bosons or the antisymmetric Fock space for fermions because they may not preserve
symmetry. In this section, we consider symmetrisation of these solutions of recursive
equations.
7.1 Symmetrisation Functional
We first examine the domain of symmetric operators in the Fock spaces used in defining
semantics of recursive programs. As in Subsection 6.1, let H be the state Hilbert space
of the principal system and C the set of “coins”, and
!
M O
F (Hc ) ⊗ H ,
G(HC ) ⊗ H =
n∈ω C
c∈C
where ω is the set of nonnegative integers, and for each c ∈ C, F (Hc )P
is the free Fock
space over the state Hilbert space Hc of “coin” c. For any operator A = n∈ωC A(n) ∈
O(G(HC ) ⊗ H), we say that A is symmetric if for each n ∈ ω c , for each c ∈ C and
for each permutation π of 0, 1, ..., nc − 1, Pπ and A(n) commute; that is,
Pπ A(n) = A(n)Pπ .
28
Ying
(Note that in the above
Pπ actually stands for its cylindrical extension Pπ ⊗
N equation
N
⊗nd
H
⊗ H, where Id is the identity operator in Hd for every
I
⊗
I
in
d∈C
d
d∈C\{c} d
d ∈ C \ {c}, and I is the identity operator in H.) We write SO(G(HC ) ⊗ H) for the
set of symmetric operators A ∈ O(G(HC ) ⊗ H).
Lemma 6 (SO(G(HC ) ⊗ H), ⊑) as a sub-partial order of (O(G(HC ) ⊗ H), ⊑) is
complete.
Proof. It suffices to observe that symmetry of operators is preserved
F by the least upper
bound in (O(G(HC ) ⊗ H), ⊑) ; that is, if Ai is symmetric, so is i Ai , as constructed
in the proof of Lemma 1.
Now we generalise the symmetrisation functional defined by equations (18) and
(19) into the space G(HC ) N
⊗ H). For each n ∈ ω C , the symmetrisation functional S
over operators in the space c∈C Hc⊗nc ⊗ H is defined by
Y 1 X
·
S(A) =
nc !
c∈C
{πc }
"
Y
c∈C
Pπc
!
A
Y
Pπ−1
c
c∈C
!#
N
for every operator A in c∈C Hc⊗nc ⊗ H, where {πc } traverses over all C−indexed
families with πc being a permutation of 0, 1, ..., nc − 1 for every c ∈ C. This symmetrisation functional can be extended to O(G(HC ) ⊗ H) in a natural way:
S(A) =
X
S(A(n))
n∈ω C
P
for any A = n∈ωC A(n) ∈ O(G(HC ) ⊗ H). Obviously, S(A) ∈ SO(G(HC ) ⊗ H).
Furthermore, we have:
Lemma 7 The symmetrisation functional S : (O(G(HC ) ⊗ H), ⊑) → (SO(G(HC ) ⊗
H), ⊑) is continuous.
F
F
Proof. What we need to prove is that SF
( i Ai ) = i S(Ai ) for any chain {Ai } in
(O(G(HC )P
⊗ H), ⊑). Assume that A
P= i Ai . Then by the proof of Lemma 1, we can
write A = n∈ω A(n) and Ai = n∈Ωi A(n) for some Ωi with supi Ωi = ω C . So,
it holds that
G X
G
X
S(Ai ) =
S(A(n)) =
S(A(n)) = S(A).
i
i n∈Ωi
n∈ω C
7.2 Symmetrisation of the Semantics of Recursive Programs
Now we are ready to present the semantics of recursive programs in the symmetric or
antisymmetric Fock space.
Quantum Recursion and Second Quantisation
29
Definition 8 Let P = P [X1 , ..., Xm ] be a recursive program declared by the system D
of recursive equations (23). Then its symmetric semantics JP Ksym is the symmetrisation
of its semantics JP K in the free Fock space:
JP Ksym = S(JP K)
where JP K = JP Kf ix = JP Kop ∈ O(G(HC ) ⊗ K) (see Theorem 2), C is the set of
“coins” in D, and H is the state Hilbert space of the principal system of D.
As a symmetrisation of Proposition 1, we have:
F∞
Proposition 2 JP Ksym = n=0 S(JP (n) K).
Proof. It follows from Proposition 1 and Lemma 7 (continuity of the symmetrisation
functional) that
!
∞
∞
G
G
(n)
JP Ksym = S(JP K) = S
JP K =
S(JP (n) K).
n=0
n=0
Again, let us consider the examples of recursive Hadamard walks.
Example 7 (Continuation of Example 5) For each i ≥ 0, we have:
i−1
i−1
O
X
O
1
S
|Ridj hR| ⊗ |Lidi hL| =
|Ridj hR| ⊗ |Lidi hL| Pπ−1
Pπ
(i
+
1)!
π
j=0
j=0
(where π traverses over all permutations of 0, 1, ..., i)
=
△
1
i+1
i
X
j=0
|Rid0 hR| ⊗ ... ⊗ |Ridj−1 hR| ⊗ |Lidj hL| ⊗ |Ridj+1 hR| ⊗ ... ⊗ |Ridi hR|
= Gi .
Therefore, the symmetric semantics of the unidirectionally recursive Hadamard walk
defined by equation (9) is
!
∞
X
Gi ⊗ TL TRi (H ⊗ I).
S(JXK) =
i=0
Example 8 (Continuation of Example 6) The symmetric semantics of the bidirectionally recursive Hadamard walk specified by equaltion (11) is:
"∞
#
X
JXK =
(γn ⊗ Tn ) (H ⊗ Ip ) ,
JY K =
"
n=0
∞
X
#
(δn ⊗ Tn ) (H ⊗ Ip )
n=0
30
Ying
where:
γ2k+1 =
X
1
ρΓ ,
k
Γ
2k + 1
δ2k+1 =
X
1
ρ∆
k
∆
2k + 1
with Γ ranging over all strings of (k + 1) L’s and k R’s and ∆ ranging over all strings
of k L’s and (k + 1) R’s, and
γ2k+2 =
X
1
ρΓ ,
k
Γ
2k + 2
σ2k+2 =
X
1
ρ∆
k
∆
2k + 2
with Γ ranging over all strings of k L’s and (k + 2) R’s and ∆ ranging over all strings
of (k + 2) L’s and k R’s.
7.3 Principal System Semantics of Quantum Recursion
Let P be a recursive program with H being the state Hilbert space of its principal
variables and C being the set of its “coins”. We consder the computation
of P with input
N
|ψi ∈ H. Assume that the “coins” are initialised in state |Ψ i ∈ c∈C Fvc (Hc ), where
for each c ∈ C, Hc is the state Hilbert space of “coin” c, Fvc (Hc ) is the symmetric or
antisymmetric Fock space over Hc , and vc = + or − if “coin” c is implemented by a
boson or a fermion, respectively. Then the computation of the program starts in state
|Ψ i|ψi. What actually concerns us is the output in the principal system. This observation
leads to the following:
N
Definition 9 Given a state |Ψ i ∈ c∈C Fvc (Hc ). The principal system semantics of
program P with respect to “coin” initialisation |Ψ i is the mapping JP, Ψ K from pure
states in H to partial density operators [18], i.e. positive operators with trace ≤ 1, in
H:
JP, Ψ K(|ψi) = trNc∈C Fvc (Hc ) (|ΦihΦ|)
for each pure state |ψi in H, where
|Φi = JP Ksym (|Ψ i ⊗ |ψi),
JP K
is the symmetric semantics of P , and trNc∈C Fvc (Hc ) is the partial trace over
N sym
c∈C Fvc (Hc ) (see [16], Section 2.4.3).
Example 9 (Continuation of Example 6) We consider the bidirectionally recursive Hadamard
walk declared by equation (11) once again and suppose that it starts from the position
0.
1. If the “coins” are bosons initialised in state
|Ψ i = |L, L, ..., Li+ = |Lid0 ⊗ |Lid1 ⊗ ... ⊗ |Lidn−1 ,
Quantum Recursion and Second Quantisation
31
then we have
P
1
Γ |Γ i ⊗ | − 1i if n = 2k + 1,
k
√
n
2 2k + 1
P
JXKsym (|Ψ i ⊗ |0i) =
1
if n = 2k + 2,
∆ |∆i ⊗ |2i
√
k
2n
2k + 2
where Γ traverses over all strings of (k + 1) L’s and k R’s, and ∆ traverses over
all strings of k L’s and (k + 2) R’s. Therefore, the principal system semantics with
the “coin” initialisation |Ψ i is:
JX, Ψ K(|0i) =
(
1
2n | − 1ih−1|
1
2n |2ih2|
if n is odd,
if n is even.
2. Recall from [8] that for each single-particle state |ψi in Hd , the corresponding
coherent state of bosons in the symmetric Fock space F+ (Hd ) over Hd is defined
as
X
∞
1
[a† (ψ)]n
|ψicoh = exp − hψ|ψi
|0i
2
n!
n=0
where |0i is the vacuum state and a† (·) the creation operator. If the “coins” are
initialised in the coherent state |Licoh of bosons corresponding to |Li, then we
have:
∞
X
1
1 X
|Γk i
JXKsym (|Licoh ⊗ |0i) = √
⊗ | − 1i
√
e
k
Γk
k=0
22k+1
2k + 1
∞
1 X
1
+√
√
e
k=0
22k+2
k
2k + 2
X
∆k
|∆k i
⊗ |2i,
where Γk ranges over all strings of (k + 1) L’s and k R’s, and ∆k ranges over all
strings of k L’s and (k + 2) R’s. So, the principal system semantics with “coin”
initialisation |Licoh is:
1
JX, Lcoh K(|0i) = √
e
1
= √
e
∞
X
k=0
1
22k+1
| − 1ih−1| +
∞
X
k=0
2
1
| − 1ih−1| + |2ih2| .
3
3
1
22k+2
|2ih2|
!
32
Ying
8 Quantum Loop
In this section, we consider a special class of quantum recursions. Arguably, while-loop
is the simplest and most popular form of recursion used in programming languages. In
classical programming, the while-loop
while b do S od
can be seen as the program X declared by the recursive equation:
X ⇐ if b then X else skip fi
(29)
We can define a kind of quantum while-loop by using quantum case statement and
quantum choice in the place of classical case statement if ...then...else fi in equation
(29).
Example 10 (Quantum while-loop)
1. The first form of quantum while-loop:
qwhile [c] = |1i do U [q] od
(30)
is defined to be the recursive program X declared by
X ⇐ qif [c] |0i → skip
|1i → U [q]; X
(31)
fiq
where c is a quantum “coin” variable denoting a qubit, q is a principal quantum
variable, and U is a unitary operator in the state Hilbert space Hq of system q.
2. The second form of quantum while-loop
qwhile V [c] = |1i do U [q] od
(32)
is defined to be the recursive program X declared by
X ⇐ skip ⊕V [c] (U [q]; X)
≡ V [c]; qif [c] |0i → skip
fiq
|1i → U [q]; X
(33)
Note that the recursive equation (33) is obtained by replacing the quantum case
statement qif ...fiq in equation (31) by the quantum choice ⊕V [c] .
3. Actually, quantum loops (30) and (32) are not very interesting because there is not
any interaction between the quantum “coin” and the principal quantum system q
in them. This situation is corresponding to the trivial case of classical loop (29)
where the loop guard b is irrelevant to the loop body S. The classical loop (29)
becomes truly interesting only when the loop guard b and the loop body S share
Quantum Recursion and Second Quantisation
33
some program variables. Likewise, a much more interesting form of quantum whileloop is
qwhile W [c; q] = |1i do U [q] od
(34)
which is defined to be the program X declared by the recursive equation
X ⇐ W [c, q]; qif [c] |0i → skip
|1i → U [q]; X
fiq
where W is a unitary operator in the state Hilbert space Hc ⊗ Hq of the composed system of the quantum “coin” c and the principal system q. The operator
W describes the interaction between the “coin” c and the principal system q. It
is obvious that the loop (34) degenerates to the loop (32) whenever W = V ⊗ I,
where I is the identity operator in Hq . The semantics of the loop (34) in the free
Fock space is the operator:
JXK =
∞
X
k=1
(|1ic0 h1| ⊗ (|1ic1 h1| ⊗ ...(|1ick−2 h1| ⊗ (|0ick−1 h0| ⊗ U k−1 [q])
W [ck−1 , q])W [ck−2 , q]...)W [c1 , q])W [c0 , q]
∞
k−1
k−2
X
Y
O
W [cj , q] .
=
|1icj h1| ⊗ |0ick−1 h0| ⊗ U k−1 [q]
k=1
j=0
j=0
Furthermore, the symmetric semantics of the loop is:
∞
k−1
X
Y
A(k) ⊗ U k−1 [q]
W [cj , q] ,
JXKsym =
k=1
j=0
where:
A(k) =
k−1
1X
|1ic0 h1| ⊗ ... ⊗ |1icj−1 h1| ⊗ |0icj h0| ⊗ |1icj+1 h1| ⊗ ... ⊗ |1ick−1 h1|.
k j=0
9 Conclusion
In this paper, we introduced the notion of quantum recursion based on quantum case
statement and quantum choice defined in [21], [22]. Recursive quantum walks and
quantum while-loops were presented as examples of quantum recursion. The denotational and operational semantics of quantum recursion were defined by using second
quantisation, and they were proved to be equivalent. But we are still at the very beginning of the studies of quantum recursion, and a series of problems are left unsolved:
– First of all, it is not well understood what kind of computational problems can be
solved more conveniently by using quantum recursion.
34
Ying
– Second, how to build a Floyd-Hoare logic for quantum while-loops defined in Example 10? Blute, Panangaden and Seely [6] observed that Fock space can serve as a
model of linear logic with exponential types. Perhaps, such a program logic can be
established through combining linear logic with the techniques developed in [19].
– Another important open question is: what kind of physical systems can be used to
implement quantum recursion where new “coins” must be continuously created?
– Finally, we even do not fully understand how does a quantum recursion use its
“coins” in its computational process. In the definition of the principal system semantics of a recursive program (Definition 9), a state |Ψ i in the Fock space of
“coins” is given a priori. This means that the states of a “coin” and its copies are
given once for all. Another possibility is that the states of the copies of a “coin” are
created step by step, as shown in the following:
Example 11 Consider the recursive program X declared by
X ⇐ a†c (|0i); Ry [c, p]; qif [c] |0i → skip
|1i → TR [p]; X
fiq
where c is a “coin” variable with state space Hc = span{|0i, |1i}, the variable p
and operator TR are as in the Hadamard walk,
Ry [c, p] =
∞ h
i
π
X
Ry n+1 ⊗ |nip hn|
2
n=0
and Ry (θ) is the rotation of a qubit about the y−axis in the Bloch sphere. Intuitively, Ry [c, p] is a controlled rotation where position of p is used to determine the
rotated angle. It is worth noting that this program X is a quantum loop defined
in equation (34) but modified by adding a creation operator at the beginning. Its
initial behaviour starting at position 0 with the “coin” c being in the vacuum state
|0i is visualised by the following transitions:
a†d (|0i)
Rx [d,p] 1
|0i|0ip −→
|0i|0ip −→ √ (|0i + |1i) |0ip
2
qif ...fiq 1
−→ √ [(E, |0i|0ip ) + (X, |1i|1ip )] .
2
The first configuration at the end of the above equation terminates, but the second
continues the computation as follows:
a† (|0i)
Rx [d,p]
d
|1i|1ip −→
|0, 1iv |0ip −→ · · · .
It is clear from the above example that the computation of a recursive program
with the creation operator is very different from that without it. A careful study of
quantum recursions that allows the creation operator appear in their syntax will be
carried out in another paper.
Quantum Recursion and Second Quantisation
35
Acknowledgement
I’m very grateful to Professor Prakash Panangaden for teaching me the second quantisation method during his visit at the University of Technology, Sydney in 2013. The
first version of this paper is the text of the third part of my talk “Quantum programming:
from superposition of data to superposition of programs” at the Tsinghua Software Day,
April 21-22, 2014 (see: http://sts.thss.tsinghua.edu.cn/tsd2014/home.html. The first part
of the talk is based on [19], and the second part is based on [22]). I’m also grateful to
Professors Jean-Pierre Jouannaud and Ming Gu for inviting me.
References
1. D. Aharonov, A. Ambainis, J. Kempe and U. Vazirani, U, Quantum walks on graphs, In:
Proceedings of the 33rd ACM Symposium on Theory of Computing (STOC), 2001, pp. 5059.
2. A. Ambainis, E. Bach, A. Nayak, A. Vishwanath and J. Watrous, One-dimensional quantum
walks, In: Proceedings of the 33rd ACM Symposium on Theory of Computing (STOC), 2001,
pp. 37-49.
3. T. Altenkirch and J. Grattage, A functional quantum programming language, In: Proceedings
of the 20th Annual IEEE Symposium on Logic in Computer Science (LICS), 2005, pp.249258.
4. K. R. Apt, F. S. de Boer and E. -R. Olderog, Verification of Sequential and Concurrent
Programs, Springer, London, 2009.
5. S. Attal, Fock spaces, http://math.univ-lyon1.fr/∼attal/Mescours/fock.pdf
6. R. F. Blute, P. Panangaden and R. A. G. Seely, Holomorphic models of exponential types
in linear logic, In: Proceedings of the 9th Conference on Mathematical Foundations of Programming Semantics (MFPS), Springer LNCS 802, 1994, pp. 474-512.
7. G. Chiribella, G. M. D’Ariano, P. Perinotti and B. Valiron, Quantum computations without
definite causal structure, Physical Review A 88 (2013), art. no. 022318.
8. Ph. A. Martin and F. Rothen, Many-Body Problems and Quantum Field Theory: An Introduction, Springer, Berlin, 2004.
9. E. W. Dijkstra, Guarded commands, nondeterminacy and formal derivation of programs,
Communications of the ACM 18 (1975), 453-457.
10. K. Etessami and M. Yannakakis, Recursive Markov chains, stochastic grammars, and monotone systems of nonlinear equations, Journal of the ACM 56 (2009), art. no. 1.
11. Y. Feng, N. K. Yu and M. S. Ying, Reachability analysis of recursive quantum Markov chains,
In: Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS), Springer LNCS 8087, 2013, pp. 385-396.
12. N. Friis, V. Dunjko, W. Dür and H. J. Briegel, Implementing quantum control for unknown
subroutines, Physical Review A 89 (2014), art. no. 030303.
13. C. A. R. Hoare, Procedures and parameters: an axiomatic approach, In: Symposium on Semantics of Algorithmic Languages, Springer Lecture Notes in Mathematics 188, 1971, pp
102-116.
14. J. Loeckx and K. Sieber, The Foundations of Program Verification (second edition), John
Wiley & Sons, Chichester, 1987.
15. A. McIver and C. Morgan, Abstraction, Refinement and Proof for Probabilistic Systems,
Springer, New York, 2005.
16. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2000.
36
Ying
17. J. W. Sanders and P. Zuliani, Quantum programming, In: Proceedings of Mathematics of
Program Construction 2000, Springer LNCS 1837, 2000, pp. 88-99.
18. P. Selinger, Towards a quantum programming language, Mathematical Structures in Computer Science 14 (2004), 527-586.
19. M. S. Ying, Floyd-Hoare logic for quantum programs, ACM Transactions on Programming
Languages and Systems 39 (2011), art. no. 19.
20. M. S. Ying and Y. Feng, Quantum loop programs, Acta Informatica 47 (2010), 221-250.
21. M. S. Ying, N. K. Yu and Y. Feng, Defining quantum control flow, arXiv:1209.4379,
http://xxx.lanl.gov/abs/1209.4379.
22. M. S. Ying, N. K. Yu and Y. Feng, Quantum alternation: from superposition of data to superposition of programs, arXiv:1402.5172, http://xxx.lanl.gov/abs/1402.5172.
23. X. -Q. Zhou, T. C. Ralph, P. Kalasuwan, M. Zhang, A. Peruzzo, B. P. Lanyon and J. L.
O’Brien, Adding control to arbitrary unknown quantum operations, Nature Communications 2 (2011), art. no. 413.
24. P. Zuliani, Quantum Programming, D.Phil. Thesis, University of Oxford, 2001.
| 6cs.PL
|
Resumptions, Weak Bisimilarity and Big-Step Semantics for
While with Interactive I/O:
An Exercise in Mixed Induction-Coinduction
Keiko Nakata and Tarmo Uustalu
Institute of Cybernetics at Tallinn University of Technology, Akadeemia tee 21, EE-12618 Tallinn, Estonia
{keiko|tarmo}@cs.ioc.ee
We look at the operational semantics of languages with interactive I/O through the glasses of constructive type theory. Following on from our earlier work on coinductive trace-based semantics
for While [17], we define several big-step semantics for While with interactive I/O, based on resumptions and termination-sensitive weak bisimilarity. These require nesting inductive definitions
in coinductive definitions, which is interesting both mathematically and from the point-of-view of
implementation in a proof assistant.
After first defining a basic semantics of statements in terms of resumptions with explicit internal
actions (delays), we introduce a semantics in terms of delay-free resumptions that essentially removes
finite sequences of delays on the fly from those resumptions that are responsive. Finally, we also look
at a semantics in terms of delay-free resumptions supplemented with a silent divergence option. This
semantics hinges on decisions between convergence and divergence and is only equivalent to the
basic one classically. We have fully formalized our development in Coq.
1
Introduction
Interactive programs are those programs that take inputs, do some computation, output results, and iterate
this cycle possibly infinitely. Operating systems and data base systems are typical examples. They are
important programs and have attracted formal study to guarantee their correctness/safety. For instance,
a web application should protect confidentiality of the data it processes in interaction with possibly
untrusted agents, and a certified compiler should preserve input/output behavior of the source program
in the compiled code. These works call for formal semantics of interactive programs.
Continuing our previous work [17] on a trace-based coinductive big-step semantics for potentially
nonterminating programs, we present a constructive account of interactive input-output resumptions1 ,
their important properties, such as weak bisimilarity and responsiveness (a program always eventually
performs input or output unless it terminates) and big-step semantics of reactive programs. We devise
both constructive-style and classical-style concepts and identify their relationships. Classical-style concepts rely on upfront decisions of whether a computation is going to terminate, make an observable
action, i.e., perform input or output, or silently diverge. The problem is generally undecidable. Hence,
classical-style concepts tend to be too strong for constructive reasoning.
Our operational semantics are resumption-based. A resumption is roughly a tree representing possible runs of a program. The tree branches on inputs, each edge corresponding to each possible input,
and has infinitely deep paths if the program may diverge. We begin the paper by formalizing important
properties of resumptions, among which (termination-sensitive) weak bisimilarity is the most interesting
1 The word ‘resumption’ is sometimes reserved for denotations of parallel threads. We apply it more liberally to datastructures recording evolution in small steps. This usage dates back to Plotkin [20] and was reinforced by Cenciarelli and Moggi [5].
L. Aceto, P. Sobociński (Eds.): Seventh Workshop on
Structural Operational Semantics 2010 (SOS ’10)
EPTCS 32, 2010, pp. 57–75, doi:10.4204/EPTCS.32.5
58
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
one technically, requiring nesting of induction into coinduction. We give a constructive-style formulation of weak bisimilarity and relate it to the classical-style version adapted from previous work [13, 3].
We then present three big-step semantics for interactive While, i.e., While extended with input/output
statements: a basic semantics which explicitly deals with internal actions (delay steps) and assigns a
resumption for all configurations (statement-state pairs); a delay-free semantics for responsive configurations; and a classical-style semantics, which is total classically for all configurations. The two latter
semantics collapse finite sequences of delay steps on the fly. The classical-style semantics can in addition recognize silent divergence; classical-style resumptions include a distinguished element to represent
divergence. Moreover, all three semantics are equivalent under suitable assumptions. Our approach with
big-step semantics in terms of resumptions allow for reasoning about operational behaviors of programs
in a syntax-independent way. We therefore argue that it is more abstract than approaches by means of
small-step semantics, or labelled transition systems (in terms of configurations involving a residual program or a control point). To compare our big-step semantics to more traditional approaches, we also
define an uncontroversial small-step semantics with an associated notion of weak bisimilarity of configurations and show that it agrees with our basic big-step semantics. These technical results form the main
contributions of the paper.
Why do we want to be constructive? First, let us state that our choice is neither motivated nor
depends on any argument of truth: we are not claiming in this paper that classical logic is less true
than intuitionistic logic and none of the points we make hinge on this being the case. Nevertheless, we
do think that working in a constructive logic is very useful also if one has no philosophical problem
in accepting non-constructive arguments. Our reasons are these. For us, using constructive logic is
primarily a technical way to be conscious about the principles we depend on in our arguments. We are
by no means limiting ourselves: when we really need some non-constructive principle in a constructive
argument, we can always explicitly assume this principle (or the specific instance that we need). But
it so happens that a need for unexpectedly strong principles is often a sign of some imperfect design
choice in the setup of a theory. Another reason to be constructive as a semanticist is that programming
is about computable functions only. In constructive logic, we do not have to specifically worry about
computability: only computable functions are there and can be spoken about. For example, the formula
∀x. p x ∨ ¬(p x) is not a tautology, it states that p is a decidable: there is a computable function mapping
any x to a proof of p x or a proof of ¬(p x) (so also to yes or no, should one not care about the proofs).
In big-step semantics, although we specify evaluation as a relation in this paper, it is important for us
that it can be turned into a function, or else we do not capture the intuitive idea that programs represent
computable functions from initial configurations into behaviors.
We have formalized the development in Coq version 8.2pl1. This gives us greater confidence in the
correctness of our reasoning, in particular regarding the productivity of coinductive proofs, since the
type checker of Coq helps us avoid mistakes by ruling out improductivity. We rely on Mendler-style
coinduction to circumvent the limitations imposed by syntactic guardedness approach [9] of Coq. The
Coq development is available at http://cs.ioc.ee/~keiko/sophie.tgz.
The language we consider is the While language extended with input and output primitives, with
statements s : stmt defined inductively by
s ::= skip | s0 ; s1 | x := e | if e then st else s f | while e do st | input x | output e
We assume given the sets of variables and (pure) expressions, whose elements are ranged over by
metavariables x and e respectively. We assume the set of values to be the integers, non-zero integers
counting as truth and zero as falsity. The metavariable v ranges over values. A state, ranged over by σ ,
maps variables to values. The notation σ [x 7→ v] denotes the update of a state σ with v at x. We assume
K. Nakata & T. Uustalu
59
given an evaluation function JeKσ , which evaluates e in the state σ . We write σ |= e and σ 6|= e to denote
that e is true, resp. false in σ .
2
Resumptions
We will define operational semantics of interactive While in terms of states and (interactive input-output)
resumptions. Informally, a resumption is a datastructure that captures all possible evolutions of a configuration (a statement-state pair), a computation tree branching according to the external non-determinism
resulting from interactive input.2
Basic (delayful) resumptions r : res are defined coinductively by the rules3
σ : state
ret σ : res
f : Int → res
in f : res
v : Int r : res r : res
out v r : res
δ r : res
so a resumption either has terminated with some final state, ret σ , takes an integer input v and evolves
into a new resumption f v, in f , outputs an integer v and evolves into r, out v r, or performs an internal
action (observable at best as a delay) and becomes r, δ r. For simplicity, we assume input totality; i.e.,
input resumptions, represented by total functions, accept any integers. But we could instead have had
them partial, e.g., by letting the constructor in take the intended domain of definedness as an additional
argument. We also define (strong) bisimilarity of two resumptions, r ≈ r∗ , coinductively by
ret σ ≈ ret σ
∀v. f v ≈ f∗ v
in f ≈ in f∗
r ≈ r∗
out v r ≈ out v r∗
r ≈ r∗
δ r ≈ δ r∗
Bisimilarity is straightforwardly seen to be an equivalence. We think of bisimilar resumptions as equal,
i.e., type-theoretically we treat resumptions as a setoid with bisimilarity as the equivalence relation4 .
Accordingly, we have to make sure that all functions and predicates we define on resumptions are setoid
functions and predicates, i.e., insensitive to bisimilarity.
Here are some examples of resumptions, defined by corecursion:
⊥
rep n
rep′ n
echo σ
echo′
=
=
=
=
=
δ⊥
δ (δ (out n (rep n)))
δ (out n (rep′ n))
in (λ n. δ (if n 6= 0 then out n (echo σ ) else ret σ ))
in (λ n. δ (if n 6= 0 then out n echo′ else ⊥))
⊥ represents a resumption that silently diverges. rep outputs an integer n forever. rep′ is similar but has
shorter latency. Both echo and echo′ echo input interactively; the former terminates when the input is 0,
whereas the latter diverges in this situation.
Convergence, r ↓ r′ , states that r converges in a finite number of steps to a resumption r′ , which
has terminated or makes an observable action (performs input/output) as its first move. It is defined
inductively by
ret σ ↓ ret σ
∀v. f v ≈ f∗ v
in f ↓ in f∗
r ≈ r∗
out v r ↓ out v r∗
r ↓ r′
δ r ↓ r′
2 There are alternatives. We could have chosen to work, e.g., with functions from streams of input values into traces, i.e.,
computation paths.
3 We mark inductive definitions by single horizontal rules and coinductive definitions by double horizontal rules.
4 Classically, strong bisimilarity is equality. But we work in an intensional type theory where strong bisimilarity of colists is
weaker than equality (just as equality of two functions on all arguments is weaker than equality of these two functions). E.g.,
⊥ and δ ⊥ are only strongly bisimilar.
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
60
In contrast, divergence, r ↑, states that r diverges silently. It is defined coinductively by
r↑
δ r↑
For instance, we have δ (δ (ret σ )) ↓ ret σ , rep n ↓ out n (rep n) and ⊥ ↑.
Both convergence and divergence are setoid predicates. Constructively, it is not the case that ∀r. (∃r′ . r ↓
′
r ) ∨ r ↑, which amounts to decidability of convergence. But classically, this dichotomy is true. In particular, ∀r. ¬ (∃r′ . r ↓ r′ ) → r ↑ is constructively provable, but ∀r. ¬ r ↑ → ∃r′ . r ↓ r′ holds only classically.
We can now introduce a useful notion of responsiveness. A resumption r is responsive, if it keeps
converging. It is defined coinductively with the help of the convergence predicate by
r ↓ in f ∀v. ( f v) ⇓
r ↓ out v r′
r ↓ ret σ
[resp-ret]
[resp-in]
r⇓
r⇓
r⇓
r′ ⇓
[resp-out]
For instance, rep n, rep′ n and echo σ are responsive, but ⊥ and echo′ are not.
Classically, a resumption is responsive, if it can never evolve into a diverging resumption. Indeed, by
augmenting the definition of responsiveness with a divergence option we obtain a classically tautological
predicate, r m, that we call commitedness.
r ↓ ret σ
rm
[comm-ret]
r ↓ in f
∀v. ( f v) m
rm
[comm-in]
r ↓ out v r′
rm
r′ m
[comm-out]
r↑
rm
[comm-div]
For a resumption r to be committed, it must be the case that it always either converges or diverges. So,
classically, any resumption is committed.
Lemma 2.1 Classically, for all r, r m.
Proof Specifically, we use an instance of excluded middle, ∀r. (∃r′ . r ↓ r′ ) ∨ ¬(∃r′ . r ↓ r′ ), which amounts
to assuming that convergence is decidable.
Lemma 2.2 Convergence, divergence, responsiveness and committedness are setoid predicates.
3
Weak Bisimilarity
Two resumptions are weakly bisimilar, if they are bisimilar modulo collapsing finite sequences of delay
steps between observable actions. It is conceivable that, in practice, weak bisimilarity is what is needed:
one may well be interested only in observable behavior, disregarding finite delays. For instance, to
guarantee correctness of a compiler optimization, we would want to prove that the optimization does not
change the observable behavior of the source program, including termination and divergence behaviors,
but the optimized code may perform fewer internal steps and thus be faster. We therefore formalize
termination-sensitive weak bisimilarity, which distinguishes termination and silent divergence.
Technically, getting the definition of weak bisimilarity right is not straightforward, especially not in
a constructive setting. It requires both induction and coinduction: we need to collapse a finite number of
delay steps between observable actions possibly infinitely. Here we present two equivalent formulations
(actually, we will also give a third one for classical reasoning, which is only equivalent to the first two
classically). The first is closer to the formulations typically found in process calculi literature (except that,
in process calculi, one usually works with termination-insensitive weak bisimilarity). The second nests
induction into coinduction, exhibiting a useful technique for implementation in Coq. In our development,
K. Nakata & T. Uustalu
61
we use both formulations and their equivalence result, freely choosing the one of the two that facilitates
the proof.
The first one, noted r ∼
= r∗ , uses coinduction atop the inductive definition of convergence and is
defined by the rules
r ↓ ret σ r∗ ↓ ret σ
r∼
= r∗
r ↓ in f
r∗ ↓ in f∗ ∀v. f v ∼
= f∗ v r ↓ out v r′
r∼
= r∗
r∗ ↓ out v r∗′
r∼
= r∗
r′ ∼
= r∗′
r∼
= r∗
δ r∼
= δ r∗
so two resumptions are weakly bisimilar if they converge at the same action or can both perform an
internal action, with weakly bisimilar residual resumptions. In particular, two terminating resumptions
are derived to be weakly bisimilar by a single application of the first rule, whereas two silently diverging
resumptions are weakly bisimilar by corecursive application of the fourth rule. For instance, we have
rep n ∼
= echo′ does not hold.
= rep′ n but echo σ ∼
Lemma 3.1 For any r, r′ and r∗ , if r ↓ r′ and r∗ ↑ then ¬ r ∼
= r∗ .
As a corollary, we obtain that the silently diverging resumption ⊥ and resumptions that have terminated,
ret σ , are not weakly bisimilar.
The second formulation, denoted r ∼
=◦ r∗ nests induction into coinduction. We first define ↓X ↓ inductively in terms of X , for any relation (read: setoid relation) X , and then define ∼
=◦ coinductively in terms
◦
of ↓∼
= ↓. For binary relations X , Y , X ⊆ Y denotes ∀x, x∗ . x X x∗ → xY x∗ .
ret σ ↓X↓ ret σ
∀v. f v X f∗ v r ↓X↓ r∗
r X r∗
out v r ↓X↓ out v r∗ in f ↓X↓ in f∗ δ r ↓X↓ r∗
r∼
X ⊆∼
=◦ r∗
=◦ r ↓X↓ r∗
r∼
δ r∼
=◦ r∗
=◦ δ r∗
r ↓X↓ r∗
r ↓X↓ δ r∗
Intuitively, r ↓X ↓ r∗ means that r and r∗ converge to resumptions related by X .
In the first rule of ∼
=◦ , we have used Mendler-style coinduction in order to enable Coq’s syntactic
guarded corecursion for ∼
=◦ . The natural (Park-style) rule to stipulate would have been:
r ↓∼
=◦ ↓ r∗
r∼
=◦ r∗
Coq’s guardedness condition for induction nested into coinduction is too weak to work with the Parkstyle rule: we cannot construct the corecursive functions (coinductive proofs) that we need. With our
definition, the Park-style rule is derivable. We can also prove that ↓X ↓ is monotone in X , which allows
us to recover the natural inversion principle for ∼
=◦ .
Induction and coinduction can be mixed in several ways. An inductive definition can be mutual with
a coinductive definition, if the occurrence of one predicate in the definition of the other is contravariant.5
But this is not our situation. Instead, in our case, we have an inductive and a coinductive definition that
use each other covariantly, but one is nested in the other. Specifically, we have the inductive definition
nested in the coinductive definition6 , since we want finite chunks of ↓∼
=◦ ↓ derivations to be weaved
into an infinite ∼
=◦ derivation. The Agda developer community is currently exploring a novel approach to
coinductive types (based on suspension types) [6, 7] where this form of mixing induction and coinduction
is easily encoded while nesting the other way is problematic.
The two definitions of weak bisimilarity are equivalent.
5 This
means looking for a least X and greatest Y solving a system of equations X = F(Y, X), Y = G(X,Y ), where F and G
are contravariant in their first arguments and covariant in the second arguments.
6 i.e., we have a definition of the form ν X. G( µ Y. F(X,Y ), X) with both F and G covariant in both arguments
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
62
Lemma 3.2 For any r and r∗ , r ∼
= r∗ iff r ∼
=◦ r∗ .
Weak bisimilarity is a setoid predicate and an equivalence relation.
Lemma 3.3 Weak bisimilarity is a setoid predicate: For any r, r′ , r∗ , r∗′ , if r ≈ r′ , r ∼
= r∗ and r∗ ≈ r∗′ ,
′
′
then r ∼
= r∗ . Weak bisimilarity is an equivalence.
Proof Reflexivity and symmetry are straightforward to prove by coinduction. Below we sketch the proof
for transitivity with the second formulation, r ∼
=◦ r∗ , to show Mendler-style coinduction working in our
favour. For binary relations X ,Y , let X ◦Y denote their composition; namely, x(X ◦Y )x′ if there is x′′ such
that x X x′′ and x′′ Y x′ . We first prove, by induction, the transitivity for ↓X ↓, i.e., that, for any resumptions
r0 , r1 , r2 and setoid relations X ,Y , if r0 ↓X ↓ r1 and r1 ↓Y ↓ r2 , then r0 ↓(X ◦Y )↓ r2 . The transitivity of ∼
=◦
◦
◦
◦
states that, for any resumptions r0 , r1 and r2 , if r0 ∼
= r1 and r1 ∼
= r2 , then r0 ∼
= r2 . The proof of this is
◦
◦
∼
∼
by coinduction and inversion on r0 = r1 and r1 = r2 . We show the main case. Suppose we have r0 ∼
=◦ r1
◦
◦
◦
∼
∼
∼
and r1 = r2 , because r0 ↓X ↓ r1 and r1 ↓Y ↓ r2 for some X and Y such that X ⊆ = and Y ⊆ = . By the
transitivity of ↓X ↓ (which was proved by induction separately above), we obtain r0 ↓X ◦Y ↓ r2 . Using the
coinduction hypothesis, we have X ◦Y ⊆ ∼
=◦ , which closes the case. Notably, the invocation
=◦ ⊆ ∼
=◦ ◦ ∼
of the coinduction hypothesis here is properly guarded thanks to our use of Mendler’s trick.
As one should expect, strongly bisimilar resumptions are weakly bisimilar.
Corollary 3.1 For any r, r∗ , r ≈ r∗ , then r ∼
= r∗ .
Proof Immediate from ∼
= being a reflexive setoid predicate.
Termination-sensitive bisimilarity has previously been considered by Kučera and Mayr [13] and
Bohannon et al. [3] (but see also Bergstra et al. [1]). Their version is best suited for classical reasoning
in the sense that terminating and silently diverging resumptions are distinguished by an upfront choice
between convergence and divergence. This version of weak bisimilarity, denoted r ∼
=c r∗ , is defined
coinductively by
r ↓ ret σ r∗ ↓ ret σ
r∼
=c r∗
r ↓ out v r′
r∗ ↓ out v r∗′
r∼
=c r∗
r′ ∼
=c r∗′
r ↓ in f
r∗ ↓ in f∗ ∀v. f v ∼
=c f ∗ v
∼
r =c r∗
r ↑ r∗ ↑
r∼
=c r∗
Only the fourth rule is different from the rules of ∼
= and refers directly to divergence.
The classical-style version of weak bisimilarity, ∼
=c , is stronger than the constructive-style version,
∼
=. The converse is only true classically.
Lemma 3.4 For any r and r∗ , if r ∼
=c r∗ , then r ∼
= r∗ . Classically, for any r and r∗ , if r ∼
= r∗ , then r ∼
=c r∗ .
We insist on the use constructive-style weak bisimilarity, ∼
=, in the constructive setting, because the
classical-style notion fails to enjoy some fundamental properties constructively.
Lemma 3.5 Classical-style weak bisimilarity is a setoid predicate. Classically, it is also an equivalence
weaker than strong bisimilarity.
Proof We only prove that ∼
=c r by coin=c is an equivalence. Reflexivity: We prove that for any r, r ∼
duction. Classically, we have ∀r0 . (∃r0′ . r0 ↓ r0′ ) ∨ r0 ↑. Should r ↑ hold, we immediately conclude r ∼
=c r.
Suppose there exists r′ such that r ↓ r′ . Moreover suppose r′ = in f for some f . The coinduction hypothesis gives us that for any v, f v ∼
=c f v, from which r ∼
=c r follows. The other cases, i.e., when
′
′′
′′
′
r = out v r for some v and r or r = ret σ for some σ , are similar. Symmetry: We prove constructively
that for any r and r′ , if r ∼
=c r by coinduction and inversion on r ∼
=c r′ . Transitivity: We prove
=c r′ then r′ ∼
′′
′′
′
′′
′
′
∼
∼
∼
constructively that for any r, r and r , if r =c r and r =c r then r =c r by coinduction and inversion
on r ∼
=c r′′ .
=c r′ and r′ ∼
K. Nakata & T. Uustalu
63
Constructively, it is not possible to show classical-style weak bisimilarity reflexive and hence we
cannot show any two strong bisimilar resumptions classical-style weakly bisimilar.
A simple example of a resumption r not classical-style weakly bisimilar to itself constructively is
given by any search process that is classically total, but cannot be proved terminating constructively,
since no bound on the search can be given. By definition, a resumption can only be classical-style weakly
bisimilar to another if it terminates or diverges. Constructively, the resumption r is only nondiverging,
we cannot show it terminating.
4
Big-Step Semantics
We now proceed to a first, basic (delayful) big-step operational semantics for our reactive While in terms
of delayful resumptions. Evaluation (s, σ ) ⇒ r, expressing that running a statement s from a state σ
produces a resumption r, is defined coinductively by the rules in Figure 1. The rules for sequence and
∗
while implement the necessary sequencing with the help of extended evaluation (s, r) ⇒ r′ , expressing
that running a statement s from the last state (if it exists) of an already accumulated resumption r results
in a total resumption r′ . Extended evaluation is also defined coinductively, as the coinductive prefix
closure of evaluation.
Input and output statements produce corresponding resumptions that perform input or output actions
and terminate thereafter. We consider assignments and testing of guards of if- and while-statements to
constitute internal actions, observable as delays. This way we avoid introducing semantic anomalies,
by making sure that any while-loop always progresses. But this choice also ensures that evaluation is
total—as we should expect. Given that it is deterministic as well7 , we can equivalently turn our relational
big-step semantics into a functional one: the unique resumption for a given configuration (statementstate pair) is definable by corecursion.8 This semantics is a straightforward adaptation of the trace-based
coinductive big-step semantics of non-interactive While from our previous work [17], where the details
can be found and where we motivate all our design choices (e.g., why skip takes no time whereas the
boolean guards do; we argue that our design is canonical).
Lemma 4.1 Evaluation is a setoid predicate. It is total and deterministic up to bisimilarity.
Let us look at some examples. We have (while true do skip, σ ) ⇒ ⊥ for any σ . I.e., while true do skip
silently diverges. We also have (input x; while true do (output x; x := x + 1), σ ) ⇒ in (λ n. up n) where
up is defined corecursively by up n = δ (out n (δ (up (n + 1)))). I.e., the statement counts up from the
given input n. The two delays around every output action account for the internal actions of the assignment and testing of the boolean guard. An interactive adder takes two inputs and outputs their sum, and
repeats this process, that is, we have (while true do (input x; input y; output (x + y)), σ ) ⇒ sum where
sum is defined cocursively by sum = δ (in (λ m. in (λ n. out (m + n) sum))).
Weak bisimilarity is useful for reasoning about soundness of program transformations, where we accept that transformations may change the timing of a resumption. For instance, we have (while true do (z :=
x; output z), σ ) ⇒ rep (σ x), where rep is defined corecursively by rep n = δ δ (out n (rep n)), and
(z := x; while true do output z, σ ) ⇒ δ (rep′ (σ x)), where rep′ is defined corecursively by rep′ n =
δ (out n (rep′ n)), with rep n ∼
= rep′ n. The latter resumption is faster than the former, but they are weakly
7 Note
that the external nondeterminism resulting from input actions is encapsulated in resumptions.
aspect makes our big-step operational semantics very close in spirit to denotational semantics, specifically, denotational semantics in terms of Kleisli categories, here, the Kleisli category of a resumptions monad.
8 This
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
64
(s0 , σ ) ⇒ r
(x := e, σ ) ⇒ δ (ret σ [x 7→ JeKσ ])
e |= σ
(skip, σ ) ⇒ ret σ
∗
(st , δ (ret σ )) ⇒ r
(if e then st else s f , σ ) ⇒ r
e |= σ
∗
(st , δ (ret σ )) ⇒ r
(input x, σ ) ⇒ in (λ v.ret σ [x 7→ v])
∗
∗
∀v. (s, f v) ⇒ f ′ v
(s, ret σ ) ⇒ r
∗
(if e then st else s f , σ ) ⇒ r
∗
⇒ r′
∗
(s, in f ) ⇒ in f ′
(s0 ; s1 , σ ) ⇒ r′
(s f , δ (ret σ )) ⇒ r
e 6|= σ
(while e do st , r) ⇒ r′
(while e do st , σ )
(s, σ ) ⇒ r
e 6|= σ
∗
(s1 , r) ⇒ r′
(while e do st , σ ) ⇒ δ (ret σ )
(output e, σ ) ⇒ out (JeKσ ) (ret σ )
∗
(s, r) ⇒ r′
∗
∗
(s, δ r) ⇒ δ r′
(s, r) ⇒ r′
∗
(s, out v r) ⇒ out v r′
Figure 1: Basic (delayful) big-step semantics
bisimilar. In fact, we can prove while e do (z := x; s) and z := x; while e do s to be weakly bisimilar whenever e is true of the initial state and s does not change x. Here, the latter statement is obtained from the
former by loop-invariant code motion, a well-known compiler optimization; the optimization preserves
the observable behaviour of the source statement, irrespective of its termination behaviour, which it must
respect as well. We note that output 1 is not observationally equivalent to (while true do skip); output 1.
More importantly, output 1 is not observationally equivalent to output 1; (while true do skip), since our
weak bisimilarity is termination-sensitive. Of course, we can deal with more interesting program equivalences, such as the equivalence of mult = while true do (input x; input y; z := 0; while x 6= 0 do (z :=
z + y; x := x − 1); output z) and mult opt = while true do (input x; input y; if x ≥ 0 then output x ∗
y else (while true do skip)), slow and fast interactive multipliers, which silently diverge when given a
negative first operand.
5
Small-Step Semantics
In this section, we introduce an equivalent small-step semantics and define weak bisimilarity of configurations (statement-state pairs) in terms of it. We then prove two configurations to be weakly bisimilar if
and only if their evaluations produce weakly bisimilar resumptions.
A configuration (s, σ ) is a pair of a statement and state. Labelled configurations c : lconf are defined
by the sum9 :
s : state
ret σ : lconf
s : stmt g : Int → state
in s g : lconf
v : Int s : stmt σ : state
out v s σ : lconf
s : stmt σ : state
δ s σ : lconf
A terminality predicate/one-step reduction relation → is defined in Figure 2 (top half). If c = ret σ ,
then the proposition (s, σ ) → c means that the configuration (s, σ ) has terminated at state σ . In other
cases, it corresponds to a labelled transition: if c = in s′ g, we take an input v and evolve to a configuration
(s′ , g v); if c = out v s′ σ ′ , we output v and evolve to (s′ , σ ′ ); if c = δ s′ σ ′ , the configuration (s, σ ) evolves
to a configuration (s′ , σ ′ ) in a delay step. We have chosen to label configurations rather than transitions
so that labelled configurations become “trunks” of resumptions.
9 The
definition is non-recursive, but we pretend that it is inductive, as we also do in Coq.
K. Nakata & T. Uustalu
65
(x := e, σ ) → δ skip (σ [x 7→ JeKσ ])
(s0 , σ ) → in s′0 f
(s0 ; s1 , σ ) → in (s′0 ; s1 )
(s0 , σ ) → ret σ (s1 , σ ) → c
(s0 ; s1 , σ ) → c
′
′
f
σ |= e
(if e then st else s f , σ ) → δ st σ
(s0 , σ ) → out v s′0 σ ′
(s0 , σ ) → δ s′0 σ ′
(s0 ; s1 , σ ) → out v (s′0 ; s1 ) σ ′
(s0 ; s1 , σ ) → δ (s′0 ; s1 ) σ ′
σ 6|= e
(if e then st else s f , σ ) → δ s f σ
σ |= e
(while e do st , σ ) → δ (st ; while e do st ) σ
(input x, σ ) → in skip (λ v.σ [x 7→ v])
(s, σ ) → ret σ ′
(s, σ )
(s, σ ) → in
s′
g
ret
(s, σ )
σ 6|= e
(while e do st , σ ) → δ skip σ
(output e, σ ) → out (JeKσ ) skip σ
(s, σ ) → δ s′ σ ′
σ′
∀v. (s′ , g
(skip, σ ) → ret σ
(s′ , σ ′ )
(s, σ )
v)
fv
r
δr
(s, σ ) → out v s′ σ ′
(s, σ )
in f
(s′ , σ ′ )
r
out v r
Figure 2: Small-step semantics
Weak bisimilarity of two configurations is defined in terms of terminality/one-step reduction. Again,
convergence, (s, σ ) ↓ c, states that either (s, σ ) terminates or performs an observable action in a finite
number of steps. It is defined inductively by
(s, σ ) → ret σ ′
(s, σ ) ↓ ret σ ′
(s, σ ) → out v s′ σ ′
(s, σ ) ↓ out v s′ σ ′
(s, σ ) → in s′ g (s, σ ) → δ s′ σ ′ (s′ , σ ′ ) ↓ c
(s, σ ) ↓ in s′ g
(s, σ ) ↓ c
(We overload the same notations for resumptions and configurations without ambiguity.) Weak bisimilarity on configurations is defined coinductively by
(s, σ ) ↓ ret σ ′
(s∗ , σ∗ ) ↓ ret σ ′
(s, σ ) ∼
= (s∗ , σ∗ )
(s, σ ) ↓ in
s′
g
(s∗ , σ∗ ) ↓ in s′∗ g∗ ∀v. (s′ , g v) ∼
= (s′∗ , g∗ v)
∼ (s∗ , σ∗ )
(s, σ ) =
(s, σ ) ↓ out v (s′ , σ ′ )
(s, σ ) → δ s′ σ ′
(s∗ , σ∗ ) ↓ out v (s′∗ , σ∗′ )
∼ (s∗ , σ∗ )
(s, σ ) =
(s∗ , σ∗ ) → δ s′∗ σ∗′
(s, σ ) ∼
= (s∗ , σ∗ )
(s′ , σ ′ ) ∼
= (s′∗ , σ∗′ )
(s′ , σ ′ ) ∼
= (s′∗ , σ∗′ )
Two configurations are weakly bisimilar if and only if their evaluations yield weakly bisimilar resumptions.
Lemma 5.1 For any s, s∗ , σ and σ∗ , (s, σ ) ∼
= (s∗ , σ∗ ) iff there exist r and r∗ such that (s, σ ) ⇒ r and
(s∗ , σ∗ ) ⇒ r∗ and r ∼
= r∗ .
The evaluation relation of the small-step semantics is defined in Figure 2 (bottom half). It is the
terminal many-step reduction relation, defined coinductively. The proposition (s, σ )
r means that
running s from the state σ produces the resumption r.
The big-step and small-step semantics are equivalent.
Proposition 5.1 For any s, σ and r, (s, σ ) ⇒ r iff (s, σ ) r.
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
66
6
Delay-Free Big-Step Semantics
So far we explicitly dealt with delay steps in a fully general and constructive manner. However, it is
also possible to define big-step semantics in terms of resumptions without delay steps, by collapsing
them on the fly, if they come in finite sequences. In this section, we define a delay-free semantics for
configurations that lead to responsive resumptions.
We define delay-free resumptions, r : resr , and their (strong) bisimilarity coinductively by
σ : state
retr σ : resr
f : Int → resr
inr f : resr
v : Int r : resr
outr v r : resr
retr σ ≈ retr σ
∀v. f v ≈ f∗ v
inr f ≈ inr f∗
r ≈ r∗
outr v r ≈ outr v r∗
A responsive delayful resumption r : res can be normalized into a delay-free resumption by collapsing
the finite sequences of delay steps it has between observable actions. We define normalization, norm : (r :
res) → r ⇓ → resr , and embedding of delay-free resumptions into delayful resumptions, emb : resr → res
by corecursion. In the definition of norm, we examine the proof of r ⇓, i.e., r’s responsiveness.
emb (retr σ ) =
norm r (resp-ret σ ) = retr σ
norm r (resp-in f k) = inr (λ v. norm ( f v) (k v)) emb (inr f ) =
emb (outr v r) =
norm r (resp-out v r′ h) = outr v (norm r′ h)
ret σ
in (λ v. emb ( f v))
out v (emb r)
A delayful resumption is weakly bisimilar to a delay-free one if and only if it is responsive and its
normal form is strongly bisimilar to the same.
Lemma 6.1 For any r : res and r∗ : resr , r ∼
= emb r∗ iff norm r h ≈ r∗ for some h : r ⇓.
(The convergence proofs of a resumption are strong bisimilar, so h is unique up to that extent.)
Corollary 6.1 (i) For any r : res, h : r ⇓, r ∼
= emb (norm r h). (ii) For any r, h : r ⇓ and r∗ , h∗ : r∗ ⇓, r ∼
= r∗
iff norm r h ≈ norm r∗ h∗ .
In Figure 3, we define the delay-free big-step semantics for responsive programs. Here we have
an inductive definition of a parameterized evaluation relation ⇒↓(X ) defined in terms of X , for any
∗
relation X , nested into a coinductive definition of an extended evaluation relation ⇒, defined in terms of
∗
∗
⇒↓(⇒). Finally, the actual evaluation relation ⇒r of interest is obtained by instantiating ⇒↓ at ⇒. Since
we collapse delay-steps on the fly, an assignment immediately terminates at the updated state. Likewise,
testing the guard of a condition or a while-loop takes no time. The crucial rules are those for sequence
and while-loop. If the first statement of a sequence or the body of a while-loop terminate silently, the
second statement or the new iteration of the loop are run using the inductive evaluation. The coinductive
extended evaluation is used only if the first statement or the body perform at least one input or output
action.
This way, we make sure that only a finite number of delay steps may be collapsed between two
observable actions, while allowing for diverging runs which perform input and output every now and
then. Indeed, if we replaced the while-ret rule with
e |= σ
∗
(st , σ ) ⇒↓(X) retr σ ′ (while e do st , retr σ ′ ) ⇒ r′
(while e do st , σ ) ⇒↓(X) r′
we would obtain semantic anomalies. E.g., (while true do skip, σ ) ⇒r r would be derived for any r : resr .
K. Nakata & T. Uustalu
67
(x := e, σ ) ⇒↓(X) retr (σ [x 7→ JeKσ ])
(skip, σ ) ⇒↓(X) retr σ
(s0 , σ ) ⇒↓(X) inr f ∀v. (s1 , f v) X f ′ v
(s0 ; s1 , σ ) ⇒↓(X) inr f ′
e |= σ (st , σ ) ⇒↓(X) r
(if e then st else s f , σ ) ⇒↓(X) r
e |= σ
e |= σ
(s0 , σ ) ⇒↓(X) retr σ ′ (s1 , σ ′ ) ⇒↓(X) r
(s0 ; s1 , σ ) ⇒↓(X) r
(s0 , σ ) ⇒↓(X) outr v r (s1 , r) X r′
(s0 ; s1 , σ ) ⇒↓(X) outr v r′
e 6|= σ (s f , σ ) ⇒↓(X) r
(if e then st else s f , σ ) ⇒↓(X) r
(st , σ ) ⇒↓(X) retr σ ′ (while e do st , σ ′ ) ⇒↓(X) r
(while e do st , σ ) ⇒↓(X) r
(st , σ ) ⇒↓(X) inr f ∀v. (while e do st , f v) X f ′ v
(while e do st , σ ) ⇒↓(X) inr f ′
e |= σ
(st , σ ) ⇒↓(X) outr v r (while e do st , r) X r′
(while e do st , σ ) ⇒↓(X) outr v r′
e 6|= σ
(while e do st , σ ) ⇒↓(X) retr σ
(input x, σ ) ⇒↓(X) inr (λ v.retr σ [x 7→ v])
∗
X ⊆ ⇒ (s, σ ) ⇒↓(X) r
∗
(s, ret r σ ) ⇒ r
(output e, σ ) ⇒↓(X) outr (JeKσ ) (retr σ )
∗
∗
∀v. (s, f v) ⇒ f ′ v
∗
(s, inr f ) ⇒ inr f ′
(s, r) ⇒ r′
∗
(s, outr v r) ⇒ outr v r′
∗
(s, σ ) ⇒↓(⇒) r
(s, σ ) ⇒r r
Figure 3: Delay-free big-step semantics
Coming back to the examples of the previous section, we have (input x; while true do (output x; x :=
x + 1), σ ) ⇒r in (λ n. upr n) where upr is defined corecursively by upr n = out r n (upr (n + 1)). We also
have (while true do z := x; output z, σ )⇒r repr (σ x) and (z := x; while true do output z, σ ) ⇒ repr (σ x)
where repr is defined corecursively by repr n = outr n (repr n). Since the delay steps are collapsed on the
fly in the delay-free semantics, the two statements produce the same, i.e., strongly bisimilar, (delay-free)
resumptions. The delay-free semantics does not account for (i.e., does not assign a resumption to) nonresponsive configurations, such as while true do skip and the interactive multipliers from the previous
section (since they diverge given a negative input for the first operand), with any initial state.
We state adequacy of the delay-free semantics by relating it to the delayful semantics of Section 4.
Namely, for configurations leading to responsive resumptions they agree.
Proposition 6.1 (Soundness) For any s, σ , r : resr , if (s, σ ) ⇒r r then there exists r′ : res such that
(s, σ ) ⇒ r′ and emb r ∼
= r′ .
Proposition 6.2 (Completeness) For any s, σ , r : res and h : r ⇓, if (s, σ ) ⇒ r, then (s, σ ) ⇒r norm r h.
The proofs are omitted due to the space limitation. They are nontrivial and the details can be found
in the accompanying Coq development. Below we demonstrate the key proof technique on an example.
Consider the statement count = while true do (if i > 0 then i := i − 1 else (output x; x := x + 1; i :=
x)). It counts up from 0, so we should have (count, σ ) ⇒r upr 0 for an initial state σ that maps x and i
to 0. We need coinduction since count performs outputs infinitely often; we also need induction, nested
68
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
into coinduction, since the loop silently iterates n times each time before outputting n. Note that the
latency is finite but unbounded.
We cannot perform induction inside coinduction naı̈vely. That would be rejected by Coq’s syntactic
guardedness checker, which is there to ensure productivity of coinduction. Mendler-style coinduction
comes to rescue. Let (s, r) R r′ be a relation on pairs (s, r) of a statement and a resumption and resumptions r′ , defined inductively by
(count, retr σ [x 7→ n, i 7→ n]) R upr n
(s, r) R r′
(s, outr v r) R outr v r′
(s, σ ) ⇒↓(R) r
(s, retr σ ) R r
∗
The key fact is that R is stronger than ⇒ (Lemma 6.6 below).
We first prove that ⇒↓ is monotone by induction.
Lemma 6.2 For any X , Y , s, σ and r such that X ⊆ Y , if (s, σ ) ⇒↓(X ) r, then (s, σ ) ⇒↓(Y ) r.
The following two lemmata are proved by straightforward application of the rules in Figure 3.
Lemma 6.3 For any n, (if i > 0 then i := i − 1 else (output x; x := x + 1; i := x), σ [x 7→ n, i 7→ 0]) ⇒↓(R)
out r n (ret r σ [x 7→ n + 1, i 7→ n + 1]).
Lemma 6.4 For any n and m, (if i > 0 then i := i − 1 else (output x; x := x + 1; i := x), σ [x 7→ n, i 7→
m + 1]) ⇒↓(R) ret r σ [x 7→ n, i 7→ m].
The next lemma is proved by induction on m, using the two lemmata just proved.
Lemma 6.5 For any n and m, (count, σ [x 7→ n, i 7→ m]) ⇒↓(R) outr n (upr (n + 1)).
Corollary 6.2 For any n, (count, σ [x 7→ n, i 7→ n]) ⇒↓(R) upr n.
∗
We can now prove that R is stronger than ⇒ by coinduction and inversion on (s, r) R r′ . Here is the
∗
crux: corollary 6.2 together with the coinduction hypothesis gives (count, ret r σ [x 7→ n, i 7→ n]) ⇒ upr n,
and the use of the coinduction hypothesis is properly guarded.
∗
Lemma 6.6 For any s, r and r′ , if (s, r) R r′ then (s, r) ⇒ r′
The main proposition follows from corollary 6.2, lemma 6.6 and the monotonicity of ⇒↓ (lemma 6.2).
Proposition 6.3 For any n, (count, σ [x 7→ n, i 7→ n]) ⇒r upr n.
7
Classical-Style Big-Step Semantics
In Section 2, we augmented the definition of responsiveness with a divergence option to obtain a concept
of committedness, which is a classically tautological predicate. Similarly, we can obtain a delay-free
semantics for committed configurations from the delay-free semantics for responsive configurations of
the previous section. To do so, we extend the definition of delay-free resumptions with a “black hole”
constructor, •, representing silent divergence, arriving at classical-style resumptions, and adjust the definition of (strong) bisimilarity:
σ : state
retc σ : resc
retc σ ≈ retc σ
f : Int → resc
inc f : resc
∀v. f v ≈ f∗ v
inc f ≈ inc f∗
r : resc
outc v r : resc
• : resc
r ≈ r∗
outc v r ≈ outc v r∗
•≈•
K. Nakata & T. Uustalu
69
Given a proof h : r m of committedness of a delayful resumption r : res, we can normalize r into
a classical resumption by collapsing the finite delays between observable actions and sending silent
divergence into the black hole.
norm r (comm-ret σ )
norm r (comm-in f k)
norm r (comm-out v r′ h)
norm r (comm-div )
=
=
=
=
retc σ
emb (retc σ )
inc (λ v. norm ( f v) (k v)) emb (inc f )
outc v (norm r′ h)
emb (outc v r)
•
emb •
=
=
=
=
ret σ
in (λ v. emb ( f v))
out v (emb r)
δ (emb •)
Again, a delayful resumption is weakly bisimilar to a classical-style one if and only if it is committed
and its normal form is strongly bisimilar.
Lemma 7.1 For any r : res and r∗ : resc , r ∼
= emb r∗ iff norm r h ≈ r∗ for some h : r m.
In Figure 4, we define the classical-style semantics in terms of classical-style resumptions. We have
an inductive parameterized evaluation relation ⇒↓(X ), defined in terms of X , for any relation X , for
convergent runs; its inference rules are the same as those in the previous section. But we also have a
coinductive parameterized evaluation ⇒↑(X ), again defined in terms of X , for any relation X , for silently
∗
diverging runs, so that (s, σ ) ⇒↑(⇒) expresses that running a statement s from a state σ diverges without
performing input or output. It uses the inductive evaluation in case the first statement of a sequence or
the first iteration of the body of a while-loop silently terminates, but the whole sequence or while-loop
∗
silently diverges. Then we define coinductively an extended evaluation relation ⇒, in terms of these two
∗
evaluation relations, nesting the latter into the former. Finally, we instantiate both ⇒↓ and ⇒↑ at ⇒ to
obtain the “real” evaluation relation ⇒c . Note that, to derive an evaluation proposition in this semantics,
one has to decide upfront whether inductive or coinductive evaluation should be used—a decision that
can be made classically, but not constructively.
The classical-style semantics is adequate wrt. the basic semantics of Section 4.
Proposition 7.1 (Soundness) For any s, σ and r : resc , if (s, σ ) ⇒c r, then there exists r′ : res such that
(s, σ ) ⇒ r′ and emb r ∼
= r′ .
Proposition 7.2 (Completeness) For any s, σ and r : res and h : r m, if (s, σ ) ⇒ r, then (s, σ ) ⇒c
norm r h.
Corollary 7.1 Classically, for any s, σ and r : res, if (s, σ ) ⇒ r, then there exists r′ : resc such that
(s, σ ) ⇒c r′ and r ∼
= emb r′ .
The classical-style semantics is more expressive than responsive semantics, since it offers the option
of “detected” divergence. In particular we have (while true do skip, σ ) ⇒c • and our interactive multipliers are assigned a classical-style resumption mult defined corecursively by mult = inc (λ m. inc (λ n. if m ≥
0 then outc (m ∗ n) mult else •)); i.e., we have (mult, σ ) ⇒c mult and (mult opt, σ ) ⇒c mult.
8
Related Work
Formalized semantics are an important ingredient in the trusted computing base of certified compilers.
Proof assistants, like Coq, are a good tool for such formalization projects, as both the object semantics
of interest and its metatheory can be developed in the same framework. For introductions, see [2].
To account for nontermination or silent divergence properly in a big-step semantics is nontrivial
already for languages without interactive I/O. Leroy and Grall [14] introduced two big-step semantics
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
70
(x := e, σ ) ⇒↓(X) retc (σ [x 7→ JeKσ ])
(skip, σ ) ⇒↓(X) retc σ
(s0 , σ ) ⇒↓(X) inc f ∀v. (s1 , f v) X f ′ v
(s0 ; s1 , σ ) ⇒↓(X) inc f ′
e |= σ (st , σ ) ⇒↓(X) r
(if e then st else s f , σ ) ⇒↓(X) r
e |= σ
e |= σ
(s0 , σ ) ⇒↓(X) retc σ ′ (s1 , σ ′ ) ⇒↓(X) r
(s0 ; s1 , σ ) ⇒↓(X) r
(s0 , σ ) ⇒↓(X) outc v r (s1 , r) X r′
(s0 ; s1 , σ ) ⇒↓(X) outc v r′
e 6|= σ (s f , σ ) ⇒↓(X) r
(if e then st else s f , σ ) ⇒↓(X) r
(st , σ ) ⇒↓(X) retc σ ′ (while e do st , σ ′ ) ⇒↓(X) r
(while e do st , σ ) ⇒↓(X) r
(st , σ ) ⇒↓(X) inc f ∀v. (while e do st , f v) X f ′ v
(while e do st , σ ) ⇒↓(X) inc f ′
e |= σ
(st , σ ) ⇒↓(X) outc v r (while e do st , r) X r′
(while e do st , σ ) ⇒↓(X) outc v r′
e 6|= σ
(while e do st , σ ) ⇒↓(X) retc σ
(input x, σ ) ⇒↓(X) inc (λ v.retc σ [x 7→ v])
(s0 , σ ) ⇒↑(X)
(output e, σ ) ⇒↓(X) outc (JeKσ ) (retc σ )
(s0 , σ ) ⇒↓(X) retc σ ′
(s0 ; s1 , σ ) ⇒↑(X)
e |= σ
(s1 , σ ′ ) ⇒↑(X)
(s0 ; s1 , σ ) ⇒↑(X)
e 6|= σ
(st , σ ) ⇒↑(X)
(s f , σ ) ⇒↑(X)
(if e then st else s f , σ ) ⇒↑(X) (if e then st else s f , σ ) ⇒↑(X)
e |= σ
(st , σ ) ⇒↑(X)
e |= σ
(st , σ ) ⇒↓(X) retc σ ′
(while e do st , σ ) ⇒↑(X)
∗
X ⊆ ⇒ (s, σ ) ⇒↓(X) r
∗
(s, ret c σ ) ⇒ r
(while e do st , σ ′ ) ⇒↑(X)
(while e do st , σ ) ⇒↑(X)
∗
X ⊆ ⇒ (s, σ ) ⇒↑(X)
∗
∗
∗
(s, retc σ ) ⇒ •
(s, inc f ) ⇒ inc f ′
∗
∗
∀v. (s, f v) ⇒ f ′ v
(s, σ ) ⇒↓(⇒) r
(s, σ ) ⇒c r
(s, r) ⇒ r′
∗
(s, outc v r) ⇒ outc v r′
∗
(s, •) ⇒ •
∗
(s, σ ) ⇒↑(⇒)
(s, σ ) ⇒c •
Figure 4: Classical-style big-step semantics
for lambda-calculus. One is classical in spirit, with two evaluation relations, inductive and coinductive,
for terminating and diverging runs, and relies on decidability between termination and divergence. The
other, with a single coinductive evaluation relation, is essentially suited for constructive reasoning, but
contains a semantic anomaly (a function can continue reducing after the argument diverges), which
results from its ability to collapse an infinite sequence of internal actions (contraction steps).
In our work [17] on While with nontermination, we developed a trace-based coinductive big-step
semantics where traces were non-empty colists of intermediate states, agreeing with the very standard
coinductive small-step trace-based semantics. This semantics relied on traces being a monad; a central
component in the definition was an extended evaluation relation, corresponding to the Kleisli extension
of evaluation. Capretta [4] studied constructive denotational semantics of nontermination as the Kleisli
semantics for the delayed state monad, corresponding to hiding the intermediate states in the trace monad
as internal actions and quotienting by termination-sensitive weak bisimilarity. Rutten [21] carried out a
similar project in classical set theory where the quotient is the state space extended with an extra element
K. Nakata & T. Uustalu
71
for nontermination.
Operational semantics of interactive programs is most often described in the small-step style where
it amounts to a labelled transition system. Especially, this is the dominating approach in process calculi.
Big-step semantics is closer to denotational semantics. In this field, resumption-based descriptions go
back to Plotkin [20], Gunter et al. [10] and Cenciarelli and Moggi [5]. Resumptions are a monad and
resumptions-based denotational semantics is a Kleisli semantics. Our big-step semantics are directly
inspired by this approach, except that we work in a constructive setting and must take extra care to avoid
the need to invoke classical principles where they are dispensable.
We are not aware of many other works on constructive semantics of interactive I/O. But similar
in its spirit to ours is the work of Hancock et al. [11] on stream processors and the stream functions
that these induce by “eating”. Stream processors are like our delay-free resumptions, except that the
authors emphasize parallel composition of stream processors (one processor’s output becomes another
processor’s input) and, for this to be well-defined, a stream processor must not terminate and may only
do a finite number of input actions consecutively. Hancock et al. [8] also characterize realizable stream
functions. In a precursor work, Hancock and Setzer [12] studied a model of interaction where a client
sends a server commands and expects responses.
Weak bisimilarity tends to be defined termination-insensitively, identifying termination and divergence. In particular, this is also the approach of CCS [16]. Termination-sensitive weak bisimilarity has
been considered by Bergstra, Klop and Olderog [1], Kučera and Mayr [13] and Bohannon et al. [3], but
only in what we call the classical-style version, relying on decisions between convergence and divergence. (The weak bisimilarity of Capretta [4] is termination-sensitive and tailored for constructive reasoning, but restricted to behaviours without I/O. Weak bisimilarity also motivated the study of Danielsson
and Altenkirch [6] on mixed induction-coinduction.)
Mixed inductive-coinductive definitions in the form of induction nested into coinduction
(ν X . µY. F (X ,Y ) or, more generally, ν X . G(µY. F (X ,Y ), X )) seem to be quite fundamental in applications (e.g., the stream processors of Hancock et al., our delay-free semantics). Danielsson and Altenkirch [6, 7] argue for making this mix the basic form of inductive-coinductive definitions in the
dependently-typed programming language Agda. Unfortunately, nestings the other way around (definitions µ X . νY. F (X ,Y )) seem to become difficult or impossible to code. With our approach, coinduction
nested into induction is handled symmetrically to induction nested into coinduction [19].
Mendler-style (co)recursion originates from Mendler [15]. It uses that a monotone (co)inductive
definition is equivalent to a positive one, via a syntactic left (right) Kan extension along identity (instead
of µ X . F X one works with µ X . ∃Y. (Y → X ) → F Y ). We exploited this fact to enable Coq’s guarded
corecursion for a coinductive definition with a nested inductive definition, at the price of impredicativity.
We have previously developed and formalized a Hoare logic for the trace-based semantics of While
with nontermination [18]. A similar enterprise should be possible for resumptions, weak bisimilarity and
While with interactive I/O.
9
Conclusion
We have developed a constructive treatment of resumption-based big-step semantics of While with interactive I/O. We have devised constructive-style definitions of important concepts on resumptions such
as termination-sensitive weak bisimilarity and responsiveness, and devised two variations of delay-free
big-step semantics for programs that produce responsive and committed resumptions, respectively. Responsiveness is for interactive computation what termination is for noninteractive computation. And
72
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
likewise, committedness compares to a decided domain of definedness. Indeed, all three variations of
big-step semantics for While with interactive I/O have counterparts in big-step semantics for noninteractive While (see Appendix). Mathematically, we find it reassuring that observations made for a more
simpler noninteractive While naturally scale to a more involved language with interactive I/O. The central ideas are a concept of termination-sensitive weak bisimilarity tailored for constructive reasoning and
the organization of evaluation in the delay-free semantics as an induction nested into coinduction.
Technically, we have carried out an advanced exercise in programming and reasoning with mixed
induction and coinduction, which we have also formalized in Coq. The challenges in this exercise were
both mathematical and tool-related (Coq-specific). We deem that the mathematical part was more interesting and important. The main new aspect in comparison to our earlier development of coinductive
trace-based big-step semantics for noninteractive While was the need to deal with definitions of predicates that nest induction into coinduction—a relatively unexplored area in type theory. In Coq, we
formalized them by parameterizing the inductive definition and converting the coinductive definition
into Mendler-like format. Apparently, this technique is novel for the Coq community.
As future work, we would like to scale our development to concurrency.
Acknowledgments We thank Andreas Lochbihler, Nils Anders Danielsson and Thorsten Altenkirch
for discussions.
This research was supported by the Estonian Centre of Excellence in Computer Science, EXCS,
funded by the European Regional Development Fund, and the Estonian Science Foundation grant no. 6940.
References
[1] J. Bergstra, J. Klop & E.-R. Olderog (1987): Failures without chaos: A new process semantics for fair
abstraction. In: M. Wirsing (ed.) Proc. of 3rd IFIP TC2/WG2.2 Working Conf. on Formal Description of
Programming Concepts (Ebberup, Aug. 1986). North Holland, Amsterdam, pp. 77–101.
[2] Y. Bertot (2007):
A survey of programming language semantics styles. Coq development,
http://www-sop.inria.fr/marelle/Yves.Bertot/proofs.html
[3] A. Bohannon, B. C. Pierce, V. Sjöberg, S. Weirich & S. Zdancewic (2009): Reactive noninterference. In:
Proc. of 2009 ACM Conf. on Computer and Communications Security, CCS 2009 (Chicago, IL, Nov. 2009),
ACM Press, New York, pp. 79–90.
[4] V. Capretta (2005): General recursion via coinductive types. Logical Methods in Computer Science 1(2),
article 1.
[5] P. Cenciarelli & E. Moggi (1993): A syntactic approach to modularity in denotational semantics. In: Proc. of
5th Biennial Meeting on Category Theory and Computer Science, CTCS ’93 (Amsterdam, Sept. 1993) Tech.
report, CWI, Amsterdam.
[6] N. A. Danielsson & T. Altenkirch (2009):
Mixing
http://www.cs.nott.ac.uk/~nad/publications/.
induction
and
coinduction.
Draft,
[7] N. A. Danielsson & T. Altenkirch (2010): Subtyping, declaratively: an exercise in mixed induction and
coinduction. In C. Bolduc, J. Desharnais & B. Ktari (Eds.): Proc. of 10th Int. Conf. on Mathematics of
Program Construction, MPC 2010 (Québec City, July 2010), Lect. Notes in Comput. Sci. 6120. Springer,
Berlin, pp. 100–118.
[8] M. Ghani, P. Hancock & D. Pattinson (2009): Continuous functions on final coalgebras. In: S. Abramsky,
M. Mislove & C. Palamidessi (eds.) Proc. of 25th Conf. on Mathematical Foundations of Programming
Semantics, MFPS-25 (Oxford, Apr. 2009). Electr. Notes in Theor. Comput. Sci. 249. Elsevier, Amsterdam,
pp. 3–18.
K. Nakata & T. Uustalu
73
[9] E. Giménez (1995): Codifying guarded definitions with recursive schemes. In P. Dybjer, B. Nordström & J.
M. Smith (Eds.): Selected Papers from Int. Wksh. on Types for Proofs and Programs, TYPES ’94 (Båstad,
June 1994), Lect. Notes in Comput. Sci. 996. Springer, Berlin, pp. 39–59
[10] C. A. Gunter, P. D. Mosses & D. S. Scott (1989): Semantic Domains and Denotational Semantics.
[11] P. Hancock, D. Pattinson & N. Ghani (2009): Representations of stream processors using nested fixed points.
Logical Methods in Computer Science 5(3), article 9.
[12] P. Hancock & A. Setzer, A. (2000): Interactive programs in dependent type theory. In: P. Clote &
H. Schwichtenberg (eds.): Proc. of 14th Int. Wksh. on Computer Science Logic, CSL 2000 (Fischbachau,
Aug. 2000). Lect. Notes in Comput. Sci. 1862. Springer, Berlin, pp. 317–331.
[13] A. Kučera & R. Mayr (2002): Weak bisimilarity between finite-state systems and BPA or normed BPP is
decidable in polynomial time. Theor. Comput. Sci. 270(1–2), pp. 677–700.
[14] X. Leroy & H. Grall (2009): Coinductive big-step operational semantics. Inform. and Comput. 207(2),
pp. 285-305.
[15] N. P. Mendler (1991): Inductive types and type constraints in the second-order lambda calculus. Ann. of
Pure and Appl. Logic 51(1–2), pp. 159–172.
[16] R. Milner (1989): Communication and Concurrency. Prentice Hall, New York.
[17] K. Nakata & T. Uustalu (2009): Trace-based coinductive operational semantics for While: big-step and
small-step, relational and functional styles. In: S. Berghofer, T. Nipkow, C. Urban & M. Wenzel (eds.) Proc.
of 22nd Int. Conf. on Theorem Proving in Higher-Order Logics, TPHOLs 2009 (Munich, Aug. 2009). Lect.
Notes in Comput. Sci. 5674. Springer, Berlin, pp. 375-390.
[18] K. Nakata & T. Uustalu (2010): A Hoare logic for the coinductive trace-based big-step semantics of While.
In: A. D. Gordon (ed.) Proc. of 19th Europ. Symp. on Programming, ESOP 2010 (Paphos, March 2010).
Lect. Notes in Comput. Sci. 6012. Springer, Berlin, pp. 488–506.
[19] K. Nakata & T. Uustalu (2010): Mixed induction-coinduction at work for Coq (abstract). Abstract of talk
presented at 2nd Coq Workshop (Edinburgh, July 2010), with accompanying slides and Coq development.
[20] G. D. Plotkin (1983): Domains (“Pisa Notes”). Unpublished notes.
[21] J. Rutten (1999): A note on coinduction and weak bisimilarity for While programs. Theor. Inform. and Appl.
33(4-5), pp. 393-400.
A
Resumptions, Weak Bisimilarity, Delayful, Delay-Free and ClassicalStyle Big-step Semantics for While
The notions of resumptions and weak bisimilarity and the evaluation relations in the three big-step semantics shown of the main text are fairly involved, because of the amount of detail. Therefore, we also
spell out what they specialize (or degenerate) to in the case of ordinary non-interactive While, to better
highlight the phenomena that arise even in the absence of interaction.
A.1
Resumptions, Bisimilarity, Weak Bisimilarity
Delayful resumptions, with their strong bisimilarity, specialize to delayed states r : res à la Capretta [4]
defined coinductively.
σ : state
ret σ : res
r : res
δ r : res
ret σ ≈ ret σ
r ≈ r∗
δ r ≈ δ r∗
Resumptions, Weak Bisimilarity and Big-Step Semantics for While
74
Convergence and (silent) divergence are defined inductively resp. coinductively; convergence reduces to
termination at a final state.
r ↓ r′
δ r ↓ r′
ret σ ↓ ret σ
r↑
δ r↑
Responsiveness reduces to termination. Commitedness becomes decidability between and termination
and divergence. Commitedness is tautologically true only classically.
Weak bisimilarity is defined in terms of convergence coinductively exactly as Capretta [4] did.
r∼
= r∗
δ r∼
= δ r∗
r ↓ ret σ r∗ ↓ ret σ
r∼
= r∗
Any terminating delayed state can be normalized into a state. Any decided delayed state can be normalized into a choice between a state or a special divergence token.
A.2
Delayful Semantics
In the delayful big-step semantics, evaluation and extended evaluation are defined mutually coinductively
as follows.
(s0 , σ ) ⇒ r
(x := e, σ ) ⇒ δ (ret σ [x 7→ JeKσ ])
e |= σ
(skip, σ ) ⇒ ret σ
∗
(st , δ (ret σ )) ⇒ r
(if e then st else s f , σ ) ⇒ r
e |= σ
∗
e 6|= σ
(s0 ; s1 , σ ) ⇒ r′
∗
(s f , δ (ret σ )) ⇒ r
(if e then st else s f , σ ) ⇒ r
∗
(st , δ (ret σ )) ⇒ r
e 6|= σ
(while e do st , r) ⇒ r′
(while e do st , σ )
(while e do st , σ ) ⇒ δ (ret σ )
⇒ r′
(s, σ ) ⇒ r
∗
(s, ret σ ) ⇒ r
∗
(s1 , r) ⇒ r′
∗
(s, r) ⇒ r′
∗
(s, δ r) ⇒ δ r′
We have previously [17] conducted a thorough study of a variation of this semantics (with intermediate
states instead of delays), explaining the design considerations in great detail. We have also [18] developed
a Hoare logic for this semantics.
A.3
Delay-Free Semantics
Delay-free resumptions are the same as states.
In the delay-free semantics, there is one inductive evaluation relation for terminating configurations.
There is no need for a separate extended evaluation relation (which would coincide with evaluation
anyhow, since resumptions and states are the same thing) and no need to parameterize the evaluation
relation.
(x := e, σ ) ⇒↓ σ [x 7→ JeKσ ]
(skip, σ ) ⇒↓ σ
e |= σ (st , σ ) ⇒↓ σ ′
(if e then st else s f , σ ) ⇒↓ σ ′
e |= σ
e 6|= σ
(s0 , σ ) ⇒↓ σ ′ (s1 , σ ′ ) ⇒↓ σ ′′
(s0 ; s1 , σ ) ⇒↓ σ ′′
(s f , σ ) ⇒↓ σ ′
(if e then st else s f , σ ) ⇒↓ σ ′
(st , σ ) ⇒↓ σ ′ (while e do st , σ ′ ) ⇒↓ σ ′′
(while e do st , σ ) ⇒↓ σ ′′
e 6|= σ
(while e do st , σ ) ⇒↓ σ
K. Nakata & T. Uustalu
75
The delay-free semantics agrees with the delayful semantics for terminating delayed states.
It is the textbook big-step semantics of While, which accounts for terminating configurations and
assigns no evaluation result to diverging configurations.
A.4
Classical-Style Semantics
A classical-style resumption is a state or the special token • for divergence.
σ : state
retc σ : resc
• : resc
The classical-style semantics has an inductively defined terminating evaluation relation (defined exactly as that of the delay-free semantics) and a coinductively defined diverging evaluation relation. The
latter depends on the former, but not the other way around. There is no need for an extended evaluation
relation.
(x := e, σ ) ⇒↓ σ [x 7→ JeKσ ]
(skip, σ ) ⇒↓ σ
e 6|= σ
e |= σ (st , σ ) ⇒↓ σ ′
(if e then st else s f , σ ) ⇒↓ σ ′
e |= σ
(s0 , σ ) ⇒↑
(s0 , σ ) ⇒↓ σ ′ (s1 , σ ′ ) ⇒↓ σ ′′
(s0 ; s1 , σ ) ⇒↓ σ ′′
(s f , σ ) ⇒↓ σ ′
(if e then st else s f , σ ) ⇒↓ σ ′
(st , σ ) ⇒↓ σ ′ (while e do st , σ ′ ) ⇒↓ σ ′′
(while e do st , σ ) ⇒↓ σ ′′
(s0 , σ ) ⇒↓ σ ′
(s0 ; s1 , σ ) ⇒↑
(s1 , σ ′ ) ⇒↑
(s0 ; s1 , σ ) ⇒↑
e |= σ
(st , σ ) ⇒↑
e |= σ
e 6|= σ
(while e do st , σ ) ⇒↓ σ
(st , σ ) ⇒↑
(if e then st else s f , σ ) ⇒↑
e |= σ
(st
, σ ) ⇒↓ σ ′
(while e do st , σ ) ⇒↑
(s, σ ) ⇒↓ retc σ ′
(s, σ ) ⇒c σ ′
e 6|= σ
(s f , σ ) ⇒↑
(if e then st else s f , σ ) ⇒↑
(while e do st , σ ′ ) ⇒↑
(while e do st , σ ) ⇒↑
(s, σ ) ⇒↑
(s, σ ) ⇒c •
The classical-style semantics agrees with the delayful semantics for decided delayed states (classically, any delayed state is decided).
A semantics in this spirit (with separate convergent and divergent evaluation relations) was proposed
for untyped lambda calculus by Leroy and Grall [14].
The delayful semantics (together with the identification of weakly bisimilar delayed states) and the
classical-style semantics have the same purposes, but the delayful semantics is better behaved from the
constructive point-of-view. As a practical consequence, it has the advantage that the evaluation relation
can be turned into a function (highly desirable, if one wants to be able to directly execute the big-step
semantics). This is not possible with the classical-style semantics, as one would have to be able to decide
whether a configuration terminates before actually running it.
| 6cs.PL
|
Two-stage algorithms for covering array construction
arXiv:1606.06730v1 [cs.DS] 21 Jun 2016
Kaushik Sarkar and Charles J. Colbourn
School of Computing, Informatics, and Decision Systems Engineering
Arizona State University, PO Box 878809
Tempe, Arizona, 85287-8809, U.S.A.
June 23, 2016
Abstract
Modern software systems often consist of many different components, each with a number of options.
Although unit tests may reveal faulty options for individual components, functionally correct components
may interact in unforeseen ways to cause a fault. Covering arrays are used to test for interactions
among components systematically. A two-stage framework, providing a number of concrete algorithms,
is developed for the efficient construction of covering arrays. In the first stage, a time and memory
efficient randomized algorithm covers most of the interactions. In the second stage, a more sophisticated
search covers the remainder in relatively few tests. In this way, the storage limitations of the sophisticated
search algorithms are avoided; hence the range of the number of components for which the algorithm can
be applied is extended, without increasing the number of tests. Many of the framework instantiations
can be tuned to optimize a memory-quality trade-off, so that fewer tests can be achieved using more
memory. The algorithms developed outperform the currently best known methods when the number
of components ranges from 20 to 60, the number of options for each ranges from 3 to 6, and t-way
interactions are covered for t ∈ {5, 6}. In some cases a reduction in the number of tests by more than
50% is achieved.
Keywords: Covering array, Software interaction testing, Combinatorial construction algorithm
1
Introduction
Real world software and engineered systems are composed of many different components, each with a number
of options, that are required to work together in a variety of circumstances. Components are factors, and
options for a component form the levels of its factor. Although each level for an individual factor can be tested
in isolation, faults in deployed software can arise from interactions among levels of different factors. When
an interaction involves levels of t different factors, it is a t-way interaction. Testing for faults caused by t-way
interactions for every t is generally infeasible, as a result of a combinatorial explosion. However, empirical
research on real world software systems indicates that testing all possible 2-way (or 3-way) interactions
would detect 70% (or 90%) of all faults [25]. Moreover, testing all possible 6-way interactions is sufficient
for detection of 100% of all faults in the systems examined in [25]. Testing all possible t-way interactions for
some 2 ≤ t ≤ 6 is pseudo-exhaustive testing [24], and is accomplished with a combinatorial array known as
a covering array.
Formally, let N, t, k, and v be integers with k ≥ t ≥ 2 and v ≥ 2. A covering array CA(N ; t, k, v) is an
N × k array A in which each entry is from a v-ary alphabet Σ, and for every N × t sub-array B of A and
every x ∈ Σt , there is a row of B that equals x. Then t is the strength of the covering array, k is the number
of factors, and v is the number of levels.
When k is a positive integer, [k] denotes the set {1, . . . , k}. A t-way interaction is {(ci , ai ) : 1 ≤ i ≤
t, ci ∈ [k], ci 6= cj for i 6= j, and ai ∈ Σ}. So an interaction is an assignment of levels from Σ to t of the k
factors. It,k,v denotes the set of all kt v t interactions for given t, k and v. An N × k array A covers the
1
interaction ι = {(ci , ai ) : 1 ≤ i ≤ t, ci ∈ [k], ci 6= cj for i 6= j, and ai ∈ Σ} if there is a row r in A such that
A(r, ci ) = ai for 1 ≤ i ≤ t. When there is no such row in A, ι is not covered in A. Hence a CA(N ; t, k, v)
covers all interactions in It,k,v .
Covering arrays are used extensively for interaction testing in complex engineered systems. To ensure
that all possible combinations of options of t components function together correctly, one needs examine
all possible t-way interactions. When the number of components is k, and the number of different options
available for each component is v, each row of CA(N ; t, k, v) represents a test case. The N test cases
collectively test all t-way interactions. For this reason, covering arrays have been used in combinatorial
interaction testing in varied fields like software and hardware engineering, design of composite materials,
and biological networks [8, 24, 26, 32, 34].
The cost of testing is directly related to the number of test cases. Therefore, one is interested in covering
arrays with the fewest rows. The smallest value of N for which CA(N ; t, k, v) exists is denoted by CAN(t, k, v).
Efforts to determine or bound CAN(t, k, v) have been extensive; see [12, 14, 24, 31] for example. Naturally one
would prefer to determine CAN(t, k, v) exactly. Katona [22] and Kleitman and Spencer [23] independently
showed that
for t = v = 2, the minimum number of rows N in a CA(N ; 2, k, 2) is the smallest N for which
−1
. Exact determination of CAN(t, k, v) for other values of t and v has remained open. However,
k≤ N
N
d2e
some progress has been made in determining upper bounds for CAN(t, k, v) in the general case; for recent
results, see [33].
For practical applications such bounds are often unhelpful, because one needs explicit covering arrays to
use as test suites. Explicit constructions can be recursive, producing larger covering arrays using smaller ones
as ingredients (see [14] for a survey), or direct. Direct methods for some specific cases arise from algebraic,
geometric, or number-theoretic techniques; general direct methods are computational in nature. Indeed
when k is relatively small, the best known results arise from computational techniques [13], and these are
in turn essential for the successes of recursive methods. Unfortunately, the existing computational methods
encounter difficulties as k increases, but is still within the range needed for practical applications. Typically
such difficulties arise either as a result of storage or time limitations or by producing covering arrays that
are too big to compete with those arising from simpler recursive methods.
Cohen [11] discusses commercial software where the number of factors often exceeds 50. Aldaco et al. [1]
analyze a complex engineered system having 75 factors, using a variant of covering arrays. Android [3] uses
a Configuration class to describe the device configuration; there are 17 different configuration parameters
with 3 − 20 different levels. In each of these cases, while existing techniques are effective when the strength
is small, these moderately large values of k pose concerns for larger strengths.
In this paper, we focus on situations in which every factor has the same number of levels. These cases
have been most extensively studied, and hence provide a basis for making comparisons. In practice, however,
often different components have different number of levels, which is captured by extending the notion of a
covering array. A mixed covering array MCA(N ; t, k, (v1 , v2 , . . . , vk )) is an N × k array in which the ith
column contains vi symbols for 1 ≤ i ≤ k. When {i1 , . . . , it } ⊆ {1, . . . , k} is
Qat set of t columns, in the N × t
subarray obtained by selecting columns i1 , . . . , it of the MCA, each of the j=1 vij distinct t-tuples appears
as a row at least once. Although we examine the uniform case in which v1 = · · · = vk , the methods developed
here can all be directly applied to mixed covering arrays as well.
Inevitably, when k > max(t + 1, v + 2), a covering array must cover some interactions more than once,
for if not they are orthogonal arrays [20]. Treating the rows of a covering array in a fixed order, each row
covers some number of interactions not covered by any earlier row. For a variety of known constructions,
the initial rows cover many new interactions, while the later ones cover very few [7]. Comparing this rate
of coverage for a purely random method and for one of the sophisticated search techniques, one finds little
difference in the initial rows, but very substantial differences in the final ones. This suggests strategies to
build the covering array in stages, investing more effort as the number of remaining uncovered interactions
declines.
In this paper we propose a new algorithmic framework for covering array construction, the two-stage
framework. In the first stage, a randomized row construction method builds a specified number of rows to
cover all but at most a specified, small number of interactions. As we see later, by dint of being randomized
2
this uses very little memory. The second stage is a more sophisticated search that adds few rows to cover the
remaining uncovered interactions. We choose search algorithms whose requirements depend on the number
of interactions to be covered, to profit from the fact that few interactions remain. By mixing randomized and
deterministic methods, we hope to retain the fast execution and small storage of the randomized methods,
along with the accuracy of the deterministic search techniques.
We introduce a number of algorithms within the two-stage framework. Some improve upon best known
bounds on CAN(t, k, v) (see [33]) in principle. But our focus is on the practical consequences: The twostage algorithms are indeed quite efficient for higher strength (t ∈ {5, 6}) and moderate number of levels
(v ∈ {3, 4, 5, 6}), when the number of factors k is moderately high (approximately in the range of 20 − 80
depending on value of t and v). In fact, for many combination of t, k and v values the two-stage algorithms
beat the previously best known bounds.
Torres-Jimenez et al. [36] explore a related two-stage strategy. In their first stage, an in-parameter-order
greedy strategy (as used in ACTS [24]) adds a column to an existing array; in their second stage, simulated
annealing is applied to cover the remaining interactions. They apply their methods when t = v = 3, when
the storage and time requirements for both stages remain acceptable. In addition to the issues in handling
larger strengths, their methods provide no a priori bound on the size of the resulting array. In contrast with
their methods, ours provide a guarantee prior to execution with much more modest storage and time.
The rest of the paper is organized as follows. Section 2 reviews algorithmic methods of covering array
construction, specifically the randomized algorithm and the density algorithm. This section contrasts these
two methods and points out their limitations. Then it gives an intuitive answer to the question of why a two
stage based strategy might work and introduces the general two-stage framework. Section 3 introduces some
specific two-stage algorithms. Section 3.1 analyzes and evaluates the naı̈ve strategy. Section 3.2 describes a
two-stage algorithm that combines the randomized and the density algorithm. Section 3.3 introduces graph
coloring based techniques in the second stage. Section 3.4 examines the effect of group action on the size
of the constructed covering arrays. Section 4 compares the results of various two-stage algorithms with the
presently best known sizes. In Section 5 we discuss the Lovász local lemma (LLL) bounds on CAN(t, k, v)
and provide a Moser-Tardos type randomized algorithm for covering array construction that matches the
bound. Although the bound was known [18], the proof was non-constructive, and a constructive algorithm to
match this bound seems to be absent in the literature. We explore potentially better randomized algorithms
for the first stage using LLL based techniques, We also obtain a two-stage bound that improves the LLL
bound for CAN(t, k, v). We conclude the paper in Section 6.
2
Algorithmic construction of covering arrays
Available algorithms for the construction of covering arrays are primarily heuristic in nature; indeed exact
algorithms have succeeded for very few cases. Computationally intensive metaheuristic search methods such
as simulated annealing, tabu search, constraint programming, and genetic algorithms have been employed
when the strength is relatively small or the number of factors and levels is small. These methods have
established many of the best known bounds on sizes of covering arrays [13], but for many problems of
practical size their time and storage requirements are prohibitive. For larger problems, the best available
methods are greedy. The IPO family of algorithms [24] repeatedly adds one column at a time, and
then adds
new rows to ensure complete coverage. In this way, at any point in time, the status of v t k−1
t−1 interactions
may be stored. AETG [10] pioneered a different method, which greedily selects one row at a time to cover
a large number of as-yet-uncovered interactions. They establish that if a row can be chosen that covers the
maximum number, a good a priori bound on the size of the covering array can be computed. Unfortunately
selecting the maximum is NP-hard, and even if one selects the maximum there is no guarantee that the
covering array is the smallest possible
[7], so AETG resorts to a good heuristic selection of the next row by
examining the stored status of v t kt interactions. None of the methods so far mentioned therefore guarantee
to reach an a priori bound. An
extension of the AETG strategy, the density algorithm [5, 6, 15], stores
additional statistics for all v t kt interactions in order to ensure the selection of a good next row, and hence
guarantees to produce an array with at most the precomputed number of rows. Variants of the density
3
Algorithm 1: A randomized algorithm for covering array construction.
Input: t : strength of the covering array, k : number of factors, v : number of levels for each factor
Output: A : a CA(N ;
t, k, v)
log (kt)+t log v
1 Set N :=
;
vt
log
2
3
4
5
6
7
8
9
10
11
12
v t −1
repeat
Construct an N × k array A where each entry is chosen independently and uniformly at random
from a v-ary alphabet;
Set covered := true;
for each interaction ι ∈ It,k,v do
if ι is not covered in A then
Set covered := false;
break;
end
end
until covered = true;
Output A;
algorithm have proved to be most effective for problems of moderately large size. For even larger problems,
pure random approaches have been applied.
To produce methods that provide a guarantee on size, it is natural to focus on the density algorithm
in order to understand its strengths and weaknesses. To do this, we contrast it with a basic randomized
algorithm. Algorithm 1 shows a simple randomized algorithm for covering array construction. The algorithm
constructs an array of a particular size randomly and checks whether all the interactions are covered. It
repeats until it finds an array that covers all the interactions.
log (kt)+t log v
is guaranteed to exist:
A CA(N ; t, k, v) with N =
vt
log
v t −1
Theorem 1. [21, 27, 35] (Stein-Lovász-Johnson (SLJ) bound): Let t, k, v be integers with k ≥ t ≥ 2, and
v ≥ 2. Then as k → ∞,
log kt + t log v
CAN(t, k, v) ≤
t
log vtv−1
In fact, the probability that the N × k array constructed in line 3 of Algorithm 1 is a valid covering array
is high enough that the expected number of times the loop in line 2 is repeated is a small constant.
An alternative strategy is to add rows one by one instead of constructing the full array at the outset. We
start with an empty array, and whenever we add a new row we ensure that it covers at least the expected
number of previously uncovered interactions for a randomly chosen row. The probability that an uncovered
interaction is covered by a random row is 1/v t . If the number of uncovered interactions is u, then by linearity
of expectation, the expected number of newly covered interactions in a randomly chosen row is uv −t . If each
row added covers exactly this expected number, we obtain the same number of rows as the SLJ bound,
realized in Algorithm 1. But because the actual number of newly covered interactions is always an integer,
each added row covers at least duv −t e interactions. This is especially helpful towards the end when the
expected number is a small fraction.
Algorithm 2 follows this strategy. Again the probability that a randomly chosen row covers at least the
expected number of previously uncovered interactions is high enough that the expected number of times the
row selection loop in line 6 of Algorithm 2 is repeated is bounded by a small constant.
We can obtain an upper bound on the size produced by Algorithm 2 by assuming that each new row
added covers exactly duv −t e previously uncovered interactions. This bound is the discrete Stein-Lovász4
Algorithm 2: A randomized algorithm for covering array construction using the discrete SLJ strategy.
Input: t : strength of the covering array, k : number of factors, v : number of levels for each factor
Output: A : a CA(N ; t, k, v)
1 Let A be an empty array;
k t
2 Initialize a table T indexed by all t v interactions, marking every interaction “uncovered”;
3 while there is an interaction marked “uncovered” in T do
4
Let u be the number of interactions marked “uncovered” in T ;
5
Set expectedCoverage := d vut e;
6
repeat
7
Let r be a row of length k where each entry is chosen independently and uniformly at random
from a v-ary alphabet;
8
Let coverage be the number of “uncovered” interactions in T that are covered in row r;
9
until coverage > expectedCoverage;
10
Add r to A;
11
Mark all interactions covered by r as “covered” in T ;
12 end
13 Output A;
Johnson (discrete SLJ) bound. Figure 1 compares the sizes of covering arrays obtained from the SLJ and
the discrete SLJ bounds for different values of k when t = 6 and v = 3. Consider a concrete example, when
t = 5, k = 20, and v = 3. The SLJ bound guarantees the existence of a covering array with 12499 rows,
whereas the discrete SLJ bound guarantees the existence of a covering array with only 8117 rows.
The density algorithm replaces the loop at line 6 of Algorithm 2 by a conditional expectation derandomized method. For fixed v and t the density algorithm selects a row efficiently (time polynomial in k) and
deterministically that is guaranteed to cover at least duv −t e previously uncovered interactions. In practice,
for small values of k the density algorithm works quite well, often covering many more interactions than
the minimum. Many of the currently best known CAN(t, k, v) upper bounds are obtained by the density
algorithm in combination with various post-optimization techniques [13].
However, the practical applicability of Algorithm 2 and the density algorithm is limited by the storage
of the table T , representing each of the kt v t interactions. Even when t = 6, v = 3, and k = 54, there are
18,828,003,285 6-way interactions. This huge memory requirement renders the density algorithm impractical
for rather small values of k when t ∈ {5, 6} and v ≥ 3. We present an idea to circumvent this large
requirement for memory, and develop it in full in Section 3.
2.1
Why does a two stage based strategy make sense?
Compare the two extremes, the density algorithm and Algorithm 1. On one hand, Algorithm 1 does not suffer
from any substantial storage restriction, but appears to generate many more rows than the density algorithm.
On the other hand, the density algorithm constructs fewer rows for small values of k, but becomes impractical
when k is moderately large. One wants algorithms that behave like Algorithm 1 in terms of memory, but
yield a number of rows competitive with the density algorithm.
For t = 6, k = 16, and v = 3, Figure 2 compares the coverage profile for the density algorithm and
Algorithm 1. We plot the number of newly covered interactions for each row in the density algorithm, and
the expected number of newly covered interactions for each row for Algorithm 1. The qualitative features
exhibited by this plot are representative of the rates of coverage for other parameters.
Two key observations are suggested by Figure 2. First, the expected coverage in the initial random rows
is similar to the rows chosen by the density algorithm. In this example, the partial arrays consisting of the
first 1000 rows exhibit similar coverage, yet the randomized algorithm needed no extensive bookkeeping.
Secondly, as later rows are added, the judicious selections of the density algorithm produce much larger
coverage per row than Algorithm 1. Consequently it appears sensible to invest few computational resources
5
4
3.5
x 10
SLJ bound
Discrete SLJ bound
N − number of rows
3
2.5
2
1.5
1
0.5
0
100
200
300
400
500
k
600
700
800
900
1000
Figure 1: Comparison of covering array sizes obtained from SLJ bound and discrete SLJ bound for different
values of k, when t = 6 and v = 3.
9000
Density
Basic Random
Number of newly covered interactions
8000
7000
6000
5000
4000
3000
2000
1000
0
0
2000
4000
6000
Row number
8000
10000
12000
Figure 2: For t = 6, k = 16 and v = 3, the actual number of newly covered interactions of the density
algorithm and the expected number of newly covered interactions in a random array.
6
on the initial rows, while making more careful selections in the later ones. This forms the blueprint of our
general two-stage algorithmic framework shown in Algorithm 3.
Algorithm 3: The general two-stage framework for covering array construction.
Input: t : strength of the required covering array, k : number of factors, v : number of levels for each
factor
Output: A : a CA(N ; t, k, v)
1 Choose a number n of rows and a number ρ of interactions;
// First Stage
0
2 Use a randomized algorithm to construct an n × k array A ;
0
3 Ensure that A covers all but at most ρ interactions;
0
4 Make a list L of interactions that are not covered in A (L contains at most ρ interactions);
// Second Stage
0
5 Use a deterministic procedure to add N − n rows to A to cover all the interactions in L;
6 Output A;
A specific covering array construction algorithm results by specifying the randomized method in the first
stage, the deterministic method in the second stage, and the computation of n and ρ. Any such algorithm
produces a covering array, but we wish to make selections so that the resulting algorithms are practical while
still providing a guarantee on the size of the array. In Section 3 we describe different algorithms from the
two-stage family, determine the size of the partial array to be constructed in the first stage, and establish
upper bound guarantees. In Section 4 we explore how good the algorithms are in practice.
3
Two-stage framework
For the first stage we consider two methods:
Rand
MT
the basic randomized algorithm
the Moser-Tardos type algorithm
We defer the development of method MT until Section 5. Method Rand uses a simple variant of Algorithm
1, choosing a random n × k array.
For the second stage we consider four methods:
Naive
Greedy
Den
Col
the
the
the
the
naı̈ve strategy, one row per uncovered interaction
online greedy coloring strategy
density algorithm
graph coloring algorithm
Using these abbreviations, we adopt a uniform naming convention for the algorithms: TS hA, Bi is the algorithm in which A is used in the first stage, and B is used in the second stage. For example, TS hMT, Greedyi
denotes a two-stage algorithm where the first stage is a Moser-Tardos type randomized algorithm and the
second stage is a greedy coloring algorithm. Later when the need arises we refine these algorithm names.
3.1
One row per uncovered interaction in the second stage (TS hRand, Naivei)
In the second stage each of the uncovered interactions after the first stage is covered using a new row.
Algorithm 4 describes the method in more detail.
This simple strategy improves on the basic randomized strategy when n is chosen judiciously. For
example, when t = 6, k = 54 and v = 3, Algorithm 1 constructs a covering array with 17, 236 rows. Figure
3 plots an upper bound on the size of the covering array against the number n of rows in the partial array.
7
Algorithm 4: Naı̈ve two-stage algorithm (TS hRand, Naivei).
Input: t : strength of the covering array, k : number of factors, v : number of levels for each factor
Output: A : a CA(N ; t, k, v)
t
log (kt)+t log v+log log vtv−1
;
1 Let n :=
vt
log
1
v t −1
2
Let ρ =
3
repeat
Let A be an n × k array where each entry is chosen independently and uniformly at random from
a v-ary alphabet;
Let uncovNum := 0 and unCovList be an empty list of interactions;
Set covered := true;
for each interaction ι ∈ It,k,v do
if ι is not covered in A then
Set uncovNum :=uncovNum+1;
Add ι to unCovList;
if uncovNum > ρ then
Set covered := false;
break;
end
end
end
until covered= true;
for each interaction ι ∈uncovList do
Add a row to A that covers ι;
end
Output A;
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
log
vt
v t −1
;
8
4
Total number of rows in the Covering array
1.75
x 10
1.7
1.65
1.6
1.55
1.5
1.45
1.4
1.35
1.3
1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
n −− number of rows in the partial array of the first stage
1.8
4
x 10
Figure 3: An upper bound on the size of the covering array against n, the size of the partial array constructed
in the first stage when t = 6, k = 54, and v = 3, with one new row added per uncovered interaction in the
second stage. The minimum size of 13, 162 is obtained when n = 12, 402. Algorithm 1 requires 17, 236 rows,
and the currently best known covering array has 17, 197 rows.
9
The smallest covering array is obtained when n = 12, 402 which, when completed, yields a covering array
with at most 13, 162 rows—a big improvement over Algorithm 1.
A theorem from [33] tells us the optimal value of n in general:
Theorem 2. [33] Let t, k, v be integers with k ≥ t ≥ 2, and v ≥ 2. Then
t
log kt + t log v + log log vtv−1 + 1
.
CAN(t, k, v) ≤
t
log vtv−1
log (kt)+t log v+log log
t
log vtv−1
vt
v t −1
. The expected number of uncovered
The bound is obtained by setting n =
t
interactions is exactly ρ = 1/ log vtv−1 .
Figure 4 compares SLJ, discrete SLJ and two-stage bounds for k ≤ 100, when t = 6 and v = 3. The
two-stage bound does not deteriorate in comparison to discrete SLJ bound as k increases; it consistently
takes only 307-309 more rows. Thus when k = 12 the two-stage bound requires only 6% more rows and
when k = 100 only 2% more rows than the discrete SLJ bound.
4
2.2
x 10
SLJ bound
Discrete SLJ bound
Two−stage bound
2
N − number of rows
1.8
1.6
1.4
1.2
1
0.8
0.6
0.4
10
20
30
40
50
60
70
80
90
100
k
Figure 4: Comparison of covering array sizes obtained from SLJ bound, discrete SLJ bound and two-stage
bound for k ≤ 100, when t = 6 and v = 3. In this range of k values the two-stage bound requires 307-309
more rows than the discrete SLJ bound, that is, 2-6% more rows.
To ensure that the loop in line 7 of Algorithm 4 does not repeat too many times we need to know the
probability with which a random n × k array leaves at most ρ interactions uncovered. Using Chebyshev’s
inequality and the second moment method developed in [2, Chapter 4], we next show that in a random n ×
nk
array the number of uncovered interactions is almost always close to its expectation, i.e. kt v t 1 − v1t .
Substituting the value of n from line 1, this expected value is equal to µ, as in line 2. Therefore, the probability
that a random n × k array covers the desired number of interactions is constant, and the expected number
of times the loop in line 7 is repeated is also a constant (around 2 in practice).
10
Because the theory of the second moment method is developed
considerable detail in [2], here we briefly
Pin
m
mention the relevant concepts and results. Suppose that X = i=1 Xi , where Xi is the indicator random
variable for event Ai for 1 ≤ i ≤ m. For indices i, j, we write i ∼ j if i 6= j and the events Ai , Aj are not
independent. Also suppose that X1 , . . . , Xm are symmetric, i.e. for every i 6= j there is a measure
preserving
P
mapping of the underlying probability space that sends event Ai to event Aj . Define ∆∗ = j∼i Pr [Aj |Ai ].
Then by [2, Corollary 4.3.4]:
Lemma 3. [2] If E[X] → ∞ and ∆∗ = o(E[X]) then X ∼ E[X] almost always.
In our case, Ai denotes the event that the ith interaction is not covered in a n × k array where each entry
n
is chosen independently and uniformly at random from a v-ary alphabet. Then Pr[Xi ] = 1 − v1t . Because
n
there are kt v t interactions in total, by linearity of expectation, E[X] = kt v t 1 − v1t , and E[X] → ∞ as
k → ∞.
Distinct events Ai and Aj are independent if the ith and jth interactions share no column. Therefore,
P
P
k
the event Ai is not independent of at most t t−1
other events Aj . So ∆∗ = j∼i Pr [Aj |Ai ] ≤ j∼i 1 ≤
k
t t−1
= o(E[X]) when v and t are constants. By Lemma 3, the number of uncovered interactions in a random
n × k array is close to the expected number of uncovered interactions. This guarantees that Algorithm 4 is
an efficient randomized algorithm for constructing covering arrays with a number of rows upper bounded by
Theorem 2.
In keeping with the general two-stage framework, Algorithm 4 does not store the coverage status of
each interaction. We only need store the interactions that are uncovered in A, of which there are at most
1
≈ v t . This quantity depends only on v and t and is independent of k, so is effectively a
ρ =
t
log vtv−1
constant that is much smaller than kt v t , the storage requirement for the density algorithm. Hence the
algorithm can be applied to a higher range of k values.
Although Theorem 5 provides asymptotically tighter bounds than Theorem 2, in a range of k values that
are relevant for practical application, Theorem 2 provides better results. Figure 5 compares the bounds on
CAN(t, k, v) with the currently best known results.
4
3
6
x 10
2.5
Best known
Two−stage (simple)
GSS bound
2
2
N − number of rows
N − number of rows
2.5
1.5
1
1.5
1
0.5
0.5
0
0
x 10
Best known
Two−stage (simple)
GSS bound
10
20
30
40
50
60
70
80
90
k
0
5
10
15
20
25
30
35
40
45
50
k
(a) t = 6, v = 3
(b) t = 6, v = 6
Figure 5: Comparison of GSS bound and two-stage bound with the currently best known results
3.2
The density algorithm in the second stage (TS hRand, Deni)
Next we apply the density algorithm in the second stage. Figure 6 plots an upper bound on the size of the
covering array against the size of the partial array constructed in the first stage when the density algorithm
is used in the second stage, and compares it with TS hRand, Naivei. The size of the covering array decreases
11
as n decreases. This is expected because with smaller partial arrays, more interactions remain for the second
stage to be covered by the density algorithm. In fact if we cover all the interactions using the density
algorithm (as when n = 0) we would get an even smaller covering array. However, our motivation was
precisely to avoid doing that. Therefore, we need a ”cut-off” for the first stage.
4
Total number of rows in the Covering array
1.9
x 10
Basic Two−stage
Two−stage with density in second stage
1.8
1.7
1.6
1.5
1.4
1.3
1.2
1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
n −− number of rows in the partial array of the first stage
1.8
4
x 10
Figure 6: Comparison of covering array sizes from two-stage algorithms with Den and Naive in the second
stage. With Den there is no minimum point in the curve; the size of the covering array keeps decreasing as
we leave more uncovered interactions for the second stage.
We are presented with a trade-off. If we construct a smaller partial array in the first stage, we obtain a
smaller covering array overall. But we then pay for more storage and computation time for the second stage.
To appreciate the nature of this trade-off, look at Figure 7, which plots an upper bound on the covering
array size and the number of uncovered interactions in the first stage against n. The improvement in the
covering array size plateaus after a certain point. The three horizontal lines indicate ρ (≈ v t ), 2ρ and 3ρ
uncovered interactions in the first stage. (In the naı̈ve method of Section 3.1, the partial array after the first
stage leaves at most ρ uncovered interactions.) In Figure 7 the final covering array size appears to plateau
when the number of uncovered interactions left by the first stage is around 2ρ. After that we see diminishing
returns — the density algorithm needs to cover more interactions in return for a smaller improvement in the
covering array size.
Let r be the maximum number of interactions allowed to remain uncovered after the first stage. Then r
can be specified in the two-stage algorithm. To accommodate this, we denote by TS hA, B; ri the two-stage
algorithm where A is the first stage strategy, B is the second stage strategy, and r is the maximum number
of uncovered interactions after the first stage. For example, TS hRand, Den; 2ρi applies the basic randomized
algorithm in the first stage to cover all but at most 2ρ interactions, and the density algorithm to cover the
remaining interactions in the second stage.
3.3
Coloring in the second stage (TS hRand, Coli and TS hRand, Greedyi)
Now we describe strategies using graph coloring in the second stage. Construct a graph G = (V, E), the
incompatibility graph, in which V is the set of uncovered interactions, and there is an edge between two
12
Number of rows / Number of uncovered interactions
18000
16000
Num. of rows in the completed CA
Num. of uncovered interaction in first stage
14000
12000
10000
8000
6000
4000
2000
0
0.8
0.9
1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
4
n −− number of rows in the partial array of the first stage
x 10
Figure 7: Final covering array size against the number of uncovered interactions after the first stage. As the
size n of the partial array decreases, the number of uncovered interactions in the first stage increases. Den is
used in the second stage. From bottom to top, the green lines denote ρ, 2ρ, and 3ρ uncovered interactions.
interactions exactly when they share a column in which they have different symbols. A single row can cover
a set of interactions if and only if it forms an independent set in G. Hence the minimum number of rows
required to cover all interactions of G is exactly its chromatic number χ(G), the minimum number of colors
in a proper coloring of G. Graph coloring is an NP-hard problem, so we employ heuristics to bound the
chromatic number. Moreover, G only has vertices for the uncovered interactions after the first stage, so is
size is small relative to the total number of interactions.
The expected number of edges in the incompatibility
graph after
n choosing n rows uniformly at random
k t Pt
t
t k−t
1
1 n
1
t−i
is γ = 2 t v
) 1 − vt
1 − (vt −vt−i ) . Using the elementary upper bound on
i=1 i t−i (v − v
q
the chromatic number χ ≤ 12 + 2m + 14 , where m is the number of edges [16, Chapter 5.2], we can surely
q
cover the remaining interactions with at most 12 + 2m + 14 rows.
The actual number of edges m that remain after the first stage is a random variable with mean γ. In
principle, the first stage could be repeatedly applied until m ≤ γ, so we call m = γ the optimistic estimate.
To ensure that the first stage is expected to be run a small constant number of times, we increase the
estimate. With probability more than 1/2 the incompatibility graph has m ≤ 2γ edges, so m = 2γ is the
conservative estimate.
For t = 6, k = 56, and v = 3, Figure 8 shows the effect on the minimum number of rows when the bound
on the chromatic number in the second stage is used, for the conservative or optimistic estimates. The Naı̈ve
method is plotted for comparison. Better coloring bounds shift the minima leftward, reducing the number
of rows produced in both stages.
Thus far we have considered bounds on the chromatic number. Better estimation of χ(G) is complicated
by the fact that we do not have much information about the structure of G until the first stage is run. In
practice, however, G is known after the first stage and hence an algorithmic method to bound its chromatic
number can be applied. Because the number of vertices in G equals the number of uncovered interactions
13
4
2.2
x 10
Conservative estimate
Optimistic estimate
Simple
Number of rows required
2
1.8
1.6
1.4
1.2
1
1
1.1
1.2
1.3
1.4
N
1.5
1.6
1.7
1.8
4
x 10
Figure 8: Size of the partial array vs. size of the complete CA. t = 6, k = 56, v = 3. Stein-Lovász-Johnson
bound requires 17, 403 rows, discrete Stein-Lovász-Johnson bound requires 13, 021 rows. Simple estimate
for the two stage algorithm is 13, 328 rows, conservative estimate assuming m = 2γ is 12, 159 rows, and
optimistic estimate assuming m = γ is 11, 919 rows. Even the conservative estimate beats the discrete
Stein-Lovász-Johnson bound.
14
after the first stage, we encounter the same trade-off between time and storage, and final array size, as seen
earlier for density. Hence we again parametrize by the expected number of uncovered interactions in the
first stage.
We employ two different greedy algorithms to color the incompatibility graph. In method Col we first
construct the incompatibility graph G after the first stage. Then we apply the commonly used smallest last
order heuristic to order the vertices for greedy coloring: At each stage, find a vertex vi of minimum degree
in Gi , order the vertices of Gi − vi , and then place vi at the end. More precisely, we order the vertices of G
as v1 , v2 , . . . , vn , such that vi is a vertex of minimum degree in Gi , where Gi = G − {vi+1 , . . . , vn }. A graph
is d-degenerate if all of its subgraphs have a vertex with degree at most d. When G is d-degenerate but not
(d − 1)-degenerate, the Coloring number col(G) is d + 1. If we then greedily color the vertices with the first
available color, at most col(G) colors are used.
In method Greedy we employ an on-line, greedy approach that colors the interactions as they are discovered in the first stage. In this way, the incompatibility graph is never constructed. We instead maintain a set
of rows. Some entries in rows are fixed to a specific value; others are flexible to take on any value. Whenever
a new interaction is found to be uncovered in the first stage, we check if any of the rows is compatible with
this interaction. If such a row is found then entries in the row are fixed so that the row now covers the
interaction. If no such row exists, a new row with exactly t fixed entries corresponding to the interaction is
added to the set of rows. This method is much faster than method Col in practice.
3.4
Using group action
Covering arrays that are invariant under the action of a permutation group on their symbols can be easier
to construct and are often smaller [15]. Direct and computational constructions using group actions are
explored in [9, 28]. Sarkar et al. [33] establish the asymptotically tightest known bounds on CAN(t, k, v)
using group actions. In this section we explore the implications of group actions on two-stage algorithms.
Let Γ be a permutation group on the set of symbols. The action of this group partitions the set of
t-way interactions into orbits. We construct an array A such that for every orbit, at least one row covers
an interaction from that orbit. Then we develop the rows of A over Γ to obtain a covering array that is
invariant under the action of Γ. Effort then focuses on covering all the orbits of t-way interactions, instead
of the individual interactions.
If Γ acts sharply transitively
on the set of symbols
(for example, if Γ is a cyclic group of order v) then
the action of Γ partitions kt v t interactions into kt v t−1 orbits of length v each. Following
the lines of the
v t−1
+1
log (kt)+(t−1) log v+log log t−1
−1
v
that covers at
proof of Theorem 2, there exists an n × k array with n =
v t−1
log
v t−1 −1
least one interaction from each orbit. Therefore,
log
CAN(t, k, v) ≤ v
k
t
+ (t − 1) log v + log log
v t−1
log vt−1
−1
v t−1
v t−1 −1
+1
.
(1)
Similarly, we can employ a Frobenius group. When v is a prime power, the Frobenius group is the group
of permutations of Fv of the form {x 7→ ax + b : a, b ∈ Fv , a 6= 0}. The action of the Frobenius group
t−1
partitions the set of t-tuples on v symbols into v v−1−1 orbits of length v(v − 1) (full orbits) each and 1 orbit
of length v (a short orbit). The short orbit consists of tuples of the form (x1 , . . . , xt ) where x1 = . . . = xt .
Therefore, we can obtain a covering array by first constructing an array that covers all the full orbits, and
then developing all the rows over the Frobenius group and adding v constant rows. Using the two stage
strategy in conjunction with the Frobenius group action we obtain:
t−1
v t−1
log kt + log v v−1−1 + log log vt−1
−v+1 + 1
CAN(t, k, v) ≤ v(v − 1)
+ v.
(2)
t−1
v
log vt−1
−v+1
15
4
1.5
x 10
N − number of rows
1.45
Two−stage (simple)
Two−stage (cyclic group action)
Two−stage (Frobenius group action)
1.4
1.35
1.3
1.25
50
55
60
65
70
75
k
Figure 9: Comparison of the simple two-stage bound with the cyclic and the Frobenius two-stage bounds.
t = 6, v = 3 and 50 ≤ k ≤ 75. Group action reduces the required number of rows slightly.
Figure 9 compares the simple two-stage bound with the cyclic and Frobenius two-stage bounds. For
t = 6, v = 3 and 12 ≤ k ≤ 100, the cyclic bound requires 7-21 (on average 16) fewer rows than the simple
bound. In the same range the Frobenius bound requires 17 − 51 (on average 40) fewer rows.
Group action can be applied in other methods for the second stage as well. Colbourn [15] incorporates
group action into the density algorithm, allowing us to apply method Den in the second stage.
Greedy extends easily to use group action, as we do not construct an explicit incompatibility graph.
Whenever we fix entries in a row to cover an uncovered orbit, we commit to a specific orbit representative.
However, applying group action to the incompatibility graph coloring for Col is more complicated. We
need to modify the definition of the incompatibility graph for two reasons. First the vertices no longer
represent uncovered interactions, but rather uncovered orbits of interaction. Secondly, and perhaps more
importantly, pairwise compatibility between every two orbits in a set no longer implies mutual compatibility
among all orbits in the set.
One approach is to form a vertex for each uncovered orbit, placing an edge between two when they share
a column. Rather than the usual coloring, however, one asks for a partition of the vertex set into classes so
that every class induces an acyclic subgraph. Problems of this type are generalized graph coloring problems
[4]. Within each class of such a vertex partition, consistent representatives of each orbit can be selected to
form a row; when a cycle is present, this may not be possible. Unfortunately, heuristics for solving these
types of problems appear to be weak, so we adopt a second approach. As we build the incompatibility
graph, we commit to specific orbit representatives. When a vertex for an uncovered orbit is added, we check
its compatibility with the orbit representatives chosen for the orbits already handled with which it shares
columns; we commit to an orbit representative and add edges to those with which it is now incompatible.
Once completed, we have a (standard) coloring problem for the resulting graph.
Because group action can be applied using each of the methods for the two stages, we extend our naming
to TS hA, B; r, Γi, where Γ can be Trivial (i.e. no group action), Cyclic, or Frobenius.
16
4
Computational results
Figure 5 indicates that even a simple two-stage bound can improve on best known covering array numbers.
Therefore we investigate the actual performance of our two-stage algorithms for covering arrays of strength
5 and 6.
First we present results for t = 6, when v ∈ {3, 4, 5, 6} and no group action is assumed. Table 1 shows the
results for different v values. In each case we select the range of k values where the two-stage bound predicts
smaller covering arrays than
previously known best ones, setting the maximum number of uncovered
tthe
v
interactions as ρ = 1/ log vt −1 ≈ v t . For each value of k we construct a single partial array and then run
the different second stage algorithms on it consecutively. In this way all the second stage algorithms cover
the same set of uncovered interactions.
The column tab lists the best known CAN(t, k, v) upper bounds from [13]. The column bound shows the
upper bounds obtained from the two-stage bound (2). The columns naı̈ve, greedy, col and den show results
obtained from running the TS hRand, Naive; ρ, Triviali, TS hRand, Greedy; ρ, Triviali, TS hRand, Col; ρ, Triviali
and TS hRand, Den; ρ, Triviali algorithms, respectively.
The naı̈ve method always finds a covering array that is smaller than the two-stage bound. This happens
because we repeat the first stage of Algorithm 4 until the array has fewer than v t uncovered interactions.
(If the first stage were not repeated, the algorithm still produce covering arrays that are not too far from
the bound.) For v = 3 Greedy and Den have comparable performance. Method Col produces covering arrays
that are smaller. However, for v ∈ {4, 5, 6} Den and Col are competitive.
Table 2 shows the results obtained by the different second stage algorithms when the maximum number
of uncovered interactions in the first stage is set to 2ρ and 3ρ respectively. When more interactions are
covered in the second stage, we obtain smaller arrays as expected. However, the improvement in size does
not approach 50%. There is no clear winner.
Next we investigate the covering arrays that are invariant under the action of a cyclic group. In Table 3 the
column bound shows the upper bounds from Equation (1). The columns naı̈ve, greedy, col and den show
results obtained from running TS hRand, Naive; ρ, Cyclici, TS hRand, Greedy; ρ, Cyclici, TS hRand, Col; ρ, Cyclici
and TS hRand, Den; ρ, Cyclici, respectively.
Table 4 presents results for cyclic group action based algorithms when the number of maximum uncovered
interactions in the first stage is set to 2ρ and 3ρ respectively.
For the Frobenius group action, we show results only for v ∈ {3, 5} in Table 5. The column bound shows
the upper bounds obtained from Equation (2).
Table 6 presents results for Frobenius group action algorithms when the number of maximum uncovered
interactions in the first stage is 2ρ or 3ρ.
Next we present a handful of results when t = 5. In the cases examined, using the trivial group action
is too time consuming to be practical. However, the cyclic or Frobenius cases are feasible. Tables 7 and 8
compare two stage algorithms when the number of uncovered interactions in the first stage is at most 2ρ.
In almost all cases there is no clear winner among the three second stage methods. Methods Den and
Greedy are, however, substantially faster and use less memory than method Col; for practical purposes they
would be preferred.
All code used in this experimentation is available from the github repository
https://github.com/ksarkar/CoveringArray
under an open source GPLv3 license.
5
Limited dependence and the Moser-Tardos algorithm
Here we explore a different randomized algorithm that produces smaller covering arrays than Algorithm 1.
When k > 2t, there are interactions that share no column. The events of coverage of such interactions are
independent. Moser et al. [29, 30] provide an efficient randomized construction method that exploits this
17
k
tab
bound
53
54
55
56
57
13021
14155
17161
19033
20185
13076
13162
13246
13329
13410
39
40
41
42
43
44
68314
71386
86554
94042
99994
104794
65520
66186
66834
67465
68081
68681
31
32
33
34
35
36
233945
258845
281345
293845
306345
356045
226700
229950
233080
236120
239050
241900
17
18
19
20
21
22
23
24
25
26
27
506713
583823
653756
694048
783784
844834
985702
1035310
1112436
1146173
1184697
486310
505230
522940
539580
555280
570130
584240
597660
610460
622700
634430
naı̈ve
greedy
t = 6, v = 3
13056
12421
13160
12510
13192
12590
13304
12671
13395
12752
t = 6, v = 4
65452
61913
66125
62573
66740
63209
67408
63819
68064
64438
68556
65021
t = 6, v = 5
226503 213244
229829 216444
232929 219514
235933 222516
238981 225410
241831 228205
t = 6, v = 6
486302 449950
505197 468449
522596 485694
539532 502023
555254 517346
569934 531910
584194 545763
597152 558898
610389 571389
622589 583473
634139 594933
col
den
12415
12503
12581
12665
12748
12423
12512
12591
12674
12757
61862
62826
63160
64077
64935
65739
61886
62835
63186
64082
64907
65703
212942
217479
219215
222242
226379
230202
212940
217326
219241
222244
226270
229942
448922
467206
484434
500788
516083
530728
544547
557917
570316
582333
593857
447864
466438
483820
500194
515584
530242
548307
557316
569911
582028
593546
Table 1: Comparison of different TS hRand, −; ρ, Triviali algorithms.
18
k
greedy
2ρ
col
53
54
55
56
57
11968
12135
12286
12429
12562
11958
12126
12129
12204
12290
39
40
41
42
43
44
59433
60090
60715
61330
61936
62530
59323
60479
61527
62488
61839
62899
31
32
33
34
35
36
204105
207243
210308
213267
216082
218884
203500
206659
209716
212675
215521
218314
17
18
19
20
21
22
23
24
25
26
27
425053
443236
460315
476456
491570
505966
519611
532612
544967
556821
568135
-
den
t = 6, v
11968
12050
12131
12218
12296
t = 6, v
59326
59976
60615
61242
61836
62428
t = 6, v
203302
206440
209554
212508
215389
218172
t = 6, v
420333
438754
455941
472198
487501
502009
515774
528868
541353
553377
564827
greedy
=3
11716
11804
11877
11961
12044
=4
58095
58742
59369
59974
60575
61158
=5
199230
202342
205386
208285
211118
213872
=6
412275
430402
447198
463071
478269
492425
505980
518746
531042
542788
554052
3ρ
col
den
11705
11787
11875
12055
12211
11708
11790
11872
11950
12034
57951
58583
59867
61000
60407
61004
57888
58544
59187
59796
60393
60978
198361
201490
204548
-
197889
201068
204107
207060
209936
212707
-
405093
423493
440532
456725
471946
486306
500038
513047
525536
537418
548781
Table 2: Comparison of TS hRand, −; 2ρ, Triviali and TS hRand, −; 3ρ, Triviali algorithms.
19
k
tab
bound
53
54
55
56
57
13021
14155
17161
19033
20185
13059
13145
13229
13312
13393
k
39
40
41
42
43
44
tab
68314
71386
86554
94042
99994
104794
bound
65498
66163
66811
67442
68057
68658
31
32
33
34
35
36
226000
244715
263145
235835
238705
256935
226680
229920
233050
236090
239020
241870
17
18
19
20
21
22
23
24
25
26
27
506713
583823
653756
694048
783784
844834
985702
1035310
1112436
1146173
1184697
486290
505210
522910
539550
555250
570110
584210
597630
610430
622670
624400
naı̈ve
greedy
t = 6, v = 3
13053
12405
13119
12489
13209
12573
13284
12660
13368
12744
t = 6, v = 4
naı̈ve
greedy
65452
61896
66080
62516
66740
63184
67408
63800
68032
64408
68556
64988
t = 6, v = 5
226000 213165
229695 216440
233015 219450
235835 222450
238705 225330
241470 228140
t = 6, v = 6
485616 449778
504546 468156
522258 485586
539280 501972
554082 517236
569706 531852
583716 545562
597378 558888
610026 571380
622290 583320
633294 594786
col
den
12405
12543
12663
12651
12744
12411
12546
12663
12663
12750
col
61860
62820
63144
63780
64692
64964
den
61864
62784
63152
63784
64680
64976
212945
217585
221770
222300
225130
229235
212890
217270
221290
222210
225120
229020
448530
467232
490488
500880
521730
530832
549660
557790
575010
582546
598620
447732
466326
488454
500172
519966
530178
548196
557280
573882
582030
597246
Table 3: Comparison of TS hRand, −; ρ, Cyclicialgorithms.
20
k
greedy
2ρ
col
53
54
55
56
57
11958
12039
12120
12204
12276
11955
12027
12183
12342
12474
39
40
41
42
43
44
59412
60040
60700
61320
61908
62512
59336
59996
61156
62196
63192
64096
31
32
33
34
35
36
204060
207165
207165
213225
216050
218835
203650
209110
209865
212830
217795
218480
17
18
19
20
21
22
23
24
25
26
27
424842
443118
460014
476328
491514
505884
519498
532368
544842
543684
568050
422736
440922
457944
474252
489270
503580
517458
530340
542688
543684
566244
den
t = 6, v
11958
12036
12195
12324
12450
t = 6, v
59304
59964
61032
61976
62852
63672
t = 6, v
203265
208225
209540
212510
217070
218155
t = 6, v
420252
438762
455994
472158
487500
501852
515718
528828
541332
543684
564756
greedy
=3
11700
11790
11862
11949
12027
=4
58076
58716
59356
59932
60568
61152
=5
199180
202255
205380
208225
211080
213770
=6
411954
430506
447186
463062
478038
492372
505824
518700
530754
542664
553704
3ρ
col
den
11691
11874
12057
11937
12021
11694
11868
12027
11943
12024
57976
58616
59252
59840
61124
61048
57864
58520
59160
59760
60904
60988
198455
204495
204720
207790
213425
213185
197870
203250
204080
207025
212040
212695
409158
427638
456468
460164
486180
489336
502806
515754
538056
539922
560820
405018
423468
449148
456630
479970
486264
500040
512940
532662
537396
555756
Table 4: Comparison of TS hRand, −; 2ρ, Cyclici and TS hRand, −; 3ρ, Cyclici algorithms.
21
k
tab
bound
53
54
55
56
57
13021
14155
17161
19033
20185
13034
13120
13203
13286
13366
31
32
33
34
35
36
233945
258845
281345
293845
306345
356045
226570
229820
232950
235980
238920
241760
naı̈ve
greedy
t = 6, v = 3
13029
12393
13071
12465
13179
12561
13245
12633
13365
12723
t = 6, v = 5
226425 213025
229585 216225
232725 219285
234905 222265
238185 225205
241525 227925
col
den
12387
12513
12549
12627
12717
12393
12531
12567
12639
12735
212865
216085
219205
223445
227445
231145
212865
216065
219145
223265
227065
230645
Table 5: Comparison of TS hRand, −; ρ, Frobeniusi algorithms.
k
greedy
2ρ
col
53
54
55
56
57
70
75
80
85
90
11931
12021
12105
12171
12255
13167
13473
13773
14031
14289
11919
12087
12237
12171
12249
13155
13473
13767
14025
14283
31
32
33
34
35
36
50
55
60
65
203785
206965
209985
213005
215765
218605
250625
259785
268185
275785
203485
208965
209645
214825
215545
218285
250365
259625
268025
275665
den
greedy
t = 6, v = 3
11931
11700
12087
11790
12231
11862
12183
11949
12255
12027
13179
13479
13779
14037
14301
t = 6, v = 5
203225 198945
208065 201845
209405 205045
214145 208065
215265 210705
218025 213525
250325
259565
267945
275665
-
3ρ
col
den
11691
11874
12057
11937
12021
-
11694
11868
12027
11943
12024
-
198445
204505
209845
207545
210365
213105
-
197825
203105
207865
206985
209885
212645
-
Table 6: Comparison of TS hRand, −; 2ρ, Frobeniusi and TS hRand, −; 3ρ, Frobeniusi algorithms.
22
k
67
68
69
70
71
tab
59110
60991
60991
60991
60991
greedy
48325
48565
48765
49005
49245
col
48285
48565
49005
48985
49205
den
48305
48585
48985
49025
49245
Table 7: Comparison of TS hRand, −; 2ρ, Frobeniusi algorithms. t = 5, v = 5
k
49
50
51
52
53
tab
122718
125520
128637
135745
137713
greedy
108210
109014
109734
110556
111306
col
108072
108894
110394
110436
111180
den
107988
108822
110166
110364
111120
Table 8: Comparison of TS hRand, −; 2ρ, Cyclici algorithms. t = 5, v = 6
limited dependence. Specializing their method to covering arrays, we obtain Algorithm 5. For the specified
value of N in the algorithm it is guaranteed that the expected number of times the loop in line 3 of Algorithm
5 is repeated is linearly bounded in k (See Theorem 1.2 of [30]).
The upper bound on CAN(t, k, v) guaranteed by Algorithm 5 is obtained by applying the Lovász local
lemma (LLL).
Lemma 4. (Lovász local lemma; symmetric case) (see [2]) Let A1 , A2 , . . . , An events in an arbitrary probability space. Suppose that each event Ai is mutually independent of a set of all other events Aj except for at
most d, and that Pr[Ai ] ≤ p for all 1 ≤ i ≤ n. If ep(d + 1) ≤ 1, then Pr[∩ni=1 Āi ] > 0.
The symmetric version of Lovász local lemma provides an upper bound on the probability of a “bad”
event in terms of the maximum degree of a bad event in a dependence graph, so that the probability that
all the bad events are avoided is non zero. Godbole, Skipper, and Sunley [18] apply Lemma 4 essentially to
obtain the bound on CAN(t, k, v) in line 1 of Algorithm 5.
Theorem 5. [18] Let t, v and k ≥ 2t be integers with t, v ≥ 2. Then
n
o
+ t log v + 1
log kt − k−t
t
CAN (t, k, v) ≤
t
log vtv−1
The bound on the size of covering arrays obtained from Theorem 5 is asymptotically tighter than the
one obtained from Theorem 1. Figure 10 compares the bounds for t = 6 and v = 3.
The original proof of LLL is essentially non-constructive and does not immediately lead to a polynomial
time construction algorithm for covering arrays satisfying the bound of Theorem 5. Indeed no previous
construction algorithms appear to be based on it. However the Moser-Tardos method of Algorithm 5 does
provide a construction algorithm running in expected polynomial time. For sufficiently large values of k
Algorithm 5 produces smaller covering arrays than the Algorithm 1.
But the question remains: Does Algorithm 5 produce smaller covering arrays than the currently best
known results within the range that it can be effectively computed? Perhaps surprisingly, we show that
the answer is affirmative. In Algorithm 5 we do not need to store the coverage information of individual
interactions in memory because each time an uncovered interaction is encountered we re-sample the columns
involved in that interaction and start the check afresh (checking the coverage in interactions in the same
order each time). Consequently, Algorithm 5 can be applied for larger values of k than the density algorithm.
23
Algorithm 5: Moser-Tardos type algorithm for covering array construction.
Input: t : strength of the covering array, k : number of factors, v : number of levels for each factor
Output: A : a CA(N ; t, k, v)
log{(kt)−(k−t
log v+1
)}+t.
t
;
1 Let N :=
vt
log
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
v t −1
Construct an N × k array A where each entry is chosen independently and uniformly at random from
a v-ary alphabet;
repeat
Set covered := true;
for each interaction ι ∈ It,k,v do
if ι is not covered in A then
Set covered := false;
Set missing-interaction := ι;
break;
end
end
if covered = false then
Choose all the entries in the t columns involved in missing-interaction independently and
uniformly at random from the v-ary alphabet;
end
until covered = true;
Output A;
Smaller covering arrays can be obtained by exploiting a group action using LLL, as shown in [33]. Table
9 shows the sizes of the covering arrays constructed by a variant of Algorithm 5 that employs cyclic and
Frobenius group actions. While this single stage algorithm produces smaller arrays than the currently best
known [13], these are already superseded by the two-stage based algorithms.
k
56
57
58
59
60
tab
19033
20185
23299
23563
23563
MT
16281
16353
16425
16491
16557
(a) Frobenius. t = 6, v = 3
k
44
45
46
47
48
tab
411373
417581
417581
423523
423523
MT
358125
360125
362065
363965
365805
(b) Frobenius. t = 6, v = 5
k
25
26
27
28
29
tab
1006326
1040063
1082766
1105985
1149037
MT
1020630
1032030
1042902
1053306
1063272
(c) Cyclic. t = 6, v = 6
Table 9: Comparison of covering array size from Algorithm 5 (MT) with the best known results [13] (tab).
5.1
Moser-Tardos type algorithm for the first stage
The linearity of expectation arguments used in the SLJ bounds permit one to consider situations in which
a few of the “bad” events are allowed to occur, a fact that we exploited in the first stage of the algorithms
thus far. However, the Lovász local lemma does not address this situation directly. The conditional Lovász
local lemma (LLL) distribution, introduced in [19], is a very useful tool.
Lemma 6. (Conditional LLL distribution; symmetric case) (see [2, 33]) Let A = {A1 , A2 , . . . , Al } be a set
of l events in an arbitrary probability space. Suppose that each event Ai is mutually independent of a set of
all other events Aj except for at most d, and that Pr[Ai ] ≤ p for all 1 ≤ i ≤ l. Also suppose that ep(d+1) ≤ 1
(Therefore, by LLL (Lemma 4) Pr[∩li=1 Āi ] > 0). Let B ∈
/ A be another event in the same probability space
24
5
10
N − number of rows
SLJ bound
GSS bound
4
10
3
10
1
10
2
3
10
10
k
4
10
5
10
Figure 10: Comparison of SLJ (Theorem 1) and GSS (Theorem 5) bounds for t = 6 and v = 3. The graph
is plotted in log-log scale to highlight the asymptotic difference between the two bounds.
with Pr[B] ≤ q, such that B is also mutually independent of a set of all other events Aj ∈ A except for at
most d. Then Pr[B| ∩li=1 Āi ] ≤ eq.
We apply the conditional
LLL distribution to obtain an upper bound on the size of partial array that
t
v
leaves at most log vt −1 ≈ v t interactions uncovered. For a positive integer k, let I = {j1 , . . . , jρ } ⊆ [k]
where j1 < . . . < jρ . Let A be an n × k array where each entry is from the set [v]. Let AI denote the n × ρ
array in which AI (i, `) = A(i, j` ) for 1 ≤ i ≤ N and 1 ≤ ` ≤ ρ; AI is the projection of A onto the columns
in I.
Let M ⊆ [v]t be a set of m t-tuples of symbols, and C ∈ [k]
be a set of t columns. Suppose the
t
entries in the array A are chosen independently from [v] with uniform probability.
Let BC denote the event
that at least one of the tuples in M is not covered in AC . There are η = kt such events, and for all of
n
them Pr[BC ] ≤ m 1 − v1t . Moreover, when k ≥ 2t, each of the events is mutually independent of all
k
other events except for at most ρ = kt − k−t
− 1 < t t−1
. Therefore, by the Lovász local lemma, when
t
1 n
eρm 1 − vt ≤ 1, none of the events BC occur. Solving for n, when
n≥
log(eρm)
t
log vtv−1
(3)
there exists an n × k array A over [v] such that for all C ∈ [k]
t , AC covers all the m tuples in M . In fact
we can use a Moser-Tardos type algorithm to construct such an array.
Let ι be an interaction whose t-tuple
n of symbols is not in M . Then the probability that ι is not covered
in an n × k array is at most 1 − v1t
when each entry of the array is chosen independently from [v] with
uniform probability. Therefore, by the
conditional LLL distribution the probability that ι1 is
n not covered
in the array A where for all C ∈ [k]
. Moreover,
t , AC covers all the m tuples in M is at most e 1 − v t
there are η(v t − m) such interactions ι. By the linearity of expectation, the expected number of uncovered
25
n
interactions in A is less than v t when η(v t − m)e 1 − v1t ≤ v t . Solving for n, we obtain
log ηe 1 − vmt
.
n≥
t
log vtv−1
Therefore, there exists an n × k array with n = max
log{ηe(1− vmt )}
log(eρm)
,
t
t
log vtv−1
log vtv−1
(4)
that has at most v t
uncovered interactions. To compute n explicitly, we must choose m. We can select a value of m to minimize
n graphically for given values of t, k and v. For example, Figure 11 plots Equations 3 and 4 against m for
t = 3, k = 350, v = 3, and finds the minimum value of n.
460
445
max(Equation (3), Equation (4))
440
n − number of rows in the partial array
n − number of rows in the partial array
Equation (3)
Equation (4)
420
400
380
360
340
0
5
10
15
m
20
25
30
(a) Equations 3 and 4 against m.
440
435
430
425
420
0
5
10
15
m
20
25
30
(b) Maximum of the two sizes against m.
Figure 11: The minimum is at n = 422, when m = 16. t = 3, k = 350, v = 3
We compare the size of the partial array from the naı̈ve two-stage method (Algorithm 4) with the size
obtained by the graphical methods in Figure 12. The Lovász local lemma based method is asymptotically
better than the simple randomized method. However, except for the small values of t and v, in the range
of k values relevant for practical applications the simple randomized algorithm requires fewer rows than the
Lovász local lemma based method.
5.2
Lovász local lemma based two-stage bound
We can apply the techniques from Section 5.1 to obtain a two-stage bound similar to Theorem 2 using the
Lovász local lemma and conditional LLL distribution. First we extend a result from [33].
Theorem
7. Let t, k, v be integers with k ≥ t ≥ 2, v ≥ 2 and let η = kt , and ρ = kt − k−t
t . If
vt
v t −1
ηv t log
ρ
≤ v t Then
log
CAN(t, k, v) ≤
k
t
+ t log v + log log
t
log vtv−1
vt
v t −1
+2
η
− .
ρ
Proof. Let M ⊆ [v]t be a set of m t-tuples of symbols. Following the arguments of Section 5.1, when
there exists an n × k array A over [v] such that for all C ∈ [k] , AC covers all m tuples in M .
n ≥ log(eρm)
t
vt
log
v t −1
At most η(v t − m) interactions are uncovered in such an array. Using the conditional
n LLL distribution,
the probability that one such interaction is not covered in A is at most e 1 − v1t . Therefore, by the
26
n − number of rows in partial array with vt missing interactions
n − number of rows in partial array with vt missing interactions
550
500
450
400
350
300
250
200
150
Randomized (Algorithm 4)
LLL based
100
50
0
200
400
600
k
800
1000
1200
2500
2000
1500
1000
500
0
0
Randomized (Algorithm 4)
LLL based
500
1000
1500
2000
2500
3000
3500
4000
4500
k
(a) t = 3, v = 3.
(b) t = 4, v = 3.
Figure 12: Comparison of the size of the partial array constructed in the first stage. Compares the size of
the partial array specified in Algorithm 4 in Section 3.1, and the size derived in Section 5.1.
t
n
linearity of expectation, we can find one such array A that leaves at most eη(v t − m) 1 − v1t = ηρ vm − 1
interactions uncovered. Adding one row per uncovered interactions to A, we obtain a covering array with at
most N rows, where
log(eρm)
η vt
+
N=
−
1
t
ρ m
log tv
The value of N is minimized when m =
v −1
t
ηv t log vtv−1
ρ
. Because m ≤ v t , we obtain the desired bound.
When m = v t this recaptures the bound of Theorem 5.
Figure 13 compares the LLL based two-stage bound from Theorem 7 to the standard two-stage bound
from Theorem 2, the Godbole et al. bound in Theorem 5, and the SLJ bound in Theorem 1. Although the
LLL based two-stage bound is tighter than the LLL based Godbole et al. bound, even for quite large values
of k the standard two-stage bound is tighter than the LLL based two-stage bound. In practical terms, this
specific LLL based two-stage method does not look very promising, unless the parameters are quite large.
6
Conclusion and open problems
Many concrete algorithms within a two-stage framework for covering array construction have been introduced
and evaluated. The two-stage approach extends the range of parameters for which competitive covering arrays
can be constructed, each meeting an a priori guarantee on its size. Indeed as a consequence a number of
best known covering arrays have been improved upon. Although each of the methods proposed has useful
features, our experimental evaluation suggests that TS hRand, Greedy; 2ρ, Γi and TS hRand, Den; 2ρ.Γi with
Γ ∈ {Cyclic, Frobenius} realize a good trade-off between running time and size of the constructed covering
array.
Improvements in the bounds, or in the algorithms that realize them, are certainly of interest. We
mention some specific directions. Establishing tighter bounds on the coloring based methods of Section 3.3
is a challenging problem. Either better estimates of the chromatic number of the incompatibility graph after
a random first stage, or a first stage designed to limit the chromatic number, could lead to improvements in
the bounds.
In Section 5.1 and 5.2 we explored using a Moser-Tardos type algorithm for the first stage. Although this
is useful for asymptotic bounds, practical improvements appear to be limited. Perhaps a different approach of
27
10000
500
9000
450
8000
400
7000
N − number of rows
N − number of rows
550
350
300
250
SLJ bound
Godbole
LLL−2−stage
2−stage
200
150
100
0
50
100
150
200
250
300
350
400
6000
5000
4000
SLJ bound
Godbole
LLL−2−stage
2−stage
3000
2000
450
k
(a) t = 3, v = 3.
1000
0
1000
2000
3000
4000
k
5000
6000
7000
8000
(b) t = 4, v = 4.
Figure 13: Comparison among the LLL based two-stage bound from Theorem 7, the standard two-stage
bound from Theorem 2, the Godbole et al. bound in Theorem 5, and the SLJ bound in Theorem 1.
reducing the number of bad events to be avoided explicitly by the algorithm may lead to a better algorithm.
A potential approach may look like following: “Bad” events would denote non-coverage of an interaction
over a t-set of columns. We would select a set of column t-sets such that the dependency graph of the
corresponding bad events have a bounded maximum degree (less than the original dependency graph). We
would devise a Moser-Tardos type algorithm for covering all the interactions on our chosen column t-sets,
and then apply the conditional LLL distribution to obtain an upper bound on the number of uncovered
interactions. However, the difficulty lies in the fact that “all vertices have degree ≤ ρ” is a non-trivial,
“hereditary” property for induced subgraphs, and for such properties finding a maximum induced subgraph
with the property is an NP-hard optimization problem [17]. There is still hope for a randomized or “nibble”
like strategy that may find a reasonably good induced subgraph with a bounded maximum degree. Further
exploration of this idea seems to be a promising research avenue.
In general, one could consider more than two stages. Establishing the benefit (or not) of having more
than two stages is also an interesting open problem. Finally, the application of the methods developed to
mixed covering arrays appears to provide useful techniques for higher strengths; this merits further study as
well.
Acknowledgments
The research was supported in part by the National Science Foundation under Grant No. 1421058.
References
[1] A. N. Aldaco, C. J. Colbourn, and V. R. Syrotiuk. Locating arrays: A new experimental design for
screening complex engineered systems. SIGOPS Oper. Syst. Rev., 49(1):31–40, Jan. 2015.
[2] N. Alon and J. H. Spencer. The probabilistic method. Wiley-Interscience Series in Discrete Mathematics
and Optimization. John Wiley & Sons, Inc., Hoboken, NJ, third edition, 2008. With an appendix on
the life and work of Paul Erdős.
[3] Android. Android configuration class, 2016. http://developer.android.com/reference/android/content/
res/Configuration.html.
[4] J. I. Brown. The complexity of generalized graph colorings. Discrete Appl. Math., 69(3):257–270, 1996.
28
[5] R. C. Bryce and C. J. Colbourn. The density algorithm for pairwise interaction testing. Software
Testing, Verification, and Reliability, 17:159–182, 2007.
[6] R. C. Bryce and C. J. Colbourn. A density-based greedy algorithm for higher strength covering arrays.
Software Testing, Verification, and Reliability, 19:37–53, 2009.
[7] R. C. Bryce and C. J. Colbourn. Expected time to detection of interaction faults. Journal of Combinatorial Mathematics and Combinatorial Computing, 86:87–110, 2013.
[8] J. N. Cawse. Experimental design for combinatorial and high throughput materials development. GE
Global Research Technical Report, 29:769–781, 2002.
[9] M. A. Chateauneuf, C. J. Colbourn, and D. L. Kreher. Covering arrays of strength 3. Des. Codes
Crypt., 16:235–242, 1999.
[10] D. M. Cohen, S. R. Dalal, M. L. Fredman, and G. C. Patton. The AETG system: An approach to
testing based on combinatorial design. IEEE Transactions on Software Engineering, 23:437–44, 1997.
[11] M. B. Cohen. Designing test suites for software interaction testing. PhD thesis, The University of
Auckland, Department of Computer Science, 2004.
[12] C. J. Colbourn. Combinatorial aspects of covering arrays. Le Matematiche (Catania), 58:121–167, 2004.
[13] C. J. Colbourn. Covering array tables, 2005-2015. http://www.public.asu.edu/∼ccolbou/src/tabby.
[14] C. J. Colbourn. Covering arrays and hash families. In Information Security and Related Combinatorics,
NATO Peace and Information Security, pages 99–136. IOS Press, 2011.
[15] C. J. Colbourn. Conditional expectation algorithms for covering arrays. Journal of Combinatorial
Mathematics and Combinatorial Computing, 90:97–115, 2014.
[16] R. Diestel. Graph Theory. Graduate Texts in Mathematics. Springer, fourth edition, 2010.
[17] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NPCompleteness. W. H. Freeman & Co., New York, NY, USA, 1979.
[18] A. P. Godbole, D. E. Skipper, and R. A. Sunley. t-covering arrays: upper bounds and Poisson approximations. Combinatorics, Probability and Computing, 5:105–118, 1996.
[19] B. Haeupler, B. Saha, and A. Srinivasan. New constructive aspects of the Lovász local lemma. J. ACM,
58(6):Art. 28, 28, 2011.
[20] A. S. Hedayat, N. J. A. Sloane, and J. Stufken. Orthogonal Arrays. Springer-Verlag, New York, 1999.
[21] D. S. Johnson. Approximation algorithms for combinatorial problems. J. Comput. System Sci., 9:256–
278, 1974.
[22] G. O. H. Katona. Two applications (for search theory and truth functions) of Sperner type theorems.
Periodica Math., 3:19–26, 1973.
[23] D. Kleitman and J. Spencer. Families of k-independent sets. Discrete Math., 6:255–262, 1973.
[24] D. R. Kuhn, R. Kacker, and Y. Lei. Introduction to Combinatorial Testing. CRC Press, 2013.
[25] D. R. Kuhn and M. Reilly. An investigation of the applicability of design of experiments to software
testing. In Proc. 27th Annual NASA Goddard/IEEE Software Engineering Workshop, pages 91–95, Los
Alamitos, CA, 2002. IEEE.
29
[26] D. R. Kuhn, D. R. Wallace, and A. M. Gallo. Software fault interactions and implications for software
testing. IEEE Trans. Software Engineering, 30:418–421, 2004.
[27] L. Lovász. On the ratio of optimal integral and fractional covers. Discrete Math., 13(4):383–390, 1975.
[28] K. Meagher and B. Stevens. Group construction of covering arrays. J. Combin. Des., 13:70–77, 2005.
[29] R. A. Moser. A constructive proof of the Lovász local lemma. In STOC’09—Proceedings of the 2009
ACM International Symposium on Theory of Computing, pages 343–350. ACM, New York, 2009.
[30] R. A. Moser and G. Tardos. A constructive proof of the general Lovász local lemma. J. ACM, 57(2):Art.
11, 15, 2010.
[31] C. Nie and H. Leung. A survey of combinatorial testing. ACM Computing Surveys, 43(2):#11, 2011.
[32] A. H. Ronneseth and C. J. Colbourn. Merging covering arrays and compressing multiple sequence
alignments. Discrete Appl. Math., 157:2177–2190, 2009.
[33] K. Sarkar and C. J. Colbourn. Upper bounds on the size of covering arrays. ArXiv e-prints.
[34] G. Seroussi and N. H. Bshouty. Vector sets for exhaustive testing of logic circuits. IEEE Trans. Inform.
Theory, 34:513–522, 1988.
[35] S. K. Stein. Two combinatorial covering theorems. J. Combinatorial Theory Ser. A, 16:391–397, 1974.
[36] J. Torres-Jimenez, H. Avila-George, and I. Izquierdo-Marquez. A two-stage algorithm for combinatorial
testing. Optimization Letters, pages 1–13, 2016.
30
| 8cs.DS
|
DynASP2.5: Dynamic Programming on
Tree Decompositions in Action∗
Johannes K. Fichte, Markus Hecher, Michael Morak, Stefan Woltran
TU Wien, Vienna, Austria
[email protected]
arXiv:1706.09370v1 [cs.LO] 28 Jun 2017
April 13, 2018
Abstract
A vibrant theoretical research area are efficient exact parameterized algorithms. Very recent
solving competitions such as the PACE challenge show that there is also increasing practical
interest in the parameterized algorithms community. An important research question is whether
dedicated parameterized exact algorithms exhibit certain practical relevance and one can even beat
well-established problem solvers. We consider the logic-based declarative modeling language and
problem solving framework Answer Set Programming (ASP). State-of-the-art ASP solvers rely
considerably on Sat-based algorithms. An ASP solver (DynASP2), which is based on a classical
dynamic programming on tree decompositions, has been published very recently. Unfortunately,
DynASP2 can outperform modern ASP solvers on programs of small treewidth only if the question
of interest is to count the number of solutions. In this paper, we describe underlying concepts of our
new implementation (DynASP2.5) that shows competitive behavior to state-of-the-art ASP solvers
even for finding just one solution when solving problems as the Steiner tree problem that have been
modeled in ASP on graphs with low treewidth. Our implementation is based on a novel approach
that we call multi-pass dynamic programming (M-DPSINC ).
1
Introduction
Answer set programming (ASP) is a logic-based declarative modelling language and problem solving
framework [18], where a program consists of sets of rules over propositional atoms and is interpreted
under an extended stable model semantics [23]. Problems are usually modelled in ASP in such a way that
the stable models (answer sets) of a program directly form a solution to the considered problem instance.
Computational problems for disjunctive, propositional ASP such as deciding whether a program has an
answer set are complete for the second level of the Polynomial Hierarchy [9]. In consequence, finding
answer sets usually involves a Sat part (finding a model of the program) and an Unsat part (minimality
check). A variety of CDCL-based ASP solvers have been implemented [19, 4] and proven to be very
successful in solving competitions [14]. Very recently, a dynamic programming based solver (DynASP2 )
that builds upon ideas from parameterized algorithmics was proposed [11]. For disjunctive input
programs, the runtime of the underlying algorithms is double exponential in the incidence treewidth
and linear in the input size (so-called fixed-parameter linear algorithms). DynASP2 (i) takes a tree
decomposition of a certain graph representation (incidence graph) of a given input program and (ii) solves
the program via dynamic programming (DP) on the tree decomposition by traversing the tree exactly
once. Both finding a model and checking minimality are considered at the same time. Once the root
node has been reached, complete solutions (if exist) for the input program can be constructed. This
approach pays off for counting answer sets, but is not competitive for outputting just one answer set.
∗ This is the authors self-archived copy including detailed proofs. Research was supported by the Austrian Science Fund
(FWF), Grant Y698.
1
The reason for that lies in the exhaustive nature of dynamic programming as all potential values are
computed locally for each node of the tree decomposition. In consequence, space requirements can
be quite extensive resulting in long running times. Moreover, dynamic programming algorithms on
tree decompositions may yield extremely diverging run-times on tree decompositions of the exact same
width [1]. In this paper, we propose a multi-pass approach (M-DPSINC ) for dynamic programming on
tree decompositions as well as a new implementation (DynASP2.5). In contrast to classical dynamic
programming algorithms for problems on the second level of the Polynomial Hierarchy, M-DPSINC traverses
the given tree decomposition multiple times. Starting from the leaves, we compute and store (i) sets of
atoms that are relevant for the Sat part (finding a model of the program) up to the root. Then we
go back again to the leaves and compute and store (ii) sets of atoms that are relevant for the Unsat
part (checking for minimality). Finally, we go once again back to the leaves and (iii) link sets from past
Passes (i) and (ii) that might lead to an answer set in the future. As a result, we allow for early cleanup
of candidates that do not lead to answer sets.
Further, we present technical improvements (including working on non-normalized tree decompositions) and employ dedicated customization techniques for selecting tree decompositions. Our
improvements are main ingredients to speedup the solving process for DP algorithms. Experiments
indicate that DynASP2.5 is competitive even for finding one answer set using the Steiner tree problem
on graphs with low treewidth. In particular, we are able to solve instances that have an upper bound on
the incidence treewidth of 14 (whereas DynASP2 solved instances of treewidth at most 9).
Our main contributions can be summarized as follows:
1. We establish a novel fixed-parameter linear algorithm (M-DPSINC ), which works in multiple passes
and computes Sat and Unsat parts separately.
2. We present an implementation (DynASP2.5)1 and an experimental evaluation.
Related Work. Jakl, Pichler, and Woltran [17] have considered ASP solving when parameterized by the
treewidth of a graph representation and suggested fixed-parameter linear algorithms. Fichte et al. [11]
have established additional algorithms and presented empirical results on an implementation that is
dedicated to counting answer sets for the full ground ASP language. The present paper extends their
work by a multi-pass dynamic programming algorithm. Bliem et al. [5] have introduced a general multipass approach and an implementation (D-FLATˆ2) for dynamic programming on tree decompositions
solving subset minimization tasks. Their approach allows to specify dynamic programming algorithms
by means of ASP. In a way, one can see ASP in their approach as a meta-language to describe table
algorithms2 , whereas our work presents a dedicated algorithm to find an answer set of a program. In
fact, our implementation extends their general ideas for subset minimization (disjunctive rules) to also
support weight rules. However, due to space constraints we do not report on weight rules in this paper.
Beyond that, we require specialized adaptions to the ASP problem semantics, including three valued
evaluation of atoms, handling of non-normalized tree decompositions, and optimizations in join nodes
to be competitive. Abseher, Musliu, and Woltran [2] have presented a framework that computes tree
decompositions via heuristics, which is also used in our solver. Other tree decomposition systems can be
found on the PACE challenge website [7]. Note that improved heuristics for finding a tree decomposition
of smaller width (if possible) directly yields faster results for our solver.
2
Formal Background
2.1
Tree Decompositions
Let G = (V, E) be a graph, T = (N, F, n) a rooted tree, and χ : N → 2V a function that maps
each node t ∈ N to a set of vertices. We call the sets χ(·) bags and N the set of nodes. Then,
the pair T = (T, χ) is a tree decomposition (TD) of G if the following conditions hold: (i) for every
1 The
2 See
source code of our solver is available at https://github.com/daajoe/dynasp/releases/tag/v2.5.0.
Algorithm 1 for the concept of table algorithms.
2
vertex v ∈ V there is a node t ∈ N with v ∈ χ(t); (ii) for every edge e ∈ E there is a node t ∈ N with
e ⊆ χ(t); and (iii) for any three nodes t1 , t2 , t3 ∈ N , if t2 lies on the unique path from t1 to t3 , then
χ(t1 ) ∩ χ(t3 ) ⊆ χ(t2 ). We call max{|χ(t)| − 1 | t ∈ N } the width of the TD. The treewidth tw (G) of a
graph G is the minimum width over all possible TDs of G.
Note that each graph has a trivial TD (T, χ) consisting of the tree ({n}, ∅, n) and the mapping
χ(n) = V . It is well known that the treewidth of a tree is 1, and a graph containing a clique of size k
has at least treewidth k − 1. For some arbitrary but fixed integer k and a graph of treewidth at most k,
3
we can compute a TD of width 6 k in time 2O(k ) · |V | [6]. Given a TD (T, χ) with T = (N, ·, ·), for a
node t ∈ N we say that type(t) is leaf if t has no children; join if t has children t0 and t00 with t0 =
6 t00
0
00
0
0
0
and χ(t) = χ(t ) = χ(t ); int (“introduce”) if t has a single child t , χ(t ) ⊆ χ(t) and |χ(t)| = |χ(t )| + 1;
rem (“removal”) if t has a single child t0 , χ(t0 ) ⊇ χ(t) and |χ(t0 )| = |χ(t)| + 1. If every node t ∈ N has
at most two children, type(t) ∈ {leaf, join, int, rem}, and bags of leaf nodes and the root are empty, then
the TD is called nice. For every TD, we can compute a nice TD in linear time without increasing the
width [6]. Later, we traverse a TD bottom up, therefore, let post-order(T, t) be the sequence of nodes in
post-order of the induced subtree T 0 = (N 0 , ·, t) of T rooted at t.
2.2
Answer Set programming (ASP)
ASP is a declarative modelling and problem solving framework that combines techniques of knowledge
representation and database theory. A main advantage of ASP is its expressiveness and when using
non-ground programs the advanced declarative problem modelling capability. Prior to solving, nonground programs are usually compiled into grounded by a grounder. In this paper, we restrict ourselves
to ground ASP programs. For a comprehensive introduction, see, e.g., [18]. Let `, m, n be non-negative
integers such that ` ≤ m ≤ n, a1 , . . ., an distinct propositional atoms and l ∈ {a1 , ¬a1 }. A choice
rule is an expression of the form {a1 ; . . . ; a` } ← a`+1 , . . . , am , ¬am+1 , . . . , ¬an , intuitively some subset
of {a1 , . . . , a` } is true if all atoms a`+1 , . . . , am are true and there is no evidence that any atom of
am+1 , . . . , an is true. A disjunctive rule is of the form a1 ∨ · · · ∨ a` ← a`+1 , . . . , am , ¬ am+1 , . . ., ¬an ,
intuitively at least one atom of a1 , . . . , a` must be true if all atoms a`+1 , . . . , am are true and there is no
evidence that any atom of am+1 , . . . , an is true. An optimization rule is an expression of the form l.
with the intuitive meaning that when literal l is true, this incurs a penalty of weight w. A rule is either
a disjunctive, a choice, or an optimization rule. For a choice or disjunctive rule r, let Hr := {a1 , . . . , a` },
Br+ := {a`+1 , . . . , am }, and Br− := {am+1 , . . . , an }. Usually, if Br− ∪ Br+ = ∅ we write for a rule r
simply Hr instead of Hr ← . For an optimization rule r, if l = a1 , let Br+ := {a1 } and Br− := ∅; and
if l = ¬a1 , let Br− := {a1 } and Br+ := ∅. For a rule r, let at(r) := Hr ∪ Br+ ∪ Br− denoteSits atoms
and Br := Br+ ∪ {¬b | b ∈ Br− } its body. Let a program P be a set of rules, and at(P ) := r∈P at(r)
denote its atoms. and let CH(P ), DISJ(P ), and OPT(P ) denote the set of all choice, disjunctive, and
optimization rules in P , respectively. A set M ⊆ at(P ) satisfies a rule r if (i) (Hr ∪ Br− ) ∩ M 6= ∅
or Br+ 6⊆ M for r ∈ DISJ(P ) or (ii) r is a choice or optimization rule. M is a model of P , denoted by
M P , if M satisfies every rule r ∈ P .
M = ∅} of rules, and
The reduct rM (i) of a choice rule r is the set {a ← Br+ | a ∈ Hr ∩ M, Br− ∩S
(ii) of a disjunctive rule r is the singleton {Hr ← Br+ | Br− ∩ M = ∅}. P M := r∈P rM is called GL
reduct of P with respect to M . A set M ⊆ at(P ) is an answer set of P if (i) M P and (ii) there is no
M 0 ( M such that M 0 P M , that is, M is subset minimal with respect to P M .
We call cst(P, M ) := |{r | r ∈ P, r is an optimization rule, (Br+ ∩ M ) ∪ (Br− \ M ) 6= ∅}| the cost of
answer set M for P . An answer set M of P is optimal if its cost is minimal over all answer sets.
Example 1. Consider program
rab
rbc
rcd
rad
rb
rd
rc1
rc2
r¬c
z }| { z }| { z }| { z }| { z }|
{ z }| { z
}|
{ z
}|
{ z }| {
P = {{eab }; {ebc }; {ecd }; {ead }; ab ← eab ; ad ← ead ; ac ← ab , ebc ; ac ← ad , ecd ; ← ¬ac }.
The set A = {eab , ebc , ab , ac } is an answer set of P , since {eab , ebc , ab , ac } is the only minimal model
of P A = {eab ←; ebc ←; ab ← eab ; ad ← ead ; ac ← ab , ebc ; ac ← ad , ecd }. Then, consider program
R = {a ∨ c ← b; b ← c, ¬g; c ← a; b ∨ c ← e; h ∨ i ← g, ¬c; a ∨ b; g ← ¬i; c; {d} ← g}. The
set B = {b, c, d, g} is an answer set of R since {b, c, d, g} and {a, c, d, g} are the minimal models of
3
Solve local
probl. A(t, . . . )
Visit next node no
t in post-order
3. DPA (T )
Store results
in A-Tabs[t]
Done?
yes
1. Construct graph G
Store witnesses
in W-Tabs[t]
←−DynASP2 DynASP2.5−→
2. Comp. TD T of G
3.I done?
no
Visit next node
t in post-order
3.I. DPW (T )
yes
Purge non-witnesses
Store counter-witnesses in C-Tabs[t]
3.II done?
yes
Purge noncounter-witnesses
4. Print solution
Compute witnesses of W(t, . . . )
no
Visit next node
t in post-order
3.II. DPC (T )
Store result in
W, C-Tabs[t]
yes
Compute counterwits. of C(t, . . . )
3.III done?
Link counter-wits.
to witnesses
no
Visit next node
t in post-order
3.III. DPLW,C (T , W-Tabs, C-Tabs)
Figure 1
Control flow for DP-based ASP solver (DynASP2, left) and for DynASP2.5 (right).
RB = {a ∨ c ← b; c ← a; b ∨ c ← e; a ∨ b; g; c; d ← g}.
Given a program P , we consider the problems of computing an answer set (called AS), outputting
the number of optimal answer sets (called #AspO), and listing all optimal answer sets of P (called
EnumAsp). Further, given a propositional formula F and an atom sol, we use the entailment problem
of listing every subset-minimal model M of F with sol ∈ M (called EnumMinSAT1).
2.3
Graph Representations of Programs
In order to use TDs for ASP solving, we need dedicated graph representations of programs. The incidence
graph I(P ) of P is the bipartite graph that has the atoms and rules of P as vertices and an edge a r if
a ∈ at(r) for some rule r ∈ P [11]. The semi-incidence graph S(P ) of P is a graph that has the atoms
and rules of P as vertices and (i) an edge a r if a ∈ at(r) for some rule r ∈ P as well as (ii) an edge a b
for disjoint atoms a, b ∈ Hr where r ∈ P is a choice rule. Since for every program P the incidence
graph I(P ) is a subgraph of the semi-incidence graph, we have that tw (I(P )) ≤ tw (S(P )). Further,
by definition of a TD and the construction of a semi-incidence graph that head atoms of choice rules,
respectively, occur in at least one common bag of the TD.
2.4
Sub-Programs
Let T = (T, χ) be a nice TD of graph representation S(P ) of a program P . Further, let T = (N, ·, n) and
t ∈ N . The bag-program is defined as Pt := P ∩ χ(t). Further, the set at≤t := {a | a ∈ at(P ) ∩ χ(t0 ), t0 ∈
post-order(T, t)} is called atoms below t, the program below t is defined as P≤t := {r | r ∈ Pt0 , t0 ∈
post-order(T, t)}, and the program strictly below t is P<t := P≤t \ Pt . It holds that P≤n = P<n = P and
at≤n = at(P ).
3
A Single Pass DP Algorithm
A dynamic programming based ASP solver, such as DynASP2 [11], splits the input program P into
“bag-programs” based on the structure of a given nice tree decomposition for P and evaluates P in parts,
thereby storing the results in tables for each TD node. More precisely, the algorithm works as outlined
on the left and middle of Figure 1 and encompasses the following steps:
1. Construct a graph representation G(P ) of the given input program P .
2. Compute a TD T of the graph G(P ) by means of some heuristic, thereby decomposing G(P ) into
several smaller parts and fixing an ordering in which P will be evaluated.
4
Algorithm 1: Algorithm DPA (T ) for Dynamic Programming on TD T for ASP [11].
1
2
3
In: Table algorithm A, nice TD T = (T, χ) with T = (N, ·, n) of G(P ) according to A.
Out: A-Tabs: maps each TD node t ∈ T to some computed table τt .
Child-Tabst := {A-Tabs[t0 ] | t0 is a child of t in T }
for iterate t in post-order(T,n) do
A-Tabs[t] ← A(t, χ(t), Pt , at≤t , Child-Tabst )
3. Algorithm 1 – DPA (T ) – sketches the general scheme for this step, assuming that an algorithm A,
which highly depends on the graph representation, is given. We usually call A the table algorithm 3 .
For every node t ∈ T in the tree decomposition T = ((T, E, n), χ) (in a bottom-up traversal),
run A and compute A-Tabs[t], which are sets of tuples (or rows for short). Intuitively, algorithm A
transforms tables of child nodes of t to the current node, and solves a “local problem” using
bag-program Pt . The algorithm thereby computes (i) sets of atoms called (local) witness sets and
(ii) for each local witness set M subsets of M called counter-witness sets [11], and directly follows
the definition of answer sets being (i) models of P and (ii) subset minimal with respect to P M .
4. For root n interpret the table A-Tabs[n] (and tables of children, if necessary) and print the solution
to the considered ASP problem.
Next, we propose a new table algorithm (SINC) for programs without optimization rules. Since our
algorithm trivially extends to counting and optimization rules by earlier work [11], we omit such rules.
The table algorithm SINC employs the semi-incidence graph and is depicted in Algorithm 2. DPSINC
merges two earlier algorithms for the primal and incidence graph [11] resulting in slightly different worst
case runtime bounds (c.f., Theorem 1).
Our table algorithm SINC computes and stores (i) sets of atoms (witnesses) that are relevant for the
Sat part (finding a model of the program) and (ii) sets of atoms (counter-witnesses) that are relevant
for the Unsat part (checking for minimality). In addition, we need to store for each set of witnesses as
well as its set of counter-witnesses satisfiability states (sat-states for short). For the following reason:
By Definition of TDs and the semi-incidence graph, it is true for every atom a and every rule r of a
program that if atom a occurs in rule r, then a and r occur together in at least one bag of the TD.
In consequence, the table algorithm encounters every occurrence of an atom in any rule. In the end,
on removal of r, we have to ensure that r is among the rules that are already satisfied. However, we
need to keep track whether a witness satisfies a rule, because not all atoms that occur in a rule occur
together in exactly one bag. Hence, when our algorithm traverses the TD and an atom is forgotten we
still need to store this sat-state, as setting the forgotten atom to a certain truth value influences the
satisfiability of the rule. Since the semi-incidence graph contains a clique on every set A of atoms that
occur together in choice rule head, those atoms A occur together in a common bag of any TD of the
semi-incidence graph. For that reason, we do not need to incorporate choice rules into the satisfiability
state, in contrast to the algorithm for the incidence graph [11]. We can see witness sets together with
its sat-state as witness. Then, in Algorithm 2 (SINC) a row in the table τt is a triple hM, σ, Ci. The
set M ⊆ at(P ) ∩ χ(t) represents a witness set. The family C of sets concerns counter-witnesses, which we
will discuss in more detail below. The sat-state σ for M represents rules of χ(t) satisfied by a superset
of M . Hence, M witnesses a model M 0 ⊇ M where M 0 P<t ∪ σ. We use binary operator ∪ to combine
sat-states, which ensures that rules satisfied in at least one operand remain satisfied. We compute a new
sat-state σ from a sat-state and satisfied rules, formally, SatPr(Ṙ, M ) := {r | (r, R) ∈ Ṙ, M R} for
M ⊆ χ(t) \ Pt and program Ṙ(r) constructed by Ṙ, mapping rules to local-programs (Definition 1).
Definition 1. Let P be a program, T = (·, χ) be a TD of S(P ), t be a node of T and R ⊆ Pt . The
local-program R(t) is obtained from R ∪ {← Br | r ∈ R is a choice rule, Hr ( at≤t }4 by removing from
(t)
every rule all literals a, ¬a with a 6∈ χ(t). We define Ṙ(t) : R → 2R by Ṙ(t) (r) := {r}(t) for r ∈ R.
3 The
table algorithm SINC for example is given in Algorithm 2.
require to add {← Br | r ∈ R is a choice rule, Hr ( at≤t } in order to decide satisfiability for corner cases of choice
rules involving counter-witnesses of Line 3 in Algorithm 2.
5 For set S and element s, we denote S + := S ∪ {s} and S − := S \ {s}.
s
s
4 We
5
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Algorithm 2: Table algorithm SINC(t, χt , Pt , at≤t , Child-Tabst ).
In: Bag χt , bag-program Pt , atoms-below at≤t , child tables Child-Tabst of t. Out: Tab. τt .
if type(t) = leaf then τt ← {h∅, ∅, ∅i}
/* Abbreviations see Footnote 5. */
else if type(t) = int, a ∈ χt \ Pt is introduced and τ 0 ∈ Child-Tabs
t then
(t,M + )
(t)
τt ← {hMa+ , σ ∪ SatPr(Ṗt , Ma+ ), {hCa+ , ρ ∪ SatPr(Ṗt a , Ca+ )i | hC, ρi ∈ C} ∪
(t,M + )
(t,M + )
{hC, ρ ∪ SatPr(Ṗt a , C)i | hC, ρi ∈ C} ∪ {hM, σ ∪ SatPr(Ṗt a , M )i}i | hM , σ, Ci ∈ τ 0 }
(t)
(t,M )
∪ {hM , σ ∪ SatPr(Ṗt , M ), {hC, ρ ∪ SatPr(Ṗt
, C)i | hC, ρi ∈ C}i
| hM , σ, Ci ∈ τ 0 }
0
else if type(t) = int, r ∈ χt ∩ Pt is introduced and τ ∈ Child-Tabst then
τt ← {hM , σ ∪ SatPr({ṙ}(t) , M ), {hC, ρ ∪ SatPr({ṙ}(t,M ) , C)i | hC, ρi ∈ C}i
| hM , σ, Ci ∈ τ 0 }
0
else if type(t) = rem, a 6∈ χt is removed atom and τ ∈ Child-Tabst then
τt ← {hMa− , σ, {hCa− , ρi | hC, ρi ∈ C}i
| hM , σ, Ci ∈ τ 0 }
0
else if type(t) = rem, r 6∈ χt is removed rule and τ ∈ Child-Tabst then
τt ← {hM , σr− , hC, ρ−
| hM , σ, Ci ∈ τ 0 , r ∈ σ}
r i | hC, ρi ∈ C, r ∈ ρ i
else if type(t) = join and τ 0 , τ 00 ∈ Child-Tabst with τ 0 6= τ 00 then
τt ← {hM , σ 0 ∪ σ 00 , {hC, ρ0 ∪ ρ00 i | hC, ρ0 i ∈ C 0 , hC, ρ00 i ∈ C 00 } ∪ {hM, ρ ∪ σ 00 i | hM, ρi ∈ C 0 } ∪
{hM, σ 0 ∪ ρi | hM, ρi ∈ C 00 }i
| hM , σ 0 , C 0 i ∈ τ 0 , hM , σ 00 , C 00 i ∈ τ 00 }
(t )
(t )
Example 2. Observe Pt4 4 = {← ebc , rb } and Pt5 5 = {c ←} for Pt4 and Pt5 of Figure 2.
In Example 3 we give an idea how we compute models of a given program using the semi-incidence
graph. The resulting algorithm MOD is obtained from SINC, by taking only the first two row positions
(red and green parts). The remaining position (blue part), can be seen as an algorithm (CMOD) that
computes counter-witnesses (see Example 5). Note that we discuss selected cases, and we assume row
numbers in each table τt , i.e., the i th -row corresponds to ut.i = hMt.i , σt.i i.
Example 3. Consider program P from Example 1, TD T = (·, χ) in Figure 2, and the tables τ1 ,. . .,
τ34 , which illustrate computation results obtained during post-order traversal of T by DPMOD . Note that
Figure 2 (left) does not show every intermediate node of TD T . Table τ1 = {h∅, ∅i} as type(t1 ) =
leaf (see Algorithm 2 L1). Table τ3 is obtained via introducing rule rab , after introducing atom eab
(type(t2 ) = type(t3 ) = int). It contains two rows due to two possible truth assignments using atom eab
(L3–5). Observe that rule rab is satisfied in both rows M3.1 and M3.2 , since the head of choice rule rab is
in at≤t3 (see L7 and Definition 1). Intuitively, whenever a rule r is proven to be satisfiable, sat-state σt.i
marks r satisfiable since an atom of a rule of S(P ) might only occur in one TD bag. Consider table τ4
with type(t4 ) = rem and rab ∈ χ(t3 ) \ χ(t4 ). By definition (TDs and semi-incidence graph), we have
encountered every occurrence of any atom in rab . In consequence, MOD enforces that only rows where
rab is marked satisfiable in τ3 , are considered for table τ4 . The resulting table τ4 consists of rows of τ3
with σ4.i = ∅, where rule rab is proven satisfied (rab ∈ σ3.1 , σ3.2 , see L 11). Note that between nodes t6
and t10 , an atom and rule remove as well as an atom and rule introduce node is placed. Observe that the
second row u6.2 = hM6.2 , σ6.2 i ∈ τ6 does not have a “successor row” in τ10 , since rb 6∈ σ6.2 . Intuitively,
join node t34 joins only common witness sets in τ17 and τ33 with χ(t17 ) = χ(t33 ) = χ(t34 ). In general, a
join node marks rules satisfied, which are marked satisfied in at least one child (see L13–14).
Since we already explained how to obtain models, we only briefly describe how to compute counterwitnesses. Family C consists of rows (C, ρ) where C ⊆ at(P ) ∩ χ(t) is a counter-witness set in t to M .
Similar to the sat-state σ, the sat-state ρ for C under M represents whether rules of the GL reduct PtM
are satisfied by a superset of C. We can see counter-witness sets together with its sat-state as counter0
witnesses. Thus, C witnesses the existence of C 0 ( M 0 satisfying C 0 (P<t ∪ ρ)M since M witnesses
a model M 0 ⊇ M where M 0 P<t . In consequence, there exists an answer set of P if the root table
contains h∅, ∅, ∅i. We require local-reducts for deciding satisfiability of counter-witness sets.
Definition 2. Let P be a program, T = (·, χ) be a TD of S(P ), t be a node of T , R ⊆ Pt and M ⊆ at(P ).
(t,M )
M
We define local-reduct R(t,M ) by [R(t) ] and Ṙ(t,M ) : R → 2R
by Ṙ(t,M ) (r) :={r}(t,M ) , r ∈ R.
Proposition 1 (c.f. [11]). Let P be a program and k :=tw (S(P )). Then, the algorithm DPSINC is correct
k+2
and runs in time O(22
· kS(P )k).
6
τ12
hM12.i , σ12.i i
h{ebc , ab }, ∅i
h{ebc }, {rc1 }i
h{ab }, {rc1 }i
h∅, {rc1 }i
hM12.i , σ12.i , C12.i i
τ12
T: ∅ t36
t15 rc1 , ac
h{ebc , ab }, ∅, {h{ebc }, {rc1 }i}i
hM32.i , σ32.i i
t34
h{ebc , ab }, ∅, ∅i
t12
r¬c , ac h{ac }, {rc2 }i h{ebc }, {rc1 }, ∅i
rc1 , ebc , ab
h∅, {rc2 }i
h{ab }, {rc1 }, {h∅, {rc1 }i}i
h∅, ∅i
t10
h{ab }, {rc1 }, ∅i
r ,a
τ32 h∅, {rc1 }, ∅i
rbc , ebc , ab c2 c t32
hM6.i , σ6.i i τ6
rc2 , ecd , ad t29
r ,e ,a
h{eab , ab }, {rb }i b ab b t6
h{eab }, ∅i
rb , eab t5 rcd , ecd , ad t27
h{ab }, {rb }i
h∅, {rb }i
eab t4
rd , ead , ad t23
hM3.i , σ3.i i τ3
r
,
e
t
ab
ab 3
h{eab }, {rab }i
rad , ead t20
h∅, {rab }i
eab t2
hM1.i , σ1.i i τ1
∅ t18
∅ t1
h∅, ∅i
hM6.i , σ6.i , C6.i i τ6
τ32
h{eab , ab }, {rb }, {
hM32.i , σ32.i , C32.i i
h{eab }, ∅i}i
h{ac }, {rc2 }, {
h{eab }, ∅, ∅i
h{ab }, {rb }, {h∅, {rb }i}i h{ac }, {rc2 }i,
h∅, {rc2 }i}i
h∅, {rb }, ∅i
h{ac }, {rc2 }, {
hM3.i , σ3.i , C3.i i τ3
h∅, {rc2 }i}i
h{eab }, {rab }, {h∅, ∅i}i h∅, {rc2 }, {
h∅, {rc2 }i}i
h∅, {rab }, ∅i
h∅, {rc2 }, ∅i
hM1.i , σ1.i , C1.i i
τ1 h∅, ∅, {h∅, {rc2 }i}i
h∅, ∅, ∅i
h∅, ∅, ∅i
Figure 2 A TD T of the semi-incidence graph S(P ) for program P from Example 1 (center). Selected
DP tables after DPMOD (left) and after DPSINC (right) for nice TD T .
4
DynASP2.5: Implementing a III Pass DP Algorithm
The classical DP algorithm DPSINC (Step 3 of Figure 1) follows a single pass approach. It computes
both witnesses and counter-witnesses by traversing the given TD exactly once. In particular, it stores
exhaustively all potential counter-witnesses, even those counter-witnesses where the witnesses in the
table of a node cannot be extended in the parent node. In addition, there can be a high number of
duplicates among the counter-witnesses, which are stored repeatedly. In this section, we propose a
multi-pass approach (M-DPSINC ) for DP on TDs and a new implementation (DynASP2.5), which fruitfully
adapts and extends ideas from a different domain [5]. Our novel algorithm allows for an early cleanup
(purging) of witnesses that do not lead to answer sets, which in consequence (i) avoids to construct
expendable counter-witnesses. Moreover, multiple passes enable us to store witnesses and counterwitnesses separately, which in turn (ii) avoids storing counter-witnesses duplicately and (iii) allows for
highly space efficient data structures (pointers) in practice when linking witnesses and counter-witnesses
together. Figure 1 (right, middle) presents the control flow of the new multi-pass approach DynASP2.5,
where M-DPSINC introduces a much more elaborate computation in Step 3.
4.1
The Algorithm
Our algorithm (M-DPSINC ) executed as Step 3 runs DPMOD , DPCMOD and DPLMOD,CMOD in three passes (3.I,
3.II, and 3.III) as follows:
3.I. First, we run the algorithm DPMOD , which computes in a bottom-up traversal for every node t
in the tree decomposition a table MOD-Tabs[t] of witnesses for t. Then, in a top-down traversal
for every node t in the TD remove from tables MOD-Tabs[t] witnesses, which do not extend to a
witness in the table for the parent node (“Purge non-witnesses”); these witnesses can never be
used to construct a model (nor answer set) of the program.
3.II. For this step, let CMOD be a table algorithm computing only counter-witnesses of SINC (blue
parts of Algorithm 2). We execute DPCMOD , compute for all witnesses counter-witnesses at once
and store the resulting tables in CMOD-Tabs[·]. For every node t, table CMOD-Tabs[t] contains
counter-witnesses to witness being ⊂-minimal. Again, irrelevant rows are removed (“Purge
non-counter-witnesses”).
7
Algorithm 3: Algorithm DPLW,C (T , W-Tabs, C-Tabs) for linking counter-witnesses to witnesses.
1
2
3
4
5
6
7
8
9
In: Nice TD T = (T, χ) with T = (N, ·, n) of a graph S(P ), and mappings W-Tabs[·], C-Tabs[·].
Out: W, C-Tabs: maps node t ∈ T to some pair (τtW , τtC ) with τtW ∈ W-Tabs[t], τtC ∈ C-Tabs[t].
Child-Tabst :={W, C-Tabs[t0 ] | t0 is a child of t in T }
/* Get for a node t tables of (preceeding) combined child rows (CCR)
*/
CCRt :=Π̂τ 0 ∈Child-Tabst τ 0
/* For Abbreviations see Footnote 6. */
/* Get for a row ~
u its combined child rows (origins)
*/
origt (~
u) :={S | S ∈ CCRt , ~
u ∈ τ, τ = W(t, χ(t), Pt , at≤t , fw (S))}
/* Get for a table S of combined child rows its successors (evolution)
*/
evolt (S) :={~
u|~
u ∈ τ, τ = C(t, χ(t), Pt , at≤t , τ 0 ), τ 0 ∈ S}
for iterate t in post-order(T,n) do
/* Compute counter-witnesses (≺-smaller rows) for a witness set M
*/
subs≺ (f, M, S) :={~
u|~
u ∈ C-Tabs[t], ~
u ∈ evolt (f (S)), ~
u = hC, · · · i, C ≺ M }
/* Link each witness ~
u to its counter-witnesses and store the results
*/
W, C-Tabs[t] ← {(~
u, subs( (fw , M, S) ∪ subs⊆ (fcw , M, S)) | ~
u ∈ W-Tabs[t], ~
u = hM, · · · i, S ∈ origt (u)}
hM3.i , σ3.i , C3.i i
h{a1 , a2 , f }, ∅, ∅i
h{a2 , f }, ∅, ∅i
τ3
hM1.i , σ1.i , C1.i i
τ1
h{a1 , a2 , f }, {rc , rcf }, {
h{a1 , f }, {rcf }i, h{a2 , f }, {rcf }i,
h{f }, {rcf }i, h{a1 , a2 }, {rc }i,
hM2.i , σ2.i , C2.i i τ2
h{a1 }, {rc }i, h{a2 }, {rc }i, h∅, {rc }i}i
h{a1 , a2 , f }, {rf , r2 }, ∅i h{a1 , a2 }, {rc , rcf }, {h{a1 }, {rc , rcf }i,
h{a1 , a2 }, {r2 }, {
h{a2 }, {rc , rcf }i, h∅, {rc , rcf }i}i
h{a1 }, ∅i,
h{a1 , f }, {rc , rcf }, {h{f }, {rcf }i,
h{a2 }, {r2 }i, h∅, ∅i}i
h{a1 }, {rc }i, h∅, {rc }i}i
h{a1 , f }, {rf }, ∅i
h{a1 }, {rc , rcf }, {h∅, {rc , rf }i}i
h{a1 }, ∅, {h∅, ∅i}i
h{a2 , f }, {rc , rcf }, {h{a2 }, {rc }i,
h{a2 , f }, {rf , r2 }, ∅i
h{f }, {rcf }i}i
h{a2 }, {r2 }, {h∅, ∅i}i
h{a2 }, {rc , rcf }, {h∅, {rc , rcf }i}i
h{f }, {rf }, ∅i
h{f }, {rc , rcf }, {h∅, {rc }i}i
h∅, ∅, ∅i
h∅, {rc , rcf }, ∅i
Figure 3
hM3.i , σ3.i , C3.i i
h{a1 , a2 , f }, ∅, ∅i
h{a2 , f }, ∅, ∅i
τ3
hM2.i , σ2.i , C2.i i
τ2
h{a1 , a2 , f }, {rf , r2 }, ∅i
h{a2 , f }, {rf , r2 }, ∅i
hM1.i , σ1.i , C1.i i
τ1
h{a1 , a2 , f }, {rc , rcf }, ∅
h{a2 , f }, {rc , rcf }, ∅i
hC1.i , ρ1.i i
τ1CMOD
h{a1 , f }, {rcf }i, h{a2 , f }, {rcf }i,
h{f }, {rcf }i, h{a1 , a2 }, {rc }i, h{
a1 }, {rc }i, h{a2 }, {rc }i, h∅, {rc }i
Selected DP tables after DPSINC (left) and after M-DPSINC (right) for TD T .
3.III. Finally, in a bottom-up traversal for every node t in the TD, witnesses and counter-witnesses are
linked using algorithm DPLMOD,CMOD (see Algorithm 3). DPLMOD,CMOD takes previous results and
maps rows in MOD-Tabs[t] to a table (set) of rows in CMOD-Tabs[t].
We already explained the table algorithms DPMOD and DPCMOD in the previous section. The main
part of our multi-pass algorithm is the algorithm DPLMOD,CMOD based on the general algorithm DPLW,C
(Algorithm 3) with W = MOD, C = CMOD, which links those separate tables together. Before we
quickly discuss the core of DPLW,C in Lines 5–9, note that Lines 2–4 introduce auxiliary definitions. Line 2
combines rows of the child nodes of given node t, which is achieved by a product over sets6 , where we
drop the order and keep sets only. Line 3 concerns determining for a row ~u its origins (finding preceding
combined rows that lead to ~u using table algorithm W). Line 4 covers deriving succeeding rows for a
certain child row combination its evolution rows via algorithm C. In an implementation, origin as well
as evolution are not computed, but represented via pointer data structures directly linking to W-Tabs[·]
or C-Tabs[·], respectively. Then, the table algorithm DPLW,C applies a post-order traversal and links
witnesses to counter-witnesses in Line 9. DPLW,C searches for origins (orig) of a certain witness ~u, uses
the counter-witnesses (fcw ) linked to these origins, and then determines the evolution (evol) in order to
derive counter-witnesses (using subs) of ~u.
6 For
Q
Q
set I = {1, . . . , n} and sets Si , we define i∈I Si :=S1 × · · · × Sn = {(s1 , . . . , sn ) : si ∈ Si }. Moreover, for
i∈I Si ,
Q
Q
Q
let ˆ i∈I Si :={{{s1 }, . . . , {sn }} | (s1 , . . . ,S
sn ) ∈ i∈I Si }. If for each S ∈ ˆ i∈IS
Si and {si } ∈ S, si is a pair with a witness
and a counter-witness part, let fw (S) := {(Wi ,Ci )}∈S {{Wi }} and fcw (S) := {(Wi ,Ci )}∈S {{Ci }} restrict S to the resp.
(counter-)witness parts.
8
Theorem 1. For a program P of semi-incidence treewidth k := tw (S(P )), the algorithm M-DPSINC is
k+2
correct and runs in time O(22
· kP k).
Proof (Sketch). Due to space constraints, we only sketch the proof idea for enumerating answer sets of
disjunctive ASP programs by means of M-DPSINC . Let P be a disjunctive program and k :=tw (S(P )).
We establish a reduction R(P, k) of EnumAsp to EnumMinSAT1, such that there is a one-to-one
correspondence between answer sets and models of the formula, more precisely, for every answer set M
of P and for the resulting instance (F, k 0 ) = R(P, k) the set M ∪ {sol} is a subset-minimal model of F
03
and k 0 = tw(I(F )) with k 0 ≤ 7k + 2. We compute in time 2O(k ) · kF k a TD of width at most k 0 [6]
and add sol to every bag. Using a table algorithm designed for SAT [22] we compute witnesses and
counter-witnesses. Conceptually, one could also modify MOD for this task. To finally show correctness
of linking counter-witnesses to witnesses as presented in DPLMOD,MOD , we have to extend earlier work [5,
Theorem 3.25 and 3.26]. Therefore, we enumerate subset-minimal models of F by following each
witness set containing sol at the root having counter-witnesses ∅ back to the leaves. This runs in
(7k+2)+2
time O(22
· kP k), c.f., [5, 11]. A more involved (direct) proof, allows to decrease the runtime
k+2
to O(22
· kP k) (even for choice rules).
Example 4. Let k be some integer and Pk be some program that contains the following rules rc :={a1 , · · · , ak } ←
f , r2 := ← ¬a2 , . . ., rk := ← ¬ak , and rf := ← ¬f and rcf :={f } ← . The rules r1 , . . ., rk simulate
that only certain subsets of {a1 , · · · , ak } are allowed. Rules rf and rcf enforce that f is set to true. Let
T = (T, χ, t3 ) be a TD of the semi-incidence graph S(Pk ) of program Pk where T = (V, E) with V =
{t1 , t2 , t3 }, E = {(t1 , t2 ), (t2 , t3 )}, χ(t1 ) = {a1 , · · · , ak , f, rc , rcf }, χ(t2 ) = {a1 , · · · , ak , r2 , · · · , rk , rf },
and χ(t3 ) = ∅. Figure 3 (left) illustrates the tables for program P2 after DPSINC , whereas Figure 3 (right)
presents tables using M-DPSINC , which are exponentially smaller in k, mainly due to cleanup. Observe that
Pass 3.II M-DPSINC , “temporarily” materializes counter-witnesses only for τ1 , presented in table τ1CMOD .
Hence, using multi-pass algorithm M-DPSINC results in an exponential speedup. Note that we can trivially
extend the program such that we have the same effect for a TD of minimum width and even if we take
the incidence graph. In practice, programs containing the rules above frequently occur when encoding
by means of saturation [9]. The program Pk and the TD T also reveal that a different TD of the same
width, where f occurs already very early in the bottom-up traversal, would result in a smaller table τ1
even when running DPSINC .
4.2
Implementation Details
Efficient implementations of dynamic programming algorithms on TDs are not a by-product of computational complexity theory and involve tuning and sophisticated algorithm engineering. Therefore, we
present additional implementation details of algorithm M-DPSINC into our prototypical multi-pass solver
DynASP2.5, including two variations (depgraph, joinsize TDs).
Even though normalizing a TD can be achieved without increasing its width, a normalization may
artificially introduce additional atoms. Resulting in several additional intermediate join nodes among
such artificially introduced atoms requiring a significant amount of total unnecessary computation in
practice. On that account, we use non-normalized tree decompositions. In order to still obtain a fixedparameter linear algorithm, we limit the number of children per node to a constant. Moreover, linking
counter-witnesses to witnesses efficiently is crucial. The main challenge is to deal with situations where
a row (witness) might be linked to different set of counter-witnesses depending on different predecessors
of the row (hidden in set notation of the last line in Algorithm 3). In these cases, DynASP2.5 eagerly
creates a “clone” in form of a very light-weighted proxy to the original row and ensures that only the
original row (if at all required) serves as counter-witness during pass three. Together with efficient caches
of counter-witnesses, DynASP2.5 reduces overhead due to clones in practice.
Dedicated data structures are vital. Sets of Witnesses and satisfied rules are represented in the
DynASP2.5 system via constant-size bit vectors. 32-bit integers are used to represent by value 1 whether
an atom is set to true or a rule is satisfied in the respective bit positions according to the bag. A
restriction to 32-bit integers seems reasonable as we assume for now (practical memory limitations)
9
750
500
CPU time [s]
1000
St (best TD)
0
1000
750
500
250
# instances
20
40
Clasp 3.3.0
DynASP2.5
DynASP2.5 depgraph
DynASP2.5 joinsize
60
CPU time [s]
1250
1250
250
0
St (avg TD)
# instances
20
40
Clasp 3.3.0
DynASP2.5
DynASP2.5 depgraph
DynASP2.5 joinsize
60
solver\time
#
Avg solved runtime
TO TD 3.I 3.II 3.III
Clasp 3.3.0
34
-
-
-
-
DynASP2
68
-
-
-
-
DynASP2.5 28
Σ
334.5
-
0.5 3.5 16.6 264.4 285.0
...depgraph
24 10.9 3.4 15.3 251.3 280.9
...joinsize
32
0.7 3.5 16.5 278.3 299.0
Figure 4 Cactus plots showing best and average runtime among five TDs (left). Number of Timeouts
(TO) and average runtime among solved instances (right).
that our approach works well on TDs of width ≤ 20. Since state-of-the-art computers handle such
constant-sized integers extremely efficient, DynASP2.5 allows for efficient projections and joins of rows,
and subset checks in general. In order to not recompute counter-witnesses (in Pass 3.II) for different
witnesses, we use a three-valued notation of counter-witness sets consisting of atoms set to true (T) or
false (F) or false but true in the witness set (TW) used to build the reduct. Note that the algorithm
enforces that only (TW)-atoms are relevant, i.e., an atom has to occur in a default negation or choice
rule.
Minimum width is not the only optimization goal when computing TDs by means of heuristics.
Instead, using TDs where a certain feature value has been maximized in addition (customized TDs)
works seemingly well in practice [1, 21]. While DynASP2.5 (M-DPSINC ) does not take additional TD
features into account, we also implemented a variant (DynASP2.5 depgraph), which prefers one out of
ten TDs that intuitively speaking avoids to introduce head atoms of some rule r in node t, without
having encountered every body atom of r below t, similar to atom dependencies in the program [15].
The variant DynASP2.5 joinsize minimizes bag sizes of child nodes of join nodes, c.f. [2].
4.3
Experimental Evaluation
We performed experiments to investigate the runtime behavior of DynASP2.5 and its variants, in order
to evaluate whether our multi-pass approach can be beneficial and has practical advantages over the
classical single pass approach (DynASP2). Further, we considered the dedicated ASP solver Clasp 3.3.07 .
Clearly, we cannot hope to solve programs with graph representations of high treewidth. However,
programs involving real-world graphs such as graph problems on transit graphs admit TDs of acceptable
width to perform DP on TDs. To get a first intuition, we focused on the Steiner tree problem (St) for
our benchmarks. Note that we support the most frequently used SModels input format [24] for our
implementation.
We mainly inspected the CPU time using the average over five runs per instance (five fixed
seeds allow certain variance for heuristic TD computation). For each run, we limited the environment to 16 GB RAM and 1200 seconds CPU time. We used Clasp with options “--stats=2 --optstrategy=usc,pmres,disjoint,stratify --opt-usc-shrink=min -q”, which enable very recent improvements
for unsatisfiable cores [3], and disabled solution printing/recording. We also benchmarked Clasp with
branch-and-bound, which was, however, outperformed by the unsat. core options on all our instances.
Note that without the very recent unsatisfiable core advances Clasp timed out on almost every instance.
We refer to an extended version [12] for more details on the benchmark instances, encodings, and
benchmark environment. The left plot in Figure 4 shows the result of always selecting the best among
five TDs, whereas the right plot concerns average runtime. The table in Figure 4 reports on average
running times (TD computation and Passes 3.I, 3.II, 3.III) among the solved instances and the total
number of timeouts (TO). We consider an instance to time out, when all five TDs exceeded the limit. For
the variants depgraph and joinsize, runtimes for computing and selecting among ten TDs are included.
Our empirical benchmark results confirm that DynASP2.5 exhibits competitive runtime behavior even
for TDs of treewidth around 14. Compared to state-of-the-art ASP solver Clasp, DynASP2.5 is capable
7 Clasp
is available at https://github.com/potassco/clasp/releases/tag/v3.3.0.
10
of additionally delivering the number of optimal solutions. In particular, variant “depgraph” shows
promising runtimes.
5
Conclusion
In this paper, we presented a novel approach for ASP solving based on ideas from parameterized
complexity. Our algorithms runs in linear time assuming bounded treewidth of the input program. Our
solver applies DP in three passes, thereby avoiding redundancies. Experimental results indicate that our
ASP solver is competitive for certain classes of instances with small treewidth, where the latest version
of the well-known solver Clasp hardly keeps up. An interesting question for future research is whether a
linear amount of passes (incremental DP) can improve the runtime behavior.
References
[1] M. Abseher, F. Dusberger, N. Musliu, and S. Woltran. Improving the efficiency of dynamic
programming on tree decompositions via machine learning. JAIR, 58:829–858, 2017.
[2] M. Abseher, N. Musliu, and S. Woltran. htd – a free, open-source framework for (customized) tree
decompositions and beyond. In CPAIOR’17, 2017. To appear.
[3] M. Alviano and C. Dodaro. Anytime answer set optimization via unsatisfiable core shrinking.
TPLP, 16(5-6):533—551, 2016.
[4] M. Alviano, C. Dodaro, W. Faber, N. Leone, and F. Ricca. WASP: A native ASP solver based on
constraint learning. In LPNMR’13, volume 8148 of LNCS, pages 54–66. Springer, 2013.
[5] B. Bliem, G. Charwat, M. Hecher, and S. Woltran. D-FLATˆ2: Subset minimization in dynamic
programming on tree decompositions made easy. Fund. Inform., 147:27–34, 2016.
[6] H. Bodlaender and A. M. C. A. Koster. Combinatorial optimization on graphs of bounded treewidth.
The Computer J., 51(3):255–269, 2008.
[7] H. Dell. The 2st parameterized algorithms and computational experiments challenge – Track A:
Treewidth. Technical report, 2017.
[8] A. Durand, M. Hermann, and P. G. Kolaitis. Subtractive reductions and complete problems for
counting complexity classes. Th. Comput. Sc., 340(3), 2005.
[9] T. Eiter and G. Gottlob. On the computational cost of disjunctive logic programming: Propositional
case. Ann. Math. Artif. Intell., 15(3–4):289–323, 1995.
[10] J. K. Fichte, M. Hecher, M. Morak, and S. Woltran. Answer Set Solving using Tree Decompositions
and Dynamic Programming - The DynASP2 System -. Technical Report DBAI-TR-2016-101, TU
Wien, 2016.
[11] J. K. Fichte, M. Hecher, M. Morak, and S. Woltran. Answer set solving with bounded treewidth
revisited. In LPNMR’17, 2017. To appear.
[12] J. K. Fichte, M. Hecher, and S. Woltran. DynASP2.5: Dynamic Programming on Tree Decompositions in Action. CoRR, abs/cs/arXiv:1702.02890, 2017.
[13] M. Gebser, J. Bomanson, and T. Janhunen. Rewriting optimization statements in answer-set
programs. Technical Communications of ICLP 2016, 2016.
[14] M. Gebser, M. Maratea, and F. Ricca. What’s hot in the answer set programming competition. In
AAAI’16, pages 4327–4329. The AAAI Press, 2016.
11
[15] Georg Gottlob, Francesco Scarcello, and Martha Sideri. Fixed-parameter complexity in AI and
nonmonotonic reasoning. AIJ, 138(1-2):55–86, 2002.
[16] M. Hermann and R. Pichler. Complexity of counting the optimal solutions. Th. Comput. Sc.,
410(38–40), 2009. URL: http://dx.doi.org/10.1016/j.tcs.2009.05.025.
[17] M. Jakl, R. Pichler, and S. Woltran. Answer-set programming with bounded treewidth. In IJCAI’09,
2009.
[18] T. Janhunen and I. Niemelä. The answer set programming paradigm. 2016.
[19] B. Kaufmann, M. Gebser, R. Kaminski, and T. Schaub. clasp – a conflict-driven nogood learning
answer set solver, 2015.
[20] C. Koch and N. Leone. Stable model checking made easy. In IJCAI’99, 1999.
[21] M. Morak, N. Musliu, R. Pichler, S. Rümmele, and S. Woltran. Evaluating tree-decomposition
based algorithms for answer set programming. In LION’12, LNCS, pages 130–144. Springer, 2012.
[22] M. Samer and S. Szeider. Algorithms for propositional model counting. J. Desc. Alg., 8(1), 2010.
[23] P. Simons, I. Niemelä, and T. Soininen. Extending and implementing the stable model semantics.
AIJ, 138(1-2):181–234, 2002.
[24] T. Syrjänen. Lparse 1.0 user’s manual. tcs.hut.fi/Software/smodels/lparse.ps, 2002.
12
A
Additional Example
We assume again row numbers per table τt , i.e., ut.i = hMt.i , σt.i , Ct.i i is the ith -row. Further, for each
counter-witness hCt.i.j , ρt.i.j i ∈ Ct.i , j marks its “order” (as depicted in Figure 2 (right)) in set Ct.i .
Example 5. Again, we consider P of Example 1 and T = (·, χ) of Figure 2 as well as tables τ1 , . . ., τ34
of Figure 2 (right) using DPSINC . We only discuss certain tables. Table τ1 = {h∅, ∅, ∅i} as type(t1 ) = leaf.
Node t2 introduces atom eab , resulting in table {h{eab }, ∅, {(∅, ∅)}i, h∅, ∅, ∅i} (compare to Algorithm 2
L3–5). Then, node t3 introduces rule rab , which is removed in node t4 . Note that C3.1.1 = h∅, ∅i ∈ C3.1.1
does not have a “successor row” in table τ4 since rab is not satisfied (see L11 and Definition 2). Table τ6
is then the result of a chain of introduce nodes, and contains for each witness set M6.i every possible
counter-witness set C6.i.j with C6.i.j ( M6.i . We now discuss table τ12 , intuitively containing (a
projection of ) (counter-)witnesses of τ10 , which satisfy rule rbc after introducing rule rc1 . Observe that
there is no succeeding witness set for M6.2 = {eab } in τ10 (nor τ12 ), since eab ∈ M6.2 , but ab 6∈ M6.2
(required to satisfy rb ). Rows u12.1 , u12.4 form successors of u6.3 , while rows u12.2 , u12.5 succeed u6.1 ,
since counter-witness set C6.1.1 has no succeeding row in τ10 because it does not satisfy rb . Remaining
rows u12.3 , u12.6 have “origin” u6.4 in τ6 .
B
B.1
Omitted Proofs
Correctness of DynASP2.5
Bliem et al. [5] have shown that augmentable W-Tabs can be transformed into W, W-Tabs, which easily
allows reading off subset-minimal solutions starting at the table W, W-Tabs[n] for TD root n. We follow
their concepts and define a slightly extended variant of augmentable tables. Therefore, we reduce the
problem of enumerating disjunctive programs to EnumMinSAT1 and show that the resulting tables
of algorithm MOD (see Algorithm 2) are augmentable. In the end, we apply an earlier theorem [5]
transforming MOD-Tabs obtained by DPMOD into MOD, MOD-Tabs via the augmenting function aug(·)
proposed in their work. To this extent, we use auxiliary definitions Child-Tabst , origt (·) and evolt (·)
specified in Algorithm 3.
Definition 3. Let T = (T, χ) be a TD where T = (N, ·, ·), W be a table algorithm, t ∈ N , and
τ ∈ W-Tabs[t] be the table for node t. For tuple ~u = hM, σ, · · · i ∈ τ, we define α(~u) :=M , β(~u) :=σ. We
inductively define
[
[
α∗ (τ) :=
α(~u) ∪
α∗ (τ 0 ), and
τ 0 ∈Child-Tabst
~
u∈τ
β ∗ (τ) :=
[
[
β(~u) ∪
β ∗ (τ 0 ).
τ 0 ∈Child-Tabst
~
u∈τ
Moreover, we inductively define the extensions of a row ~u ∈ τ as
[
E(~u) := {~u} ∪ U | U ∈
{τ1 ∪ · · · ∪ τk | τi ∈ E(~u0i ) for all 1 ≤ i ≤ k} .
{{~
u01 },...,{~
u0k }}∈origt (~
u)
Remark 1. Any extension U ∈ E(~u) contains ~u and exactly one row from each table
Q that is a descendant
of τ. If ~u is a row of a leaf table, E(~u) = {{~u}} since origt (~u) = {∅} assuming i∈∅ Si = {()}.
Definition 4. Let τn be the table in W-Tabs for TD root n. We define the set sol(W-Tabs) of solutions
of W-Tabs as sol(W-Tabs) :={α∗ (U ) | ~u ∈ τn , U ∈ E(~u)}
Definition 5. Let τ be a table in W-Tabs such that τ10 , . . . , τk0 are the child tables Child-Tabst and let
~u, ~v ∈ τ. We say that x ∈ X(~u) has been X−illegally introduced at ~u if there are {{~u01 }, . . . , {~u0k }} ∈
origt (~u) such that for some 1 ≤ i ≤ k it holds that x ∈
/ X(~u0i ) while x ∈ X ∗ (τi0 ). Moreover, we say that
x ∈ X(~v ) \ X(~u) has been X−illegally removed at ~u if there is some U ∈ E(~u) such that x ∈ X(U ).
13
Definition 6. We call a table τ augmentable if the following conditions hold:
1. For all rows of the form hM, · · · , Ci, we have C = ∅.
2. For all ~u, ~v ∈ τ with ~u 6= ~v it holds that α(~u) ∪ β(~u) 6= α(~v ) ∪ β(v).
3. For all ~u = hM, σ, · · · i ∈ τ, {{~u01 }, . . . , {~u0k }} ∈ origt (~u), 1 ≤ i < j ≤ k, I ∈ E(~u0i ) and J ∈ E(~u0j )
it holds that α∗ (I) ∩ α∗ (J) ⊆ M and β ∗ (I) ∩ β ∗ (J) ⊆ σ.
4. No element of α∗ (τ) has been α-illegally introduced and no element of β ∗ (τ) has been β-illegally
introduced.
5. No element of α∗ (τ) has been α-illegally removed and no element of β ∗ (τ) has been β-illegally
removed.
We call W-Tabs augmentable if all its tables are augmentable.
It is easy to see that MOD-Tabs are augmentable, that is, Algorithm 2 (DPMOD (·)) computes only
augmentable tables.
Observation 1. MOD-Tabs are augmentable, since DPMOD (·) computes augmentable tables. CMOD-Tabs
are augmentable, since DPCMOD (·) computes augmentable tables.
The following theorem establishes that we can reduce an instance of EnumAsp (restricted to disjunctive input programs) when parameterized by semi-incidence treewidth to an instance of EnumMinSAT1
when parameterized by the treewidth of its incidence graph.
Lemma 1. Given a disjunctive program P of semi-incidence treewidth k = tw (S(P )). We can produce
in time O(kP k) a propositional formula F such that the treewidth k 0 of the incidence graph I(F )8 is
k 0 ≤ 7k + 2 and the answer sets of P and subset-minimal models of F * are in a particular one-toone correspondence. More precisely, M is an answer set of P if and only if M ∪ Maux ∪ {sol} is a
subset-minimal model of F where Maux is a set of additional variables occurring in F , but not in P and
variables introduced by Tseitin normalization.
Proof. Let P be a disjunctive program of semi-incidence treewidth k = tw (S(P )). First, we construct
a formula F consisting of a conjunction over formulas F r , F impl , F sol , F min followed by Tseitin
normalization of F to obtain F * . Among the atoms9 of our formulas will the atoms at(P ) of the program.
Further, for each atom a such that a ∈ B − (r) for some rule r ∈ P , we introduce
atom a0 . In
S a fresh
−
− 0
0
0
−
:=
the following, we denote by Z the set {z : z ∈ Z} for any set Z and by BP
r∈P Br . Hence, (BP )
denotes a set of fresh atoms for atoms occurring in any negative body. Then, we construct the following
formulas:
F r (r) :=Hr ∨ ¬Br+ ∨ (Br− )0
F
impl
F
for r ∈ P
0
(a) :=a → a
for a ∈
0
sol
(a) :=sol → (a → a)
_
F min :=¬sol →
(a0 ∧ ¬a)
for a ∈
BP−
BP−
(1)
(2)
(3)
(4)
− 0
a0 ∈(BP
)
F :=
^
r∈P
F r (r) ∧
^
−
a∈BP
F impl (a) ∧
^
F sol (a) ∧ F min
(5)
−
a∈BP
Next, we show that M is an answer set of P if and only if M ∪ ([M ∩ BP− ])0 ∪ {sol} is a subset-minimal
model of F .
8 The incidence graph I(F ) of a propositional formula F in CNF is the bipartite graph that has the variables and
clauses of F as vertices and an edge v c if v is a variable that occurs in c for some clause c ∈ F [22].
9 Note that we do not distinguish between atoms and propositional variables in terminology here.
14
(⇒): Let M be an answer set of P . We transform M into Y :=M ∪ ([M ∩ BP− ])0 ∪ {sol}. Observe that Y
satisfies all subformulas of F and therefore Y F . It remains to show that Y is a minimal model of F .
Assume towards a contradiction that Y is not a minimal model. Hence, there exists X with X ( Y . We
distinguish the following cases:
1. sol ∈ X: By construction of F we have X a0 ↔ a for any a0 ∈ (BP− )0 , which implies that
X ∩ at(P ) P M . However, this contradicts our assumption that M is an answer set of P .
2. sol 6∈ X: By construction of F there is at least one atom a ∈ BP− with a0 ∈ X, but a 6∈ X.
Consequently, X ∩ at(P ) P M . This contradicts again that M is an answer set of P .
(⇐): Given a formula F that has been constructed from a program P as given above. Then, let Y be a
subset-minimal model of F such that sol ∈ Y . By construction we have for every a0 ∈ Y ∩ (BP− )0 that
a ∈ Y . Hence, we let M = at(P ) ∩ Y . Observe that M satisfies every rule r ∈ P according to (A1) and
is in consequence a model of P . It remains to show that M is indeed an answer set. Assume towards a
contradiction that M is not an answer set. Then there exists a model N ( M of the reduct P M . We
distinguish the following cases:
1. N is not a model of P : We construct X :=N ∪ [Y ∩ (BP− )0 ] and show that X is indeed a model
of F . For this, for every r ∈ P where B − (r) ∩ M 6= ∅ we have X F r (r), since (Y ∩ (BP− )0 ) ⊆ X
by definition of X. For formulas (A1) constructed by F r (r) using remaining rules r, we also have
X F r (r), since N {r}M . In conclusion, X F and X ( Y , and therefore X contradicts Y is
a subset-minimal model of F .
2. N is also a model of P : Observe that then X :=N ∪ [N ∩ BP− ]0 ∪ {sol} is also a model of F , which
contradicts optimality of Y since X ( Y .
By Tseitin normalization, we obtain F ∗ , thereby introducing fresh atoms la0 for each a0 ∈ (BP− )0 :
F r* (r) :=Hr ∨ ¬Br+ ∨ (Br− )0
impl*
F
F
(a) :=¬a ∨ a
0
for r ∈ P
for a ∈
0
sol*
(a) :=¬sol ∨ (¬a ∨ a)
_
F1min :=sol ∨
(la0 )
for a ∈
(A1*)
BP−
BP−
(A2*)
(A3*)
(A4.1*)
−
a0 ∈BP
0
F2min (a) :=¬a0 ∨ a ∨ la0
F3min (a) :=¬la0
F4min (a) :=¬la0
0
for a ∈ BP−
(A4.2*)
BP−
BP−
(A4.3*)
∨a
for a ∈
∨ ¬a
for a ∈
(A4.4*)
Observe that the Tseitin normalization is correct and that there is a bijection between models of F ∗
and F .
Observe that our transformations runs in linear time and that the size of F * is linear in kP k. It
remains to argue that tw(I(F * )) ≤ 7k + 2. For this, assume that T = (T, χ, n) is an arbitrary but fixed
TD of S(P ) of width w. We construct a new TD T 0 :=(T, χ0 , n) where χ0 is defined as follows. For each
TD node t,
[
χ0 (t) :=
{a0 , la0 } ∪ [χ(t) ∩ at(P )] ∪ {sol} ∪ cl(t)
−
a∈BP
∩χ(t)
where
cl(t) :=
[
[F impl* (a), F sol* (a), F2min (a), F3min (a), F4min (a)] ∪ {F1min } ∪
−
a∈BP
∩χ(t)
[
{F r* (r)}.
r∈P ∩χ(t)
It is easy to see that T 0 is indeed a TD for I(F ∗ ) and that the width of T 0 is at most 7w + 2.
15
Definition 7. We inductively define an augmenting function aug(W-Tabs) that maps each table τ ∈
W-Tabs[t] for node t from an augmentable table to a table in W, W-Tabs[t]. Let the child tables of τ be
called τ10 , . . . , τk0 . For any 1 ≤ i ≤ k and ~u ∈ τi , we write res(~u) to denote {~v ∈ aug(τi0 ) | α(~u) = α(~v )}.
We define aug(τ) as the smallest table that satisfies the following conditions:
Q
1. For any ~u ∈ τ, {{~u01 }, . . . , {~u0k }} ∈ origt (~u) and {{~v10 }, . . . , {~vk0 }} ∈ ˆ 1≤i≤k res(~u0i ), there is a row
~v ∈ aug(τ) with α(~u) = α(~v ) and {{~v10 }, . . . , {~vk0 }} ∈ origt (~v ).
2. For any ~u, ~v ∈ aug(τ) with ~u = h· · · , Ci such that α(~v ) ⊆ α(~u), {{~u01 }, . . . , {~u0k }} ∈ origt (~u) and
{{~v10 }, . . . , {~vk0 }} ∈ origt (~v ) the following holds: Let 1 ≤ i ≤ k with ~u0i = h· · · , Ci i, ~ci = hCi , · · · i ∈
(Ci ∪ {~u0i }) with Ci ⊆ α(~vi0 ), and 1 ≤ j ≤ k with ~cj 6= ~u0j or α(~v ) ( α(~u). Then, there is a row
~c ∈ C with α(~c) ⊆ α(~v ) if and only if ~c ∈ τ and {{~c1 }, . . . , {~ck }} ∈ origt (~c).
For W-Tabs, we write aug(W-Tabs) to denote the result isomorphic to W, W-Tabs where each table τ in
W-Tabs corresponds to aug(τ).
Proposition 2. Let W-Tabs be augmentable. Then,
sol(aug(W-Tabs)) = {M ∈ sol(W-Tabs) | @M 0 ∈ sol(W-Tabs) : M 0 ( M }.
Proof (Sketch). The proof follows previous work [5]. We sketch only differences from their work. Any
row ~u ∈ τ of any table τ not only consists of set α(~u) being subject to subset-minimization and relevant
to solving EnumAsp. In addition, our definitions presented above also allow “auxiliary” sets β(~u) per
row ~u, which are not subject to the minimization. Moreover, by the correctness of the table algorithm
INC by Fichte and Szeider [11], we only require to store a set C of counter-witnesses hC, · · · i ∈ C per
witness set M , where each C forms a strictly ⊂-smaller model of M . As a consequence, there is no need
to differ between sets of counter-witnesses, which are strictly included or not, see [5]. Finally, we do not
need to care about duplicate rows (solved via compression function compr(·) in [5]) in τ, since τ is a set.
(7k+4)
Theorem 2. EnumAsp when the input is restricted to disjunctive programs can be solved in time 22
kP k computing aug(DPMOD (·)), where k refers to the treewidth of S(P ).
·
Proof (Sketch). First, we use reduction R(P, k) = (F ∗ , k 0 ) defined in Lemma 1 to construct an instance
of SAT given our disjunctive ASP program P . Note that k 0 = tw(I(F ∗ )) ≤ 7k + 2. Then, we can
03
compute in time 2O(k ) · |I(F ∗ )| a tree decomposition of width at most k 0 [6]. Note that since we require
to look for solutions containing sol at the root, we modify each bag of T such that it contains sol.
We call the resulting tree decomposition T 0 . We compute aug(DPMOD (T 0 )) using formula F ∗ (see
Algorithm 2). Finally, by Theorem 2 and Lemma 1, we conclude that answer sets of P correspond to
{M ∈ sol(aug(DPMOD (T 0 ))) | sol ∈ M, @M 0 ∈ sol(DPMOD (T 0 )) : M 0 ( M }.
The complexity proof sketched in [5] only cares about the runtime being polynomial. In fact, the
algorithm can be carried out in linear time, following complexity proofs presented by Fichte et al. [11],
(7k+4)
which leads to a worst-case runtime of 22
· kP k.
We can now even provide a “constructive definition” of the augmenting function aug(·).
Proposition 3. The resulting table aug(W-Tabs) obtained via DPW (T ) for any TD T is equivalent to
the table DPLW,W (T ) as given in Algorithm 3.
Proof (Idea). Intuitively, (1.) of Definition 7 concerns completeness, i.e., ensures that no row is left out
during the augmentation, and is ensured by row 7 of Algorithm 3 since each ~u ∈ W-Tabs is preserved.
The second condition (2.) enforces that there is no missing counter-witness for any witness, and the idea
is that whenever two witnesses ~u, ~v ∈ τ are in a subset relation (α(~v ) ⊆ α(~u)) and their corresponding
linked counter-witnesses (fcw ) of the corresponding origins (orig) are in a strict subset relation, then
there is some counter-witness c for u if and only if ~c ∈ τ is the successor (evol) of these corresponding
linked counter-witnesses. Intuitively, we can not miss any counter-witnesses in DPLW,W (T ) required by
16
(2.), since this required that there are two rows ~u0 , ~v 0 ∈ τ 0 with α(~v ) = α(~u) for one table τ 0 . Now let
the corresponding succeeding rows ~u, ~v ∈ τ (i.e., ~u ∈ evolt ({{~u0 }}), ~v ∈ evolt ({{~v 0 }}), respectively) with
α(~v ) ( α(~u), β(~v ) 6⊆ β(~u) and β(~v ) 6⊇ β(~u), mark the first encounter of a missing counter-witness. Since
β(~v ) is incomparable to β(~u), we conclude that the first encounter has to be in a table preceeding τ. To
conclude, one can show that DPLW,W (T ) does not contain “too many” rows, which do not fall under
conditions (1.) and (2.).
Theorem 2 works not only for disjunctive ASP via reduction to EnumMinSAT1, where witnesses
and counter-witnesses are derived with the same table algorithm MOD. In fact, one can also link
counter-witnesses to witnesses by means of DPLW,C (·), thereby using table algorithms W, C for computing
witnesses and counter-witnesses, respectively. In order to show correctness of algorithm DPLMOD,CMOD (·)
(Theorem 1) working for any ASP program, it is required to extend the definition of the augmenting
function aug(·) such that it is capable of using two different tables.
Proposition 4. Problem EnumAsp can be solved in time f (k)·kP k computing DPLMOD,CMOD (·), where k
refers to the treewidth of S(P ) and f is a computable function.
C
C.1
Additional Information on the Benchmarks
Benchmark Sets
In this paper, we mainly presented10 the Steiner tree problem using public transport networks. We
also considered benchmarks for counting answer sets as carried out in earlier work [11]. DynASP2.5
performs slightly better than DynASP2 on those instances. Hence, we do not report them here.
C.1.1
Transit Graphs
The instance graphs have been extracted from publicly available mass transit data feeds and splited by
transportation type, e.g., train, metro, tram, combinations. We heuristically computed tree decompositions [2] and obtained relatively fast decompositions of small width unless detailed bus networks were
present. Among the graphs considered were public transit networks of the cities London, Bangladesh,
Timisoara, and Paris.
C.1.2
Steiner Tree Problem
Picture yourself as the head of a famous internet service provider, which is about to provide high-speed
internet for their most-prestigious customers in public administration in order to increase productivity
levels beyond usual standards. However, these well-paying customers have to be connected via expensive
fibre cables. The good news is that the city council already confirmed that you are allowed to use
existing cable ducts, which basically adhere to the city’s transit network. We assumed for simplicity,
that edges have unit costs, and randomly generated a set of terminal stations — which are compliant
with the customers — among our transit stations (vertices). The goal is to search for a set of transit
connections of minimal cardinality such that the customers can be connected for example when putting
fibre cables along the transit network.
An encoding for this problem is depicted in Listing 1 and assumes a specification of the graph
(via edge) and the facilities (terminalVertex ) of our customers in public administration as well as the
number (numVertices) of vertices. The encoding is based on the saturation technique [9] and in fact
outperformed a different encoding presented in Listing 2 on all our instances using both solvers, Clasp
and DynASP2.5. At first sight, this observation seems quite surprising, however, we benchmarked on
more than 60 graphs with 10 varying decompositions for each solver variant and additional configurations
and different encodings for Clasp.
10 Benchmarks,
encodings, and results are available at https://github.com/daajoe/dynasp experiments/tree/ipec2017.
17
%
%
%
vertex ( X ) ← edge (X , _ ) .
vertex ( Y ) ← edge (_ , Y ) .
edge (X , Y ) ← edge (Y , X ) .
%
0 { selectedEdge (X , Y ) } 1 ← edge (X , Y ) , X < Y .
%
s1 ( X ) ∨ s2 ( X ) ← vertex ( X ) .
%
saturate
saturate
%
%
saturate
saturate
← selectedEdge (X , Y ) , s1 ( X ) , s2 ( Y ) , X < Y .
← selectedEdge (X , Y ) , s2 ( X ) , s1 ( Y ) , X < Y .
← N #count { X : s1 ( X ) , term inalVert ex ( X ) } , numVertices ( N ) .
← N #count { X : s2 ( X ) , term inalVert ex ( X ) } , numVertices ( N ) .
s1 ( X ) ← saturate , vertex ( X ) .
s2 ( X ) ← saturate , vertex ( X ) .
← not saturate .
%
#minimize { 1 ,X , Y : selectedEdge (X , Y ) }.
Listing 1
Encoding for St
%
%
edge (X , Y ) ← edge (Y , X ) .
{ selectedEdge (X , Y ) : edge (X , Y ) , X < Y }.
%
reached ( Y ) ← Y = #min { X : terminal Vertex ( X ) }.
reached ( Y ) ← reached ( X ) , selectedEdge (X , Y ) .
reached ( Y ) ← reached ( X ) , selectedEdge (Y , X ) .
← term inalVert ex ( X ) , not reached ( X ) .
%
#minimize { 1 ,X , Y : selectedEdge (X , Y ) }.
Listing 2
Alternative encoding for St
Example 6 (Steiner Tree). Let G = (V, E) be a graph and VT ⊆ V . A uniform Steiner tree on G is a
subgraph SG = (VS , ES ) of G such that VT ⊆ VS and for each distinct pair v, w ∈ VT there is a path
from v to w. The Steiner tree problem Enum-St asks to output all uniform Steiner trees. We encode
Enum-St into an ASP program as follows: Among the atoms of our program will be an atom av for each
vertex v ∈ VT , and an atom evw for each edge vw ∈ E assuming v < w for an arbitrary, but fixed total
ordering < among V . Let s be an arbitrary vertex s ∈ VT . We generate program P (G, VT ) :={{evw } ←
;
evw | vw ∈ E} ∪ {av ← aw , evw ; aw ← av , evw | vw ∈ E, v < w} ∪ {← ¬av | v ∈ VT } ∪ {as ← }.
It is easy to see that the answer sets of the program and the uniform Steiner trees are in a one-to-one
correspondence.
C.1.3
Other Graph Problems
We refer to the technical report [10] for comprehensive benchmark results using common graph problems
and comparing different table algorithms of DynASP2 and DynASP2.5. There we investigated various
18
graph problems including, but not limited to, variants of graph coloring, dominating set and vertex
cover. Note that, however, the cluster setup was slightly different.
C.2
Benchmark Environment
The experiments presented ran on an Ubuntu 16.04.1 LTS Linux cluster of 3 nodes with two Intel Xeon
E5-2650 CPUs of 12 physical cores each at 2.2 Ghz clock speed and 256 GB RAM. All solvers have been
compiled with gcc version 4.9.3 and executed in single core mode.
19
| 2cs.AI
|
Ref: International Conference on Artificial Neural Networks (ICANN), Springer LNCS,
Vol. 9887, pp. 170–178, Barcelona, Spain, September 2016.
DNN-Buddies: A Deep Neural Network-Based
Estimation Metric for the Jigsaw Puzzle Problem
Dror Sholomon1 , Eli (Omid) David1 , and Nathan S. Netanyahu1,2
1
arXiv:1711.08762v1 [cs.CV] 23 Nov 2017
2
Department of Computer Science, Bar-Ilan University, Ramat-Gan 52900, Israel
[email protected], [email protected], [email protected]
Center for Automation Research, University of Maryland, College Park, MD 20742
[email protected]
Abstract. This paper introduces the first deep neural network-based estimation metric for the jigsaw puzzle problem. Given two puzzle piece edges,
the neural network predicts whether or not they should be adjacent in the
correct assembly of the puzzle, using nothing but the pixels of each piece.
The proposed metric exhibits an extremely high precision even though no
manual feature extraction is performed. When incorporated into an existing puzzle solver, the solution’s accuracy increases significantly, achieving
thereby a new state-of-the-art standard.
(a)
(b)
Fig. 1: Jigsaw puzzle before and after reassembly using our DNN-Buddies scheme in
an enhanced solver.
1
Introduction
Jigsaw puzzles are a popular form of entertainment, available in different variation
of difficulty to challenge children, adults and even professional players. Given n × m
2
D. Sholomon, E.O. David, N.S. Netanyahu
different non-overlapping tiles of an image, the objective is to reconstruct the original image, taking advantage of both the shape and chromatic information of each
piece. Despite the popularity and vast distribution of jigsaw puzzles, their assembly
is not trivial computationally, as this problem was proven to be NP-hard [1] [8].
Nevertheless, a computational jigsaw solver may have applications in many realworld applications, such as biology [16], chemistry [25], literature [18], speech descrambling [27], archeology [2] [15], image editing [5], and the recovery of shredded
documents or photographs [3,7,14,17]. Regardless, as noted in [11], research of the
topic may be justified solely due to its intriguing nature.
Recent years have witnessed a vast improvement in the research and development
of automatic jigsaw puzzle solvers, manifested in both puzzle size, solution accuracy,
and amount of manual human intervention required. In its most basic form, every
puzzle solver requires some function to evaluate the compatibility of adjacent pieces
and a strategy for placing the pieces as accurately as possible. Most strategies are
greedy and rely heavily on some “trick” to estimate whether two pieces are truly
adjacent (e.g. two pieces that are each the most compatible piece from all pieces to
one another, four pieces that form a loop where each pair’s compatibility is above a
threshold, etc). Such heuristics were dubbed an “estimation metric” in [20], as they
allow estimating the adjacency correctness of two pieces without knowing the correct
solution. The majority of recent works focused on devising elaborate, hand-crafted
compatibility functions and high-precision estimation metrics.
Despite the proven effectiveness of neural networks in the field of computer vision,
no attempt has been made to automatically devise a high-precision estimation metric
for the jigsaw puzzle problem. This might be due to the highly imbalanced nature
of the puzzle problem, as in each n × m puzzle, there are O(n × m) matching
piece-pairs and O(n2 × m2 ) possible mismatching ones. In this paper we propose a
novel estimation metric relying on neural networks. The proposed metric achieves
extremely high precision despite the lack of any manually extracted features.
The proposed metric proves to be highly effective in real-world scenarios. We
incorporated the metric in our GA-based solver, using no hand-crafted sophisticated compatibility measure and experimented with the currently known challenging
benchmarks of the hardest variant of the jigsaw puzzle problem: non-overlapping,
(28 × 28) square pieces (i.e. only chromatic information is available to the solver)
where both piece orientation and puzzle dimensions are unknown. The enhanced
solver proposed sets a new state-of-the-art in terms of the accuracy of the solutions
obtained and the number of perfectly reconstructed puzzles.
2
Previous Work
Jigsaw puzzles were first introduced around 1760 by John Spilsbury, a Londonian
engraver and mapmaker. Nevertheless, the first attempt by the scientific community to computationally solve the problem is attributed to Freeman and Garder [9]
who in 1964 presented a solver which could handle up to nine-piece problems. Ever
since then, the research focus regarding the problem has shifted from shape-based
to merely color-based solvers of square-tile puzzles. In 2010 Cho et al. [4] presented
Deep Neural Network Based Estimation Metric for the Jigsaw Puzzle Problem
3
a probabilistic puzzle solver that could handle up to 432 pieces, given some a priori
knowledge of the puzzle. Their results were improved a year later by Yang et al. [26]
who presented a particle filter-based solver. Furthermore, Pomeranz et al. [20] introduced that year, for the first time, a fully automated square jigsaw puzzle solver
that could handle puzzles of up to 3,000 pieces. Gallagher [10] has further advanced
this by considering a more general variant of the problem, where neither piece orientation nor puzzle dimensions are known. Son et al. [24] improved the accuracy
of the latter variant using so-called “loop-constraints”. Palkin and Tal [19] further
improved the accuracy and handled puzzles with missing pieces. Sholomon et al. [21]
presented a genetic algorithm (GA)-based solver for puzzles of known orientation
which was later generalized to other variants [22,23].
2.1
Compatibility Measures and Estimation Metrics
As stated earlier, most works focus on the compatibility measure and an estimation
metric. A compatibility measure is a function that given two puzzle piece edges (e.g.
the right edge of piece 7 versus the upper edge of piece 12) predicts the likelihood
that these two edges are indeed placed as neighbors in the correct solution. This
measure applies to each possible pair of piece edges. The estimation metric, on the
other hand, predict whether two piece edges are adjacent but may not apply to
many possible pairs. Following is a more detailed review of the efforts made so far
in the field.
Cho et al. [4] surveyed four compatibility measures among which they found dissimilarity the most accurate. Dissimilarity is the sum (over all neighboring pixels)
of squared color differences (over all color bands). Assuming pieces xi , xj are represented in some three-dimensional color space (like RGB or YUV) by a K × K × 3
matrix, where K is the height/width of a piece (in pixels), their dissimilarity, where
xj is to the right of xi , for example, is
v
uK 3
uX X
(xi (k, K, cb) − xj (k, 1, cb))2 ,
(1)
D(xi , xj , r) = t
k=1 cb=1
where cb denotes the color band.
Pomeranz et al. [20] also used the dissimilarity measure but found empirically
that using the (Lp )q norm works better than the usual L2 norm. Moreover, they
presented the high-precision best-buddy metric. Pieces xi and xj are said to bestbuddies if
∀xk ∈ P ieces, C(xi , xj , R1 ) ≥ C(xi , xk , R1 )
and
(2)
∀xp ∈ P ieces, C(xj , xi , R2 ) ≥ C(xj , xp , R2 )
where P ieces is the set of all given image pieces and R1 and R2 are “complementary”
spatial relations (e.g. if R1 = right, then R2 = left and vice versa).
Gallagher [10] proposed yet another compatibility measure, called the Mahalanobis gradient compatibility (MGC) as a preferable compatibility measure to those
4
D. Sholomon, E.O. David, N.S. Netanyahu
used by Pomeranz et al. [20]. The MGC penalizes changes in intensity gradients,
rather than changes in intensity, and learns the covariance of the color channels, using the Mahalanobis distance. Also, Gallagher suggested using dissimilarity ratios.
Absolute distances between potential piece edge matches are sometimes not indicative (for example in smooth surfaces like sea and sky), so considering the absolute
score, divided by the second-best score available seems more indicative.
Son et al. [24] suggested “loop-constraints”, four or more puzzle piece edges where
the compatibility ratio between each pair is in the top ten among all possible pairs of
piece edges in the given puzzle. Palkin and Tal [19] proposed a greedy solver based
on an L1 -norm asymmetric dissimilarity and the best-buddies estimation metric.
3
3.1
DNN-Buddies
Motivation
We propose a novel estimation metric called “DNN-Buddies”. Our goal is to obtain
a classifier which predicts the adjacency likelihood of two puzzle piece edges in the
correct puzzle configuration.
Note that despite the exponential nature of the problem (as there are O((nm)!)
possible arrangements of the pieces, taking into account rotations), the problem can
be solved theoretically by assigning correctly, in a consecutive manner, n × m − 1
piece-edge pairs. (This is reminiscent of finding a minimal spanning tree, as noted
by [10].) Hence, the classifier’s precision is of far greater importance than its recall.
A classifier with perfect precision and a recall of
n×m−1
1
n×m−1
=
<
all possible matches
4 × (n × (m − 1) + (n − 1) × m)
8
(3)
might achieve a perfect solution by itself.
3.2
Challenges
A straight-forward solution might have been to train a neural network against
matching-pairs vs. non-matching ones. However, the issue of a jigsaw puzzle piece
matching is of an imbalanced nature. In each n × m puzzle, there are O(n × m)
matching pairs of piece edges and O(n2 × m2 ) possible nonmatching ones. A thorough review on the challenges and tactics to avoid them can be found in [13].
The trivial approach of random or uninformed undersampling, i.e. randomly
choosing the required number of nonmatching pairs leads to a low-precision and highrecall metric, the very opposite of the goal set beforehand. We believe that the reason
for this shortcoming is that there exist many “easy-to-spot” mismatches but only a
handful of “hard-to-spot” ones. Thus, we resort to informed undersampling, choosing
a subset of “good” mismatching pairs according to some criterion. Nevertheless, we
avoid using any manual feature selection or other sophisticated image-related means.
In the jigsaw puzzle domain, similarly to many other problem domains, the
solver does not actually try to reassemble the original image (as this problem is
Deep Neural Network Based Estimation Metric for the Jigsaw Puzzle Problem
5
not mathematically defined), but rather tries solving a “proxy problem” which is
to achieve an image whose global overall score between abutting-edges is minimal.
Thus, we choose using the compatibility measure as the undersampling criterion.
3.3
Neural Network Training
For training and cross-validation, we use the 2,755 images of size 360 × 480 pixels
from the IAPR TC-12 Benchmark [12]. Each image is first converted to YUV space
followed by the normalization of each channel separately (via z-score normalization).
Next, each (puzzle) image is divided to 12 × 17 tiles, where each tile is of size 28 × 28
pixels (as in all previous works); finally, we create a balanced set of positive and
negative samples of puzzle-piece pairs, using informed undersampling as will be
described below. In the end, we obtain a balanced set of 970,224 pairs overall.
To balance our dataset, we use the most basic compatibility score which is the
dissimilarity between two piece-edges in the YUV color-space, as described in Eq. 1,
as an undersampling criterion. For each puzzle piece edge xi,j (i = 1..n×m, j = 1..4),
we find its most compatible piece edge xk1,l1 and its second most compatible piece
edge xk2,l2 . If the pair of edges xi,j −xk1,l1 is indeed adjacent in the original image, we
add this pair to the pool of positively-labeled samples and toss the pair xi,j − xk2,l2
to the pool of negatively-labeled samples. Otherwise, xi,j − xk1,l1 is added to the
negatively-labeled samples and the other pair is discarded. The latter is done to avoid
training the network on adjacent pieces which happen to be vastly different due to a
significant change of the image scenery in the corresponding region. In other words,
we restrict our interest to highly compatible piece edges that are indeed adjacent.
Since this method leads to more negative samples than positive ones, we eventually
randomly throw some negative samples to balance out the set.
From each image pair we extract the two columns near the edge, i.e. the column
of abutting pixels in each edge and the one next to it. This results is an input of size
(28 × 4 × 3 =) 336 pixels. We use a feed-forward neural network (FFNN) of five fully
connected layers of size 336, 100, 100, 100, and 2. The output is a softmax layer
containing two neurons. We expect (0, 1) for matching pairs and (1, 0) otherwise.
The activation used in all layers is the rectified linear unit (ReLU) function, i.e.
f (x) = max(0, x). Figure 2 depicts the network’s structure.
We trained the network in a supervised manner using Stochastic Gradient Descent that minimizes the negative log likelihood of the error for 100 iterations. The
resulting network reaches 95.04% accuracy on the training set and 94.62% on a
held-out test set.
All dataset preparation and network training was performed using Torch7 [6].
4
Experimental Results
For each piece edge xi,j (i = 1..n × m, j = 1..4), if its most compatible piece edge xk,l
is classified positively using the DNN-Buddies network, we define xk,l to be xi,j ’s
DNN-buddy piece edge. Note that each piece edge can have only a single DNN-buddy;
6
D. Sholomon, E.O. David, N.S. Netanyahu
Fig. 2: Architecture of our DNN-Buddies scheme.
also, some pieces might not have a DNN-buddy at all (if the most compatible piece
is not classified as one by the DNN-Buddies network).
First, we evaluate the precision of the proposed metric, i.e. how many DNNbuddies are indeed adjacent in the original image. Using the well known dataset
presented by Cho et al. [4] of 20 432-piece puzzles, we obtained a precision of 94.83%.
Next, we incorporated the estimation metric (due to the proposed DNN-Buddies
scheme) into the GA-based solver proposed by us previously [23]. Unfortunately,
due to lack of space, no self-contained review of genetic algorithms and the proposed
method can be included in this paper. Nevertheless, the modification required with
respect to the existing GA framework is rather simple; if a DNN-buddy pair appears
in one of the parents, assign this pair in the child. Figure 3 describes the modified
crossover operator in the GA framework according to the above (see Step 2, which
includes the new DNN-buddy phase).
Until
1.
2.
3.
4.
5.
(n − 1) relative relations are assigned do
Try assigning all common relative relations in the parents.
Try assigning all DNN-buddy relative relations in the parents.
Try assigning all best-buddy relative relations in the parents.
Try assigning all existing most-compatible relative relations.
Try assigning random relative relations.
Fig. 3: Crossover overview
We ran the augmented solver on the 432-piece puzzle set and on the two additional datasets proposed by Pomeranz et al. [20] of 540- and 805- piece puzzles.
We evaluated our results according to the neighbor comparison which measures the
fraction of correct neighbors and the number of puzzles perfectly reconstructed for
each set.
Deep Neural Network Based Estimation Metric for the Jigsaw Puzzle Problem
7
Table 1 presents the accuracy results of the same solver with and without the
DNN-Buddies metric. For each dataset we achieve a considerable improvement in
the overall accuracy of the solution, as well as the number of perfectly reconstructed
puzzles. Moreover, our enhanced deep neural network-based scheme appears to outperform the current state-of-the-art results, as it yields accuracy levels of 95.65%,
96.37% and 95.86%, which surpass, respectively, the best results known of 95.4% [19],
94.08% and 94.12% [23].
# of Pieces
432
540
805
GA
Neighbor
Perfect
94.88%
94.08%
94.12%
11
8
6
Our (GA + DNN-Buddies)
Neighbor
perfect
95.65%
96.37%
95.86%
12
11
8
Table 1: Comparison of our accuracy results with and without the new DNN-Buddies
estimation metric.
5
Conclusions
In this paper we presented the first neural network-based estimation metric for the
jigsaw puzzle problem. Unlike previous methods, no manual feature crafting was
employed. The novel method exhibits high precision and when combined with a
real-world puzzle solver, it significantly improves the solution’s accuracy to set a
new state-of-the art standard.
References
1. Altman, T.: Solving the jigsaw puzzle problem in linear time. Applied Artificial Intelligence an International Journal 3(4), 453–462 (1989)
2. Brown, B., Toler-Franklin, C., Nehab, D., Burns, M., Dobkin, D., Vlachopoulos, A.,
Doumas, C., Rusinkiewicz, S., Weyrich, T.: A system for high-volume acquisition and
matching of fresco fragments: Reassembling Theran wall paintings. ACM Transactions
on Graphics 27(3), 84 (2008)
3. Cao, S., Liu, H., Yan, S.: Automated assembly of shredded pieces from multiple photos.
In: IEEE International Conference on Multimedia and Expo. pp. 358–363 (2010)
4. Cho, T., Avidan, S., Freeman, W.: A probabilistic image jigsaw puzzle solver. In: IEEE
Conference on Computer Vision and Pattern Recognition. pp. 183–190 (2010)
5. Cho, T., Butman, M., Avidan, S., Freeman, W.: The patch transform and its applications to image editing. In: IEEE Conference on Computer Vision and Pattern
Recognition. pp. 1–8 (2008)
6. Collobert, R., Kavukcuoglu, K., Farabet, C.: Torch7: A matlab-like environment for
machine learning. In: BigLearn, NIPS Workshop. No. EPFL-CONF-192376 (2011)
7. Deever, A., Gallagher, A.: Semi-automatic assembly of real cross-cut shredded documents. In: ICIP. pp. 233–236 (2012)
8
D. Sholomon, E.O. David, N.S. Netanyahu
8. Demaine, E., Demaine, M.: Jigsaw puzzles, edge matching, and polyomino packing:
Connections and complexity. Graphs and Combinatorics 23, 195–208 (2007)
9. Freeman, H., Garder, L.: Apictorial jigsaw puzzles: The computer solution of a problem
in pattern recognition. IEEE Transactions on Electronic Computers EC-13(2), 118–127
(1964)
10. Gallagher, A.: Jigsaw puzzles with pieces of unknown orientation. In: IEEE Conference
on Computer Vision and Pattern Recognition. pp. 382–389 (2012)
11. Goldberg, D., Malon, C., Bern, M.: A global approach to automatic solution of jigsaw
puzzles. Computational Geometry: Theory and Applications 28(2-3), 165–174 (2004)
12. Grubinger, M., Clough, P., Müller, H., Deselaers, T.: The IAPR TC-12 benchmark:
A new evaluation resource for visual information systems. In: International Workshop
OntoImage. vol. 5, p. 10 (2006)
13. He, H., Garcia, E.A.: Learning from imbalanced data. Knowledge and Data Engineering, IEEE Transactions on 21(9), 1263–1284 (2009)
14. Justino, E., Oliveira, L., Freitas, C.: Reconstructing shredded documents through feature matching. Forensic science international 160(2), 140–147 (2006)
15. Koller, D., Levoy, M.: Computer-aided reconstruction and new matches in the forma
urbis romae. Bullettino Della Commissione Archeologica Comunale di Roma pp. 103–
125 (2006)
16. Marande, W., Burger, G.: Mitochondrial DNA as a genomic jigsaw puzzle. Science
318(5849), 415–415 (2007)
17. Marques, M., Freitas, C.: Reconstructing strip-shredded documents using color as feature matching. In: ACM symposium on Applied Computing. pp. 893–894 (2009)
18. Morton, A.Q., Levison, M.: The computer in literary studies. In: IFIP Congress. pp.
1072–1081 (1968)
19. Paikin, G., Tal, A.: Solving multiple square jigsaw puzzles with missing pieces. In:
Computer Vision and Pattern Recognition, 2015 IEEE Conference on. pp. 4832–4839.
IEEE (2015)
20. Pomeranz, D., Shemesh, M., Ben-Shahar, O.: A fully automated greedy square jigsaw
puzzle solver. In: IEEE Conference on Computer Vision and Pattern Recognition. pp.
9–16 (2011)
21. Sholomon, D., David, O.E., Netanyahu, N.S.: A genetic algorithm-based solver for very
large jigsaw puzzles. In: IEEE Conference on Computer Vision and Pattern Recognition. pp. 1767–1774 (2013)
22. Sholomon, D., David, O.E., Netanyahu, N.S.: A generalized genetic algorithm-based
solver for very large jigsaw puzzles of complex types. In: AAAI Conference on Artificial
Intelligence. pp. 2839–2845 (2014)
23. Sholomon, D., David, O.E., Netanyahu, N.S.: Genetic algorithm-based solver for very
large multiple jigsaw puzzles of unknown dimensions and piece orientation. In: ACM
Conference on Genetic and Evolutionary Computation. pp. 1191–1198 (2014)
24. Son, K., Hays, J., Cooper, D.B.: Solving square jigsaw puzzles with loop constraints.
In: European Conference on Computer Vision 2014, pp. 32–46. Springer (2014)
25. Wang, C.S.E.: Determining molecular conformation from distance or density data.
Ph.D. Thesis, Massachusetts Institute of Technology (2000)
26. Yang, X., Adluru, N., Latecki, L.J.: Particle filter with state permutations for solving
image jigsaw puzzles. In: IEEE Conference on Computer Vision and Pattern Recognition. pp. 2873–2880 (2011)
27. Zhao, Y., Su, M., Chou, Z., Lee, J.: A puzzle solver and its application in speech
descrambling. In: WSEAS International Conference Computer Engineering and Applications. pp. 171–176 (2007)
| 9cs.NE
|
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH
EMBEDDING DIMENSION THREE
arXiv:1701.00988v1 [math.AC] 4 Jan 2017
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
Abstract. This work extends the results known for the Delta sets of non-symmetric numerical
semigroups with embedding dimension three to the symmetric case. Thus, we have a fast algorithm
to compute the Delta set of any embedding dimension three numerical semigroup. Also, as a
consequence of these resutls, the sets that can be realized as Delta sets of numerical semigroups of
embedding dimension three are fully characterized.
1. Introduction
Delta sets (or sets of distances) were first introduced in [13] as a tool to study factorizations
in non-unique factorization domains. Since then several authors have studied their properties. In
particular, for numerical semigroups, in [3], the firsts results for some special cases of embedding
dimension three numerical semigroups are presented. Delta sets for numerical semigroups are eventually periodic as explained in [5], and thus, if a bound for this periodicity is known, the whole
Delta set of a numerical semigroup can be computed. The bounds given in [5] were improved in
[9]. In [2] a dynamical procedure to compute Delta sets for numerical semigroups is presented, that
makes use of the bound given in [9]; this procedure has been implemented in numericalsgps [7].
Recently, a new procedure to compute Delta sets of any affine semigroup using Göbner basis has
been presented in [11]. Needless to say, all these algorithms and bounds were the consequence of a
better (theoretical) understanding of Delta sets.
In [6] it is shown that the maximum of the Delta set of a numerical semigroup is attained in a Betti
element of the semigroup (indeed, it is shown that this holds for a wider class of atomic monoids).
This does not provide a way to compute the whole set. The minimum was known to be the greatest
common divisor of the Delta set since [13]; however, the elements in the interval determined by this
minimum and maximum element of the Delta set are not known in general. Some realization results
were given in [4], while in [10] the sets that can be realized as the Delta set of a non-symmetric
numerical semigroup with embedding dimension three are completely characterized. In that paper,
the authors present a procedure that strongly reduces the time needed to compute the Delta sets
of non-symmetric embedding dimension three numerical semigroups. In this manuscript, we extend
this algorithm to the symmetric case.
Although the main results yield the same algorithm for both symmetric and non-symmetric
numerical semigroups with embedding dimension three, there are significant differences in the intermediate results and their proofs. These differences stem from the different structure of the Betti
elements of these semigroups (see Proposition 3).
The factorizations of the Betti elements of non-symmetric embedding dimension three numerical
semigroups have been thoroughly studied, and thus provided an easier starting point. However, in
that case, some technical and tedious detours were needed to obtain our result.
Due to the fact that, in the symmetric case, we do not have a unique minimal presentation (in
contraposition to what happens in the non-symmetric case), the first step is to choose the right
2010 Mathematics Subject Classification. 05A17,20M13,20M14.
Key words and phrases. Numerical Semigroups, non-unique factorization, Delta set, Euclid’s Algorithm.
The first and second author are supported by the project FQM-343, MTM2014-55367-P, and FEDER funds.
1
2
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
factorization of the Betti elements to start our algorithm. However, in this case we can work
directly on the Euclid’s set (see Definition 10), whereas this cannot be done in the non-symmetric
case without building a certain theoretical framework. In this way, we can better see the idea behind
the main result, and the technical results are no longer necessary. Moreover, the proofs and the
reading of the paper are more comfortable, and the number of pages is reduced. Unfortunately,
from our reasoning, it emerged that there are no relations between these two cases; we think that
it is not possible to find a common way to deduce both settings together.
This paper, even though is complementary to [10], is self-contained, and therefore can be read
separately from [10]. After some preliminary results, we explain how we can choose the elements
δ1 and δ2 needed to start the algorithm. As we mentioned above, this was not needed in the nonsymmetric case, since in that setting the Delta sets of the Betti elements of the numerical semigroup
are singletons. Then, we prove our main result, which yields an algorithm that works in the same
way as in the non-symmetric case; in particular, notice that Example 20 provided in this paper
gives the same Delta set as in [10, Example 38], because it is obtained from the same δ1 and δ2 .
2. Preliminaries
Let N be the set of non negative integers. Take n1 , n2 , n3 ∈ N with gcd(n1 , n2 , n3 ) = 1, and
define S as the numerical semigroup minimally generated by {n1 , n2 , n3 }, that is,
S = {a1 n1 + a2 n2 + a3 n3 | a1 , a2 , a3 ∈ N}.
The condition gcd(n1 , n2 , n3 ) = 1 is equivalent to say that the set of gaps, G(S) = N \ S, has finitely
many elements. The maximum of Z \ S is called the Frobenius number, and we denote it as F(S).
Definition 1. A numerical semigroup S is symmetric if x ∈ Z \ S implies F(S) − x ∈ S.
The reader interested in numerical semigroups may have a look at [14] and for some applications
to [1].
The set of factorizations of s ∈ S is
Z(s) = {(z1 , z2 , z3 ) ∈ N3 | z1 n1 + z2 n2 + z3 n3 = s}.
We denote the length of a factorization z = (z1 , z2 , z3 ) ∈ Z(s) as
ℓ(z) = z1 + z2 + z3 .
The set of lengths of s ∈ S is
L(s) = {ℓ(z) | z ∈ Z(s)}.
It is easy to see that L(s) ⊂ [0, s], and consequently L(s) is finite. So, it is of the form L(s) =
{l1 , . . . , lk } for some positive integers l1 < l2 < · · · < lk . The set
∆(s) = {li − li−1 | 2 ≤ i ≤ k}
is known as the Delta set of s ∈ S (or set of distances), and the Delta set of S is defined as
∆(S) = ∪s∈S ∆(s).
Now, we define
MS = {v = (v1 , v2 , v3 ) ∈ Z3 | v1 n1 + v2 n2 + v3 n3 = 0}.
We can extend the ℓ function to elements in MS : for v = (v1 , v2 , v3 ) ∈ Z3 , set
ℓ(v) = v1 + v2 + v3 .
Note that ℓ is a linear map.
The aim of this paper is to compute the Delta set of S by using Euclid’s algorithm with two
special elements in this set. These special distances are associated to particular elements of S, called
the Betti elements. The definition of Betti element relies in the construction of a graph associated
to the elements in the semigroup. Let s ∈ S. The graph ∇s is the graph with vertices Z(s), the
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
3
set of factorization of s, and zz′ is an edge if if z · z′ 6= 0, that is, there exists a common nonzero
coordinate in both factorizations.
Definition 2. An element s ∈ S is called a Betti element if and only if ∇s is not connected. The
set of Betti elements will be denoted by Betti(S).
A numerical semigroup with embedding dimension three might have up to three Betti elements.
In [14, Example 8.23] it is shown that Betti(hn1 , n2 , n3 i = {c1 n1 , c2 n2 , c3 n3 }, where ci is the least
positive integer such that ci ni ∈ hnj , nk i, {i, j, k} = {1, 2, 3}.
Proposition 3. [14, Chapter 9] Let S an embedding dimension three numerical then 1 ≤ ♯Betti(S) ≤
3. Moreover, S is non-symmetric if and only if ♯Betti(S) = 3.
Example 4. Consider S = h3, 5, 7i = {0, 3, 5, →} (the arrow means that all integers greater than 5
are in the semigroup). In this case, Betti(S) = {10, 12, 14}, and
Z(10) = {(1, 0, 1), (0, 2, 0)}, L(10) = {2},
∆(10) = ∅,
Z(12) = {(4, 0, 0), (0, 1, 1)}, L(12) = {2, 4}, ∆(12) = {2},
Z(14) = {(3, 1, 0), (0, 0, 2)}, L(14) = {2, 4}, ∆(14) = {2}.
Let S = h6, 8, 11i, with Betti elements 22 and 24.
Z(22) = {(1, 2, 0), (0, 0, 2)}, L(22) = {2, 3}, ∆(22) = {1},
Z(24) = {(4, 0, 0), (0, 3, 0)}, L(24) = {3, 4}, ∆(24) = {1}.
Finally, let S = h6, 10, 15i. Then Betti(S) = {30},
Z(30) = {(5, 0, 0), (0, 3, 0), (0, 0, 2)}, L(30) = {2, 3, 5}, ∆(30) = {1, 2}.
More details on the relation between Betti elements and Delta sets can be found in [6].
It is straightforward to see that from the factorizations of every b ∈ Betti(S), we can construct
{z − z′ ∈ MS | z 6= z′ , z, z′ ∈ Z(b), b ∈ Betti(S)}, which generates MS as a group.
For instance, for S = h6, 8, 11i, (1, 2, −2) and (4, −3, 0) generate as a group the set of integer
solutions of the equation 6x1 + 8x2 + 11x3 = 0.
Since the structure of the Delta set of a non-symmetric numerical semigroup is known, we focus
on the study of the symmetric numerical semigroups.
3. Two cases in the symmetric setting
Let S be a numerical semigroup minimally generated by {n1 , n2 , n3 }, and assume that S is
symmetric. In this Section, we define the integers and vectors that allow us to study MS and
construct ∆(S).
By Proposition 3, #Betti(S) ≤ 2. Now, we going to choose a suitable basis {v1 , v2 } for MS
according to #Betti(S).
(1) A single Betti element.
If #Betti(S) = 1, then (n1 , n2 , n3 ) = (s2 s3 , s1 s3 , s1 s2 ) for some positive pairwise coprime integers s1 > s2 > s3 (see [12]). Moreover, Betti(S) = {s1 s2 s3 }, and the set of factorizations of
s1 s2 s3 is Z(s1 s2 s3 ) = {(s1 , 0, 0), (0, s2 , 0), (0, 0, s3 )}. In this setting, it is easy to see that MS is
the group spanned by {(s1 , −s2 , 0), (0, s2 , −s3 )}. We set v1 = (s1 , −s2 , 0), v2 = (0, s2 , −s3 ).
(2) Two Betti elements.
If #Betti(S) = 2, we have (n1 , n2 , n3 ) = (am1 , am2 , bm1 + cm2 ) with a ≥ 2 and b + c ≥ 2, and
we can also assume that m1 < m2 [14, Theorem 10.6]. In this setting
Betti(S) = {a(bm1 + cm2 ), am1 m2 },
4
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
with
Z(a(bm1 + cm2 )) =
j k
n
j k
b − mb2 m2 , c + mb2 m1 , 0 , . . . , (b − m2 , c + m1 , 0), (b, c, 0),
j k
o
j k
(b + m2 , c − m1 , 0) . . . , b + mc1 m2 , c − mc1 m1 , 0 , (0, 0, a)
and Z(am1 m2 ) = {(m2 , 0, 0), (0, m1 , 0)}. Moreover, MS is spanned by {(m2 , −m1 , 0), (b +
λm2 , c − λm1 , −a)} for any λ ∈ Z. We choose λ ∈ {− ⌊b/m2 ⌋ , . . . , ⌊c/m1 ⌋} such that ℓ((b +
λm2 , c − λm1 , −a)) is minimal. We define v1 = (m2 , −m1 , 0) and v2 = (b + λm2 , c − λm1 , −a).
Now, we define δ1 = ℓ(v1 ) and δ2 = |ℓ(v2 )|. We consider the absolute value for ℓ(v2 ), since it
might happen that ℓ(v2 ) < 0 when there are two Betti elements and a > b + c + λ(m2 − m1 ). In
order to keep trace of the sign of ℓ(v2 ), let sgn be the sign function, and set σ = sgn(ℓ(v2 )). In this
way, we have δ2 = σℓ(v2 ).
The integers δ1 , δ2 just defined are tightly related to ∆(S).
Proposition 5. Let S be a symmetric numerical semigroup, and let δ1 and δ2 be defined as above.
Then
max ∆(S) = max{δ1 , δ2 }.
Proof. We know from [6] that max ∆(S) = max{max ∆(b) | b ∈ Betti(S)}.
If #Betti(S) = 1, since Z(s1 s2 s3 ) = {(s1 , 0, 0), (0, s2 , 0), (0, 0, s3 )}, we get ∆(s1 s2 s3 ) = {s1 −
s2 , s2 − s3 } = {δ1 , δ2 }, and the thesis follows.
If #Betti(S) = 2, we need to study Z(b) with b ∈ Betti(S) = {a(bm1 + cm2 ), am1 m2 }.
• Z(am1 m2 ) = {(m2 , 0, 0), (0, m1 , 0)}. Hence ∆(am1 m2 ) = {δ1 }.
• Z(a(bm1 + cm2 )) = {(0, 0, a)} ∪ {(b + km2 , c − km1 , 0) | k ∈ {− ⌊b/m2 ⌋ , . . . , ⌊c/m1 ⌋}}.
Observe that L(a(bm1 + cm2 )) = {a} ∪ {b + c + k(m2 − m1 ) | k ∈ {− ⌊b/m2 ⌋ , . . . , ⌊c/m1 ⌋}}. Consider the following cases.
(1) If a ≤ b + c − ⌊b/m2 ⌋(m2 − m1 ), then λ = −⌊b/m2 ⌋ and δ2 = b + c − ⌊b/m2 ⌋(m2 − m1 ) − a.
Hence ∆(a(bm1 + cm2 )) equals {δ1 , δ2 }, or {δ1 } if a = b + c − ⌊b/m2 ⌋(m2 − m1 ) (that is, δ2 = 0).
(2) If a ≥ b + c + ⌊c/m1 ⌋(m2 − m1 ), then λ = ⌊c/m1 ⌋, and we argue as in the previous case.
(3) Finally, if b + c − ⌊b/m2 ⌋(m2 − m1 ) < a < b + c + ⌊c/m1 ⌋(m2 − m1 ), there exists k ∈
{− ⌊b/m2 ⌋ , . . . , ⌊c/m1 ⌋ − 1} such that b + c + k(m2 − m1 ) ≤ a < b + c + (k + 1)(m2 − m1 ).
Then λ is either k or k + 1, and ∆(a(bm1 + cm2 )) = {δ1 , δ2 , |δ2 − δ1 |} (unless δ2 = 0 and
∆(a(bm1 + cm2 )) = {δ1 }).
In any case, max ∆(S) = max{δ1 , δ2 }.
The following result is a particular instance of a more general property.
Proposition 6. [6, Corollay 3.1] Let S be a symmetric numerical semigroup. Then
min ∆(S) = gcd{δ1 , δ2 }.
Thus, max ∆(S) is either δ1 or δ2 , while in our setting min ∆(S) = gcd(δ1 , δ2 ), and each element
of ∆(S) is a multiple of this greatest common divisor [13].
Remark 7. Observe that, in both cases, the vector v1 has the first coordinate positive, the second
one negative, and the third coordinate equal to zero. Our choice of λ in the case #Betti(S) = 2
ensures that the vector v2 has first coordinate nonnegative, positive the second, and the third
coordinate negative. We will represent this fact as:
v1 = (+, −, 0) and v2 = (+, +, −).
Proposition 8. Let S be a symmetric numerical semigroup with embedding dimension three. Let
δ1 , δ2 , v1 , v2 and σ be defined as above.
(1) if σ = 1, we have that δ2 v1 − σδ1 v2 = (?, −, +).
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
5
(2) if σ = −1, we have that δ2 v1 − σδ1 v2 = (+, ?, −).
The symbol “ ?” denotes the sign of this coordinate is not determined.
Proof. If σ = 1 and #Betti(S) = 1, we know that v1 = (s1 , −s2 , 0) and v2 = (0, s2 , −s3 ). Then
δ2 v1 − δ1 v2 = (δ2 s1 , −δ2 s2 − δ1 s2 , δ1 s3 ) = (δ2 s1 , −s2 (δ2 + δ1 ), δ1 s3 ) = (+, −, +).
For σ = 1 and #Betti(S) = 2, we have v1 = (m2 , −m1 , 0) and v2 = (b + λm2 , c − λm1 , −a), whence
δ2 v1 − δ1 v2 = (δ2 m2 − δ1 (b + λm2 ), −δ2 m1 − δ1 (c − λm1 ), δ1 a) = (?, −, +).
Finally if σ = −1 and #Betti(S) = 2,
δ2 v1 + δ1 v2 = (δ2 m2 + δ1 (b + λm2 ), −δ2 m1 + δ1 (c − λm1 ), −δ1 a) = (+, ?, −).
4. Euclid’s set and the Delta set
Associated to δ1 and δ2 we are going to define its Euclid’s set as the set of all integers that appear
in the naive implementation of the greatest common divisor algorithm. We will see that precisely
this set is the Delta set of the semigroup except to the zero element.
Proposition 9. Let δ1 , δ2 be two positive integers, and let x ∈ {1, . . . , max{δ1 , δ2 }} ∩ gZ, where
g = gcd(δ1 , δ2 ). Then there exist unique (x1 , x2 ) and (x′1 , x′2 ) in Z2 such that
(1) x = x1 δ1 + x2 δ2 with −δ1 /g < x2 ≤ 0 < x1 ≤ δ2 /g,
(2) x = x′1 δ1 + x′2 δ2 with −δ2 /g < x′1 ≤ 0 < x′2 ≤ δ1 /g.
Moreover (x1 , x2 ) = (x′1 + δ2 /g, x′2 − δ1 /g).
We will denote
• x(δ1 ,δ2 ) = (x1 , x2 ), where 0 < x1 ≤ δ2 /g, −δ1 /g < x2 ≤ 0, and x = x1 δ1 + x2 δ2 ,
• x′(δ1 ,δ2 ) = (x′1 , x′2 ), where −δ2 /g < x′1 ≤ 0, 0 < x2 ≤ δ1 /g, and x = x′1 δ1 + x′2 δ2 .
(δ ,δ )
′(δ ,δ )
′(δ ,δ )
(δ ,δ )
In particular, δ1 1 2 = (1, 0), δ1 1 2 = (1 − δ2 /g, δ1 /g), δ2 1 2 = (0, 1) and δ2 1 2 = (δ2 /g, 1 −
δ1 /g).
We want to depict the set of elements obtained after applying Euclid’s greatest common divisor
algorithm to δ1 and δ2 . We will use the naive approach that uses substraction instead of remainders
of divisions. Our set will be decomposed in subsets corresponding to the algorithm using remainders.
Definition 10. Let δ1 and δ2 be positive integers, and define jη1 = kmax{δ1 , δ2 }, η2 = min{δ1 , δ2 }
ηj
ηj+1 = ηj mod ηj+1 . Let i be
and η3 = η1 mod η2 . In general, for j > 0, define ηj+2 = ηj − ηj+1
the maximum index such that ηi+1 > 0. Define
D(η1 , η2 ) = {η1 , η1 − η2 , . . . , η1 mod η2 = η3 },
D(η2 , η3 ) = {η2 , η2 − η3 , . . . , η2 mod η3 = η4 },
D(η3 , η4 ) = {η3 − η4 , . . . , η3 mod η4 = η5 },
···
D(ηj−1 , ηj ) = {ηj−1 − ηj , . . . , ηj−1 mod ηj = ηj+1 },
···
D(ηi , ηi+1 ) = {ηi − ηi+1 , . . . , ηi mod ηi+1 = ηi+2 = 0}.
S
Let us denote by Euc(δ1 , δ2 ) = i∈I D(ηi , ηi+1 ), where I = {i ∈ N | ηi+1 > 0}.
Observe that η1 ∈ D(η1 , η2 ) and η2 ∈ D(η2 , η3 ), but this is no longer the case for i > 2. This is
because we want the union in the definition of Euc(δ1 , δ2 ) to be disjoint. Also, ηj ∈ D(ηj−2 , ηj−1 )
as ηj = ηj−2 − ⌊ηj−2 /ηj−1 ⌋ηj−1 for any j > 2.
Notice also that Euc(δ1 , δ2 ) ⊂ gZ where g = gcd(δ1 , δ2 ).
Example 11. Let S = hs2 s3 , s1 s3 , s1 s2 i, with s1 = 548, s2 = 155, and s3 = 13. Then v1 =
(548, −155, 0) and v2 = (0, 155, −13). Hence δ1 = 393 and δ2 = 142. In this setting,
6
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
• D(393, 142) = {393, 251, 109},
• D(142, 109) = {142, 33},
• D(109, 33) = {76, 43, 10},
• D(33, 10) = {23, 13, 3},
• D(10, 3) = {7, 4, 1},
• D(3, 1) = {2, 1, 0}.
Then Euc(δ1 , δ2 ) = {0, 1, 2, 3, 4, 7, 10, 13, 23, 33, 43, 76, 109, 142, 251, 393}.
(η ,η )
Remark 12. It is clear that η1 > η2 > · · · > ηi > ηi+1 > ηi+2 = 0, and for ηi 1 2 = (ηi1 , ηi2 ) and
′(η ,η )
′
′
′
′
ηi+11 2 = (ηi+1
1 , ηi+1 2 ), the inequalities ηi+1 1 ηi1 ≤ 0 and ηi+1 2 ηi2 ≤ 0 hold. From these, we have
′
′
too that, for q > 0, |ηi1 | ≤ |ηi1 − qηi+1 1 | and |ηi2 | ≤ |ηi2 − qηi+1
2 | hold. Analogously, considering
′(η ,η )
(η ,η )
′ , η ′ ) and η 1 2 = (η
′
′
′
′
ηi 1 2 = (ηi1
i+1 1 , ηi+1 2 ), we have |ηi1 | ≤ |ηi1 − qηi+1 1 |, |ηi2 | ≤ |ηi2 − qηi+1 2 |
i2
i+1
for q > 0. Observe that we have an equality only when one of the ηhk is zero.
′(η ,η )
(η ,η )
(η ,η )
As η1 1 2 = (1, 0) and η2 1 2 = (0, 1) = (−, +), we obtain η3 1 2 = (1, − ⌊η1 /η2 ⌋) = (+, −)
′(η ,η )
and η4 1 2 = (− ⌊η2 /η3 ⌋, 1 + ⌊η2 /η3 ⌋ ⌊η1 /η2 ⌋) = (−, +), and so on.
This means that in each step in Euc(δ1 , δ2 ), the absolute value of the (η1 , η2 )-coordinates increases,
(and is not decreasing only when xhk = x′21 ). We will use this fact in the next propositions.
Proposition 13. Let the notation and hypotheses be as in Definition 10, and let d ∈ {η3 , η3 +
g, . . . , η1 }. Then d ∈ D(η1 , η2 ) if and only if d1 = 1, with (d1 , d2 ) = d(η1 ,η2 ) (according to the
notation given in Proposition 9).
Proof. Let d ∈ {η3 , η3 + g, . . . , η1 }. If d ∈ D(η1 , η2 ), then d = η1 − kη2 for some k ∈ {0, . . . , ⌊η1 /η2 ⌋}.
Hence d(η1 ,η2 ) = (1, −k). For the converse, if 0 < d = η1 + kη2 ≤ η1 for some k ∈ Z, we obtain
−η1 < kη2 ≤ 0, whence −η1 /η2 < k ≤ 0. Now, as g = gcd(δ1 , δ2 ) ≤ η2 we have −η1 /g ≤ −η1 /η2 < k
and by Proposition 9, k will be equal to d2 , and consequently d ∈ D(η1 , η2 ).
Proposition 14. Let the notation and hypotheses be as in Definition 10.
(1) Let x ∈ {η3 , η3 + g, . . . , η1 } \ (D(η1 , η2 ) ∪ D(η2 , η3 )).
(a) If x(η1 ,η2 ) = (x1 , x2 ) = (+, −), then there exists an integer d < x, d ∈ D(η1 , η2 ), such that
d(η1 ,η2 ) = (d1 , d2 ) with 0 < d1 < x1 and x2 < d2 < 0.
(b) If x′(η1 ,η2 ) = (x′1 , x′2 ) = (−, +), then there exists an integer d < x, d ∈ D(η2 , η3 ), such that
d′(η1 ,η2 ) = (d′1 , d′2 ) with x′1 ≤ d′1 ≤ 0 and 0 < d′2 < x′2 .
The case x′1 = d′1 = 0 corresponds to x = d2 η2 , that is, only when x is a multiple of η2 .
(2) In general, for any x multiple of g such that x < η3 , x ∈
/ Euc(δ1 , δ2 ), consider j + 1 = min{k ∈
I | ηk < x} and then x ∈ {ηj+1 , ηj+1 + g, . . . , ηj } \ (D(ηj−1 , ηj ) ∪ D(ηj , ηj+1 )) = {ηj+1 , ηj+1 +
g, . . . , ηj } \ Euc(δ1 , δ2 ).
(a) If x(η1 ,η2 ) = (x1 , x2 ) = (+, −), then there exists an integer d < x, d ∈ D(ηj−1 , ηj ) ∪
D(ηj , ηj+1 ), such that d(η1 ,η2 ) = (d1 , d2 ) with 0 < d1 < x1 and x2 < d2 < 0.
(b) If x′(η1 ,η2 ) = (x′1 , x′2 ) = (−, +), then there exists an integer d < x, d ∈ D(ηj−1 , ηj ) ∪
D(ηj , ηj+1 ), such that d′(η1 ,η2 ) = (d′1 , d′2 ) with x′1 < d′1 < 0 and 0 < d′2 < x′2 .
Proof. (1) We study each case independently.
(a) As η1 − ⌊ ηη21 ⌋η2 = η3 < x < η1 and x 6∈ D(η1 , η2 ) ∪ D(η2 , η3 ), there exists an integer k
such that η1 + kη2 < x < η1 + (k + 1)η2 and −⌊ ηη12 ⌋ < k < 0. Set d = η1 + kη2 . Then
d ∈ D(η1 , η2 ). Also, η2 ≥ g and δ1 ≤ η1 , thus − δg1 ≤ − ηη21 ≤ ⌈− ηη21 ⌉ = −⌊ ηη21 ⌋ < k. This
implies that d(η1 ,η2 ) = (1, k). It is clear that x1 ≥ 2 by Proposition 13, and as d1 = 1
we have that 0 < d1 < x1 . Also, as x = x1 η1 + x2 η2 and x1 ≥ 2, and we obtain that
2η1 +x2 η2 ≤ x < η1 +(k+1)η2 . Consequently, x2 η2 < η1 +x2 η2 < (k+1)η2 . Thus, x2 < k+1.
Observe that x2 6= k, since otherwise x ≥ 2η1 + kη2 > η1 + η2 + kη2 = η1 + (k + 1)η2 , a
contradiction. Hence x2 < k = d2 < 0.
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
7
(b) For (x′1 , x′2 ) we distinguish two cases.
(i) If x > η2 , it suffices to take d = η2 ∈ D(η2 , η3 ). We have that d′1 = 0 and d′2 = 1. In
light of Proposition 9, it follows that x′1 ≤ d′1 = 0 and 0 < d′2 < x′2 . It is clear that
x′2 6= 1, since otherwise we would have x = x′1 η1 + x′2 η2 = x′1 η1 + η2 ≤ d′1 η1 + η2 = η2 ,
that is, x ≤ η2 , a contradiction.
(ii) If η3 < x < η2 , consider D(η2 , η3 ) = {η2 , η2 − η3 , η2 − 2η3 , . . . , η4 }. As x ∈
/ D(η2 , η3 ),
by denoting x(η2 ,η3 ) = (x2 , x3 ) = (+, −) we can, as above, choose and integer h such
that η2 + hη3 < x < η2 + (h + 1)η3 . Then, taking d = η2 + hη3 and arguing as in (a)
with d = η2 + hη3 and x = x2 η2 + x3 η3 , we have that 0 < 1 < x2 and x3 < h < 0.
Now, as η3 = η1 mod η2 = η1 − ⌊η1 /η2 ⌋ η2 , we can rewrite
x = x2 η2 + x3 (η1 − ⌊η1 /η2 ⌋ η2 ) = x3 η1 + (x2 − x3 ⌊η1 /η2 ⌋)η2 ,
d = η2 + h(η1 − ⌊η1 /η2 ⌋ η2 ) = hη1 + (1 − h ⌊η1 /η2 ⌋)η2 .
Thus, (x′1 , x′2 )(η1 ,η2 ) = (x3 , x2 − x3 ⌊η1 /η2 ⌋) and (d′1 , d′2 )(η1 ,η2 ) = (h, 1 − h ⌊η1 /η2 ⌋).
Moreover, it is clear that x′1 = x3 < h = d′1 < 0. We also have that −x3 ⌊η1 /η2 ⌋ >
−h ⌊η1 /η2 ⌋ > 0 and x2 > 1 > 0. Hence x′2 = x2 − x3 ⌊η1 /η2 ⌋ > 1 − h ⌊η1 /η2 ⌋ = d′2 > 0.
(2) For the general case, we will follow the arguments of the preceding cases. It is clear that for all
suitable j, gcd(ηj , ηj+1 ) = gcd(δ1 , δ2 ) = g. Hence we have the following.
• Observe that j ∈ I implies ηj+1 > 0, so an element d ∈ {ηj+1 , ηj+1 + g, . . . , ηj } is in
(j−1)
(j−1) (j−1)
D(ηj−1 , ηj ) \ {ηj } if and only if d1
= 1, where d(ηj−1 ,ηj ) = (d1
, d2
). This is the
same argument used in Proposition 13, applied for η1 = ηj−1 and for η2 = ηj .
• Working at this (j−1, j) level, it is also clear that, if x ∈ {ηj+1 , ηj+1 +g, . . . , ηj }\(D(ηj−1 , ηj )∪
D(ηj , ηj+1 )), then
(j−1) (j−1)
(a) if x(ηj−1 ,ηj ) = (x1
, x2
) = (+, −), then there exists d < x, d ∈ D(ηj−1 , ηj ), such that
(j−1)
(j−1)
(j−1)
(j−1)
(j−1)
(j−1)
(η
,η
)
d j−1 j = (d1
, d2
) with 0 < d1
< x1
and x2
< d2
< 0; and
′(j−1)
′(j−1)
′(η
,η
)
(b) if x j−1 j = (x1
, x2
) = (−, +), then there exists d < x, d ∈ D(ηj , ηj+1 ), such
′(j−1)
′(j−1)
′(j−1)
′(j−1)
′(j−1)
′(j−1)
′(η
,η
)
that d j−1 j = (d1
, d2
) with x1
≤ d1
≤ 0 and 0 < d2
< d2
.
We only need to apply the preceding cases at this (j − 1, j) level.
It remains to prove that the inequalities for the (j − 1, j) level (denoted by the bracketed
superscript) can be translated to the first level. To this end, we proceed as in the previous
point.
(j−1)
(j−1)
(j−1)
(j−1)
(j−1)
(a) Assume that 0 ≤ d1
< x1
and x2
< d2
< 0. Notice that d1
= 0 if
(j−1)
(j−1)
(j−1)
(j−1)
and only
ηj−1 + x2
ηj , d = d1
ηj−1 + d2
ηj and ηj =
j if dk = ηj . As x = x1
ηj−2 −
ηj−2
ηj−1
ηj−1 , we have that
k
j
ηj−2
(j−1)
ηj−1
ηj−1 + x2
ηj−2 − ηj−1
k
j
(j−1)
(j−1)
(j−1) ηj−2
ηj−1 ,
= x2
ηj−2 + x1
− x2
ηj−1
k
j
(j−1)
(j−1)
η
η
d = d1
ηj−1 + d2
ηj−2 − ηj−2
j−1
j−1
j
k
(j−1)
(j−1)
(j−1) ηj−2
= d2
ηj−2 + d1
− d2
ηj−1 .
ηj−1
(j−1)
x = x1
(j−1)
′(j−2)
(j−1)
′(j−2)
From these equalities we
< d2
= d1
< 0 and
j cank deduce that x1 j = kx2
(j−1)
′(j−2)
(j−1) ηj−2
′(j−2)
(j−1)
(j−1) ηj−2
− d2
> 0, where x′(ηj−2 ,ηj−1 ) =
x2
= x1
− x2
ηj−1 > d1
ηj−1 = d2
′(j−2)
′(j−2)
′(j−2)
′(j−2)
(x1
, x2
) = (−, +), and d′(ηj−2 ,ηj−1 ) = (d1
, d2
ensure that in this setting all the inequalities are strict.
) = (−, +). Notice that we can
8
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
′(j−1)
(b) Assume that 0 ≥ d1
′(j−1)
≥ x1
′(j−1)
and x2
′(j−1)
′(j−1)
> d2j
k> 0. Since x = x1
′(j−1)
′(j−1)
′(j−1)
ηj−2
x2
ηj , d = d1
ηj−1 + d2
ηj and ηj = ηj−2 − ηj−1 ηj−1 we have
ηj−1 +
k
j
′(j−1)
ηj−2
ηj−1
ηj−1 + x2
ηj−2 − ηj−1
j
k
′(j−1)
′(j−1)
′(j−1) ηj−2
= x2
ηj−2 + x1
− x2
ηj−1 ,
ηj−1
k
j
′(j−1)
′(j−1)
η
η
d = d1
ηj−1 + d2
ηj−2 − ηj−2
j−1
j−1
k
j
′(j−1)
′(j−1)
′(j−1) ηj−2
ηj−1 .
= d2
ηj−2 + d1
− d2
ηj−1
′(j−1)
x = x1
(j−2)
′(j−1)
′(j−1)
(j−2)
(j−2)
′(j−1)
Again, jit follows
that x1
=j x2 k > d2
= d1
> 0 and x2
= x1
−
k
′(j−1) ηj−2
′(j−1)
(j−2)
′(j−1) ηj−2
x2
− d2
≤ 0.
ηj−1 < d1
ηj−1 = d2
k
j
′(j−1)
′(j−1)
ηj−2
< d2
. Also
Notice that the inequality is strict because ηj−1 ≥ 1 and we have x2
(j−1)
′(j−1)
′(j−1)
d1
= 0 implies d = d2
ηj−2 , but since d ∈ Euc(δ1 , δ2 ), we deduce d2
= 1, that is, we
always can take d = ηj+1 in the (−, +) case to start the process.
In this way, we can apply alternatively the preceding processes to obtain the desired result.
Notice that only if we start with (b), we can have d′j−1
= 0. Hence, only when j − 1 = 1 (if we
1
perform another step, when applying (a) the inequality becomes strict), we will have that the
(η1 , η2 )-coordinates of d would be (0, 1), that is, d = η2 .
However, as the statement of (3) assumes j > 2, the inequalities will always be strict.
We will refer to d defined in Proposition 14 as the basement of x = (x1 , x2 ), denoted by bsm(x).
Notice that the basement of x may not be unique: however, for our purposes, we will consider as
the basement of x any d satisfying the properties stated in Proposition 14.
Example 15. In the setting of Example 11, consider x = 35. Since 33 = η4 ≤ x ≤ 109 = η3 ,
according to Proposition 14 we can take j = 3. As 35 = −13η3 + 44η4 = 20η3 − 65η4 ; we have
x(η3 ,η4 ) = (20, −65) and x′(η3 ,η4 ) = (−13, 44). Remember that these decompositions are unique using
Proposition 9.
For x′(η3 ,η4 ) = (−13, 44) we know that d′ = η4 = 33 and d′(η3 ,η4 ) = (0, 1); while we look for
d ∈ D(η3 , η4 ) = {76, 43, 10}. As 10 < x = 35 < 43 we take d = 10 and then d(η3 ,η4 ) = (1, −3). If
we translate them to level (δ1 , δ2 ), we have: 35 = −57δ1 + 158δ2 = 85δ1 − 235δ2 , and (x1 , x2 ) =
(85, −235) and (x′1 x′2 ) = (−57, 158). Thus, considering d′ = η4 = 33, as 33 = −η1 + 3η2 , we have
d′(δ1 ,δ2 ) = (d′1 , d′2 ) = (−1, 3). For the other case, by considering d = 10, we obtain 10 = 4η1 − 11η2 ,
that is, d(δ1 ,δ2 ) = (d1 , d2 ) = (4, −11). So we have x′1 < d′1 < 0 < d′2 < x′2 and x2 < d2 < 0 < d1 < x1 .
Observe that 33 is the d′ that yields Proposition 14, but it may happen that there are other
elements in Euc(δ1 , δ2 ) satisfying our purposes too.
It is not difficult to see that for any element in {34, ..., 42} we obtain the same results, that is,
d = 10 and d′ = 33, while if we take a number comprised between 44 and 75, we will obtain d = 43
and d′ = 33.
Let us, now, consider x = 15 which is between η5 = 10 and η4 = 33. In this case j = 4, then we
can write 15 = −5η4 + 18η5 = 5η4 − 15η5 . So, for x′(η4 ,η5 ) = (−5, 18) we know that d′ = η5 = 10
and d′(η4 ,η5 ) = (0, 1); while as d ∈ D(η4 , η5 ) = {23, 13, 3}, we can take d = 13 < x = 15 which
yields d(η4 ,η5 ) = (1, −2), satisfying Proposition 14 as x(η4 ,η5 ) = (5, −15). Observe that, in this case,
when we compute the basements at the first level, we obtain d = 10 because d(δ1 ,δ2 ) = (4, −11),
while x(δ1 ,δ2 ) = (77, −213), and d′ = 33 with d′(δ1 ,δ2 ) = (d′1 , d′2 ) = (−1, 3) for x′(δ1 ,δ2 ) = (−65, 180),
changing the roles of d and d′ from level j = 4 to the first level.
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
9
Our next goal is to associate bsm(x) to a vector in MS . We will have two such vectors per case,
associated to the decompositions in Proposition 9.
As above g = gcd(δ1 , δ2 ). For x ∈ {g, 2g, . . . , max{δ1 , δ2 }}, and {v1 , v2 } the basis for MS chosen
in Section 3, set
(1)
wx = x1 v1 + σx2 v2 ,
wx′ = x′1 v1 + σx′2 v2 ,
with (x1 , x2 ) = x(δ1 ,δ2 ) and (x′1 , x′2 ) = x′(δ1 ,δ2 ) . Notice that in this setting ℓ(wx ) = x1 δ1 + x2 δ2 =
x = x′1 δ1 + x′2 δ2 = ℓ(wx′ ).
In the following, we will use the bracketed subscript to refer to the coordinates of vectors. For
instance, we would have, for a generic vector v, v = (v(1) , v(2) , v(3) ). In particular, we will use the
following notation to refer to the coordinates of the vectors wx and wx′ we just introduced:
wx = (wx(1) , wx(2) , wx(3) ) and wx′ = (wx′ (1) , wx′ (2) , wx′ (3) ).
As x1 > 0 and x2 ≤ 0, following an argument similar to the proof of Proposition 8, it can be shown
that the signs of the coordinates of wx and wx′ are as in Table 1.
σ
wx
wx′
1 (?, −, +) (?, +, −)
-1 (+, ?, −) (−, ?, +)
Table 1. Signs for wx and wx′
Remember that v1 = (+, −, 0) and v2 = (+, +, −).
The following corollary shows that, for x as in Proposition 14, the vector bsm(x) has two coordinates that are in absolute value lower than those of wx or wx′ .
Corollary 16. Let the notations and hypotheses be as above. Let v = a1 v1 + a2 σv2 , with a1 and
a2 integers such that a1 a2 ≤ 0, −δ2 /g < a1 ≤ δ2 /g and −δ1 /g < a2 ≤ δ1 /g. Set x = ℓ(v) ∈
{g, 2g, . . . , max{δ1 , δ2 }} \ Euc(δ1 , δ2 ), and let d = bsm(x).
(i) If a1 > 0 (that is, v = wx ), there exists i ∈ {1, 2} such that |wd(i) | < |wx(i) | and |wd(3) | <
|wx(3) |. Moreover, for such an i we have that wd(i) wd(3) < 0.
(ii) If a1 < 0 (that is, v = wx′ ), there exists i ∈ {1, 2} such that |wd′ (i) | < |wx′ (i) | and |wd′ (3) | <
|wx′ (3) |. Moreover, for such an i we have that wd′ (i) wd′ (3) < 0.
Proof. Notice that x = a1 δ1 + a2 δ2 . According to Proposition 9, if a1 > 0, then (a1 , a2 ) = x(δ1 ,δ2 ) ;
otherwise (a1 , a2 ) = x′(δ1 ,δ2 ) . Hence, in the first case v = wx , while in the second case v = wx′ .
Suppose that a1 > 0. Following Proposition 14, consider d = d1 δ1 + d2 δ2 with a1 > d1 > 0 and
0 > d2 > a2 .
• If σ = 1, wx(3) = a1 v1(3) + a2 v2(3) = a2 v2(3) > d2 v2(3) = d1 v1(3) + d2 v2(3) = wd(3) > 0. We take
i = 2, obtaining wx(2) = a1 v1(2) + a2 v2(2) < d1 v1(2) + d2 v2(2) < 0.
• If σ = −1, wx(3) = a1 v1(3) − a2 v2(3) = −a2 v2(3) < −d2 v2(3) = d1 v1(3) − d2 v2(3) = wd(3) < 0.
Also wx(1) = a1 v1(1) − a2 v2(1) > d1 v1(1) − d2 v2(1) = wd(1) > 0.
Now assume that a1 < 0. Following Proposition 14 consider d = d′1 δ1 + d′2 δ2 with a1 < d′1 ≤ 0
and 0 < d′2 < a2 .
• If σ = 1, 0 > wd′ (3) = d′1 v1(3) + d′2 v2(3) = d′2 v2(3) > a1 v1(3) + a2 v2(3) = wx′ (3) . Now take i = 2.
Then 0 < wd′ (2) = d′1 v1(2) + d′2 v2(2) < a1 v1(2) + a2 v2(2) = wx′ (2) .
• If σ = −1, 0 < wd′ (3) = d′1 v1(3) − d′2 v2(3) = −d′2 v2(3) < −a2 v2(3) = a1 v1(3) − a2 v2(3) = wx′ (3) .
Here we choose i = 1, obtaining 0 > wd′ (1) = d′1 v1(1) − d′2 v2(1) > a1 v1(1) − a2 v2(1) = wx′ (1) .
10
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
This corollary ensures that for every wx or wx′ there exists a wd or wd′ , respectively, with d < x
and such that the two known coordinates of wx or wx′ , according to Table 1, are greater in absolute
value than those of wd or wd′ , respectively.
Now we are going to show how can uniqueness in Proposition 9 extend to the level of the vectors
wx and wx′ . We want to associate to each v ∈ MS such that ℓ(v) ∈ {0, g, 2g, . . . , max{δ1 , δ2 }} two
vectors wx , wx′ such that ℓ(wx ) = ℓ(wx′ ) = ℓ(v).
Next we see that if a vector has length equal to zero, then it is a multiple of the vector appearing
in Proposition 8. Hence, when this vector is added or subtracted to another vector, the length
remains the same.
Lemma 17. With the notation defined in Section 3 and Definition 10, let v ∈ MS with ℓ(v) = 0.
Then
v = α(δ2 /gv1 − σδ1 /gv2 ),
for some α ∈ Z.
Proof. Since {v1 , σv2 } is a basis for MS , we have that there exists λ1 , λ2 ∈ Z such that v =
λ1 v1 + λ2 σv2 . Now 0 = ℓ(v) = λ1 δ1 + λ2 δ2 . Since gcd(δ1 , δ2 ) = g, we deduce that δ1 /g divides λ2 ,
and δ2 /g divides λ1 . So there exists k1 and k2 integers such that λ1 = k1 δ2 /g and λ2 = k2 δ1 /g. We
then have 0 = k1 + k2 and consequently k1 = −k2 . Take α = k1 /g. Hence v = αδ2 v1 − αδ1 σv2 .
We now characterize the vectors in MS with length in {1, . . . , max{δ1 , δ2 }}.
Proposition 18. Under the hypotheses and notations of Section 3 and Definition 10, let v ∈ MS
with 0 < ℓ(v) ≤ max{δ1 , δ2 }. Then
v = a1 v1 + σa2 v2 + α(δ2 /gv1 − σδ1 /gv2 ),
for some a1 , a2 ∈ Z2 \ {(0, 0)} such that a1 a2 ≤ 0, −δ2 /g < a1 ≤ δ2 /g, −δ1 /g < a2 ≤ δ1 /g, where
g = gcd(δ1 , δ2 ) and α ∈ Z.
Furthermore, a1 , a2 and α are unique if we impose that the third coordinates of u = a1 v1 + σa2 v2
and v have the same sign.
Proof. We use once more that {v1 , σv2 } is a generating system for MS ; then there exist unique
λ1 , λ2 ∈ Z such that v = λ1 v1 + λ2 σv2 .
Let us prove that λ1 λ2 ≤ 0. Clearly, if λ1 λ2 = 0, we are done.
Assume that λ1 > 0 (the other case is analogous).
• If δ1 > δ2 , we have 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ max{δ1 , δ2 } = δ1 . Then λ2 δ2 ≤ (1 − λ1 )δ1 ≤ 0,
which implies λ2 ≤ 0.
• If δ2 > δ1 , we have 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ max{δ1 , δ2 } = δ2 . Then 0 < λ1 δ1 ≤ (1 − λ2 )δ2
and 0 < 1 − λ2 , yielding λ2 ≤ 0.
Next, we prove the following assertions.
λ1 > δ2 /g
λ1 ≤ −δ2 /g
−δ2 /g < λ1 ≤ 0
0 < λ1 ≤ δ2 /g
implies
implies
implies
implies
λ2 ≤ −δ1 /g,
λ2 > δ1 /g,
0 < λ2 ≤ δ1 /g,
−δ1 /g < λ2 ≤ 0.
(1) Assume that λ1 > δ2 /g.
• If δ1 > δ2 , we have that 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ δ1 . Hence λ2 δ2 ≤ (1 − λ1 )δ1 . From
λ1 > δ2 /g, we deduce (1 − λ1 ) ≤ −δ2 /g. Therefore, λ2 δ2 ≤ (1 − λ1 )δ1 ≤ −δ1 δ2 /g, and thus
λ2 ≤ −δ1 /g.
• If δ2 > δ1 , we have 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ δ2 , and then λ1 δ1 ≤ (1 − λ2 )δ2 . As δ2 /g < λ1 ,
we get δ2 δ1 /g < λ1 δ1 . This implies δ1 /g < (1 − λ2 ) or equivalently λ2 ≤ −δ1 /g.
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
11
(2) Assume now that λ1 ≤ −δ2 /g. Then 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ −δ2 δ1 /g + λ2 δ2 = (λ2 − δ1 /g)δ2 .
This forces λ2 > δ1 /g.
(3) Suppose that −δ2 /g < λ1 ≤ 0.
• If δ1 > δ2 , then 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ δ1 . As (1 − λ1 ) ≤ δ2 /g, we deduce that
λ2 δ2 ≤ (1 − λ1 )δ1 ≤ δ1 δ2 /g, and consequently λ2 ≤ δ1 /g.
• If δ2 > δ1 , we have ℓ(v) = λ1 δ1 + λ2 δ2 ≤ δ2 . Since −δ2 /g < λ1 , we obtain −δ2 δ1 /g + λ2 δ2 <
λ1 δ1 + λ2 δ2 ≤ δ2 . Hence λ2 − δ1 /g < 1, or equivalently, λ2 ≤ δ1 /g.
(4) Finally, assume that 0 < λ1 ≤ δ2 /g. Then 0 < ℓ(v) = λ1 δ1 + λ2 δ2 ≤ δ2 δ1 /g + λ2 δ2 =
(λ2 + δ1 /g)δ2 . Hence −δ1 /g < λ2 .
In order to conclude the proof it suffices to observe the following.
• If λ1 fulfills the conditions (3) or (4), we are done.
• If λ1 > δ2 /g, take α ∈ Z such that 0 < λ1 − αδ2 /g ≤ δ2 /g. Set a1 = λ1 − αδ2 /g ≤ δ2 /g and
a2 = λ2 + αδ1 /g. Define u = a1 v1 + σa2 v2 . Then ℓ(v) = ℓ(u), and v = u + α(δ2 /gv1 −
σδ1 /gv2 ). Now u fulfills (4), and we are done. Notice that if we take α + 1 instead of α,
we fall in case (3), with u′ = u − (δ2 /gv1 − σδ1 /gv2 ): thus it can be deduced that there are
two possible choices of α fulfilling the conditions of the statement.
• If λ1 < −δ2 /g, we proceed analogously.
Since there are two possible choices of α, but λ1 and λ2 are unique, there exist two possible choices
for (a1 , a2 ). In order to conclude the proof, it suffices to show that the signs of the third coordinates
of u and u′ are different (and thus one of them must be equal to the sign of the third coordinate of
v). Assume that α is such that 0 < a1 ≤ δ2 /g, and thus by (4) applied to u, −δ1 /g < σa2 ≤ 0.
If we write u′ = a′1 v1 + σa′2 v2 then, as a′1 = a1 − δ2 /g > 0, by (3) we have σa′2 > 0. Since a2 and
′
a2 have different signs, we are done.
This proposition will be used later to work with u instead of v.
The goal of this work is to prove the following theorem. For clarity’s sake, we first give an
example; then, we provide the intermediate results needed for its proof, which will be a direct
consequence of Lemmas 22 and 24.
Theorem 19. Let S be a symmetric numerical semigroup with embedding dimension three. With
the notation introduced in Section 3 and Definition 10, we have
∆(S) = Euc(δ1 , δ2 ) \ {0}.
Example 20. Let S = hs2 s3 , s1 s3 , s1 s2 i = h2015, 7124, 84940i, with s1 = 548, s2 = 155, and s3 = 13.
Then v1 = (548, −155, 0) and v2 = (0, 155, −13). Hence δ1 = 393 and δ2 = 142. Extended Euclid’s
Algorithm for δ1 = 393 and δ2 = 142 yields the Table 20, whose cells contain the vectors wd or wd′ ,
as defined in (1), for d ∈ Euc(δ1 , δ2 ).
According to Theorem 19, we would obtain
∆(S) = {1, 2, 3, 4, 7, 10, 13, 23, 33, 43, 76, 109, 142, 251, 393}.
Lemma 21. Let z, z′ ∈ Z(s), with 0 6= s ∈ S. With the notation introduced in Section 3, if
0 < ℓ(z) − ℓ(z′ ) < max{δ1 , δ2 }, then
(1) z − z′ is either of the form (?, +, −) or (?, −, +) when ℓ(v2 ) > 0 (σ = 1), and
(2) z − z′ is of the form (+, ?, −) or (−, ?, +) when ℓ(v2 ) < 0 (σ = −1).
Proof. Recall that z, z′ ∈ N3 . Since z − z′ ∈ MS and 0 < ℓ(z − z′ ) ≤ max{δ1 , δ2 } by Proposition
18 we know that z − z′ = a1 v1 + σa2 v2 + α(δ2 /gv1 − σδ1 /gv2 ). If α > 0, we have that z − z′ =
(αδ2 /g + a1 )v1 + σ(a2 − αδ1 /g)v2 , and clearly (αδ2 /g + a1 ) > 0 and (a2 − αδ1 )/g < 0. According
to Table 1, z − z′ = (?, −, +) if σ = 1, or z − z′ = (+, ?, −) if σ = −1. A similar argument shows
that if α < 0, then z − z′ = (?, +, −) for σ = 1, and z − z′ = (−, ?, +) for σ = −1.
For the case α = 0, as a1 a2 < 0 there are two possibilities.
12
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
wd = (?, −, +)
D(δ1 , δ2 )
wd′ = (?, +, −)
D(δ2 , δ3 )
wd = (?, −, +)
D(δ3 , δ4 )
wd′ = (?, +, −)
D(δ4 , δ5 )
wd = (?, −, +)
D(δ5 , δ6 )
wd′ = (?, +, −)
D(δ6 , δ7 )
w393 = v1
= (548, −155, 0)
δ1 = 393
′
w142
= v2
= (0, 155, −13)
δ2 = 142
w76 = 2v1 − 5v2
= (1096, −1085, 65)
δ3 − δ4 = 76
′
w23
= −5v1 + 14v2
= (−2740, 2945, −182)
δ4 − δ5 = 23
w7 = 17v1 − 47v2
= (9316, −9920, 611)
δ5 − δ6 = 7
w2 = −56v1 + 155v2
= (−30688, 32705, −2015)
δ6 − δ7 = 2
w251 = v1 − v2
= (548, −310, 13)
δ1 − δ2 = 251
′
w33
= −v1 + 3v2
= (−548, 620, −39)
δ2 − δ3 = 33
w43 = 3v1 − 8v2
= (1644, −1705, 104)
δ3 − 2δ4 = 43
′
w13
= −9v1 + 25v2
= (−4932, 5270, −325)
δ4 − 2δ5 = 13
w4 = 30v1 − 83v2
= (16440, −17515, 1079)
δ5 − 2δ6 = 4
w1 = −99v1 + 274v2
= (−54252, 57815, −3562)
δ6 − 2δ7 = 1
w109 = v1 − 2v2
= (548, −465, 26)
δ1 − 2δ2 = 109
w10 = 4v1 − 11v2
= (2192, −2325, 143)
δ3 − 3δ4 = 10
w3′ = −13v1 + 36v2
(−7124, 7595, −468)
δ4 − 3δ5 = 3
w1 = 43v1 − 119v2
= (23564, −25110, 1547)
δ5 − 3δ6 = 1
w0 = −142v1 + 393v2
= (−77816, 82925, −5109)
δ6 − 3δ7 = 0
Table 2. Table for h2015, 7124, 84940i
• If a1 < 0 and a2 > 0, then z − z′ = (?, +, −) for σ = 1, and z − z′ = (−, ?, +) for σ = −1.
• If a1 > 0 and a2 < 0, then z − z′ = (?, −, +) for σ = 1, and z − z′ = (+, ?, −) for σ = −1.
Lemma 22. Let S = hn1 , n2 , n3 i be a symmetric numerical semigroup with embedding dimension
three. With the notation introduced in Section 3 and Definition 10, let z, z′ ∈ Z(s), for some
s ∈ S \ {0} such that x = ℓ(z) − ℓ(z′ ) ∈
/ Euc(δ1 , δ2 ). Then there exists z′′ ∈ Z(s) such that
′
′′
ℓ(z ) < ℓ(z ) < ℓ(z).
′
′ |n , which is an element in S with two
Proof. If z(i) · z(i)
6= 0, we consider s′ = s − |z(i) − z(i)
i
′
′
factorizations z and z with ℓ(z) − ℓ(z ) = x and so that one of them has the ith coordinate equal
P
′ |e (e is
to zero. With this argument, we can assume z · z′ = 0. Later, by adding 3i=1 |z(i) − z(i)
i
i
th
the i row of the 3 × 3 identity matrix) to the factorizations obtained, we will recover the original
factorizations.
Now, from Proposition 18, we can write z − z′ = a1 v1 + σa2 v2 + α(δ2 /gv1 − σδ1 /gv2 ) and
′ ,z
′
′
u = a1 v1 + σa2 v2 in such a way that z − z′ = (z(1) − z(1)
(2) − z(2) , z(3) − z(3) ), u = (u(1) , u(2) , u(3) )
′ = u
and α(δ2 /gv1 − σδ1 /gv2 ) = (α(1) , α(2) , α(3) ). So, we have for j ∈ {1, 2, 3}, z(j) − z(j)
(j) + α(j) .
′
As the sign of the third coordinates of z − z and u is the same and the third coordinate of u is
smaller in absolute value, we necessarily deduce that α(3) has the same sign too. Looking on Table
′ ) = sgn(u ) = sgn(α ) and sgn(z
′
1 and Proposition 8 we have sgn(z(i) − z(i)
(i)
(i)
(j) − z(j) ) = sgn(u(j) ) =
sgn(α(j) ), for some i ∈ {1, 2} and j = 3,.
In light of Proposition 9, if −δ2 /g < a1 ≤ 0 < a2 ≤ δ1 /g, then −δ1 /g < a2 − δ1 /g ≤ 0 <
a1 + δ2 /g ≤ δ2 /g. According to the different cases in Corollary 16, we obtain the following.
(1) If a1 > 0, then v = (v(1) , v(2) , v(3) ) = wd for d < ℓ(z − z′ ) = ℓ(u).
(2) If a1 < 0, then v = (v(1) , v(2) , v(3) ) = wd′ for d < ℓ(z − z′ ) = ℓ(u).
Now we have that 0 < ℓ(v) = d < ℓ(z) − ℓ(z′ ). By adding ℓ(z′ ) we obtain ℓ(z′ ) < ℓ(v) + ℓ(z′ ) <
ℓ(z), and it can be easily deduced that 0 < ℓ(z′ ) < ℓ(z) − ℓ(v) < ℓ(z).
If all the coordinates of v + z′ are positive, or all the coordinates of z − v are positive, then we
would obtain a factorization of s with length comprised between ℓ(z′ ) and ℓ(z): thus we only have
to prove that either z − v or v + z′ has positive coordinates.
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
13
By Proposition 14 and the behavior of the coordinates described in Corollary 16, we can deduce
that two of the three coordinates (the second and third if ℓ(v2 ) > 0, and the first and third if
ℓ(v2 ) < 0) of v are smaller in absolute value than the corresponding coordinates of u. Thus we
have two possible cases, according to the coordinate whose sign we do not control (the first if
ℓ(v2 ) > 0, and the second if ℓ(v2 ) < 0).
Assume first that this coordinate is negative. In this setting, the corresponding coordinate of
z − v is positive, while for the other two we have:
• if v(j) < 0, for some j, as z(j) ≥ 0 we have that the j th coordinate of z − v will be positive,
and
′ ) = sgn(u ) = sgn(α ) and
• if v(j) > 0, we know that u(j) > v(j) > 0 and, as sgn(z(j) − z(j)
(j)
(j)
′
th
z(j) − z(j) − α(j) = u(j) > v(j) we have that z(j) − v(j) > 0, and thus the j coordinate z − v
would be again positive.
If the above unknown coordinate is positive, then we take v + z′ instead of z − v, and make the
same coordinate positive. For the other two coordinates, if v(j) > 0, we do nothing, and if v(j) < 0,
′ +α
′
as 0 < −v(j) < −u(j) = −z(j) + z(j)
(j) ≤ z(j) , remember that in this case α(j) is negative. As
′ is the j-th coordinate of z′ we would again have that z ′ + v
z(j)
(j) is a positive coordinate, and by
(j)
′
′
′
adding ℓ(z ) we obtain that ℓ(z ) < ℓ(v + z ) < ℓ(z).
Example 23. In the setting of Examples 11 and 15, take 11630n2 ∈ S and consider z = (10960, 5, 715)
and z′ = (0, 11603, 0). We have ℓ(z) = 11680 and ℓ(z′ ) = 11630, so ℓ(z − z′ ) = 50 < max{δ1 , δ2 }.
′
As z(2) · z(2)
6= 0, we can consider s′ = 11630n2 − 5n2 as the s′ in the proof of Lemma 22. So,
we are going to work with s′ = 11625n2 , z = (10960, 0, 715) and z′ = (0, 11625, 0), obtaining
z − z′ = (10960, −11625, 715) = 20v1 − 5v2 . In this case α = 0, whence u = 20v1 − 5v2 . As
we showed in Example 15, we can consider wd = w43 = 3v1 − 8v2 = (1644, −1705, 104). Now, if
we consider wd + z′ = (1644, 9920, 104), we obtain a new factorization of 11625n2 with 11630 =
ℓ(z′ ) < ℓ(wd + z′ ) = 11668 < ℓ(z) = 11680, while if we consider z − wd = (9316, 1705, 611), a new
factorization of 11625n2 can be obtained, with ℓ(z − wd ) = 11632 which, again, is between ℓ(z′ ) and
ℓ(z). In this case, both factorizations can be chosen. Finally adding 5 to the second coordinate, we
obtain factorizations of the original element, 11630n2 .
Now if we choose 71300n2 ∈ S, we have two factorizations z = (66856, 0, 4394) and z′ =
(0, 71300, 0) whose lengths are ℓ(z) = 71250 and ℓ(z′ ) = 71300, obtaining again that ℓ(z′ ) − ℓ(z) =
50. In this case u = −122v1 + 338v2 because z′ − z is of the type (?, +, −) so a1 < 0 and
′ = −v + 3v = (−548, 620, −39) to obtain
a2 > 0. According to Example 15, we can pick w33
1
2
′
′
′
wd + z = (66308, 620, 4355) and z − wd = (548, 70680, 39); hence we obtained two factorizations of
71300n2 whose lengths ℓ(wd′ + z) = 71283 and ℓ(z′ − wd′ ) = 71267 are both between ℓ(z) and ℓ(z′ ).
Lemma 24. Let S = hn1 , n2 , n3 i be a symmetric numerical semigroup with embedding dimension
three. With the notation introduced in Section 3 and Definition 10, consider d ∈ Euc(δ1 , δ2 ). Then
there exists s ∈ S and z, z′ ∈ Z(s), with d = ℓ(z) − ℓ(z′ ), and such that for any other z′′ ∈ Z(s)
either ℓ(z′′ ) ≤ ℓ(z′ ) or ℓ(z′′ ) ≥ ℓ(z).
Proof. Let d ∈ Euc(δ1 , δ2 ), and set v = x1 v1 + σx2 v2 , with x1 x2 < 0, and −δ1 /g < x2 ≤ δ1 /g and
−δ2 /g < x1 ≤ δ2 /g, such that ℓ(v) = d. Then
v = (x1 v1(1) + σx2 v2(1) , x1 v1(2) + σx2 v2(2) , −σx2 v2(3) ),
with ℓ(v) = d > 0. Clearly, v has two coordinates with the same sign, and the other with opposite
sign. Let us denote the latter by i.
Set s = |vx(i) |ni , and z = (vx+(1) , vx+(2) , vx+(3) ) and z′ = (vx−(1) , vx−(2) , vx−(3) ), where a+ = (|a| + a)/2 ≥ 0
and a− = (|a| − a)/2 ≥ 0. Then z and z′ are factorizations of s. The rest of the factorizations
of s are of the form z′′ = z′ + a1 v1 + a2 σv2 , with a1 a2 < 0. We are concerned with those such
14
P. A. GARCÍA-SÁNCHEZ, D. LLENA, AND A. MOSCARIELLO
that 0 < a1 δ1 + a2 δ2 < d, in order to find one with length between ℓ(z) and ℓ(z′ ). Denote u =
a1 v1 + a2 σv2 = (u(1) , u(2) , u(3) ).
Next, we prove that |a1 | ≥ |x1 | and |a2 | > |x2 |.
Assume that ℓ(u) ∈ Euc(δ1 , δ2 ). Then, as ℓ(u) < ℓ(v), by construction (see Remark 12) |a1 | ≥ |x1 |
and |a2 | > |x2 |. On the other hand, if ℓ(u) ∈
/ Euc(δ1 , δ2 ), then we consider e = bsm(ℓ(u)) ∈
Euc(δ1 , δ2 ) associated to u (Proposition 14), and then we have |a1 | > |e1 | > |x1 | and |a2 | > |e2 | >
|x2 |, and the assertion is proved.
Thus, Table 3 collects the different possible settings.
x1
x′1
a1
a′1
σ=1
σ = −1
v1 = (+, −, 0), v2 = (+, +, −) v1 = (+, −, 0), σv2 = (−, −, +)
> 0, x2 < 0
v = (?, −, +)
v = (+, ?, −)
v = (?, +, −)
v = (−, ?, +)
< 0, x′2 > 0
> 0, a2 < 0
u = (?, −, +)
u = (+, ?, −)
′
u = (?, +, −)
u = (−, ?, +)
< 0, a2 > 0
Table 3. Signs for v and u
According to Table 3, we have the following cases.
(1) If σ = 1, we obtain that |u(2) | > |v(2) | and |u(3) | > |v(3) |
′
′′ < 0,
(a) If v = (?, −, +), then z(2) = 0, and z(2)
≤ 0. If in addition u(2) < 0, then z(2)
which is a contradiction; and if u(2) > 0 we derive u(3) < 0 and as |u3 | = |a2 ||v2(3) | >
′′ < 0, which is another contradiction.
|x2 ||v2(3) | = |v(3) |, we obtain z(3)
′′ < 0, a contradiction. If u
(b) If v = (?, +, −), then z(3) = 0. If u(3) < 0, then z(3)
(3) >
0, we have that u(2) < 0 and as sgn(a1 v1(2) ) = sgn(a2 v2(2) ), we can assure |u(2) | =
′′ < 0, which is again
|a1 ||v1(2) | + |a2 ||v2(2) | > |x1 ||v1(2) | + |x2 ||v2(2) | = |v(2) |. So we get z(2)
a contradiction.
(2) If σ = −1, we have that |u(1) | > |v(1) | and |u(3) | > |v(3) |.
′′
(a) If v = (+, ?, −), then z(3) = 0. The case u(3) < 0 leads to z(3)
< 0, which is a
contradiction; while from u(3) > 0 we deduce that u(1) < 0, and as sgn(a1 v1(1) ) =
sgn(σa2 v2(1) ), we can assure |u(1) | = |a1 ||v1(1) | + |a2 ||σv2(1) | > |x1 ||v1(1) | + |x2 ||σv2(1) | =
′′ < 0, yielding once more a contradiction.
|v(1) | we obtain z(1)
′′ < 0, yielding a
(b) If v = (−, ?, +), then z(1) = 0. If the inequality u(1) < 0 holds, then z(1)
contradiction. If u(1) > 0, then u(3) < 0, and as |u(3) | = |a2 ||σv2(3) | > |x2 ||σv2(3) | = |v(3) |
′′ < 0, which is also a contradiction.
we derive z(3)
This proves that there is no factorization of s with length between ℓ(z) and ℓ(z′ ).
References
[1] A. Assi, P. A. Garcı́a-Sánchez, Numerical semigroups and applications, RSME Springer series 1, Springer, Switzerland, 2016.
[2] T. Barron, C. O’Neill, R. Pelayo, On dynamic algorithms for factorization invariants in numerical monoids, to
appear in Math of Comp. arXiv:1507.07435.
[3] C. Bowles, S. T. Chapman, N. Kaplan and D. Reiser, On Delta Sets of Numerical Monoids, J. Algebra Appl.5
(2006), 1–24.
[4] S. Colton, N. Kaplan, The Realization Problem for Delta Sets of Numerical Semigroups, to appear in J. Commut.
Algebra. arXiv:1503.08496.
[5] S. T. Chapman, R. Hoyer and N. Kaplan, Delta Sets of Numerical Monoids are Eventually Periodic, Aequationes
Math. 77(2009), 273–279.
DELTA SETS FOR SYMMETRIC NUMERICAL SEMIGROUPS WITH EMBEDDING DIMENSION THREE
15
[6] S. T. Chapman, P. A. Garcı́a-Sánchez, D. Llena, A. Malyshev, D. Steinberg, On the Delta set and the Betti
elements of a BF-monoid, Arab. J. Math. 1 (2012), 53–61.
[7] M. Delgado, P.A. Garcı́a-Sánchez, and J. Morais, NumericalSgps, A package for numerical semigroups, Version
1.0.1 dev (2015), (Refereed GAP package), http://www.gap-system.org/Packages/numericalsgps.html.
[8] The GAP Group, GAP – Groups,
Algorithms,
and Programming,
Version 4.7.5;
2014,
(http://www.gap-system.org).
[9] J.I. Garcı́a-Garcı́a, M.A. Moreno-Frı́as, A Vigneron-Tenorio, Computation of Delta sets of numerical monoids,
Monatsh. Math. 178-3 (2015), 457-472.
[10] P.A. Garcı́a-Sánchez, D. Llena, A. Moscariello, Delta sets for numerical semigroups with embedding dimension
three. arXiv:1504.02116. To Appear in Forum Math.
[11] P.A. Garcı́a-Sánchez, C. O’Neill, G. Webb, On the computation of factorization invariants for affine semigroups,
arXiv:1504.02998.
[12] P. A. Garcı́a-Sánchez, I. Ojeda, J.C. Rosales, Affine semigroups having a unique Betti element, J. Algebra Appl.
12 (2013), 1250177 (11 pages).
[13] A. Geroldinger, On the arithmetic of certain not integrally closed noetherian integral domains, Comm. Algebra
19(1991), 685–698.
[14] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical Semigroups, Developments in Mathematics 20, Springer New
York (2009).
Departamento de Álgebra and IEMath-GR, Universidad de Granada, 18071 Granada, España
E-mail address: [email protected]
Departamento de Matemáticas, Universidad de Almerı́a, 04120 Almerı́a, España
E-mail address: [email protected]
Dipartimento di Matematica, Universit di Pisa, Largo Bruno Pontecorvo 5, 56127 Pisa, Italy.
E-mail address: [email protected]
| 0math.AC
|
arXiv:1703.08968v1 [math.GR] 27 Mar 2017
The normal closure of big Dehn twists, and plate
spinning with rotating families
François Dahmani
March 28, 2017
Abstract
We study the normal closure of a big power of one or several Dehn
twists in a Mapping Class Group. We prove that it has a presentation
whose relators consists only of commutators between twists of disjoint
support, thus answering a question of Ivanov. Our method is to use
the theory of projection complexes of Bestvina Bromberg and Fujiwara,
together with the theory of rotating families, simultaneously on several
spaces.
Contents
1 Composite projection systems
1.1 Projection systems . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Composite projection systems . . . . . . . . . . . . . . . . . .
1.3 Convexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
6
8
11
2 Composite rotating families and windmills
2.1 Definition . . . . . . . . . . . . . . . . . . .
2.2 Osculations of two kinds . . . . . . . . . . .
2.3 The unfolding in the different coordinates .
2.4 Towers of windmills, and accessibility . . . .
2.5 End of the proof of the main Theorem 2.2 .
13
13
15
16
24
26
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3 Conclusion, application to Dehn twists, and Theorem 1
.
.
.
.
.
.
.
.
.
.
26
Introduction
Consider a closed orientable surface Σ of negative Euler characteristic. The
Mapping Class Group of Σ, denoted by MCG(Σ), is the quotient of the group
1
of orientation-preserving homeomorphisms by the path-connected component of the identity. A classical theorem of Dehn and Nielsen indicates a
natural isomorphism between this group and a subgroup of index 2 of the
outer automorphism group of π1 (Σ).
As Riemann uniformisation theorem makes π1 (Σ) act as a lattice on the
hyperbolic plane, one can argue that MCG(Σ) is (in a sense) some hyperbolic
analogue of SL2 (Z) which is of index 2 in the automorphism group of Z2 , a
lattice in the euclidean plane.
However, contrarily to SL2 (Z), some elements of MCG(Σ) have large
centraliser. For instance, consider a simple closed curve α on Σ, a tubular
neighborhood of it α(t) ≃ [−ǫ, ǫ] × α ֒→ Σ and define a (simple) Dehn twist
τ as the identity in Σ \ α(t) , and as a full twist on α(t) , namely, identifying α
(η+ǫ)π
with S 1 , the map [(η, eiθ ) 7→ (η, ei(θ+ ǫ ) )]. A Dehn twist will obviously
commute with any mapping class whose support is disjoint from this tube,
and therefore with a lot of other Dehn twists. By a theorem of Dehn,
MCG(Σ) is generated by Dehn twists around simple closed curves, thus
by an intricate set of generators linked by commutation relations, but also
braid relations and lantern relations. These differences can lead to modify
the expected analogy with the euclidean case in order to include SLn (Z) for
n ≥ 3 (generated by elementary matrices).
Thurston’s classified mapping classes into three cases, those of finite
order, those that are reducible in the sense that they have infinite order
and that some nontrivial power preserves the homotopy class of a simple
closed curve, and finally the pseudo-Anosov. The pseudo-Anosov mapping
classes happen to be the hyperbolic isometries of an action of MCG(Σ) on
an important graph, the curve graph of Σ, which is Gromov hyperbolic
[MM]. They are, in many ways, the witnesses that some phenomena of
rank one happen in MCG(Σ) that are similar to the structure of SL2 (Z),
and its action on the modular tree. On the other hand, Dehn twists are
as reducible as it is possible to be. They are, or should be, the witnesses
of some phenomena of higher rank, similar to the structure of SLn (Z) for
n ≥ 3.
Here is an illustration of the difference of behaviors. If one considers a
finite collection of pseudo-Anosov elements, one can (easily) show that, after
taking powers, the group they generate is free. This is a simple ping-pong
argument in the hyperbolic curve graph. If one considers a finite collection
of Dehn twists around simple closed curves, then Koberda [K] proved the
beautiful ping-pong result that the group generated by some powers of these
Dehn twists is a right angled Artin group: a group whose presentation over
2
the given generating set is a collection of commutators, the obvious ones
(two Dehn twists commute if their curves are disjoint).
The case of normal subgroups is our interest. If n ≥ 3, by Margulis’
normal subgroup theorem, all normal subgroups of SLn (Z) are finite or of
finite index. In SL2 (Z) it is not the case: this group is virtually free, and
has uncountably many non-isomorphic quotients.
It is a natural question to ask whether (and how) these phenomena are
seen in MCG(Σ). What can be the normal closure of a power of a pseudoAnosov, the normal closure of a power of a Dehn twist, and the group
generated by all k-th powers of all simple Dehn twists ? Farb and Ivanov
asked this question in the case of a pseudo-Anosov (respectively [Fa, §2.4]
and [I, §3]), attributing it to Long, McCarthy, and Penner. Ivanov also
asked what he calls the deep relation question [I, §12], that is whether all
relations among certain powers of Dehn twists must derive from ovbious
commutation relations.
In [DGO, §5], we answered the first question: there is an integer N =
N (Σ) such that for all pseudo-Anosov mapping class γ, the normal closure
hhγ N iiMCG(Σ) is free, and consists only of pseudo-Anosov elements and the
identity. This is in line with what happens in SL2 (Z), for all infinite order
element.
We are interested in the question of the closure of a power of a Dehn
twist, and in the group generated by certain powers of all (simple) Dehn
twists, as in Ivanov’s deep relation problem. A naive expectation along
the lines of the analogy with SLn (Z), and the Margulis normal subgroup
theorem, could be to expect such normal subgroups to be a finite index
subgroup. Whereas it is the case for squares of Dehn twists [H], it is not
the case for large powers (see [H], [Fu], [Cou, 6.17], see also [S] and [Mas]
for the case of powers of half-Dehn twists on punctured spheres). Another
expectation could be, in light of the finite-type situation, and ping pong
arguments, to expect infinitely generated right angled Artin groups. Again,
this is not the case in general (see [CLM] and [BM]; Brendle and Margalit
proved restrictions on the automorphism group of certain of these normal
subgroups, that forbid them to be right angled Artin groups). However, we
indeed prove that there is no need of another relation than the obvious ones.
Theorem 1. For every orientable closed surface Σ, there is N such that:
• for any Dehn twist τ , the normal closure of τ N in the Mapping Class
Group of Σ has a partially commutative presentation, built on an infinite set of generators that are conjugates of τ N , so that the relators
3
are commutations between pairs of conjugates of τ N that have disjoint
underlying curves.
• the group generated by all N -th powers of all simple Dehn twists has
a partially commutative presentation, built on an infinite set of generators that are N -th powers of Dehn twists, and whose relators are
commutations between pairs of conjugates of the generators that have
disjoint underlying curves.
The difference with an infinitely generated right angled Artin group is
that some elements in the commutator relators are not in the generating
set, but merely conjugates of elements in the generating set. We recover
that the normal closure is far from being of finite index in MCG(Σ), for
instance because it has abelianisation of infinite rank (the relators being in
the derived subgroup of the free group over the set of generators).
In our point of view, this result above, and its departure from the complexity of normal subgroups of SLn (Z) for n ≥ 3 (granted by Margulis
normal subgroup theorem) reinforce [Fu, Cou] in witnessing a dent in the
analogy between MCG(Σ) and SLn (Z). It also answers Ivanov’s question
on deep relations.
Let us discuss the proof of this theorem.
In [DGO] the structure of the normal closure of a big pseudo-Anosov
was studied with the help of rotating families. Consider G a group acting
by isometries on a space X. A rotating family in G on X is a collection of
subgroups (the rotation groups), that is closed for conjugacy, such that each
of them fix a certain point in X (thus inducing some kind of rotation around
this point). Take ρ in one of these subgroups, fixing c. One may measure
an analogue of the angle of rotation of ρ by taking x at distance 1 from c,
and measuring the infimal length between x and ρx of paths outside the ball
of radius 1 around c. If X is Gromov-hyperbolic (for a small hyperbolicity
constant), if the fixed point of the different rotation groups are sufficiently
far from each other, and if the angles of rotations are sufficiently big, the
group generated by all the rotation groups is a free product of a selection
of them. In [DGO] we applied this theory to the action of MCG(Σ) on a
cone-off of the curve graph of Σ. The rotation groups were the conjugates
of the big pseudo-Anosov considered.
The rotating family argument can be explained as follows. One analyses
the structure of groups generated by more and more rotation groups, to
discover that they arrange as a sequence of free products. Starting from a
quasi-convex set W (that will change over time) that is at first a small ball
4
around a single fixed point of a single rotation group, one make W grow
until it (almost) touches another center of rotation, for some other group.
Then one unfolds W into W ′ by taking its images by the group generated
by the new rotations, and the rotation already with center in W . Because of
hyperbolicity, and of largeness of angles of rotations involved, the resulting
space is still quasi-convex, with the almost the same constant – with a little
repair, it has the same quasi-convexity constant indeed. Actually W ′ has
a structure of tree whose vertices are the images of W by the group, and
the fixed points of the new rotations involved, thus giving by Bass-Serre
duality the structure of free product of the group genertated by rotations
whose center are in W ′ (edge stabilizers are trivial since no element can fix
two different centers of rotation). Then, one takes the new W as W ′ and
do over. In the direct limit, the group generated by all rotations has been
described as a free product of a selection of rotation groups.
In [BBF], Bestvina Bromberg and Fujiwara, using a system of subsurface
projections, discovered that there is a normal finite index subgroup G0 of
MCG(Σ) that acts on some spaces quasi-isometric to trees, and on which
Dehn twists behave like large rotation subgroups. It has been observed by
several people that this implies that the normal closure of a certain power of
a Dehn twist in G0 is free, using the argument of [DGO]. However, it is far
from obvious how to promote this structural feature to the normal closure
in MCG(Σ).
In this paper, we use several quasi-trees as above, one for each left coset
of G0 in MCG(Σ). The group G0 acts on each of them, but its action is
twisted by the automorphism of G0 that is the conjugation by elements
gi , i = 1, . . . , m realising a transversal of G0 in MCG(Σ). If τ N is a Dehn
twist in G0 , the normal closure of τ N in MCG(Σ) equals the normal closure
of the collection {gi τ N gi−1 , i = 1, . . . m} in G0 . Each gi τ N gi−1 is a legitimate
rotation on the quasi-tree associated to gi .
The argument of [DGO] is then performed simultanously on each of the
m quasi-trees. Instead of one convex subset that grows, and gets unfolded
in a hyperbolic space, we have m convex sets W1 , . . . , Wm in the m quasitrees. Each of them is invariant by the group generated by the rotations
around rotation points in all of them. One looks for a rotation point R
that is nearby one of these sets, and in a certain sense, nearby all of them
(although they do not live in the same quasi-trees, this still makes sense
in the framework of projection systems). Then, one unfolds our convex
sets in all coordinates i = 1, . . . , m. A funny phenomenon happens. The
unfolding in the coordinate of R provides a nice tree, as the argument of
[DGO], and the convexity of the result is quantitively very good. This
5
tree gives the structure of the new group by Bass-Serre duality, and reveals
that only commutation relations are involved. There is no reason that the
unfolding in all other coordinates produce something resembling to a tree,
and could in principle destroy the convexity of Wj . However, using the
properties of the projection system, we show that the result is still somehow
convex (less convex than before though). The game is then to unfold in the
different quasitrees at regular intervals of time in the process, and to control
the degradation of the convexity so that the repair can wait until a new
unfolding occurs. It is a game of plate spinning.
The quasi-trees that we will use come from projection complexes defined
in [BBF]. We wrote the argument in this axiomatic language, to avoid dealing with useless hyperbolicity constants. In the end, even if the spaces are
indeed quasi-trees, this fact does not appear in the argument. The axioms
of projection systems are extensively used though, and they contain the information that the geometric space is a quasi-tree. We will thus prove a
similar statement as Theorem 1, namely Theorem 2.2, that gives the structure of groups generated by composite rotating families. There is actually
more information coming from this composite rotating family structure, as
for instance the Greendlinger property (see Definition 2.3), that describes
how an element in the group can be shortened in ome coordinate of the
composite projection system.
1
Composite projection systems
1.1
Projection systems
Let us recall a part of the axiomatic construction of [BBF].
Definition 1.1. ([BBF])
A projection system is a set Y, with a constant θ > 0, and for each
Y ∈ Y, a function (dπY : Y \ {Y } × Y \ {Y } → R+ ) satisfying four or five
axioms:
• symmetry (dπY (X, Z) = dπY (Z, X)),
• triangle inequality (dπY (X, Z) + dπY (Z, W ) ≥ dπY (X, W )),
• Behrstock inequality (min{dπY (X, Z), dπZ (X, Y )} ≤ θ),
• properness ({Y, dπY (X, Z) > θ} is finite).
• In this work one also assume the separation (dπY (Z, Z) ≤ θ).
6
Observe that if the axioms are true for some θ they hold for all larger θ.
From this rudimentary axiomatic set, Bestvina Bromberg and Fujiwara
manage to extract meaningful geometry, by modifying the functions dπY into
some functions dY , that satisfy much more properties, usually encapsulated
in the statement that the projection complex of Y, for a suitable parameter
K is a quasi-tree.
One should think of dY (or dπY ) as an angular measure between X and
Z seen from Y . The axioms fit in this viewpoint: the Behrstock inequality
says that if the angle at Y between X and Z is large, then from the point
of view of Z, the items Y and X look aligned.
Let us review very quickly the procedure of [BBF] to produce the functions dY . Given θ for which the axioms hold, [BBF] define H(X, Z) to be
the set of pairs (X ′ , Z ′ ) such that both dπX and dπZ between them is strictly
larger than 2θ, and one also include the pairs (X, Z ′ ) if dπZ (X, Z ′ ) > 2θ, symmetrically the pairs (X ′ , Z) if dπX (X ′ , Z) > 2θ, and finally the pair (X, Z)
itself.
Then dY (X, Z) is defined to be the infimum of dπY over H(X, Z).
For all K, YK (X, Z) denotes the set {Y, dY (X, Z) ≥ K}.
[BBF, Theorem 3.3] states that there exists Θ and κ ≥ θ depending only
on θ, such that
• (Symmetry) dY (X, Z) = dY (Z, X) for all Y, X, Z
• (Coarse equality) dπY − κ ≤ dY ≤ dπY
• (Coarse triangle inequality) dY (X, Z) + dY (Z, W ) ≥ dY (X, W ) − κ
• (Behrstock inequality) min{dY (X, Z), dX (Y, Z)} ≤ κ
• (Properness) {Y, dY (X, Z) > Θ} is finite
• (Monotonicity) If dY (X, Z) ≥ Θ then both dW (X, Y ), dW (Z, Y ) are
less than dW (X, Z).
˙ such that
• (Order) YΘ (X, Z) ∪ {X, Z} is totally ordered by an order <
˙ 1 <Y
˙ 2 , then
X is lowest, Z is greatest, and if Y0 <Y
dY1 (X, Z) − κ ≤ dY1 (Y0 , Y2 ) ≤ dY1 (X, Z),
and
dY0 (Y1 , Y2 ) ≤ κ,
7
dY2 (Y1 , Y0 ) ≤ κ.
Then choosing K larger than Θ, the projection complex PK (Y) is defined
as follows: it is a graph whose vertices are the elements of Y and where X, Z
span an edge if and only if YK (X, Z) = ∅. Then [BBF, Thm. 3.16] states
that for sufficiently large K, PK (Y) is connected and quasi-isometric to a
tree for its path metric.
1.2
Composite projection systems
In this work, we are concern with a composite situation.
1.2.1
Definitions, and projection complexes
Let Y∗ be the disjoint union of finitely many countable sets Y1 , . . . , Ym .
Their indices i = 1, . . . , m are called the coordinates. Given Y ∈ Y∗ , denote
by i(Y ) its coordinate: Y ∈ Yi(Y ) .
Definition 1.2. A composite projection system on a countable set Y∗ =
⊔m
i=1 Yi is the data of a constant θ > 0, of a family of subsets Act(Y ) ⊂
Y∗ , Y ∈ Y∗ (the active set for Y ) such that Yi(Y ) ⊂ Act(Y ), and of a family
of functions dπY : (Act(Y ) \ {Y } × Act(Y ) \ {Y }) → R+ , satisfying the
symmetry, the triangle inequality, the Behrstock inequality for θ whenever
both quantities are defined, the properness for θ when restricted to each Yi ,
the separation for θ, and also three other properties related to the map Act:
• (symmetry in action) X ∈ Act(Y ) if and only if Y ∈ Act(X),
• (closeness in inaction) if X ∈
/ Act(Z), for all Y ∈ Act(X) ∩ Act(Z),
dπY (X, Z) ≤ θ
• (finite filling) for all Z ⊂ Y∗ , there is a finite collection of elements
Xj in Z such that ∪j Act(Xj ) covers ∪X∈Z Act(X).
The closeness in inaction can be understood as a complement to Behrstock inequality: “if dπY (X, Z) > θ, then dπX (Y, Z) is defined and is less than
θ”.
Applying [BBF] (as recalled in the previous subsection) we get, for each
coordinate i ≤ m, and for a suitable choice of θ, a modified function dY :
Yi × Yi → R+ . This function is unfortunately not defined on Act(Y ) \ Yi ,
but dπY is defined on it, and thus we choose to define d∢
Y (X, Z) to be dY if
π
both X, Z are in Yi and dY otherwise.
We then define YjM (X, Z) = {Y ∈ Yj ∩ Act(X) ∩ Act(Z), d∢
Y (X, Z) ≥
M }. The elements X, Y, Z need not be in the same coordinate.
8
In the following we first choose θ such that the construction of [BBF] applies for all coordinate Yi , and this provides the constants Θ and κ (suitable
for all coordinate).
Then we choose c∗ > 1000(Θ + κ), and ΘP = c∗ + 21mκ. One can choose
K > ΘP . sufficiently large to get quasi-trees in all coordinate, but this is
not important for us.
Finally, choose ΘRot > 2c∗ + 2ΘP + 20(κ + Θ) for later purpose.
To keep track with the constants, it is worth keeping in mind that
ΘRot >> 2ΘP >> 2c∗ >> 20(Θ + κ) >> θ.
1.2.2
Group in the picture
An automorphism of composite projection system is a map ψ : Y∗ → Y∗
• that induces a bijection on each Yi ,
• that sends Act(Y ) to Act(ψ(Y )),
∢
• such that for all Y , and all X, Z ∈ Act(Y ), d∢
Y (X, Z) = dψ(Y ) (ψ(X), ψ(Z)).
A rotation around X ∈ Y∗ in a composite projection system Y∗ is an
automorphism ψ such that ψ(X) = X, and such that for all Y ∈ Y∗ \Act(X),
∢
and for all W, Z ∈ Act(Y ), ψ(Y ) = Y , and d∢
Y (W, Z) = dY (W, ψ(Z)).
Let us now assume that a group G acts on the composite projection
system by automorphisms.
Let us denote by GX the stabilizer of X ∈ Y∗ .
We say that a subgroup ΓX < GX has proper isotropy if for all N > 0
there is a finite subset F (N ) of ΓX such that if γ ∈ ΓX \ F (N ), and if
Y ∈ Act(X), then dπX (Y, γY ) > N .
1.2.3
Betweenness and orbit estimates
Lemma 1.3. (Betweenness is transitive)
∢
∢
If d∢
Y (X, Z) > 2κ and dZ (Y, T ) > 2κ, then Z is in Act(X) and dZ (X, T ) ≥
d∢
Z (Y, T ) − 2κ.
∢
∢
∢
If d∢
Y (X, Z) > 10κ and dZ (X, T ) > 10κ, then dY (X, T ) ≥ dY (X, Z)−2κ.
Proof. By Behrstock inequality, one has d∢
Z (X, Y ) ≤ κ in both cases. For the
∢
∢
first implication, by triangular inequality, d∢
Z (X, T ) ≥ dZ (Y, T )−dZ (X, Y )−
κ.
∢
For the second implication, d∢
Z (Y, T ) is within 2κ from dZ (X, T ). Behr∢
∢
stock inequality gives that dY (Z, T ) ≤ κ and therefore dY (X, T ) ≥ d∢
Y (X, Z)−
2κ.
9
Lemma 1.4. (Orbit estimates, or transfert in a coordinate)
Assume that ΓX has proper isotropy.
For the finite subset F = F (10κ) of ΓX , and for all Y ∈ Act(X), and all
′
X that is either in Act(Y ) or in Act(X), and all γ ∈ ΓX \ F , then either
∢
′
′
d∢
Y (X , X) ≤ κ or dY (γX , X) ≤ κ.
′
Proof. Let us first treat the case of X ′ ∈ Act(Y ). If d∢
Y (X , X) ≤ κ we are
∢
′
done. Assume that dY (X , X) > κ. By closeness in inaction, X ′ ∈ Act(X),
′
and by Behrstock inequality (and because κ ≥ θ), one has d∢
X (X , Y ) ≤ κ.
∢
′
By proper isotropy (and coarse triangle inequality), dX (γX , Y ) > 5κ. Thus,
′
by Behrstock inequality again, d∢
Y (γX , X) ≤ κ.
Now assume that X ′ ∈
/ Act(Y ), but is in Act(X). Since Y ∈ Act(X) we
′ , Y ) and (since Γ
∢
′
can measure d∢
(X
X preserves Act(X)) also dX (γX , Y ).
X
′
′
By proper isotropy, d∢
X (X , γX ) ≥ 10κ and therefore at least one of the
∢
∢
′
quantities dX (X , Y ) and dX (γX ′ , Y ) is larger than 4κ. Assume for instance
∢
′
′
that d∢
X (X , Y ) ≥ 4κ. Then by Behrstock inequality, dY (X , X) ≤ κ.
Using this lemma four times, together with triangle inequality, one gets:
Lemma 1.5. (Orbit estimates for proper isotropy)
Let X1 , X2 , X1′ , X2′ such that X1 , X2 ∈ Act(Y ). Assume that either Xi′
is in Act(Y ) or in Act(Xi ).
If the group ΓX1 and ΓX2 have proper isotropy, then for almost all elements γ1 ∈ ΓX1 and γ2 ∈ ΓX2 , one has
′
′
∢
′
′
∢
d∢
Y (γ1 (X1 ), γ2 (X2 )) − 4κ ≤ dY (X1 , X2 ) ≤ dY (γ1 (X1 ), γ2 (X2 )) + 4κ.
Recall that we chose K > 2Θ + κ.
Proposition 1.6. (Ellipticity)
Given X ∈ Y∗ , and any j ≤ m, the group GX has an orbit in PK (Yj )
of diameter at most 1.
Proof. If j = i(X), and more generally, if GX fixes an element Y ∈ Yj , it is
obvious. Assume then that Yj ⊂ Act(X).
The group GX preserves the set {Z ∈ Yj , YjK0 (X, Z) = ∅} for any K0
hence for K0 = (K − κ)/2 ≥ Θ. Consider Za , Zb in this set, we claim
that YjK (Za , Zb ) is empty. Assume Y ∈ YjK (Za , Zb ). Since Y ∈ Act(X) we
∢
∢
can consider d∢
Y (Za , X) and dY (Zb , X). By triangle inequality, dY (Za , X) +
∢
∢
dY (Zb , X) ≥ dY (Za , Zb ) − κ ≥ K − κ. Thus, one of them needs to be larger
than (K − κ)/2 hence Y is either in YK0 (X, Za ) or in YK0 (X, Zb ), and this
is a contradiction to our assumption.
10
Proposition 1.7. (Induced orders)
Consider X, Z ∈ Y∗ , with Z ∈ Act(X). Assume that ΓX , ΓZ are subgroups of GX , GZ with proper isotropy.
For all i ≤ m, for all M ≥ Θ + 12κ, the set YiM (X, Z) is finite, and
˙ that is given by the order of YiM −4κ (γX (X i ), γZ Z i ),
carries a partial order <,
for arbitrary X i , Z i , in Yi , and almost all γX ∈ ΓX and γZ ∈ ΓZ .
Proof. Let us first check that the set is finite. We may assume that there are
X i ∈ Act(X) ∩ Yi and Z i ∈ Act(Z) ∩ Yi , otherwise YiM (X, Z) is empty. By
Lemma 1.4, there exists γX ∈ ΓX , γZ ∈ ΓZ such that each Y ∈ YiM (X, Z)
is in either one of the four sets YiM −3κ (ηX X i , ηZ Z i ) for ηX ∈ {1, γX } and
ηZ ∈ {1, γZ }. The union of these four sets is finite by properness axiom.
We now need to check that the order on YiM −4κ (γX (X i ), γZ Z i ) includes
all YiM (X, Z) and does not depend on the choice of the points X i , Z i . By the
Lemma 1.5, for arbitrary choice of points, and for any Y ∈ YiM (X, Z), there
is a finite set of ΓX and of ΓZ such that for all elements γX , γZ outside
these finite sets, Y ∈ YiM −4κ (γX X i , γZ Z i ) (the finite sets depend on the
choice of X i , Z i though). Since YiM (X, Z) is finite, we may find a finite
set of ΓX and ΓY suitable for all of them. Thus, for almost all γX , γZ , all
YiM −4κ (γX (X i ), γZ (Z i )) is ordered, and the order, once chosen the points
X i , Z i , does not depend on γX , γZ .
Assume that for two different choices of points X i , Z i , namely (Xai , Zai )
˙ a Y2 for
and (Xbi , Zbi ), the orders are different, and take Y1 , Y2 such that Y1 <
˙ b Y1 for the other.
the first order, and Y2 <
˙ a Y2 means that dY1 (Y2 , γZ (Zai )) ≤ κ. By the orbit estimate, d∢
Y1 <
Y1 (Y2 , Z) ≤
5κ for suitable γZ .
˙ b Y1 means that dY1 (Y2 , γX (Xbi )) ≤ κ, and by the orbit estimate,
Y2 <
∢
dY1 (Y2 , X) ≤ 5κ. Finally, by coarse triangular inequality, d∢
Y1 (Z, X) ≤ 11κ,
i
contradicting the assumption that Y1 is in YM (X, Z).
1.3
Convexity
Definition 1.8. (Convexity)
Let L > 10κ. We say that a subset W ⊂ Y∗ is L-convex if: for all i, for
all X, Z ∈ W ∩ Yi , for all j, the set YjL (X, Z) is a subset of W.
Let now L = (L(1), . . . , L(m)) be a m-tuple of positive numbers. A
subset W of Y∗ is said L-convex if for all X, Z ∈ W, of same coordinate
i(X) = i(Z), and for all j, the set YjL(j) (X, Z) is a subset W.
11
Note that being L-convex, for L > 0 is equivalent to being (L, . . . , L)convex.
Definition 1.9. Let W ⊂ Y∗ non-empty, and R ∈ Y∗ \W for which Act(R)∩
W is non-empty. Let L ≥ 10κ. Define YL (W, R) as the set of Y ∈ Y∗
satisfying the following.
• Y ∈ Act(R)
• Y ∈
/W
• W ∩ Act(R) ∩ Act(Y ) is non-empty, and for all X ∈ W ∩ Act(R) ∩
i(Y )
Act(Y ), one has Y ∈ YL (X, R).
Proposition 1.10. If L ≥ Θ + 12κ, then for all R for which it is defined,
the set YL (W, R) is finite.
S T
Proof. From the definition, YL (W, R) ⊂ i X∈Act(R)∩W (YiL (X, R) ∪ (Yi \
Act(X))). By finite filling assumption on the projection system, there is a
finite collection of elements Xj ∈ W ∩ Act(R) such that ∪j Act(Xj ) covers
∪W∩Act(R) Act(X).
In particular, YL (W, R) is inside a finite union of sets of the form
i
YL (Xj , R) which are finite by Proposition 1.7.
Proposition 1.11. Assume that for all X ∈ W, W is invariant by an
infinite group ΓX of rotations around X, with proper isotropy. Let L ≥
Θ + 12κ.
If W is (L−6κ)-convex, and if S ∈ YL (W, R) then YL (W, S) ⊂ YL−2κ (W, R).
Moreover, if W ′ contains W, then YL (W ′ , R) ⊂ YL (W, R).
Proof. Let Y ∈ YL (W, S) in coordinate i. There exists X ∈ W ∩ Act(Y ) ∩
Act(S) such that d∢
Y (X, S) ≥ L.
Assume that X̃ ∈ Act(R) ∩ Act(Y ) ∩ W. If it is not in Act(S), then
∢
d∢
Y (X̃, S) < κ and dY (X̃, X) > L − 2κ. Transfering X̃ in the coordinate of
X (by invariance under ΓX̃ ), one has d∢
Y (X̃i(X) , X) > L − 6κ. By convexity,
Y ∈ W though we assumed otherwise. Therefore, X̃ ∈ Act(S). Therefore,
∢
by definition of YL (W, S), one has d∢
Y (X̃, S) ≥ L, but also dS (X̃, R) ≥ L. It
follows by transitivity of betweenness (Lemma 1.3) that d∢
Y (X̃, R) ≥ L − 2κ.
The second assertion is a direct consequence of the definition.
Proposition 1.12. If Act(R)∩ W is not empty, for all L ≥ (2m + 12)κ+ Θ,
there exists Z ∈ YL (W, R) such that YL−2mκ (W, Z) = ∅.
12
Proof. Let us say that R has k L-links to W if {i, YL (R, W) ∩ Yi 6= ∅} has
k elements.
For any such index i, take a minimal item Zi in YL (R, W) ∩ Yi for
the order of Proposition 1.7. Then, by Proposition 1.11, YL−2κ (W, Zi ) is
included in YL (R, W), thus Zi has at most (k − 1) (L − 2κ)-links to W.
Iterating this choice at most m times, we find an element Z that has no
(L − 2mκ)-links to W. Therefore YL−2mκ (W, Z) = ∅.
Proposition 1.13. Let L ≥ Θ + 12κ. Consider W, and assume it is Lconvex, and that for all X ∈ W, there is ΓX < GX , infinite, that leaves W
invariant and that has proper isotropy.
If YL′ (W, R) is well defined and empty, then W ∪ {R} is (L + L′ + 5κ)convex.
Proof. If W ∩ Yi(R) is empty, there is nothing to prove. We assume it is
non-empty. Consider Y ∈ YL+L′ +5κ (R, X) for some X ∈ W ∩ Yi(R) , and
assume that Y ∈
/ W. Notice that Y ∈ Act(R) though, and X ∈ Act(R)
since they have same coordinate. Hence, X ∈ W ∩ Act(R) ∩ Act(Y ).
Let X ′ be any other element of W ∩ Act(R) ∩ Act(Y ). Transfert X ′ in
the coordinate i = i(R), inside W, by ΓX ′ . There exists Xi′ ∈ Yi ∩ W such
∢
′
′
′
′
that d∢
Y (X , Xi ) ≤ κ. But, W being L-convex, one has dY (X , Xi ) ≤ L. It
′
′
follows by triangular inequality, that d∢
Y (R, X ) ≥ L + 2κ. Since this is true
′
for all X as above, it follows that Y ∈ YL′ +2κ (W, R), contradicting our
assumption.
2
Composite rotating families and windmills
We proceed to adapt the rotating families study of [DGO] to the context of
composite projection systems.
2.1
Definition
Definition 2.1. (Composite rotating family)
A composite rotating family on a composite projection system, endowed
with an action of a group G by isomorphisms, is a family of subgroups
ΓY , Y ∈ Y∗ such that
• for all X ∈ Y∗ , ΓX < GX = StabG (X), is an infinite group of rotation
around X
13
• for all g ∈ G, and all X ∈ Y∗ , one has ΓgX = gΓX g−1
• if X ∈
/ Act(Z) then ΓX and ΓZ commute,
• for all i, for all X, Y, Z ∈ Yi , if dY (X, Z) ≤ ΘP then for all g ∈
ΓY \ {1}, dY (X, gZ) ≥ ΘRot .
We will show the following.
Theorem 2.2. Consider Y∗ a composite projection system. If {ΓY , Y ∈ Y∗ }
is a composite rotating family for sufficiently large ΘRot , then the group ΓRot
generated by the union of all ΓY (for Y ∈ Y∗ ) has a partially commutative
presentation.
More precisely, there
S exists S ⊂ Y∗ , and R a Sset of words of the form
′
−1
[s, ws w ] with w ∈ h S ΓS i such that ΓRot ≃ h S ΓS | Ri and such that
[s, ws′ w−1 ] ∈ R if and only if s ∈
/ Act(ws′ ).
Moreover, for all γ ∈ ΓRot \ {1}, there is i(γ) ≤ m, and R ∈ Yi(γ) such
that for all X ∈ Yi(γ) , dR (X, γX) > ΘRot − 2ΘP − κ, and there is γs ∈ ΓR
such that dR (X, γs γX) ≤ 2ΘP + 3κ (the pair (R, γs ) is called a shortening
pair for γ).
The last property is, in our point of view, an incarnation of the Greendlinger
lemma, from the small cancellation theories. If one consider a relation γ of
the quotient group, one can find in it a large part of a defining relation γs .
Compare to [DGO, §5.1.3]
A major tool for analysing rotating families was the concept of windmills.
We are going to use composite windmills.
Let us fix L the m-tuple
L = (c∗ + 20(m − 1)κ, c∗ + 20(m − 2)κ, . . . , c∗ + 20κ, c∗ ).
Let σ be the cyclic shift on Z/mZ: σ(i) = (i − 1), and define Lj = σ j−1 (L)
obtained by shifting the coordinates of the m-tuple.
Thus Li reaches its maximum c∗ + 20(m − 1)κ on the coordinate i,
minimal value c∗ at i − 1. Note that the maximum of L is less than ΘP − κ.
Definition 2.3. (Composite windmills)
A composite windmill is a collection (W1 , . . . , Wm , GW , j0 ) in which
• S
GW is the subgroup of G generated by a set of subgroups {ΓY , Y ∈
i∈I∗ Wi } for I∗ either {1, . . . , m} or {1, . . . , m} \ {j0 },
• Wi is a subset of Yi for all i, invariant under GW ,
14
• 1 ≤ j0 ≤ m,
S
• i Wi is Lj0 -convex.
• The group GW has a partially commutative presentation, that is a
presentation of the form
G ≃ hS | Ri
where S is the union over a subset W∗ of W of generating sets for
ΓX , X ∈ W∗ , and R consists of words over the alphabet S ∪ S −1 of the
form [s, ws′ w−1 ] for w a word over S ∪ S −1 . Moreover, if X, X ′ ∈ W∗
and s ∈ ΓX , s′ ∈ ΓX ′ , the word [s, ws′ w−1 ] is in R if and only if
wX ′ ∈
/ Act(X).
• (Greendlinger property) for each γ ∈ GW \ {1} there is i(γ) ≤ m, and
R ∈ Wi(γ) such that for all X ∈ Yi(γ) , dR (X, γX) > ΘRot − 2ΘP − κ.
Moreover, there is γs ∈ ΓR such that dR (X, γs γX) ≤ 2ΘP + 3κ (the
pair (R, γs ) is called a shortening pair for γ).
We say that the composite
S windmill has full group if GW is the subgroup
of G generated by {ΓY , Y ∈ m
i=1 Wi }.
If we do not mention it, our windmills will be full. Only in specific
circumstances do we need non-full windmills. Indeed, we will use the case
of a non-full group only at most one time by coordinate, when initiating the
process in each coordinate.
Since K > max(L), for each i, Wi is connected in PK (Yi ).
We say that a windmill W ′ (with its representative set W∗′ used for the
presentation of the definition) is constructed over W if W ⊂ W ′ and if the
set of representatives W∗′ contains the set of representatives W∗ .
2.2
Osculations of two kinds
• An osculator of type gap of a composite windmill (W1 , . . . , Wm , GW , j0 )
is an element R of Yj0 \ Wj0 such that there exists i ≤ m, Xi , Zi ∈ Wi ,
c∗
that are in Act(R) and such that d∢
R (X, Z) > 2 − 20κ.
• An osculator of type neighbor of a composite windmill (W1 , . . . , Wm , GW , j0 )
is an element R of Yj0 \ Wj0 such that Y c∗ (W, R) = ∅.
2
Lemma 2.4. Consider a composite windmill W = (W1 , . . . , Wm , GW , j0 ),
assume that Wj0 6= ∅, and let R ∈ Yj0 be an osculator of type gap.
Let Y ∈ Yi in Act(R). Then there exists X ∈ Wj0 such that d∢
Y (X, R) ≤
κ.
15
Proof. If R is an osculator of type gap, there are X ′ , Z ′ ∈ Wi , for some i,
′
′
such that d∢
R1 (X , Z ) > c∗ /2 − 20κ.
Let X0 ∈ Wj0 , and consider its orbit under the groups ΓX ′ , and ΓZ ′ ,
which preserves Wj0 . We may use Lemma 1.5 to find X ′(j0 ) , Z ′(j0 ) in these
′(j0 ) , Z ′(j0 ) ) > c /2 − 24κ.
orbits, hence in Wj0 , such that d∢
∗
R1 (X
By the coarse triangle inequality, for at least one point among X ′(j0 ) , Z ′(j0 ) ,
′(j0 ) ) > c /4 − 13κ. Behrstock inequality gives
say X ′(j0 ) , we have d∢
∗
R1 (Y, X
′(j0 ) ) ≤ κ.
(R
,
X
d∢
1
Y
Lemma 2.5. Let W be a composite windmill, and R1 , R3 be two osculators
of W. Assume Wj0 6= ∅, and let X2 ∈ Wj0 .
If R3 is of type neighbor and W is ( c2∗ −20κ)-convex, then dR1 (X2 , R3 ) ≤
c∗ .
If R3 is of type gap, then dR1 (X2 , R3 ) ≤ ΘP .
Proof. If R3 is an osculator of neighbor type, then the result follows from
Proposition 1.13.
If now R3 is an osculator of type gap, the proof is slightly more involved.
There is i, and there are X, Z ∈ Wi such that d∢
R3 (X, Z) > c∗ /2 − 20κ.
Since Wj0 is non-empty, and invariant for ΓX and ΓZ , we can apply Lemma 1.5 and find X (j0 ) , Z (j0 ) ∈ Wj0 such that dR3 (X (j0 ) , Z (j0 ) ) ≥
d∢
R3 (X, Z) − 4κ which is ≥ c∗ /2 − 24κ. By coarse triangular inequality, at
least one of the quantities dR3 (R1 , X (j0 ) ) and dR3 (R2 , Z (j0 ) ) is greater than
c∗ /4 − 13κ. Say it is dR3 (R1 , X (j0 ) ). Behrstock inequality then gives that
dR1 (R3 , X (j0 ) ) ≤ κ, and again coarse triangular inequality gives dR1 (X (j0 ) , X2 ) ≥
dR1 (X2 , R3 ) − κ. Since the first is bounded by the maximal convexity constant of W, the result follows.
2.3
The unfolding in the different coordinates
Given a composite windmill W, we define its unfolding as follows.
An admissible set R is one of the three following possibilities.
Consider Rgap the set of osculators of type gap in Yj0 . If it is non-empty,
we say R = Rgap is admissible, and is the only possible admissible set of
osculators.
If Rgap is empty, and if W is ( c2∗ − 20κ)-convex, then R = {GW R} for
any choice R of osculator (necessarily of type neighbor) is admissible. There
might be several admissible sets, and also there might be none.
16
If Rgap is empty, and if W is not c2∗ -convex, then the set R of admissible
osculators in this coordinate j0 is the empty set R = ∅.
Here is an obvious lemma.
Lemma 2.6. Let R be a choice of an admissible set of osculators of W. If
R is empty, then W ′ = (W1 , . . . , Wm , GW , j0 + 1) is a composite windmill.
We thus concentrate on the case where R is non-empty.
Having made such a choice of set of admissible osculators R =
6 ∅, we
then define, for all i, Wi′ to be the union[
of all the images of Wi by elements
of the group GW ′ generated by GW ∪ { ΓR }. The unfolding of W is then
Ra
′ , G ′ , j + 1).
(W1′ , . . . , Wm
0
W
In the case Wj0 is empty, we include here a convexity result for an
intermediate step in the construction: adding an admissible set of osculators
R, which produces a non-full composite windmill.
Lemma 2.7. Assume that W is a full composite windmill of principal coordinate j0 , with Wj0 = ∅.
Let Wjs0 be a set R of admissible osculators as defined above, assumed
non-empty.
For all other coordinates, let Wis = Wi .
s , G , j ) is a non-full composite windmill
Then W s = (W1s , W2s , . . . , Wm
W 0
of principal coordinate j0 . If moreover R is the orbit of a neighbor osculator,
and if W is ( c2∗ − 20κ)-convex, then W s is B-convex, for B = c2∗ + 10κ ≤
inf L.
Proof. If R = ∅, there is nothing to prove. Consider the case of the orbit
of a neighbor osculator. It suffices to check that Wjs0 (= GW R) is convex in
the sense that for all γ ∈ GW and all i the set YiB (R, γR) is in Wi .
By the Greendlinger Property, given γ, there exists j, and Yj ∈ Wj such
that dYj (R, γR) > ΘRot − 2ΘP − κ, or R = γR (if R is not active for all the
shortening pairs of γ).
Of course we consider only the first case of the alternative.
(i)
Assume that some Y ∈ Yi is in YB (R, γR).
If Y ∈
/ Act(Yi ), then one can use a shortening pair at Yi to reduce the
length of γ in its principal tree, and this shortening pair gives γ ′ such that
(i)
∢
′
′
d∢
Y (R, γR) = dY (R, γ R). Thus, Y ∈ YB (R, γ R) as well, and by performing
this reduction sufficiently many times, we may assume that Y ∈
/ Act(Yi ).
By Lemma 1.4, either R or γR approximates by κ the projection of Yj
on Y .
17
/ Wi , one has d∢
Say that d∢
Y (Yj , R) ≤
Y (γR, Yj ) ≤ κ. By osculation if Y ∈
∢
∢
(R,
Y
)
+
κ
≤ c2∗ + 2κ
Therefore, one has dY (γR, R) ≤ dY (γR, Yj ) + d∢
j
Y
which is less than B.
∢
∢
If now d∢
Y (R, Yj ) ≤ κ, one has dY (R, γR) is within 2κ from dY (Yj , γR),
∢
−1
−1
which equals dγ −1 Y (γ Yj , R). Of course, Y ∈
/ Wi if and only if γ Y ∈
/ Wi ,
c∗
∢
∢
hence, if it is the case, by osculation of R, dY (Yj , γR) ≤ 2 , and dY (γR, R) ≤
c∗
2 + 2κ ≤ B.
In the case where R is the set of gap osculators, the proof is similar.
Indeed, if R1 is a gap between X1 and Z1 , and R2 is a gap between X2 and
Z2 , and if Y is between R1 and R2 , so that d∢
Y (R1 , R2 ) ≥ c∗ + 20(m − 1)κ(=
Lj0 (j0 )), then Y is also between X1 (or Y1 ) and X2 (or Y2 ) so that, say,
d∢
Y (X1 , X2 ) ≥ c∗ + 20(m − 1)κ − 3κ. One can transfert X2 in the coordinate
of X1 by Lemma 1.4, in W (in the ΓX2 -orbit of X1 ). The convexity of W
then shows that Y ∈ W.
c∗
2.
The aim of the next sections is to prove the following.
Proposition 2.8. If the set R of admissible osculators is non-empty, then
W ′ = (W1′ , . . . , Wm , GW ′ , j0 + 1) is a (full) composite windmill, and W∗′ can
be chosen to contain W∗ (in other words, W ′ is constructed over W).
2.3.1
Unfolding a tree
Proposition 2.9. (Principal coordinate tree)
Consider a full composite windmill W, of principal coordinate j0 .
Let R 6= ∅ be an admissible set of osculators as defined in the previous
section. If Wj0 = ∅, let Wjs0 = R, and otherwise let Wjs0 = Wj0 .
There exists a GW ′ -tree T , bipartite, with black and white vertices, with
an equivariant injective map ψ : T → P(Yj0 ) (the set of subsets of Yj0 ) that
sends black vertices on images of osculators by GW ′ , and white vertices on
images of Wjs0 by GW ′ , and that sent the neighbors (in T ) of the preimage
of Wjs0 on R.
Moreover, for any pair of distinct white vertices w1 , w2 , and any black
vertex v in the interval between them (in T ), and any X1 ∈ ψ(w1 ), X2 ∈
ψ(w2 ), one has dψ(v) (X1 , X2 ) ≥ ΘRot − 2ΘP − κ.
Finally, if w1 , w2 are white vertices for which the path from a black vertex
v starts by the same edge, then for any X1 ∈ ψ(w1 ), X2 ∈ ψ(w2 ), one has
dψ(v) (X1 , X2 ) ≤ 2ΘP + 3κ.
18
t
Proof. Take a transversal Rt of R under the action
S of GW . For each R ∈ R ,
let (GW )R the subgroup of GW generated by X∈W\Act(R) ΓX .
Set T to be the Bass-Serre tree of the (abstract) graph of groups whose
vertex groups are GW and the groups ΓR × (GW )R , R ∈ Rt , and the edges
are the pairs (GW , R), R ∈ Rt , and the edge groups are the groups (GW )R .
g
Let G
W ′ the fundamental group of this graph of groups. The group GW ′
is a quotient of this group, since it is generated by GW and the stabilizers
of elements R of Rt , which, by assumption (Definition 2.1), are direct sum
of their rotation group with the groups (GW )R .
g
T is a tree, endowed with a G
W ′ -action, bipartite, and with an equivg
ariant (with respect to GW ′ ։ GW ′ ) map ψ : T → P(Yj ) that sends black
vertices on images of elements of R by GW ′ , and white vertices on images
of Wjs0 by GW ′ .
We need to show that it is injective, and at the same time, we will show
the estimate of the end of the statement.
Consider a path p of T , starting and ending at white vertex. Up to cyclic
permutation, and up to the group action, we may assume that the path p
starts at the vertex fixed by GW , and its second vertex is fixed by some
R1 ∈ Rt , and that its length is even.
Let us denote by p0 , p1 , . . . , pN the consecutive vertices of p, and let X2i
be a choice of a element of ψ(p2i ), and R2i+1 = ψ(p2i+1 ).
The monotonicity property in the coordinate j0 says that if dY (X, Z) ≥
Θ then dW (X, Z) ≥ dW (X, Y ).
We will use it in an induction to establish that for all k odd, and all i in
1 ≤ i ≤ N 2−k and all j in 1 ≤ j ≤ k−1
2 , one has
dRk (Rk−2j , Rk+2i )
≥ Θrot − 2ΘP − κ
∀Xs ∈ ψ(ps ), dRk (Xk−2j+1 , Xk+2i−1 ) ≥ Θrot − 2ΘP − κ
The case i, j = 1 happens as follows. Choose k.
We first show how a black vertex separates two adjacent white vertices.
′
Note that there is Xk+1
∈ ψ(pk+1 ) that equals gXk−1 for some g ∈ ΓRk \{0}.
s
By convexity of Wj0 (ensured by assumption, or by Lemma 2.7 in case Wj0
′
) ≤ ΘP . And by assumption on the rotating
is empty), dRk (Xk+1 , Xk+1
′
groups, dRk (Xk−1 , Xk+1 ) ≥ ΘRot . Thus, dRk (Xk−1 , Xk+1 ) ≥ ΘRot − ΘP − κ,
the second inequality.
By Lemma 2.5, dRk (Xk+1 , Rk+2 ) ≤ ΘP and dRk (Xk−1 , Rk−2 ) ≤ ΘP . By
triangle inequality, we get dRk (Rk−2 , Rk+2 ) ≥ Θrot − 2ΘP − κ. We have both
inequalities.
19
Assume that the inequalities are proven for all (i, j) such that i + j ≤ i0
(and for all k), and let us choose k and (i, j) with i + j ≤ i0 , and prove the
inequality for for (i + 1, j).
Set Y = Rk+2i , and and W = Rk . In the following we set either Z =
R2i+k+2 or X2i+k+1 , and either X = Rk−2j or X = Xk−2j+1 .
By the inductive assumption for k′ = k + 2i, i′ = 1, j ′ = i, one has
dY (W, Z) ≥ Θrot − 2ΘP − κ.
Also for k, i and j the induction gives dW (Y, X) ≥ Θrot − 2ΘP − κ.
Behrstock inequality then provides dY (W, X) ≤ κ and therefore dY (X, Z) ≥
Θrot − 2ΘP − 3κ. This is still far above Θ. One thus may apply the monotonicity property and obtain dW (X, Z) ≥ dW (X, Y ). In other words,
dRk (Rk−2j , Rk+2i+2 ) ≥ Θrot − 2ΘP − κ.
The inequality is also proven for (i, j + 1) in the same manner, symmetrically. This finishes the induction.
In the end, we have obtained for i = N/2−1, and k = 1, dR1 (X0 , RN −1 ) ≥
ΘRot − ΘP , and it follows that dR1 (X0 , XN ) ≥ ΘRot − 2 × ΘP − κ, which is
the estimate of the statement.
If we assume that p is mapped to a loop, Wj0 contains both X0 and XN ,
and not R1 (it is an osculator), the convexity of Wj0 imposes ΘRot − 2 ×
ΘP − κ ≤ ΘP , meaning ΘRot ≤ ΘP + κ. and this contradicts our choice of
ΘRot .
It also follows from this analysis that if w1 , w2 are white vertices of T
and v is a black vertex between then, then dψ(v) (X1 , X2 ) ≥ ΘRot − 2ΘP − κ
(in our induction above). A final use of Behrstock inequality provides that
whenever the paths from v to a white vertex w1 has more than three edges,
then if v ′ is the first black vertex after v on this path, and if X1 ∈ ψ(w1 ),
then dψ(v) (X1 , ψ(v ′ )) ≤ κ. It follows from that and Lemma 2.5 that if
w2 is another white vertex w1 whose path from v starts at the same edge,
dψ(v) (X1 , ψ(v ′ )) ≤ 2ΘP + 3κ.
The former proposition allows to define, for each element γ of GW ′ ,
its principal coordinate, and its principal tree. Indeed, if γ ∈ GW ′ not
conjugated to GW , the proposition shows that it is either loxodromic or
the stabilizer of a black vertex on the tree T . Then we define its principal
coordinate as j0 and its principal tree as T . If it is in GW , or conjugate
in it, its principal coordinate and its principal tree are defined inductively,
according to the process of unfoldings of composite windmills.
20
2.3.2
Preservation of convexity
Proposition 2.10. (Convexity of W ′ )
Let W = (W1 , . . . , Wm , GW , j0 ) be a composite windmill (possibly nonfull).
Assume that R is an admissible set of osculators, and consider the sets
′ ).
Wi′ defined above. Let W ′ = (W1′ , . . . Wm
If R consists of the orbit of a neighbor, then W ′ is c∗ -convex.
If R consists of gap osculators, then W ′ is Lj0 +1 -convex.
The case of R = ∅ is trivial, so we assume it is not empty.
If R consists of the orbit of a neighbor, let Aj = c∗ for all j. If R consists
of gaps, let Aj = Lj0 (j) + 20κ (which is less than Lj0 (j + 1)).
Let X, Z ∈ Wi′ , consider Y ∈ YjA(j) (X, Z).
Here is our main claim.
We will show that Y is a GW ′ -translate of one of the following type of
elements:
• Y ′ for which there exists Xf , Zf ∈ Wj0 such that d∢
Y ′ (Xf , Zf ) ≥ A(j)−
10κ;
• Y ′ for which there exists Xf ∈ Wj0 , and R an osculator of W in Wj′ 0
such that d∢
Y ′ (Xf , R) ≥ A(j) − 10κ;
• Y ′ for which there exists R1 , R2 osculators of W in Wj′ 0 such that
d∢
Y ′ (R1 , R2 ) ≥ A(j) − 10κ
We will then finish the proof with this claim established, but before that
we will prove the claim.
Transfert of X and Z to Yj0 . In W ′ , the groups ΓX and ΓZ preserve
′
Wj0 which is not empty (it contains R). Therefore, by Lemma 1.5 there are
(j0 ) , Z (j0 ) ) ≥ A(j) − 4κ.
X (j0 ) , Z (j0 ) in Wj′ 0 such that d∢
Y (X
The interval in T . Taking ψ −1 of X (j0 ) and of Z (j0 ) produce two vertices
in the principal coordinate tree T of Proposition 2.9. More precisely, either
one of X (j0 ) , Z (j0 ) is the image of a black vertex of T , or in the image of
a white vertex of T . This thus give two vertices of T that we (slightly
abusively) denote by ψ −1 (X (j0 ) ), ψ −1 (Z (j0 ) ).
If these vertices are adjacent, we have achieved the second point of the
claim. If these vertices are the same, we have achieved the first point of the
claim. If these vertices are different, both black with only one white vertex
in the interval, we have achieved the third point of the claim.
21
Thus, we may assume that there is at least one black vertex of T in the
open interval (ψ −1 (X (j0 ) ), ψ −1 (Z (j0 ) )). Let R1 , . . . , RN the images by ψ of
these black vertices, in order starting from the side of ψ −1 (X (j0 ) ).
By Proposition 2.9, we have for all i, dRi (X (j0 ) , Z (j0 ) ) > ΘRot − 2ΘP − κ,
which is > 50κ.
Reduction to the case where Ri ∈ Act(Y )
If Y is equal to one of the Ri then we fall in the first possibility of the
main claim. Thus, let us assume that Y is different from all the Ri .
We may assume that Y is in Act(Ri ) for all i. Indeed if it was not,
one could use an element of ΓRi to reduce the length of the path p, without
(j0 ) , Z (j0 ) ) since Γ
changing the value of the projection distance d∢
Ri leaves
Y (X
π
dY invariant.
Transfert of Y in Yj0 . We may apply Lemma 1.4 again, and find an
element Y (j0 ) in Yj0 (far in an orbit of ΓY ) such that, for all i, one has
(j0 ) ) ≤ 4κ.
d∢
Ri (Y, Y
Position of Y (j0 ) in the order. Fix 0 < i ≤ N . Since dRi (X (j0 ) , Z (j0 ) ) >
50κ, either dRi (X (j0 ) , Y (j0 ) ) or dRi (Y (j0 ) , Z (j0 ) ) is larger than 24κ.
All Ri are in Y50κ (X (j0 ) , Y (j0 ) ) therefore they satisfy the order property
in this set, which coincide with the ordering of their indices. By this order
property and Behrstock inequality, if for some i one has dRi (Y (j0 ) , X (j0 ) ) >
5κ, then for all i′ < i, one still has dRi (Y (j0 ) , X (j0 ) ) > 5κ. Similarily if
dRi (Y (j0 ) , Z (j0 ) ) > 5κ then for all greater i′′ the same holds.
Therefore we have three cases.
Either dR1 (Y (j0 ) , X (j0 ) ) ≤ 5κ or dRN (Y (j0 ) , Z (j0 ) ) ≤ 5κ, or there exists
i ≥ 1, largest such that dR1 (Y (j0 ) , X (j0 ) ) > 5κ and i < N .
By symmetry, and translation by an element of GW ′ the first and second
case have same resolution. Let us treat the first one. By triangle inequality,
dR1 (Z (j0 ) , Y (j0 ) ) > ΘRot − 10κ − 2ΘP which is still greater than 20κ.
(j0 ) , Y ) > 16κ. By Behrstock inequality, d∢ (Z (j0 ) , R ) <
Going back to Y : d∢
1
Y
R1 (Z
(j
)
∢
0
κ, and finally by triangle inequality, dY (X , R1 ) ≥ A(j) − 2κ. We are in
the second point of the claim if X (j0 ) is in a white vertex, and in the third
point if it is a black vertex.
We thus turn to the case where there exists i ≥ 1, largest such that
dR1 (Y (j0 ) , X (j0 ) ) > 5κ and i < N .
One has
dRi+1 (Y (j0 ) , Z (j0 ) ) > ΘRot − 2ΘP − 10κ
(j0 ) )
d∢
> ΘRot − 2ΘP − 14κ
Ri+1 (Y, Z
∢
)
(j
0
dY (Ri+1 , Z )
≤ κ
22
and
dRi (Y (j0 ) , X (j0 ) ) ≥ 5κ
(j0 ) )
≥ κ
d∢
Ri (Y, X
∢
(j
)
0
dY (Ri , X )
≤ κ
So, d∢
Y (Ri , Ri+1 ) ≥ A(j) − 4κ. We have the third point of the claim, and
the claim is established.
We need to finish the proof of the lemma. There are several cases to
treat. The easiest is when the first case of the claim occurs.
In that case, if j = j0 , Y ′ is actually a gap osculator, hence in Wj′ 0 . If
j 6= j0 , by convexity of W, it is in Wj .
Assume now that the second case occurs.
If R is of type neighbor, it simply contradicts Proposition 1.13.
If R is an osculator of type gap between X0 , X1 , and j = j0 , one easily
gets that R is an osculator of type gap between Xf and either X0 or X1
(any one for which dR (Y ′ , Xǫ ) is larger than κ, and by triangular inequality,
there must be at least one). If j 6= j0 , we may use the same argument.
′
Y ′ ∈ Act(R) therefore d∢
R (Y , Xǫ ) is larger than κ for either ǫ = 0 or 1. Then,
∢
d∢
Y ′ (R, Xǫ ) < κ and by triangular inequality, dY ′ (Xf , Xǫ ) ≥ A(j) − 12κ(>
′
Lj0 (j)). It follows by convexity of W that Y ∈ Wj .
Finally, assume that the third case occurs.
Assume that R2 is an osculator of type gap, between X0 , X1 . Then,
again with the same reasoning, Y ′ ∈ Act(R2 ) and there is ǫ for which it is
∢
in Act(Xǫ ) and d∢
Y ′ (R2 , Xǫ ) is less than κ. Thus dY ′ (R1 , Xǫ ) ≥ A(j) − 12κ,
and we are back to the case 2 of the claim, with a slightly lower constant.
The proof goes nevertheless through, and the desired conclusion holds.
Finally, assume that R2 is of type neighbor. Then both R1 , R2 are of
type neighbor, and R2 = γR1 for some γ ∈ ΓW . Let us rename R1 = R,
call i = i(Y ′ ), and j the principal coordinate of γ (for the Greendlinger
property). Let Z ∈ Wj be the vertex of a shortening pair for γ for which
Z ∈ Act(Y ′ ) ∩ Act(R) (there exists one, otherwise one can reduce the lenght
of γ in its principal tree by a shortening pair at Z). Thus, d∢
Z (RγR) >
ΘRot − 2ΘP − 2κ.
Suppose d∢
Y ′ (R, γR) > c∗ − 10κ. Then, there are two possible cases.
c∗
∢
Either dY ′ (R, Z) > c2∗ − 6κ or d∢
Y ′ (γR, Z) > 2 − 6κ (or both).
∢
∢
′
In the first case, dZ (R, Y ) ≤ κ. Thus dZ (Y ′ , γR) > κ, and so d∢
Y ′ (γR, Z) <
κ.
Recall that Z ∈ Act(R) ∩ Act(Y ′ ). Thus d∢
Y ′ (Z, R) > c∗ − 2κ, and
′
Y ∈ Yc∗ −2κ (Z, R). Now let Z ′ any other element of W in Act(R) ∩ Act(Y ′ ).
c∗
′
By ( c2∗ − 20κ)-convexity of W, one has d∢
Y ′ (Z, Z ) ≤ 2 − 20κ and therefore
23
Y ′ ∈ Yc∗ −2κ− c2∗ +21κ (Z ′ , R). In other words, Y ′ ∈ Y c2∗ +19κ (W, R) and this
contradicts the fact that R is a neighbor.
In the second case, the situation is similar after composing by the automorphism γ −1 .
2.3.3
The unfolding is a windmill
Proposition 2.11. If W = (W1 , . . . , Wm , GW , j0 ) is a composite windmill,
′ , G ′ , j + 1) is defined as above (where j + 1 is
and if W ′ = (W1′ , . . . , Wm
0
0
W
taken modulo m in {1, . . . , m}), then W ′ is a composite windmill.
Moreover, the set W∗′ of the fifth point of the definition can be assumed
to contain the set W∗ (in other words, W ′ is constructed over W).
The first three points follow by construction. The fourth point (convexity) is the result of Proposition 2.10. The sixth point is a consequence of
Proposition 2.9. The same proposition introduces an action of GW ′ on a
tree T which is Bass-Serre dual to a presentation of GW ′ as the fundamental
group of a graph of group, with one vertex v0 carrying the group GW and
the other vertices v[R] , [R] ∈ R/GW , adjacent to a single edge whose other
end is v0 , carrying the group ΓR × (GW )R , if R is a representative of the
orbit [R].
2.4
2.4.1
Towers of windmills, and accessibility
Starting point
We start the process by selecting W(0) to be a maximal collection of mutually inactive elements in Y∗ . Thus, whenever W(0)j 6= ∅, it is reduced to a
single point.
We choose j0 = 1. It is clear that W(0) defines a composite windmill
where for all i, W(0)i is either empty or a singleton, and where GW is the
direct product of the groups GX , for X ∈ W(0) (there are at most m direct
factors).
W(0) is κ-convex, and for all R, by maximality of W(0), Act(R)∩W(0) 6=
∅. Recall that by choice, c∗ > 25κ + 2Θ, hence by Proposition 1.12,
there exists a neighbor osculator in Y c2∗ +2mκ (W(0), R). We set a counter
N (0) = 0 ∈ N, which will count the number of times we resort to a neighbor
osculator.
24
2.4.2
The process
We need a process for choosing consistently among the possible neighbor
osculators. Recall that we assumed Y∗ to be countable. Let us choose once
and for all (Xn )n∈N , an infinitely redundent enumeration of elements of Y∗
(in the sense that every X ∈ Y∗ is equal to infinitely many Xn ).
We will define W(k) for k a countable ordinal (not necessarily a number).
We take the notation
W(k) = (W(k)1 , . . . , W(k)m , GW (k) , jk ).
The general process for defining W(k + 1) from W(k) is the following.
If in the coordinate jk , there is a gap osculator of W(k) in Yjk one defines
the set of these gap osculators as R(k) the set of admissible osculators at step
k, and one unfolds W(k) into W ′ (k) = (W ′ (k)1 , . . . , W ′ (k)m , GW ′ (k) , jk + 1)
(where (jk + 1) is taken modulo m, in {1, . . . , m}), which we call W(k + 1).
We set N (k + 1) = N (k).
If in the coordinate jk , there is no gap osculator and if W(k) is not
c∗
( 2 − 20κ)-convex, then W(k + 1) = (W(k)1 , . . . , W(k)m , GW (k) , jk + 1). We
set N (k + 1) = N (k).
If in the coordinate jk , there is no gap osculator and if W(k) is ( c2∗ −20κ)convex, then we consider any neighbor osculator R in Y c2∗ +2mκ (W(k), Xn ) ∪
{Xn } for n the minimal value above N (k) for which Xn ∈
/ W. We then set
N (k + 1) = N (k) + 1, R = GW R, then first
W(k + 1) = (W(k)1 , . . . , W(k)m , GW (k) , i(R))
and then and one unfolds W(k + 2) into W ′ (k + 1).
Lemma 2.12. For each k, one and only one (except for the freedom in the
choice of the neighbor) of these operations is possible.
Proof. It follows from the maximality of W(0), that for all R, Act(R) ∩
W(0) 6= ∅, hence also Act(R)∩W(0) 6= ∅. Thus, assuming W(k) is ( c2∗ −20κ)convex, one can find a neighbor osculator in Y c∗ +2mκ (W(k), Xn ) ∪ {Xn } if
2
Xn ∈
/ W(k).
Lemma 2.13. In all these cases, W(k + 1) is still a composite windmill,
constructed over W(k).
Proof. This follows from Proposition 2.8 if the set of osculators is non-empty,
and from Lemma 2.6 otherwise.
25
Let us Zorn things up. If for all number s, W(k + s) is not ( c2∗ −
20κ)-convex, then for countably many steps in the process, one never use a
neighbor. Let us define W(k + ω) the direct union of the W(k + s), s ∈ N. It
is a composite windmill, constructed over all W(k + s) for s any integer. By
Zorn Lemma, there is an ordinal η such that W(k + η) is ( c2∗ − 20κ)-convex.
2.4.3
Accessibility
Lemma 2.14. For all R ∈ Y∗ , R is eventually in W(η).
Proof. Indeed, assume it is never in Y∗ . Each time W(k) is ( c2∗ −20κ)-convex
(and by the previous observation, this happens infinitely many times), we
use a neighbor that is in Y c2∗ +2mκ (W(k), Xn )∪{Xn } for n the minimal value
above N (k) for which Xn ∈
/ W (hence an integer). Because the sequence
(Xn )N contains infinitely many times the element R (assumed to never be in
W(η)), we will pick an element of Y c2∗ +2mκ (W(k), R) infinitely many times.
However, Y c2∗ +2mκ (W(k), R) ⊂ Y c2∗ +2mκ (W(0), R) and has at least one element less each times it is used by Proposition 1.11. Since by Proposition
1.10, Y c∗ +2mκ (W(0), R) is finite, this is a contradiction.
2
2.5
End of the proof of the main Theorem 2.2
Applying the unfolding operation for each countable ordinal (while taking direct limits for each countable limit ordinal) allows to obtain a tower
of windmills W(k) (indexed by countable ordinals k) with representatives
W(k)∗ such that if k < k′ then W(k′ ) is constructed over W(k). Applying
Lemma 2.14 countably many times (for each element of Y∗ ), there exists
ktop that is countable and that is the smallest ordinal such that Y ⊂ W(k).
Considering GW (ktop ) , we obtain the structure theorem desired, which is
Theorem 2.2.
3
Conclusion, application to Dehn twists, and Theorem 1
Let Σ be an orientable closed surface of genus greater than 2. Consider
MCG(Σ) its Mapping Class Group.
Bestvina Bromberg and Fujiwara produced a finite coloring of the set of
simple closed curves of Σ such that two curves of same color intersect, and
a finite-index normal subgroup G0 of MCG(Σ) that preserves the coloring.
G0 is called the color preserving group. After refinement of the colors, we
26
actually may assume that the colors are in correspondance with the cosets
of G0 . We denote the colors by {1, . . . , m}.
Let c and c′ be a simple closed curves. If they intersect, the projection
of c′ on c is the family of elements in the arc complex of the annulus around
c (that is the cover of Σ associated to c) that come from lifts of c′ . They
are all disjoint. If c′′ is another simple closed curve intersecting c, dπc (c′ , c′′ )
is the diameter in the curve graph of the union of the projections of c′ and
c′′ on the annulus around c.
dπ defines a composite projection system on the set of all (homotopy
classes of) simple closed curves. Indeed, let Act(c) be the set of curves
intersecting c. Clearly dπc is symetric, and satisfies the separation. The
symetry in action, and the closeness in inaction are also direct consequences
of definitions. The finite filling property is a consequence that all sequences
of subsurfaces up to isotopy, increasing for inclusion, is eventually stationnary. dπc satisfies the triangle inequality since it is a diameter of projections,
and the Behrstock inequality [B], see also [Man] [Man2]. The properness is
ensured by [BBF, Lemma 5.3]
We can now define two composite projection systems with composite
rotating families. The first one is defined on Y∗ is the set S of all homotopy
classes of simple closed curves of Σ.
Let us define Yi to be the subset of this set of simple closed curve of
color i in the Bestvina-Bromberg-Fujiwara coloring, and Y∗ their union.
It is, as we just said, a composite projection system on which G0 acts by
automorphisms.
Performing the construction of [BBF] and the choices as after Definition
1.2, we have constants Θ, κ, c∗ , ΘP , ΘRot .
We select N1 such that all N1 -powers of Dehn twists in MCG(Σ) are in
G0 . This is possible since there are only finitely many MCG(Σ)-orbits of
simple closed curves in Σ, and G0 has finite index. Then we select N2 a
multiple of N1 such that for all simple closed curve c, the Dehn twist τcN2
around c satisfies that dc (c′ , τ N2 c′ ) > ΘRot + 2ΘP if c′ is a curve of the
same color than c (hence intersecting c). Since dc is comparable with dπc , by
definition of the latter, there exists such an exponent N2 . Then it follows
that, for all k ∈ N, the collection {Γc = hτckN2 i, c ∈ S }, is a composite
rotating family for all k.
The second composite projection system is a sub-system, invariant for
G0 , provided by the MCG(Σ)-orbit of a since simple closed curve c0 ∈ S .
Namely, the composite rotating family is the collection {Γc , c ∈ MCG(Σ)c0 ⊂
S }.
It is straightforward that both families are composite rotating families.
27
One can then apply Theorem 2.2. In the first case, one obtains that
the group generated by the kN2 -th powers of all Dehn twists has a partially
commutative presentation, which is the second point of Theorem 1. In the
case of the second composite rotating family, one obtains that the group generated by all kN2 -th powers of all Dehn twists that are MCG(Σ)-conjugated
to τc0 has a partially commutative presentation. This latter group is the
2 in MCG(Σ). We therefore obtained Theorem 1.
normal closure of τckN
0
Acknowledgements
The present work has been mostly developed during the visit of the author
to the Mathematical Science Research Institute in Berkeley, during the thematic semester on Geometric Group Theory of the Fall 2016. The author is
supported by the Institut Universitaire de France.
I wish to thank M. Bestvina, K. Bromberg, K. Fujiwara, J. Mangahas,
J. Manning, and A. Sisto for discussions, and J. Tao, and S. Dowdall for
organising an influencial working seminar in MSRI. After I talked in MSRI
on a first version of this work, which was performed on cone-offs of the
blown-up projection complexes of [BBF], and was more in line with [DGO,
§5], J. Mangahas suggested that I work directly in the language of projection
complexes, which is indeed more natural for this situation, and allows a
similar argument; this choice is in line with one of her work in progress with
M. Clay and D. Margalit. I thank T. Brendle and D. Margalit for suggesting
relevant references.
References
[B] J. Behrstock, Asymptotic geometry of the mapping class group and Teichmller
space. Geom. Topol. 10 (2006), 1523–1578.
[BBF] M. Bestvina, K. Bromberg, K. Fujiwara, Constructing group actions on
quasi-trees and applications to mapping class groups. Publ. Math. Inst. Hautes
Études Sci. 122 (2015), 1–64.
[BM] T. Brendle, D. Margalit, Personnal communication, 2017.
[CLM] M. Clay, C. Leininger, D. Margalit, Abstract commensurators of right angled Artin groups and Mapping Class Groups, Math Research Letters, 21 (3)
461–467 (2014).
[Cou] R. Coulon, Partial periodic quotients of groups acting on a hyperbolic space,
Ann. Inst. Fourier, Grenoble, 66, 5 (2016) 1774–1857.
28
[DGO] F. Dahmani, V. Guirardel, D. Osin, Hyperbolically embedded subgroups
and rotating families in groups acting on hyperbolic spaces. Mem. Amer. Math.
Soc. 245 (2017), no. 1156, v+152 pp.
[Fa] B. Farb, Some problems on Mapping Class Groups and Moduli Spaces, in
Problems on Mapping Class Groups and Related Topics, B. Farb Editor, Proceedings of Symposia in Pure Mathematics, vol.74, Amer. Math. Soc (2006)
11–56.
[Fu] L. Funar, On the TQFT representations of the mapping class groups, Pacific
J. Math. 188 (1999), no. 2, 251–274.
[H] S. Humphries, Normal closures of powers of Dehn twists in Mapping Class
Groups, Glasgow, Math. J. 34 (1992) 313–317.
[I]
N. Ivanov, Fifteen problems about Mapping Class Groups, in Problems on
Mapping Class Groups and Related Topics, B. Farb Editor, Proceedings of
Symposia in Pure Mathematics, vol.74, Amer. Math. Soc (2006) 71–80.
[K] T. Koberda, Right-angled Artin groups and a generalized isomorphism problem for finitely generated subgroups of mapping class groups. Geom. Funct.
Anal. 22 (2012), no. 6, 1541–1590.
[Man] J. Mangahas, Uniform uniform exponential growth of subgroups of the mapping class group, Geom. Funct. Anal., 19 (2010), 1468–1480.
[Man2] J. Mangahas, A recipe for short-word pseudo-Anosovs, Am. J. Math., 135
(2013), 1087–1116.
[Mas] G. Masbaum, On powers of half-twists in M (0, 2n), arXiv:1608.08449.
[MM] H. A. Masur, Y. N. Minsky, Geometry of the complex of curves. I. Hyperbolicity, Invent. Math., 138 (1999), 103–149.
[S] C. Stylianakis, The normal closure of a power of a half Dehn twist has infinite
index in the mapping class group of a punctured sphere, arXiv:1511.02912.
Institut Fourier, Univ. Grenoble Alpes, cnrs, 38000 Grenoble, France
e-mail: [email protected]
29
| 4math.GR
|
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT
MATRICES: IMPROVED BOUNDS
arXiv:1608.06498v2 [cs.IT] 26 Dec 2017
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
Abstract. We consider the problem of encoding a finite set of vectors into a
small number of bits while approximately retaining information on the angular
distances between the vectors. By deriving improved variance bounds related
to binary Gaussian circulant embeddings, we largely fix a gap in the proof of
the best known fast binary embedding method. Our bounds also show that
well-spreadness assumptions on the data vectors, which were needed in earlier
work on variance bounds, are unnecessary. In addition, we propose a new
binary embedding with a faster running time on sparse data.
1. Introduction
In this paper we are concerned with the problem of encoding a set of vectors
D located on the sphere in a high-dimensional space into a small number of bits.
Our goal is to obtain an efficient encoding which approximately retains information
on the angular distances between the points in the data set. Formally, we want
to construct a δ-binary embedding of D, i.e., a map f : Sn−1 → {−1, 1}m and a
distance d on {−1, 1}m so that
|d(f (p), f (q)) − dSn−1 (p, q)| ≤ δ
for all p, q ∈ D,
where dSn−1 denotes the normalized geodesic distance on the sphere. Recent works
have shown that this goal can be achieved using maps of the form
fA (x) = sgn(Ax),
x ∈ Rn ,
with A ∈ Rm×n . That is, one first embeds the data into a lower-dimensional space
using a linear map and subsequently takes entry-wise signs of the embedded vectors.
Apart from the intrinsic interest in binary embeddings for complexity reduction and
computational purposes, they play an important role in one-bit compressed sensing
[8, 12] and have been considered as computationally cheap layers in deep neural
networks [4].
In many successful approaches, A is a random matrix drawn independently of
the data. For instance, is not hard to show that if A is an m × n standard Gaussian
matrix G and D ⊂ Sn−1 is any finite set of N points, then with probability exceeding
1 − η, fA is a δ-binary embedding for D into ({−1, 1}m, dH ), provided that the
number of bits satisfies m & δ −2 log(N/η) [13, 14]. Here, dH denotes the normalized
Hamming distance and . hides an absolute constant. It is known [14] that this bit
complexity is optimal : any oblivious random map from D into {−1, 1}m which is a
δ-binary embedding with probability at least 1 − η must satisfy m & δ −2 log(N/η).
Although the Gaussian binary embedding achieves the optimal bit complexity
on finite sets, it has a clear computational downside: as a Gaussian random matrix
is densely populated, the implementation involves slow matrix-vector multiplications. A simple idea to decrease the running time, suggested in [14], is to first
2010 Mathematics Subject Classification. 60B20,68Q87.
Key words and phrases. Binary embeddings, Johnson-Lindenstrauss embeddings, circulant
matrices.
1
2
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
reduce the dimensionality of the data by using a fast Johnson-Lindenstrauss transform [2] before applying a Gaussian binary embedding. We will refer to this map
as the accelerated Gaussian binary embedding. For appropriate choices of the involved parameters, this map fA with A = GΦFJL , is a δ-binary embedding into
({−1, 1}m, dH ) with optimal bit complexity and, if log N . δ 2 n1/2 , runs in time
O(n log n). However, outside of this parameter range the running time deteriorates.
To obtain near-linear time and improved space complexity in a wider range of
parameters, focus has recently shifted from purely Gaussian matrices to more structured random matrices. It was experimentally observed [16] that an equally good
embedding into ({−1, 1}m, dH ) can be obtained by replacing the dense Gaussian
matrix A by a subset of m rows of a Gaussian circulant matrix with randomized
column signs. That is, one considers A = RI Cg Dε , where, given I ⊂ [n], RI is
a subsampling operator that restricts a vector to its entries indexed by I, Cg is
a circulant matrix generated by a standard Gaussian vector and Dε is a diagonal matrix with independent random signs on the diagonal. This matrix allows
for matrix-vector multiplication in time O(n log n) by exploiting the fast Fourier
transform. The experiments in [16] indicate that the performance of the embedding
deteriorates if one leaves out the column sign randomization.
In view of these experiments, it is desirable to try to prove that the matrix
A = RI Cg Dε induces a binary embedding with the optimal bit complexity. As
dH (fA (p), fA (q)) is an unbiased estimator of the geodesic distance dSn−1 (p, q), it
would suffice to show that dH (fA (p), fA (q)) concentrates strongly around its mean
for fixed points p, q. Due to the non-linearity of the sign function and the dependencies between the circulant rows, this is a tough problem. In fact, even an
optimal bound for the variance of dH (fA (p), fA (q)) is not known. Nevertheless,
some interesting partial results have recently been established, which can roughly
be grouped in two directions. In both cases, the results have been used to construct new fast binary embeddings by appropriately modifying the matrix A using
additional randomness.
In the first direction, developed by the authors in [15] and later quantitatively
improved in [11], it is shown that the map fA associated to A = RI Cg Dε is a δbinary embedding on a finite set D with large probability, provided that all vectors
in D as well as in D − D are well-spread. One can show that an arbitrary set of
points will have these two properties with high probability after they have been
pre-processed using a randomized Hadamard transform. To be more precise, the
corresponding result of [11] is as follows. Let I be a set of m indices selected
uniformly at random, let g1 , g2 be independent standard Gaussian vectors, Dg1 ,
Dg2 the diagonal matrices with g1 , g2 on the diagonal and let H be an n × n
Hadamard matrix. Consider A = RI Cg Dg1 HDg2 and let D ⊂ Sn−1 be any set of
N points. If
log N . δ 2 (log n)−1 n1/3 ,
m & δ −3 log N,
then with high probability fA is a δ-binary embedding of D into ({−1, 1}m, dH ).
In contrast to the accelerated Gaussian binary embedding, fA (x) can always be
computed in time O(n log n). However, the parameter range in which fA is provably
a δ-binary embedding is more restrictive.
The second direction, pursued by the authors in [14], seeks to prove an optimal
variance bound for dH (fA (p), fA (q)), meaning that the bound decays as O(1/m).
Once this is established, one can stack independent copies of A into a matrix to
obtain a high probability binary embedding. To be precise, [14] introduced the map
fA , with A = ΨΦFJL , where ΦFJL is a n′ × n fast Johnson-Lindenstrauss transform
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
3
and
Ψ(1)
′
Ψ = ... ∈ Rm×n ,
Ψ(B)
consists of B independent m/B × n′ subsampled Gaussian Toeplitz matrices with
randomized column signs. It was claimed in [14] that for appropriate choices of n′
and B, the map fA is a δ-binary embedding into ({−1, 1}m, dmed,B ), where dmed,B is
the median over the B block-wise Hamming distances. The embedding attains the
optimal bit complexity and it runs in O(n log n) when log N . δn1/2 /(log(1/δ))1/2 .
To our knowledge, this is the only embedding with guarantees superior to the ones
for the accelerated Gaussian binary embedding, in the sense that it is simultaneously
a δ-binary embedding with the optimal bit complexity and runs in near-linear time
in a larger parameter range than log N . δ 2 n1/2 . Unfortunately, as we point out in
Remark 3.4, the proof in [14] contains a subtle gap that cannot be fixed in a trivial
way.
The goal of our paper is two-fold. On the one hand, by deriving improved
variance bounds we contribute to the theoretical understanding of the numerical
experiments with circulant binary embeddings from [16]. On the other hand, our
work largely fixes the proof gap in [14]. We start by considering a binary embedding
fA with A = RI Cg . We show, on the one hand, that there are two vectors p, q ∈
S n−1 that cannot be embedded well for any choice of I ⊂ [n]. On the other hand,
we prove that if I consists of m dyadic integers and p, q are m-sparse, then
1
Var dH (fA (p), fA (q)) . .
m
Thus, in general a subsampled Gaussian circulant matrix does not yield a good
binary embedding if one does not randomize the column signs of the matrix. However, by subsampling judiciously, one can still obtain optimal variance decay for
relatively sparse vectors. Next, we consider the situation where we additionally use
column sign randomization, i.e., we set A = RI Cg Dε . In Theorem 2.9 we show
that if I is a set of m indices chosen uniformly at random, then for any p, q ∈ Sn−1
1
1
+√ ,
Var dH (fA (p), fA (q)) .
m
n
√
√
which is optimal for m ≤ n. Up to the 1/ n factor, this is the variance bound
claimed and needed for the proof in [14]. As a consequence, we can resurrect the
aforementioned guarantees for the second binary embedding map from [14], at least
when n & δ −6 . Our result (1) is always superior to the variance bounds based on
well-spreadness conditions√from [15] (i.e., even if p, q are maximally well-spread).
We conjecture that the 1/ n factor in (1) can be removed. This would remove the
condition n & δ −6 .
As a final contribution of our work, we analyze modifications of the two embeddings from [14] that are obtained by replacing the fast Johnson-Lindenstrauss
transform ΦFJL in these maps by a sparse Johnson-Lindenstrauss transform ΦSJL
[6, 3, 9]. The resulting embeddings√again realize the optimal bit complexity and
have near-linear running times on n-sparse vectors under similar conditions on
n, δ and N . In contrast to the ΦFJL -based maps, however, the running times can
improve even further if the vectors in D are very sparse. We refer to Section 3 for
further details.
(1)
1.1. Notation. We start by fixing some notation that will be used throughout. For
any given x = (x1 , . . . , xn ) ∈ Rn , we define Dx ∈ Rn×n to be the diagonal matrix
4
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
with x on its diagonal
x. That is,
x1 0 · · ·
0 x1
0
0
x2
Dx =
0
.
.
..
..
0 ···
and we let Cx ∈ Rn×n be the circulant matrix generated by
0
..
.
..
.
0
0
0
..
.
xn
xn−1
, Cx =
xn−2
..
.
0
x1
xn
x1
xn
xn−1
..
.
x2
x1
xn
..
.
···
···
···
..
.
xn−2
xn−3
xn−4
..
.
x2
x3
···
xn−1
xn−1
xn−2
xn−3
..
.
xn
We use the shorthand notation [n] = {1, . . . , n}. For i, j ∈ [n], we will always take
i + j to mean addition modulo n. If we define the shift operator T : Rn → Rn by
(T x)i = xi+1 ,
then we can write the i-th row of Cx as T n−i x. Closely related to circulant matrices
are Toeplitz matrices. For a vector y ∈ R2n−1 the Toeplitz matrix Ty ∈ Rn×n
generated by y is defined by
y2n−1
y1
y2
· · · yn−2
yn−1
y2n−2 y2n−1
y1
· · · yn−3
yn−2
y2n−3 y2n−2 y2n−1 · · ·
···
yn−3
Ty =
..
..
..
..
..
..
.
.
.
.
.
.
yn
yn+1
yn+2
···
y2n−2
y2n−1 .
Observe that Ty can be viewed as the upper left n × n block of the circulant matrix
Cy ∈ R2n×2n . As a final building block for the construction of binary embeddings
we define, for any given I ⊂ [n], the restriction operator RI : Rn → R|I| by
RI x = (xi )i∈I .
Below we will use several different distances. For x, y ∈ Rn with x, y 6= 0 we define
hx, yi
1
.
dSn−1 (x, y) = arccos
π
kxk2 kyk2
In particular, for two points x, y on the unit sphere, dSn−1 (x, y) denotes the normalized geodesic distance between x and y. The normalization is chosen so that
opposite points on the sphere have distance one. On the discrete cube {−1, 1}m
we consider two different distances. First, we consider the normalized Hamming
distance, i.e.,
m
1 X
1x 6=y .
dH (x, y) =
m i=1 i i
Second, we use a distance considered before in [14]. Let B be a given block size so
that m′ = m/B is an integer. Accordingly, we define dmed,B to be the median of the
block-wise Hamming distances, that is, for x = (x1 , . . . , xB ) and y = (y1 , . . . , yB ),
′
with xi , yi ∈ {−1, 1}m for i ∈ [B], we set
dmed,B (x, y) = median((dH (xi , yi ))B
i=1 ).
1.2. Acknowledgement. The authors would like to thank the reviewers for valuable comments, in particular for a suggestion that substantially shortened the proof
of Lemma 2.3. A. Stollenwerk acknowledges funding by the European Research
Council through ERC Starting Grant StG 258926. S. Dirksen and A. Stollenwerk acknowledge funding by the Deutsche Forschungsgemeinschaft (DFG) through
the project Quantized Compressive Spectrum Sensing (QuaCoSS), which is part
of the priority program SPP 1798 Compressed Sensing in Information Processing
(COSIP).
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
5
2. Variance bounds
In this section we consider an m × n subsampled Gaussian circulant matrix
A = RI Cg , with g an n-dimensional standard Gaussian, as well as a version with
randomized column signs, i.e., A = RI Cg Dε , where ε is a Rademacher vector, i.e.,
a vector of n independent random signs (P(εi = 1) = P(εi = −1) = 1/2). Denote
the i-th row of A by ai . By the invariance of the standard Gaussian distribution
d
under reflections, we have in both cases ai ∼ g. Hence for any p, q ∈ Sn−1
1 X
E(dH (fA (p), fA (q))) =
(2)
P(sgn(hai , pi) 6= sgn(hai , qi))
m
i∈I
= P(sgn(hg, pi) 6= sgn(hg, qi)) = dSn−1 (p, q),
where the final equality is [7, Lemma 3.2]. This shows that dH (fA (p), fA (q)) is an
unbiased estimator of the geodesic distance. To investigate whether these random
matrices induce a δ-binary embedding fA of finite point sets into ({−1, 1}m, dH ),
we first consider a more simple problem and try to bound the quantity
Var dH (fA (p), fA (q)) = Var dH (sgn(Ap), sgn(Aq))
for arbitrary p, q ∈ Sn−1 . Define the indicator random variable
Xi = 1sgn(hai ,pi)6=sgn(hai ,qi) .
We can then write
m
1 X
Var dH (fA (p), fA (q)) = Var
Xi
m i=1
(3)
=
m
2
1 X
Var(Xi ) + 2
2
m i=1
m
X
Cov(Xi , Xj ).
1≤i<j≤m
If A is a standard Gaussian matrix, then the second term vanishes and it is easy
to obtain an optimal bound. In the case of Gaussian circulant matrices, the rows
of A are heavily dependent and it is therefore non-trivial to bound the cross-terms
Cov(Xi , Xj ). This is the main technical challenge addressed in this section.
It is worthwhile to note that the best possible variance decay in m that we can
expect for arbitrary p, q ∈ Sn−1 is
1
(4)
Var dH (fA (p), fA (q)) . .
m
Indeed, by Chebyshev’s inequality, this estimate implies
1
P(|dH (fA (p), fA (q)) − dSn−1 (p, q)| ≥ δ) .
mδ 2
and in particular, on every two-point set {p, q} the map fA is an (oblivious) δbinary embedding with probability 1/2, say, if m & δ −2 . By [14, Theorem 3.1], this
scaling in δ is optimal.
In the first part of this section, we investigate variance bounds for a subsampled
Gaussian circulant matrix. It turns out that there exist vectors p, q for which the
variance does not decay at all. However, one can still get optimal decay for sparse
vectors if one subsamples dyadically (see Proposition 2.7). In the second part of
this section, we consider a subsampled Gaussian circulant matrix with randomized
√
column signs. Our main result, Theorem 2.9, says that (4) holds for m ≤ n if the
set of sampled rows I is chosen uniformly at random. This result is a key ingredient
for our results on fast binary embeddings in Section 3.
For any x ∈ Rn we define the binary random variable
Z(x) = sgn(hg, xi).
6
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
The following is a key observation to control the covariance terms Cov(Xi , Xj ) for
i 6= j.
Theorem 2.1. For any x1 , x2 , y1 , y2 ∈ Sn−1
| Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) )| ≤ 8 max{|hx1 , y1 i|, |hx1 , y2 i|, |hx2 , y1 i|, |hx2 , y2 i|}.
Remark 2.2. In [15, Lemma 6], it was shown that
(5)
| Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) )| ≤ 2 max{kΠy1 k2 , kΠy2 k2 },
where Π is the projection onto Span{x1 , x2 }. If {x1 , z2 } is any orthonormal basis
of Span{x1 , x2 }, then the right hand side is up to constants equal to
max{|hx1 , y1 i|, |hx1 , y2 i|, |hz2 , y1 i|, |hz2 , y2 i|}.
Note that this is, again up to constants, larger than the right hand side in Theorem 2.1. Indeed, as x2 = hx1 , x2 ix1 + hz2 , x2 iz2 , it follows for i = 1, 2,
|hx2 , yi i| ≤ |hx1 , yi i| + |hz2 , yi i|.
In particular, (5) is not a good bound if x1 , x2 are far from orthogonal. For example,
let x1 = e1 , x2 = (cos α, sin α), y1 = e2 and y2 = e3 . The right hand side in
Theorem 2.1 is equal to 10|hx2 , y1 i| = 10| sin α|, which scales as α if α is small. On
the other hand, kΠy1 k2 = 1, so that (5) gives a trivial bound.
Theorem 2.1 can more easily be shown in the case where hx1 , x2 i = 0. In order
to tackle the non-orthogonal case, we use Lemma 2.3 below.
Lemma 2.3. Let g1 , g2 and g3 be independent, standard Gaussian random variables. For a, b ∈ R define
f (a, b) = P(sgn(g1 ) 6= sgn(g1 + ag3 ), sgn(g2 ) 6= sgn(g2 + bg3 )).
Then
1
|ab|.
2π
Proof. By invariance of the standard Gaussian distribution under reflections, i.e.,
(6)
f (a, b) ≤
d
(g1 , g2 , g3 ) ∼ (ε1 g1 , ε2 g2 , ε3 g3 ) for all ε1 , ε2 , ε3 ∈ {±1},
we may assume that a, b ≥ 0. Moreover, using invariance of the Gaussian distribution under reflection several times, we obtain
f (a, b) = P(g1 ≥ 0, g1 + ag3 ≤ 0, sgn(g2 ) 6= sgn(g2 + bg3 ))
+ P(g1 ≤ 0, g1 + ag3 ≥ 0, sgn(g2 ) 6= sgn(g2 + bg3 ))
= P(g1 ≥ 0, g1 + ag3 ≤ 0, sgn(g2 ) 6= sgn(g2 + bg3 ))
+ P(−g1 ≥ 0, −g1 − ag3 ≤ 0, sgn(−g2 ) 6= sgn(−g2 − bg3 ))
= 2P(g1 ≥ 0, g1 + ag3 ≤ 0, sgn(g2 ) 6= sgn(g2 + bg3 ))
= 2 P(g1 ≥ 0, g1 + ag3 ≤ 0, g2 ≥ 0, g2 + bg3 ≤ 0)
+ P(g1 ≥ 0, g1 + ag3 ≤ 0, g2 ≤ 0, g2 + bg3 ≥ 0)
= 2 P(g1 ≥ 0, g1 − ag3 ≤ 0, g2 ≥ 0, g2 − bg3 ≤ 0)
+ P(g1 ≥ 0, g1 − ag3 ≤ 0, g2 ≤ 0, g2 − bg3 ≥ 0) .
Clearly, the second term vanishes and so
f (a, b) = 2P(0 ≤ g1 ≤ ag3 , 0 ≤ g2 ≤ bg3 ).
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
7
Notice that if g is standard Gaussian, then for any t ≥ 0
P(0 ≤ g ≤ t) ≤
√1 t.
2π
Using this inequality we find
P(0 ≤ g1 ≤ ag3 , 0 ≤ g2 ≤ bg3 ) = E(10≤g3 10≤g1 ≤ag3 10≤g2 ≤bg3 )
= Eg3 (10≤g3 Eg1 ,g2 (10≤g1 ≤ag3 10≤g2 ≤bg3 ))
= Eg3 (10≤g3 Eg1 (10≤g1 ≤ag3 )Eg2 (10≤g2 ≤bg3 ))
≤ Eg3 (10≤g3 ( √12π ag3 )( √12π bg3 ))
=
which implies f (a, b) ≤
2
ab
2π E(10≤g3 (g3 ) )
=
ab
4π ,
ab
2π .
1
Remark 2.4. The constant 2π
in inequality (6) of Lemma 2.3 is optimal. Indeed,
consider the symmetric case a = b. From the proof of Lemma 2.3 we see that
f (a, a) = 2P(0 ≤ g1 ≤ ag3 , 0 ≤ g2 ≤ ag3 )
= 2P({0 ≤ g1 ≤ g2 ≤ ag3 } ∪ {0 ≤ g2 ≤ g1 ≤ ag3 })
= 2 P(0 ≤ g1 ≤ g2 ≤ ag3 ) + P(0 ≤ g2 ≤ g1 ≤ ag3 )
= 4P(0 ≤ g1 ≤ g2 ≤ ag3 )
Z ∞
Z ∞
Z ∞
2
1 −x22 /2
1 −x21 /2
1
√ e
√ e
√ e−x3 /2 dx3 .
dx1
dx2
=4
x2
2π
2π
2π
x1
0
a
Observe that
Z ∞
Z ∞
2
2
2
x2
df
4
−x21 /2
e
dx
e−x2 /2 (−e−x2 /2a )(− 2 )dx2
(a, a) =
1
3/2
da
a
(2π)
0
x1
Z ∞
Z ∞ x2 2
a +1
2
2
4
e−x1 /2 dx1
e− 2 ( a2 ) x2 dx2
=
(2π)3/2 a2 0
x1
Z ∞
a2 x21 a2 +1
2
4
e−x1 /2 2
=
e− 2 ( a2 ) dx1
3/2
2
a +1
(2π) a 0
Z ∞ x2 2
1 2a +1
4
e− 2 ( a2 ) dx1
=
3/2
2
(2π) (a + 1) 0
r
1
π
a
a
4
√
√
=
.
=
π (a2 + 1) 2a2 + 1
(2π)3/2 (a2 + 1) 2 2a2 + 1
Hence,
(7)
f (a, a)
= lim
a→0
a→0
a2
lim
df
da (a, a)
2a
= lim
a→0
1
1
1
√
=
.
2π (a2 + 1) 2a2 + 1
2π
In the proof of Theorem 2.1 we will use the following simple estimates.
Lemma 2.5. Suppose x, y ∈ Sn−1 with hx, yi ≥ 0. Then
(8)
1
kx − yk2
dSn−1 (x, y) ≤
23/2
dSn−1 (x, y) ≤
1p
1 − hx, yi2 .
2
and, as a consequence,
(9)
Proof. (9) immediately follows from (8) as
1p
1p
1 p
1
1 − hx, yi ≤
1 − hx, yi2 .
kx − yk2 = 3/2 2 − 2hx, yi =
3/2
2
2
2
2
8
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
To prove (8), define z = hx, yi ∈ [0, 1]. Then dSn−1 (x, y) = π1 arccos(z) and
√
√
1
kx − yk2 = 21 1 − z. We need to show that f (z) = 12 1 − z − π1 arccos(z) ≥ 0
23/2
for z ∈ [0, 1]. Clearly, f (0) = f (1) = 0 and
√
− 41 1 + z + π1
1
1
1
1
′
√
=
.
+ √
f (z) = − √
4 1 − z π 1 − z2
1 − z2
Hence f ′ (z0 ) = 0 for z0 = π162 − 1 ∈ (0, 1). Since f ′ (z) > 0 for z ∈ (0, z0 ) and
f ′ (z) < 0 for z ∈ (z0 , 1), the result follows.
We are now ready to prove Theorem 2.1.
Proof of Theorem 2.1. We may assume that hx1 , x2 i ≥ 0. Indeed, if hx1 , x2 i ≤ 0,
then hx1 , −x2 i ≥ 0 and by using dSn−1 (x1 , x2 ) + dSn−1 (x1 , −x2 ) = 1 and P(Z(y1 ) 6=
Z(y2 )) = dSn−1 (y1 , y2 ) we see
Cov(1Z(x1 )6=Z(−x2 ) , 1Z(y1 )6=Z(y2 ) )
= P Z(x1 ) 6= Z(−x2 ), Z(y1 ) 6= Z(y2 ) − dSn−1 (x1 , −x2 )dSn−1 (y1 , y2 )
= dSn−1 (y1 , y2 ) − P Z(x1 ) 6= Z(x2 ), Z(y1 ) 6= Z(y2 )
− 1 − dSn−1 (x1 , x2 ) dSn−1 (y1 , y2 )
= −P Z(x1 ) 6= Z(x2 ), Z(y1 ) 6= Z(y2 ) + dSn−1 (x1 , x2 )dSn−1 (y1 , y2 )
= − Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) ),
which implies
| Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) )| = | Cov(1Z(x1 )6=Z(−x2 ) , 1Z(y1 )6=Z(y2 ) )|.
From now on, we assume hx1 , x2 i ≥ 0. Clearly, x1 , x2 , y1 , y2 span an at most 4dimensional subspace of Rn . Hence one can construct an orthogonal matrix O,
which maps x1 , x2 , y1 and y2 into R4 × {0}n−4. In fact, we can choose O so that
Ox1 = e1 , Ox2 = a1 e1 + a2 e2 =: a, Oy1 = b1 e1 + b2 e2 + b3 e3 =: b,
Oy2 = c1 e1 + c2 e2 + c3 e3 + c4 e4 =: c
with a2 , b3 , c4 ≥ 0. This can be achieved by
1
1
0
O1 = O˜1 , O2 =
, O3 = 0
0 Õ2
0
defining O = O4 O3 O2 O1 ,
1 0
0 0
0 1
1 0 , O4 =
0 0
0 O˜3
0 0
with Õi ∈ R(n+1−i)×(n+1−i) orthogonal matrices, such that
where
0 0
0 0
1 0
0 O˜4
O1 x1 = e1 , O2 O1 x2 = a, O3 O2 O1 y1 = b and O4 O3 O2 O1 y2 = c.
p
p
Observe that 0 ≤ hx1 , x2 i = he1 , ai = a1 and a2 = 1 − a21 = 1 − hx1 , x2 i2 . We
can assume a2 > 0. Otherwise the statement is trivial, because then hx1 , x2 i = 1,
which implies x1 = x2 and hence Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) ) = 0. Moreover,
p
p
we may assume that γ := c23 + c24 > 0, otherwise 1 = c21 + c22 ≤ |c1 | + |c2 | and
using inequality (9) in Lemma 2.5 yields
| Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) )|
p
1 − hx1 , x2 i2
2
a2 (|c1 | + |c2 |)
|c1 | + |a2 c2 |
|he1 , ci| + |ha, ci − a1 c1 |
a2
≤
≤
=
=
2
2
2
2
2|he1 , ci| + |ha, ci|
2|hx1 , y2 i| + |hx2 , y2 i|
≤
=
.
2
2
≤ P Z(x1 ) 6= Z(x2 ) = dSn−1 (x1 , x2 ) ≤
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
9
The idea is now to replace b, c by suitable approximants b′ , c′ , which are orthogonal
to e1 , a. Set b′ = e3 and c′ = γ1 (c3 e3 + c4 e4 ). Clearly, b′ , c′ ∈ Sn−1 are orthogonal
to e1 , a and we can control their distance to the original vectors b and c. Indeed,
since hb, b′ i = b3 ≥ 0 and hc, c′ i = γ ≥ 0, inequality (9) in Lemma 2.5 yields
q
q
1
1p
1
1
1 − hb, b′ i2 =
1 − b23 =
b21 + b22 ≤ (|b1 | + |b2 |)
dSn−1 (b, b′ ) ≤
2
2
2
2
and
q
q
1
1
1
1p
1 − hc, c′ i2 =
1 − (c23 + c24 ) =
c21 + c22 ≤ (|c1 | + |c2 |).
dSn−1 (c, c′ ) ≤
2
2
2
2
Define
ε = max{|hx1 , y1 i|, |hx1 , y2 i|, |hx2 , y1 i|, |hx2 , y2 i|}.
Then
|b1 | = |he1 , bi| = |hx1 , y1 i| ≤ ε as well as |c1 | = |he1 , ci| = |hx1 , y2 i| ≤ ε.
Similarly we can estimate
(10)
and
(11)
|a2 b2 | = |ha, bi − a1 b1 | ≤ |ha, bi| + |a1 b1 | = |hx2 , y1 i| + |a1 b1 | ≤ 2ε
|a2 c2 | = |ha, ci − a1 c1 | ≤ |ha, ci| + |a1 c1 | = |hx2 , y2 i| + |a1 c1 | ≤ 2ε,
which yields
2ε
2ε
as well as |c2 | ≤ .
a2
a2
In summary we obtain the bounds
ε
ε
ε
ε
(12)
dSn−1 (b, b′ ) ≤ +
and dSn−1 (c, c′ ) ≤ + .
2 a2
2 a2
The rotational invariance of the standard Gaussian distribution implies
|b2 | ≤
Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) ) = Cov(1Z(e1 )6=Z(a) , 1Z(b)6=Z(c) ).
Moreover, since he1 , b′ i = he1 , c′ i = ha, b′ i = ha, c′ i = 0, 1Z(e1 )6=Z(a) and 1Z(b′ )6=Z(c′ )
are independent and in particular
Cov(1Z(e1 )6=Z(a) , 1Z(b′ )6=Z(c′ ) ) = 0.
Using the triangle inequality we now obtain
(13) | Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) )|
= | Cov(1Z(e1 )6=Z(a) , 1Z(b)6=Z(c) ) − Cov(1Z(e1 )6=Z(a) , 1Z(b′ )6=Z(c′ ) )|
≤ |P Z(e1 ) 6= Z(a), Z(b) 6= Z(c) − P Z(e1 ) 6= Z(a), Z(b′ ) 6= Z(c′ ) |
+ |dSn−1 (e1 , a)dSn−1 (b, c) − dSn−1 (e1 , a)dSn−1 (b′ , c′ )|
≤ P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) + P Z(e1 ) 6= Z(a), Z(c) 6= Z(c′ )
+ dSn−1 (e1 , a) dSn−1 (b, b′ ) + dSn−1 (c, c′ ) .
In the last step, we have used
dSn−1 (b, c) ≤ dSn−1 (b, b′ ) + dSn−1 (b′ , c′ ) + dSn−1 (c′ , c),
and that by decomposing the event
{Z(b) 6= Z(c)} = {Z(b) 6= Z(c), Z(b) = Z(b′ ), Z(c) = Z(c′ )}
we obtain
∪ {Z(b) 6= Z(c), Z(b) 6= Z(b′ ) ∨ Z(c) 6= Z(c′ ) },
P Z(e1 ) 6= Z(a), Z(b) 6= Z(c) ≤ P Z(e1 ) 6= Z(a), Z(b′ ) 6= Z(c′ )
+ P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) + P Z(e1 ) 6= Z(a), Z(c) 6= Z(c′ ) .
10
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
It remains to bound all three summands appearing on the far right hand side of
(13). We estimate using (12) and Lemma 2.5
2ε
dSn−1 (e1 , a) dSn−1 (b, b′ ) + dSn−1 (c, c′ ) ≤ dSn−1 (e1 , a) ε +
a2
≤ dSn−1 (e1 , a)ε + ε ≤ 2ε.
Before estimating the other two summands in (13), observe that with
q
q
kb = b22 + b23 and kc = c22 + c23 + c24 ,
we obtain using Lemma 2.5,
(14)
b b 1
3
2
≤
dSn−1 b, 0, ,
kb kb
2
and similarly,
s
1−
b2
2
kb
+
b23 2
ε
1
= |b1 | ≤
kb
2
2
c c c ε
2
3
4
dSn−1 c, 0, , ,
≤ .
kc kc kc
2
(15)
Notice that if kb = 0 (respectively, kc = 0), then b = ±e1 (respectively, c = ±e1 )
and hence ε = 1, so that the result is trivial in this case.
Let us now estimate P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) , the second summand on
the far right hand side of (13) can be bounded in the same fashion. We distinguish
three cases. First, if a22 > 41 , then using (12)
ε
ε
P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) ≤ dSn−1 (b, b′ ) ≤ +
≤ 3ε.
2 a2
Second, if b21 + b22 > 43 , then
1
q
1
1
1
1 − (b21 + b22 ) ≥ arccos(1/2) ≥ ,
arccos(b3 ) = arccos
π
π
π
π
which implies by (12)
1p
1 − he1 , ai2
P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) ≤ dSn−1 (e1 , a) ≤
2
a2
3ε
3πε
=
≤
≤ 3ε.
≤
2
4dSn−1 (b, b′ )
4
dSn−1 (b, b′ ) =
Finally, suppose that a22 ≤
(16)
1
4
and b21 + b22 ≤ 34 . This implies
|a2 b2 |
4
|a2 b2 |
p
=p
≤ √ |a2 b2 | and a1 , b3 > 0.
2
2
2
a1 b 3
3
1 − a2 1 − b 1 − b 2
Using (14) we find
P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ )
= P sgn(g1 ) 6= sgn(a1 g1 + a2 g2 ), sgn(b1 g1 + b2 g2 + b3 g3 ) 6= sgn(g3 )
≤ P sgn(g1 ) 6= sgn(a1 g1 + a2 g2 ), sgn(b2 g2 + b3 g3 ) 6= sgn(g3 )
+ P sgn(b1 g1 + b2 g2 + b3 g3 )) 6= sgn(b2 g2 + b3 g3 )
b
a2
2
≤ P sgn(g1 ) 6= sgn g1 + g2 , sgn(g3 ) 6= sgn
g2 + g3
a1
b3
b b
3
2
+ dSn−1 b, 0, ,
kb kb
b
ε
a2
2
≤ P sgn(g1 ) 6= sgn g1 + g2 , sgn(g3 ) 6= sgn
g2 + g3 + .
a1
b3
2
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
11
Applying Lemma 2.3, (16), and (10) we obtain
a2
b2
P sgn(g1 ) 6= sgn g1 + g2 , sgn(g3 ) 6= sgn g3 + g2
a1
b3
4ε
|a2 b2 |
2|a2 b2 |
≤
≤ √ ≤ √ .
2πa1 b3
π 3
π 3
As a consequence,
ε
4ε
P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) ≤ √ + ≤ 3ε.
2
π 3
In all three cases we find
P Z(e1 ) 6= Z(a), Z(b) 6= Z(b′ ) ≤ 3ε.
To finish the proof, we bound the second summand on the far right hand side of
(13). If either a22 > 14 or c21 + c22 > 34 , then
P Z(e1 ) 6= Z(a), Z(c) 6= Z(c′ ) ≤ 3ε
follows exactly as above, simply by replacing b and b′ everywhere by c and c′ ,
respectively. Let us now assume that a22 ≤ 14 as well as 1 − γ 2 = c21 + c22 ≤ 43 . Then
(17)
|a2 c2 |
4
|a2 c2 |
p
=p
≤ √ |a2 c2 | and a1 , γ > 0.
2
2
2
a1 γ
3
1 − a2 1 − c1 − c2
Using (15) we estimate
P Z(e1 ) 6= Z(a), Z(c) 6= Z(c′ )
= P sgn(g1 ) 6= sgn(a1 g1 + a2 g2 ),
sgn(c1 g1 + c2 g2 + c3 g3 + c4 g4 ) 6= sgn(c3 g3 + c4 g4 )
≤ P sgn(g1 ) 6= sgn(a1 g1 + a2 g2 ), sgn(c2 g2 + c3 g3 + c4 g4 ) 6= sgn(c3 g3 + c4 g4 )
+ P sgn(c1 g1 + c2 g2 + c3 g3 + c4 g4 ) 6= sgn(c2 g2 + c3 g3 + c4 g4 )
= P sgn(g1 ) 6= sgn(a1 g1 + a2 g2 ), sgn(c2 g2 + c3 g3 + c4 g4 ) 6= sgn(c3 g3 + c4 g4 )
c c c
2
3
4
+ dSn−1 c, 0, , ,
kc kc kc
a2
≤ P sgn(g1 ) 6= sgn g1 + g2 ,
a1
c g + c g ε
c
c
g
3 3
4 4
3 3 + c4 g 4
2
g2 +
6= sgn
+
sgn
γ
γ
γ
2
a2
c2
ε
′
′
= P sgn(g1 ) 6= sgn g1 + g2 , sgn
g2 + g 6= sgn(g ) + ,
a1
γ
2
where in the last step we write g ′ := γ1 (c3 g3 + c4 g4 ). Observe that g ′ is a standard
Gaussian random variable which is independent of g1 and g2 . Therefore Lemma 2.3,
(17), and (11) yield
c2
a2
P sgn(g1 ) 6= sgn g1 + g2 , sgn(g ′ ) 6= sgn g ′ + g2
a1
γ
|a2 c2 |
2|a2 c2 |
4ε
≤
≤ √ ≤ √ ,
2πa1 γ
π 3
π 3
which implies that in all cases P Z(e1 ) 6= Z(a), Z(c) 6= Z(c′ ) ≤ 3ε.
Remark 2.6. The dependence on ε = max{|hx1 , y1 i|, |hx1 , y2 i|, |hx2 , y1 i|, |hx2 , y2 i|}
in Theorem 2.1 is optimal up to a constant. We argue by contradiction. Assume
Cov(X, Y ) := Cov(1Z(x1 )6=Z(x2 ) , 1Z(y1 )6=Z(y2 ) ) ≤ Cεs for some constant C > 0
12
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
and s > 1. For a > 0 define x1 = e1 , x2 =
y2 =
√ 1
(e
1+a2 2
+ ae3 ). Then ε = hx2 , y2 i =
a2
1+a2
√ 1
(e
1+a2 1
+ ae3 ), y1 = e2 and
and
Cov(X, Y ) = P sgn(g1 ) 6= sgn(g1 + ag3 ), sgn(g2 ) 6= sgn(g2 + ag3 ) − EXEY
= f (a, a) − g(a)2 ,
where f (a, a) as in Lemma 2.3 and
g(a) = EX = EY = dSn−1 (x1 , x2 ) = dSn−1 (y1 , y2 ) =
We know lima→0
f (a,a)
a2
and as a consequence,
=
1
2π
by (7). Clearly,
′
1
1
arccos( √
) =
2
1
+
a2
1+a
1
1
.
arccos √
π
1 + a2
1
)
arccos2 ( √1+a
2
π 2 g(a)2
=
lim
2
2
a→0
a→0
a
a
1
arccos( √1+a
)
1
2
= lim
= lim
= 1.
2
a→0
a→0 (1 + 3a2 )(1 + a2 )
a(1 + a )
A contradiction now follows by observing that
Cov(X, Y )
1
1
lim
=
− 2 > 0,
2
a→0
a
2π π
but
Cεs
Ca2s
Ca2s−2
=
lim
= 0.
lim 2 = lim
a→0 a
a→0 (1 + a2 )s a2
a→0 (1 + a2 )s
lim
We can now state our main variance bounds for subsampled Gaussian circulant
matrices.
Proposition 2.7. Let I ⊂ [n], let g be an n-dimensional standard Gaussian and
set A = RI Cg .
Pk
Pk
(1) Set n = 2k, p = i=1 e2i−1 , q = i=1 e2i and I ⊂ [n] arbitrary subset with
m elements. Then
1
Var dH (fA (p), fA (q)) = .
4
1
.
In particular, P(|dH (fA (p), fA (q)) − dSn−1 (p, q)| ≥ 1/4) ≥ 36
(2) Let I ⊂ [n] be the set of the first m dyadic integers. Then for any two
s-sparse vectors p, q ∈ Sn−1
s
1
+ 2.
Var dH (fA (p), fA (q)) .
m m
This shows that a subsampled Gaussian circulant matrix in general does not induce a binary embedding with high probability for arbitrary p, q ∈ Sn−1 . However,
if p, q are m-sparse and one subsamples dyadically, then Var dH (fA (p), fA (q))
decays optimally in terms of the number of measurements m.
Proof of Proposition 2.7. First, let us consider case (1). As before, we let ai be the
i-th row of A and use the notation
Xi = 1sgn(hai ,pi)6=sgn(hai ,qi) .
For any i, j ∈ I
Cov(Xi , Xj ) = P sgn(hT n−i g, pi) 6= sgn(hT n−i g, qi),
sgn(hT n−j g, pi) 6= sgn(hT n−j g, qi) − dSn−1 (p, q)2
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
13
k
k
X
X
= P sgn
g2k+2s−i−1 6= sgn
g2k+2s−i ,
s=1
sgn
s=1
k
X
s=1
= P sgn
k
X
s=1
g2k+2s−j−1 6= sgn
g2k+2s−i−1 6= sgn
= dSn−1 (p, q) − dSn−1 (p, q)2 .
k
X
g2k+2s−j
s=1
k
X
g2k+2s−i
s=1
− dSn−1 (p, q)2
− dSn−1 (p, q)2
Here we used that for any pair i, j ∈ [n]
n
sgn
k
X
s=1
=
n
k
X
o
6 sgn
g2k+2s−i−1 =
g2k+2s−i
sgn
s=1
k
X
s=1
g2k+2s−j−1 6= sgn
Since hp, qi = 0, we conclude
k
X
g2k+2s−j
s=1
o
.
1 X
1 X
Var dH (fA (p), fA (q)) = Var
Xi = 2
Cov(Xi , Xj )
m
m
i∈I
i,j∈I
1
1 1
− = .
2 4
4
By the Paley-Zygmund inequality, this implies for any δ ≤ 1/4
= dSn−1 (p, q) − dSn−1 (p, q)2 =
P(|dH (fA (p), fA (q)) − dSn−1 (p, q)| ≥ δ)
≥
(Var(dH (fA (p), fA (q))) − δ 2 )2
1
≥
.
4
E(dH (fA (p), fA (q)) − dSn−1 (p, q))
36
i−1
Let us consider case (2). Here the i-th row of A takes the form ai = T n−2
g and
Xi = 1sgn(hai ,pi)6=sgn(hai ,qi) = 1sgn(hT n−2i−1 g,pi)6=sgn(hT n−2i−1 g,qi) .
Moreover, since the standard Gaussian distribution is invariant under permutation
of coordinates
Cov(Xi , Xj ) = Cov(1sgn(hg,pi)6=sgn(hg,qi) , 1sgn(hg,T 2j−1 −2i−1 pi)6=sgn(hg,T 2j−1 −2i−1 qi) )
= Cov(1Z(p)6=Z(q) , 1Z(T 2j−1 −2i−1 p)6=Z(T 2j−1 −2i−1 q) ).
As a consequence, Theorem 2.1 implies
j−1
| Cov(Xi , Xj )| . |hp, T 2
−2i−1
+ |hq, T
2j−1 −2i−1
Observe that
X
X
j−1
i−1
|hp, T 2 −2 qi| ≤
|pℓ |
1≤i<j≤m
ℓ
j−1
pi| + |hp, T 2
X
−2i−1
pi| + |hq, T
1≤i<j≤m
qi|
2j−1 −2i−1
|qℓ+2j−1 −2i−1 | ≤
qi|.
X
ℓ
√
|pℓ | s ≤ s,
where in the last two inequalities we used Cauchy-Schwarz, kpk2 = kqk2 = 1, the
sparsity of p, q and that {2j−1 − 2i−1 : 1 ≤ i < j ≤ m} is injectively contained in
[n]. Putting our estimates together we find
m
X
1 X
Var(Xi ) + 2
Var dH (fA (p), fA (q)) ≤ 2
| Cov(Xi , Xj )|
m i=1
1≤i<j≤m
14
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
.
1
s
+ 2.
m m
Next, we consider a subsampled Gaussian circulant matrix with randomized
column signs A = RI Cg Dε . In this case,
Xi = 1sgn(hai ,pi)6=sgn(hai ,qi) = 1sgn(h(T n−i g)⊙ε,pi)6=sgn(h(T n−i g)⊙ε,qi) ,
where ⊙ denotes pointwise multiplication of vectors.
Lemma 2.8. Let p, q ∈ Sn−1 . For any i 6= j, |j − i| 6=
| Cov(Xi , Xj )| ≤ 8
p ⊙ T j−i p
2
+ p ⊙ T j−i q
2
n
2
+ q ⊙ T j−i p
2
+ q ⊙ T j−i q
2
.
Proof. We may assume i < j. Using the invariance of the standard Gaussian
distribution under coordinate permutations
Cov(Xi , Xj )
= Cov(1sgn(hT n−i g,ε⊙pi)6=sgn(hT n−i g,ε⊙qi) , 1sgn(hT n−j g,ε⊙pi)6=sgn(hT n−j g,ε⊙qi) )
= Cov(1Z(ε⊙p)6=Z(ε⊙q) , 1Z(T j−i (ε⊙p))6=Z(T j−i (ε⊙q)) ).
Since g and ε are independent
| Cov(Xi , Xj )| = |Eε Cov(1Z(ε⊙p)6=Z(ε⊙q) , 1Z(T j−i (ε⊙p))6=Z(T j−i (ε⊙q)) )|
≤ Eε | Cov(1Z(ε⊙p)6=Z(ε⊙q) , 1Z(T j−i (ε⊙p))6=Z(T j−i (ε⊙q)) )|.
Applying Theorem 2.1 and Jensen’s inequality we find
| Cov(Xi , Xj )| ≤ 8 Eε |hε ⊙ p, T j−i (ε ⊙ p)i| + |hε ⊙ p, T j−i (ε ⊙ q)i|
+ |hε ⊙ q, T j−i (ε ⊙ p)i| + |hε ⊙ q, T j−i (ε ⊙ q)i|
q
q
≤8
E |hε ⊙ p, T j−i (ε ⊙ p)i|2 + E |hε ⊙ p, T j−i (ε ⊙ q)i|2
q
q
+ E |hε ⊙ q, T j−i (ε ⊙ p)i|2 + E |hε ⊙ q, T j−i (ε ⊙ q)i|2 .
For s, t ∈ [n], s 6= t and k ∈ [n − 1]
(
1,
E(εs εs+k εt εt+k ) =
0,
if s = t or s = t + k, t = s + k
else.
Observe that s = t + k, t = s + k implies k = n2 . Set k = j − i ∈ [n − 1], then k 6=
and therefore
n
X
E|hε ⊙ p, T k (ε ⊙ q)i|2 =
ps qs+k pt qt+k E(εs εs+k εt εt+k )
=
s,t=1
n
X
s=1
2
p2s qs+k
= p ⊙ T kq
2
2
n
2
.
Theorem 2.9. Let g be an n-dimensional standard Gaussian vector and let ε be
an independent vector of independent random signs. Let A = RI Cg Dε .
(1) If I = [m], then for any p, q ∈ Sn−1
(18)
1
Var dH (fA (p), fA (q)) . √ .
m
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
15
(2) If I ⊂ [n] is chosen uniformly at random from all subsets of size m, then
for any p, q ∈ Sn−1
1
1
(19)
Var dH (fA (p), fA (q)) .
+√ .
m
n
In [15, Theorem 3] it was shown that if I = [m], then
1
+ρ
Var dH (fA (p), fA (q)) .
m
where ρ = max{kpk∞ , kqk∞ }. This bound is non-trivial if both p and q are wellspread. Note that √1n ≤ ρ, and equality is achieved if and only if p and q are
perfectly spread, i.e. pi = qi = ± √1n for all i ∈ [n]. Our variance bound in (2)
is always better and shows that a well-spreadness assumption is not necessary if
one subsamples uniformly at random. As was
√ discussed at the beginning of this
section the estimate
(19)
is
optimal
for
m
≤
n. We conjecture that it is possible
√
to remove the 1/ n factor altogether.
Proof. We start by proving (1). Since EXi = dSn−1 (p, q), it follows that Var Xi =
dSn−1 (p, q) − dSn−1 (p, q)2 and therefore (see (3))
X
d n−1 (p, q) − dSn−1 (p, q)2
2
+ 2
Cov(Xi , Xj ).
Var dH (fA (p), fA (q)) = S
m
m
1≤i<j≤m
By Lemma 2.8 for i < j with j − i 6=
| Cov(Xi , Xj )| . p ⊙ T j−i p
If j − i =
ities with
n
2
+ p ⊙ T j−i q
2
+ q ⊙ T j−i p
2
+ q ⊙ T j−i q
.
|{1 ≤ i < j ≤ m : j − i = k}| = m − k,
X
1≤i<j≤m
=
| Cov(Xi , Xj )|
m−1
X
X
k=1 {i<j : j−i=k}
.
m−1
X
k=1
(m − k)
| Cov(Xi , Xj )|
p ⊙ T kp
2
+ p ⊙ T kq
n
1{m−1≥ n2 }
+ m−
2
m
X
≤m
p ⊙ T kp 2 + p ⊙ T kq
.m
k=1
3/2
2
2
+ q ⊙ T kp
+ q ⊙ T kp
.
2
2
+ q ⊙ T kq
+ q ⊙ T kq
2
2
k=1 i=1
i=1
+m
For the last inequality we have used Cauchy-Schwarz and
n
n
n X
n
n
X
X
X
X
2
2
2
p2i
qi+k
= 1 for all p, q ∈ Sn−1 .
p2i qi+k
=
p ⊙ T kq 2 =
k=1
2
we use the trivial bound | Cov(Xi , Xj )| ≤ 1. Combining these inequal-
we find
(20)
2
n
2
k=1
We now prove (2). Let I be chosen uniformly at random and let θi ∈ {0, 1} be the
induced selector variables, i.e., θi = 1 if and only if i ∈ I. Note that
1 X
1sgn(hai ,pi)6=sgn(hai ,qi)
Var dH (fA (p), fA (q)) = Var
m
i∈I
16
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
=
Clearly, Var(θi Xi ) =
n
1 X
2
Var(θi Xi ) + 2
2
m i=1
m
m
n dSn−1 (p, q)
−
m2
2
n2 dSn−1 (p, q)
2
X
Cov(θi Xi , θj Xj ).
1≤i<j≤n
and for i 6= j,
m
EXi EXj
n2
m2
m2
m2
≤ 2 E(Xi Xj ) − 2 EXi EXj = 2 Cov(Xi , Xj ),
n
n
n
as θi and θj are negatively correlated. Combining these estimates, we find
X
d n−1 (p, q) dSn−1 (p, q)2
2
Var dH (fA (p), fA (q)) ≤ S
−
+ 2
Cov(Xi , Xj ).
m
n
n
Cov(θi Xi , θj Xj ) = E(θi θj )E(Xi Xj ) −
1≤i<j≤n
Since (20) holds for any m ≤ n, we obtain
X
| Cov(Xi , Xj )| . n3/2 .
1≤i<j≤n
3. Fast binary embeddings
In the following, we are interested to construct a δ-binary embedding for an
arbitrary finite dataset D ⊂ Rn , which achieves both optimal bit complexity
δ −2 log(|D|) and runs in almost linear time n log(n). We consider modifications
of the two binary embeddings from [14], which were discussed in the introduction.
A common step in all the binary embeddings we consider is to first reduce the dimensionality of the data set, while approximately preserving the geodesic distances
between the points. The following observation, from the proof of [14, Lemma 3.6],
says that this can be achieved using a map that preserves the norms of and Euclidean distances between the data points up to a multiplicative error. Let us say
′
that a matrix A ∈ Rn ×n is a δ-isometry on a set P ⊂ Rn if
(21)
(1 − δ)kzk2 ≤ kAzk2 ≤ (1 + δ)kzk2
for all z ∈ P,
that is, A preserves norms of vectors up to a multiplicative error δ.
Lemma 3.1. [14] Let D ⊂ Sn−1 be symmetric and suppose that A is a δ-isometry
on both D and D − D. Then,
|dSn′ −1 (Ax, Ay) − dSn−1 (x, y)| ≤ δ
for all x, y ∈ D.
A substantial amount of research has been devoted to the construction of random
matrices that satisfy (21) with high probability. We will consider two families of
constructions that allow for fast matrix-vector multiplication. The family of fast
Johnson-Lindenstrauss transforms [2, 1, 10, 5] rely on the fast Fourier transform
(FFT) for fast multiplication. One particular construction from this family is the
n′ × n random matrix
r
n
RI HDε ,
ΦFJL =
n′
where I is a subset of n′ indices selected uniformly at random from [n], ε is a
Rademacher vector independent of I and H is the Hadamard transform. Using the
FFT, ΦFJL x can be computed in time O(n log n). By combining the results of [10]
and [5] it follows that ΦFJL satisfies the conditions of Lemma 3.1 on a set D of N
points in Sn−1 with probability at least 1 − η if
n′ & δ −2 log(N/η)(log3 (log(N/η)) log(n) + log(1/η)).
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
17
A different family of ‘fast’ constructions can be obtained by sparsifying a random sign matrix. To be more precise, let σij , i ∈ [n′ ], j ∈ [n] be independent
Rademacher random variables. We consider {0, 1}-valued random variables δij ,
which are independent of the σij , with the following properties:
• For a fixed column j the δij are negatively correlated, i.e.
k
k
Y
Y
s k
∀1 ≤ i1 < i2 < . . . < ik ≤ n′ , E
Eδit ,j =
δit ,j ≤
;
n′
t=1
t=1
Pn′
• For any fixed column j there are exactly s nonzero δij , i.e., i=1 δij = s;
′
• The vectors (δij )ni=1 are independent across different columns 1 ≤ j ≤ n.
The n′ × n sparse Johnson-Lindenstrauss transform ΦSJL with column sparsity s
[6, 3, 9] is defined by
1
(ΦSJL )ij = √ σij δij .
s
One possible concrete implementation [9] is to take the columns independent, and
in each column we choose exactly s locations uniformly at random, without replacement, to specify the δij . For any x ∈ Rn with kxk0 non-zero entries, ΦSJL x can be
computed in time O(skxk0 ). It follows from [9] that ΦSJL satisfies the conditions
of Lemma 3.1 on a set D of N points in Sn−1 with probability at least 1 − η if
n′ & δ −2 log(N/η),
s & δ −1 log(N/η).
The following result under condition (i) was already obtained in [14, Algorithm 3].
Note that both embeddings in Proposition 3.2 achieve the optimal bit complexity.
Proposition 3.2 (Accelerated Gaussian binary embeddings). Let D = {x1 , ..., xN } ⊂
′
Sn−1 . Let G ∈ Rm×n be a standard Gaussian matrix, i.e., its entries are independent standard Gaussians. Set
m & δ −2 log(N/η).
Suppose that one of the two conditions hold:
(i) Φ = ΦFJL is an n′ × n FJLT with
n′ & δ −2 log(N/η)(log3 (log(N/η)) log(n) + log(1/η)).
(ii) Φ = ΦSJL is an n′ × n SJLT with
n′ & δ −2 log(N/η),
s & δ −1 log(N/η).
Set A = GΦ. Then, with probability at least 1 − η, fA is a δ-binary embedding of
D into ({−1, 1}m, dH ), i.e.,
sup |dH (fA (xi ), fA (xj )) − dSn−1 (xi , xj )| ≤ δ.
i,j∈[N ]
′
Proof. For i ∈ [N ] we define yi = Φxi ∈ Rn . As has been discussed before, under
both (i) and (ii) we have with probability 1 − η2
(22)
sup |dSn′ −1 (yi , yj ) − dSn−1 (xi , xj )| ≤ δ/2.
i,j∈[N ]
It is well-known (see e.g. [13] or [14][Proposition 2.2]) that fG is with probability
1 − η2 a δ/2-binary embedding on {y1 , . . . , yN }, i.e.,
sup |dH (fG (xi ), fG (xj )) − dSn−1 (xi , xj )| ≤ δ/2.
i,j∈[N ]
Combining these observations yields the result.
18
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
As was already noted in [14], for any x ∈ Sn−1 one can compute fA (x) in time
O(n log(n)) under condition (i) if
√
log(N/η) . δ 2 n.
(23)
Under condition (ii) one can compute fA (x) in time
O(δ −4 log2 (N/η) + δ −1 log(N/η)kxk0 ).
√
In particular, under (23) the embedding fA runs in linear time on n-sparse vectors.
The running time can even improve further if one is embedding a small set of very
sparse vectors, say.
We next consider two binary embeddings, for which one δ-factor in (23) can
′
be removed, provided that n is large enough. Let g (1) , ..., g (B) ∈ Rn be indepen′
dent standard Gaussian random vectors and ε(1) , ..., ε(B) ∈ {−1, 1}n independent
Rademacher vectors. Let I (1) , ..., I (B) ⊂ [n′ ] be independent, uniformly random
subsets of size m′ = m
B . For s ∈ [B] set
′
′
Ψ(s) = RI (s) Cg(s) Dε(s) ∈ Rm ×n .
We now stack these matrices to obtain the m × n′ matrix
(1)
Ψ
..
Ψ = . .
Ψ(B)
Theorem 3.3 (Median fast binary embeddings). Let D = {x1 , ..., xN } ⊂ Sn−1 .
Suppose that one of the following two conditions hold:
(i) Φ = ΦFJL is an n′ × n FJLT with
n′ & δ −2 log(N/η)(log3 (log(N/η)) log(n) + log(1/η)).
(ii) Φ = ΦSJL is an n′ × n SJLT with
n′ & δ −2 log(N/η),
s & δ −1 log(N/η).
Suppose, moreover, that
m
& δ −2 ,
n′ & δ −4 .
B
Set A = ΨΦ. Then with probability at least 1 − η, fA is a δ-binary embedding of D
into ({−1, 1}m, dmed,B ), i.e.,
B & log(N/η),
n′ ≥
sup |dmed,B (fA (xi ), fA (xj )) − dSn−1 (xi , xj )| ≤ δ.
i,j∈[N ]
Theorem 3.3 under condition (i) is essentially the result claimed in [14, Theorem
3.8]. The proof in [14], however, contains a gap (see Remark 3.4 below). Let us note
that our construction of the Ψ(s) is slightly different from the one in [14]. Instead of a
Gaussian Toeplitz matrices we use Gaussian circulant matrices (although our proof
works for Toeplitz matrices as well) and, more importantly, we use uniform random
subsampling instead of deterministic subsampling, in order to invoke Theorem 2.9.
′
Proof. For i ∈ [N ] we define yi = Φxi ∈ Rn . By the discussion prior to Proposition 3.2, under both (i) and (ii) we have with probability 1 − η2
(24)
sup |dSn−1 (xi , xj ) − dSn′ −1 (yi , yj )| ≤ δ.
i,j∈[N ]
Fix i, j ∈ [N ]. By subsequently applying (2), Markov’s inequality and (19) in
Theorem 2.9, we obtain
P(|dH (sgn(Ψ(s) yi ), sgn(Ψ(s) yj )) − dSn′ −1 (yi , yj )| ≥ δ)
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
19
= P(|dH (sgn(Ψ(s) yi ), sgn(Ψ(s) yj )) − EdH (sgn(Ψ(s) yi ), sgn(Ψ(s) yj ))| ≥ δ)
≤ δ −2 Var dH (sgn(Ψ(s) yi ), sgn(Ψ(s) yj )
1
1 1
√
≤ ,
+
. δ −2
m′
4
n′
where in the last step we use m′ & δ −2 and n′ & δ −4 . Defining
Es = 1{|dH (sgn(Ψ(s) yi ),sgn(Ψ(s) yj ))−d n′ −1 (yi ,yj )|≥δ} ,
S
this translates to EEs ≤
B
nX
Es <
s=1
1
4.
Observe
o
Bo n
⊂ dmed,B (sgn(Ψyi ), sgn(Ψyj )) − dSn′ −1 (yi , yj ) < δ ,
2
which implies using −EEs ≥ − 41
P( dmed,B (sgn(Ψyi ), sgn(Ψyj )) − dSn′ −1 (yi , yj ) ≥ δ)
≤P
≤P
B
X
s=1
Es ≥
B
1 X
B
s=1
B
1 X
B
1
=P
Es ≥
2
B s=1
2
(Es − EEs ) ≥
1
.
4
Since {Es }s∈[B] are independent, Hoeffding’s inequality yields
B
P( dmed,B (sgn(Ψyi ), sgn(Ψyj )) − dSn′ −1 (yi , yj ) ≥ δ) ≤ e− 32 .
Since this holds for any i, j ∈ [N ], a union bound now implies
B
η
(25) P sup dmed,B (sgn(Ψyi ), sgn(Ψyj )) − dSn′ −1 (yi , yj ) ≥ δ ≤ N 2 e− 32 ≤ ,
2
i,j∈[N ]
where in the last step we use B & log(N/η). The triangle inequality using (24) and
(25) yields
sup |dmed,B (fA (xi ), fA (xj )) − dSn−1 (xi , xj )| ≤ 2δ,
i,j∈[N ]
with probability at least 1 − η. A rescaling in δ yields the result.
Remark 3.4. Let us now briefly discuss the subtle proof gap occurring in [14]. As
was noted before, they considered mappings Ψ(s) which used deterministic subsampling (instead of uniform random subsampling) and Gaussian Toeplitz matrices
(instead of Gaussian circulant matrices). In their proof they claimed that
1
Var dH sgn(Ψ(s) yi ), sgn(Ψ(s) yj ) . ′
m
by reasoning as follows. Let ak be the k-th row of Ψ(s) . They first showed (correctly)
′
that sgn(hak , yi i) and sgn(haℓ , yj i) are pairwise independent for any yi , yj ∈ Rn and
k 6= ℓ [14, Lemma 3.7]. They then wrote
′
Var dH sgn(Ψ
(s)
yi ), sgn(Ψ
(s)
m
1 X
1
yj ) = Var
sgn(ha
,y
i)6
=
sgn(ha
,y
i)
i
j
k
k
m′
k=1
=
1
(m′ )2
′
m
X
k=1
Var(1sgn(hak ,yi i)6=sgn(hak ,yj i) ) ≤
1
.
m′
Unfortunately, even though sgn(hak , yi i) and sgn(haℓ , yj i) are pairwise independent,
it is not true that
1sgn(hak ,yi i)6=sgn(hak ,yj i)
and
1sgn(haℓ ,yi i)6=sgn(haℓ ,yj i)
20
SJOERD DIRKSEN AND ALEXANDER STOLLENWERK
are pairwise independent for any yi , yj and k 6= ℓ.
Remark 3.5. Let us compare the running times of the four different binary embeddings for η being a constant. Note first that if
r
n r
o
n
n
3
(26)
log(N ) . δ
min
δ
log(n),
1
,
log(δ −1 )
log(δ −1 )
then the median fast binary embedding with FJLT can be computed in Õ(n log(n)),
where Õ hides log log-factors. Indeed, computation time of the FJLT is O(n log(n))
and matrix-vector multiplication for each of the B blocks can be computed in
O(n′ log(n′ )) = Õ δ −2 log(δ −1 ) max{δ −2 , log(N ) log(n)} .
Hence, total computation time is
O(Bn′ log(n′ ) + n log(n))
= Õ δ −2 log(δ −1 ) log(N ) max{δ −2 , log(N ) log(n)} + n log(n) = Õ(n log(n)),
√ p
if (26) is satisfied. In particular this holds if n & δ −6 and log(N ) . δ n/ log(1/δ).
In comparison, the accelerated Gaussian√ binary embedding with FJLT achieves
running time O(n log(n)), if log(N ) . δ 2 n.
Let us now consider the median fast binary embedding with the SJLT. The
running time of this embedding is
O(Bn′ log(n′ ) + δ −1 log(N )kxk0 )
= Õ(log(δ −1 )(δ −2 log2 (N ) + δ −4 log(N )) + δ −1 log(N )kxk0 ).
Thus, this embedding can achieve a (near-)linear embedding time in a larger range
of N compared
Gaussian binary embedding with√SJLT. Indeed,
√ to the accelerated
δ −6 , then the running time is Õ(n log n + nkxk0 ) which
if log N ≤ δ n and n & √
for the accelerated Gaussian
is near-linear if kxk0 ≤ n. In comparison,
√
√ binary
embedding we required log N ≤ δ 2 n to obtain linear running time on n-sparse
vectors.
In contrast to the running times for the embeddings involving the FJLT, the
running times for the SJLT-based embeddings can be even faster than O(n log n),
for instance if the number of vectors N is small and the vectors are sparse.
Let us finally note that the median fast binary embeddings with FJLT and
−4
−6
SJLT can both be computed
√ in time Õ(n log(n)) if n & δ (instead of n & δ ),
2
if additionally log N ≤ δ n (the condition for the accelerated Gaussian binary
embeddings) holds.
Remark 3.6. In the proof of Theorem 3.3, the optimal 1/m scaling in (19) is essential. In particular, it is not possible to
√ instead use the variance bound in (18).
It would be interesting to remove the 1/ n factor in (19). This would remove the
condition n & δ −6 from the discussion in Remark 3.5.
References
1. N. Ailon and E. Liberty, An almost optimal unrestricted fast Johnson-Lindenstrauss transform, ACM Trans. Algorithms 9 (2013), no. 3, Art. 21, 12. MR 3073515
2. Nir Ailon and Bernard Chazelle, The Fast Johnson–Lindenstrauss Transform and approximate nearest neighbors, SIAM J. Comput. 39 (2009), no. 1, 302–322.
3. Vladimir Braverman, Rafail Ostrovsky, and Yuval Rabani, Rademacher chaos, random Eulerian graphs and the sparse Johnson-Lindenstrauss transform, ArXiv:1011.2590 (2010).
4. Yu Cheng, Felix X. Yu, Rogério Schmidt Feris, Sanjiv Kumar, Alok N. Choudhary, and ShihFu Chang, Fast neural networks with circulant projections, ArXiv:1502.03436 (2015).
5. Mahdi Cheraghchi, Venkatesan Guruswami, and Ameya Velingker, Restricted isometry of
Fourier matrices and list decodability of random linear codes, SIAM J. Comput. 42 (2013),
no. 5, 1888–1914.
FAST BINARY EMBEDDINGS WITH GAUSSIAN CIRCULANT MATRICES
21
6. Anirban Dasgupta, Ravi Kumar, and Tamás Sarlós, A sparse Johnson-Lindenstrauss transform, Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC), 2010,
pp. 341–350.
7. Michel X. Goemans and David P. Williamson, Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming, J. Assoc. Comput. Mach.
42 (1995), no. 6, 1115–1145. MR 1412228
8. Laurent Jacques, Jason N. Laska, Petros T. Boufounos, and Richard G. Baraniuk, Robust 1bit compressive sensing via binary stable embeddings of sparse vectors, IEEE Trans. Inform.
Theory 59 (2013), no. 4, 2082–2102. MR 3043783
9. Daniel M. Kane and Jelani Nelson, Sparser Johnson-Lindenstrauss transforms, Journal of the
ACM 61 (2014), no. 1, 4.
10. F. Krahmer and R. Ward, New and improved Johnson-Lindenstrauss embeddings via the
restricted isometry property, SIAM J. Math. Anal. 43 (2011), no. 3, 1269–1281. MR 2821584
(2012g:15052)
11. Samet Oymak, Near-optimal sample complexity bounds for circulant binary embedding,
ArXiv:1603.03178 (2016).
12. Yaniv Plan and Roman Vershynin, Robust 1-bit compressed sensing and sparse logistic regression: a convex programming approach, IEEE Trans. Inform. Theory 59 (2013), no. 1,
482–494. MR 3008160
13.
, Dimension reduction by random hyperplane tessellations, Discrete Comput. Geom.
51 (2014), no. 2, 438–461. MR 3164174
14. Xinyang Yi, Constantine Caramanis, and Eric Price, Binary embedding: Fundamental limits
and fast algorithm, Proceedings of the 32nd International Conference on Machine Learning,
2015, pp. 2162–2170.
15. Felix X. Yu, Aditya Bhaskara, Sanjiv Kumar, Yunchao Gong, and Shih-Fu Chang, On binary
embedding using circulant matrices, ArXiv:1511.06480 (2015).
16. Felix X. Yu, Sanjiv Kumar, Yunchao Gong, and Shih-Fu Chang, Circulant binary embedding,
Proceedings of the 31st International Conference on Machine Learning, 2014, pp. 946–954.
RWTH Aachen University, Lehrstuhl C für Mathematik (Analysis), Pontdriesch 10,
52062 Aachen, Germany
E-mail address: [email protected]
RWTH Aachen University, Lehrstuhl C für Mathematik (Analysis), Pontdriesch 10,
52062 Aachen, Germany
E-mail address: [email protected]
| 7cs.IT
|
Mantis: Predicting System Performance through Program Analysis and
Modeling
Byung-Gon Chun† , Ling Huang† , Sangmin Lee⋆ , Petros Maniatis† , Mayur Naik†
†
Intel Labs Berkeley, ⋆ University of Texas at Austin
arXiv:1010.0019v1 [cs.PF] 30 Sep 2010
Abstract
diction can answer what if questions — how system behavior changes when input workload changes or system
configuration changes [14, 25, 33].
Despite all these opportunities and demands, prediction
has not been in the mainstream. This is because it is very
difficult to predict metrics with high accuracy for current
practices — analytically modeling the system or treating
the system as a black box and generating a transfer function between input workload and output response. System
execution inherently depends on program semantics (i.e.,
internals of how the program works), thus prediction depends on program semantics. For example, certain metadata of programs (e.g., image resolution and depth) is a
cache of program semantics. One way to obtain program
semantics is to ask its details to its developers. In reality, however, this is not feasible due to the abundance and
complexity of programs. In this work, we aim to automatically extract program semantics without developers of the
program and use them to create better prediction models
for system performance (execution time). In particular, we
focus on predicting with different input workload in the
same environment (i.e., machine).
Mantis is a system that achieves this goal by combining
programming language and machine learning techniques
in a novel way (Section 2). Mantis consists of three key
components: feature instrumentation, model generation,
and code snippets generation for computing feature values when predicting. To capture program semantics without programmer assistance, we begin by extracting a potentially large number of program features that capture the
characteristics of program execution by running programs
instrumented with code analysis (Section 3). Next, we
use machine learning techniques to select important, relevant features to create the prediction models (Section 4).
Finally, program slicing computes small code snippets
that compute features needed by the model for prediction
(Section 5). This component also guides model generation
to choose features that can be computed cheaply.
We evaluate our system by applying the framework to
two applications, Lucene search engine and ImageJ, an
image processing applications (Section 6). We show that
Mantis can achieve more than 93% accuracy with less
than 10% training data set. We compare the model generated by Mantis with blackbox approaches that rely on
workload size and input configurations (e.g., commandline arguments) and show that Mantis can significantly
We present Mantis, a new framework that automatically
predicts program performance with high accuracy. Mantis integrates techniques from programming language and
machine learning for performance modeling, and is a radical departure from traditional approaches. Mantis extracts
program features, which are information about program
execution runs, through program instrumentation. It uses
machine learning techniques to select features relevant to
performance and creates prediction models as a function
of the selected features. Through program analysis, it then
generates compact code slices that compute these feature
values for prediction. Our evaluation shows that Mantis
can achieve more than 93% accuracy with less than 10%
training data set, which is a significant improvement over
models that are oblivious to program features. The system
generates code slices that are cheap to compute feature
values.
1 Introduction
Today’s programs are numerous and become more and
more complex. For example, services running in data centers are often large scale, and perform complicated operations depending on input workload. Predicting how applications will behave for given input workload is key to
helping users and operators better manage those applications.
Predicting metrics (e.g., performance, resource consumption) has great applications in many usage scenarios. First, prediction of execution time of a service request can be used for better workload management [18].
If the request is likely to violate service level agreements, the system can drop the request and allocate resources to other requests. Second, in scheduling applications such as MapReduce [15, 23], if we can predict execution time of tasks, we can then schedule jobs more optimally by considering where to map individual tasks to
candidate resources and perform speculative execution in
a timely fashion without spawning unnecessary processes.
Third, prediction can help with better resource provisioning [11, 12, 35] (e.g., how many servers should I use to
run this job? Should I add more servers?). Fourth, with
prediction, we can detect performance anomaly. If an operation takes much longer than a predicted time, we label
it an anomaly for troubleshooting purposes. Finally, pre1
Figure 1: Mantis architecture.
outperform these models. We explain how slicing can benefit model generation and the overhead of computing selected features. Finally, in Section 7 we discuss related
work, and conclude with future research directions in Section 8.
performance metrics? How do we model performance with relevant features?
3. How do we automatically generate code to compute
feature values for prediction?
We present Mantis, a new prediction architecture that
addresses the three questions above. There are three main
components, each of which addresses a key question.
2 Mantis Overview
2.1 Approach
2.2 Architecture
We address the problem of predicting performance metrics quickly without actually running the entire program.
Traditionally, researchers have taken a stance in two
camps for prediction — modeling systems analytically
(e.g., queuing theory), or treating the system as a black
box and creating a model between input (workload) and
output (performance). However, these approaches do not
work well due to their inherent limitations, i.e., the lack
of knowledge about the program. We take a new whitebox approach to generating prediction models. Unlike traditional approaches, simply put, we extract information
from execution of the program that contains a plethora of
information. In particular, we extract as many features as
possible from programs for given input data if extracting
features incurs little overhead, and rely on machine learning techniques to process the large amount of information dumped out. Machine learning techniques can infer
key features from voluminous information and construct
a robust model that predicts performance based on new
program features. In summary, our approach solves the
prediction system problems by combining programming
language and machine learning techniques in a novel way.
To achieve our goal, we need to address three key questions:
Figure 1 shows the Mantis architecture, a novel prediction
framework that combines programming language techniques with machine learning techniques. This architecture shows the offline part for generating prediction models.
Mantis consists of three major components: feature instrumentation and profiling, prediction model generation,
and feature evaluator generation. The feature instrumentor
analyzes the code of the program and automatically adds
instrumentation code that extracts program features. Then
the profiler runs this instrumented program with sample
input data to collect performance metrics and feature values. This profiling can generate a large number of features
within the budget of instrumentation overhead. Then, the
model generator runs machine learning algorithms to generate a prediction model, i.e., select a subset of key features that are relevant to the performance metrics and create a function of the selected features to predict the performance metrics with high accuracy. To use the model, we
need a way to compute feature values. The feature evaluator generator uses program slicing to automatically extract
small code snippets (which we call feature evaluators) that
compute feature values from the instrumented program.
1. What are good program features? How do we extract Ideally, for a feature evaluator, the technique includes only
program statements that affect the feature value of the
these feature values?
evaluator. Finally, there is a feedback loop from the slicer
2. Among many features, which ones are relevant to to the model generator. We may not be able to use some of
2
rationales of choosing these features below.
Loops When a program repeats computation, the execution time depends on how many times the program repeats. We introduce loop counts to capture this behavior. We instrument all loop constructs (e.g., while and
for) in the program. If there are nested loops, we add a
loop count for each loop. The following example shows a
nested loop. The outer loop performs reading a line from
a file, and the inner loop performs a search operation n
times.
Figure 2: Online predictor.
the features selected by the model generator. If a selected
feature is expensive to compute (e.g., we have to run the
entire program to compute the feature value), we reject
the feature by notifying the cost of computing the feature
value to the model generator. The prediction model generator creates a new model after excluding the rejected feature(s). This loop may run multiple times depending on
scenarios. When the program slicer can generate all the
feature evaluators of the selected features (cheaply), the
entire process ends, and the tool produces final features,
prediction model, and feature evaluators.
Once a prediction model is generated, it is used to forecast a performance metric of interest for a new input as
shown in Figure 2. The example has k feature evaluators.
The new input is sent to each feature evaluator to compute its feature value, and the prediction model computes
an estimate using all the feature values.
In the following, we explain these components in detail
and evaluate the system.
// original code
while(line=readLine()) {
for (int i=0; i<n; ++i)
search(line, i);
}
// instrumented code
while(line=readLine()) {
++mantis_loop_cnt1;
for (int i=0; i<n; ++i) {
++mantis_loop_cnt2;
search(line, i);
}
}
Method invocation Another way to repeat computation
is to use a recursive procedure. The execution time depends on how many times the program invokes recursive
methods. To capture this behavior, we introduce method
invocation counts, each of which is incremented when a
method is invoked. The following example shows an example program that traverses a tree structure and computes an aggregated metric.
3 Feature Instrumentation
We extract program features relevant to performance (e.g.,
execution time). We choose features with the following
goals in mind. First, the features should capture the behavior of program performance. Second, the features should
be accurate and easy to compute. For example, we avoid
relying on inaccurate timer resolution. Third, the features
should be collected with low overhead. We aim to run our
instrumented program to collect feature values and performance metrics at the same time instead of running the
original program to get performance metrics, running the
instrumented program to get feature values, and joining
the data. The latter is not accurate when the program has
non-determinism.
In the following, we first describe what program features we instrument and then present how to create instrumented programs.We use Java programs as examples, but
our techniques are generally applicable to other programming languages.
// original code
process(node n) {
if (cond) return;
process(n.l);
process(n.r);
compute(n);
}
// instrumented code
process(node n) {
++mantis_methodinv_cnt;
if (cond) return;
process(n.l);
process(n.r);
compute(n);
}
Branches Often the execution time changes depending
on which control flow path the program takes. This can
be captured by adding branch information. The follow3.1 Features
ing example shows that depending on the conditional, the
The features we choose are loop counts, branch counts, program takes two different paths with very different exeand variable values in different versions. We discuss the cution times.
3
// original code
if (flag) { lightweightCompute(); }
else { heavyCompute(); }
// instrumented code
if (flag) {
++mantis_branch_cnt1;
lightweightCompute();
} else {
++mantis_branch_cnt2;
heavyCompute();
}
// original code
try { compute(); }
catch (Exception e) { error(e); }
// instrumented code
try { compute(); }
catch (Exception e) {
++mantis_ex_cnt;
error(e);
}
path is not a common case the program takes, so the execution time of the program is likely to change significantly. We add an exception count for each exception handling part of the program to capture this behavior.
To collect these features in multi-threaded objectoriented programs, we need to summarize the features
across objects and across threads. We sum up loop count
and branch count across objects, and also keep a single
array of a variable for all objects created. To handle multiple threads we maintain a separate instrumentation object
that captures features per thread, and merge feature values at the end of program execution. For loop and branch
4 Prediction Modeling
counts, we sum up those counts across threads. For versions of variables, we compute the mean of each version
We add a branch counter for each branch in the pro- across threads.
gram. It counts how many times a particular branch is
taken. For example, if the program takes a particular 3.2 Instrumentor
branch once depending on a conditional, the counter value To instrument program to obtain program features, we
is either 1 or 0. If a branch is taken multiple times, its perform code analysis and transformation. In particular,
value reflects that.
we use source code analysis1 to construct abstract synVariable values We also instrument versions of variable tax trees (ASTs), and manipulate the constructed ASTs
values to characterize the program execution. We focus by adding new nodes representing loop counts, method
on primitive variables (short, int, long, float, double, char, invocation counts, branch counts, exception counts, and
and boolean variables) and collect the first k values when- variable versions to the trees.
We use the instrumented program to capture the exeever a variable is assigned to a value. Our intuition is that
cution
time of the original program as well as to capoften the variable values obtained from input parameters
ture
program
feature values. To achieve low overhead,
and configurations are changing infrequently, and these
we
employ
three
techniques. First, we perform selective
values tend to affect program execution by changing conprofiling
of
programs.
We focus on application programs
trol flow. We track both class field variables and local variand
do
not
instrument
system
libraries (e.g., toString() or
ables.
equals()).
Second,
we
use
a
procedure
that removes instruIn the following example, the execution time of the promentation
from
the
part
that
incurs
high
overhead until the
gram is dominated by the input argument n of compute(),
overall
instrumentation
overhead
is
below
our threshold
which comes from a preprocessed variable, which is done
(e.g.,
5%
of
the
original
program
execution
time). Third,
quickly. We collect the assigned value of n as one of our
to
avoid
synchronization
overhead
of
multiple
threads acprogram features.
cessing the instrumentation variables, we use a thread// original code
local data structure per thread, and merge data structures
n = preprocess();
of the threads at the end of the program execution.
compute(n);
After the instrumentation step, the profiler receives the
// instrumented code
instrumented program with test input data, runs the pron = preprocess();
gram with each input, and collects tuples, each of which is
mantis_n_data[cur_ptr++] = n;
program execution time and feature values for each input
compute(n);
data. The profiler then sends the tuples of (execution time,
Exception counts For certain inputs, the program may feature values) to the prediction model generator that pertake a control flow that throws and handles errors. This forms feature selection and model creation.
We instrument and profile programs to collect many features from program execution runs for modeling the performance metrics of the programs. However, we expect
that a small but relevant set of features may explain the execution time well, and hence seek a compact model, i.e.,
a function of this small set of features, that accurately estimates the execution time of the program. Among all the
1 We can also implement our instrumentation using bytecode analysis. With bytecode, we do not have local variable names we can refer to
unless source code is compiled with the Java compiler debug option.
4
because it tends to create models involving many feature
terms, if not all of them. This does not satisfy us since
we have a lot of features but desire only a small subset of
them to contribute to the model.
Regression with best subset selection finds for each
k ∈ {1, 2, . . . , m} the subset of size k that gives smallest residual sum of squares. However, it is a discrete optimization and is known to be NP-hard [21]. In recent
years a number of approaches based on model regularization have been proposed as efficient alternatives. Their
main idea is to add a regularization term to problem (1)
to control the complexity of the model, and make a tradeoff between the regression error and the number of features used in the model. Among them, a widely used one
is LASSO (Least Absolute Shrinkage
P and Selection Operator) [34], which uses quantity λ m
j=1 |βj | to penalize
problem (1). It effectively enforces many βj ’s to be 0, and
selects a small subset of features (indexed by non-zero
βj ’s) to build the model, which is usually compact and
has better prediction accuracy than models created by ordinary least square regression [21]. Parameter λ controls
the complexity of the model: as λ grows larger, fewer features are selected by the model.
Being a convex optimization problem is the greatest advantage of the LASSO method, and there exist fast algorithms to solve the problem efficiently even with largescale datasets [17, 24]. LASSO also has nice theoretical
and empirical properties, and under suitable assumptions,
4.1 Background
it can recover the true underlying model [16, 34]. In adLeast Square Regression Our feature instrumentation dition, LASSO can be easily extended to create nonlinear
procedure outputs n data samples as tuples of {yi , xi }ni=1 , models (e.g., using polynomial basis functions of the feawhere yi ∈ R denotes the ith observation of execution tures).
time, and xi denotes the ith observation of the vector
of m features. We use regression techniques to model 4.2 Our Procedure
the relationship between y and x, which assumes that We aim to use polynomial functions to model the execuyi ’s are generated from y = f (x, β) + ǫ, where β = tion time, so that we can clearly see what kinds of non[β0 , β1 , β2 , . . .] is a vector of weights to be determined linear terms on which features are important to the exefor the model, and ǫ is the white noise. Least square re- cution time. To capture nonlinear effects of and interacgression is a mathematical procedure for finding the best- tions between multiple features, we expand the features
fitting f (x, β) to a given set of responses yi by minimiz- x = [x1 x2 . . . xk ], k ≤ m to all the terms in the expansion of the degree-d polynomial (1 + x1 + . . . + xk )d , and
ing the sum of the squares of the residuals [21], i.e.,
use them to construct a multivariate polynomial function
n
X
f (x, β) for the regression. For example, using a degree-2
2
(yi − f (xi , β)) .
(1)
min
polynomial with feature vector x = [x1 x2 ], we expand
β
i=1
out (1 + x1 + x2 )2 to get terms 1, x1 , x2 , x21 , x1 x2 , x22 ,
If a linear function f (x, β) is used, we obtain linear least and use them as basis functions to construct the following
square regression, which can be easily extended to cre- function for regression:
ate nonlinear models by using nonlinear (e.g., polynomial,
f (x) = β0 + β1 x1 + β2 x2 + β3 x21 + β4 x1 x2 + β5 x22 .
spline, etc.) basis functions of features x.
information, not all of them are expected to be useful for
the model: Some of them may have no variability across
different inputs, some have very weak or even no correlation to the execution time, and others are redundant to
each other. However, we do not know which features are
useful, but would like to determine a small subset of features that is most relevant to predicting the execution time,
and are willing to sacrifice some of the small details in order to get the “big picture".
To make the problem tractable, we constrain our models to the multivariate polynomial family. We expect that a
good program should have polynomial execution time on
some (combination of) features, and a polynomial model
up to certain degree can approximate well any nonlinear
model (due to Taylor expansion). In addition, a compact
polynomial model that predicts execution time well can
provide an easy-to-understand explanation on what factors are important in determining the execution time of
the program, and then give program developers intuitive
feedback on the performance of the program.
In summary, what we need is an optimal strategy to produce a (nonlinear) model on a small set of features from
thousands of ones collected blindly. We rely on machine
learning techniques (specifically, sparse regression with
multivariate polynomial basis) to automatically infer this
small subset features and construct a compact model to
capture the dominant predictors of execution time.
Sparse Regression While widely used, least square regression has two major drawbacks: 1) When a large number of features exist, least squares tend to create complex
models and overfit the data, resulting in inferior prediction accuracy. 2) It is usually hard to interpret the results,
Because we neither know which features are needed nor
what kinds of nonlinear terms are necessary, an optimal
but naive approach is to expand the degree-d multivariate polynomial with all p features and use all the terms to
construct the regression function. However, this approach
5
// original code
int j;
while(line=readLine()) {
++mantis_loop_cnt1;
j = j + expensive_processing(line);
}
// sliced code on the variable
// mantis_loop_cnt1
while(line=readLine()) {
++mantis_loop_cnt1;
}
gives us m+d
terms, which is large when m is on the
d
order of thousands and even for small d, and will cause
heavy burden on the computing of the regression model.
Complete expansion on all features is not necessary, because many of them have little contribution to the execution time, and many of them are redundant to each other.
For efficient computation, we adopt a 3-step approach
for the feature selection and nonlinear model fitting:
Step 1: Use the linear LASSO algorithm to filter out
(many) features that hardly contribute to the execution
time. Although this step may be suboptimal (mainly due
to the non-linearity in the true underlying model), it is
cheap, fast and scalable, and is provably better than the
traditional feature selection methods that consider individual features one by one.
Step 2: Do degree-d multivariate polynomial expansion
on the features selected in step (1), and use all the terms
from the expansion as the basis functions for the nonlinear
model.
Step 3: Use the LASSO method on the expanded features
to pick out a subset of nonlinear terms to construct the
model.
With these three steps, we have developed an efficient
procedure to select a small set of nonlinear terms to construct a compact and intuitive model. Our experimental
results in Section 6 show our method can construct models to accurately predict execution time for a variety of
applications.
Figure 3: A slicing example.
different from most slicing research work motivated by
debugging (e.g., [32]) whose goal is to highlight as few
statements as possible that will aid the programmer debug
a particular problem. Thus, they elide the constraint in the
original slicing definition that the generated sub-program
be executable. To achieve executability, we need to solve
several engineering issues related to Java language features.
Our slicing algorithm operates on expressions e, which
may be of one of four kinds: a local variable v, a static
field (i.e., a global variable) g, an abstract instance field
hh, f i denoting instance field f of any object allocated at
site h, or an abstract array element h, denoting any element of any array object allocated at site h. Abstractions
of instance fields and array elements are required because
static analysis cannot refer to concrete object addresses.
Our slicing algorithm is not dependent upon the choice
of abstraction, however, can easily be modified to use abstractions besides object allocation sites.2
The slicer takes as input the given program and the slicing criterion c = he, pi, which is an expression e whose
value is desired at program point p, and produces as output
a corresponding slice. In our setting, e is always a static
field g instrumented by us (e.g., a loop counter), and p
is always the exit of a method of the program (e.g., the
program’s main method.)
Our slicing algorithm is based on two algorithms (one
from Horwitz, Reps, and Sagiv [22] and one from Reps,
Horwitz, Sagiv, and Rosay [28]). We summarize four
steps of the algorithm. First, for each method, we construct a Program Dependence Graph (PDG). Then, for the
entire program, we construct a System Dependence Graph
(SDG), which is a set of PDGs where additional edges
are created to capture interprocedural dependencies. We
augment the SDG with summary edges by running the
interprocedural data flow analysis algorithm in [27] to
solve context sensitivity problems. Finally, we run a 2pass reachability algorithm on the augmented SDG. We
explain individual steps more in detail below.
5 Feature Evaluator Generation
In this section we explain our feature evaluator generation component. To generate a feature evaluator, i.e., a
small code snippet that computes the value of a feature,
we use a program slicing algorithm. Given a program and
a slicing criterion, which is a program variable v at a program point p, static slicing [36] computes a slice, which
is an executable sub-program of the given program that
yields the same value of v at p as the given program, on
all inputs. The goal of static slicing is to yield as small
a sub-program as possible. Figure 3 shows a slicing example. The original code performs reading lines from a
file, executes expensive computation on each line, and
accumulates processed values. Suppose we want to extract the code part that affects the computation of the instrumented variable mantis_loop_cnt1. Ideally, the
slicer should produce the sliced code, shown in Figure 3
that captures only code that really affects the variable.
At a high level, our slicer captures intra-procedural and
inter-procedural data dependencies and control dependencies of a slicing criterion. The produced slices must be
executable since in our system the generated sub-program
will be executed online on the given input to obtain the result of the slicing criterion. This is a requirement clearly
2 The
choice of abstraction affects the precision and scalability of the
algorithm, and we found object allocation sites to strike a good tradeoff.
6
PDG and SDG Our slicing algorithm operates on
Joeq [6] quad code, an intermediate representation format based on registers. The vertices of a PDG represent
quad code instructions (e.g., statements and predicates).
The edges of a PDG represent data flow and control dependencies. An SDG also includes inter-procedural dependencies. A method call creates a call vertex and a set
of actual-in and actual-out vertices. Each parameter of a
method call creates an actual-in vertex, and a return value
creates an actual-out vertex. A method entry creates an entry vertex and a set of formal-in and formal-out vertices,
which correspond to arguments and a return value respectively. A call edge is created to connect a call vertex of
an call site to an entry vertex of the matching method. In
addition, a linkage-entry edge is created from an actual-in
vertex to a corresponding formal-in vertex, and a linkageexit edge is created to link a formal-out vertex to an actualout vertex.
the pass goes into the methods associated with the actualouts.
Slicing made practical A set of program statements
identified by the described algorithm may not meet Java
language requirements. This problem needs to be resolved
to create executable slices. We list a few of the engineering issues we addressed for that. First, we need to
handle accesses to static fields and heap locations (instance fields and array elements). Therefore, when building an SDG, we identify all such accesses in a method
and create formal-in vertices for those read and formalout for those written along with corresponding actual-in
and actual-out vertices. Second, there may be uninitialized parameters if they are not included in a slice. We
opt to keep method signatures, hence we initialize them
with default values. Third, there are methods not reachable from a main method but rather called from JVM directly (e.g., class initializers). These methods will not be
included in a slice by the algorithm but still may affect the
slicing criterion. Therefore, we do not slice out such code.
Fourth, when a new object creation is in a slice, a corresponding constructor invocation may not. To address this,
we create a control dependency between object creations
and corresponding constructor invocations to ensure that
they are also in the slice. Fifth, a constructor of a class except the Object class must include a call to a constructor
of its parent class. Hence we include such calls when they
are missing in a slice. Sixth, the first parameter of an instance method call is a reference to the associated object.
Therefore if such a call site is in a slice, the first parameter
has to be in the slice too and we ensure this.
Augmented SDG An SDG does not capture contextsensitivity of method calls. Therefore, if a call site of
a method is included in a slice, other call sites of the
same method may be included even though they do not
affect a slicing criterion. To remedy this problem, we
build an augmented SDG by adding summary edges to an
SDG. A summary edge connects an actual-in vertex to an
actual-out vertex and summarizes the effect of the actualin on the actual-out of a method call. To create summary
edges, we use the backward RHS algorithm [27]. It propagates from formal-out vertices of the method based on
data- and control- dependencies to calculate path edges
of the method. A path edge is of the form hp, e1 i →
hpf ormal−out , e2 i meaning that e1 at program point p affects e2 at pf ormal−out : it always ends with a formal-out
of the method and is created within the method. Therefore,
when there exists a path edge from a formal-in vertex to a
formal-out vertex of a method, a summary edge is created
connecting corresponding actual-in vertex and actual-out
vertex of a call site to the method.
Final step Previous steps we described so far generate
a slice of Joeq quad code. To generate the final Java byte
code we can execute, we translate the Joeq quad code to
Jasmin [4] assembly code and use the Jasmin assembler to
generate Java byte code. We take a simple approach that
translates each quad instruction to a corresponding set of
byte codes. During the process, since we do not have complete information on ordering between basic blocks, we
add an explicit goto instruction at the end of each basic
block. However this may lead to a cycle if a conditional
branch in a loop is sliced out and replaced by goto. We
ensure that no cycle is created by performing a DFS-like
search and choosing a successor as a target of the goto
instruction only if it can reach the exit of the method. Another special case is JSR instruction that pushes the address of the next immediate opcode into an operand stack
as its return address. However the next instruction may
not be the same as one in the original program. Hence we
add an extra goto with an appropriate target after the JSR
operation. Our current translator is not optimized; we plan
to optimize the use of stacks if needed in the future.
2-pass algorithm To identify statements to include in a
slice, we run a 2-pass reachability algorithm on an augmented SDG. The first pass starts from the program point
of a given slicing criterion and goes backwards along all
the edges in the augmented SDG but not along linkageexit edges. As a result, when encountering a call site, the
first pass does not go into the method body but uses summary edges of the call site. The second pass starts from
all actual-out vertices visited in the first pass and traverses
backwards using all the edges but not using linkage-entry
and call edges. This pass covers all methods that correspond to call sites identified in the first pass. In addition,
it may find more call sites while traversing the body of
the methods and use summary edges; this process adds
additional actual-out vertices of the summary edges and
7
Execution Time (sec.)
1.4
Discussion There are static and dynamic program slicing algorithms. They have tradeoffs between input cover1.2
age and slice compactness. Static slicing works for all in1
puts, but it may produce a bigger slice than dynamic slic0.8
ing. Dynamic slicing includes only code that is actually
0.6
executed for given inputs, but it does not cover all inputs.
As a starting point, we chose static slicing as it guarantees
0.4
to work for all inputs, but in the future we plan to explore
0.2
dynamic slicing or hybrid slicing that combines static slic0
ing and dynamic slicing if we need to improve slice com0
0.2
0.4
0.6
0.8
Predicted Time
pactness. In this paper, we tested our static slicing algorithms with simple programs, and we plan to evaluate the
Figure 4: For Lucene, the blackbox approach fails to prescalability of our algorithms with complicated programs.
dict execution time accurately.
6 Evaluation
We have implemented Mantis that works with Java programs by extending existing machine learning and program analysis tools. We built the feature instrumentor atop
Eclipse JDT AST libraries. JDT is a toolkit that provides
APIs to access and manipulate Java source code. We add
visitors to ASTs to add instrumentation code. The basic instrumentation variables are thread local variables.
The instrumentor also introduces static global variables
that summarize feature values across threads and are used
for slicing. We implemented our modeling procedure in
Matlab. Finally, we extended JChord [5], a static and dynamic Java program analysis tool, to implement our program slicing algorithm in Java and Datalog. In the current version, we have to patch models for native library
functions manually to track dependencies inside native library functions. The JChord slicer produces Joeq quadcode slices. To create final executable bytecode slices, we
implemented a translator from quadcode to bytecode using Jasmin [4].
To evaluate our system, we choose two applications,
Lucene Search [8] and ImageJ [3], that involve intensive
computation. We evaluate the prediction accuracy of our
system in terms of prediction error (i.e., prediction accuracy = 1 - prediction error) and compare it with blackbox
approaches. Prediction error is computed using the equation:
prediction error =
Execution Time (sec.)
1
0.8
0.6
0.4
0.2
0
0
0.2
0.4
0.6
0.8
Predicted Time (sec.)
1
1.2
Figure 5: Predicted time vs. execution time of the Lucene
search application. Using 10% of Lucene search data for
training, our system can predict execution time with less
than 7% prediction error.
6.1 Prediction Results for Lucene
After profiling our Lucene search application with various
text input queries over a corpus of the works of Shakespeare and the King James Bible, we obtain a dataset with
3840 samples, each of which consists of 1 execution time,
9 loop features, 29 branch features, and 90 variable features from 18 variables (we record 5 versions of values
for each variable). So we obtain a dataset with 1 column
of execution time and 126 columns of features, subset of
which would hypothetically explain the execution time
well. In the prediction modeling process, we normalize
each column of values into range [0,1], and randomly partition data (row) samples into training set and testing set.
We first evaluate a blackbox approach for predicting execution time. We choose one that can construct compact nonlinear models using the command
line arguments as features (instead of using the feature data from our profiler), which consist of the
following ones: raw, threads, totalqueries,
hitsperpage, repeat, denoted by x1 , x2 , x3 , x4
and x5 , respectively. We build models using either ordinary least-square regression or LASSO with a function us-
|predicted time - actual time|
.
actual time
We show the sensitivity to the size of training data and the
regularization parameter λ, and the results of prediction.
Traditional blackbox approaches fail to predict execution
time with low prediction error, but our system can construct an online predictor that can predict execution time
accurately. Note that, in presenting the results of our system, we use only features that can be compuated cheaply
by iterating over feature selection and program slicing for
rejecting expensive features.
8
2
0
0
0.05
λ
Prediction Error
Number of Features
Prediction Error
4
0.1
0.1
0.1
0.05
0.05
0
0
0.05
λ
0
0
0.1
0.1
0.2
0.3
0.4
0.5
Percentage of Training data
0.6
(a)
(b)
Figure 6: Using Lucene search data, we show in (a) that our approach is insensitive to parameter λ: there are a range
of λ ∈ (0, 0.07] that result in similar models for accurate prediction, and show in (b) that our approach is insensitive
to the size of training data: even using 5% or less of data for training, our system can create models achieving accurate
prediction for execution time.
ing all terms in the expansion of (1 + x1 + x2 + x3 + x4 +
x5 )3 . However, in either case we consistently see more
than 38% prediction error, even when we: 1) (randomly)
sample different portions of data for training, 2) vary the
size of training data (for model regression) from 10% to
40%, 3) use polynomial functions with order higher than
3, and 4) use different subsets of the 5 features. Figure 4
shows predicted execution time vs. actual execution time.
As you can see, this blackbox approach derived from command line features fails to model and predict execution
time accurately.
From our detailed analysis, two features that have the
largest correlation with the execution time are feature-1,
totalqueries, which has a fair amount of correlation with execution time, and feature-2, thread, and the
remaining features are poorly correlated with execution
time. Despite some correlation in feature-1 the model derived from command line features are not enough for predicting execution time accurately: for each value of the
predicted time (on x-axis), there are dramatically different actual execution times (on y-axis) correspond to (an
ideal prediction is a 45 degree line pass through the origin). This result indicates that some other factors that are
not captured by the features should contribute to the execution time. On the contrary, as shown in the following,
our system can automatically select higher quality features from the program, and construct nonlinear models
to predict execution time accurately.
To evaluate our system, we start with its sensitivity to λ,
the parameter for trading off the prediction error with the
number of selected features. We use 10% of data for training (both feature selection and model fitting), and trace a
variety of λ values (which may result in different subset of
selected features, thus different models) using an efficient
algorithm proposed in [17]. We show the result in Figure 6 (a). To our surprise, we see that our method is able
to select 2-4 features (out of 126 in total) that are enough
to build a nonlinear model to predict the execution time
within 7% error. As expected, starting from a very small
λ value and increasing it, our method selects decreasing
number of features (from 4 down to 1), and consequently
results in models with decreasing prediction power. We
clearly see that there is a range of λ values (e.g., (0, 0.07])
that enable our method to select the right set of features
and build models for accurate prediction. Repeating the
experiment with different (random) training samples, and
with 20%, 30% and 40% of data for training, we see very
similar behavior. We conclude that our method is insensitive to the parameter λ, and setting λ ≤ 0.07 allows us to
select right features, and construct compact and accurate
models for predicting execution time.
Fixing λ = 0.033 , we study the sensitivity of our
method to the size of training data, and plot the result in
Figure 6 (b). We see that with different sizes of training
data, prediction errors of the constructed models are fairy
stable, and even using 5% or less training data, our method
is able to produce accurate models for predicting execution time.
To reveal more details of the model, we use λ = 0.03
and 10% of data for training, to investigate which features
are selected and what kinds of models are constructed.
We find that our algorithm usually selects 3-4 features
(depending on which subset of data are sampled for training) and constructs a model with a prediction error around
6.1%. Figure 5 shows predicted execution time vs. actual
execution time of our system. In one instance of modeling,
the following 4 features are selected: 1) loop feature l2 re3 An optimal λ can be determined by a cross-validation approach,
e.g., further partitioning the training data into two sets, one for feature
selection and model regression, and another for testing the model. An
optimal λ is the one giving the smallest testing error (on the part of
training data selected for testing).
9
3
Execution Time (sec.)
2.5
2
1.5
1
0.5
0
0
0.5
1
1.5
2
Predicted Time
2.5
3
Figure 7: Predicted time vs. execution time of the ImageJ
application for a blackbox approach.
3
Execution Time (sec.)
2.5
2
1.5
1
0.5
0
0
0.5
1
1.5
Predicted Time (sec.)
2
2.5
Figure 8: Predicted time vs. execution time of the ImageJ
application. Using 10% of ImageJ data for training, our
system can predict execution time with 5.5% prediction
error.
lated to a while loop for reading keywords from the query
file, 2) variable feature v3 related to totalQueries,
3) variable feature v5 related to hitsPerPage, and 4)
variable feature v9 related to how many query processors
to create per thread. Among them, features l2 and v9 have
the largest weights (indicating they are the most important) and persistently appear when sampling different portions of the data for training. With just these two features,
we do a LASSO sparse regression with all basis functions
of features in the expansion of (1+l2 +v9 )3 . Interestingly,
we are able to construct the following a nonlinear model
f (l2 , v9 ) = 0.1 + 0.52l2 + 0.09v9 − 0.69l22 − 0.07v92 +
+1.16l23 + 0.13l1v92 ,
which can predict execution time with error 6.7% (indicating the rest two selected features v3 and v5 only contribute
to less than 1% of the prediction accuracy).
6.2 Prediction Results for ImageJ
ImageJ [3] is a public domain Java image processing and analysis program. It provides a variety tools
for displaying, editing, analyzing, and processing im10
ages in many formats. We test a dozen of tools
of ImageJ, including Smooth, Find Edges, FFT,
Find Maxima, etc. We choose to profile and predict
the execution time of Find Maxima, because it exhibits
high variance in execution time when processing different
images (even with similar size), making it a challenging
task to model the execution time.
To profile the Find Maxima, we use 3045 images
from popular vision corpus of Caltech 101 [1], Event
Dataset [2] and PASCAL challenge 2008 dataset [9]. The
images vary a lot in size and resolution, and have content
in different scenes (e.g., in the office, on the street, in the
natural environment, etc) and with different object categories (e.g., plan, car, bird, building, etc). After the profiling, we obtain a dataset with 3045 samples, each of which
consists of one execution time, 291 loop features, 2935
branch features, and 2290 variable features from 458 variables (we record five versions of values for each variable).
So we obtain a dataset with one column of execution time
and 5516 columns of features. After removing constant
and redundant columns, we obtain 182 useful features,
(small) subset of which would likely explain the execution
time well. In the experiments, we normalize each column
of values into range [0,1], and randomly partition the data
into training set and testing set.
For a blackbox approach, many methods can be used.
We consider one with the execution time as a nonlinear
function of a simple input parameter – the image size. We
start with a degree 3 polynomial function of the image size
x, and obtain the following prediction model using 20%
of data for training
f (x) = 0.1 + 2.18x − 8.77x2 + 36.6x3 .
Predicting on the remaining 80% test data, we consistently see more 35% of prediction error regardless which
subset of data are sampled as a training set (may result in
slightly different models). We see similar results when we
increase the degree of the polynomial and the percentage
of training data.
We plot the execution time against the predicted execution time obtained from the model in Figure 7. We clearly
see that image size alone is not enough for predicting
execution time regardless of whatever model may come
out: the image size is poorly correlated with the execution
time, and for each value of the image size or the predicted
execution time, there are dramatically different actual execution times corresponding, indicating that some other
factors should contribute to the execution time.
On the contrary, our system can automatically select
two high-quality features from thousands of automatically
instrumented features, and construct a model to predict
execution time accurately. Of the two selected features,
one is the variable feature related to the width of region
of interest (denoted by w); the other is height of the im-
1
2
Features selected by
the model generator
loop features l3 and l7
variable features v3 , v5 , and v9
loop feature l2
variable features v3 , v5 , and v9
1
Rejected
features
loop feature
l3
NONE
0.8
Cumulative probability
Step
Table 1: Iterative procedure of model selection considering the cost of computing feature values. In the example,
loop feature l3 is related to a for loop printing search results, and loop feature l7 is related to a while loop counting how many times queries are executed. We explained
other features in Section 6.1. Computing l3 requires computing the most of the program (i.e., doing actual lookups
of indices), thus it is rejected in step 1. This iterative
procedure stops at step 2 since all selected features are
quickly computable.
age (denoted by h). Although highly correlated to the execution time, neither a single feature (even with nonlinear
model), nor the linear combination of both selected features can predict execution time very well. Instead, using
10% of data for training with λ = 0.03, we do a LASSO
sparse regression using all (nonlinear) terms in the expansion of (1 + w + h)3 , and obtain the following model
f (w, h) = 0.1 + 0.08w + 0.07h + 0.33wh + 0.02h2 ,
which can predict the execution time accurately (around
5.5% prediction error), as shown in Figure 8.
We also study the sensitivity of our method to λ using
10% of data for training (both feature selection and model
fitting), and show the result in Figure 9 (a). Again, we see
that our method is insensitive to λ, and there are a wide
range of λ values (e.g., (0, 0.11]) that allow us to select
right features, and construct compact and accurate models
for predicting execution time.
Fixing λ = 0.03, we study the sensitivity of our method
to the size of training data, and plot the result in Figure 6
(b). Again, we see that with different sizes of training data,
prediction errors of the constructed models are fairy stable, and even using 5% or less training data, our method is
able to produce accurate models for predicting execution
time.
6.3 Benefit of Slicing
In this section, we evaluate the benefit of slicing. We explain how slicing can help choose features that are not
expensive to compute and evaluate the execution times
of feature evaluators of selected features computed manually.
We look at the details on how the Lucene search application chose final features we presented in Section 6.1. Table 6.3 shows the steps taken by the model generator due
11
0.6
0.4
0.2
0
0.001
Entire program
Loop feature l2
0.01
0.1
Execution time (s)
1
10
Figure 10: CDF of execution time of the entire Lucene
search program and time to execute the slice that computes loop feature l2 .
to the feedback from the slicer. In each step, we show the
features selected by the model generator, and the features
rejected by the slicer among the features passed from the
model generator. For this application, at step 2, the slicer
can compute slices that can quickly compute all the features needed by the model, thus it accepts the selected features and the feedback loop from the slicer to the model
generator ends.
Figure 10 shows the cumulative distribution function
(CDF) of execution time of the entire Lucene search program and that of the slice to compute loop feature l2 . We
show only l2 because it is the most expensive selected feature to compute since the slice goes through files to count
keywords. The other variable features are derived by arithmetic operations and assignments of values from inputs.
Computing l2 takes 3 − 4% of the entire program execution time, thus the prediction model can compute an estimate of execution time with low overhead.
7 Related Work
Prediction has been explored in multiple different contexts — database, cluster and cloud, networking, and program complexity modeling. In this paper, we presented a
new performance prediction framework for generic programs by combining programming language and machine
learning techniques. As far as we know, our work is the
first to explore program analysis to extract features, employ machine learning to create accurate models with selected features, and use program slicing to automatically
produce code snippets that compute feature values for prediction.
In the database, researchers explored machine learning algorithms to predict database query execution time.
Gupta, Mehta, and Dayal [20] used a variant of decision
trees to predict time ranges of data warehouse queries.
Ganapathi et al. [18] used KCCA to predict time and resource consumption of database queries (number of I/Os
and messages) using the statistics of query texts and query
plans (e.g., instance count for each possible database op-
4
2
0
0
0.05
0.1
λ
Prediction Error
Number of Features
Prediction Error
6
0.15
0.1
0.1
0.05
0.05
0
0
0.05
0.1
λ
0
0
0.15
0.1
0.2
0.3
0.4
0.5
Percentage of Training data
0.6
(a)
(b)
Figure 9: Using ImageJ data, we show in (a) that our approach is insensitive to λ: there are a range of λ ∈ (0, 0.11] that
result in similar models for accurate prediction, and show in (b) that our approach is insensitive to the size of training
data: even using 5% or less of data for training, our system can create models achieving accurate prediction.
erator).
In resource allocation and provisioning for cluster and
cloud applications, research has been done to forecast how
much resource is required to support given workload to
meet service level agreements [11, 12], or how long it
takes to complete a candidate assignment [31]. The models used resource consumption or workload size for prediction. Xu et al. used console logs — coarse-grained program status reports — to detect anomalies in the Hadoop
Distributed File System and the Darkstar game [37].
For load shedding in network monitoring applications,
Barlet-Ros et al. [10] used a simple linear regression
model of features from five packet header tuples, number of bytes, number of packets to predict CPU resource
usage. This work is specific to packet processing applications. In contrast, our framework is applicable to generic
programs.
In the networking context, multiple projects addressed
the problems of predicting response time changes for
what-if scenarios. WebProphet [25] predicts the impact
of certain optimizations of web services before deploying them by extracting web object dependencies with injected delays and simulating web page loading processes
with web object dependency graphs. WISE [33] predicts
the effects of configuration or deployment changes in
content distribution networks by modeling the network
dependency structure to response-time distribution. Link
Gradients [14] predicts the impact of network latency in
multi-tier systems by doing delay injection and performing spectral analysis.
There have been studies on using information from
execution traces for modeling computational complexity [19], simulating hardware platforms efficiently [29,
30], and finding bugs cooperatively [26]. In contrast to
these, Mantis focuses on creating a model for predicting
program execution time by computing feature values online with slices quickly for new inputs.
12
Trendprof [19] models asymptotic computational complexity by measuring empirical computational complexity. It computes a model that estimates the performance of
a program by modeling basic block execution frequency
in terms of user-specified features (e.g., input size) and
summarizing the program with clusters of basic blocks.
SimPoint [29, 30] finds a subset of execution instruction traces of program for an input for efficient hardware
platform simulation because simulating hardware for the
entire program execution takes too long time. It instruments basic block vectors in each fixed interval and uses
a clustering algorithm to extract a representative subset of
traces from clusters that approximates low-level hardware
metrics such as instructions per cycle, percent RUU occupancy, cache miss rate, branch prediction miss rate, and
address prediction miss rate [30].
Cooperative bug isolation (CBI) [26] used three predicates — branches with four values (always true, always
false, sometimes true and sometimes false, unreachable in
the run), comparisons between all pairs of integer-valued
variables and constants in the program, and comparisons
between integer valued return results of functions and 0.
CBI aims to find which predicates are correlated with
crashes to find bugs, and uses sampling of predicates to
lower runtime overhead since the executed runs are collected from end users of the program.
8 Conclusion
In this paper, we presented Mantis, a new prediction
framework that extracts program features using code analysis, models performance with these features using sparse
regression, and generates code snippets that compute the
feature values. We take a first step towards building such
a framework. Our prototype evaluation shows that Mantis can predict execution time with more than 93% accuracy for the applications we tested, a search engine and an
[16] D. Donoho. For most large underdetermined systems of equations, the minimal 1-norm solution is
the sparsest solution. Communications on Pure and
Applied Mathematics, 59:797âĂŞ829, 2006.
[17] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani. Least angle regression. Annals of Statistics,
32(2):407–499, 2002.
[18] A. Ganapathi, H. Kuno, U. Dayal, J. L. Wiener,
A. Fox, M. Jordan, and D. Patterson. Predicting multiple metrics for queries: Better decisions enabled by
machine learning. In ICDE, 2009.
[19] S. Goldsmith, A. Aiken, and D. Wilkerson. Measuring empirical computational complexity. In FSE,
2007.
[20] C. Gupta, A. Mehta, and U. Dayal. PQR: Predicting query execution times for autonomous workload
management. In ICAC, 2008.
[21] T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning. Springer, 2009.
[22] S. Horwitz, T. Reps, and D. Binkley. Interprocedural
slicing using dependence graphs. In PLDI, 1988.
[23] M. Isard, V. Prabhakaran, J. Currey, U. Wieder,
References
K. Talwar, and A. Goldberg. Quincy: fair scheduling
for distributed computing clusters. In Proceedings of
[1] Caltech
101
Object
Categories.
SOSP’09, 2009.
www.vision.caltech.edu/Image_Datasets/Caltech101/Caltech101.html.
[24]
S.-J.
Kim, K. Koh, M. Lustig, S. Boyd, and
[2] Event Dataset. vision.stanford.edu/lijiali/event_dataset.
D.
Gorinevsky.
An interior-point method for large[3] ImageJ. rsbweb.nih.gov/ij/.
scale
l1-regularized
least squares. IEEE Journal on
[4] Jasmin. jasmin.sourceforge.net.
Selected
Topics
in
Signal
Processing, 1(4):606–617,
[5] jchord. code.google.com/p/jchord.
2007.
[6] Joeq. joeq.sourceforge.net.
[25] Z. Li, M. Zhang, Z. Zhu, Y. Chen, A. Greenberg, and
[7] LLVM. llvm.org.
Y.-M. Wang. WebProphet: Automating performance
[8] Mahout. lucene.apache.org/mahout.
prediction for web services. In NSDI, 2010.
[9] Visual
Object
Classes
Challenge
2008.
[26]
B. Liblit, M. Naik, A. X. Zheng, A. Aiken, and M. I.
pascallin.ecs.soton.ac.uk/challenges/VOC/voc2008.
Jordan. Scalable statistical bug isolation. In PLDI,
[10] P. Barlet-Ros, G. Iannaccone, J. Sanjuas-Cuxart,
2005.
D. Amores-Lopez, and J. Sole-Pareta. Load shed[27]
T.
Reps, S. Horwitz, and S. Sagiv. Precise interproding in network monitoring applications. In USENIX
cedural
dataflow analysis via graph reachability. In
Annual Tech. Conf., 2007.
POPL,
1995.
[11] P. Bodik, R. Griffith, C. Sutton, A. Fox, M. I. Jordan, and D. A. Patterson. Automatic exploration of [28] T. W. Reps, S. Horwitz, S. Sagiv, and G. Rosay.
Speeding up slicing. In FSE, 1994.
datacenter performance regimes. 2009.
[29]
T. Sherwood, E. Perelman, and B. Calder. Basic
[12] P. Bodik, R. Griffith, C. Sutton, A. Fox, M. I. Jordan,
block distribution analysis to find periodic behavior
and D. A. Patterson. Statistical machine learning
and simulation points in applications. In Parallel Armakes automatic control practical for internet datchitectures and Compilation Techniques, 2002.
acenters. 2009.
[30]
T. Sherwood, E. Perelman, G. Hamerly, and
[13] C. Cadar, D. Dunbar, and D. Engler. KLEE: UnasB. Calder. Automatically characterizing large scale
sisted and automatic generation of high-coverage
program behavior. In ASPLOS, 2002.
tests for complex systems programs. In OSDI, 2008.
[31]
P.
Shivam, S. Babu, and J. S. Chase. Learning appli[14] S. Chen, K. Joshi, M. A. Hiltunen, W. H. Sanders,
cation
models for utility resource planning. In ICAC,
and R. D. Schlichting. Link gradients: Predicting the
2006.
impact of network latency on multitier applications.
[32] M. Sridharan, S. Fink, and R. Bodik. Thin slicing.
In INFOCOM, 2009.
In PLDI, 2007.
[15] J. Dean and S. Ghemawat. MapReduce: Simplified
[33]
M.
Tariq, A. Zeitoun, V. Valancius, N. Feamster, and
data processing on large clusters. In OSDI, 2004.
image processing application, which cannot be achieved
with models without program features. In the future, we
plan to evaluate our system with various complicated applications in terms of accuracy, applicability, and scalability.
Our new approach to prediction presents several exciting research directions we want to explore. First, we want
to extend our model to include environment and to explore more sophisticated features (e.g., feature values that
depend on calling contexts) and more sophisticated slicing algorithms (e.g., algorithms based on dynamic control
flow graphs). Second, we would like to build our framework for C/C++ languages with LLVM [7] since the current prototype works with Java programs. Third, we want
to further extend our framework to apply to networked
systems running on multiple nodes. Our work in this paper
addressed single-machine program execution. Finally, we
also would like to apply the tool to performance debugging (e.g., a tool that generates test cases for performance
debugging similar to KLEE [13] that generates test cases
for correctness).
13
[34]
[35]
[36]
[37]
M. Ammar. Answering what-if deployment and configuration questions with wise. In ACM SIGCOMM,
2008.
R. Tibshirani. Regression shrinkage and selection
via the lasso. J. Royal. Statist. Soc B., 1996.
B. Urgaonkar and A. Chandra. Dynamic provisioning of multi-tier internet applications. In Proceedings of the Second International Conference on
Automatic Computing (ICAC’05), Washington, DC,
2005.
M. Weiser. Program slicing. In ICSE, 1981.
W. Xu, L. Huang, A. Fox, D. Patterson, and M. Jordan. Detecting large-scale system problems by mining console logs. In SOSP, 2009.
14
| 6cs.PL
|
arXiv:1408.6821v3 [math.CO] 19 May 2016
Looking for vertex number one
Alan Frieze∗, Wesley Pegden†
Department of Mathematical Sciences,
Carnegie Mellon University,
Pittsburgh PA 15213,
U.S.A.
May 20, 2016
Abstract
Given an instance of the preferential attachment graph Gn = ([n], En ), we would like
to find vertex 1, using only ‘local’ information about the graph; that is, by exploring the
neighborhoods of small sets of vertices. Borgs et al. gave an an algorithm which runs in
time O(log4 n), which is local in the sense that at each step, it needs only to search the
neighborhood of a set of vertices of size O(log4 n). We give an algorithm to find vertex 1,
which w.h.p. runs in time O(ω log n) and which is local in the strongest sense of operating
only on neighborhoods of single vertices. Here ω = ω(n) is any function that goes to infinity
with n.
1
Introduction
The Preferential Attachment Graph Gn was first discussed by Barabási and Albert [2] and then
rigorously analysed by Bollobás, Riordan, Spencer and Tusnády [3]. It is perhaps the simplest
model of a natural process that produces a graph with a power law degree sequence.
The Preferential Attachment Graph can be viewed as a sequence of random graphs G1 , G2 , . . . , Gn
where Gt+1 is obtained from Gt as follows: Given Gt , we add vertex t + 1 and m random edges
{ei = (t + 1, ui ) : 1 ≤ i ≤ m} incident with vertex t + 1. Here the constant m is a parameter
of the model. The vertices ui are not chosen uniformly from Vt , instead they are chosen with
probabilities proportional to their degrees. This tends to generate some very high degree vertices,
∗
†
Research supported in part by NSF grant CCF1013110
Research supported in part by NSF grant DMS
1
compared with what one would expect in Erdős-Rényi models with the same edge-density. We
refer to u1 , u2 , . . . , um as the left choices of vertex t + 1. We also say that t + 1 is a right neighbor
of ui for i = 1, 2, . . . , m.
We consider the problem of searching through the preferential attachment graph looking for
vertex number 1, using only local information. This was addressed by Borgs, Brautbar, Chayes,
Khanna and Lucier [5] in the context of the Preferential Attachment Graph Gn = (Vn , En ). Here
Vn = [n] = {1, 2, . . . , n}. They present the following local algorithm that searches for vertex 1,
in a graph which may be too large to hold in memory in its entirety.
1: Initialize a list L to contain an arbitrary node u in the graph.
2: while L does not contain node 1 do
3:
Add a node of maximum degree in N(L) to L od;
4: return L
Here for vertex set L, we let N(L) = {w ∈
/ L : ∃v ∈ L s.t. {v, w} ∈ En }.
They show that w.h.p. the algorithm succeeds in reaching vertex 1 in O(log4 n) steps. (We
assume that an algorithm can recognize vertex 1 when it is reached.) In [5], they also show how
a local algorithm to find vertex 1 can be used to give local algorithms for some other problems.
We also note that Brautbar and Kearns [6] considered local algorithms in a more general context.
There the algorithm is allowed to jump to random vertices as well as crawl around the graph in
the search for vertices of high degree and high clustering coefficient.
We should note that, as the maximum degree in Gn is n1/2−o(1) w.h.p., one cannot hope to have a
polylog(n) time algorithm if we have to check the degrees of the neighbors as we progress. Thus
the algorithm above operates on the assumption that we can find the highest-degree neighbor of
a vertex in O(1) time. This would be the case, for example, if the neighborhood of a vertex is
stored as a linked-list which is sorted by degrees. In the same situation, we can also determine the
K highest degree neighbors of a vertex in constant time for any constant K, and in the present
manuscript we assume such a constant-time step is possible. In particular, in this setting, each
of steps 2-7 of the following Degree Climbing Algorithm takes constant time.
We let dn (v) denote the degree of vertex v ∈ Vn .
Algorithm DCA:
The algorithm generates a sequence of vertices v1 , v2 , . . . , until vertex 1 is reached.
Step 1 Carry out a random walk on G until it is mixed; i.e., until the variation distance between
the current vertex and the steady state is o(1). We let v1 be the terminal vertex of the
walk. (See Remark 1.1 for comments on this step.)
Step 2 t ← 1.
2
Step 3 repeat
Step 4
Let Ct = w1 , w2, . . . , wm/2 be the m/2 neighbors of vt of largest degree.
(In the case of ties for the m/2th largest degree, vertices will be placed randomly in Ct in
order to make |Ct | = m/2. Also m is large here and we could replace m/2 by ⌊m/2⌋ if m
is odd without affecting the analysis by very much.)
Step 5
Choose vt+1 randomly from Ct .
Step 6
t ← t + 1.
Step 7 until dn (vt ) ≥
arbitrary.
n1/2
log1/100 n
(SUCCESS) or t > 2ω log4/3 n (FAILURE), where ω → ∞ is
Step 8 Assuming Success, starting from vT , where T is the value of t at this point, do a random
1/2
walk on the vertices of degree at least logn1/20 n until vertex 1 is reached.
Remark 1.1. It is known that w.h.p. the mixing time of a random walk on Gn is O(log n), see
Mihail, Papadimitriou and Saberi [11]. So we can assume that the distribution of v1 is close to
n (v)
the steady state πv = d2mn
.
Note that Algorithm DCA is a local algorithm in a strong sense: the algorithm only requires
access to the current vertex and its neighborhood. (Unlike the algorithm from [5], it does not
need access to the neighborhood of the entire set Pt = {v1 , . . . vt } of vertices visited so far.) Our
main result is the following:
Theorem 1.2. If m is sufficiently large then then w.h.p. Algorithm DCA finds vertex 1 in Gn
in O(ω log n) time.
DCA is thus currently the fastest as well as the “most local” algorithm to find vertex 1. We
conjecture that the factor ω in the running time is unnecessary.
Conjecture 1.3. Algorithm finds vertex 1 in Gn in O(log n) time, w.h.p.
We note that w.h.p. the diameter of Gn is ∼
execution time much below O(log n).
log n
log log n
and so we cannot expect to improve the
The bulk of our proof consists of showing that the execution of Steps 2–7 requires only time
O(ω log n) w.h.p. for any ω = ω(n) → ∞. This analysis requires a careful accounting of conditional probabilities. This is facilitated by the conditional model of the preferential attachment
graph due to Bollobás and Riordan [4]. One contribution of our paper is to recast their model in
terms of sums of independent copies of the rate one exponential random variables; this will be
essential to our analysis.
3
Outline of the paper
In Section 2 we reformulate the construction of Bollobás and Riordan [4] in terms of sums of
independent copies of the exponential random variable of rate one.
Section 3 is the heart of the paper. The aim is to show that if vt is not too small, then the ratio
vt+1 /vt is bounded above by 3/4 in expectation. We deduce from this that w.h.p. the main loop,
Steps 2–7, only takes O(ω log n) rounds. The idea is to determine a degree bound ∆ such that
many of vt ’s left neighbors have degree at least ∆, while only few of vt ’s right neighbors have
degree at least ∆. In this way, vt+1 is likely to be significantly smaller than vt .
Once we find a vertex vT of high enough degree, then we know that w.h.p. vT is not very large
and lies in a small connected subgraph of vertices of high degree that contains vertex one. Then a
simple argument based on the worst-case covertime of a graph suffices to show that only o(log n)
more steps are required.
Our proofs will use various parameters. For convenience, we collect here in table form a dictionary
of some notations, giving a brief (and imprecise) description of the role each plays in our proof,
for later reference.
ω :=
λ0 :=
Definition
Role in proof
O(log log n)
An arbitrarily chosen slowly growing fucntion.
1
log
40/m
n
A (usually valid) lower bound on random variables ηi (cf. Section 2.1).
n1 :=
log1/100 n
W.h.p. the main loop never visits v ≤ n1 .
Pt :=
{v1 , . . . vt }
The set of vertices visited up to time t.
Ψ:=
(log log n)10
Vertices v > Ψvt will not be important in the search for vt+1 .
L:=
m1/5
A large constant, significantly smaller than m.
Notation: We write An ∼ Bn if An = (1 + o(1))Bn as n → ∞. We write α . β in place of
α ≤ o(1) + (1 + o(1))β.
4
2
2.1
Preliminaries
A different model of the preferential attachement graph
Bollobás and Riordan [4] gave an ingenious construction equivalent to the preferential attachment
graph model. We choose x1 , x2 , . . . , x2mn independently and uniformly from [0, 1]. We then let
{ℓi , ri } = {x2i−1 , x2i } where ℓi < ri for i = 1, 2, . . . , mn. We then sort the ri in increasing order
R1 < R2 < · · · < Rmn and let R0 = 0. We then let
Wj = Rmj and wj = Wj − Wj−1 and Ij = (Wj−1 , Wj ]
for j = 1, 2, . . . , n. Given this we can define Gn as follows: It has vertex set Vn = [n] and an
edge {x, y} , x ≤ y for each pair ℓi , ri , where ℓi ∈ Ix and ri ∈ Iy .
We recast the construction of Bollobás and Riordan as follows: we can generate the sequence
R1 , R2 , . . . , Rmn by letting
1/2
Υi
Ri =
,
(1)
Υmn+1
where Υ0 = 0 and
ΥN = ξ1 + ξ2 + · · · + ξN for N ≥ 1
and where ξ1 , ξ2, . . . , ξmn+1 are independent exponential rate one random variables i.e. Pr(ξi ≥
2
are independent and uniform in [0, 1] (as they
x) = e−x for all i. This is because r12 , r22 , . . . , rmn
are each chosen as the maximum of two uniform points) and the order statistics of N independent
uniform [0, 1] random variables can be expressed as the ratios Υi /ΥN +1 for 1 ≤ i ≤ N.
We refer to the distribution of ΥN as ERL(N), as it is known in the literature as the Erlang
distribution.
2.2
Important properties
The advantage of our modification of the variant of the Bollobàs and Riordan construction is
that if we define
ηi := ξ(i−1)m+1 + ξ(i−1)m+2 + · · · + ξim ,
then ηi is closely related to the size of Ii . It can then be used to estimate the degree of vertex i.
This will simplify the analysis since ηi is simply a sum of exponentials.
In this section, we make this claim (along with other more obscure asymptotic properties of this
model) precise. In particular, we let E denote the event that the following properties hold for
Gn . In the appendix, we prove that Gn has all these properties w.h.p.
5
(P1) For Υk,ℓ = Υk − Υℓ , we have
Υk,ℓ
"
1/2
Lθk,ℓ
∈ (k − ℓ) 1 ±
3(k − ℓ)1/2
#
for (k, ℓ) = (mn + 1, 0) or
l=0
1
k−ℓ
2
∈ {ω, ω + 1, . . . , n} and k − l ≥ log n
k ≥ log30 n, l > 0
m
1/300
log
n 0 < l < k < log30 n.
Here, where n0 =
λ20 n
,
ω log2 n
λ0 =
θk,ℓ
1
,
log20/m n
log k
1/2
k
= (k − ℓ)1/2
(k−ℓ)3/2 log n
n1/2
n
ω 3/2 log2 n
Similarly define
θk =
1/2
k3/2
k
log n
1/2
n
n
ω 3/2 log2 n
ω ≤ l < k ≤ log30 n,
ω ≤ k ≤ n2/5 , l = 0,
log30 n < k ≤ n2/5 ,
n2/5 < k ≤ n0 ,
n0 < k.
k ≤ n2/5 ,
n2/5 < k ≤ n0 ,
n0 < k.
#
1/2 "
1/2
1/2
Lθi
i
i
1 ± 1/2 ∼
for ω ≤ i ≤ n.
(P2) Wi ∈
n
i
n
"
#
1/2
ηi
2Lθi
ηi
(P3) wi ∈
1 ± 1/2 1/2 ∼
for ω ≤ i ≤ n.
1/2
2m(in)
m i
2m(in)1/2
(P4) λ0 ≤ ηi ≤ 40m log log n for i ∈ [log30 n].
(P5) ηi ≤ log n for i ∈ [n].
Some properties give asymptotics for intermediate quantities in the Bollobas/Riordan model
(e.g., (P2), (P3)), while the rest give worst-case bounds on parameters in various ranges for
i. The very technical (P1) is just giving constraints on the gaps between the points Υk in the
Bollobas/Riordan model.
2.3
Inequalities
We will use the following inequalities from Hoeffding [9] at several points in the paper. Let
Z = Z1 + Z2 + . . . + ZN be the sum of independent [0, 1] random variables and suppose that
6
µ = E(Z). Then if α > 1 we have
n 2 o
(
exp − α3µ , α ≤ 1.
α2 µ
≤
Pr(Z ≥ (1 + α)µ) ≤ exp −
2 + α/3
exp − αµ
, α > 1.
3
βµ
e
Pr(Z ≥ βµ) ≤ e−µ
, β>1
β
2
α µ
, 0 ≤ α ≤ 1.
Pr(Z ≤ (1 − α)µ) ≤ exp −
2
(2)
(3)
(4)
Our main use for these inequalities is to get a bound on vertex degrees, see Section 2.4.
In addition to these concentration inequalities, we use various inequalities bounding the tails of
the random variable η. We note that the probability density φ(x) of the sum η of m independent
exponential rate one random variables is given by
φ(x) :=
xm−1 e−x
.
(m − 1)!
That is,
Pr(a ≤ η ≤ b) =
Z
b
φ(y)dy.
(5)
a
The equation (5) is a standard result, which can be verified by induction on m (for example, see
exercise 4.14.10 of Grimmett and Stirzaker [8]). Although we will frequently need to bound the
probability (5), this integral cannot be evaluated exactly in general, and thus we will often use
simple bounds on φ(η). We summarise what we need in the following lemma:
Lemma 2.1.
(a)
Pr(η ≤ xm) ≤ m(xe1−x )m
for x ≤ 1 −
1
.
m
(6)
(b)
Pr(η ≤ x) ≤ (1 − e−x )m ≤ xm .
(c)
Pr(η ≥ βm) ≤
eβ
eβ
m
≤ e−3m/10 for β ≥ 2.
(d)
2 m/3
Pr(η ≥ (1 + α)m) ≤ e−α
for 0 < α < 1.
(e)
2 m/2
Pr(η ≤ (1 − α)m) ≤ e−α
7
for 0 < α < 1.
(7)
Proof. (a) φ(η) is maximized at η = m − 1. Taking φ(mx) (x ≤ 1 − 1/m) as an upper bound on
φ(y) for y ∈ [0, mx] and m! ≥ (m/e)m in (5) gives us (6).
Q
(b) Writing η = ξ1 + ξ2 + · · · + ξm we have Pr(η ≤ x) ≤ m
i=1 Pr(ξi ≤ x).
(c) If η = ξ1 + ξ2 + · · · + ξN , then with λ = (β − 1)/β,
Pr(η ≥ βm) = Pr(eλη ≥ eλβm ) ≤ e−λβm E(eλη ) = e−λβm
m
Y
E(eλξi ) =
i=1
−λβm
e
(1 − λ)−m = (βe−(β−1) )m . (8)
(d) Putting β = 1 + α into (8) we see that
2 m/3
Pr(η ≥ (1 + α)m) ≤ ((1 + α)e−α )m ≤ e−α
.
(e) With λ = α/(1 − α) we now have
Pr(η ≤ (1 − α)m) = Pr(e−λη ≥ e−λ(1−α)m ) ≤ eλ(1−α)m E(e−λη ) = eλ(1−α)m
m
Y
E(e−λξi ) =
i=1
λ(1−α)m
e
2.4
(1 + λ)
−m
2 m/2
= ((1 − α)eα )m ≤ e−α
.
Properties of the degree sequence
We will use the following properties of the degree sequence throughout: let
!
1/2
n 1/2
i
5L log log n
ζ(i) =
1−
− 3/4
i
n
ω log n
!
1/2
n 1/2
i
5L log log n
+
.
1−
+ 3/4
ζ (i) =
i
n
ω log n
(9)
(10)
Note that
+
ζ(i) ∼ ζ (i)
ζ(i) ∼
n 1/2
i
2 log log n
.
if i ≤ n 1 −
log n
if i = o(n).
Also, let d¯n (i) denote the expected value of dn (i) in Gn .
Lemma 2.2.
8
(11)
(12)
(a) If E occurs then d¯n − m ∈ [ηi ζ(i), ηi ζ + (i)].
2 η ζ(i)/2
i
(b) Pr(dn (i) − m ≤ (1 − α)ηi ζ(i)) ≤ e−α
for 0 ≤ α ≤ 1.
2 η ζ + (i)/3
i
(c) Pr(dn (i) − m ≥ (1 + α)ηi ζ + (i)) ≤ e−α
(d) Pr(dn (i) − m ≥ βηi ζ + (i)) ≤ (e/β)βηi ζ
+ (i)
for 0 ≤ α ≤ 1.
for β ≥ 2.
(e) W.h.p. ηi ≥ λ0 and ω ≤ i ≤ n1/2 implies that dn (i) ∼ ηi
(f ) W.h.p. ω ≤ i ≤ log30 n implies that dn (i) ∼ ηi
n 1/2
.
i
(g) W.h.p. ω ≤ i ≤ n1/2 implies dn (i) . max {1, ηi }
(h) W.h.p. n1/2 ≤ i ≤ n implies dn (i) ≤ n1/3 .
(i) W.h.p. 1 ≤ i ≤ log1/49 n implies that dn (i) ≥
(j) W.h.p. dn (i) ≥
n
log1/20 n
n 1/2
i
n 1/2
.
i
.
n1/2
.
log1/20 n
implies i ≤ log1/9 n.
Proof. We defer the proof, which is straightforward but tedious, to the appendix.
Remark 2.3. We will for the rest of the paper condition on the occurrence of E. All probabilities include this conditioning. We will omit the conditioning in the text in order to simplify
expressions.
3
Analysis of the main loop
Since the variation distance after Step 1 is o(1), it suffices to prove Theorem 1.2 under the
assumption that we begin Step 2, with v1 chosen randomly, exactly according to the stationary
distribution.
The main loop consists of Steps 2–7. Let v0 = 1 and v1 , v2 , . . . , vs for s ≥ 1 be the sequence of
vertices followed by the algorithm up to time s. Let ρt = vt+1 /vt , and define T1 , T2 by
T1 = min t : vt ≤ log30 n and T2 = T1 + 30ω log4/3 log n and T0 = min 2ω log4/3 n, T2 . (13)
We will prove, see Lemma 3.2, that
E(ρt ) ≤
3
for 1 ≤ t ≤ T0 .
4
(14)
Recalling that T is the time when Step 8 begins, we note that if T < t ≤ T0 then this statement
is meaningless. So, we will keep to the following notational convention: if Xt is some quantity
that depends on t ≤ T and t > T then Xt = XT .
9
Now, roughly speaking, if r = 2 log4/3 n and µ is the number of steps in the main loop, then we
would hope to have
1
1
Pr(µ ≥ r) ≤ Pr ρ0 ρ1 · · · ρr ≥
≤ n E(ρ0 ρ1 · · · ρr ) ≤
n
n
and so w.h.p. the algorithm will complete the main loop within 2 log4/3 n steps. Unfortunately,
we cannot justify Q
the last inequality, seeing as the ρt are not independent. I.e. we cannot replace
E(ρ0 ρ1 · · · ρr ) by ri=0 E(ρi ). We proceed instead as in the next lemma.
Lemma 3.1. Assuming (14) we have the w.h.p. DCA completes the main loop in at most T0
steps with SUCCESS.
Proof. We let s0 denote the number of vertices visited by the main loop, and then define Zs =
ρ0 ρ1 · · · ρs for s ≤ s0 , and Zs = ρ0 ρ1 · · · ρs0 ( 43 )s−s0 for s > s0 .
Suppose first that T1 > ω log4/3 n. Now (14) and Jensen’s inequality implies that for s ≥ 1,
min(s,s0 )
E(log(Zs )) =
X
E(log(ρi )) +
i=0
s
X
log 43
min(s,s0 )+1
≤
min(s,s0 )
X
log E(ρi ) +
i=0
s
X
log 43 ≤ s log(3/4). (15)
min(s,s0 )+1
Now
log(Zs ) ≥ (s − s0 ) log(3/4) − log n ≥ s log(3/4) − log n
(16)
since ρ1 ρ2 . . . ρs0 ≥ 1/n.
Now let
α = Pr(log(Zs ) ≤ (1 − β)s log(3/4))
where α, β are to be determined. Then, (15), (16) imply that
(1 − α)(1 − β)s log(3/4) + α(s log(3/4) − log n) ≤ E(log(Zs )) ≤ s log(3/4).
(17)
Equation (17) then implies that
α≥
βs log(4/3)
.
βs log(4/3) + log n
Now putting s = ω log4/3 n and β = 1/2 we see that (18) becomes
α ≥1−
2
= 1 − o(1).
ω+2
So w.h.p. after at most ω log4/3 n steps, we will have exited the main loop with SUCCESS.
10
(18)
Suppose now that T1 ≤ ω log4/3 n. Using the argument that gave us (18) we obtain
T − T1 ≤ ω log4/3 log30 n w.h.p.
To prove Lemma 3.2, we will use a method of deferred decisions, exposing various parameters of Gn as we proceed. At time t, we will consider all random variables in the model from
Section 2.1 as being exposed if they have affected the algorithm’s trajectory thus far, and condition on their particular evaluation. To reduce the conditioning necessary, we will actually
analyze a modified algorithm, NARROW-DCA(τ ), and then later show that the trajectory of
NARROW-DCA(τ ) is the same as that of the DCA algorithm, w.h.p., when identical sources
of randomness are used.
NARROW-DCA(τ ) is the same as the DCA algorithm, except that for the first τ rounds of
the algorithm, a modified version of Step 4 is used:
Modified Step 4 Let
Ct = w1 , w2 , . . . , wm/2
be the m/2 neighbors of vt of largest degree from {1, . . . , Ψvt } where Ψ := (log log n)10 .
For rounds τ + 1, τ + 2, . . . , the behavior of NARROW-DCA(τ ) is the same as for DCA.
Notice that NARROW-DCA “cheats” by using the indices of the vertices, which we do not
actually expect to be able to use. Nevertheless, we will see later that w.h.p., for τ = 2ω log4/3 n,
the path of this algorithm is the same as for the DCA algorithm, justifying its role in our analysis.
3.1
Analyzing one step
Our analysis of one step of the main loop consists of the following lemma:
Lemma 3.2. Let ρt be the ratio of vt+1 /vt which appears in a run of the algorithm NARROWDCA(t). Then for all t ≤ T0 (see (13)), we have that
E(ρt ) ≤
3
4
and
Pr (ρt ≥ Ψ) ≤
1
.
log2 n
(19)
The first statement ensures that NARROW-DCA(t) makes progress in expectation in the tth
jump. The second part of this statement implies by induction that for any t ≤ ω log n, the
behavior of NARROW-DCA(t) is identical to the behavior of the DCA algorithm for the first
t steps. Thus together these statements give (14).
To prove Lemma 3.2, we will prove a stronger statement which is conditioned on the history of
the algorithm at time t. The history Ht of the process at the end of step t consists of
11
(H1) The sequence v1 , v2 , . . . , vt .
(H2) The left-choices λ(vs , 1), λ(vs , 2), . . . , λ(vs , m), 1 ≤ s < t and the corresponding left neighbors NL (vs ) = {u1,s , u2,s , . . . , um,s }. These are the m ℓ′i s that correspond to the m ri ’s
associated with vs as defined at the beginning of Section 2.1.
(H3) The lists u′1,s , u′2,s , . . . , u′r,s of all vertices u′k,s which have the property that (i) vs ∈ NL (u′k,s)
and (ii) u′k,s ≤ Ψvs for 1 ≤ s < t. (It is important to notice that s < t here.)
(H4) The values ηvi and the intervals Ivi for i = 1, 2, . . . , t.
(H5) The values ηw and the intervals Iw and the degrees deg(w), for w ∈
Here,
St
i=1
N(vi ).
N(v) = NL (v) ∪ NR (v) where NR (v) = {w ≤ Ψv : v ∈ NL (w)} .
We note that at any step t, and for a fixed random sequence used in the NARROW-DCA(t)
algorithm, Ht contains all random variables which have determined the behavior of the algorithm
so far, in the sense that if we modify any random variables from the random graph model
described in Section 2.1 while preserving all values in the history, then the trajectory of the
algorithm will not change. We write Ht to refer to a particular evaluation of the history (so that
we will be conditioning on events of the form Ht = Ht ).
Structure of the proof
The essential structure of our proof of Lemma 3.2 is as follows:
Part 1 We will define the notion of a typical history Ht .
Part 2 We will prove that for t ≤ T0 and any typical history Ht , random variables ηv which are
not explicitly exposed in Ht are essentially unconditioned by the event Ht = Ht (Lemma
3.3).
Part 3 We will prove by induction that Ht is typical w.h.p., for t ≤ T0 .
Part 4 We will use Part 2 and Part 3 to prove that for t ≤ T0 ,
E(ρt | Ht ) ≤
L3
2 21ηvt
+
+ 2
3
mL
m
and
Pr (ρt ≥ Ψ | Ht ) ≤
1
log2 n
(20)
by using using nearly unconditioned distributions of random variables which are not revealed in Ht to estimate the probabilities of various events. Here E(ρt | Ht ) is short for
E(ρt | Ht = Ht ). (Note that ηvt in (20) is simply a real number determined by Ht .) In this
context, we always work under the assumption that Ht is typical.
12
Part 5 We will also prove for t ≤ T0 that
E(ηvt+1 ) ≤ 4m.
(21)
Now the expected value statement in (19) follows from (21) and the first part of (20), by removing
the conditioning on Ht .
Part 1
Let Pt denote the sequence of vertices v1 , v2 , . . . , vt determined by the history Ht . We now
define the notion of a typical history Ht . For this purpose, we consider the reordered values
(t)
(t)
(t)
0 ≤ λ1 < λ2 < · · · < λN (t) where
n
o
(t)
(t)
(t)
(t)
Λ0 = λ1 , λ2 , . . . , λN (t) = {λ(vs , i) : 1 ≤ s ≤ t, 1 ≤ i ≤ m} .
(t)
(t)
Given this we define v = vj to be the index such that λj ∈ Iv and then let
n
o
(t)
(t)
VL = vj : 1 ≤ j ≤ N(t) .
We also define
(t)
VR = {v : v ∈ NR (Pt )}
Now let us reorder
n
o
(t)
(t)
(t)
(t)
(t)
V (t) = x1 < x2 < · · · < xM (t) = VL ∪ VR .
(t)
(t)
We define the extreme points x0 = 0 and xM (t)+1 = n + 1 and define
M (t)+1
(t)
Xj
=
(t)
[xj−1
+
(t)
1, xj
− 1] and X
(t)
=
(t)
[
Xj = [n] \ V (t)
(t)
(t)
and Nj = |Xj |,
j=1
(t)
Uj = [Wx(t)
j−1 +1
, Wx(t) −1 ] and U (t) =
j
N
[
(t)
Uj
(t)
(t)
and Lj = |Uj |.
j=1
A typical history Ht , t ≤ T0 is now one with the following properties:
(S1) There do not exist s1 , s2 ≤ t such that either (i) s1 ≤ t − 2 and vs1 and vs2 are neighbors
or (ii) s1 ≤ t − 3 and there exists a vertex w such that w ∈ N(vs1 ) ∩ N(vs2 ). (We say that
the path is self-avoiding.)
(S2) The points of Λ(t) are well-separated, in the following sense:
(
(t)
log2 n
xj−1 ≥ log30 n.
(t)
(t)
|xj − xj−1 | ≥
log1/400 n Otherwise.
13
(22)
We observe that
(T1) If Ht is typical then vj+1 is chosen from X (j) for all j < t.
(t)
(t)
(T2) Each Uj is the union of intervals Iv , v ∈ Xj .
Part 2
We prove the following:
Lemma 3.3. For any vertex v ∈ X (t) , any interval R ⊆ R, and any typical history Ht , we have
that v ∈
/ Pt ∪ N(Pt ) implies
Pr (ηv ∈ R | Ht ) ∼ Pr (ERL(m) ∈ R) .
(23)
The following lemma is the starting point for the proof of Lemma 3.3.
(t)
Lemma 3.4. Let j ∈ [M(t)+1], let Ht be any typical history, and let X ′ be the value of Xj in Ht .
Then the distribution of the random variables ηv , v ∈ X ′ conditioned on Ht = Ht is equivalent
to
of the random variables ηv , v ∈ X ′ conditioned only on the relationship
P the distribution
2
2
v∈X ′ ηv = A1 − A0 , where A1 , A0 are the values of Wx(t) −1 and Wx(t) +1 , respectively, in Ht .
j
j−1
Proof. Suppose we fix everything except for ηv , v ∈ X ′ . By everything we mean every other ηw
and all of the λ(v, i) and the random bits we use to make our choices in Step 5 of DCA; we
′
′
′
let Ht be the corresponding
Phistory. Suppose now that we replace ηv , v ∈ X with ηv , v ∈ X
without changing the sum v∈X ′ ηv . Then Wx(t) +1 remains the same, as it depends only on ηv
j−1
for v ∈
/ X ′ , and thus Wx(t) −1 remains the same as well, since the difference A21 − A20 is unchanged.
j
In particular, this implies that Ht remains a valid history. We confirm this by induction. Suppose
that Hs , s < t remains valid. We first note that because the λ(vs , i) are unchanged, none of vs′ s
(t)
left neighbors are in Xj . Also, NR (vs ) and the vertex degrees for w ∈ NR (vs ) will not be affected
(t)
by the change, even if vs < min Xj . So Hs+1 will be unchanged, completing the induction.
We are now ready to prove Lemma 3.3.
(t)
(t)
Proof of Lemma 3.3. Suppose that v ∈ X ′ = Xj , then M = Nj
Lemma 3.4 to write
Pr(ηv ≤ x | Ht ) = Pr ηv ≤ x
X
w∈X ′
14
ηw =
A21
−
≥ ζn → ∞. We now use
A20 ,
!
where A1 and A0 are the values of Wx(t) −1 and Wx(t)
j
j−1)+1
, respectively, in Ht , so that A1 − A0 is
(t)
the value of Lj in Ht .
Now from (P1) we have that A := A21 − A22 ∈ [(1 − ε)mM, (1 + ε)mM] for M = |X ′ | w.h.p., for
any ε > 0. Thus we fix any µ ∈ [(1 − ε)mM, (1 + ε)mM] and show that
!
X
ηw = µ = (1 + O(ε)) Pr (ERL(m) ≤ x) .
Pr ηv ≤ x
w∈X ′
The lemma follows since ε is arbitrary.
We write
Pr ηv ≤ x
X
w∈X ′
x
ηw = µ
!
η m−1 e−η (µ − η)(M −1)m−1 e−(µ−η) (Mm − 1)!
·
· M m−1 −µ dη
((M − 1)m − 1)!
µ
e
η=0 (m − 1)!
(M −1)m−1 Q
Z x m−1 −η
1 − µη
eη m
i=1 (Mm − i)
η
e
·
dη
=
µm
η=0 (m − 1)!
2
Z x m−1 −η
m
η
η
η
e
dη
·
1
+
O
· exp η − ((M − 1)m − 1)
+O
=
µ
µ2
M
η=0 (m − 1)!
Z x m−1 −η
η
e
= (1 + O(ε))
dη.
η=0 (m − 1)!
=
Z
Here we used that Ht typical implies that M ≥ log1/400 n → ∞.
Part 3
In the next section we will need a lower bound on vt+1 . Let
(
1
v ≥ log30 n
log3 n
φv =
1
. v < log30 n.
(log log n)3
Lemma 3.5. W.h.p. ρt ≥ φvt for 1 ≤ t ≤ T0 .
Proof. The values of λ(vt , i), i = 1, 2, . . . , m are unconditioned by Ht , see (H2). It then follows
from (P2) that if vt ≥ log30 n then
Pr(vt+1 ≤ φvt vt | Ht ) . m
Wφvt
m
. mφ1/2
.
vt =
Wvt
log3/2 n
There are O(ω log n) choices for t and so this deals with vt ≥ log30 n.
15
(24)
Now there are O(log log n) choices of t ∈ [T1 , T0 ] for which vt ≤ log30 n. In this case we can
replace the RHS of (24) by 1/(log log n)3/2 .
We will also need to bound the size of NR (vt ) for all t.
Lemma 3.6. W.h.p., for all t ≤ T0 ,
|NR (vt )| ≤
(
log3 n
(log log n)20
vt ≥ log30 n.
vt ≤ log30 n.
Proof. The size of NR (v), v = vt is stochastically bounded by Bin(Ψv, ηv /v). This is because if
w ∈ NR (v) then w ≤ Ψv. Also, for any such w, the probability that it has v as a left neighbor
is at most mwv /Ww . ηv /(vw)1/2 ≤ ηv /v. This uses property (S1) to see that the values of
λ(w, i), i = 1, 2, . . . , m are unconditioned by Ht . Thus, if θv = log3 n if v ≥ log30 n and equal to
(log log n)20 otherwise,
θ
ηv θv
Ψv
eΨηv v
Pr(|NR (v)| ≥ θv | Ht ) ≤
≤
.
(25)
θv
v
θv
3
If v ≥ log30 n then the RHS of (25) is at most (e/ log n)log n which is clearly small enough to han20
dle T possible values for t. If v < log30 n then the RHS of (25) is at most (40e/(log log n)9 )(log log n)
which is small enough to handle O(ω log log n) possible values for t such that v < log30 n.
Continuing Part 3, we now show that the DCA walk doesn’t contain cycles.
Lemma 3.7. W.h.p. the path Pt , t ≤ T0 is self avoiding.
Proof. We proceed by induction and assume that the claim of the lemma is valid up to time
t − 1. Now consider the choice of vt .
Case 1: There is an edge vs vt where s ≤ t − 2:
(a): vt ∈ NL (vs ) ∩ NL (vt−1 ).
We bound the probability of this (conditional on E, Ht ) asymptotically by
X X mwv
X X
ηv
.
.
Wvt−1
2(vvt−1 )1/2
s∈[t−2] v∈NL (vs )
(26)
s∈[t−2] v∈NL (vs )
Here, and throughout the proof of Case 1, v denotes a possibility for vt and mwv /Wvt−1 bounds
the probability that vt−1 chooses v. Remember that these choices are still uniform, given the
history.
We split the sum in (26) as
X
X
s∈[t−2] v∈NL (vs )
vs >log30 n
ηv
+
2(vvt−1 )1/2
X
X
s∈[t−2] v∈NL (vs )
vs ≤log30 n
16
ηv
.
2(vvt−1 )1/2
Consider the first sum. There are less than t choices for s; m choices for v and ηv ≤ log n. Now
v ∈ NL (vs ) and Lemma 3.5 implies that v ≥ log27 n. So we can bound the first sum by
1
1
1
.
=o
(# of s) · (# of v) · (max ηv ) · 1/2 ≤ T0 · m · log n ·
v
log11 n
log27/2 n
Summing this estimate over t ≤ T0 gives o(1).
For the second sum, we bound the number of choices of s by O(ω log log n) and ηv by O(log log n),
since v ≤ vs . We use the fact (see Section 3.2) that vt−1 ≥ log1/100 n. So we can therefore bound
the second sum by
1
1
1
(# of s) · (# of v) · (max ηv ) · 1/2 ≤b ω log log n · m · log log n ·
=o
.
log1/200 n
log1/300 n
vt−1
(We use A ≤b B in place of A = O(B).)
There are O(ω log log n) choices for T0 ≥ t > s ≥ T1 and so we can sum this estimate over choices
of t.
(b): vt ∈ NL (vs ) ∩ NR (vt−1 ).
Using vt ∈ NR (vt−1 ), we bound the probability of this asymptotically by
X
X
s∈[t−2] v∈NL (vs )
vs >log30 n
ηvt−1
+
2(vvt−1 )1/2
X
X
s∈[t−2] v∈NL (vs )
vs ≤log30 n
ηvt−1
.
2(vvt−1 )1/2
For the first sum we use the argument of Case (a) without any change, except for bounding ηvt−1
by log n as opposed to bounding ηv by the same. This gives a bound
1
1
1
(# of s) · (# of v) · (max ηvt−1 ) · 1/2 ≤b T0 · m · log n ·
.
=o
v
log11 n
log27/2 n
This is small enough to inflate by the number of choices for t.
For the second sum we split into two cases: (i) vt−1 ≥ log30 n and (ii) vt−1 < log30 n. This enables
us to control ηvt−1 . For the first case we obtain
1
1
1
(# of s) · (# of v) · (max ηvt−1 ) · 1/2 ≤ ω log log n · m · log n ·
=o
.
log15 n
log13 n
vt−1
The RHS is small enough to handle the O(ω log n) choices for t.
For the second case we obtain
(# of s) · (# of v) · (max ηvt−1 ) ·
1
1/2
vt−1
≤ ω log log n · m · log log n ·
1
log1/200 n
The RHS is small enough to handle the O(ω log log n) choices for t.
17
=o
1
log1/300 n
.
(c): vt ∈ NR (vs ) ∩ NL (vt−1 ).
Using vt ∈ NL (vt−1 ), we bound the probability of this asymptotically by
X
X
X
X
ηv
ηv
+
.
1/2
2(vvt−1 )
2(vvt−1 )1/2
s∈[t−2] v∈NR (vs )
vs ≤log29 n
s∈[t−2] v∈NR (vs )
vs >log29 n
For the first sum we use v ≥ vs and the argument of Case (a) without change, but notice we
split over vs > log29 n or not here. This gives a bound of
1
1
1
(# of s) · (# of v) · (max ηv ) · 1/2 ≤ T0 · m · log n ·
=o
.
v
log12 n
log29/2 n
For the second sum we use v ≤ Ψvs to bound v by log30 n. We also use Lemma 3.6 to bound the
number of choices of v by (log log n)20 . This gives a bound of
1
1
1
20
.
(# of s)·(# of v)·(max ηv )· 1/2 ≤b ω log log n·(log log n) ·log log n· 1/200 = o
log
n
log1/300 n
vt−1
(d): vt ∈ NR (vs ) ∩ NR (vt−1 ).
Using vt ∈ NR (vt−1 ), we bound the probability of this asymptotically by
X
X
s∈[t−2] v∈NR (vs )
vs >log30 n
ηvt−1
+
2(vvt−1 )1/2
X
X
s∈[t−2] v∈NR (vs )
vs ≤log30 n
ηvt−1
.
2(vvt−1 )1/2
For the first sum we use v ≥ vs and Lemma 3.6 to bound the number of choices for v and then
we have a bound of
1
1
1
3
.
=o
(# of s) · (# of v) · (max ηvt−1 ) · 1/2 ≤ T0 · log n · log n ·
v
log15 n
log9 n
For the second sum we split into two cases: (i) vt−1 ≥ log30 n and (ii) vt−1 < log30 n. This enables
us to control ηvt−1 . We also use Lemma 3.6 to bound the number of choices for v in each case.
Thus in the first case we have the bound
1
1
1
3
(# of s) · (# of v) · (max ηvt−1 ) · 1/2 ≤b ω log log n · log n · log n ·
=o
.
log15 n
log10 n
vt−1
In the second case we have
(# of s)·(# of v)·(max ηvt−1 )·
1
1/2
vt−1
20
≤b ω log log n·(log log n) ·log log n·
1
log1/200 n
=o
1
log1/300 n
Case 2: There is a path vs , v, vt where s < t.
The calculations that we have done for Case 1 carry through unchanged. We just replace vt−1 by
vt throughout the calculation and treat v as an arbitrary vertex as opposed to a choice of vt .
18
.
(t)
The xj are separated
We now prove that w.h.p. points λi are well-separated. Let
J1 = j : vj ≥ log30 n .
Lemma 3.8. Equation (22) holds w.h.p. for all t ≤ T0 .
Proof. We consider cases.
(t)
(t)
(t)
Case 1: xj−1 , xj ∈ VR .
For this we write
ζv,w =
(
log2 n
min {v, w} ≥ log30 n.
.
log1/300 n Otherwise.
Pr(∃1 ≤ s ≤ t, v ∈ NR (vs ), w ∈ NR (vt ) : |v − w| ≤ ζv,w | E, Ht) ≤
X
X
ηvs ηvt
.
(vs vt vw)1/2
1≤s≤t≤T
0
≤
≤
X
v∈NR (vs ),w∈NR (vt )
|v−w|≤ζv,w
X
ζv,w ηvs ηvt
(v − ζv,w )(vs vt )1/2
(27)
1≤s≤t≤T0 v∈NR (vs )
∗
X ζs,t
ηvs ηvt |NR (vs )|
2
.
(vs vt )1/2
1≤s≤t≤T0
(28)
∗
Here ζs,t
will be a bound on the possible value of ζv,w in (27).
Case 1a: max {vs , vt } ≥ log29 n:
∗
In this case ζs,t
≤ log2 n and we can bound the summand of (28) by
∗
ζs,t
· log2 n · log3 n ·
1
log
29/2
n
=
1
log
15/2
n
.
Multiplying by a bound T02 on the number of summands gives a bound of o(1). Here, and in the
next case, we use Lemma 3.6 to bound |NR (vs )|.
Case 1b: max {vs , vt } < log29 n:
Here we have max {v, w} ≤ Ψ log29 n ≤ log30 n. In this case we can bound the summand of (28)
by
1
(log log n)5
1/300
2
20
log
n · (40m log log n) · (log log n) ·
.
=o
log1/100 n
log1/200
We only have to inflate this by (T0 − T1 )2 = O((ω log log n)2 ). This completes the case where
(t)
(t)
xj−1 , xj ∈ R(t) .
19
(t)
(t)
(t)
Case 2: xj−1 , xj ∈ VL
We first show that the gaps λj − λj−1 are large. Define
β1 =
and
log1/300 n
log15/2 n
and
β
=
.
2
n1/2
n1/2
(
β1
εj =
β2
and
σ1 =
λj = λ(vt , i), vt ∈ J1 .
otherwise.
1
log
15/2
n
and σ2 =
1
log
1/200
n
.
We drop the superscript t for the rest of the lemma.
Claim 3.9.
Pr(∃λj ∈ Λ0 : λj−1 > λj − εj | Ht ) = o(1).
Proof of Claim 3.9. This follows from the fact that
Pr(∃j : λj−1 > λj − εj ) ≤ o(1) + (1 + o(1))(m2 T12 σ1 + m2 (T0 − T1 )(T1 σ1 + (T0 − T1 )σ2 )).
We have fewer than m2 T12 choices for s = τ (j − 1), t = τ (j) ∈ J1 . Assume first that s < t.
Given such a choice, we have that w.h.p. Wvt & log15 n/n1/2 by (P2). Now λj will have been
chosen uniformly from 0 to ≈ Wvt and so the probability it lies in [λj−1, λj−1 + εj ] is at most
≈ β1 /Wvs , which explains the term m2 T12 σ1 . If s > t then we repeat the above argument with
[λj−1 , λj−1 + ε1 ] replaced by [λj − ε1 , λj ]
The term m2 (T0 − T1 )T1 σ1 arises in the same way with j − 1 ∈ J1 , j ∈
/ J1 or vice-versa.
The term m2 (T0 − T1 )2 σ2 arises from the case where j − 1, j ∈
/ J1 . Here we can only assume
1/200
1/2
that Wj & log
n/n . This follows from (P2), (P4) and Lemma 2.2 and the fact that
we exit the main loop with SUCCESS when we see a vertex of degree at least n1/2 / log1/100 n.
Assuming that s < t we see that the probability that λj lies in [λj−1 , λj−1 + ε2 ] is at most
β2 /Wvt ∼ β2 /(log1/200 n/n1/2 ) = o(1).
Given the Claim and (P4), (P5) we have that w.h.p.
(
n
1
β1 − log
1/2 ≥ 2 β1
n
Wv(t) −1 − Wv(t) +1 ≥
log n
j
j−1
≥ 21 β2
β2 − 40mnlog
1/2
j ∈ J1 .
j∈
/ J1
(29)
Now,
Wv(t) −1 − Wv(t)
j
j−1 +1
=
Υm(τ (j)−1)
Υmn+1
1/2
−
Υm(τ (j−1)+1)
Υmn+1
20
1/2
=
Υm(τ (j)−1) − Υm(τ (j−1)+1)
1/2
1/2
1/2
Υmn+1 (Υm(τ (j)−1) + Υm(τ (j−1)+1) )
.
Or,
(
β1 n1/2
1/2
1/2
1/2
ηu = (Wv(t) −1 − Wv(t) +1 )Υmn+1 (Υm(τ (j)−1) + Υm(τ (j−1)+1) ) ≥
j
j−1
β2 n1/2
(t)
j ∈ J1 .
.
j∈
/ J1
X
u∈Xj
It follows that w.h.p.
(t)
|xj−1
(t)
(t)
(t)
−
(t)
xj |
=
(t)
|Xj |
≥
(
β1 n1/2
log n
β2 n1/2
40m log log n
j ∈ J1 .
j∈
/ J1
.
(t)
Case 3: xj ∈ VL , xj−1 ∈ VR
Let θv = β1 , v ≥ log30 n and θv = β2 otherwise. We write
ηvs
wv + 2θv
·
1/2
(vvs )
Wvt
s,t,v,k
X ηv ηv
2n1/2 θv ηvs
s
+
.(30)
.
v(vs vt )1/2
v(vs vt )1/2
s,t,v,k
Pr(∃s < t, v, k : v ∈ NR (vs ), λ(vt , k) ∈ Iv ± θv | E, Ht ) ≤
X
We bound the sum in the RHS of (30) as follows: If max {v, vs } ≥ log30 n then we bound the
first sum by
n
X
1
1
1
2
≤b (ω 2 log2 n) · log2 n · log n ·
= o(1).
(#s, t, k) · log n ·
·
15
v log n
log15 n
v=1
We bound the second sum by
n
X
1
1
1
15/2
(#s, t, k) · 2 log
n · log n ·
·
≤ (ω 2 log2 n) · log15/2 n · log n · log n ·
= o(1).
15
15
v
log
n
log
n
v=1
When max {v, vs , vt } < log30 n we bound the first sum by
log30 n
(#s, t, k) · (40 log log n)2 ·
X 1
1
≤b
·
1/200
v log
n
v=1
(ω log log n)2 · (log log n)2 · log log n ·
1
log
1/200
log
1/200
n
= o(1). (31)
We bound the second sum by
log30 n
(#s, t, k) · log
1/300
n · 40 log log n ·
X 1
1
≤b
·
1/200
v
log
n
v=1
(ω log log n)2 · log1/300 n · log log n ·
1
n
= o(1). (32)
Finally, if max {v, vs } < log30 n ≤ log30 n then we have to replace (#s, t, k) in (31), (32) by
1/2
O(ω 2 log n log log n). But this is compensated by a factor 1/vt ≤ 1/ log15 n.
It follows that (29) holds w.h.p. and the proof continues as for Case 2.
21
Part 4
We now assume t ≤ T0 . We begin by showing that DCA only uncovers a small part of the
distribution of the η’s.
Let Ξt = Pt ∪ N(Pt ) and
St,j =
X
wv .
v∈Ξt
Lemma 3.10. W.h.p., St,j = o(Wj ) for log1/100 n ≤ j and 1 ≤ t ≤ T0 .
Proof. Assume first that j ≥ log30 n. It follows from (P2), (P3), (P5) and Lemma 3.6 that
w.h.p.
max ηvs
T0 log n(m + log3 n)
ω log5 n
St,j ≤ T0 ×
× (m + max |NR (vs )|) .
=O
.
n1/2
2mn1/2
n1/2
10
1/2
log n
j
.
=Ω
Wj ≥ (1 − o(1))
n
n1/2
This completes this case. Now assume that j ≤ log30 n. (P2), (P3), (P4) and Lemma 3.6 that
w.h.p.
1/2
ω log4/3 log n
j
20
St,j . 40m log log n ×
× (m + (log log n) ) ≪ Wj ∼
1/2
2mn
n
for log1/100 n ≤ j ≤ log30 n.
Dealing with left neighbors
The calculation of the ratio ρt takes contributions from two cases: where vt+1 is a left-neighbor
of vt , and where vt+1 is a right-neighbor of vt .
Lemma 3.11.
2
E(ρt 1vt+1 <vt | Ht ) ≤ .
3
Proof. Let D denote the (m/2)th largest degree of a vertex in NR (vt ). We write
X
E(ρt 1vt+1 <vt | Ht | D = d) Pr(D = d)
E(ρt 1vt+1 <vt | Ht ) =
d
ζd
≤
E
vt
d
ζD
,
=E
vt
X
22
Pr(D = d)
where ζd is the index of the smallest degree left neighbor of vt that has degree at least d. We
let ζd = 0 if there are no such left neighbors. We now couple ζ with a random variable that is
independent of the algorithm and can be used in its place.
Going back to Section 2.1 let us associate ℓk for k ≥ ω with an index µk chosen uniformly from
[⌊k/m⌋]. In this way, vertex i ≥ ω is associated with m uniformly chosen vertices ai,1 , ai,2 , . . . , ai,m
in [i − 1]. Furthermore, we can couple these choices so that if NL (i) = {bi,1 , bi,2 , . . . , bi,m } then
given we have (i) Pr(bi,j ≤ ai,j ) ≥ 1 − o(1) and (ii) bi,j ≤ 2ai,j for all i, j. This because
Pr(bi,j ≤ k) ∼ Wk /Wi ∼ (k/i)1/2 (giving (i)) and (k/i)1/2 ≥ k/i and (1 − o(1))(k/i)1/2 ≥ k/2i
(giving (ii)).
So now let µ be the index of the uniform choice associated with the largest degree left neighbor
of vt that has degree at least D. Thus
ζD
µ
1
2
.E
= + o(1) ≤ .
E
vt
vt
2
3
Dealing with right neighbors
It will be more difficult to consider the contribution of right-neighbors. In preparation, for
λ0 ≤ γ ≤ 1 − 1/m we define
∆iγ := m + γmζ(i)
where ζ(i), ζ + (i) are defined in (9), (10) respectively. We note that ηi ζ(i) is a lower bound for
the expected degree of vertex i, i ≥ ω, see Lemma 2.2(a). Note also that ηi ζ + (i) is an upper
bound for the expected degree of vertex i, i ≥ ω.
The parameter ∆iγ is a degree threshold. For a suitable parameter γ, we wish it to be the case
that there should be many left-neighbors but few right-neighbors which have degree greater than
∆iγ . We define
γi∗ = max γ : j ∈ NL (i) : dn (j) ≥ ∆iγ ≥ m/2 .
∆vγtv∗ is a lower bound on the degree needed for vertex j > vt to be considered by DCA as the
t
next vertex; thus we proceed by analyzing the distribution of γv∗t . We first derive upper bounds
for Pr(γv∗t ≤ γ | Ht ).
Lemma 3.12. There exists c1 > 0 such that
1/2
)c1 m + me−c1 γ
Pr(γv∗t ≤ γ | Ht ) . (γ 1/2 e1−γ
1/2
)c 1 m
Pr(γv∗t ≤ 45 | Ht ) . e−c1 m .
Pr(γv∗t ≥ γ | Ht ) . γ −c1 m ,
2
1
, 0≤γ≤ .
8
1
−c1 /γ 1/2
+ me
, 0≤γ≤ .
8
Pr(γv∗t ≤ γ | Ht ) . (γ 1/2 e1−γ
2
5
γ ≥ 10 .
23
1/2 m
(33)
(34)
(35)
(36)
Proof. For j < vt , we define events Aj = ηj ≤ γ 1/2 m and Dj = dn (j) ≤ ∆vγt . We need to
T
estimate Pr
j∈S Dj for subsets S ⊆ NL (vt ) of size m/2. We write
\
j∈S
Dj ⊆
\
(Aj ∪ (Āj ∩ Dj )) ⊆
j∈S
\
Aj ∪
j∈S
[
(Āj ∩ Dj ).
(37)
j∈S
Now, using inequality (6) and equation (23), we see that if 0 ≤ γ ≤ 1/8 then for j < vt ,
Pr(ηj ≤ γ 1/2 m | Ht ) . m(γ 1/2 e1−γ
1/2
)m .
(38)
The RHS of (38) includes a factor of 1 + o(1) due to conditioning on E, Ht .
So,
Pr
\
Aj
j∈S
Ht
!
. (m(γ 1/2 e1−γ
1/2
)m )|S| .
(39)
Furthermore, because j ∈ NL (vt ) implies that i ≥ j and hence ζ(vt ) ≤ ζ(j),
Pr((dn (j) ≤ ∆iγ ) ∧ Āj | Ht ) ≤ Pr (dn (j) − m ≤ γmζ(j) | Ht ) Pr(ηj > γ 1/2 m|Ht )
(1 − γ 1/2 )2 1/2
γ mζ(j) .
. exp −
2
(40)
Explanation of (40): We remark first that the conditioning on E, Ht only adds a (1+o(1)) factor
to the upper bound on our probability estimate. We now apply Lemma 2.2(b) with 1 − α = γ
and ηj ≥ γ 1/2 m.
From (37) (summing over all m/2 subsets of NL (vt )) and (40) (summing over NL (vt )) we obtain
Pr(γv∗t ≤ γ | Ht ) = Pr(| j ∈ NL (vt ) : dn (j) ≤ ∆iγ | ≥ m/2| | Ht ) .
m/2
(1 − γ 1/2 )2 1/2
m
1/2 1−γ 1/2 m
2 (m(γ e
) )
+ m exp −
γ mζ(vt ) . (41)
2
We observe that j ∈ NL (vt ) implies that dn (j) ≥ m + 1. So,
m + 1 < ∆iγ implies ζ(vt ) >
1
.
mγ
(42)
m/2
1/2
2
1/2 1−γ 1/2 m
Using (42) in (41) verifies (34), after bounding 2 (m(γ e
) )
by (γ 1/2 e1−γ )c1 m .
m
From (37) and (40),
Pr(γv∗t ≤ γ | Ht ) . (m(γ 1/2 e1−γ
1/2
)m )m/2 +
(1 − γ 1/2 )2 1/2
γ mζ
+ Pr(A1 | Ht ) + Pr(Ā1 | Ht ) m exp −
2
−1
24
9n
10
(43)
Here
A1 =
9n
NL (vt ) ∩
10
m
≥
4
.
Explanation of (43): The first term is from (39). If Ā1 holds then vt has at least one left
neighbor j ≤ 9n/10. The final term comes from using (40) and ζ(j) ≥ ζ(9n/10). The factor
Pr(Ā1 )−1 handles the conditioning on Ā1 . The factor m is the union bound for choices of j.
Now NL (vt ) ∩ 9n
is dominated by the binomial Bin(m, n/10) and so Pr(A1 | Ht ) ≤ e−d1 m .
10
Now ζ(9n/10) ≥ 1/20 and plugging these facts into (43) yields (33). Here we have absorbed the
1/2
e−d1 m term into me−c1 γ m and we will do so again below.
We continue with the proof of (35). For j ∈ NL (vt ), we observe that if dn (j) ≤ ∆vγt and γ ≤ 54
then
5m
dn (j) − m ≤
ζ(vt ).
4
We now estimate the probability that a uniform random choice of j ∈ NL (vt ) (for fixed Ht , which
determines vt ) has certain properties.
We first observe that
W3i/5
3i
Pr j ≥
Ht . 1 −
∼
5
Wvt
1/2 !
2
3
< .
1−
5
5
(44)
(For this we used (P2).)
Now (6) implies that
Pr(ηj ≤ 0.99m | Ht ) ≤ e−d2 m .
(45)
Moreover, for ηj > 0.99m and j < 3vt /5, we have
ζ(j)
=
ζ(vt )
1/2
vt
j
where
ε=
Thus we have
1−
1−
j 1/2
−ε
n
1/2
vt
−ε
n
!
1/2
vt
≥
j
5L log log n
.
ω 3/4 log n
(46)
1/2
5
E(dn (j) − m | Ht ) ≥ ηj ζ(j) & 0.99m
ζ(vt).
3
Now 0.99 × (5/3)1/2 = 1.278.. > 1.01 × 5/4 and so
ζ(j)ηj
5ζ(vt )
Ht ≤ Pr dn (j) − m ≤
Pr dn (j) − m ≤
4
1.01
25
Ht
≤ e−d3 ηj ζ(j) ≤ e−d4 m
(47)
using Lemma 2.2(b). It follows from (44) and (45) and (47) that
5
m
2
∗
−d2 m
−d4 m
Pr γvt <
≥
≤ e−d3 m .
Ht ≤ Pr Bin m, e
+e
+
4
5
2
This completes the proof of (35).
To deal with (36) we observe that if dn (j) ≥ ∆vγt and γ ≥ 105 then
vt
j ∈ NL (vt ) and j ≤ 1/2
γ
But
or
ηj ≥ γ
1/2
1/2
j
m
≥ γ 1/4 m or dn (j) − m ≥ γ 3/4 ηj ζ(j).
vt
vt
Pr j ∈ NL (vt ) and j ≤ 1/2
γ
Ht
And, using (P3) and γ ≥ 105 ,
Pr ηj ≥ γ
1/4
m Ht
.
vt
X
l=2vt /γ
wl
Wvt
.
Z
Wvt /γ 1/2
1
. 1/4 .
Wvt
γ
∞
ηl =γ 1/4 m
(48)
ηlm e−ηl
dηl
(m − 1)!
1/4
vt
X
e−γ m
.
2(vt l)1/2
l=2vt /γ
. e−γ
1/4 m
.
(49)
Lastly, using (44), (45) and Lemma 2.2(d) and ζ + (j) . ζ(j) for j ≤ 3n/5 we have
2
3/4
Pr dn (j) − m ≥ γ 3/4 ηj ζ(j) | Ht ≤ + e−d2 m + e−γ η ≤ 0.41.
5
(50)
It follows from (48), (49) and (50) that
1
m
∗
−γ 1/4 m
Pr γvt ≥ γ | Ht . Pr Bin m, (1 + o(1))
. e−d3 m .
+e
+ 0.41
≥
γ 1/4
2
This completes the proof of the lemma.
Corollary 3.13. W.h.p. γv∗s ≥ 1/(log log n)2 for s = 1, 2, . . . , T = O(log n).
Proof. The value of γv∗s is determined when vs is first visited and in this case we can apply Lemma
3.12. In which case the result follows directly from (34).
We now have a handle on the distribution of γv∗t . We now put bounds on the expected number
of j > vt that can be considered to be a candidate for vt+1 , conditioned on the value of γv∗t . In
particular, we let
Dγvt = j > vt : dn (j) ≥ ∆vγt .
26
We will bound the size of Dγi by dividing Dγi into many parts bounding each part; in particular,
κ ∈ N we let
h
i
i, i2 ∩ D i
κ = 0.
γ
γ
i
(51)
Jγi,κ = h
i2 1 + κ−1 , i2 1 + κ ∩ D i 1 ≤ κ ≤ 2nγ 2 L .
γ
γ
L
γ
L
i
Note that Jγi,0 = ∅ if γ ≥ 1.
Finally, we let
rγi,κ
:=
|Jγi,κ |
rγi
and
:=
X
rγi,κ
and
siγ
:=
κ≥0
i X
κ + 1 i,κ
j≤ 2
rγ .
1+
γ κ≥0
L
i,κ
X X
(52)
κ≥0 j∈Jγ
Remark 3.14. We have that E m2 v1t svγt | Ht is an upper bound on the expectation of the ratio
, conditioned on the event that vt+1 > vt , since each right neighbor whose index is
ρt = vt+1
vt
included in the sum svγt has probability of at most m2 of being chosen by the algorithm.
3L3
Lemma 3.15. If vt ≤ n 1 − m then
E(rγvt | Ht ) ≤
svγt
E
| Ht
vt
Moreover,
≤
ηvt
L max {0, (1 − γ)} + 7 + 10Le−c2 γL .
γL
(53)
ηvt
L max {0, (1 − γ)} + 13 + 100Le−c2 γL .
3
γ L
If vt ≤ n/5 and κ ≥ (log log n)4 and γ ≥ 1/(log log n)2 then Pr(rγvt ,κ > 0) ≤
(54)
1
.
log2 n
(55)
Note that (55) implies the second inequality in (19).
Proof. Recall from Lemma 3.10 that w.h.p.,
ST,j = o(Wj ) for j ≥ log1/100 n.
(56)
We write
E(rγvt ,κ | Ht )
Z ∞ m−1 −ηj
X
ηj e
mwvt
.
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj
ηj =0 (m − 1)!
vt ,κ Wj − St,j
(57)
j∈Jγ
. ηvt
X
v ,κ
j∈Jγ t
1
2(vt j)1/2
Z
∞
ηj =0
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj .
(m − 1)!
27
(58)
Explanation of (57) and (58): We sum over the relevant j and fix ηj . We multiply by the
density of ηj and integrate. Using (56) we see that
mwvt
ηvt
mwvt
∼
∼
.
Wj − St,j
Wj
2(vt j)1/2
This is asymptotically equal to the expected number of times j chooses vt as a neighbor.
Thus
E(rγvt ,κ | Ht ) .
X
v ,κ
j∈Jγ t
where
(59)
ηjm−1 e−ηj
Ij =
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj ≤ 1.
ηj =0 (m − 1)!
Z
If m is large then
ηvt
Ij
2(vt j)1/2
∞
E rγvt ,0 | Ht
Continuing, for κ ≥ 1, we write:
(
0
. P
ηvt
v
j∈J0 t (γ) 2(vt j)1/2
.
ηvt 1−γ
γ
γ ≥ 1.
γ < 1.
Ij . A1 + A2 + A3 ,
(60)
(61)
where
A1 =
Z
A2 =
Z
A3 =
Z
(1−1/L)γm
ηj =0
(1+1/L)m
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | ηj dηj .
(m − 1)!
ηj =(1−1/L)m
∞
ηj =(1+1/L)m
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | ηj dηj
(m − 1)!
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | ηj dηj .
(m − 1)!
and then write rγvt ,κ = rγvt ,κ,1 + rγvt ,κ,2 + rγvt ,κ,3. Here rγvt ,κ,l is equal to the RHS of (59) with Ij
replaced by Al . The implicit
(1 + o(1)) factor in (61) arises from replacing
Pr dn (j) ≥ ∆vγt | ηj , Ht by Pr dn (j) ≥ ∆vγt | ηj in the integrals, i.e., ignoring the conditioning
due to Ht . Since j > vt , the only effect
of Ht is on Wj through wvt . Here we have that w.h.p.
ηvt
log n
vt 1/2
Wj ∼ n
= o(Wvt ).
and wvt ∼ 2m(vt n)1/2 = O 2m(v
1/2
t n)
Case 1: n1 ≤ vt < n/5:
Note that in this case
1
ζ(vt ) ≥
2
1/2
n
≥ 1.
vt
In the following we use Lemma 2.1 to estimate the integrals over ηj . We observe that
E(rγvt ,κ,1 | Ht )
28
(62)
.
X
ηvt
2(vt j)1/2
X
ηvt
2(vt j)1/2
v ,κ
j∈Jγ t
.
v ,κ
j∈Jγ t
Z (1− 1 )m m−1 −ηj
L
ηj e
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj ,
(m − 1)!
ηj =0
(
!
Z (1− 1 )m m−1 −ηj
L
ηj e
1
1 ≤ κ ≤ 10L,
·
dηj , (63)
(m − 1)!
(e(L/κ)1/2 )d0 γmζ(vt ) κ > 10L
ηj =0
Explanation of (63): We remark first that the conditioning on Ht only adds a (1 + o(1)) factor
to the upper bound on our probability estimate. We will use Lemma 2.2 to bound the probability
that degrees are large. Now with our bound on vt and within the range of integration, the ratio
of ∆vγt − m to the mean of dn (j) − m is
∆vγt − m
ζ + (j)
1/2
1−
γm vnt
=
1/2
ηj nj
1−
vt 1/2
n
1/2
− o(1)
γm j
≥
&
ηj vt
j 1/2
+
o(1)
n
1/2
κ−1
κ 1/2
L
1+
≥
when κ ≥ 10L. (64)
L−1
L
L
We then use (11) and Lemma 2.2(d) with β = (κ/L)1/2 .
Continuing, we observe that
1/2
κ 1/2
κ−1
1
1+
− 1+
≤
L
L
2L
and so
E(rγvt ,κ,1
ηv e−m/(2L
| Ht ) ≤ t
γvt 1/2
2)
ηv e−m/(2L
≤ t
γL
2)
1/2
1/2 !
κ+1
κ−1
vt
vt
×
1+
−
1+
L
L
(
!
1
1 ≤ κ ≤ 10L,
(e(L/κ)1/2 )d0 γmζ(vt ) κ > 10L,
(
!
1
1 ≤ κ ≤ 10L,
(e(L/κ)1/2 )d0 γmζ(vt ) κ > 10L.
(65)
·
(66)
Continuing, it follows from (65) that
X
v ,κ
j∈Jγ t
1
j 1/2
≤
vt 1/2
.
γL
E(rγvt ,κ,2 | Ht )
Z (1+1/L)m
X
ηjm−1 e−ηj
ηvt
vt
Pr
d
(j)
≥
∆
|
H
,
η
dηj
≤
n
t
j
γ
1/2
ηj =(1−1/L)m (m − 1)!
vt ,κ 2(vt j)
j∈Jγ
29
(67)
≤
X
v ,κ
j∈Jγ t
ηvt
2(vt j)1/2
1 n
o
d1 γmζ(vt )
× exp − L2
(e(L/κ)1/2 )d0 γmζ(vt )
1
ηvt −d1 γmζ(vt )/L2
× e
≤
γL
(e(L/κ)1/2 )d0 γmζ(vt )
κ ≤ 3,
4 ≤ κ ≤ 10L,
(68)
κ > 10L,
1 ≤ κ ≤ 3,
4 ≤ κ ≤ 10L,
κ > 10L.
(69)
where we have used (67).
Explanation for (68): We proceed in a similar manner to (64) and use
1/2
vt 1/2
n
vt
1
−
−
o(1)
γm
∆γ − m
vt
n
1
1
m.
=
≥ 1 + if κ ≥ 4, ηj ≥ 1 −
1/2
ζ + (j)
L
L
j 1/2
n
1− n
+ε
ηj j
Then we use Lemma 2.2(c),(d).
Continuing,
E(rγvt ,κ,3
| Ht ) ≤
X
v ,κ
j∈Jγ t
ηvt
2(vt j)1/2
Z
∞
ηj =(1+1/L)m
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj
(m − 1)!
(70)
We bound the integral in (70) by something independent of j and then as above, there is a factor
ηvt /γL arising from the sum over j.
For all 1 ≤ κ ≤ 80L + 1, we simply use the bound
Z ∞
ηjm−1 e−ηj
d2 m
dηj ≤ exp − 2 .
1
L
ηj =m(1+ L
) (m − 1)!
(71)
For κ ≥ 80L + 2, we split the integral from (70) into pieces B1κ , B2κ (whose definition depends on
κ), which we will bound individually.
In particular, we use
B1κ
=
Z
≤
Z
∞
ηj =m(1+ κ−1
L )
1/4
∞
ηj =m(1+ κ−1
L )
1/4
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj
(m − 1)!
ηjm−1 e−ηj
dηj
(m − 1)!
1/4
≤ e−d3 m(κ/L)
(72)
and
30
B2κ
m(1+ κ−1
L )
1/4
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | Ht , ηj dηj
=
1
ηj =m(1+ L
) (m − 1)!
1/4 ! 1/4 d4 γmζ(vt )
κ
−
1
eL
≤ Pr dn (j) ≥ ∆vγt Ht , ηj ≤ m 1 +
≤
(73)
L
κ1/4
Z
to bound the integral in (70) by B1κ + B2κ for all κ ≥ 80L + 2.
Therefore, gathering the many terms together (and using that κ ≤
on m large to allow crude upper bounding, we see that
2nLγ 2
vt
from (51)) and relying
γL
2
E(rγvt | Ht ) . L max {0, (1 − γ)} [from (60)] + 10Le−m/(2L ) [from (66)]
ηvt
2
2nLγ
X/i eL1/2 d0 γmζ(vt )
−d1 γmζ(vt )/L2
−m/(2L2 )
+ 10Le
[from (69)] + 2 + e
[from (66) and (69)]
1/2
κ
κ=10L
d2 m
+ 6[from (69)] + 100L exp − 2 [from (71)]
L
2
1/4 d4 γmζ(vt ) !
2nLγ /i
X
eL
1/4
+
[from (72) and (73)]. (74)
e−d3 m(κ/L) +
1/4
κ
κ=80L+2
We first observe that if vnt < γ102 then the summations κ = 10L, . . . , 2nLγ 2 /vt etc. above are
empty. For larger n/vt we can therefore assume that γm(n/vt )1/2 ≥ m which implies (see (62))
that γmζ(vt ) ≥ m/2 and then we can assume that
2nLγ 2 /vt
X eL1/2 d0 γmζ(vt )
1
≤
and
1/2
κ
1000
κ=10L
2nLγ 2 /vt
X eL1/4 d4 γmζ(vt )
1
≤
.
1/4
κ
1000
κ=80L+1
(75)
Plugging these estimates into (74) and making some simplifications, we obtain (53).
Going back to (52) we have
vt
2sγ
γ 3L
Ht ≤ L max {0, (1 − γ)}
E
ηvt
mi
−m/(2L2 )
+ 200Le
−d1 γmζ(vt )/L2
+ 100Le
2
2nLγ
X/vt 2κ eL1/2 d0 γmζ(vt )
L
κ1/2
κ=10L
1/4 d4 γmζ(vt ) !
eL
1/4
e−d3 m(κ/L) +
.
κ1/4
−m/(2L2 )
+ 2+e
2
2nLγ
X/vt 2κ
d
m
2
+ 12 + 104 L exp − 2 +
L
L
κ=80L+2
Making similar estimates to what we did for (75) gives us (54).
We obtain (55) from (P5), (66), (69), (72) and (73). Indeed, if Jγvt ,κ 6= ∅ then from its definition
2n
1/2
we must have vt ≤ 2Lγ
. Together with vt ≤ n/5 we obtain that ζ(vt ) ≥ 2Lκ1/2 γ . Thus, in this
κ−1
31
case,
eL1/2
κ1/2
d0 γmζ(vt )
eL1/2
(log log n)2
d0 m(log log n)2 /2L1/2
1
≤
=o
.
(76)
log10 n
This deals with the probabilities in (66) and (69). For (69) we rely m large to to show that
1/4
e−d3 m(κ/L) = o(1/ log10 n). Equation (72) is dealt with in a similar manner to (66). Here we
1/4 d4 γmζ(vt )
which is the square root of (76).
have eL
κ1/4
3
Case 2: n/5 ≤ vt ≤ n 1 − 3L
:
m
The upper bound on vt implies that
mζ(vt ) ≥ L3 .
Using the same definitions of rγvt ,κ,l , l = 1, 2, 3 as above:
X
E(rγvt ,κ,1
| Ht ) ≤
X X
≤
X X
κ≥1 j∈Jγvt ,κ
κ≥1
κ≥1 j∈Jγvt ,κ
ηvt
2(vt j)1/2
Z (1− 1 )m m−1 −ηj
L
ηj e
dηj ,
(m − 1)!
ηj =0
ηvt
2
e−m/(2L ) ,
1/2
2(vt j)
from Lemma 2.1(e),
1/2
ηvt n
2
≤
e−m/(2L )
γ vt
51/2 ηvt −m/(2L2 )
e
.
≤
γ
X
E(rγvt ,κ,2 | Ht )
κ≥1
.
X X
ηvt
2(vt j)1/2
Z
X X
ηvt
2(vt j)1/2
Z
κ≥1 j∈Jγvt ,κ
.
κ≥1 j∈Jγvt ,κ
(1+1/L)m
ηj =(1−1/L)m
(1+1/L)m
ηj =(1−1/L)m
2
X ηv −d5 γL
t
4e
≤
d γL3
γL
κ≥1
eL1/2 6
κ1/2
X
E(rγvt ,κ,3
| Ht ) ≤
κ ≤ 3,
4 ≤ κ ≤ 10L,
κ > 10L,
X X
κ≥1 j∈Jγvt ,κ
κ≥1
≤
ηjm−1 e−ηj
Pr dn (j) ≥ ∆vγt | ηj dηj
(m − 1)!
κ ≤ 3,
1 n
o
ηjm−1 e−ηj
d5 γmζ(vt )
4 ≤ κ ≤ 10L,
· exp − L2
(m − 1)!
(e(L/κ)1/2 )d6 γmζ(vt ) κ > 10L,
X X
κ≥1
v ,κ
j∈Jγ t
ηvt
2(vt j)1/2
Z
∞
ηj =(1+1/L)m
ηvt
−m/(3L2 )
e
,
2(vt j)1/2
32
ηjm−1 e−ηj
(m − 1)!
from Lemma 2.1(d),
1/2
ηvt −m/(3L2 ) n
e
≤
γ
vt
1/2
5 ηvt −m/(3L2 )
≤
e
.
γ
The above upper bounds are small enough to give the lemma in this case, without trouble.
We are now in a position to prove (20). We confirmed the second part of the statement (20)
above, using (55), so only the first part remains. The first part follows immediately from Lemma
3.11 and the following, by addition:
Lemma 3.16.
E(ρt 1vt+1 ≥vt | Ht ) ≤
Proof. We consider cases.
Case 1: n1 ≤ vt ≤ n 1 −
3L3
m
21ηvt
L3
+ 2.
mL
m
: Then,
E(ρt 1vt+1 ≥vt | Ht ) ≤ I1 + I2 + I3 + I4 ,
where
5/4
I1 =
Z
≤
Z
γ=1/8
5/4
γ=1/8
≤
E(ρt 1vt+1 ≥vt | γv∗t = γ)d Pr(γv∗t ≤ γ),
1000ηvt
m
−c1 m
2 × 83
× ηvt ×
mL
Z
,
≤ ηvt e
Z 10000
I2 =
γ=5/4
≤
I3 =
7L
+ 13 + 100Le−c2 γL
8
d Pr(γv∗t ≤ γ),
by Remark 3.14, Lemma 3.15,
5/4
γ=1/8
d Pr(γv∗t ≤ γ),
from (35).
(77)
2
× ηvt × (13 + 100Le−c2 γL ) d Pr(γv∗t ≤ γ),
mγ 3 L
20ηvt
.
ZmL
∞
γ=10000
(78)
2
× ηvt × (13 + 100Le−c2 γL ) d Pr(γv∗t ≤ γ)
mγ 3 L
Z ∞
27ηvt
γ −cm dγ,
from (36),
≤ 15
10 Lm γ=100
27ηv
1
= 15 t × 2(cm−1)
.
10 Lm 10
(cm − 1)
Z 1/8
I4 =
E(ρt 1vt+1 ≥vt | γv∗t = γ)d Pr(γv∗t ≤ γ)
γ=0
33
(79)
1/2
≤ e−d0 m
,
(80)
1/2
To obtain the term e−d0 m in (80) we use (33) and (34) to obtain
max γ ∈ [0, 1/8] : γ −2 Pr(γ ∗ ≤ γ) ≤
o
n
2
1/2
2
max γ ∈ [0, 1/8] : (γ 1/2−4/(c1 m ) e1−γ )c1 m +
oo
n
n
−2
−c1 mγ 1/2 −c1 /γ 1/2
max γ ∈ [0, 1/8] : mγ min e
,e
2 )−1/2
≤ (84/(c1 m
1/2
e1−1/8
2
1/2
)c1 m + m2 e−c1 m
.
The first case of the lemma now follows from (77), (78), (79) and (80).
3
:
Case 2: vt > n 1 − 3L
m
3
We observe first that n ≤ vt 1 + 4L
. Then we let Z = dn (vt ) − m be the number of right
m
neighbors of vt . Furthermore,
n
X
wi
.
E(Z | Ht ) .
W
j
j=v +1
t
3
vt 1+ 4L
m
X
j=vt +1
ηvt
. ηvt
2(vt j)1/2
!
1/2
4L3
4L3
1+
− 1 ≤ ηvt
.
m
m
Case 2a: ηvt ≥ 1/L1/2 .
We use (81) and Lemma 2.2(d) to prove
ηvt
1/2
Pr Z ≥
Ht ≤ e−d1 ηvt L ≤ e−d1 L .
L
(81)
(82)
Then we can write
4L3
2ηvt
3ηvt
1/2
E(ρt 1vt+1 ≥vt | Ht ) ≤ 1 +
× e−d1 L +
≤
.
m
Lm
Lm
3
Explanation: ρt will be at most 1 + 4L
if the unlikely event in (82) occurs. Failing this, the
m
chance that ρt > 1 is at most
2Z
m
≤
2ηvt
.
Lm
Case 2b: ηvt < 1/L1/2 .
It follows from (81) that E(Z | Ht ) . 4L5/2 /m. It then follows from Lemma 2.2(d) that
L3
1/2
Ht ≤ e−d2 L .
Pr Z ≥
3m
We then have
E(ρt 1vt+1 ≥vt | Ht ) ≤
4L3
1+
m
34
× e−d2 L
1/2
+
2L3
L3
≤
.
3m2
3m2
Part 5
We now prove (21). To do this, we will obtain a recurrence for E(ηvt+1 | Ht ), and, at the end,
obtain the bound 4m by averaging over the possible histories Ht .
We begin by writing
E(ηvt+1 | Ht ) = E(ηvt+1 1vt+1 <vt | Ht ) + E(ηvt+1 1vt+1 >vt | Ht )
(83)
We consider each term in (83) separately. For the first term, since
ηvt+1 1vt+1 <vt ≤ max {ηl : 1 ≤ l < vt , l ∈ NL (vt )} 1vt+1 <vt ≤ max {ηl : 1 ≤ l < vt , l ∈ NL (vt )} ,
we have that
E(ηvt+1 1vt+1 <vt | Ht ) ≤ E (max {ηl : 1 ≤ l < vt , l ∈ NL (vt )} | Ht )
Z ∞
=
Pr(max {ηl : 1 ≤ l < vt , l ∈ NL (vt )} ≥ η | Ht )dη
η=0
Z ∞
=
Pr(∃1 ≤ l < vt , l ∈ NL (vt ) : ηl ≥ η | Ht )dη
η=0
≤
.
Z
t −1
∞ vX
η=0 l=1
Z ∞ vX
t −1
η=0 l=1
vX
t −1 Z ∞
Pr(l ∈ NL (vt ) and ηl ≥ η | Ht )dη
wl
Wvt
Z ∞
Z
∞
ηl =η
ηlm−1 e−ηl
dηl dη
(m − 1)!
ηlm−1 e−ηl
ηl
dηl dη
1/2 (m − 1)!
2m(lv
t)
η=0
η
=η
l
l=1
Z ∞ Z ∞
ηlm e−ηl
dηl dη
. 2m + (1 + o(1))
η=2m ηl =η (m − 1)!
Z ∞
. 2m +
4e−3η/10 dη, from Lemma 2.1(c),
.
η=2m
−3m/5
. 2m + 20e
≤ 3m.
(84)
We now bound the second term of (83). We consider two cases, according to properties of the
history Ht (which determines vt and ηvt ).
1
Case 1: Ht is such that vt ≤ 1 − ω1/2
n.
In this case, we have that
E(ηvt+1 1vt+1 >vt | Ht )
o
n
≤ E max ηl : vt < l ≤ n, vt+1 ∈ NL (l), dn (l) ≥ ∆vγtv∗ 1vt+1 >vt | Ht
t
35
o
n
≤ E max ηl : vt < l ≤ n, vt+1 ∈ NL (l), dn (l) ≥ ∆vγtv∗ | Ht .
t
So we have that
E(ηvt+1 1vt+1 >vt | Ht )
o
n
vt
≤ E max ηl : vt < l ≤ n, vt+1 ∈ NL (l), dn (l) ≥ ∆γv∗ | Ht
t
Z ∞
o
n
vt
=
Pr(max ηl : vt < l ≤ n, vt ∈ NL (l), dn (l) ≥ ∆γv∗ ≥ η | Ht )dη
t
η=0
Z ∞
=
Pr ∃vt < l ≤ n, vt ∈ NL (l) : ηl ≥ η, dn (l) ≥ ∆vγtv∗ | Ht dη
≤
η=0
n
X
l=vt +1
n
X
t
Z
∞
η=0
Pr (vt ∈ NL (l)) ∧ (ηl ≥ η) ∧ (dn (l) ≥ ∆vγtv∗ ) | Ht , ηl dη
ηvt
.
2(lvt )1/2
l=v +1
t
t
Z
∞
η=0
Z
∞
ηl =η
ηlm−1 e−ηl
Pr dn (l) ≥ ∆vγtv∗ | Ht , ηl dηl dη.
t
(m − 1)!
(85)
Recall that in the final two lines, vt and ηvt are not random variables, but are the actual values of these random variables in the history Ht , so this is a deterministic upper bound on
E(ηvt+1 1vt+1 >vt | Ht ).
We split the sum in the RHS of (85) into E1 + E2 + E3 + E4 according to the ranges of l and η,
and bound each separately. The first part consists of
Z
Z
n
X
ηvt 1l≤4m2 vt /(γv∗t )2 2m ∞ ηlm−1 e−ηl
vt
|
H
,
η
Pr
d
(l)
≥
∆
E1 =
∗
t l dηl dη.
n
γvt
1/2
2(lv
(m
−
1)!
t)
η=0
η
=η
l
l=v +1
t
Even though vt and ηvt are constants (determined by Ht ), we caution that γv∗t and so also E1 are
random variables.
Observe that we have that
Z ∞ m−1 −ηl
Z ∞ m−1 −ηl
ηl e
ηl e
vt
Pr dn (l) ≥ ∆γv∗ | Ht , ηl dηl ≤
dηl ≤ 1
t
ηl =η (m − 1)!
ηl =η (m − 1)!
which allows us to write
E1 1γv∗t ≤5/4 ≤ 1γv∗t ≤5/4
n
X
2mηvt 1l≤4m2 vt /(γv∗t )2
l=vt +1
2(lvt )1/2
≤
5m2 ηvt
1γv∗t ≤5/4 .
γv∗t
(86)
We will use this expression when we take the expectation over γv∗t ≤ 5/4.
We also have that
Z ∞ m−1 −ηl
ηl e
Pr (dn (l) ≥ ∆vγt∗ ) ∧ (γv∗t > 5/4) | Ht , ηl dηl ≤ I1 + I2 + I3 ,
ηl =η (m − 1)!
36
(87)
where
I1 =
Z
7m/8
ηl =η
Z ∞
ηlm−1 e−ηl
dηl ≤ m
(m − 1)!
7 1/8
e
8
m
≤ e−d0 m ,
from Lemma 2.1(a),
ηlm−1 e−ηl
dηl ≤ e−d1 m , from Lemma 2.1(d).
I2 =
ηl =9m/8 (m − 1)!
Z 9m/8
ηlm−1 e−ηl
∗
∗
Pr dn (l) − m ≥ γvt mζ(vt ) ∧ (γvt > 5/4) Ht , ηl dηl ,
I3 =
ηl =7m/8 (m − 1)!
Z 9m/8
ηlm−1 e−ηl
5
≤
Pr dn (l) − m ≥ mζ(vt ) Ht , ηl dηl .
4
ηl =7m/8 (m − 1)!
(88)
We bound I3 with two subcases:
Subcase 1a: ζ(l) > 0.
Z 9m/8
8
10ζ(vt)
ηlm−1 e−ηl
I3 ≤
Pr dn (l) − m ≥
ηl ζ(l) Ht , ηl dηl [since m ≥ ηl ],
9ζ(l)
9
ηl =7m/8 (m − 1)!
n
o
2
(10ζ(vt )−9ζ(l)) ηl
Z 9m/8
10ζ(vt) ≤ 18ζ(l)
ηlm−1 e−ηl exp n−
81ζ(l)
o
[from (2) and ℓ ≥ vt + 1],
≤
(10ζ(vt )−9ζ(l))ηl
10ζ(vt) > 18ζ(l)
ηl =7m/8 (m − 1)! exp −
27
≤
Z
9m/8
ηl =7m/8
n
o
exp − 7mζ(vt )
10ζ(vt ) ≤ 18ζ(l)
648
n
o
(m − 1)! exp − 7mζ(vt )
10ζ(vt ) > 18ζ(l)
216
ηlm−1 e−ηl
≤ e−mζ(vt )/100 .
(89)
Subcase 1b: ζ(l) ≤ 0.
In this case, we go back to (88) and use ζ + (l) in place of ζ(l), see (10).
Z 9m/8
10ζ(vt) +
ηlm−1 e−ηl
Pr dn (l) − m ≥
ηl ζ (l) Ht , ηl dηl ,
I3 ≤
9ζ + (l)
ηl =7m/8 (m − 1)!
(90)
For ε as in (46) we see that ζ(l) ≤ 0 implies that l ≥ n(1 − ε)2 . In which case
ζ + (l) ≤
On the other hand, vt ≤ 1 −
1
ω 1/2
2ε
≤ 3ε.
1−ε
(91)
implies that
ζ(vt ) ≥
1
ω 1/2
− 2ε ≥
1
.
2ω 1/2
t)
≥
Comparing (91) and (92), we see that ζ(vt ) ≫ ζ + (l). From this and (3) with β = 10ζ(v
9ζ + (l)
we deduce that
10ζ(vt ) +
ηl ζ (l) Ht , ηl ≤ (6εω 1/2)10ηl ζ(vt ) ≤ (6εω 1/2 )35mζ(vt )/36 .
Pr dn (l) − m ≥
9ζ + (l)
37
(92)
1
6εω 1/2
Plugging this estimate into (90) we obtain something stronger than (89), finishing Subcase 1b
and giving that I3 ≤ e−mζ(vt )/100 in all cases.
Having bounded the three terms in (87), we then have that
E1 1γv∗t >5/4 ≤
n
X
ηvt 1l≤4m2 vt /(γv∗t )2
(lvt )1/2
l=vt +1
5m
e−d2 m ∗
γvt
≤ ηvt
−d2 m
e−d2 m + e−mζ(vt )/100
n
e−mζ(vt )/100 X 1
+
vt 1/2
l1/2
l=v +1
t
−mζ(vt )/100
≤ ηvt 4me
+e
!
(n + 1)1/2 − (vt + 1)1/2
·
vt 1/2
≤ ηvt (4me−d2 m + 2ζ(vt)e−mζ(vt )/100 )
200
−d2 m
.
+
≤ ηvt 4me
m
(93)
It follows from (86) and (93) that
2
200
5m
−d2 m
.
1γ ∗ ≤5/4 + 4me
+
E1 ≤ ηvt
γv∗t vt
m
We continue with the other parts of the RHS of (85):
Z
Z ∞ m−1 −ηl
n
X
ηvt 1l≤4m2 vt /(γv∗t )2 ∞
ηl e
E2 =
Pr(dn (l) ≥ ∆vγt∗ | Ht , ηl )dηl dη
1/2
2(lv
)
(m
−
1)!
t
η=2m ηl =η
l=v +1
t
4m2 vt /(γv∗t )2
≤
X
ηvt
2(lvt )1/2
Z
∞
X
ηvt
2(lvt )1/2
Z
∞
X
ηvt
×m
2(lvt )1/2
l=vt +1
4m2 vt /(γv∗t )2
≤
l=vt +1
4m2 vt /(γv∗t )2
≤
l=vt +1
4m2 vt /(γv∗t )2
=
≤
X
l=vt +1
−d3 m
e
ηvt
.
γv∗t
η=2m
Z
∞
eη/m
eη/m
ηl =η
η=2m
Z
ηlm−1 e−ηl
dηl dη
(m − 1)!
m
dη
from Lemma 2.1(c),
∞
e−3mx/10 dx
x=2
10ηvt e−3m/5
6(lvt )1/2
(94)
Note that we aborbed an O(m) factor into the expression in (94). This is valid because m is
large. We continue to do this where possible.
Z
Z
n
X
ηvt 1l>4m2 vt /(γv∗t )2 γv∗t (l/vt )1/2 ∞ ηlm−1 e−ηl
Pr(dn (l) ≥ ∆vγtv∗ | Ht )dηl dη
E3 =
1/2
t
2(lv
)
(m
−
1)!
t
η=0
ηl =η
l=v +1
t
38
n
X
γv∗t (l/vt )1/2
∞
ηlm−1 e−ηl
dηl dη
∗ (l/v )1/2 (m − 1)!
η=0
η
=γ
t
l
2
∗
2
v
t
l=4m vt /(γvt )
(
)
Z γv∗ (l/vt )1/2
n
X
t
3γv∗t (l/vt )1/2
ηvt
exp −
dη from Lemma 2.1(c),
≤
2(lvt )1/2 η=0
10
2
∗
2
l=4m vt /(γvt )
)
(
n
X
3γv∗t (l/vt )1/2
ηvt
≤
,
exp −
2(lvt )1/2
10
2
∗
2
l=4m vt /(γvt )
)
(
Z
ηvt γv∗t n
3γv∗t (x/vt )1/2
≤
dx,
exp −
vt
10
x=4m2 vt /(γv∗t )2
Z ∞
ηvt γv∗t
8vt
≤
× ∗ 2
ye−3y/5 dy,
vt
(γvt ) y=m
≤
ηvt
2(lvt )1/2
Z
Z
ηvt e−d4 m
=
.
γv∗t
Z
Z ∞ m−1 −ηl
n
X
ηvt 1l>4m2 vt /(γv∗t )2 ∞
ηl e
Pr(dn (l) ≥ ∆vγtv∗ | Ht , ηl )dηl dη
E4 =
1/2
t
2(lvt )
η=γv∗t (l/vt )1/2 ηl =η (m − 1)!
l=i
Z ∞
Z ∞ m−1 −ηl
n
X
ηl e
ηvt
dηl dη
≤
1/2
2(lvt )
η=γv∗ (l/vt )1/2 ηl =η (m − 1)!
2
∗ 2
l=4m vt /(γvt )
≤
n
X
l=4m2 vt /(γv∗t )2
t
ηvt
2(lvt )1/2
Z
∞
e−3η/10 dη
η=γv∗t (l/vt )1/2
)
(
3γv∗t (l/vt )1/2
5ηvt
,
≤
exp −
3(lvt )1/2
10
2
2
∗
l=4m vt /(γvt )
)
(
Z
1/2
∗
(x/j)
3γ
2ηvt ∞
≤ 1/2
dx,
x−1/2 exp − vt
i
10
2
∗
2
x=4m vt /(γvt )
Z
4ηvt ∞ −3y/10
e
dy,
= ∗
γvt y=2m
n
X
≤
ηvt e−d5 m
.
γv∗t
Thus,
E(ηvt+1 1vt+1 >vt
5m∗ 2 + e−d∗6 m ηvt ≤
γvt
γvt
| Ht ) ≤ E1 + E2 + E3 + E4 ≤ −d
m
7
200
e
ηvt
+
∗
γvt
m
7m2
η
γv∗t vt
γv∗t ≤ 5/4
γv∗t > 5/4.
We now integrate with respect to the value of γv∗t . (Note that γv∗t is actually a discrete random
variable, so that Pr(γv∗t ≤ γ | Ht ) is discontinuous, but one can view this as a Riemann-Stieltjes
integral. We write Pr† (γv∗t ≤ γ) below in place of Pr(γv∗t ≤ γ | Ht ).) Using Lemma 3.12 we see
39
that if m is large then integrating over γ,
E(ηvt+1 1vt+1 >vt | Ht )
!
Z ∞
Z 5/4
−d7 m
e
200
7m2
d Pr† (γv∗t ≤ γ) +
d Pr† (γv∗t ≤ γ) +
≤ ηvt
γ
γ
m
γ=5/4
γ=0
!
Z 5/4
7m2
200
≤ ηvt
d Pr† (γv∗t ≤ γ) + e−d8 m +
γ
m
γ=0
!
Z 1/m
Z 5/4
2
7m2
200
7m
= ηvt
d Pr† (γv∗t ≤ γ) +
d Pr† (γv∗t ≤ γ) + e−d8 m +
γ
γ
m
1/2
γ=0
γ=1/m
1/m Z 1/m1/2
2
7m2
7m
† ∗
+
Pr (γvt ≤ γ)
Pr† (γv∗t ≤ γ)dγ
≤ ηvt
2
γ
γ
γ=0
0
!
Z 5/4
7m2
200
+
d Pr† (γv∗t ≤ γ) + e−d8 m +
γ
m
γ=1/m
Z 1/m
7m2
−d9 m1/2
Pr† (γv∗t ≤ γ)dγ+
+
≤ ηvt e
2
γ
γ=0
!
Z 5/4
7m3
200
,
from (34),
d Pr† (γv∗t ≤ γ) + e−d8 m +
m
γ=1/m γ
200
1
†
∗
−d8 m
−d9 m1/2
−d10 m1/2
4
,
≤ γvt ≤ 5/4 + e
+
+e
+ 7m Pr
≤ ηvt e
m
m
200
−d9 m1/4
−d10 m1/2
4 −c1 m
−d8 m
+e
+ 7m e
+e
+
≤ ηvt e
,
from (35)
m
200
−d12 m1/4
+
≤ ηvt e
.
m
(95)
Combining (84) and (95) via (83), we have that
E(ηvt+1
200
−cm1/4
ηvt .
| Ht ) ≤ 3m + e
+
m
This completes Case 1. Case 2 is much shorter.
1
Case 2: Ht is such that vt > 1 − ω1/2
n.
E(ηvt+1 | Ht ) .
∼
∼
n
X
l=vt +1
n
X
l=vt +1
n
X
ηvt
2(lvt )1/2
Z
ηvt
2(lvt )1/2
Z
mηvt
2(lvt )1/2
l=v +1
t
40
∞
η=0
Z
∞
ηl =η
∞
−η
e
η=0
ηlm−1 e−ηl
dηl dη
(m − 1)!
m
X
i=1
η m−i
dη
(m − i)!
(96)
. mηvt
≤
(n + 1)1/2 − (vt + 1)1/2
(vt + 1)1/2
mηvt
.
ω 1/2
This completes Case 2. In particular, for sufficiently large n we see that for any typical Ht (i.e.,
in both Case 1 and Case 2), the bound from (96) is valid. Putting
Et = E ∩ {Ht is typical}
we deduce from (96) that
E(ηvt+1
200
−cm1/4
| Et ) ≤ 3m + e
+
E(ηvt | Et )
m
200
−cm1/4
E(ηvt | Et−1 ).
. 3m + e
+
m
(97)
(98)
We obtain (98) from (97) because Et ⊆ Et−1 and so
E(ηvt | Et−1 ) ≥ E(ηvt | Et ) Pr(Et | Et−1 ) ∼ E(ηvt | Et ).
Because m is large, (21) will follow by induction once we have shown that
E(ηv1 ) ≤ 3m.
(99)
Here we will use the assumption that v1 is chosen exacty according to the stationary distribution
for a simple random walk on Gn . In particular, we have
!
n
X
dn (i)
Pr(ηv1 ≥ η) ≤ E
1η ≥η ,
2mn v1
i=1
and Lemma 2.2 implies that if η ≥ 2m
E((dn (i) − m)1ηv1 ≥η ) .
n 1/2 Z
i
∞
η=2m
n 1/2
η m e−η
dη .
× 4me−η/2 .
(m − 1)!
i
Furthermore,
E(m1ηvt ≥η ) = m Pr(ηv1 ≥ η) ≤ 5me−η/2 .
So, if η ≥ 2m, then
Pr(ηv1
Therefore,
E(ηv1 ) ≤ 2m +
Z
n
9e−η/2 X 1
≤ 10e−η/2 .
≥ η) .
2n1/2 i=1 i1/2
∞
Pr(ηv1 ≥ η)dη ≤ 2m + 10
η=2m
Z
∞
η=2m
and (99) follows.
41
e−η/2 dη
3.2
Exiting the main loop with success
In summary, it follows that w.h.p. DCA reaches Step 7 in O(ω log n) time. Also, at this time
vT ≤ log1/49 n. This follows from Lemma 2.2(g), 2.2(h) and (P4). Furthermore, this justifies
using n1 as a lower bound on vertices visited during the main loop. The random walk of Step
8 will w.h.p. take place on [log1/9 n]. This follows from Lemma 2.2(j). Vertex 1 will be in the
1/2
same component as vt in the subgraph of Gn induced by vertices of degree at least logn1/20 n . This
is because there is a path from vT to vertex 1 through vertices in [vT ] only and furthermore it
1/2
follows from Lemma 2.2(i) that w.h.p. every vertex on this path has degree at least logn1/20 n .
The expected time to visit all vertices of a graph with ν vertices is O(ν 3 ), see for example
Aleliunas, Karp, Lipton, Lovász and Rackoff [1]. Consequently, vertex 1 will be reached in a
further O((log1/9 n)3 ) = o(log n) steps w.h.p, completing the proof of Theorem 1.2.
4
Concluding remarks
We have described an algorithm that finds a distinguished vertex quickly and which is local in a
strong sense. There are some natural questions that are left unanswered:
• Can the running time be improved from O(ω log n) to O(log n)?
• Can we get polylog expected running time for DCA if m = 2?
• Can we extend the analysis to other more general models of web graphs e.g. Cooper and
Frieze [7]. In this case, we would not be able to use the model described in Section 2.
As a final observation, the algorithm DCA could be used to find the vertex of largest degree: if
we replace Step 8 by “Do the random walk for log n steps and output the vertex of largest degree
encountered” then w.h.p. this will produce a vertex of highest degree. This is because log n will
be enough time to visit all vertices v ≤ log1/39 n, where the maximum degree vertex lies.
References
[1] R. Aleliunas, R.M. Karp, R.J. Lipton, L. Lovász and C. Rackoff, Random Walks, Universal
Traversal Sequences, and the Complexity of Maze Problems. Proceedings of the 20th Annual
IEEE Symposium on Foundations of Computer Science (1979) 218-223.
[2] A. Barabási and R. Albert, Emergence of scaling in random networks, Science 286 (1999)
509-512.
[3] B. Bollobás, O. Riordan, J. Spencer and G. Tusnády, The degree sequence of a scale-free
random graph process, Random Structures and Algorithms 18 (2001) 279-290.
42
[4] B. Bollobás and O. Riordan, The Diameter of a Scale-Free Random Graph, Combinatorica
24 (2004) 5-34.
[5] C. Borgs, M. Brautbar, J. Chayes, S. Khanna and B. Lucier, The Power of Local Information
in Social Networks, http://arxiv.org/abs/1212.0884.
[6] M. Brautbar and M. Kearns, Local Algorithms for Finding Intersting Individuals in Large
Networks, in Innovations in Computer Science (ITCS) (2010) 188-199.
[7] C. Cooper and A.M. Frieze, On a general model of web graphs, Random Structures and
Algorithms 22 (2003) 311-335.
[8] G. Grimmett and D. Stirzaker, Probability and Random Processes, Third Edition, Oxford
University Press, Oxford UK, 2001.
[9] W. Hoeffding, Probability inequalities for sums of bounded random variables, Journal of the
American Statistical Association 58 (1963) 13-30.
[10] M. Jerrum and A. Sinclair. The Markov chain Monte Carlo method: an approach to approximate counting and integration. In Approximation Algorithms for NP-hard Problems.
(D. Hochbaum ed.) PWS (1996) 482-520.
[11] M. Mihail, C. Papadimitriou and A. Sabeeri, On Certain Connectivity Properties of the
Internet Topology, Journal of Computer and System Sciences 72 (2006) 239251.
A
Proofs of properties (P1)–(P5)
In this section we give proofs of (P1)–(P5), which we list here for convenience.
(P1) For Υk,ℓ = Υk − Υℓ , we have
Υk,ℓ
"
1/2
Lθk,ℓ
∈ (k − ℓ) 1 ±
3(k − ℓ)1/2
#
for (k, ℓ) = (mn + 1, 0) or
l=0
1
k−ℓ
2
∈ {ω, ω + 1, . . . , n} and k − l ≥ log n
k ≥ log30 n, l > 0
m
1/300
log
n 0 < l < k < log30 n.
43
Here n0 =
λ20 n
,
ω log2 n
λ0 =
1
,
log20/m n
log k
1/2
k
= (k − ℓ)1/2
(k−ℓ)3/2 log n
n1/2
n
θk,ℓ
ω ≤ l < k ≤ log30 n, l > 1
ω ≤ k ≤ n2/5 , l = 0
log30 n < k ≤ n2/5
n2/5 < k ≤ n0 .
n0 < k.
ω 3/2 log2 n
#
1/2 "
1/2
1/2
i
Lθi
i
(P2) Wi ∈
1 ± 1/2 ∼
for ω ≤ i ≤ n.
n
i
n
(P3) wi ∼
ηi
for ω ≤ i ≤ n.
2m(in)1/2
(P4) λ0 ≤ ηi ≤ 40m log log n for i ∈ [log30 n].
(P5) ηi ≤ log n for i ∈ [n].
Proof of (P1)
Applying Lemma 2.1(d),(e) to (1) for i ≥ 1 we see that
Pr(¬(P1))
n
X
L2 θk,0
≤2
exp −
+2
27
k=ω
n2/5
L2 k 1/2
exp −
=2
27
k=ω
X
30
n
X
k−ℓ=log1/300 n
+2
n0
X
k=n2/5 +1
L2 θk,ℓ
exp −
27
L2 θmn+1,0
+ 2 exp −
27
L2 k 3/2 log n
exp −
27n1/2
+2
n+1
X
k=n0
L2 n
exp −
27ω 3/2 log2 n
+1
n2/5
X
L2 log k
L2 (k − ℓ)1/2
exp −
+2
+2
exp −
+
27
27
30
1/300
k−ℓ=log n
k−ℓ=log
n
n
n
0
X
X
L2 n
L2 (k − ℓ)3/2 log n
+2
exp −
2
exp −
27n1/2
27ω 3/2 log2 n
2/5
k−ℓ=n +1
log
k−ℓ=n
Xn
+1
0
= o(1).
Proof of (P2)
For this we use
Wi =
Υmi
Υmn+1
44
1/2
.
Then,
#
1/2 "
1/2
Lθi
i
Wi ∈
/
1 ± 1/2
n
i
implies that either
Υmn+1
"
1/2
Lθi
∈
/ (mn + 1) 1 ±
3(mn + 1)1/2
#
or Υmi
"
1/2
Lθi
∈
/ mi 1 ± 1/2
3i
#
.
These events are ruled out w.h.p. by (P1).
Proof of (P3)
We use (1 + x)1/2 ≤ 1 +
wi =
x
2
for 0 ≤ |x| ≤ 1. Then,
Υmi
Υmn+1
1/2
−
Υm(i−1)
Υmn+1
1/2
!
1/2
Υm(i−1) 1/2
ηi
=
1+
−1
Υmn+1
Υm(i−1)
1/2
1/2
Lθi
m(i − 1) 1 + 3m1/2 (i−1)1/2
η
i
≤
1/2
1/2
Lθi
2m(i − 1) 1 −
(mn + 1) 1 −
1/2
3(mn+1)
ηi
≤
2m(in)1/2
1/2
2Lθ
1 + 1/2i 1/2
m i
!
1/2
Lθi
3m1/2 (i−1)1/2
.
A similar calculation gives
1/2
ηi
wi ≥
2m(in)1/2
2Lθ
1 − 1/2i 1/2
m i
!
.
Proof of (P4)
The upper bound follows from Lemma 2.1(c). For the lower bound, we observe by (7) that the
expected number of i ≤ log30 n with ηi ≤ λ0 is at most log30 n × λm
0 = o(1).
Proof of (P5)
This follows from Lemma 2.1(c).
45
B
Proof of Lemma 2.2
We restate the lemma for convenience.
Lemma B.1.
(a) If E occurs then d¯n − m ∈ [ηi ζ(i), ηi ζ + (i)].
2 η ζ(i)/2
i
(b) Pr(dn (i) − m ≤ (1 − α)mζ(j)) ≤ e−α
for 0 ≤ α ≤ 1.
2 η ζ + (i)/3
i
(c) Pr(dn (i) − m ≥ (1 + α)mζ + (j)) ≤ e−α
(d) Pr(dn (i) − m ≥ βmζ + (j)) ≤ (e/β)βηi ζ
+ (i)
for 0 ≤ α ≤ 1.
for β ≥ 2.
(e) W.h.p. ηi ≥ λ0 and ω ≤ i ≤ n1/2 implies that dn (i) ∼ ηi
(f ) W.h.p. ω ≤ i ≤ log30 n implies that dn (i) ∼ ηi
n 1/2
.
i
(g) W.h.p. ω ≤ i ≤ n1/2 implies that dn (i) . max {1, ηi }
(h) W.h.p. n1/2 ≤ i ≤ n implies dn (i) ≤ n1/3 .
(i) W.h.p. 1 ≤ i ≤ log1/49 n implies that dn (i) ≥
(j) W.h.p. dn (i) ≥
n
log1/20 n
n 1/2
.
i
n 1/2
i
.
n1/2
.
log1/20 n
implies i ≤ log1/9 n.
Proof. (a) Suppose that we fix the values for W1 , W2 , . . . , Wn . Then the degree dn (i) of vertex i
can be expressed
n X
m
X
dn (i) = m +
ζj,k
j=i k=1
where the ζj,k are independent Bernouilli random variables such that
wi wi
Pr(ζj,k = 1) ∈
,
.
Wj Wj−1
So, putting
d¯n (i) = E(dn (i))
we have
mwi
n
n
X
X
1
1
≤ d¯n (i) − m ≤ mwi
.
W
W
j
j
j=i−1
j=i
Now assuming that (P2), we have for ω ≤ i ≤ n,
n 1/2
n
X
X
n
1
≥
Wj
j
j=i
j=i
46
1/2
2Lθj
1 − 1/2
j
!
.
But
1/2
n
X
θj
j=ω
j
2/5
n
X
1
≤
+
3/4
j
j=ω
n0
X
j=n2/5 +1
n
X
n1/2
log1/2 n
+
n1/4 j 1/4 j=n +1 jω 3/4 log n
0
3n1/2 log log n
4n1/2
+
3ω 3/4 log n
ω 3/4 log n
4n1/2 log log n
≤
.
ω 3/4 log n
≤ 4n1/10 +
It follows that
9Ln1/2 log log n
1/2
1/2
1/2
¯
2(n − (i + 1) ) −
dn (i) ≥ m + mwi n
ω 3/4 log n
!
1/2
n 1/2
i
9L log log n
1
1−
,
− 1/2 1/2 −
≥ m + ηi
i
n
n i
2ω 3/4 log n
after using (P3).
A similar calculation gives a similar upper bound for d¯n (i) and this proves that
"
#
1/2
n 1/2
i
5L
log
log
n
i ≥ ω implies that d¯n (i) ∈ m + ηi
1−
.
± 3/4
i
n
ω log n
It follows from (2) and (4) that
L2 ηi n1/2
Pr dn (i) − m ≤ (1 − α)ηi ζ(i) ηi ≤ exp − 1/2 1/2 .
4i ω
L2 ηi n1/2
Pr dn (i) − m ≥ (1 + α)ηi ζ(i) ηi ≤ exp − 1/2 1/2 .
4i ω
(a) For ηi ≥ λ0 and ω ≤ i ≤ n0 we have
L2 ηi n1/2
2
exp − 1/2 1/2 ≤ e−L log n/4 .
4i ω
(b) This follows from (a) and (4).
(c) This follows from (a) and (2).
(d) This follows from (a) and (3).
(e) This follows from (a), (b), (c) and (12).
(f) This follows from (e) and (P4).
47
(g) This follows from (c) and (12).
(h) The degree of i ≥ n1/2 is stochastically dominated by the degree of n1/2 . Also, the probability
that dn (n1/2 ) exceeds the stated upper bound is o(1/n). So (h) follows from (g).
(i) For ω ≤ i ≤ log1/49 n, this follows from (f) and (P4). For 1 ≤ i < ω we can use (b) with
ηi ≥ λ0 and α = n−1/10 .
(j) This follows from (e), (f) and (g) and (P4).
48
| 8cs.DS
|
On Game-Theoretic Risk Management
(Part Three)
Modeling and Applications
Stefan Rass ∗
[email protected]
arXiv:1711.00708v1 [q-fin.EC] 2 Nov 2017
November 3, 2017
Abstract
The game-theoretic risk management framework put forth in the precursor reports “Towards a Theory of Games with Payoffs that are ProbabilityDistributions” (arXiv:1506.07368 [q-fin.EC]) and “Algorithms to Compute
Nash-Equilibria in Games with Distributions as Payoffs” (arXiv:1511.08591v1
[q-fin.EC]) is herein concluded by discussing how to integrate the previously
developed theory into risk management processes. To this end, we discuss
how loss models (primarily but not exclusively non-parametric) can be constructed from data. Furthermore, hints are given on how a meaningful game
theoretic model can be set up, and how it can be used in various stages of
the ISO 27000 risk management process. Examples related to advanced persistent threats and social engineering are given. We conclude by a discussion
on the meaning and practical use of (mixed) Nash equilibria equilibria for
risk management.
∗
Universität Klagenfurt, Institute of Applied Informatics, System Security Group, Universitätsstrasse
65-67, 9020 Klagenfurt, Austria. This work has been done in the course of consultancy for the EU
Project HyRiM (Hybrid Risk Management for Utility Networks; see https://hyrim.net), led by the
Austrian Institute of Technology (AIT; www.ait.ac.at). See the acknowledgement section.
1
Contents
1 Introduction
3
2 Game-Theory based Risk Management
4
3 Modelling Losses
3.1 Parametric Loss Models . . . . . . . . . .
3.2 Nonparametric Loss Models . . . . . . . .
3.3 Collecting Data from Experts . . . . . . .
3.4 Refining the Expert Survey . . . . . . . .
3.5 Outlier Elimination . . . . . . . . . . . . .
3.6 Harmonizing Risk Attitudes . . . . . . . .
3.7 Using the Bandwidth Parameter to Model
3.8 Defining Risk Assessment Categories . . .
3.9 Using Continuous Scales . . . . . . . . . .
3.10 Preparing the Loss Model . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
Answer Uncertainty
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
4 Risk Prioritization
11
11
12
12
15
15
15
15
16
16
18
20
5 Examples of Game-Theoretic Modeling
22
5.1 Modeling APTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2 Modeling Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6 Working with Game-Theoretic Risk Measures
6.1 Choosing the Cutoff Point . . . . . . . . . . . . . . . . . . .
6.2 Interpretation and Meaning of Equilibria . . . . . . . . . . .
6.3 Optimizing an Infrastructure’s Resilience (Risk Treatment)
6.4 Software Support . . . . . . . . . . . . . . . . . . . . . . . .
6.5 Playing the Equilibrium Strategies . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
32
32
33
35
38
40
7 On Model Validation and Verification
41
8 Conclusion and Outlook
44
2
1 Introduction
With algorithmic matters of game-theoretic risk management being covered in [37], it
remains to discuss a few (among more existing) possibilities of how game models can be
used in risk management.
First, observe that matrix games directly cover plain optimization as the special case
of an either n × 1 or 1 × m game. Both have applications in risk management, such as
helping with the following common subtasks:
• If the current security configuration is to be assessed against a number m of (new)
threats, we can think of the defender having only 1 strategy (the current state).
The equilibrium in terms of the -ordering is then the most severe threat (since
the attacker maximizes).
• Likewise, if several options for mitigating a particular threat are available, then
the equilibrium being the -minimum determined by the defender, is the action
leaving the -least damage when being mounted.
• The general case of n > 1 and m > 1 strategies for both, the defender and attacker,
is discussed in the remainder of this article.
Unique Selling Points: The method described in the following offers a variety of advantages relative to the “conventional” approach to managing risks, which is usually tied
to intensive discussion (meetings), and also up to difficult consensus finding. On the
contrary, we propose a method that is based on questioning experts individually, separately, asynchronously and anonymously, which entails the following features, among
well known improvement of the so-obtained data quality [31]:
1. Distributed expert interviews that do not require to be at a certain room at a
certain time (no meetings), and thus allow provide input in between the normal
workflow (asynchronously to the input of other experts).
2. Since the questioning is done individually, it can be done anonymized. This avoids
social or cultural effects that may change a person’s statement spoken out loud in
presence of certain other people (superiors, subordinates, etc.)
3. Exploitation of matrix organization: it may well be the case that experts are
well informed about certain aspects of a problem, but have no reliable clue on
some other aspects. Polling people by online questionnaires in the privacy of
their own office allows them to answer only those parts of the survey that they
can offer input for, while leaving them a safe way of refraining from answering
other questions. Since our method works on probability distributions, the resulting
dataset from which these are compiled may be richer or sparser, depending on how
many informed opinions are available. In any case, however, asking people face-toface in a meeting can bring up an uninformed guess just to have said something,
so that the overall data quality is not necessarily as good as in a distributed and
individual interview.
3
4. Enlargement of the opinion pool: without the need for a personal (and confidential)
meeting, people even outside the company can be included in the risk assessment.
For example, matters of reputation can more reliably be assessed by customers
(which are typically not invited to internal management meetings).
5. The use of distributions also avoids problems of consensus finding or opinion pooling (see, e.g., [5, 20] to mention only two out of many publications in this area)
towards a representative number. It is in that sense preserving all information,
since all opinions (all available data) goes into the decision process with equal
weight.
As a final pro that a game theoretic risk assessment allows, it is even possible to offer
the game solution algorithms as a webservice, where the modeling and threat assessment can be left to the customer enterprise. For example, if the client has identified a
set of threats and countermeasures, it will prefer to not disclose this information to a
subcontractor in charge of risk management. Since the game model and solution can be
formulated using abstract names only, it is possible to anonymize the data by letting
the threats be only named “T1”, “T2”, . . . , “Tn”, as well as the countermeasures be
called “C1”, “C2”, . . . , “Cm”. The real meaning of threats and countermeasures can
then remain private information of the company, whereas the game model being given
in terms of these abstract identifiers remains solvable by any third party contractor.
This allows the method to be offered as a (web-)service, without running into troubles
of unwanted information disclose (even the number of threats and countermeasures can
be disguised, if a company adds dummy copies of actions to the list to make it longer
than it actually is).
2 Game-Theory based Risk Management
An eloquent and detailed comparison of how game theory fits into and aids the classical
risk management process has been given by [34]. We follow their presentation hereafter,
while instantiating and adapting the specific steps to the concrete setting outlined in
the precursor parts to this work [35, 37].To get started, consider the classical ISO risk
management process as depicted in Figure 1, and compare it to the workflow to be
completed when a game-theoretic model is to be set up; shown in Figure 2.
The workflow in Figure 2 needs some explanation, in order to establish a mapping
to the risk management process. Perhaps the most important difference between risk
management and game theory is the former being about minimization of losses caused
by a not necessarily rational opponent (nature, but possibly also a hostile party that
has explicit intentions). Contrary to this, game theory in any case assumes a rational
opponent, whose goal is maximizing the own revenue. A conflict/competition arises if the
revenues for both players are negatively correlated, in the extreme case culminating in the
well-known zero-sum competition, meaning “my gain is your loss” (and vice versa). This
is the scenario that we also assume for risk management based on distribution-valued
game theory, although bearing in mind that the incidents that the risk management
4
Establish Context
Risk Analysis
Risk Identification
Risk Estimation
Risk Evaluation
Risk Decision Point 1
Assessment satisfactory?
Risk Monitoring and Review
Risk Communication
Risk Assessment
Risk Treatment
Risk Decision Point 2
Accept risks?
Risk Acceptance
Figure 1: ISO/IEC 27005 Risk Management Process [16]
1. investigate the scenario
2. identify the players
3.2. determine the
strategies
for each player
3.1. available information
for decision making
3.3. Identify preferences
3.3. Represent by Payoff/
Utility
3.4. Define Scale &
Weight
4. fill in the matrix (normal form)
5. compute the equilibrium
Figure 2: Workflow of setting up a Game Theoretic Model (cf. [34])
5
refers to may not always follow a hidden rationale or agenda. Nevertheless, the zerosum assumption (even though perhaps unrealistic) provides us with a valid worst-case
assessment, and reality can only look better than predicted for the risk manager. The
players engaging in the risk management process may be diverse and many, depending
on the variety of threats to be considered. In mapping this to a game-theoretic model,
we collect all physically existing opponents into a single adversary acting as “player 2”,
against the risk manager, which is player 1. As for the adversary, “player 1” is here an
abbreviation and means the entirety of people engaged in the practicalities (“do”-phase
of the ISO PDCA-cycle) of the risk management. We will hereafter call this player the
“defender”, to ease our wording. Specifically the “do” phase is the one where game
theory can help, since it requires:
• The selection of controls: this is an action undertaken in the final “risk treatment”
phase in Figure 1, and the point where game theory is applied.
• The implementation of controls: while the selection of controls can be based on the
knowledge of an equilibrium, the enforcement thereof (i.e., playing the equilibrium)
corresponds to an optimized implementation scheme. We will revisit this issue later
in sections 6.4 and 6.3.
• The definition of measures to check their effectiveness: the measures per goal are
the assurances defined in [35, Def.4.1].
So, all these actions can be supported by game theory. To make this precise, let us look
at the steps numbered in Figure 2, and to be completed for each player:
3.1: each player has some a-priori or current knowledge when a decision is made. In
classical game theory, the next action depends only on the current state of the
game (in a generalization to stochastic or sequential games, a dependency on past
game iterations is included; we discuss one such example in Section 5.1). In the
reality of risk management, external need to be considered, and the player’s action
is hardly dependent on the current state of the system only (at least because the
system state may not even be known precisely at all times). For this reason,
the theory developed in [35],unlike classical game theory, allows uncertainty to be
explicitly modeled at this stage, and incarnate through the payoffs of an action
that we describe below.
3.2: strategies for a player refer to everything that can be done in the current position.
In fact, if the game play covers several stages until the payoff is received, then the
strategy is an exact prescription of what is to be done at each step. In that sense,
it is comparable to a “recipe” that the player can follow to accomplish the desired
goal. Mapping this to a practical setting, the strategy may be named “patch
machine X”, whereas its details relate to all the steps taken from the current state
of machine X until the point where the patch has been installed and the machine
is put back to work. Likewise, a strategy for the opponent (player 2, adversary)
6
may be high-level named “hack machine X”, where the details of this strategy may
include a sequence of steps such as “sending a phishing mail” → “connect to the
malware” → . . .
3.3: Identify the interests of a player and define measures of “fulfilment” of these needs.
In our case, this process refers to the identification of goals that are object of the
risk management. Examples include (but are not limited to): economic, reputation, people, information, capability, etc. (see [45]). The degree of achievement
in each of these goals must be measured on a scale that makes the different goals
comparable, and for technical reasons also arithmetically compatible. The easiest
way of assuring this is to define a common set of discrete risk categories, with individually specific meanings per security goal. This has several advantages beyond
pure theoretical reasons, as it “equalizes” the understanding of risk valuations and
the taxonomies in which risk and outcome of actions is expressed. This is the
fundament to the next step 3.4.
3.4: Preferences of the players are found by asking how the players valuate an outcome.
For general games, this has to be done for each player. In our case (and every
zero sum game), it suffices to ask only player 1 (the defender) for this valuation,
in each scenario. By construction, we specifically allow an outcome of a specific
scenario of strategies for the defender and the attacker to be rated in various respects, i.e., in terms of each security goal. Having a common vocabulary (set of
risk categories) in which the risk in each goal is expressed, the underlying theory
of multi-criteria optimization meaningfully applies and helps optimizing the actions towards maximizing the security goal fulfilment (equivalently, minimize the
residual risk).
3.5: the representation of preferences by a utility function is –in classical game theory
– done by specifying a function ui : P S1 × P S2 → R for the i-th player, so
that each scenario of defense (action from the list P S1 of available options) and
attack (action from P S2 , i.e., possible exploits) is rated in some real-valued score.
The construction in [35]deviates from this definition in allowing the outcome to
be not crisp but a random probability distribution, thus the function ui takes
the form ui : P S1 × P S2 → F, where F is the set of all probability distributions
(more precisely their density functions) that satisfy the regularity conditions (lower
bounded by 1, absolute continuity w.r.t. Lebesgue or counting measure; see [35]).
The crux of this modification is that:
• Letting ui be valued in terms of probability distributions offers a powerful
model to capture uncertainty (cf. our remarks in step 3.1 above).
• The specific definition of ui can be made based on empirical statistics; that is,
we can simply collect many domain expert opinions on a specific scenario from
(d, a) ∈ P S1 × P S2 , and define the value u1 (d, a) as the empirical histogram
of this expert survey (we expand this approach below in section 3.3). This
has a neat effect, since it:
7
– Preserves all information provided by the experts
– Avoids a consensus problem that would normally arise from the need
to agree on a single representative opinion about the risk. In practice,
people may be unsure and disagreeing to the opinion of others, so that
conflicts and aggregation of opinions may be required. In letting the risk
valuation be an entire histogram, each input goes into the assessment
with the same weight, so that no domain expert is “overruled” or has less
influence than any other.
If the system response dynamics is known, on the other hand side, then there
may not even be a need to poll experts, and a simulation of the outcomes
under the specific scenario (d, a) could be imaginable. Percolation theory [22]
offers one way to do this (among other possibilities).
In assuming a zero-sum competition and a two-player game, the risk management
process outlined here is asset-centric. This is an important core philosophy of the
entire process, since the overall goal is not about preventing all possible threats, but
about making an attack non-economic for the attacker. This is the main point of applying
optimization (i.e., game theory) here, since we seek to minimize our own losses (measured
in terms of the values of our assets), against whatever an attacker may do.
The mapping sketched in Table 1 has been adapted from [34], but needs a bit of
tailoring towards defining an analogous process based on distribution-valued games (and
the theory thereabout). Specifically, the risk assessment phase (Figure 1), comprising
risk identification, risk estimation and risk evaluation, refers to the current state of the
system, whose valuation may trigger further action (implementation of controls) in later
phases of the process (namely the risk treatment).
In Table 1, the process of determining the current state is only briefly mentioned as
adding a strategy “do nothing” to the game, which merely models the possibility of the
situation at hand being satisfying already. Here, we will resemble the classical process of
risk management to a wide extent using only the idea of an outcome valuation in terms
of probability distributions, which is made possible by the -ordering on these objects
that was invented in earlier stages of the project. This extends up to the point where
risks are evaluated, which is normally done using a 2-dimensional risk matrix, typically
with colored entries like shown in Figure 3. The (specification of the) elliptic region
displayed on the upper right corner is the main output of the risk evaluation, which
establishes a priority list of risks and divides the threats into those that demand action
(i.e., which are put into the critical region based on their impact and likelihood) and
those who do not demand immediate actions (i.e., which lie outside the critical region).
In the original ISO/IEC process, the risk value is computed as the product risk =
likelihood × impact. It is popular to define a categorical scale for both, the likelihood
and the impact (in tabular form explaining what exactly is meant by a “medium likelihood” or a “medium impact”; section 3.8 gives examples). Multiplying the ranks (i.e.,
category numbers1 ) then gives the risk score and delivers the coloring of the risk matrix
1
it is advisable to avoid using the number zero as a category number or rank, as it would cancel out
8
Context
establishment
Risk identification
ISO/IEC Process/Terminology
Setting the basic criteria Defining the scope
and boundaries Organization of an information security risk management (ISRM)
Identification of assets
Identification of existing controls
Identification of vulnerabilities
Identification of consequences
Risk estimation
Assessment of consequences
Assessment of incident likelihoods
Level of risk estimation (list of risks with
value levels assigned)
Risk evaluation
Risk treatment
List of risks prioritized
Risk treatment options are risk reduction, retention, avoidance and transfer
Residual risks
Risk acceptance
Risk communication
Risk monitoring and
review
List of accepted risks based on the organization criteria
Continual understanding of the organization’s
ISRM process and results
Monitoring and review of risk factors Risk
management monitoring, reviewing and improving
not included
not included
not included
Game theoretic step/terminology
Scenario investigation (scope definition and
asset identification) Player identification
(mostly assigning the role of the defender).
Included in the scenario investigation
Identify implemented controls, i.e. “do nothing” option for the defender.
Options that can be exploited by threats. Included while determining the strategies of the
attacker (player 2). We denote this list as
P S2 .
Identify how players value multiple aspects of
outcomes. Identify preferences (i.e., priorities
among different security goals)
Define a common scale and ranking scheme
for all relevant outcomes.
Computed likelihoods for each strategy for
both players.
Expected outcome for each scenario. This expected value (a real number) is in HyRiM replaced by an entire distribution function (thus
avoiding information loss due to a “representative” centrality measure like the average).
Prioritize the expected outcome for both of
the players
Strategies (control measures) for the defender
can be categorized into “static” (changes applied to the system that have a permanent
effect, e.g., installation of intrusion detection
systems) and “dynamic” (actions that need to
be repeated in order to retain their effect on
security, e.g., security awareness trainings).
The entirety of controls available is denoted
as P S1 .
Expected outcome of the game. In HyRiM,
this is the equilibrium value distribution, from
which all statistically meaningful quantities
can be computed. For example, the mean of
this outcome distribution would correspond
to the classical quantitative understanding of
risk as the product of likelihood and impact.
Since HyRiM admits multiple goals to be optimized at the same time, the residual risk is
returned per security goal. The theory coined
this output artefact “assurance”, and it is one
probability distribution for the losses in each
relevant security goal.
Strategies of the defender (based on the organization criteria)
Strategies of the defender
The process is repeated as the player’s options
and their outcome valuation may change
Information gained by the opponent
Beliefs and incentives of the opponent
Optimization of the strategies
Table 1: Mapping between ISO/IEC 27005 Risk Management and Game Theoretic Approach (cf. [34])
9
low
med
likelihood
low
low
low
low
medium med hi
low
med
low
med
low
med
low
high
high
medium med hi
high
medium med hi
med hi
low
med
low
med
medium med hi
medium medium
impact
threats located in this
region demand action
Figure 3: Risk Matrix (example)
as exemplified in Figure 3. Note that loss valuations based on crowd sourcing (expert
surveys, detailed in section 3.3) in fact embody both, the impact (as is directly asked
for), and the likelihood (as the relative frequency of answers provided by the set of experts polled) in one object. That is, the classical two-dimensional matrix depicted in
Figure 3 would boil down to a 1-dimensional list of threats, which can plainly be sorted
in -ascending order. Thus, the risk evaluation is even simplified in our setting here.
It may nonetheless be advisable to resemble the classical process of risk management a
little closer by asking for both, the impact and the likelihood, and construct empirical
distributions for both. This may be useful in letting the expert express his beliefs more
detailed than just asking for a possibility (and not for a probability too). We revisit this
issue later in section 4, after having established the basics of this process first.
In generalizing this classical approach to risk management to a more sophisticated
technique based on games and distributions as risk representing objects, our main target
in the next section will be modeling the losses as probability distributions, and how
to prepare the game theoretic models for the risk treatment phase, when the games
are to be solved and “played” in practice. We will exemplify the modeling based on
two examples, which are advanced persistent threats (APTs), covered in section 5.1,
and social engineering, discussed in section 5.2. Once the cycle in Figure 1 has been
completed for once, any repetition entailing another round of risk estimation and risk
evaluation can be supported by exactly the same kind of game-theoretic models that were
used in the previous risk treatment phase (in fact, the equilibrium strategy enforced as
result of the last risk treatment phase is the “do nothing” strategy in the next risk
assessment; cf. Table 1). Examples of potentially suitable models are described in the
sections to follow. Section 6.3 discusses how to use the game analysis results for effective
improvements and control selection.
any rating in the other aspect. Indeed, we have adopted such an assumption quite explicitly already
by declaring loss random variables (or categories) to be ≥ 1 in any case; see [36].
10
3 Modelling Losses
The proposed method of risk modeling is here based on non-parametric loss models, for
their conservation of information and absence of perhaps difficult to verify assumptions.
Nonetheless, actuarial science knows important applications of parametric loss models,
which we briefly discuss in the next section.
3.1 Parametric Loss Models
The weight of a distribution’s tails is what makes it (in)appropriate for risk management,
where distributions with heavy, fat or long tails are common choices. In the continuous
case, extreme value distributions (Gumbel, Frechet or Weibull) are suitable choices,
as well as stable distributions. The latter, despite not having analytically expressible
densities except for special cases, can nevertheless be ordered upon using sequences of
truncations or moment sequences (if they exist) [37].
In the discrete case, the (a, b, 0) or (a, b, 1) class of distributions may be considered,
with a density in the former class being defined recursively as Pr(X = k) = Pr(X =
k − 1) · (a + kb ) for k = 1, 2, 3, . . .. The (a, b, 1) class is – roughly speaking – the truncated
version of an (a, b, 0)-density excluding the possibility of the event X = 0. It can be
shown that the former class includes exactly three families of distributions, which are
Poisson, Binomial and the Negative Binomial distribution.
A general issue with parametric losses is their representation of an arbitrary amount
of information by a fixed number of parameters. This inevitably incurs a loss of information, and calls for partly sophisticated methods of parameter fitting or similar. On
the contrary, nonparametric losses like (the previously proposed) kernel densities come
with the appeal of preserving all information upon which they are constructed, as well
as offering the flexibility of allowing for adjustments to model uncertainty in the expert’s
answers more explicitly. An example of this will be sketched in section 3.7.
Nonetheless, if a parametric model should be used, then one should bear in mind
that risk is intrinsically a latent variable, and the best we can do is relate it to some
observable variables. Unfortunately, the usual assumptions on the latent variable being
dependent on the hidden variable, so that an inference towards risk is possible, may not
directly apply to a risk assessment process. Risk is a property of some general entity,
action, intention, or similar. As such, subjective assessments of it are made by humans
whose risk perception may be correlated (to a degree that depends on the skill level of
the person in the respective regard) but not directly influenced by the true underlying
objective value of the risk variable. Still, algorithms like expectation-maximization [27]
could (and should) be assessed for the extent to which they can deliver a useful risk
model. Indeed, the result of an EM-algorithm being a distribution model over latent
variables together with a point estimate on its parameters is a perfectly suitable input
for the decision models put forth in the precursor parts of this report.
11
3.2 Nonparametric Loss Models
Parametric models come at the cost of information loss due to representing the entire
data by a (preferably small) set of parameters to the distribution. This is the price for
analytic elegance and the ease of many matters related to working with such models
practically.
In light of the scarceness and inconsistencies in the data to be expected in a risk
management application, we may thus look at nonparametric loss models as a potentially interesting alternative. The method of choice here will follow the proposals made
in [37].Specifically, we will start from an empirical distribution compiled from expert
interview data, and use a kernel density estimator for our loss model. Moreover, we
will focus on discrete risk assessment scales, which lead to discrete (in fact categorical)
empirical distributions. For a kernel density estimator in this context, it is somewhat
surprising that the literature is unexpectedly thin on discrete kernel density estimates.
Besides only a few proposals found in [6, 24, 33], the problem of “good” kernel density
estimation seems to be as much of an art (on top of science) as it is in the continuous
case. Hence, we will continue defining our own discrete kernel proposal based on Gaussian densities, but postpone the details until later, when we have specified the process
of data collection, which obviously goes first.
3.3 Collecting Data from Experts
As for every empirical study, the first step is fixing the details of the scenario about
which experts are to be interviewed. In our context, this may entail the identification of
a particular threat and related countermeasures. The high level description of a threat,
say “unauthorized access to server X”, must here be followed by a sequence of possible
detailed suggestions on how the respective attack could be mounted. For the aforementioned example, possibilities include the exploitation of (known) vulnerabilities (up to
zero-day exploits) in the server itself, social engineering, theft of access credentials, or
similar. Normally, each of these possibilities is matched with a respective countermeasure. Risk management standards like ISO 27000 [15, 17] or related ones [4] provide an
indispensable source of threats and countermeasures, which can be used in this step.
Abstractly, let us think of this process having brought up a list P S1 of countermeasures, opposing a list P S2 of possible threat scenarios (the acronym P S means “pure
strategy”, as a reminder that we are approaching a game-theoretic model here).
The lists P S1 and P S2 can be assumed to be quite short (though they must be
comprehensive; ideally exhaustive) in practice, and each scenario (d, a) ∈ P S1 × P S2
of “defense (d)-vs-attack (a)” can be put to its own individual review (not necessarily
independent of other scenarios, but the design of questionnaires and the amount of
context specification in there is a different and nontrivial story of empirical science not
subject of this report).
Remark 3.1 (Simultaneous Occurrences of Multiple Scenarios) Note that the modeling so far implicitly prescribes the assessment to be done relative to a specific single
threat. This restriction can be dropped in presenting the expert a set of threats and
12
explicitly allowing for several of them to occur at the same time. At first glance, this
would exponentially enlarge the list P S2 , this combinatorial explosion can be avoided
by allowing the expert to name multiple possible loss categories with different likelihoods.
That is, the expert may center the thoughts around a specific threat, but may take further
considerations of coincidental other incidents into account in saying that, for example,
• losses of category x are most likely,
• while losses of the larger category y > x remain possible if two or more incidents
occur at roughly the same time.
If several such possibilities are uttered, they are most conveniently described by a distribution supported on (at least) the anticipated loss categories x and y.
To set up the empirical game theoretic model, let us therefore assume that one scenario
(d1 , d2 ) has been specified in detail, say (for illustration)
d1 : perform periodic updates
d2 : exploit some software vulnerability
It goes without saying that this specific (example) scenario appears (if at all) in the
middle of a real-life APT, as the earlier stages are usually matters of social engineering
to make an initial contact and infection. We will go into details of this in section 5.1,
and keep our example abstract here only for the sake of illustration.
The goal of data collection is getting a payoff matrix composed from loss distributions
that can be used with the game theoretic framework defined in the preceding reports
[36, 37].Figure 4 displays the workflow to fill in one cell in the payoff matrix, which is
basically done along four steps:
1. Selection and specification of a scenario (di , dj ) ∈ P S1 × P S2 as a questionnaire
presentable to experts (the wording and style of the questions is itself a highly nontrivial matter, and should be done w.r.t. the subsequent implementation strategy
for the optimal defense. We will revisit this issue later in section 6.5),
2. Doing an expert survey on the effectiveness of countermeasure di against attack
dj . It is crucial for this survey to clearly define at least the following items:
• the context of the risk assessment (that is, the aspects that are relevant and
those that are irrelevant for the risk assessment)
• a clear definition of the scale in which the risk is quantified (in the style of
Table 2 shown in section 3.8 or similar).
3. Collecting as much expert input as possible to define an empirical loss distribution
L̂ij over the categories as specified in the survey.
4. Preparing the loss distribution for a subsequent game-theoretic analysis.
13
game matrix (to be defined)
define the context
(action spaces)
step 2
step 1
action space PS2
j
...
...
...
m
?
...
n
will probably work; damage at most medium
...
...
...
...
...
very likely to work; low damage expected
...
...
i
Question: how effective is
countermeasure i […]
against attack j […]
in the following scenario: ...
...
...
...
...
...
...
action space PS1
1 2 3
1
2
ask experts for their
assessment of each relevant
scenario
may not work; damage could be large
...
action i may be not doable/applicable at all;
high damage might nevertheless occur
action space PS2
...
survey data
collection
^L
ij
...
...
prepare the
loss models
and payoff
structure
no. of opinions
(absolute frequency)
^L
ij
...
...
...
n
...
...
...
i
m
...
...
...
step 3
j
...
...
...
...
...
action space PS1
1 2 3
1
2
step 4
...
low
medium
high
damage
Figure 4: Setting up a Matrix Game with Uncertain Payoffs from Expert Questionnaires
The details of step 1 are individually dependent on the application context, i.e., are
specific for the system or infrastructure under investigation. This step is recommended
to be done according to established standard procedures as described by ISO 27000 or
its relatives. Step 2 is a matter of empirical research and questionnaire design. The
literature on this is rich, and this task should be left with experienced staff educated in
empirical research and statistics. On the technical level, collecting the data is relatively
simple, since it is an easy task to set up an online survey, displaying a sequence of
questions asking the expert to give her/his risk rating on each described scenario. Things
may be even made more efficient by showing the expert the entire matrix, asking to enter
a risk assessment in each cell (showing yet another combination of defense and attack),
and to leave all fields blank for which there is a lack of domain knowledge or no justified
opinion can be expressed.
Step 3 deserves some attention, as this involves an a-priori agreement on the loss
categories to be used in the survey. We give details on this in section 3.8.
The final preparation of loss distributions in step 4 is a matter of kernel smoothing,
and described in section 3.10.
14
3.4 Refining the Expert Survey
Note that the expert survey – in the form described – only asks for possibilities and
not for probabilities. That is, the expert is only questioned to state an expectation of
outcome, rather than telling how likely s/he feels it to be. If the survey is refined to ask
for a likelihood in addition (as is prescribed in the conventional ISO/IEC risk management standards), then we end up with two probability distributions, one for the impact,
the other for the likelihood. A “multiplication” of these two objects, to resemble the
usual formula “risk = impact × likelihood” underlying quantitative risk management,
is theoretically possible (as a multiplication of the hyperreal representatives), but not
practically meaningful. If the two distributions are available, then a lexicographic comparison of (impact, likelihood) or (likelihood, impact) may be the more reasonable way
to go. However, an explicit advantage of the expert surveys and using distributions
as representative objects is them embodying both, impact and likelihoods within the
same loss distribution object, thus the expert interviews are greatly simplified over the
standard risk management process.
3.5 Outlier Elimination
It is important to note that any survey data should be cleaned from outliers, and there
has to be a consensus on the treatment of missing values. Either is up to a variety of
statistical methods and the particular method should be chosen in light of the given
application.
The discussion here is only meant to bring this point to the attention of the reader,
and will not go into details of how this could be done.
3.6 Harmonizing Risk Attitudes
After having cleaned outliers, it remains to “harmonize” different kinds of answers depending on the individual personalities and risk attitudes. Persons known to be risk
averse will tend to overestimate the risk, while risk seekers will tend to underestimate.
It is beyond the scope of this report to discuss concrete methods to correct risk estimates
based on a respective classification of the individual, but it is important to bear in mind
methods of statistical classification as a potential toolbox to help in this regard.
3.7 Using the Bandwidth Parameter to Model Answer Uncertainty
In some occasions, it may happen that an expert is unsure about whether or not certain
circumstances enable certain damages. For example, if the question of whether an incident at one point in the system can cause damage at another point in the system can
be answered with “generally no, except for some rare cases”, then the risk assessment
related to the incident will have its modal value at a low category, but – due to the
possibility of the incident being nonetheless severe – extends the distribution up to the
full range of loss categories. The bandwidth parameter of the kernel density estimate
can be increased to let the density put more weight on far away categories, or be chosen
15
smaller when the certainty about the assessment (rareness of the incident), is better. In
any case, the choice of bandwidth for the kernel density estimates gains another dimension of importance as being a parameter to control/describe the expert’s certainty in the
data.
3.8 Defining Risk Assessment Categories
It is crucial (not only for technical reasons) that all loss distributions for all goals in a
multi-goal security game must be defined on the same categories. This can be justified
by technical but also interpretative reasons:
Technical reason: the procedure to numerically compute multi-goal security strategies
(MGSS) relies on casting the multi-criteria objective function (vector-valued) into
a scalar that is a weighted sum. This transformation requires “compatible” objects
to be weighted and added (see [37]), which calls for the same underlying scale in
all goals.
Interpretation: comparing the severity of damages in two security goals is only meaningful if the goals are quantified in the same terms. That is, the understanding
of, say “high” damage has to be fixed for all goals, and must not be left to a
subjective idea that is individual for each expert (otherwise, the outcome of any
such assessment is useless). This is especially relevant for non-numeric goals like
the reputation of an enterprise, customer trust, or similar.
Especially to address the latter, it appears advisable to underpin the survey/questionnaire by an a priori fixed definition of categories in which the risk assessment shall be
made. This can be done in tabular form where each goal is assigned a column, with rows
corresponding to the categories, and cell entries describe the meaning of a risk category
specifically for each goal. Table 2 shows an example, whereas it must be stressed that
the concrete content of the table must be adapted/tailored to the practical situation at
hand.
Such a table should be displayed together with the survey, to equalize the expert’s
individual understandings of the risk categories, and to harmonize the resulting data.
The loss categories actually used with the model are simply the integers 1, 2, 3, . . ., noting
that the number 0 is precluded as a category (in order not to violate the assumptions
made in [36]).
3.9 Using Continuous Scales
If the loss is measured in continuous terms, then a common categorization like outlined
above must be replaced by a “meaningful” common (continuous) risk range. The exact definition of “meaningful” must herein be made dependent on the context of the
problem, so that all security goals (losses) homogeneously cover the range without being
concentrated in disjoint regions. We illustrate the issue with two examples, one showing
how it should be done, the other illustrating the problem:
16
risk
category
(numerical
representative)
negligible (1)
noticeable (2)
loss of intellectual property
< 500 e
between 500 e
and 10.000 e
loss category
damage to reputation
not noticeable
noticeable loss of customers (product substituted)
significant loss of customers
low (3)
> 10.000 e and 50.000 e
medium (4)
> 50.000 e and 200.000 e
high (5)
> 200.000 e
and 1 Mio. e
noticeable loss of market
share (loss of share value
at stock market)
potential loss of marked
(lead)
critical (6)
> 1 Mio. e
chances of bankrupt
harm to customers
...
none
inconvenience experienced
but no physical damage
caused
damages to customers’
property, but nobody injured
reported and confirmed
incidents involving light
injuries
reported incidents involving at least one severe injury but with chances of
total recovery
unrecoverable
harm
caused to at least one
customer
...
...
...
...
...
...
Table 2: Potential (Example) Definition of Risk Categories for different Security Goals
Example 3.2 (well chosen loss range) Consider two loss variables, with are monetary loss due to theft of intellectual property, and (monetary) investments to protect
these assets. Since security is primarily not about making an attack impossible but only
about making it non-economic, it can be expected that both losses range in roughly the
same numeric region. Formally, let R1 , R2 be the two random loss variables, and let
ε > 0 be a small value for which we truncate both distributions F1 , F2 at their respective
(1 − ε)-quantiles, denoted as q(1−ε) (Fi ) for i = 1, 2. Call the so-obtained loss ranges
I1 = [1, q(1−ε) (F1 )] and I2 = [1, q(1−ε) (F2 )]. If I1 ≈ I2 (i.e., q(1−ε) (F1 ) ≈ q(1−ε) (F2 )),
then we may take the convex hull of I1 ∪ I2 as the common loss range, and be sure that
the comparativeness of the two loss variables is retained and reasonable.
Example 3.3 (badly chosen loss range) Let R1 ∼ N (5, 1), R2 ∼ N (900, 100) be two
random losses with Gaussian distributions. As before, if the modeler chooses the range
as the (convex hull) of the union of both (truncated) ranges at some (1 − ε)-quantile,
the game may be defined over losses within the common range [1, 1000] (for ε = 0.027,
the range µ ± 3σ covers ≈ 99.73% of the cases for the Gaussian distribution N (µ, σ);
our cut off here is at µ + 5σ, and thus covers more than 99.9%). Since R2 , however,
assigns most of its mass in the region [800, 1000], it will always (at least up to reasonable
numerical precision) be -larger than R1 , so the optimization is pointless.
To avoid situations like sketched in Example 3.3, (at least) two options are available:
1. Rescaling of all loss ranges to a common region. Continuing example 3.3, this
1
would mean replacing R2 by 90
R2 ∼ N (10, 100/(902 )) ≈ N (10, 0.012346).
2. Defining a common continuous scale with the same intended usage as the discrete
categories. That is, if a continuous loss rating is permitted, we may define it within
a common interval from [1, 10], allowing any value to be picked by the modeler, as
17
long as it is within the range. This may be the method of choice if the modeling
interface displays a “slider” where a user can drag the gauge at any position on a
continuous scale to express the (subjective) belief about the loss.
3.10 Preparing the Loss Model
In [37], the theoretical possibility of convergence issues in the game’s analysis (by fictitious play) was anticipated, occurring when the loss distributions do not share the
same support (this adds to the technical justification stated in the previous section 3.8).
Practically, this is highly likely to occur due to missing data. If some categories are
simply not being used (either because of an unsuitable definition or because the scale
is fine-grained so that not all levels are being used by the experts), then the loss model
may be empirically correct, but not useful with a subsequent numeric analysis.
The solution in the continuous case was a kernel smoothing, technically a convolution
with a Gaussian density, to extend all loss distributions until a common end of their
support (previously called the cutoff point) is reached. We will do the same thing in
the discrete case, using a kernel √obtained from discretizing the Gaussian distribution.
To this end, define f (x) := (1/ 2π) exp(− 12 x2 ) as the density of a standard normal
distribution, and for every h > 0, define the kernel function Kh : Z → R as
Kh (n) :=
1
h
Z
n+ 12
f (t/h)dt,
n− 12
where h is the bandwidth
parameter (asR familiar from continuous kernel density estiP
1 ∞
mates). Obviously, ∞
n=−∞ Kh (n) = h −∞ f (t/h)dt = 1 and K ≥ 0, so K defines a
discrete probability mass function on Z. Moreover, it is easy to see that for every h > 0,
the function Kh resembles a discrete version of a Gaussian density, so that by letting
h → 0, Kh degenerates into a discrete Dirac mass,
1, if n = 0;
Kh (n) →
(1)
0, otherwise.
If we call F̂n a general empirical distribution function (defined on any subset of Z)
obtained from n data points (answers in the expert survey). The convolution F̂n ∗ Kh
is another distribution function supported on all Z, i.e., (F̂ ∗ Kh )(n) > 0 for all n ∈ Z.
Moreover, in letting h → 0, we have the pointwise convergence (F̂ ∗ Kh )(n) → F̂ (n) for
all n ∈ Z, so the estimate is asymptotically correct (note that in contrast to Nadaraja’s
theorem, we do not even need to assume a specific speed of decay when letting h → 0).
This convergence easily follows from (1). The same result equivalently holds if we replace
f by a truncated version fˆ thereof (being supported on [1, a] for some integer a > 1),
leading by disretization to the truncated kernel K̂h . In the following, we thus consider
the smoothed empirical distribution F̂n,h := F̂n ∗ K̂h , noting that this also pointwise
converges to F̂ and that the support (strictly) covers the full interval [1, a]. However
now, we can make a stronger convergence statement: let F be the (unknown) distribution
18
of the loss assessment, which is approximated by the expert data2 , which is F . We can
write
F̂n,h − F̂n + F̂n − F ≤ F̂n,h − F̂n + F̂n − F
(2)
To the first term, we can apply a uniform bound thanks to the supports of F̂n,h and F̂n
being all finite, which is
sup F̂n,h − F̂n → 0
as
h → 0,
as is an easy consequence of the equivalence of all norms on R. The other term in (2),
we can apply Glivenko-Cantelli’s theorem to conclude the convergence
sup F̂n − F → 0,
as
n → ∞,
so that sup F̂n,h − F → 0 in the limit h → 0 and n → ∞. Note that this argument is
only good for plausibility of our approach, but cannot be taken as a proof of correctness,
since practically, it still relies on an infinitude of data, which – more crucially – must be
objectively sampled from the real loss variable (having the distribution F ).
On the bright side, however, the proposed smoothing enjoys a nice intuitive justification as accounting for uncertainty in the assessment.
Example 3.4 Suppose an expert utters the opinion that, on a scale from 1 to 5, the risk
is 3. Despite that a middle assessment is an implicit statement of uncertainty already3 ,
there statement “the risk score is 3” is not equivalent to the statement that the risk
cannot be anything else. In other words, there may be admitted chances of the damage
being higher or lower than the average told by the expert. To express such uncertainty
more detailed, the expert may admit possible outcomes on the entire range 1, . . . , 5, with
the initial assessment being just the most confident outcome.
Of course, it will not be feasible to ask experts to provide entire probability distributions over a scoring scale, but the smoothing of the empirical distribution by convolution
with Kh achieves the same thing. Viewing Kh as a set of weights associated with all
possibilities around the mean value x, the expert assessment x ∈ Z receives the maximal weight (as being the modal value of Kh ), whereas all other possibilities receive a
nonzero weight that decays with the distance to the value x. Graphically, this process
thus “fills” all empty bins in the empirical histogram (say, if a category has never been
2
We somewhat sloppily assume here that the experts provide us with “observations” about the real
random loss X having the distribution function F . This assumption is clearly not correct, but still
the best that can be done, given that we cannot simply wait for losses to occur, as this would probably
kill the enterprise much before a decent lot of data about the true loss distribution could have been
obtained. Thus, we have to live with overly trusted experts providing us with “objective” samples of
the unobservable loss variable distributed like F .
3
This is usually avoided by choosing a risk scale with an even number of categories to avoid having the
median on the scale.
19
0.30
0.15
0.35
0.4
2
3
4
5
6
7
8
9
10
(a) Original empirical histogram
0.00
0.00
0.05
0.10
0.05
0.15
0.20
0.10
0.25
0.3
0.2
0.1
0.0
1
1
2
3
4
5
6
7
8
9
10
(b) Smoothing with h = 1
1
2
3
4
5
6
7
8
9
10
(c) Smoothing with h =
0.25
Figure 5: Effect of smoothing the histogram to fill empty categories and extend the
support
assigned during the expert survey), and additionally extends the distribution up to the
full and identical support for all loss distributions. Hence, besides satisfying the technical constraints imposed, the smoothing naturally accounts for the uncertainty in the
assessment; the lower the parameter h is, the more confident we are in the assessment
(i.e., the closer the smoothed approximation F̂n,h approaches F̂n ). Figure 5 displays an
example of the original empirical histogram (Figure 5c), and its smoothed version with
h = 1, having its gaps filled in by the superposition of smoothing kernels (expressing the
uncertainty around the modal values given in Figure 5c), and another smoothed version
of the histogram with a much smaller bandwidth parameter h = 0.25. This plot visually
illustrates (confirms) the formal claim of convergence as stated previously.
The quality of the kernel density estimation, as in general with this nonparameteric
method, is the art of choosing the bandwidth parameter h. Various rules of thumb (e.g.,
Silverman’s rule [43]) or cross-validation techniques may be applied. Since there is no
generally “best” way to choose this parameter depending on the information at hand,
we refer to the literature on nonparametric statistics for concrete methods [8, 47, 49].
4 Risk Prioritization
Let us assume that a total of m threats T1 , . . . , Tm has been identified. If, say n, experts
provide their input on the impact and likelihoods (both artefacts obtained by surveys
as outlined in section 3.3), then it is a simple matter to compile an empirical histogram
(a distribution FI ) for the impact and another empirical histogram (a distribution FL )
for the likelihood. In doing so for every threat T1 , . . . , Tm , we end up with 2m such
distributions, which we denote here as F( k, I), F( k, L) for the k-th threat Tk in the list.
To resemble the risk matrix familiar from the standard process of risk management,
we can use the -ordering on the distributions (remember that it is a total order), to
20
ranking (w.r.t. ˜-ascending order)
...
1 2
Impact:
Likelihood:
ri
...
T2
T2
...
rj
T1
m
T3
T1
T3
likelihood ˜-ranking
m
ri
T1
T3
T2
1
1
impact ˜-ranking
rj
m
threats located in this
region demand action
Figure 6: Risk Matrix using -Orderings
separately sort the threats T1 , . . . , Tm in ascending -order according to their impact
and likelihood. This gives two lists, in which each threat gets a rank assigned among the
total of m threats, say the k-th threat has rank ri on the impact ranking and position rj
on the likelihood ranking. The risk matrix familiar from the ISO processes (cf. Figure
3) is then re-established by placing each threat into a 2D-coordinate system with the
x-coordinate being the rank on the impact scale and the y-coordinate being the rank
on the likelihood scale. This puts each threat to a particular position on the grid, and
we may then proceed “as usual” by coloring the area as we would do for a normal risk
matrix. Likewise, the “critical region” can be defined as the area inside which threats
fall that need to be addressed by the subsequent risk management process. Figure 6
displays an example.
The main difference to the standard risk matrix is herein twofold:
1. While a standard risk matrix has axes scaled in categories, the so adapted risk
matrix has axes scaled in ranks that go from 1 to the total number m of threats.
2. The consensus problem of assigning a threat a single quantification in terms of likelihood and impact is avoided. Since many experts can utter disagreeing opinions,
all of which go into the impact- and likelihood-distributions FI and FL with equal
importance. The total ordering then assures somewhat like a “base-democratic”
ranking, since one threat outranks the other in the -ordering, if more people classify the impact, respectively the likelihood, as high (see [37] for the full detailed
effect of this ordering).
If the assessment considers multiple criteria, say, if the impact is not only measured
in money but also in reputation, then the respective assessments are made separately
21
(not necessarily independently) from one another. For the example of budget-impact
and reputation impact, we could think of the one distribution FI as being replaced by
two new distributions FBI and FRI (for budget and reputation). Likewise, if two threats
have assessments in these terms, given as F(BI,1) , F(BI,2) and F(RI,1) , F(RI,2) , then we
ought to rank the two in terms of two criteria. A canonical way of doing that is offered
by defining a game with two goals (“budget” and “impact”), and using one (dummy)
strategy for player 1, and letting the two threats being the strategies for the opponent
(player 2). It is, however, important to stress that we cannot directly go ahead and set
up a multi-criteria (1 × n)-game to get the most severe threat via an equilibrium, since
the gameplay is defined to be among n + 1 players, where each opponent (corresponding
to a goal) plays independently of all others. The equilibrium would then return a worstcase threat identified per goal, which is possibly not what we seek here for a multi-criteria
risk optimization. The theory, however, remains applicable when the game is reduced
to a two-player (1 × n) game with scalar(ized) payoffs per player. In that case, the
equilibrium is necessarily pure and indicates the worst case threat for player 1. The R
package implements this method in a designated procedure preference:
# ranking if there is only one goal (say, FBI1, vs. FBI2)
> preference(FBI1, FBI2)
2 # this means that the second parameter (FBI1) is preferable
# ranking, if there are multiple goals (of equal importance)
> preference(list(FBI1, FRI1), list(FBI2, FRI2))
#
#
#
>
Let us assign twice as high priority to the "reputation"
goal by supplying the parameter weight=c(1,2), i.e. "goal" has
priority 1, and "reputation" has the (double) priority 2.
preference(list(FBI1, FRI1), list(FBI2, FRI2), weights=c(1,2))
The results directly gives the desired ranking by telling that either the first (output
“1”) or second (output “2”) threat is less severe; if the function returns zero, then the
distributions are identical and the decision is indifferent. For three or more threats, the
procedure can be repeated pairwise to rank a whole set of threats in the way as described
above.
5 Examples of Game-Theoretic Modeling
5.1 Modeling APTs
The investigation of many examples of advanced persistent threats (APTs) reported in
the past reveal a common structure underlying an APT, even though the details thereof
may be highly different. Quoting the taxonomy of [7], an APT roughly proceeds along
the following steps:
1. Initial infection:
22
a) reconnaissance: information gathering,
b) development: design of a made to measure malware,
c) weaponization: preparing the trojan and droppers,
d) delivery: transmission into the victim infrastructure, e.g., by a phishing email,
or similar.
2. Learning and propagation: repeated sequence of
a) exploitation: to get deeper into the system
b) installation: to leave artifacts and backdoors for an easy return later, and
destroy footprints of the attack
3. Damage:
a) command and control: interaction with the victim system’s compromised
resources via previously left artifacts
b) actions on the target: causing the actual damage
The specific actions taken in each of these phases depend on the target infrastructure and no general description is possible due to the diversity of such infrastructures.
However, specific examples can be “read off” reported prominent incidents, such as including Stuxnet [10], Duqu [2], Flame [28], and Aurora [23]. A common element in all
these appears to be the human factor, which we discuss separately in section 5.2.
Game theory has been applied in various ways to model attacks and cyber risks [9,25,
50] and proposals (independent of game theory) include moving target defenses [18, 19],
trust mechanisms [48], and defense-in-depth techniques [30]. Here, we will review a
recent proposal to model APTs as a sequence of games, each of which is tailored to the
specific nature and details of the respective phase.
That is, an APT usually begins with a harmlessly looking email or “lost” USB stick,
on which malware enters the system. Alas, nowadays attackers have joint forces into
an entire illegal business sector covering the entire supply chain of cyber crime in a
spectrum of independently offered services (often referred to as “cybercrime as a service”
in alignment to cloud computing terminology). This means that the person identifying
a weakness is not necessarily the same who is writing the exploit for it. Likewise, the
author of the exploit kit is not necessarily applying it anywhere, but merely sells it to
the actual attacker. Similarly, infections with malware are not automatically intended to
cause immediate damage. The term “botnet-as-a-service” describes the business model
of infecting a large number of machines and offering to deploy malware on these zombies
upon request and for a (smaller or larger) fee. In this way, the attacker can simply “buy”
access to a potentially large number of infected machines instantly. For the victim, this
has the unpleasant effect of the infection remaining stealthy and inactive, until some time
later, when the outbreaks causes noticeable damage. At this time, however, it is most
likely that no connection between a past email and the current incident is recognized.
The exact time window between an infection and its activity is also dependent on the
23
technical countermeasures adopted in the specific company. For example, signaturebased malware recognition (like classical anti-virus software used to work) may take a
couple of days until the malware is recognized as such and the respective signature is
shipped with the next update. On the contrary, cloud based malware detection that
is based on recognizing a huge lot of “identical” email (attachments) suddenly flowing
through the internet can have a much shorter time (even a few hours) until a malware
is suspected and classified. So, the time window between the infection and the exploit
may, in some cases, be closed quite fast (by a good malware recognition system).
To model a so-structured APT in terms of games, the first step is listing all potential
ways into the system, such as include (but are not limited to):
• (spear) phishing, whaling,
• waterholing,
• tailgating,
• etc.
The entirety of these possibilities makes up the set of strategies P S2 for the attacker.
Typically, an entry in P S2 is thus not constrained to have a specific form or structure
(in particular, an element x ∈ P S2 is not a purely mathematical object but rather a
description of how an attack would be launched according to this particular strategy x).
In a different view, P S2 can be considered as a list of threats, to which corresponding
countermeasures can be defined (appealing to catalogues found in standards like ISO
27000, etc.). The list of countermeasures is P S1 .
Note that P S1 and P S2 should be defined bearing in mind the steps and structure
of the first phase of the APT, which comprises information gathering, development,
weaponization and delivery. Consequently, example defense measures in P S1 may relate
to periodic (and random) re-configurations of the system in order to thwart the attacker’s
respective next steps, either by invalidating so-far collected information or by removing
malware by coincidence, say if a computer is reinstalled or privileges of the victim user
have changed (were revoked).
In any case, let the game describing the initial infection be a matrix game G1 (where
the subscript is a reminder of this being the first phase of the APT). It appears fair to
let this be a matrix game (static and repeated), since if the game is expectedly repeated
either in case of an attack failed, or to infect further parts of the system, if an attack
was successful.
Let the equilibrium computed for the infection game G1 be the pair of distributions
(F1∗ , F2∗ ), where the optimal defense against the initial infection is the distribution F1∗
(the distribution F2∗ , more specifically, its probability mass function can be taken as a
non-unique indicator set of neuralgic points in the infrastructure).
To model the next phase of learning and propagation, we divide the (physical) infrastructure in stages that the adversary needs to reach one by one in order to get to
the inner target asset. If the infrastructure is a network graph G(V, E), then the target
asset may be a(ny) fixed node v0 ∈ V , and the i-th stage can (but does not need to) be
24
ftp(0,2)
ftp(0,1)
execute(0)
ftp_rhosts(0,2)
sshd_bof(0,1)
ftp_rhosts(0,1)
rsh(0,2)
trust(2,0)
rsh(0,1)
trust(2,0)
rsh(0,2)
ssh(0,1)
rsh(0,1)
ftp(1,2)
ftp, rsh, ssh
execute(1)
ftp_rhosts(1,2)
rsh(1,2)
trust(2,0)
File Server
(Machine 1)
rsh(1,2)
execute(2)
Workstation
Machine 0
Firewall
local_bof(2)
Router
full_access(2)
Initial attacker‘s capability
ftp, rsh
precondition
Database Server
(Machine 2)
(a) Example Infrastructure [44]
attacker‘s exploit
final result
(b) Example Attack Graph [44]
Figure 7: Topological Vulnerability Analysis Example
defined as the set of nodes at distance i to the node v0 . That is, the stages are “concentric
circles” around the asset, and on each stage, the adversary plays a (different) game to
get to the next stage. A single such stage is penetrated by the aforementioned steps
of exploitation and installation, continuing with exploitation again on the next stage
(only in a different setting there). This modeling is practically supported by topological
vulnerability analysis (TVA), which can cook up an attack graph for an infrastructure.
In the following, we will illustrate our thoughts based on Example 5.1.
Example 5.1 (based on [44]; see also [40]) Consider a system as shown in Figure
7b, composed from three devices, with various ports opened and services enabled. Based
on this information, the attacker can consider several exploits, such as:
• FTP- or RSH-connections from a node x to a remote host y, hereafter denoted as
ftp rhosts(x,y), and rsh(x,y), respectively.
• a secure shell buffer overflow at node y, remotely initiated from node x, hereafter
denoted as sshd bof(x,y).
25
Table 3: APT scenarios (adversary’s action set P S2 , based on Figure 7)
1
2
3
4
5
6
7
8
execute(0) → ftp rhosts(0,1) → rsh(0,1) → ftp rhosts(1,2) → sshd bof(0,1)
rsh(1,2) → local bof(2) → full access(2)
execute(0) → ftp rhosts(0,1) → rsh(0,1) → rsh(1,2) → local bof(2)
full access(2)
execute(0) → ftp rhosts(0,2) → rsh(0,2) → local bof(2) → full access(2)
execute(0) → rsh(0,1) → ftp rhosts(1,2) → sshd bof(0,1) → rsh(1,2)
local bof(2) → full access(2)
execute(0) → rsh(0,1) → rsh(1,2) → local bof(2) → full access(2)
execute(0) → rsh(0,2) → local bof(2) → full access(2)
execute(0) → sshd bof(0,1) → ftp rhosts(1,2) → rsh(0,1) → rsh(1,2)
local bof(2) → full access(2)
execute(0) → sshd bof(0,1) → rsh(1,2) → local bof(2) → full access(2)
→
→
→
→
Table 4: Security controls (selection) – subset of P S1
countermeasure
deactivation of services (FTP, RSH,
SSH)
software patches
reinstalling entire machines
organizational precautions
comment
these may not be permanently disabled, but could be temporarily turned off or
be requested on demand (provided that either is feasible in the organizational
structure and its workflows)
this may catch known vulnerabilities (but not necessarily all of them), but can
be done only if a patch is currently available
this surely removes all unknown malware but comes at the cost of a temporary
outage of a machine (thus, causing potential trouble with the overall system
services)
for example, repeated security training for the employees. These may also have
only a temporary effect, since the security awareness is raised during the training, but the effect decays over time, which makes a repetition of the training
necessary to have a permanent effect.
• local buffer overflows in node x, hereafter denoted as local bof(x).
Each of these may establish a trust relation between two nodes x and y, which we denote
as trust(x,y). The list of attack strategies to penetrate all the stages until full access
to machine 2 is a matter of plain path enumeration in the attack graph, whose results
are shown in table 4.
A selection of respective countermeasures is given in table 4.
The game to model the penetration can then be defined per stage by defining the
machines 0, 1 and 2 as stages, where machine 2 is the inner assert (node v0 in our
previous wording), and a stage is the game played to establish a trust relation between a
machine at distance i and one at distance i − 1 to machine 2.
In the (quite simple) infrastructure of Figure 7a, the stages would thus be:
• stage 1 (distance 1 to machine 2): {router}
• stage 2 (distance 2 to machine 2): {file server (machine 1), firewall}
• stage 3 (distance 3 to machine 2): {workstation (machine 0)}
The game played at stage 3, accordingly, has strategies equal to all exploits that can be
mounted on the workstation (machine 0), which can be read off the TVA attack tree
(Figure 7b) as P S2 = {ftp rhosts(0,1), ftp rhosts(0,1), sshd bot(0,1)}. The
26
corresponding set P S1 comprises all countermeasures that can be implemented (such as
virus checks, temporary disabling of services, but also non-technical ones like repeated
security training, etc.). The strategy spaces P S1 and P S2 identified in this way then
define the shape of the respective 3rd stage game G3 , whose payoff structure is to be
defined following the procedure outlined in section 3.3; Figure 4.
The games for the other stages are constructed analogously.
Given a game for each stage, we can connect them into an overall model for phase
two of the APT by adopting a high level perspective. In each stage, the adversary has
basically two options, which are:
1. penetrate: this means launching an attack as identified based on previously gathered information (cf. example 5.1), or
2. stay, to collect more information while remaining stealthy → learning.
Both options can be modeled using their own (distinct) game models, and the connection
between the games over all stages is established by considering that in the n-th stage
game (whether we go for penetrating or staying), the outcome is one of the following:
• if the attacker decides to penetrate, then
– it may succeed, in which case it enters game Gn−1 , or
– it may fail, in which case it has to repeat game Gn once more.
• if the attacker decides to stay, then
– it may succeed and gain further information, but this leaves the attacker in
this stage n,
– it may fail, in which case the overall game terminates, and the entire investment of the attacker is lost (we model this as a negative gain for the attacker).
Likewise, the defender has the option of defending (without any guarantee of the
defense being successful), or not defending. The latter strategy is implicitly played
whenever the defender “pauses” in its defense, say, if the security guard is being sent
elsewhere and misses the attack by this unfortunate coincidence. In any case, “do not
defend” is never a dominating strategy and occurs only due to resource limitations and
the inability to defend everywhere at all times against everything.
Writing I(n) for the payoff (to the adversary) in the n-th stage, the above modeling
yields a 2 × 2 zero-sum matrix game structured as shown in Figure 8 (cf. [41]). In this
model, we have additional quantities p(n) and q(n) that depend on the current stage,
and quantify the likelihood for each action to be successful. These values can be either
defined directly, or themselves be derived as saddle point values of classical 0-1-valued
matrix games in each stage (in this case, the risk assessment is done in binary terms
only asking the expert for whether or not the attack will be successful).
It is reasonable to assume a circular structure in this game (cf. also [1]), which amounts
to a single unique equilibrium, for the following reasons:
27
```
```
attacker
```
penetrate
```
defender
defend
p(n) · I(n − 1) + (1 − p(n)) · I(n)
do not defend
I(n − 1)
stay
q(n) · I(n) + (1 − q(n)) · (−I(n))
I(n)
Figure 8: Sequential 2-Player Game Model for Advanced Persistent Threats
• if “defend” is a dominating (row) strategy, then either “stay” or “penetrate” will
complete this into an equilibrium, and there is nothing to be optimized by game
theory here on this (higher) level.
• if “do not defend” is a dominating (row) strategy, then there is no need to do any
active security here, as the infrastructure is already secure anyway.
• if “penetrate” is a dominating (column) strategy, then the obvious best choice is
to defend, which again degenerates the game into a trivial matter.
• if “stay” would be a dominating (column) strategy, then there is no need to defend
anything, since the attacker is not trying to get to the asset anyway.
In any case, it is a simple (yet laborious) matter of working out the game matrix for
each stage, and determine an equilibrium for it (say, using fictitious play as described
in [37]). The particular equilibrium obtained for the n-th stage is the distribution I(n),
telling us the distribution of damage in that stage, accompanied by optimal defenses in
this stage (obtained from the 2 × 2 game and the inner sub-games played for penetration
and to collect information during a stay).
Concluding the idea, the decomposition of the learning-and-penetration phase in the
APT life cycle into stages and corresponding games played therein delivers an in-depth
defense action plan (individual randomized defense actions being taken on each part in
the infrastructure), as well as a higher-level risk assessment I(1), I(2), . . . that refers to
each stage. The distribution I(n) for the n-th such stage then indicates the likelihood
of damage suffered at the n-th “protective layer” around the asset of interest.
The final game modeling the Damage-phase of the APT can then be defined similar to
the initial infection game G1 , as the attacker may simply try and retry causing damage.
The process and steps to identify possible actions and countermeasures must again be
supported by special purpose (and application specific) tools and expertise, but the game
theoretic treatment and computation of risk metrics remains the same. Thus, we will
not repeat the details here.
A Static Game Model for the Penetration Phase In a more simplified view towards
a substitute of the sequential phase two game, a static game model can be considered
as an alternative (being easier to model and more efficient to analyze computationally).
This simplification is bought at the cost of getting a more coarse-grained model, since
the attack and defense strategies are defined more “high-level” and not specific for each
stage in the graph representation (of the infrastructure or the attack tree).
28
As before, we can think of the attacker working its way through the stages, while
occasionally being sent back or kicked out if a security officer (perhaps unknowingly)
closes some of the backdoors established previously. The pure strategy set P S1 for the
defender is thus the set of all nodes/components in the system on which spot checks (e.g.,
malware scans, configuration changes, updates, patches, etc.) can be done. Different
to the per-stage game modeling from before, the defenses now correspond to high-level
attack strategies P S2 that describe only techniques but are not specifically tailored to a
particular machine. That is, P S2 would be composed from a more generic set of threats
like
• buffer overflow exploits,
• cross-site scripting,
• code injections,
• etc.,
but unlike in Example 5.1, these attacks would not be considered on specific machines.
Rather, the attack scenario is described as a general code injection that may be tried on
any machine in the network (if possible). The description of the attack/defense scenario,
as well as the possibilities to consider for a risk assessment may be more complex in this
kind of modeling, as Example 5.2 shall illustrate.
Example 5.2 The expert survey would ask something like:
What is the expected damage if an attacker attempts a code injection attack
in our infrastructure, while machine 1 (see Figure 7a) is being re-installed at
roughly the same time.
To answer this question towards a loss estimate, the expert may consider the following
aspects:
• Which machines could be vulnerable to such an attack (say, which of them are
accessible by a web interface or maybe have an insufficient patch level, etc.)
• Depending on which machine is attacked, the damage may be more or less (thus
allowing the expert to utter multiple possibilities; substantiating the construction
of a categorial loss distribution once again).
• Depending on where the spot check is done (say, on machine 1 in Example 5.1),
three cases are possible:
– Machine 1 has so far not been reached by the attacker (more precisely the
attack path), so the reinstallation has no effect on the APT at this stage.
– Machine 1 is exactly the one currently targeted by the attacker. This may
render the results of the APT learning phase on this machine useless, since
the configuration has changed. Consequently, the attacker is sent back one
stage and has to restart learning from here.
29
– Machine 1 has already been infected with malware, so that the adversary’s
backdoor path goes through it. In that case, the attacker’s secret backdoor
may be closed by the reinstallment and the attacker is again sent back to a
previous stage.
Since there is uncertainty on where the attack may be mounted, and also on the current
position of the adversary, the expert may utter several possibilities in one of two ways:
• Tell about a set of possibilities, expressing the likelihood for each of them individually. For example, the expert may say something about the most likely outcome,
but in addition also say that more or less extreme results are possible with certain
other likelihoods.
• Give a most likely outcome r, and express the uncertainty about it: this in fact
corresponds to the aforementioned kernel density smoothing, since the uncertain
variation around the most likely value (as expressed by the expert) may be well
expressed by a bell-shaped curve centered around the value r. This is nothing else
than a kernel density, where the uncertainty is “quantified” by the parameter h.
In repeating the procedure exemplified in Example 5.2 for each (high-level) defense/attack scenario (di , aj ) ∈ P S1 × P S2 , we end up with a standard matrix game defined with
probability-distribution valued payoffs, which are now defined not on the risk categories,
but on the graph theoretic distances, or more specifically, the stages between the initial
infection and the inner asset. Picking up Example 5.1, there are three stages which
the attacker has to proceed through, and the loss distribution defined per defense/attack assigns likelihoods to each of these stages; Figure 9 displays an example. The
game-theoretic optimization then goes for pushing the probability mass towards “more
remote” nodes in the network (or attack graph). That is, we will try maximizing the
distance between the attacker and the asset, measured as the number of hops (= stages
in our wording) that need to be taken to reach the goal. The stage numbering should,
for consistency with the minimization, be increasing from 1 up to the stage where the
asset is, i.e., stage 1 should comprise the outermost perimeter, followed by the adjacent
inner nodes, until stage N > 1 being the set of final nodes adjacent to the target asset.
5.2 Modeling Social Engineering
Social engineering is a good example of a case where the distribution-valued gametheoretic framework perfectly fits. Since there is hardly any technical countermeasure
against such attacks, and the exploits are based on psychological principles of human
behavior, there is also an element of “forgetting” that makes security awareness decay
over time. For this reason, security training, information campaigns and similar must
be repeated from time to time, and there is never a guarantee that any of these precautions has any or even durable effect. Both of these reasons render matrix games with
distribution-valued payoffs into a nice model, since:
• the necessity of repeating social engineering awareness training corresponds with
the modeling assumption on the matrix game to be repeated.
30
0.2
0.0
0.1
probability
0.3
0.4
loss(reinstall machine 1 / injection attacks)
1
2
3
stage
Figure 9: Example of loss distribution on stages (phase 2 of an APT)
• the finiteness of matrix games corresponds to the limited set of possible countermeasures known against such attacks. That is, we cannot ask an employee just to
become “creative” in how social engineering may be detected, and the best we can
hope for is a feasibly small set of recommendations that a person can remember
to avoid falling victim to social engineering.
• the inevitable element of human error renders the outcome of a social engineering
scenario in any case up to randomness. Hence, our specification as a distributionvalued matrix game appears as a good fit, as it allows us to classify social engineering countermeasures as being “variably effective” (taking into account the
differences in people’s personality, daily mood, current workload, technical skills,
time since the last security awareness training, and many more).
For a pure model of social engineering attack/defense scenarios, the questionnaire
outlined in section 3.3 may be adapted to poll people about their awareness against
social engineering, describing the particular attack scenario in the description of the
question, and asking the employee on how he/she would behave in this scenario. The
results then equally well compile into the sought loss distributions, if each answer in the
multiple-choice survey has a background association with a predefined loss category (cf.
section 3.8).
A different approach to account for social engineering when it comes to loss distributions is considering these attacks as methods to establish the initial infection in an APT
model as outlined in section 5.1. Here, we would include social engineering techniques
in the attacker’s strategy space P S2 , and the specification of the respective success rates
can be done using the same kind of survey as before. The resulting game then already
models the first phase of an APT infection, in giving the probability for a social engineering attack to succeed under the given security awareness campaign (which is a mixed
strategy over P S1 in the sense of repeated randomly selected trainings, information
broadcast, etc.).
The second phase of the APT, the penetration, can as well use social engineering
31
techniques to overcome barriers within the system. Suppose that a subnetwork, for
security reasons, does not have any physical or logical connection to the outside or
any other intranet within the company. Then a malware can jump over this physical
separation by a bring-your-own-device incident. That is, if the malware gets into the
system by someone connecting a virulent USB stick to the inner separated network, the
infection has effectively overcome the logical separation. Even more, this scenario may
start from within the company’s perimeter, since the infection of the USB stick may
indeed happen on an employees’ computer, which has a connection to the internet and
got infected in the first phase.
The respective loss distributions associated with such an infection outbreak can effectively be constructed by simulation, as is eloquently outlined in [22]. We leave the
details aside here.
6 Working with Game-Theoretic Risk Measures
The description in the following is based on the previous explanations about the model,
and therefore only discusses practical matters of choosing the parameters and hints on
how to interpret the results. A description on how to do the calculations with aid of the
R statistical software suite is given in section 6.4.
6.1 Choosing the Cutoff Point
So far, we mentioned the necessity of truncating distributions only as a technical matter
of assuring convergence. As such, the point a > 1 at which the payoff distributions are
truncated (for a compact support) also influences the outcome of the game, since the
equilibria depend on it. Indeed, the practical choice of a can be made in light of how a
determines the -relation among the payoffs. Informally, Lemma 4.4 in [37] tells that
is decided based on how the payoff densities behave in a right neighborhood of a. That is,
the setting of the value a controls the range in which damages are considered as relevant
for , whereas damages far lower than a become less and less relevant for the -relation.
This means that the choice of a can be made to implement a risk prioritization in the
model in a sense that is perhaps best illustrated by an example (cf. also [38] for a related
yet different illustration):
Example 6.1 Suppose an enterprise has backup capacities to bear losses less than 50.000 e.
Then, we may set the truncation point a := 50.000, so that the entire probability mass
assigned to damages > a is “squeezed” underneath the distribution on the interval [1, a].
Consequently, if a loss model F1 admits highly likely losses > 50.000 e (i.e., has in that
sense a fat tail) will result in a higher value of f1 (a) than maybe the alternative loss distribution F2 , assigning smaller likelihood to such incidents (and in turn coming out with
a smaller density f2 (a)). Thus, f1 (a) > f2 (a) will make F2 -preferable over F1 [37].
The dependence of the resulting equilibrium is best visualized by taking another example of a 2 × 2-game with continuous payoff distributions as shown in Figure 10. Taking
32
the cutoff point a = 10 results in a pure equilibrium (x∗ , y ∗ ) = ((1, 0), (1, 0)), while
truncating the distributions at a = 6 changes the equilibrium into a mixed one, namely,
(x∗ , y ∗ ) = ((0.751, 0.249), (0.531, 0.469)). Both of these have been obtained using fictitious play as described in [37] taking 1000 iterations.
6.2 Interpretation and Meaning of Equilibria
The difference in the equilibria computed for the previous examples is immediately
understood by looking at the way how depends on the truncated distribution’s tails
(cf. [36, 37]): if the cutoff point a is chosen so large that the likelihoods assigned to
events around a are approximately equal, then there is no point in frequently switching
strategies for either player, since the outcome under any of the four scenarios admitted
by the example 2 × 2-game is roughly the same. Hence, the equilibrium is “purified”
by the choice of the cutoff point. Conversely, if the cutoff point a is chosen so that the
masses that accumulate around it are significantly different, then mixed equilibria may
arise.
This has a twofold and partly positive consequence for the risk manager, since:
• the practical choice of the cutoff point a can be made to mark the region in which
risks are considered as relevant. That is, if there is an agreement that damages
beyond some threshold value are highly relevant, while everything below it is only
of secondary interest, then the cutoff point a can be set to exactly this threshold
value. More importantly, any such setting is not even to be taken as sharp, since
what determines the -relation is the left neighborhood of a, so the transition from
the domain of acceptable risks to the area of critical risks is somewhat smooth.
For example, if the risk management is done in terms of a CVSS scoring, then the
risk manager may fix the convention of not caring about vulnerability scores in the
range around 2, but certainly action is demanded for scores above 7. In that case,
we would set the cutoff point to a = 7, in which case the game optimization focuses
on scorings of 7 or (slightly) less, while the region around scores of 2 becomes
relevant only upon equiprobable ratings of all defense actions on the range (2, 7].
This effect holds in general and is not limited to the example games here. In fact,
the cutoff point creates a qualitative difference to conventional optimization, where
the numeric magnitude of the goal function is irrelevant for the maximization. This
may not practically be the case, but can be accounted for by setting the cutoff point
accordingly.
• An equilibrium must in any case be interpreted relative to the cutoff point. If a can
reasonably/meaningfully be chosen so that pure (or approximately pure) equilibria
arise, then these greatly ease matters of playing the equilibrium. That is, if the
risk prioritization results in almost all actions ending up with approximately equal
likelihoods in the relevant neighborhood of a, then practically playing the optimal
behavior is easy, since the best response is no longer randomized.
33
goal
a2
0.3
0.2
0.15
0.0
0.05
0.1
0.10
d1
0.20
0.4
0.25
a1
2
4
6
8
10
12
14
2
4
8
10
12
0.30
0.20
0.25
0.16
0.15
0.14
0.05
0.10
0.10
0.12
d2
6
loss(1,2)
0.18
loss(1,1)
2
4
6
8
10
12
14
2
4
6
loss(2,1)
8
10
12
14
loss(2,2)
(a) Cutoff at a = 10
goal
a2
0.5
0.4
0.30
0.15
0.2
0.20
0.3
0.25
d1
0.35
0.40
0.6
a1
2
4
6
8
10
12
14
2
4
6
8
10
12
loss(1,2)
0.30
0.25
0.22
0.15
0.16
0.20
0.18
0.20
d2
0.24
0.35
0.26
0.40
0.28
loss(1,1)
2
4
6
8
10
12
14
2
4
loss(2,1)
6
8
10
12
14
loss(2,2)
(b) Cutoff at a = 6
Figure 10: Payoff structures with different cutoff points
34
Risk vs. Goal Prioritization: The role of the cutoff point in risk prioritization must be
distinguished from the role of the weights (discussed in [37, Sec.4.5.1]) assigned to reflect
the priorities of different goals in an MGSS. In fact, this is a different degree of freedom,
and goal priorities (the weights αi for i = 1, 2, . . . , d goals can be chosen independently
of the cutoff parameter a).
6.3 Optimizing an Infrastructure’s Resilience (Risk Treatment)
If the line between threats that need to be addressed and those that can be left aside
(for the moment) has been drawn, i.e., the risk evaluation phase is completed, the risk
treatment concerns the selection of controls to mitigate the threats.
Given one or more threats to be addressed, risk treatment is about selecting controls
against them. The particular selection of controls and resource allocation is a matter
of optimization, and this is where game theory comes into play. Specifically, it helps to
determine the optimal style of implementing controls towards minimizing the risks. The
procedure, on a high level, is defining a game matrix that has a list P S2 of adversary’s
actions (typically the threat or a set of threats to be considered), and another list P S1 of
controls that address the threats. Note that the setup of the game matrix, specifically the
definition of P S1 and P S2 should be made with care: it may well be the case that some
controls in P S1 may not address certain threats in P S2 and vice versa. For example, if
we have the countermeasures
• d1 ∈ P S1 : “installing an intrusion detection system”
• d2 ∈ P S1 : “install more fire extinguishers”
And the threat list P S2 includes
• T1 ∈ P S2 : fire outbreak
• T2 ∈ P S2 : hacking attack
Then it is obvious that d1 is pointless against T1 and d2 has no mitigating effect on
T2 . In such cases, one may consider a clustering of threats and controls based on their
mutual relevance. This amounts to selecting specific controls against specific threats,
and allows an optimized control selection “per threat” or “threat group” (if a control is
effective against more than one threat). Once the lists P S1 and P S2 have been specified,
it pays to sub-classify the actions in P S1 , as there are:
Static controls: these have a permanent effect in being a change to the system structure.
Their selection must be based on the goal of finding the minimal set of controls
that covers the maximal spectrum of threats. If several candidate controls are
available, then the problem is “game-theoretic” in the sense of being a humble
optimization for the defender having n strategies against a specific single strategy
of the attacker (that is the threat to be mitigated). If all threats shall be mitigated
at the same time, then the problem of control selection can be set up as a matrix
game, where n controls are available against m threats. The resulting equilibrium
consists of three output artefacts:
35
1. A probability distribution x∗ over the n controls
2. A probability distribution y ∗ over the m threats
3. An equilibrium payoff distribution V
Each of these is meaning- and useful, because:
• All controls having a nonzero probability assigned by the equilibrium distribution x∗ must be played for risk minimization. Thus, these controls need
to be implemented. Note that the magnitude of the probability is herein not
relevant, but can be taken as an indication of importance of the respective
countermeasure. For example, if the games equilibrium prescribes to “play”
the strategy “install another firewall” with likelihood 0.3, then it is obviously
meaningless to install a firewall only to an extent of 30%. Nonetheless, it
tells us that this control must be installed at all. However, if the firewall
installation gets a likelihood of 0.3, and another control, say “change passwords” gets a likelihood of 0.6, then this indicates that both of these measures
must be implemented, but changing the access credentials (or enforcing this)
should go first, as it is the more frequent (thus more important) strategy in
the equilibrium.
• The likelihoods of different threats can be taken as an indication of “how
likely” a threat is in the worst case. This indication must, however, be interpreted in light of the non-uniqueness of equilibria, which entails that the
computed distribution y ∗ is indeed a worst case scenario, but there may be
(many) others too.
• The equilibrium payoff distribution V quantifies the residual risk remaining
after the controls have been implemented. If, say the average (mean value)
of V turns out to be not satisfying, then the entire selection process may be
repeated (in Figure 1, this is risk decision point 2, where the process may be
restarted from the “establish context” phase.
Alternatively, we can ask for the smallest set of countermeasures that are simultaneously effective against all threats. Given the information of which defense
measure is effective against which threat (in the form of a set Si of candidate
countermeasures for the i-th threat), the problem is to compute a hitting set for
the family {S1 , S2 , . . .}. That is a well-known problem and can be solved using
linear optimization, or more direct algorithms found in the literature.
Dynamic controls: these have a volatile effect and need to be repeated, such as patching
and security awareness trainings. The latter is also an example that justifies the
approach of letting the outcome of a control being uncertain and in fact quantified
by a probability distribution. In case of a security awareness training, this distribution could reflect the (relative) amount of people that are (afterwards) highly
aware, medium aware or even remain unaware despite the training. In any case,
the outcome is never certain and depends on the person and its background. The
second example of patching equally well justifies the modeling of outcomes with
36
probability distributions: patching may be prescribed, but the patch may be unavailable at the current time, or it may not help against the right vulnerability. So,
the outcome of “patching” is also uncertain and the model put forth in [36] explicitly accounts for this. The selection and implementation of such dynamic controls
works as for the static controls described before, but with an important difference
in the use of the artefact distribution x∗ : this is a randomized prescription telling
the frequency of how often a control is repeated. That is, if a control, say “patching”, gets assigned a probability of 60% by x∗ , then the implementation is done
as follows: on each day, we toss a biased coin, coming up heads with a chance
of 60%. If it does so, the administrator is told to look for and install a patch.
The other days, no patching is done. This example is of course oversimplified, but
shall illustrate the “security-by-randomness” approach that game theory enforces:
security against the attacker is gained by it not knowing the current patch level
reliably (as the patching can happen every day), so anything that the attacker has
been learned so far may soon be invalidated, and hence the system is more secure.
A Purely Combinatorial Selection Technique: A different selection method for risk
controls is offered by the methods of model-based diagnosis (MBD) [42]. In a nutshell,
MBD (as put forth in [13, 42]) offers a systematic way of testing the effectiveness of
subsets of P S1 against subsets of P S2 . The goal is finding a minimal set of actions in P S1
that address all threats in P S2 . More formally, let there be a relation ⊆ P S1 × P S2 ,
with the semantics that
d1
d2 , if and only if defense d1 is working against threat d2 .
Conversely, if some defense action d1 is useless against threat d2 , then (d1 , d2 ) ∈
/ .
Using this relation, we can associate each threat with countermeasures relevant to it,
giving a family of sets as
P := {{di ∈ P S2 : di
t} : t ∈ P S1 } ,
i.e., an entry in the family P is a set Ci := {di1 , di2 , . . . , dik } of all k countermeasures
that are effective against threat di ∈ P S2 .
The sought optimal selection of controls, a diagnosis in the terminology of [42], is a
minimal hitting-set D for P. Minimality can here be understood by cardinality or in
terms of ⊆-relation, so that no smaller set than D is a hitting set (this is the usually
preferred setup). By definition, a hitting set D has the property of intersecting every
element in P (formally, D ∩ Ci 6= ∅ for all Ci ∈ P). Again, interpreting this in our
context, this means that the selected security defense measures in D effectively address
all threats in P S2 (this is the hitting-set property), and any proper subset of these
controls would leave at least one threat untouched (this is the ⊆-minimality).
Computing hitting sets is a simple matter of setting up a linear integer constrained
optimization problem, or possible by direct computation and heuristics. We leave the
computational details aside here, except for the final remark that the problem of computing minimal hitting sets is NP-hard in general (see [21]). This is why a game-theoretic
method may be more efficient and hence preferable here.
37
6.4 Software Support
The entire theory outlined up to this point has been implemented as a package for
the R-system [32], named HyRiM [39]. Plots and results given to illustrate matters in
the following have all been obtained using this implementation, and we will give the
respective call sequence (on the R shell) here in a condensed form that may serve as an
example-based tutorial for applying the theory elsewhere.
It must be emphasized that the implementation mentioned here cannot be a substitute
for the entire risk management process as outlined in section 2. Duties of context
definition, infrastructure modeling, threat identification and listing of defense actions
should be subject of extensive use of established (relevant) software tools and standards
in this context. Vulnerability scanners like Nessus [46], reporting tools like Cauldron [26],
or tool support to work with the ISO or BSI standards family are strongly recommended
in these initial phases of the risk management process.
1. Assume that the expert opinions are available as a numeric vector obsij containing
all the answers for the scenario (di , dj ) ∈ P S1 × P S2 . That is, obsij is a vector
of integers in the range {1, 2, . . . , M }, where M is the maximum value (for our
examples, we took M = 10).
Given a distinct such vector obsij for each i, j, we can compile a loss distribution
by the call:
fij <- lossDistribution(obsij)
This produces a continuous loss model as displayed in Figure 10. A visualization
as in this figure is obtained by either plotting a single loss distribution
plot(f11, cutoff=6)
(in which the parameter cutoff is optional and defaults to the maximum observation
in the data from which the loss distribution has been constructed), or by plotting
the entire game matrix by calling:
plot(G, cutoff=6)
where the parameter cutoff is again optional and, if supplied, is passed to the inner
plots of the payoff distributions.
Assume that the previous step has been repeated to construct continuous loss
distributions f11, f12, f21 and f22. Discrete loss models (with smoothing) can be
obtained by telling lossDistribution to come up with a discrete model. This is
done by adding an according flag, and (optionally) supply a bandwidth parameter
(which if omitted, defaults to Silverman’s rule of thumb, applied to the data is if
it were continuous):
fij <- lossDistribution(obsij,discrete=TRUE,supp=c(1,10))
38
The parameter supp is supplied as a reminder (also for the user) that all loss
distributions need to have the same support (otherwise, the construction of games
upon a set of distributions with different supports will fail with an error message
reported).
2. From the (continuous) loss models l11, l12, l21 and l22, we compile the MGSS
by an invocation of:
G <- mosg(n = 2, m = 2,
losses = list(f11, f12, f21, f22),
goals=1,
defensesDescr = c("d1", "d2"),
attacksDescr = c("a1", "a2"),
goalDescriptions = c("goal"))
in which the textual descriptions of the strategy spaces P S1 and P S2 are optional
and insignificant for the subsequent analysis (they only show up in plots).
3. Given the game object, we can call mgss to give us a security strategy. This
function takes the cutoff point as a direct parameter, which if omitted, defaults to
the right end of the (common) support of all distributions (no truncation):
mgss(G,T=1000,cutOff=6)
Here, the parameter T is the number of iterations to the FP algorithm.
The final result returned by mgss is an object of class mosg.equilibrium, and contains
the following fields:
• $optimalDefense: an n-dimensional column vector with rows labeled by the
names of the entries in P S1 (parameter defensesDescr in the previous call to
mosg).
• $optimalAttacks: an m-dimensional column vector with rows labeled by the
names of the entries in P S2 (parameter attacksDescr in the previous call to
mosg).
• $assurances: a list of mosg.lossDistribution objects (similar as returned by
the lossDistribution function used to construct the game structure). They
can be plotted (see Figure 10 for examples), printed in detail (using the summary
function), and related statistical quantities can be worked out such as:
– probabilities for individual attacks (probability mass function can be evaluated by the generic function density)
– the cumulative distribution function cdf
39
– moments (of given order, returned by the function moment), mean, variance
and quantiles (at given levels, returned by the generic function quantile).
For example, after having computed an equilibrium in our generalized setting, a simple
numeric risk measure according to the rule “risk = damage × likelihood” can be recovered
by invoking
mean(eq$assurances$goal)
which gives the assured expected loss (= usual quantitative risk) in the first security goal
(g1) of the game. If, besides the mean, the risk manager is interested in the expected
variation around the mean, then it is an easy matter of computing the variance of the
assured loss distribution as
variance(eq$assurances$goal)
Finally, if the risk manager is interested in the chances of suffering losses of categories
“high” or above, he/she may invoke the cdf function in the proper way. For example, if
category “high” has the number 4, then the chances of getting such a loss or more are
given by
1 - cdf(eq$assurances$goal, 3)
Conversely, computing quantiles tells the losses expected up to a, say 95%, chance. That
is, calling
quantile(eq$assurances$goal, 0.95)
tells us the maximal loss (category) that occurs in 95% of the cases.
6.5 Playing the Equilibrium Strategies
To cast frequencies from the game into a practical project plan that tells the security
officer when to take which action, let us fix a particular action and call p its equilibrium
frequency, given the time unit (e.g., one month). The number of actions per time interval
T is therefore p · T and in fact is a Poisson distributed variable with rate parameter p.
In turn, the time between two actions is exponentially distributed with parameter 1/p.
So, if we are at time t0 , the next repetition of the action should be at time t0 + ∆, where
∆ ∼ Exp(1/p) is an exponentially distributed random variable and measured in the unit
of time that was fixed before. Sampling exponentially distributed variables is easy using
uniformly distributed random numbers in the unit interval. Given such a random value
U ∼ U nif orm(0, 1), we simply compute ∆ = −p · log (U ) to have ∆ ∼ Exp(1/p).
Note that this method yields the desired fraction of actions (events) per time unit,
which is only correct if the gameplay is presumed with a periodicity taking time T .
Thus, the rating of strategies (the questionnaire; cf. section 3.3) should be done bearing
in mind the game period T .
For example, if the defense is a security awareness training, and the unit of time T is
one month, then the threat assessment could ask something like:
40
Consider an employee whose last security awareness training happened no
more than a month ago. How likely do you think is this person plugging a
virulent USB stick into her/his computer at work?
A game-theoretic treatment of risks using actions that need repetition will return
likelihoods for each action to occur (in an optimal defense strategy). Repeatable actions
correspond to repeatable and independent game repetitions. To make this semantically
sound, we thus need to make the assessment in light of the game’s periodicity, to decide
whether or not it is necessary to take a particular action again. Returning to the previous
example of security training, we certainly will seek to avoid having such training every
month, but the optimal periodicity of the action is far from obvious. A game-theoretic
analysis will deliver a frequency of training, counted over the repetitions of the game. If
we – hypothetically – let the game duration be one month before the next (hypothetical)
iteration starts, then the question of the effectiveness of a security training must refer
to the current period, which lasts no more than one month up back in time. Hence, we
get the proposed question sketched above.
7 On Model Validation and Verification
It lies in the nature of risk management that there is no such thing as a “rollback” that
could reset a company into the state before an incident, to verify if the here proposed
decision framework or another would have delivered the better outcomes. The same
problem is very well known from other fields of science, and clinical studies tackle the
issue by introducing control groups to be able to clearly relate observed effects to the
treatment rather than coincidence (or a placebo effect).
Things are no different in the area of risk management, except perhaps at increased
complexity and difficulty. In a famous quote, George Box is telling us that essentially
all models are wrong, but some are still useful. His point is definitely right, but it must
not be taken as an excuse to not ask for the quality of a decision model. While it is
certainly true that incorrect model parameters lead to incorrect model output, judging
the parameterizations as wrong because of the model performing badly would be logically
flawed (as it incorrectly reverses the implication).
Instead, the model validation must be up to long term studies with control groups,
followed by well-designed statistical tests to reject the hypothesis of the model performing identically to a chosen alternative. The goal of rejecting the hypothesis is crucial
here, since a statistical test can never be a formal proof, but only provide an empirical counterexample against some claim. Thus, to verify the claim of the here-proposed
method to be a useful risk decision supporting framework, we need to refute the claim
of it performing equal to a competing technique. This setting is very well known from
clinical studies incurs some challenges for risk management, since security incidents are
random events, and cannot be considered as independent or isolated from one another
(advanced persistent threats are only one hidden cause that can manifest itself in a
long sequence of seemingly independent but nevertheless cumulating events up to a final
catastrophe). Moreover, there are no such things as “lab conditions”, under which the
41
effect of a decision can be tested against a different one. Thus, a control group in our
setting can only be another company, but incidents – particularly APTs – are focused
and tailored to the company, so comparing data from one company to that of another
is most likely not too meaningful, since incidents happen to both companies, but in
crucially different forms.
This substantiates the aforementioned long-run of studying the effects of one decision
making against another. Statistical tests are a natural tool here, but the selection of an
appropriate one requires care for several reasons:
1. Parametric tests come with assumptions on the distributions of the sample sets
under investigation. For example, assuming Gaussian distributions here could
be flawed, since we talk about losses that are typically modeled by heavy tailed
distributions.
2. The tested hypothesis must be considered relative to how the risk management
works. For example, tests on equality of means appear quite well-aligned to risk
management that minimizes expected damages, i.e. means. That is, if the alternative risk management against which the proposed method is to be tested
considers only means (for example, if risk is defined as the product of likelihood
and impact), while our framework allows for a disregard of this quantity (since
the hyperreal ordering remains unchanged upon disregarding any finite number
of moments, which can include the first moment), the test may unintendedly be
biased towards favouring the alternative hypothesis.
Similar issues apply to the selection of the “control group”, because the benchmark
figures that an enterprise uses to measure its own performance may be highly different
between companies and may be highly specific for the business area. One benchmark
figure that may have wide applicability and – in the end of the day – may be the only
high-level figure that counts for risk management, is the number of severe incidents. This
number depends on the understanding of “severe”, and the threshold at which losses are
counted as severe can be defined individually for each enterprise.
Towards a method for validating our risk management decision framework, we will
thus refrain from specifying a particular risk threshold here, and go for verifying the
purely qualitative intuition that:
A good risk management framework should minimize the number of severe
incidents.
Consequently, to assess the “goodness” of the decision framework based on game theory,
the proposed procedure is as follows, for any particular (i.e., fixed) enterprise:
1. Define a control group: since data coming from a different company may be biased
and relate to different endo- and exogenous processes, the control group should be
the enterprise itself. This also fixes the risk management that we test our method
against, since it simply is the current decision making framework that we want to
judge against the new (here proposed) framework.
42
2. Fix a meaning of “severe incident” in the sense of specifying a threshold above
which damages or losses count as severe. Given a series of historic records on
losses that occurred in the past, one can compile a past loss distribution Fpast ,
and, for example, define the threshold using a quantile of Fpast . In any case, it
is important to fix this threshold a-priori (still, we need to bear in mind that
the thresholds may need adaption over the lifetime of the enterprise to remain
meaningful), and independently of the value implied by [36, Thm.2.14].(this is to
avoid a bias in favour of the here proposed decision making technique). Call the
threshold t0 , and let us think of losses > t0 as being severe.
3. Collect the number n0 of incidents whose losses were ≥ t0 , i.e., which have been
severe in this understanding. Based on the distribution Fpast of past losses, the
likelihood for such an incident to occur would be p = Pr(L ≥ t0 ), if L measures
the random loss. Assuming independence of events, the number N of severe past
incidents is Poisson-distributed with a rate parameter λpast that depends on p.
For the data collection as such, the independence assumption entails that common
underlying causes of seemingly independent events must be identified before feeding
this data into a test statistic. Several events with a single common cause must then
be compiled into a single event (representing the underlying cause) with a total loss
incurred. For example, if many events can be related to an APT, the typical nature
of these symptoms is to stay undetected, so they would probably not count into
the set of “severe” incidents. Nonetheless, if the APT manifests itself in several
quite severe damage events, then these must be considered as one single incident
(being the APT, only exhibiting multiple damages) with accumulated effects.
4. At some point in time, the new risk management framework (not necessarily the
one described in this report) becomes installed, and a new recording of “severe”
events (with the same definition as was used in the past) must start. Call the
number of these M , and observe that the new loss distribution Fnew is as well
Possonian with a rate parameter λnew , which depends on the mass p that Fnew
assigns to the region ≥ t0 .
5. Fix equal time periods for data collection: For the new collection of losses, it is
crucial that the time period over which M was counted equals the period over which
N was taken. Otherwise, the test would be biased, since if the past period is much
shorter than the current one, then the number of past incidents is necessarily much
smaller than the number of current incidents. Likewise, if the past period was very
long, and the new period is relatively short, then the number of incidents N will
necessarily be much higher than the number M of currently observed incidents.
6. A final assumption that must nevertheless be emphasized is both rates λpast , λnew
being taken as constant over time (otherwise, the events would not be Poisson
distributed any more).
Given the past and current samples with sizes n and m, respectively, the distributions
of N and M are N ∼ Poisson(nλpast ) and M ∼ Poisson(mλnew ). The hypothesis to be
43
refuted is the past risk management performing better or equal to the new method, in
which case the null hypothesis becomes
H0 :
λpast
≤ 1,
λnew
which expresses that the past risk management reduces severe incidents at least as good
as the current (new) one, hence the new risk management is no better than the previous.
The statistical test of choice is a one-sided rate ratio test [14, 29]. These references
discuss various methods to test Poisson rates, and one exact test is directly available in R
via the package rateratio.test [11,12], which can be invoked by issuing the command:
rateratio.test(c(n·λpast , m·λnew ), c(m, n), alternative = "greater")
for our case. The null-hypothesis is rejected if the p-value is less than the pre-specified
1 − α (that defaults to α =conf.level= 0.95 in the above call).
A general validation or verification of the method against competing ones is thus a
matter of several companies running long-time evaluations and deciding on their own
if the decision framework proposed here performs better or worse than their competing
candidate. Extending the investigation towards checking whether or not the stochastic order makes up a good model of decision making under bounded rationality is an
independent challenge and widely extended line of research that we will not go farther
into here. Instead, the last test is meant to complete the theory developed here, and we
close the report by a discussion in favour of the qualitative advantages that this form of
decision making may offer for practitioners.
8 Conclusion and Outlook
The most important pros of the method can be roughly summarized as follows:
• No consensus problem: The approach of working with entire distributions rather
than single values avoids issues of consensus finding among experts. That is, if there
are disagreeing opinions among a group of people, every opinion goes into the risk
analysis at equal weight. Thus, nobody has to be overruled or otherwise accept a
compromise that deviates from the own thoughts. If, subsequently, damage occurs
nonetheless, arguments of people claiming to have foreseen this incident are useless,
since any such warning was considered from the beginning on already.
• Vague assessments allowed : Even for a single expert, there is no need to confine
oneself to a single risk assessment, perhaps at the risk of being mistakenly understood as also saying what the risk “is not”. In other words, if a security expert
utters a risk of level “medium”, then this is not the implicit additional statement
that the risk is “not high”. In fact, in allowing the expert to add uncertainty
44
to her/his assessment4 , the intrinsic fuzziness of perceived security risks can be
(conveniently) expressed.
This degree of freedom also helps to treat scenarios in which several threats occur
jointly. If a threat scenario is such that most likely other attacks are mounted
along, then the expert may still focus on the “main objective” (main threat) of
the assessment, while explicitly stating and rating the possibility of more severe
damages upon the simultaneous occurrence of other threats by assigning some
likelihood to the other alternatives (cf. remark 3.1).
• Enforced systematization: The need to set up a game matrix for all combinations of
defenses and attacks enforces a systematic approach to the entire risk management
problem. The method itself is herein merely embedded and rests on a comprehensive threat analysis and identification of countermeasures. The method of risk
assessment as outlined in section 3.3 is actually an application of crowdsourcing;
see [3].
Perhaps the most important advantage over more conventional quantitative methods
of risk assessment is the following: none of the information items (except the average)
returned by the call sequences at the end of Section 6.4, can be obtained by standard
techniques of risk management that are entirely based on expected losses as risk. Hence,
the preservation of information throughout the entire process from the modeling up
to the final risk result interpretation is an important benefit over other methods. In
brief: the here proposed method is preserving information of all experts over the entire
risk management process, and avoids loss of information through consensus finding and
opinion or risk aggregation.
Acknowledgment
This work was supported by the European Commission’s Project No. 608090, HyRiM
(Hybrid Risk Management for Utility Networks) under the 7th Framework Programme
(FP7-SEC-2013-1). The author is indebted to the whole consortium of HyRiM, and
particular gratitude is expressed to Sandra König and Stefan Schauer from the Austrian Institute of Technology for invaluable discussions and suggestions along this entire
research.
References
[1] Rudolf Avenhaus, Bernhard von Stengel, and Shmuel Zamir. Inspection games.
In R.J. Aumann and S. Hart, editors, Handbook of Game Theory with Economic
Applications, volume 3, pages 1947–1987. Elsevier, 2002.
4
either explicitly by giving the loss distribution directly (cf. Example 5.2), or implicitly by adjusting
the bandwidth parameter of the kernel smoothing (see Section 3.10 and Example 5.2) to assign
likelihoods to other possibilities around the actual assessment.
45
[2] Boldizsár Bencsáth, Gábor Pék, Levente Buttyán, and Mark Felegyhazi. The
cousins of stuxnet: Duqu, flame, and gauss. Future Internet, 4(4):971–1003, 2012.
[3] David Bratvold.
What is crowdsourcing – daily crowdsource.
https:
//dailycrowdsource.com/training/crowdsourcing/what-is-crowdsourcing,
2016. [retrieved on September 23, 2016].
[4] Bundesamt für Sicherheit in der Informationstechnik. BSI-Standard 100-2: ITGrundschutz Methodology. https://www.bsi.bund.de/cln_156/ContentBSI/
grundschutz/intl/intl.html, May 2008. Version 2.0, english.
[5] Arthur Carvalho and Kate Larson. A consensual linear opinion pool, 2013.
[6] Peter Chesson and Charlotte T. Lee. Families of discrete kernels for modeling
dispersal. Theoretical Population Biology, pages 241–256, 2005.
[7] Dell
SecureWorks.
Advanced
threat
protection
with
dell
secureworks.
https://www.secureworks.com/resources/
sb-advanced-threat-protection-with-dell-secureworks, retrieved:
July
27th, 2016, 2014.
[8] Luc Devroye and László Györfi. Nonparametric Density Estimation - The L1 View.
Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, New
York, 1985.
[9] Marten Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. Flipit: The game of
”stealthy takeover”. J. Cryptol., 26(4):655–713, October 2013.
[10] James P Farwell and Rafal Rohozinski. Stuxnet and the future of cyber war. Survival, 53(1):23–40, 2011.
[11] Michael Fay. Two-sided exact tests and matching confidence intervals for discrete
data. R Journal, 2(1):53–58, 2010.
[12] Michael Fay. rateratio.test: Exact rate ratio test, 2015. https://cran.r-project.
org/package=rateratio.test [retrieved Dec. 19, 2016].
[13] Russell Greiner, Barbara A. Smith, and Ralph W. Wilkerson. A correction to the
algorithm in reiter’s theory of diagnosis. Artificial Intelligence, 41(1):79–88, 1989.
[14] Kangxia Gu, Hon Keung Tony Ng, Man Lai Tang, and William R. Schucany. Testing the ratio of two poisson rates. Biometrical journal. Biometrische Zeitschrift,
50(2):283–298, 2008.
[15] International Standards Organisation (ISO). ISO/IEC 31000 - Risk management –
Principles and guidelines. http://www.iso.org/iso/home/store/catalogue_tc/
catalogue_detail.htm?csnumber=43170, 2009. (accessed: April 11, 2016).
46
[16] International Standards Organisation (ISO).
ISO/IEC 27005 - Information technology – Security techniques – Information security risk management.
http://www.iso.org/iso/home/store/catalogue_tc/catalogue_
detail.htm?csnumber=56742, 2011. (accessed: April 11, 2016).
[17] International Standards Organisation (ISO). ISO/IEC 27000. http://www.27000.
org/, 2016.
[18] Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang,
and Xiaoyang Sean Wang, editors. Moving Target Defense II – Application of Game
Theory and Adversarial Modeling, volume 100 of Advances in Information Security.
Springer, 2013.
[19] Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and Xiaoyang Sean
Wang, editors. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
Threats, volume 54 of Advances in Information Security. Springer, 2011.
[20] Ashutosh Garg Jayram, Ashutosh Garg, T. S. Jayram, Shivakumar Vaithyanathan,
and Huaiyu Zhu. Generalized opinion pooling. In In Proceedings of the 8th Intl.
Symp. on Artificial Intelligence and Mathematics, pages 79–86, 2004.
[21] Richard M. Karp. Reducibility among combinatorial problems. In R. E. Miller
and J. W. Thatcher, editors, Complexity of Computer Computations, pages 85–103,
New York: Plenum, 1972.
[22] Sandra König. Error propagation through a network with non-uniform failure.
arXiv:1604.03558 [stat.AP], 2016.
[23] George Kurtz. Operation “aurora” hit google & others.
http://siblog. mcafee. com/cto/operation-% E2, 80, 2010.
Published online at
[24] Q. Li and J.S. Racine. Nonparametric estimation of distributions with categorical
and continuous data. Journal of Multivariate Analysis, 86:266–292, 2003.
[25] Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, and
Jean-Pierre Hubaux. Game theory meets network security and privacy. ACM Comput. Surv., 45(3):25:1–25:39, July 2013.
[26] Combinatorial analysis utilizing logical dependencies residing on networks (CAULDRON), 2008. http://ait.gmu.edu/~csis/.
[27] Geoffrey J. McLachlan and Thriyambakam Krishnan. The EM algorithm and extensions. Wiley Series in Probability and Statistics. Wiley-Interscience, Hoboken,
NJ, 2. ed. edition, 2008.
[28] Kate Munro. Deconstructing flame: the limitations of traditional defences. Computer Fraud & Security, 2012(10):8–11, 2012.
[29] NCSS Software. PASS 14 Documentation, 2016. [retrieved Dec. 19, 2016].
47
[30] Jeffrey Pawlick, Sadegh Farhang, and Quanyan Zhu. Flip the Cloud: Cyber-Physical
Signaling Games in the Presence of Advanced Persistent Threats, pages 289–308.
Springer International Publishing, Cham, 2015.
[31] William D. Perreault and Laurence E. Leigh. Reliability of nominal data based on
qualitative judgments. Journal of Marketing Research, 26(2):135, 1989.
[32] R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2016. ISBN
3-900051-07-0.
[33] Balaji Rajagopalan and Upmanu Lall. A kernel estimator for discrete distributions.
4:409–426, 1995. Gordon and Breach Science Publishers SA.
[34] Lisa Rajbhandari and Einar Arthur Snekkenes. Mapping between Classical Risk
Management and Game Theoretical Approaches, pages 147–154. Springer, Berlin,
Heidelberg, 2011.
[35] S. Rass. Game-theoretic risk management – part one: Security strategies in nondeterministic games, 2015. internal report of the HyRiM Project.
[36] S. Rass. On Game-Theoretic Risk Management (Part One) – Towards a Theory of
Games with Payoffs that are Probability-Distributions. ArXiv e-prints, June 2015.
http://arxiv.org/abs/1506.07368.
[37] S. Rass. On game-theoretic risk management (part two) – algorithms to compute
nash-equilibria in games with distributions as payoffs. arXiv:1511.08591, 2015.
[38] S. Rass, S. König, and S. Schauer. Uncertainty in games: Using probability distributions as payoffs. In MHR Khouzani, Emmanouil Panaousis, and George Theodorakopoulos, editors, Decision and Game Theory for Security, 6th International Conference, GameSec 2015, LNCS 9406. Springer, 2015.
[39] Stefan Rass and Sandra König. R Package ’hyrim’: Multicriteria risk management
using zero-sum games with vector-valued payoffs that are probability distributions.
https://hyrim.net/software/, 2017. (current stable release as of Oct.2017; ongoing
development).
[40] Stefan Rass, Sandra Konig, and Stefan Schauer. Defending Against Advanced Persistent Threats Using Game-Theory. PLoS ONE, 12(1):e0168675, 2017. Journal
Article.
[41] Stefan Rass and Quanyan Zhu. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent
Threats. In Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe,
and William Casey, editors, Decision and Game Theory for Security, volume 9996
of Lecture Notes in Computer Science, pages 314–326. Springer International Publishing, Cham, 2016.
48
[42] Raymond Reiter. A theory of diagnosis from first prinicples. Artificial Intelligence,
32(1):57–95, April 1987.
[43] B.W. Silverman. Density Estimation for Statistics and Data Analysis. Chapman &
Hall/CRC, 1998.
[44] Anoop Singhal and Ximming Ou. Security risk analysis of enterprise networks using
probabilistic attack graphs. Technical report, National Institute of Standards and
Technology (NIST), 2011. NIST Interagency Report 7788.
[45] Julian Talbot.
Whats right with risk matrices?
– an great tool
for
risk
managers...
https://31000risk.wordpress.com/article/
what-s-right-with-risk-matrices-3dksezemjiq54-4/., 2011.
[retrieved
Sep.29th, 2016].
[46] Tenable Network Security R . NESSUS – the vulnerability scanner. www.nessus.
org, 2011.
[47] Alexandre B. Tsybakov. Introduction to Nonparametric Estimation. Springer Series
in Statistics. Springer, 2009.
[48] Roberto Uzal, Narayan C Debnath, Daniel Riesco, and German Montejano. Trust
in cyberspace: New information security paradigm. Managing trust in cyberspace,
page 405, 2013.
[49] Larry Wasserman. All of Nonparametric Statistics: A Concise Course in Nonparametric Statistical Inference. Springer, 2007.
[50] Quanyan Zhu and Tamer Başar. Game-theoretic approach to feedback-driven multistage moving target defense. In 4th International Conference on Decision and Game
Theory for Security - Volume 8252, GameSec 2013, pages 246–263, New York, NY,
USA, 2013. Springer-Verlag New York, Inc.
49
| 10math.ST
|
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
arXiv:1410.6121v2 [cond-mat.str-el] 9 Dec 2014
International Journal of Modern Physics B
c World Scientific Publishing Company
THE NONEQUILIBRIUM QUANTUM MANY-BODY PROBLEM
AS A PARADIGM FOR EXTREME DATA SCIENCE
J. K. Freericks
Department of Physiocs, Georgetown University, 37th and O Sts. NW
Washington, District of Columbia 20057, U. S. A.
[email protected]
B. K. Nikolić
Department of Physics and Astronomy, University of Delaware, Newark, DE 19716, U. S. A.
[email protected]
O. Frieder
Department of Computer Science, Georgetown University, 37th and O Sts. NW
Washington, District of Columbia 20057, U. S. A.
[email protected]
Received Day Month Year
Revised Day Month Year
Generating big data pervades much of physics. But some problems, which we call extreme
data problems, are too large to be treated within big data science. The nonequilibrium
quantum many-body problem on a lattice is just such a problem, where the Hilbert
space grows exponentially with system size and rapidly becomes too large to fit on any
computer (and can be effectively thought of as an infinite-sized data set). Nevertheless,
much progress has been made with computational methods on this problem, which serve
as a paradigm for how one can approach and attack extreme data problems. In addition, viewing these physics problems from a computer-science perspective leads to new
approaches that can be tried to solve them more accurately and for longer times. We
review a number of these different ideas here.
Keywords: Nonequilibrium quantum many-body problem; extreme data science
1. Extreme data science
Conventional forms of big data science and data mining involve the creation of
large finite data sets and the analysis of that data to produce insight and to predict
future behavior of the system. Many physics problems are being analyzed in this big
data paradigm, such as high-energy-physics scattering experiments, which routinely
create petabytes of data. Other fields of science also involve big data science, with
large datasets being analyzed in fields as diverse as weather forecasting, genomics,
and neuroscience. Many algorithms and data analysis tools are used to interact with
such datasets; often they are created specifically for a given data set, even if they
1
December 10, 2014
2
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
employ more general purpose algorithms and strategies for the data analysis.
We discuss physics problems for which the datasets are so large they can effectively be treated as infinite in size, which we call extreme data science. In general,
such problems are impossible to solve unless at any given time, only a small subset of
the large dataspace is physically active, and that the system maintains a reasonably
small footprint within the data space for future times as well.
One technique which has been developed in the previous decade for dealing with
big data in computer science is the technique of compressive sensing. This method
represents a multidimensional signal with a much lower dimensional model. Instead
of employing conventional signal compression techniques, which aim to capture the
whole signal, compressive sensing attempts to directly capture the sparse signal1,2 .
One can understand how this works in two ways: (1) most data in real world problems are overdetermined and hence can be represented in a more sparse fashion and
(2) from a mathematical standpoint, a time series originating from a Fourier series
or from a Fourier transform look similar on a finite time interval, but the series
can be represented sparsely, while the transform cannot. This latter feature is now
being exploited in a wide range of physics problems.
The unprecedented growth of data has also challenged the most affordable computational procedures within big data science—namely numerical linear algebra.
Even partial eigenvalue or singular value decompositions become too expensive for
matrices employed in graph mining of large networks, of information retrieval, and
so on. As an alternative, randomized or stochastic processes have emerged as a
promising new approach to these problems3,4,5 . Regardless of these developments
within big data science, the field of physics has been grappling with these issues for
decades, and have come up with a number of ideas for these types of problems. We
believe a cross-fertilization of ideas from computer science, applied mathematics,
and physics, will enable much more rapid growth in the ability to solve extreme
data science problems.
One physics-based example that fits into the extreme data paradigm is the
nonequilibrium quantum many-body problem. This problem governs many different behaviors in physical systems. Some examples include the following: (1) the
current-voltage characteristic for transport of charge through a device made from
strongly correlated materials; (2) the response functions for pump/probe experiments, where intense lasers are shone onto strongly correlated materials; (3) the
response of a cold atom system following the quench of an interaction generated
by a Feshbach resonance; (4) the response of materials to shock compression; (5)
the evolution and thermalization of the quark-gluon plasma in heavy ion collisions;
(6) particle production and the reheating/thermalization of the universe after inflation; (7) photo-ionization of atoms or molecules; and (8) the dynamical behavior of
charged plasmas created by intense lasers.
It is well known that the Hilbert space for the many-body problem grows exponentially with the number of lattices sites in the problem. This growth is so rapid,
that supercomputers can only handle problems that have a few tens of lattice sites
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
3
before the memory is completely exhausted. Such small systems often are too small
to be able to reliably predict properties of 1023 particles. Fortunately, because of
physical principles like those found in the renormalization group, many equilibrium
many-body problems are governed by effective low-energy field theories, where the
high-energy degrees of freedom are frozen out, and do not change as the temperature is further lowered. Using these ideas, the numerical renormalization group
showed how one could numerically solve the Kondo problem, which is one of the
most important many-body problems in condensed matter physics. A large number
of other techniques exist for treating equilibrium many-body problems, and they often are governed by the ideas of the renormalization group, via energy minimization
methods where the quantum problem can be mapped onto an equivalent statistical
problem that can be solved using importance sampling methods like the Metropolis
algorithm, or via variational techniques chosen to minimize the loss of information
like the density matrix renormalization group.
In the case of nonequilibrium, problems become more complicated, because energy minimization is often no longer a valid physical principle, and the driving of
the system pushes it out of the low-energy effective field theory regime (of course,
reducing information loss is probably still a valid principle). At first glance, it then
seems hopeless to try to solve such problems, but significant progress has been made
recently with a number of different algorithms, even if they all are currently limited
by how far out in time they can evolve the system. In most cases this time scale is
too short to fully determine the long-time behavior. Nevertheless, it is highly likely
that even a nonequilibrium system will only evolve through a very small target subspace of the infinite dataspace (especially if entanglement growth is bounded), and
hence there is a good chance that appropriate algorithms can be developed to describe the behavior of these systems. In fact, there is a proof6 that states that if the
Hamiltonian involves local interactions (or interactions cut off after a short range),
then the time-dependent evolution of the system can only expand into an exponentially small subspace of the full Hilbert space in polynomial time. Techniques
that can focus in on just this subspace will be the most efficient in simulating the
nonequilibrium many-body problem.
When viewed from the computer-science perspective, extreme data science is
based on four principals: (i) encoding the active target subspace of the dataspace; (ii)
evolving the target subspace forward in time; (iii) discarding nonphysical dimensions
of the dataspace where the target has negligible weight; and (iv) extrapolating
(or forecasting) the behavior of the target space for future times from the past
history. Algorithms that solve the nonequilibrium quantum many-body problem
often employ these extreme data science principles in formulating their solution.
For example, since one cannot use all of the basis vectors of the Hilbert space to
represent a state vector, one must find an efficient method to encode the many-body
wavefunction which can describe the system with a small set of basis functions
initially, and can evolve to remain efficient in describing the system as it moves
forward in time (similar in spirit to compressive sensing). All algorithms formally
December 10, 2014
4
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
deal with the evolution of the system in time, as given by the quantum evolution
operator
Z
i t 0
0
dt H(t )
(1)
U (t, t0 ) = T exp −
~ t0
n Z t
Z tn−1
Z t1
Z t2
∞
X
i
=
dtn H(t1 )H(t2 ) · · · H(tn )
−
dt1
dt2
dt3 · · ·
~
t0
t0
t0
t0
n=0
which is a time-ordered exponential of the time-dependent Hamiltonian H(t), because this is how one ultimately determines the Green’s function, or the evolution
of the wavefunction. Third, algorithms often include some form of truncation step,
where the system is projected onto a subsystem that includes the most important
terms. Finally, since it is difficult to reach long times with most nonequilibrium
algorithms, one often attempts to extrapolate results either to try to stabilize the
algorithm so it can run further in time, or to try to forecast future behavior from
the prior knowledge.
In the remainder of this review, we describe a wide range of different algorithms
that have been used for the quantum many-body problem, describe their successes
or failures for the nonequilibrium systems, and illustrate a new attack motivated by
extreme data science to create new algorithms that might have a higher chance for
success. We group the algorithms into those that simplify the many-body problem
to solve it approximately, those that employ stochastic methods and the challenges
with generalizing them to the nonequilibrium case, algorithms based on renormalization group ideas, and algorithms that directly evaluate the evolution operator.
Note that while we have made every attempt to include a wide number of references to the original literature, this review is intended to be illustrative and not
exhaustive, so many appropriate references have not been included. We apologize
to any authors for whom we did not reference their relevant work due to length
restrictions. In addition, we have not made an exhaustive review of big data science
ideas as applied to the many-body problem. For example, machine learning ideas
have recently been employed to accelerate the solution of the problem7 . Instead, we
concentrate on the new extreme data science aspect of the problem.
We emphasize that the techniques reviewed here focus on methods that work
directly or indirectly in Hilbert space. Recently, Gaussian phase space methods8,9
have been proposed to evade the exponential growth of the problem size in Hilbert
space. They work by mapping the quantum evolution in real or imaginary time onto
a set of stochastic differential equations with a drastically reduced dimensionality.
Much excitement arose for this method early on, particularly with the anticipation
that phase-space methods could solve the fermionic sign problem10 . But a careful
analysis11,12 shows that the nonvanishing of the distribution function evolved by
stochastic differential equations at the boundaries, introduces systematic errors such
as spiking trajectories or rapid growth of the sampling error which currently prevent
extracting reliable results for fermionic systems in the limits of strong interaction,
large system sizes, or long times (the approach has been more successful for bosonic
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
5
systems though13 ). In any case, we focus the remainder of our discussion on Hilbertspace-based methods.
2. Algorithms that truncate the dataspace or simplify the
many-body problem
One strategy to take for an extreme data problem is to truncate or simplify it so that
it results in a finite dataspace that can fit onto the computer and be solved. Within
the many-body problem, there are a few different approaches that fall into this category: (i) exact diagonalization of finite systems; (ii) configuration-interaction-based
methods; (iii) time-dependent density-functional theory; and (iv) the Gutzwiller
variational method. We describe these approaches next.
Exact diagonalization is one of the first methods14 tried for many-body problems like the Hubbard model15 . Early work by the Falicov group16 or the work by
Heilmann and Lieb17 that investigated the properties of the benzene molecule, focused on determining energy eigenvalues and eigenstates after taking into account
all of the symmetries of the system. The technique has evolved significantly since
then, and now has been applied to many nonequilibrium problems where strongly
correlated materials are driven by high intensity laser fields18,19 .
For equilibrium problems, one can handle systems with large Hilbert spaces because the Hamiltonian is sparse, and diagonalization methods like the Davidson20
or Lanczos21 methods are iterative and require only the action of the Hamiltonian
on a state vector in the Hilbert space (in most of these calculations a number of
vectors in the Hilbert space are stored in the computer memory). This can often
be calculated without even storing the Hamiltonian matrix, when one uses the operator form and acts it on representative basis states. These techniques can only
determine eigenvalues (and associated eigenvectors) within a finite energy interval,
and usually focus on the low-energy states (in principle, long-run Lanczos methods
that can compute all eigenvalues, or compute eigenvalues within specified energy
windows, do exist22 , but they require too much storage to be efficient methods for
fully diagonalizing large sparse matrices). By using time evolution methods, such
as evaluating the evolution operator via a Trotter expansion23 (or more sophisticated methods like commutator-free exponential time expansions24 ) or using the
Crank-Nicolson algorithm25 (which preserves unitarity through second order in the
discretization time step), one can evolve these finite systems forward in time and
solve nonequilibrium problems. This has been looked at recently by a number of
different groups18,19 .
The exact diagonalization approaches work with discrete eigenvalues and are
accurate in equilibrium when the temperature is large relative to the average level
spacing. For nonequilibrium, the time evolution is usually very accurate for short
times, but then starts to deviate from the correct behavior when it displays recurrences, which occur for times such that the time multiplied by an energy difference is
equal to a multiple of 2π. Other issues arise with finite-size effects if a disturbance
December 10, 2014
6
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
moves a longer distance than half the distance to the edge of the finite system.
While this approach can provide much insight about the nonequilibrium problem,
it is unlikely that it will ever be able to successfully describe generic systems in the
long-time limit.
Another approach, which involves truncating the Hilbert space, is a configuration
interaction-based approach, which is widely used in chemistry and atomic physics,
but is not so widely used for lattice systems. In this class of methods, the wavefunction is described by the sum of a finite number of Slater determinants, with the
coefficients and the determinants adjusted to produce the best variational energy.
These techniques are also used for time-dependent problems, primarily in atomic
physics26 where the wavefunction is represented as a time-dependent function with
an expansion basis that includes a description of the active excited electron and
additional single-pair particle-hole excitations or uses a so-called restricted active
Hilbert space27 . This creates a finite expansion for time-dependent coefficients of
the wavefunction, which are then solved by recasting the problem as a differential
equation for the different coefficients and solving those differential equations. In
practice, many tricks need to be implemented to solve these problems accurately
and efficiently. Within lattice problems, there have been some attempts to try to
adopt these approaches in nonequilibrium. One approach is called the multiconfiguration time-dependent Hartree impurity solver28 , which employs a tensor-based
structure for the time-dependent coefficients of a wavefunction that is expanded in
terms of a time-varying single-particle basis set which is truncated to include just
a small number of single-particle basis functions. While this approach shows some
promise, much more work needs to be done to see if it can be an effective impurity
solver.
Another class of approaches is based on density functional theory and is called
time-dependent density functional theory (TD-DFT). Density functional theory is
based on the Hohenberg-Kohn theorem29 which states that the wavefunction is a
unique functional of the electron density, and is implemented by mapping the system
onto a noninteracting problem via the Kohn-Sham framework30 . TD-DFT has its
origins in the Runge-Gross theorem31 , which applies to time-dependent potentials.
In practice, because density-functional theory cannot be solved exactly, it ends up
being an effective mean-field theory approach to the problem which is highly accurate for real materials calculations in weakly correlated systems. The TD-DFT
needs modification to handle the full time dependence of the coupling to an electromagnetic field, and currently has not been applied to too many problems in this
category. Current implementations also use functionals that typically limit the applicability to finite closed quantum systems. It remains the most accurate approach
for real systems calculations, but is known to fail when correlations become too
strong, and hence will also not be able to solve the most general nonequilibrium
many-body problems. A recent review32 , provides a nice introduction to this topic.
We will have more to say about effective mean-field theory descriptions below.
The final method in this approximate approach is the Gutzwiller approach33,34 ,
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
7
which uses a variational form of the wavefunction for strong correlations, and
projects out the double-occupancies in the wavefunction. This ansatz is then used as
a constrained wavefunction to approximately solve the time-dependent Schrödinger
equation via a minimization of the Schrödinger equation when taken as an expectation value with respect to the time-dependent wavefunction. This approach has been
applied primarily to quench problems, where the Hamiltonian during the evolution
of the system is time independent, the initial state is just not an eigenstate of this
Hamiltonian, so it evolves in time. This technique is an uncontrolled approximation,
since it is not a formal expansion in powers of a small parameter, but it does appear
to produce physically reasonable results for the cases it has been applied to.
In all of these approaches, the many-body problem has been simplified in some
fashion, allowing for the subsequent dynamics of the simplified problem to be computed exactly. These approaches produce physically reasonable results, and often
are quite accurate for short times, but they also are difficult to gauge their accuracy
unless they can be compared to more exact methods. In general, they are not methods that can be easily extended to treat the problem with systematically improving
approximations, so that it can eventually be solved in the general case. However,
they often are a good first approach to these problems.
3. Algorithms that use stochastic methods
We next turn to stochastic methods that solve the many-body problem via Monte
Carlo techniques. We begin by discussing how these algorithms work in equilibrium,
before discussing issues that arise for nonequilibrium algorithms. We also discuss
only a few categories of these methods due to space limitations. Our focus will be
primarily with many-body approaches for the dynamical mean-field theory technique, which provides an exact solution to the many-body problem in the limit of
large spatial dimensions. If one were to look at electrons moving on a lattice in real
space, and were to focus on what happens at a specific lattice site as a function of
time, one would see electrons hopping onto and off of the site in time. The dynamical mean-field theory approach maps this lattice problem onto a single-site problem
with a time-dependent field that represents the hopping onto and off of the site.
By solving the impurity problem in a self-consistently determined time-dependent
field that makes the impurity Green’s function identical to the local lattice Green’s
function, the problem is solved exactly in the large dimensional limit (the reason
why it is not exact in finite dimensions is that the self-energy for the impurity
problem has no momentum dependence, and hence is an approximate solution in
finite dimensions, but becomes exact in infinite dimensions because one can prove
the self-energy has no momentum dependence in that limit).
Impurity problems have been studied in physics for years. The single impurity
Anderson model35 is the pardigmatic impurity problem, and it corresponds to a
localized electron, which has a strong Coulomb interaction with itself, embedded in
a conduction electron host, that is noninteracting (in the strong-interaction limit,
December 10, 2014
8
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
this model reduces to the so-called Kondo problem36 ). These impurity problems
are best represented by an action, which takes into account the time-dependence
of the field that describes the hopping onto and off of the lattice site. Due to the
interaction of the impurity electron with itself, there is a four-fermion operator in
the action. To illustrate how this representation works, we must first start with the
definition of the contour-ordered Green’s function on the lattice, which is defined
via
Gcijσ (t, t0 ) = −iTrTc e−βH(t̄→−∞) ciσ (t)c†jσ (t0 )/Z
(2)
where the fermionic destruction operator on site i with spin σ ciσ and the fermionic
creation operator on site j with spin σ c†jσ are both written in the Heisenberg
representation with respect to the time-dependent Hamiltonian H(t), β = 1/T is
the inverse temperature of the initial equilibrium configuration of the system, and
the partition function is Z = Tr exp[−βH(t̄ → −∞)]. The time-ordering operator
orders times along the contour, which will be described next.
The
Heisenberg
representation
of
an
operator
satisfies ciσ (t) = U † (t, −∞)ciσ U (t, −∞). Substituting this into the definition of the
Green’s function and assuming t > t0 yields
Gcijσ (t, t0 ) = −iTre−βH(t̄→−∞) U (−∞, t)ciσ U (t, t0 )c†jσ U (t0 , −∞)/Z,
(3)
where we note that we used the fact that U † (t, −∞) = U −1 (t, −∞) = U (−∞, t)
and U (t, t1 )U (t1 , t0 ) = U (t, t0 ). Now, starting from the earliest time as t̄ = −∞,
which corresponds to the right most part of the above expression, we evolve the
system forward in time from −∞ to t0 , then we operate with a c†jσ , evolve further
to time t, operate with ciσ and then evolve backwards in time from t to −∞ before
operating with the density matrix operator. This can be summarized graphically by
evaluating the operator average on the so-called Kadanoff-Baym-Keldysh contour
(see Fig. 1), to which we have added an imaginary spur from −∞ to −∞ − iβ, and
the density matrix term can be thought of as
" Z
#
−∞−iβ
e−βH(t̄→−∞) = exp −i
dt̄H(t̄) ,
(4)
−∞
so that the evolution operator extends along the entire contour. We originally
thought of t and t0 both being real times, but now that we have the evolution operator evolving on the contour, we can generalize the definition to allow the times
t and t0 to be any two times chosen on the contour itself, and the formula for the
Green’s function can be written compactly as
Z
c
0
Gijσ (t, t ) = −iTrTc exp −i dt̄H(t̄) ciσ;t c†jσ;t0 /Z
(5)
c
where the contour now extends from −∞ to ∞ along the upper real branch, from ∞
to −∞ along the lower real branch, and from −∞ to −∞ − iβ along the imaginary
spur. The integral is over the full contour, and the subscript t and t0 indicate where
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
9
Fig. 1. The Kadanoff-Baym-Keldysh contour running from tmin to tmax along the real axis, and
then back from tmax to tmin along the real axis, and finally along the negative imaginary axis a
length −iβ. We take the limit tmin → −∞ and tmax → ∞. The system starts in equilibrium at
a temperature T = 1/β at time tmin and then is driven out of equilibrium via a quench, or an
applied field, or some other perturbation.
the operators act along the contour, with the time-ordering operator along the
contour distributing the (time-ordered) exponential factors in the right locations
between the operators.
In dynamical mean-field theory, we will equate the local Green’s function (i = j)
to the impurity Green’s function. The impurity Green’s function depends on the
dynamical mean field, which is often described by the symbol λσ (t, t0 ) with either
time on the contour. Since the dynamical mean field determines the effect of the
hopping on the lattice, we define the local part of the Hamiltonian on the lattice via
P
H0i such that the total Hamiltonian on the lattice is equal to H(t) = i H0i +K where
K is the kinetic energy term of the Hamiltonian. The local part of the Hamiltonian
has the same functional form on each lattice site; the i superscript simply denotes
that we construct it from the operators ciσ and c†iσ . We then take the impurity
Hamiltonian to be H0 constructed from the impurity creation and annihilation
operators c†σ and cσ , respectively. All operators for the impurity problem are taken
in the Heisenberg representation with respect to the impurity Hamiltonian. Then
the impurity Green’s function is written as
Gcσ;imp (t, t0 ) = −iTrTc e−βH0 (t̄→−∞) e
P R
R
dt̄0 c†σ (t̄)λσ (t̄,t̄0 )cσ (t̄0 )
cσ (t)c†σ (t0 )/Zimp
(6)
R 0 †
P R
0
0
where Zimp = TrTc exp[−βH0 (t̄ → ∞)] exp[ σ c dt̄ c dt̄ cσ (t̄)λσ (t̄, t̄ )cσ (t̄ )], which
can be restricted to integrating only over the imaginary part of the contour for the
partition function because the integration over the real parts cancels.
The dynamical mean field λσ must be determined self-consistently in the dynamical mean-field theory algorithm (see Fig. 2). The procedure is as follows: (1)
make a guess for the local self-energy; (2) use Dyson’s equation in momentum space
on the lattice to determine the momentum-dependent Green’s function from the
self-energy; (3) sum the momentum dependent Green’s function over all momenta
to determine the local Green’s function of the lattice; (4) use Dyson’s equation for
the local Green’s function to extract the dynamical mean field; (5) solve the impurity problem in the dynamical mean field for the impurity Green’s function; (6) use
σ
c
dt̄
c
December 10, 2014
10
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
Fig. 2. Schematic of the iterative loop for dynamical mean-field theory. We start with a guess for
the self-energy and then use Dyson’s equation on the lattice to calculate the local Green’s function
(by summing over all momenta). Dyson’s equation is used on the local Green’s function to extract
the effective medium (which depends on the dynamical mean field). The impurity problem is then
solved with this effective medium (or λ field). Dyson’s equation for the impurity is used to extract
the self-energy and one checks to see if the iterative loop has converged. If it has, the computation
ends. If not, the new self-energy is used in the loop and the process continues.
Dyson’s equation to extract the impurity self-energy from the Green’s function and
the dynamical mean field; (7) use the impurity self-energy as the new guess for step
(1) and iterate steps (2–7) until one reaches a fixed point and the Green’s functions
do not change from one iteration to the next. All of the steps of this algorithm are
straightforward to implement (even if we have not given the detailed equations)
except for step (5) which is what requires a sophisticated impurity solver. The iterative approach is the same for equilibrium or nonequilibrium, it is just that in
nonequilibrium one usually works entirely in a time-based formalism37 . Note that
if one is solving an equilibrium problem, one usually restricts the contour to just
the imaginary spur, and then uses an analytic continuation method like maximum
entropy38 to numerically analytically continue the results from the imaginary axis to
the real axis. This simplifies the impurity problem solver, but requires an ill-posed
and uncontrolled numerical analytic continuation procedure. This is often viewed
as a superior way of performing the calculation than simulating the problem on
the full contour, for reasons that will be described below, which are related to the
fermion sign (or phase) problem.
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
11
We next focus on two different algorithms that solve the impurity problem on
the imaginary spur of the contour—the Hirsch-Fye algorithm39 and the continuoustime Monte Carlo algorithm40,41 . To begin, we show how one evaluates the partition
function on the imaginary-time spur of the contour within the Hirsch-Fye algorithm
Zimp = TrTτ e−βH0 e−
P Rβ
σ
0
dτ
Rβ
0
dτ 0 c†σ (τ )λσ (τ,τ 0 )cσ (τ )
.
(7)
The imaginary time axis is discretized into N time steps of length ∆τ = β/N , with
tj = −∞ − i∆τ j for 0 ≤ j ≤ N , which we write as −∞ − iτj . Then we have
Zimp = TrTτ e−∆τ
PN
Hsing
(τj ) −∆τ
0
e
PN
V(τj ) −(∆τ )2
e
P PN
c†σ (τi )λσ (τi ,τj )cσ (τj )
,
(8)
where H0sing is the quadratic (single-particle) part of the impurity Hamiltonian
P
(which we will take to be H0sing (τ ) = −µ σ c†σ cσ for concreteness) and V =
H0 − H0sing is the interacting part of the Hamiltonian [which we take to be
V(τ ) = U (c†↑ c↑ − 1/2)(c†↓ c↓ − 1/2) for the Hubbard model, for concreteness]. Note
that we have included an artificial time dependence to the impurity Hamiltonian
even though it is a constant, independent of time, which is notationally convenient.
The challenge with evaluating this partition function comes from the fact that the
interaction V is not a quadratic function of the fermionic operators. It can be made
quadratic by introducing an auxiliary field via the Hirsch-Hubbard-Stratanovich
transformation42,43,44
†
†
e−∆τ U/4 X αsj (c†↑ c↑ −c†↓ c↓ )
e
,
(9)
e−V(τj ) = e−∆τ U (c↑ c↑ −1/2)(c↓ c↓ −1/2) =
2
s =±1
j=0
j=0
σ
i,j=0
j
where cosh α = exp[∆τ U/2]. This introduces a set of Ising variables at each τj time
step which converts the quartic interaction term into a quadratic term. One can
now evaluate the partition function using standard techniques that convert into a
Grassmann path integral and then evaluate the trace with coherent states to yield
X
−1
Zimp =
det G−1
(10)
↑{si } det G↓{si }
{si }
where
2
G−1
σ{si } (j, k) = δjk − δj−1k [1 + ∆τ µ + αsj σ] − (∆τ ) λσ (τj , τk ).
(11)
So, the evaluation of this sum over all of the Ising spins will give the partition
function. It turns out that averaging the Green’s function G using the weights
for the partition function, will yield the impurity Green’s function. The Monte
Carlo method starts with a configuration for the Ising spins, and proposes the
change of the Ising spin at a particular time slice. One calculates the ratio of the
determinants for the previous G and the current G, using a Metropolis algorithm45
to decide whether or not to accept the update move. If it is accepted, the Green’s
function and determinants need to be updated. One of the hallmarks of the HirschFye algorithm is that the updating of the Green’s function and of the determinant
is very fast, because only a few matrix elements are changed from the previous
December 10, 2014
12
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
configuration matrix. Hence, because one need not recalculate the full determinant
from scratch, nor recalculate the new contribution to Green’s function (for the new
Ising configuration) from scratch, the algorithm can work fast to sum over the Ising
fields via importance sampling.
Since it is a statistical algorithm, it must deal with probabilities that satisfy
a detailed balance procedure, so that every configuration is equally likely to be
reached by the algorithm updating procedure. This requires (among other things)
that the products of the determinants be nonnegative. Unfortunately, although they
are manifestly real, they often change sign as the system is updated. One uses the
absolute value for the weights, but one then must keep track of the average sign
during the updating procedure and divide all statistical averages by the average
sign. When this average sign becomes too small in magnitude, the algorithm breaks
down. This is the origin of the famous sign problem in quantum Monte Carlo, and it
limits how low in temperature one can run the simulation because the sign problem
becomes worse as the temperature is lowered. In addition, since one is using a fixed
grid in imaginary time, it turns out one needs to make ∆τ small at low temperature
as well, because the Green’s function has a large slope near τ = 0 and τ = β and
one needs to determine it accurately in this region. This also limits how low in
temperature one can proceed with the Hirsch-Fye algorithm, since a small ∆τ and
a large β implies the size of the matrices is large.
We next discuss the continuous time quantum Monte Carlo algorithm in equilibrium and based on a weak-coupling expansion40 . The starting point for the
continuous-time algorithm is the formula for the impurity partition function, written
in the interaction representation with respect to H0sing :
sing
Zimp = TrTτ e−βH0
e−
Rβ
0
dτ VI (τ ) −
e
P Rβ
σ
0
dτ
Rβ
0
dτ 0 c†σ (τ )λσ (τ,τ 0 )cσ (τ 0 )
(12)
where the time ordering properly orders both of the time-dependent exponential factors. Here, the interaction picture interaction satisfies VI (τ ) =
exp[τ H0sing ]V exp[−τ H0sing ] and similarly for the fermionic creation and annihilation operators. We assume the concrete forms for the single-particle piece of the
impurity Hamiltonian and for the interaction piece as we did before, to describe the
Hubbard model. The next step in the derivation is to expand the exponential of the
interaction in a power series
Z
Z β
∞
Rβ
X
P Rβ
sing
0 †
0
0
(−U )k β
dτ1 . . .
dτk TrTτ e−βH0 e− σ 0 dτ 0 dτ cσ (τ )λσ (τ,τ )cσ (τ )
Zimp =
k!
0
0
×
k=0
c†↑ (τ1 )c↑ (τ1 ) . . . c†↑ (τk )c↑ (τk )c†↓ (τ1 )c↓ (τ1 ) . . . c†↓ (τk )c↓ (τk ).
(13)
Because this average over the product of the fermionic creation and annihilation
operators is with respect to a quadratic action (given by H0sing and the λ-field
term), one can evaluate the average via Wick’s theorem, which expresses the result
in terms of products of the Green’s function corresponding to the quadratic action.
In total, there are k! different ways to form these products, but they can all be
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
13
Fig. 3. (Color online) Example of one diagram in imaginary time for the equilibrium implementation of the continuous time algorithm from weak coupling. The narrow lines are Green’s functions
connecting different time points (red for spin up and blue for spin down). The Ising variable
associated with the auxiliary field at the interaction vertex has been suppressed.
summarized via the determinant of an appropriate matrix. Note that here we have
0
0
0
G−1
0σ (τ, τ ) = (−∂τ + µ)δ(τ − τ ) − λσ (τ, τ ).
We define the determinant Dσ (k) via
G0σ (τ1 , τ1 ) G0σ (τ1 , τ2 ) · · ·
G (τ , τ ) G (τ , τ ) · · ·
0σ 2 2
0σ 2 1
G (τ , τ ) G (τ , τ ) · · ·
0σ 3 1
0σ 3 2
Dσ (k) = Det
·
·
·
·
·
·
·
·
·
G0σ (τk , τ1 ) G0σ (τk , τ2 ) · · ·
G0σ (τ1 , τk )
G0σ (τ2 , τk )
G0σ (τ3 , τk )
·
·
·
G0σ (τk , τk )
(14)
(15)
with the time arguments given by the k different time values that will be taken
in the kth multiple integral (see Fig. 3 for an example diagram). The stochastic
aspect of the problem is now clear. One uses Monte Carlo methods to sample the
different τi values for each multidimensional integral, and since the error decreases
as the number of random points chosen in the integrand independent of dimension,
one can, in principle, evaluate each order of the perturbation theory expansion with
an equivalent amount of computer time. This, of course, is not the case since the
integrand involves the determinants, and those determinants are more difficult to
evaluate for larger k. In an actual implementation of the algorithm, the Monte
Carlo step allows for the system to increase or decrease k by one unit (adding a
vertex or removing a vertex), and the acceptance criteria for the Monte Carlo step
comes from evaluating the ratio of the determinants for the two sets of diagrams
evaluated. Fast updating methods are used to calculate the new determinants from
the old ones without having to diagonalize the full matrix, which is what makes
the algorithm efficient. The algorithm will actually determine the most important
orders of the perturbation theory via the importance sampling.
Once again, there is a sign problem that occurs if the determinant changes
sign, which often happens. To handle this, the interaction is modified from the
December 10, 2014
14
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
conventional Hubbard interaction to
1
1
U X †
1
1
†
†
†
U c↑ c↑ −
c↓ c↓ −
=
c c − + sα
c↓ c↓ − − sα ,
2
2
2 s=± ↑ ↑ 2
2
(16)
where α ≥ 1/2 seems to fix the sign problem for the equilibrium calculations. Of
course, this does require the additional summation over Ising variables at each time
step for a given diagram (and a rederivation of the above formalism using the new
interaction). The summation is also done via stochastic importance sampling.
Calculating the Green’s function is a bit more involved for the continuous-time
algorithm. The formula for the Green’s function includes two more creation and
annihilation operators than the partition function. This requires one more Wick
contraction for each diagram of “order” k than used in the partition-function calculation. Otherwise, the technique is identical. By manipulating the Dyson equation,
one can show that the term that is actually summed in the algorithm is a reducible
self-energy, which can readily be employed to determine the full Green’s function.
One might ask about the relationship between these two methods. It turns out
that they have a simple relationship46 . If one were to restrict the continuous time
algorithm to include only diagrams of order N = β/∆τ and allow the vertices to be
restricted to the time slices used in the Hirsch-Fye algorithm, then the two methods
calculate the same set of diagrams. By extrapolating to the N → ∞ limit, one can
then show that the extrapolated results for these two methods will be identical,
because the continuous time method will require diagrams of effectively one order
only, due to the central limit theorem. It is also clear, then, that the continuous time
algorithm should be superior to the Hirsch-Fye algorithm for truncated calculations,
because it effectively samples a wider range of diagrammatic terms. The continuoustime approach has now become the standard technique used by most dynamical
mean-field theory calculations in equilibrium.
There is a second form for the continuous-time algorithm, which performs the
expansion of the perturbation series from a strong-coupling approach called the
hybridization expansion41 . We do not have the space here to describe the derivation
of this approach. While similar to the weak-coupling technique, the derivation is
more complicated because the atomic Hamiltonian is not quadratic, and hence one
cannot use Wick’s theorem, but instead one has to employ some more complex
techniques.
Since the continuous-time algorithm is a diagrammatic method, which sums
diagrams to high order, one might wonder whether or not there might be a better
way to organize the diagrams, so that an infinite class of diagrams can be summed
initially, and the Monte Carlo is used to sum the remaining ones. This idea is called
the bold quantum Monte Carlo method47,48 . The idea behind the bold method,
is that if one can identify the dominant terms in the summation that provide the
physical behavior of the system, then summing them up front can greatly reduce
the order that one needs to extend the quantum Monte Carlo summation. There
are additional challenges to employing the bold technique, as one now needs to
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
15
identify and remove terms in the diagrammatic summation that already appear in
the infinite summation of the starting point. This can make the diagram selection
and the Monte Carlo integration more complicated, but this is usually more than
compensated by requiring a much lower order in terms of the number of diagrams
to keep in the expansion. Usually the latter is more important than the former,
especially in cases where there is a sign problem to deal with.
Finally, we need to discuss how one generalizes these approaches to nonequilibrium. In principle, the procedure is straightforward, where we simply extend the
contour along the real axis and proceed as before. The main problem with this is
that the matrix elements for the Green’s functions now become manifestly complex,
and the weight factors also become complex. One can once again use the modulus of
the complex numbers for the weights, but then one needs to sum the average complex phase of the summations and divide by the average phase. The average phase
rapidly goes to zero as the real branch of the contour increases in size, and this
poses the most severe limitation on these methods. The first attempt in this area
was to generalize the Hirsch-Fye algorithm along these lines49 . The continuous-time
algorithm has been tried50,51 , and it can only be stabilized for quite short times,
where only specialized problems can be studied that have their transient evolution
take place over a short period of time. The bold technique has also been applied52
and shows promise, being able to be evolved about twice as long as the conventional algorithm. But, generically, more stable algorithms that can evolve further
in time are needed within this class of impurity solvers. It is possible that making
the algorithm manifestly unitary can help with the phase problem.
The weak convergence or divergence of a diagrammatic series is usually handled
by techniques like Borel, Cesáro-Riesz, or Lindelöf resummation53 . A more general
approach to doing this is offered by resurgence theory54 , which expresses f (x) as
a triple power series (called a trans-series) in x, exp[−1/x], and ln[x], employs
analytic properties in the vicinity of all poles and branch cuts to determine the
relevant coefficients of the expansion, and automatically includes nonperturbative
effects. It is possible that employing this method within a bold-like quantum Monte
Carlo approach could allow calculations to proceed to even longer times55 . We
discuss these techniques in more detail below when we examine extrapolation of
nonequilibrium results to longer times.
There also have been some recent proposals for extensions of variational quantum
Monte Carlo approaches to nonequilibrium. So far, this has been done only for
bosonic systems56,57 , but there is promise that one might be able to extend these
ideas to fermionic systems, and at the very least, the bosonic methods might benefit
from being re-examined along the extreme data science perspective.
4. Algorithms based on renormalization group ideas
The next class of algorithms we discuss are those related to the renormalization
group of Wilson58 . The original numerical renormalization group was designed to
December 10, 2014
16
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
treat the low-energy scale that develops in a system of noninteracting conduction
electrons (the bath electrons) that hybridize with an impurity atom that has strong
Coulomb interactions for electrons on the impurity (the impurity electrons). It was
well known that this model had complex behavior with a low energy scale that
develops in the system at low temperature and that the low-energy model displays
universal behavior. Numerically calculating such results turned out to be problematic. Wilson’s idea was to discretize the frequency space into a logarithmic energy
grid, and replace the continuum of states within each energy interval by one discrete degree of freedom. As one moves in energy closer to the Fermi energy, the
energy intervals become smaller and smaller. Hence, the Hamiltonian for the single
impurity Anderson model is described by
HSIAM = Ef
X
fσ† fσ +U f↑† f↑ f↓† f↓ +
σ
N X
X
N X
X
Vα fσ† cασ + c†ασ fσ +
ωα c†ασ cασ
α=0 σ
α=0 σ
(17)
where 0 ≤ α ≤ N labels the bath states that have energy which we choose for
illustration to satisfy ωα = 1/Λα (the parameter Λ is commonly chosen between
1.5 and 3), Vα is the hybridization between the impurity and the αth bath state,
U is the Coulomb interaction, and Ef is the energy of the impurity level. In this
form, the Hamiltonian is written as an impurity coupled to each bath site, which
is schematically illustrated in Fig. 4(a). One can integrate out the conduction electrons, which produces an impurity problem interacting with a time-dependent field
which is our old λ field, but written in real frequency instead of time. One finds
λσ (ω) =
N
X
|Vα |2
.
ω − ωα + i0+
α=0
(18)
The negative of the imaginary part of this field is called the hybridization function
∆σ (ω) = −Imλσ (ω). Given a dynamical mean-field λσ in frequency space, one
can immediately construct the hybridization and energy for each bath state that
approximates the imaginary part of the dynamical mean-field as a sum over a set
of delta functions. The procedure is as follows: for the αth energy interval, which
runs from ωαmin to ωαmax , the frequency ωα is chosen to be the weighted average of
the hybridization function over the interval
Z ωαmax
1
ωα = max
dωω∆(ω)
(19)
ωα − ωαmin ωαmin
and the weight of the delta function that describes the effective discrete degree of
freedom yields the hybridization
s
Z ωαmax
1
dω∆(ω),
(20)
Vα =
ωαmax − ωαmin ωαmin
which is always real, because the hybridization function is always nonnegative [see
Fig. 4(b) for a schematic of the process].
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
17
Fig. 4. (Color online) In this schematic of the single impurity Anderson model, we take eight bath
states indicated by the circles which couple to the central impurity site indicated by the square,
where the interaction takes place [panel (a)]. In addition, we show the traditional logarithmic
grid in frequency space (upper blue) and how one determines the weight and frequency associated
with each bath site (lower green) for the dynamical mean field of a Hubbard model with strong
interaction and a filling of 0.9 [panel (b)]. The black curve is the original hybridization ∆(ω) =
−Imλ(ω) and the red curve is the approximation using Λ = 1.4 and 25 points. The red curve
is a reconstruction of the dynamical mean field by using a logarithmic broadening of the delta
functions. Note how it fits poorly for large frequency but is much more accurate near ω = 0. Note
also that there is a large deviation at the smallest frequencies because there are no discretized
states there. Increasing the number of states would fix that disagreement.
Wilson’s next step is to construct the Wilson chain. This is done by starting
with the impurity Hamiltonian written in terms of the f operators only, and then
constructing the linear combination of bath states that directly couple to the impurity
v
u N
N
uX
X
|Vα0 |2
(21)
a1σ =
Vα cασ /t
α=0
α0 =0
where the constant term in the denominator is chosen to guarantee that the a
operator satisfies the canonical fermionic anticommutation relations. We now want
to define a new set of chain fermions (with a0σ = fσ ) and construct the Wilson
chain Hamiltonian (see Fig. 5), which takes the form
chain
HSIAM
= Ef
X
a†0σ a0σ + U a†0↑ a0↑ a†0↓ a0↓ +
σ
+
∞ X
X
i=1
∞ X
X
i=1
ti a†i−1σ aiσ + a†iσ ai−1σ (22)
σ
i a†iσ aiσ
σ
where each term in the Wilson chain is determined recursively by forcing the original
single-impurity Anderson model into the above form. The Coulomb interaction U
appears only on the zeroth lattice site, and the hopping matrix elements decay
December 10, 2014
18
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
Fig. 5. (Color online) The Wilson chain is constructed similar to a Lanczos procedure, where
the impurity is coupled to a linear combination of bath sites, which we denote as the first chain
site. The chain site is then coupled in turn to new chain sites, with the coupling between chains
decreasing down the chain (indicated by the shrinking widths of the lines denoting the hopping).
exponentially as one moves down the chain. One can view this transformation as
a tridiagonalization of the SIAM Hamiltonian in the same way that one writes the
Lanczos algorithm.
Wilson’s numerical renormalization group works with the problem in the Wilson chain form. One starts with the impurity site and then adds one chain site and
another, and so on, until the size of the matrix is just bigger than a predetermined
size m (typically m ranges from 2000 to 5000) which is going to determine the number of kept states. One then diagonalizes the full Hamiltonian, and truncates the
basis, keeping the m lowest energy eigenvalues. The process is then iterated further,
with another chain site added, the Hamiltonian constructed for the enlarged chain,
then diagonalized, and finally truncated to the low-energy space. As this process
is iterated, eventually it stops at a fixed point, where the system is described by
the renormalized Fermi liquid. By keeping account of the states discarded at each
step of the iteration, one has a complete set of states for the problem that describes
the high-energy degrees of freedom (which become frozen in at high temperature)
and the low-energy degrees of freedom, which correspond to the active m states
on the current Wilson chain. Since one has both eigenvalues and eigenvectors, one
can compute many different quantities of interest, like the single-particle Green’s
function (via the Lehmann representation), the self-energy, magnetic and charge
susceptibilities, etc. Spectral properties are also recorded as a series of delta functions which need to be broadened to obtain a spectral function. The broadening
scheme needs to be chosen for a given problem, but usually one chooses a logarithmic scaled Lorentzian or Gaussian. This choice does well at low frequencies, but
does not properly produce the bandwidth of the system. Since one can input the
hybridization function, and output the self-energy, this method can be used to solve
dynamical mean-field theory, although care needs to be taken in how this is done
to ensure the iterated equations will converge.
One subtle point to keep in mind is that the effective temperature of the system is
determined by the energy scale of the chain where the calculation ends. Hence, to get
to the zero-temperature limit, one performs the calculation on a chain that is long
enough that the results stop changing. Higher temperatures are found on smaller
chains, and it should become clear that this technique fails if the temperature is
too high, because there are not enough degrees of freedom to properly describe the
behavior (in fact, for dynamical mean-field theory, it also fails at low temperature,
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
19
Fig. 6. (Color online) (a) Particle in a box problem which motivated the density matrix renormalization group approach. The ground state wavefunction in the smaller boxes (black curves)
do not allow for a simple way to construct the ground state wavefunction of the larger box (red
curve), although they do have some weight in that construction. (b) Schematic of the original
block of size L, the additional site, the final block of size L + 1 and the reflection of the system to
construct a superblock.
as the imaginary part of the self-energy often has the wrong sign for frequencies
near the Fermi energy at low temperature, below the low-energy coherence scale).
While the numerical renormalization group approach has been extremely successful in solving some of the paradigmatic many-body problems, it turned out to
be limited in scope, in that similar ideas applied to strongly correlated lattice problems failed to work effectively. The reason for this was twofold: (i) it isn’t necessarily
true that the low-energy eigenfunctions for a smaller system are the most important
ones to keep for finding the low-energy eigenfunctions of a larger system and (ii)
the choice for keeping the lowest energy eigenvalues turns out to significantly lose
information about the quantum state as the system size grows. In the 1990’s, White
developed an alternative formulation to the renormalization group, which he called
density matrix renormalization group, that solved both of these problems and allowed a wide range of one-dimensional strongly correlated problems to be solved59 .
A quantum information analysis of this algorithm shows that it works well as long
as the entanglement entropy does not grow too rapidly. This usually holds in onedimensional systems, and rarely does for higher dimensional ones. We describe the
density matrix renormalization group algorithm next.
The motivation for the density matrix renormalization group problem was the
challenge of finding a way to apply the renormalization group ideas to the case of
December 10, 2014
20
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
expanding the size of a one-dimensional quantum system and maintain an appropriate basis that projects primarily onto the low-energy states of the larger system.
Consider a particle in a box of length L in the ground state. We want to double the
size of the system to 2L and find the states in the low-energy manifold. One might
think that they should consist of the states that have low energy in the smaller box,
but a simple calculation shows that smaller box ground state projects onto states of
all energies in the larger box, and hence choosing states to keep by minimizing the
energy is not the correct thing to do [see Fig. 6(a)]. In fact, the entire renormalization group procedure needs to be modified. White chose to increase the system of
size L to one of size L + 1 through a complicated procedure involving a superblock
of size 2L + 2. One starts with the block of size L, reflects it to another block of
size L and adds two sites in the middle. If we let α and β denote the states in the
left and right blocks of size L + 1, then the wavefunction of the superblock is given
by the matrix-product state expression
X
|ψi2L+2 =
ψαβ |αi ⊗ |βi
(23)
αβ
where ψαβ are the expansion coefficients (numbers) and |αi and |βi are the states
that form the basis in the left and right block [see Fig. 6(b)]. Using a singular value
decomposition, one can transform this matrix into its diagonal form
X
λᾱ |ᾱileft ⊗ |ᾱiright
(24)
|ψi2L+2 =
ᾱ
where the barred symbols are the rotated basis, and the same states are coupled
together in the direct products for the left and right subblocks. The reduced density
matrix for the left block is then defined to be
X
X
ρlef t =
|ψihψ| =
λ2ᾱ |ᾱileft left hᾱ|.
(25)
ᾱright
ᾱ
The density-matrix renormalization group algorithm says that one takes the m
largest eigenvectors of the reduced density matrix as the truncated basis for the
left block of size L + 1. So the procedure is to start with a block of size L that has
already been written in the effective basis according to the maximal eigenvalues of
the reduced density matrix. Construct a superblock of size 2L + 2 and diagonalize
the Hamiltonian to give the ground state via a Davidson or Lanczos procedure, take
the matrix that expresses the ground state wavefunction in the original basis and
diagonalize via a singular value decomposition and transform the matrix to this
new basis. Construct the reduced density matrix by tracing over the right degrees
of freedom and pick the m states with the largest eigenvalues for the basis states of
the L + 1 block. Proceeding in this fashion, one can keep growing the system until
the energy stops changing. This then gives the results for the ground state of the
equilibrium and infinite-sized system. One can examine multiple low energy states
either by separately calculating for the different individual states, or by averaging
the density matrix over the different eigenstates one is computing.
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
21
There also is a finite-sized system algorithm that also creates superblocks, but
the size of the system is fixed at 2L say, so one increases the left block while
decreasing the right and vice versa, zipping through the system to the left and then
to the right. This approach is usually more accurate for determining the energy,
especially if one uses finite size scaling to the large system limit, than the infinite
system algorithm.
The density-matrix renormalization group algorithm is a variational algorithm,
and the choice of using the reduced density matrix rather than the energy eigenvalues in choosing the appropriate basis to describe the different blocks turns out
to be the choice that minimizes the information loss in the system as one increases
the system size, and is precisely what is needed to produce an accurate and efficient algorithm. In a more modern language, we like to think of the density matrix
renormalization group ansatz for the wavefunction as part of a general matrix product state ansatz60 . Then, quantum information theory tells us that this approach
is a form of a quantum compression algorithm61,62,63 and one can quantify the
computational cost and the accuracy via studying the associated entanglement and
entanglement entropy. Recent developments have also shown how the density-matrix
renormalization group can be employed to benchmark density functional theory in
one dimension64 .
So why does the approach fail for higher dimensions? It turns out that the representation of the ground state in terms of the direct products with a truncated
basis is an efficient way to expand wavefunctions that have limited entanglement.
As entanglement grows in the system, more complex ways to represent the wavefunction are needed, and generalizations from the matrix product state approach of
the density matrix renormalization group to projected entangled pair states65 , and
to multi-scale entanglement renormalization ansatzs66 , show promise in being able
to handle more entanglement in the wavefunction; they have already solved a number of difficult problems67,68,69 . In addition, progress has been made with solving
long-range interactions, which can lead to efficient simulation of higher dimensional
systems70 .
There has been progress on solving time-dependent problems within the numerical renormalization group framework71 , but so far these problems have focused on
quantum quenches, or steady-state properties of current flowing through a quantum
dot attached to leads at two different voltages. The basic idea to carry this out is
that one can calculate the time-dependent expectation value of an operator from
the time dependent density matrix. Under the assumption that the system starts
in a Hamiltonian H0 for early times, and is in equilibrium at some temperature,
then the initial density matrix is just ρ0 = exp[−βH0 ]. At time t = 0 the system is
suddenly switched to a new Hamiltonian H1 , and that Hamiltonian is responsible
for all future time evolution of the system. The time-dependent density matrix then
satisfies
ρ(t) = eiH1 t ρ0 e−iH1 t .
(26)
December 10, 2014
22
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
So the Wilson chain is constructed from the final Hamiltonian, and the evolution of
the system is found in the long-time limit by averaging the time evolution, which
corresponds to a dropping of the off-diagonal elements when expressed in an eigenbasis with respect to the final Hamiltonian. For current transport problems, it is
important to formulate the system in terms of the scattering states of the noninteracting system, which is somewhat different from the conventional way of developing
the numerical renormalization group because the impurity operators are part of the
scattering states operators. Generalizations to include multiple quenches have also
been made72 . One of the issues with this approach is that the exponential decay of
the hopping matrix elements projects the system to lower and lower energy shells of
the final Hamiltonian, and it isn’t clear that the nonequilibrium system is projected
onto those low energy states. Hence, a new hybrid approach has been constructed
where the numerical renormalization group approach is initially taken, and then
one ends with a density matrix approach for the time-dependent problem73 . This
then allows for more accuracy at longer times when one does not continue to project
onto lower energy shells.
The nonequilibrium dynamical mean-field theory problem requires a more complex approach to solving it because driving a system with a field, requires a more
general nonequilibrium impurity solver than one that can handle quenches only.
One has to first grapple with the so-called mapping problem, which involves determining the hybridization and the site-energy for each bath state that couples
to the impurity74 . Unlike the construction for the real frequency case, where integration over the individual frequency intervals directly yielded the hybridization
and bath energy, here, because of the more complex time dependence, one cannot
easily determine the hybridization or bath energy. The problem has, however, been
solved in principle, and it requires one to construct two sets of bath states, one
called the + bath and one the − bath. The + bath is constructed from the initial equilibrium mapping and the mixed real and imaginary time dynamical mean
field. There is a unique and well defined strategy to determine these hybridization
functions (which now depend on time). Once they are found, they determine the
hybridization function on the real axis. But since this is most likely not the hybridization function of the nonequilibrium system, we need to subtract this result,
and construct a second hybridization function and a second set of bath functions
from the difference Λ− = λ − Λ+ . Assuming this second dynamical mean field has a
positive representation in terms of hybridization functions, one can then construct
it. One should imagine that the original imaginary axis dynamical mean field is
given by the Λ+ field, and that as time evolves, the initial correlations, given by
the mixed real/imaginary dynamical mean field die off as the real time gets large,
and the system evolves from the Λ+ field to the Λ− field as time moves forward,
as illustrated in Fig. 7. In any case, this approach has a constructive way to determine the effective hybridizations and bath energies, even though it is numerically
challenging to solve these equations.
The problem for developing a complete nonequilibrium numerical renormaliza-
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
23
Fig. 7. (Color online) If we take the contour, shown at the top, and stretch it to a straight line,
we can represent a matrix function that has each time lying on the contour on either the upper
real branch (+), the lower real branch (-), or the imaginary branch (i). The Λ+ field is largest
in the equilibrium part of the matrix, closest to the imaginary spur, and fades away as one gets
farther from that region (indicated by the orange color). The other field Λ− grows the farther one
gets from the spur (indicated by the purple color). For large real times, the field is primarily Λ− .
tion group approach, if that even is possible, has not yet been completed. Since the
driven system need not be restricted to a low energy subspace, nor do high energy
degrees of freedom need to be frozen in at low temperature, the renormalization aspect of the algorithm may not hold anymore. Numerical attempts have been made
recently28,75 , but more work needs to be done to make these approaches more efficient. These ideas provide an interesting starting point for algorithms that focus
on the causal nature of the many-body problem and are described in more detail
below.
We conclude this section be describing the time-dependent density matrix renormalization group approach76,77 . Here, one wants to find the wavefunction as a function of time, and it will change in time, according to how the Hamiltonian evolves,
by simply following the equation of motion. Since we consider a Hamiltonian that
December 10, 2014
24
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
changes as a function of time, a simple Trotterization of the evolution operator is
appropriate, and so the algorithm needs to be modified from calculating the ground
state wavefunction to determining the action of exp[−iH(t)∆t] on the wavefunction
at time t. It turns out this can also be calculated using sparse matrix techniques
based on either the Lanczos algorithm or the Crank-Nicolson algorithm. It is best to
perform these calculations for the finite-system algorithm, because then one can zip
to the left and then to the right for each time step and update the system accordingly. Of course, the set of m kept basis state functions will now change as a function
of time, and they will continue to be determined by the reduced density matrix of
the Hamiltonian at the current time instant. It is not obvious that this produces
the optimal basis to work in, but it is how current calculations are performed. Once
again, if the time evolution of the system creates significant entanglement growth,
or if the disturbance in the system moves to the boundaries where it will reflect,
one can no longer evolve the equations further in time to determine the properties
in the long-time limit. In any case, this algorithm has proved to be one of the best
approaches to the nonequilibrium problem in one dimensional systems, and it is
likely that any improvements to the approach need to adopt a similar time evolution of the active subspace within which the current quantum state lies, as it evolves
forwards in time.
There have been some interesting new developments that incorporate Chebyshev
polynomials for expansions of the many-body density of states in equilibrium78 . The
density of states is found by recursively determining moments of the Chebyshev
expansion, which involves a matrix-vector multiplication to determine the recursion.
The full matrix is truncated by employing a matrix-product-state representation
for the wavefunction used in the recursion relation. It is possible ideas represented
in this work will be useful also for nonequilibrium problems and for deciding on
appropriate compression schemes for representing the data for the wavefunction.
5. Algorithms based on the evaluating the evolution operator
In our final technical section, we discuss the the so-called nonequilibrium Green’s
function approach, which works on effective quadratic Hamiltonians (which are
either noninteracting, or describe mean-field couplings, including low-temperature
superconductivity). Quadratic Hamiltonians have the benefit of being able to be
diagonalized exactly, and hence, a calculation of the evolution operator can be
performed exactly, and from the evolution operator, one can directly find the Green’s
function. (For example, the retarded Green’s function is given by the evolution
operator, while the lesser Green’s function, which depends on the full history of the
system, can be constructed from the evolution operator as well, but is a much more
complicated object.) Hence, these approaches effectively are focused on determining
the evolution operator directly.
The nonequilibrium Green’s function approach79,80 , is used to solve for the
nonequilibrium transport in mesoscopic systems that are connected to ideal (bal-
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
25
listic metal) leads. The leads are maintained at fixed temperatures and voltages,
and by projecting the Dyson equation onto the active interacting part of the device,
where the mesoscopic behavior occurs, one can describe the leads via effective selfenergy contributions determined by the surface Green’s functions of the leads. This
then maps an infinite system onto an effective finite-sized system that can then
be treated numerically. In the case where the many-body dynamics is restricted
to a mean-field treatment, or is described by simple perturbation theory, one can
immediately solve these problems, although the numerical effort can be huge, and
one has to pay particular detail to conservation laws, gauge invariance, electronic
charge reconstruction, and self-consistency in solving both the quantum mechanics
and the electrodynamics of the driven system81,82 .
Recently, there has been a breakthrough on the formal/numerical side by mapping the nonequilibrium Green’s function approach onto a simple wavefunction
based approach83 . If one decomposes the retarded Green’s function into a sum
over products of wavefunctions, and examines the equation of motion for the wavefunctions, one finds they satisfy the time-dependent Schrödinger equation, with the
full time-dependent Hamiltonian, plus an additional source term that arises from
the currents being driven by the leads. Since the Green’s function is composed from
the wavefunctions, essentially as the sum over outer products, one can reduce the
complex matrix-based numerics for solving the Green’s functions by vector-based
numerics for solving the wavefunctions. Here, one of the critical issues one needs
to preserve in solving these problems is to maintain unitarity of the time evolution, which can rapidly be lost in conventional integrators of wavefunctions (or
Green’s functions), but there are algorithms to do this. The main challenge with
this wave-function-based approach, is that it is not easily generalized to full manybody interacting problems, but it does hint at the fact that one can find much more
efficient algorithms for solving these types of problems by determining the correct
way to represent the Green’s functions. In particular, if it is possible to represent
the full many-body problem in terms of a wavefunction-based representation with
a simple Schrödinger-like equation with an additional source term, then one can
extend these wavefunction-based methods much more broadly.
Motivated by the success of this approach, one can consider other methods which
have not been exploited too much to try to tackle the problem of determining the
evolution operator. One method to consider is to factorize the evolution operator
into a sequence of factors which might make it easier to evaluate the full operator
numerically. This approach is well known, as it forms the basis for the interactionpicture representation of the evolution operator, but often the factorization stops
there. In cases where the Hamiltonian does not commute with itself at different
times, but its commutator does (i.e., [H(t), H(t0 )] commutes with H(t00 )), one can
find the exact evolution operator by breaking the Hamiltonian into a series of three
factors, as is often used in solving for the driven harmonic oscillator in quantum
mechanics textbooks84,85 . By employing clever decompositions of the Hamiltonian,
December 10, 2014
26
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
as is done with the density-matrix renormalization group method, one might find
new ways to factorize the evolution operator that can make computation much
simpler with it. We feel this has been an underexplored area for the nonequilibrium
many-body problem.
6. Computer Science ideas for extreme data science
From a computer science perspective, one would like to determine an efficient way to
encode the large complex data set, construct a small database of how that set evolves
as a function of time, and use the current information to forecast future information.
In principle, this should be possible, because the structure of the formula for the
Green’s function is a trace over initial states that have high thermodynamic weight.
At low temperatures, this is restricted to a small set of states, which becomes just the
ground state at T = 0. The evolution of this state through the Hilbert space traces
out a one-dimensional path, and hence it always is a small subspace of the full space.
The problem arises when we try to represent this state in a particular basis. As the
wavefunction becomes more entangled, or involves mixtures of more eigenstates, it
can take a large number of states to represent it. One key element within this is to
employ causality as the unifying principle for how to evolve the system forward in
time. For the quantum many-body problem, this entails determining an equation of
motion and solving it. One can do so by determining the evolution operator, or a
projection of the evolution operator onto the active subspace of the Hilbert space,
or via a direct integration of the wavefunction. To do either of these, requires an
efficient way to encode the evolution operator or the wavefunction, for otherwise,
the representation of these objects will grow too rapidly to be able represent it for
any reasonable amount of time. Since the operation needed at any given time step
is the action of the evolution operator on the particular wavefunction that one is
following, it is likely that one can evolve the wavefunction efficiently.
The simplest method for encoding the basis vectors is to pick a single-particle
basis and encode the state as a binary with a one indicating a particle in that state
and a zero indicating no particle in that state. As the density-matrix renormalization
group studies have shown, clever ways of encoding the wavefunction, via tensor
products or other types of data structures, can prove to be much more efficient ways
of encoding the wavefunction and allowing it to grow in complexity as a function of
time. More research and more ideas of how to create, manipulate, and calculate with
such data structures is imperative to make progress with finding efficient encoding
schemes. It is also likely that one will need to change the bases and let them evolve
as a function of time for more efficient implementations. Clearly, computer science
expertise in appropriate data structures will be helpful in making progress with this
approach.
In addition to novel data structures, appropriate computing architectures and
paradigms are needed to support extreme data science computations. Dataflow and
computing models that display extreme parallelism are among such possibilities to
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
27
be considered86 . Dataflow computing arises from situations where storing the entire
data space is impossible (which encompasses extreme data science by definition),
so the algorithms that direct computation are based on the availability and flow of
the data and are able to employ parallelism at a high level. Developing this type of
computation is the foundational approach to solving extreme data science problems.
Furthermore, computing paradigms such as lazy computation87 and speculative
computing88 must also be considered. Lazy computation delays the actual computation until absolutely necessary. In our focus, such an approach supports the
projection of our global data space to only what is immediately needed and can be
maintained (the time-evolving target data subspace). Speculative computation supports simultaneous multiple path solution space explorations providing the ability
to sustain approximating boundary conditions as needed.
The most numerically challenging scheme will be to determine how to either
solve for the evolution operator of the system, or how to integrate the wavefunction
as a function of time. Ideas along these lines will be presented in the next section.
Forecasting falls into two realms. One is extrapolating the average time to longer
times and the other involves extrapolating the relative time to longer times. It turns
out that the latter is often much easier than the former to accomplish. For equilibrium problems, the time translation invariance of the dynamical mean field, often
implies that the relative time dependence can be determined by the determinant
of a large Toeplitz matrix89 . Using Szego’s theorem and the elegant mathematics
of the Wiener-Hopf approach90,91,92 , one can construct an exact formula for the
asymptotic exponential decay of the Green’s function as a function of relative time.
If the spectral function has power-law singularities, then the approach needs to be
modified to the Fisher-Hartwig conjecture93 , which will determine the power-law
decay of the Green’s function in relative time. It is only in the unlikely case of a
delta function in the spectral function, that one encounters a relative time dependence that does not decay. For the nonequilibrium problem, if sufficient data have
been generated for long enough times, one can extract the appropriate decay forms
for longer times, under the assumption that the decaying behavior as a function of
relative time can be extrapolated from the short-time results. The expectation is
that the Green’s function always decays with a complex exponential behavior for
large relative times.
Extrapolation as a function of average time requires some form of an ansatz for
the behavior of the system at long times. Since the retarded Green’s function determines the quantum states of the system, it is expected to rapidly approach its longtime behavior, while the lesser Green’s function, which determines how those states
are filled, often takes much longer to reach its asymptotic limit. But in cases where
it is described by an effective fluctuation-dissipation theorem with a time-dependent
temperature, the extrapolation can be carried out quite effectively94 . In other cases,
if one knows the analytic behavior of the system, one can extrapolate summations
of diagrams to capture the long-time limits as well95 . Techniques along these lines
December 10, 2014
28
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
have been used within numerical approaches for describing asymptotic expansions,
but much more can be done by enforcing properties of analyticity, where they apply.
They generically fall into the mathematical theory of resurgence54 , which has been
applied to quantum mechanics, quantum field theory and string theory96,97 , and
has great potential to be applied to the nonequilibrium many-body problem.
It is also advantageous to use reduced dynamics techniques, which re-express
long-time dynamics in terms of a short-time memory kernel, which generically decays much faster in time than the Green’s function98 . The short-term kernel can
be determined by computational methods for nonequilibrium that are accurate for
short times, and then can be input into the reduced dynamics formalism and evaluated in the long-time limit. This approach has been successfully applied to a number
of different problems. One example is the application to spin relaxation in the Kondo
regime with the bold continuous time quantum Monte Carlo method99 .
7. Future thoughts and conclusions
We examined the behavior of a number of different algorithms for calculating properties of many body systems in equilibrium and in nonequilibrium. Clearly, the
nonequilibrium problem is much more complicated than the equilibrium one, and
it may require the development of new approaches to be able to reach long times
with a general purpose algorithm. One result which remains clear, is that stochastic
methods, which map the quantum problem onto an effective statistical problem,
will suffer from the dynamical phase problems, which will greatly limit their ability
to perform accurate calculations for long times. This can only be fixed by finding
alternative representations that can forestall the phase problem from occurring. The
bold method shows promise in this area, but still has much development to go before it will be useful for general problems. If we leave these stochastic methods off
the table as we develop novel approaches that will likely work for nonequilibrium,
we are left with focusing on either determining the evolution operator directly, as
a function of time (and perhaps projected onto the active subspace), or evolving
the wavefunction directly in time. These methods are closely related to exact diagonalization techniques and to density matrix renormalization group methods, which
both use this approach. For dynamical mean-field theory applications, we always
need to solve an effective single impurity Anderson model, but we believe that it
must be solved in alternative ways than the conventional time-dependent numerical
renormalization group, because one need not project onto an effective low energy
space for a driven system. We call these time-driven methods, methods based on
causality, since we will utilize the causal nature of the wavefunctions or Green’s
functions in solving the problem. Recent ideas along these lines can be found in
an approach that focuses on the evolution of expectation values in the Heisenberg
picture for the single impurity Anderson model100 .
We want to discuss the application of the four computer science ideas within this
many-body context. First, we have the issue of how to encode the data. Here, the
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
29
density matrix renormalization group is probably the most sophisticated approach,
as it tries to create wavefunctions that can contain a certain amount of entanglement in their representation. Determining the most efficient way to represent the
wavefunction is one of the unsolved goals, but there has been some new work along
these lines in the context of the numerical renormalization group in equilibrium101
which could point in a new direction for how to formulate the solution of this problem. One of the key elements is to focus on how to efficiently update the basis that is
used from one time step to another, and new ideas within this context are certainly
going to be needed.
The evolution of the system boils down to one of two techniques. The first is to
solve for the evolution operator (which can then subsequently be used to find the
Green’s functions). One approach that has not been used too much is to factorize the
evolution operator. While everyone learns the simplest factorization as seen with the
interaction representation, it might be possible to factorize further via a Magnuslike expansion102 , where subsequent factorizations are possible if the potential in
the interaction picture can be broken up into two pieces, whose commutator at two
different times commutes with all operators. The second approach is to directly solve
for the wavefunction as a function of time. This approach, via a direct integration
of the Schrödinger equation, is often the most efficient way to proceed, because
it requires one to operate just the Hamiltonian on the wavefunction at each time
instant, but many algorithms that do this suffer from loss of unitarity, and hence
the algorithm needs to be designed with care to guarantee it will preserve the total
probability.
None of the evolution methods in time will work without having an ability
to truncate the results into an active subspace of the whole Hilbert space. The
density matrix renormalization group uses the reduced density matrix to determine
this optimal basis, while the recent work on the numerical renormalization group
by Gunnarsson and collaborators101 used a simple truncation scheme to trim the
number of basis vectors used by their amplitude to appear in the wavefunction.
Both methods show great promise in finding ways to reduce the active subspace so
that the problem does not grow to be too large as a function of time, and to adapt
the target subspace as time moves forward. Efficient coding of the states will be
needed to determine the full history of the evolution.
Finally, the ideas for forecasting in this problem rely strongly on the analytic
properties of the functions being calculated, and by using as much of these analytic properties as possible, one can, perhaps, evolve these systems much further
in time than one thought they could be evolved simply by extrapolating with the
appropriate analytic functions for the long-time behavior.
The basic ideas of extreme data science, the ability to work with data sets that
are so large they cannot be constructed or stored on any computer, seems to be
impossible to deal with at first glance. By carefully analyzing these problems, especially for the class of problems where the active subspace remains small as the
system evolves in time, it is clear that much progress can be made. The nonequilib-
December 10, 2014
30
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
Freericks, Nikolić and Frieder
rium many-body problem can serve as a unique paradigm where a cross fertilization
of ideas from physics, computer science and applied mathematics can help solve just
such a problem and potentially lay the ground work for how one solves similar classes
of problems in other fields. Doing so could revolutionize the field of big data science
and also the scientific fields that can be successfully analyzed within these contexts.
Acknowledgments
We acknowledge useful conversations with John Arrington, Guy Cohen, Peter
Drummond, Adrian Feiguin, Ushma Kriplani, Hector Mera, Roman Orus, Andreas Stathopoulos, and Xavier Waintal. J. K. F. acknowledges the support of
the Department of Energy Office of Basic Energy Science under grant number
DE-FG02-08ER46542 and the McDevitt bequest at Georgetown University. B. K.
N. acknowledges support of the National Science Foundation under grant number
ECCS-1202069. O. F. acknowledges the McDevitt bequest at Georgetown University. J. K. F. also thanks the Aspen Center for Physics and the National Science
Foundation under Grant Number 1066293 for hospitality during the initial stages
of developing this review.
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
E. Candès, J. Romberg, and T. Tao, IEEE Trans. Inform. Theory 52, 489 (2006).
D. Donobo, IEE Trans. Inform. Theory 52, 1289 (2006).
N. Halko, P. G. Martinsson, and J. A. Tropp, SIAM Rev. 53 217 (2011).
M. W. Mahoney and P. Drineas, Proc. Nat. Acad. Sci. USA 106, 697 (2009).
H. Avron, P. Maymounkov, and S. Toledo, SIAM J. Sci. Comp. 32, 1217 (2010).
D. Poulin, A. Qarry, R. Somma, and F. Verstraete, Phys. Rev. Lett. 106, 170501
(2011).
L.-F. Arsenault, A. Lopez-Bezanilla, O. A. von Lilienfeld, and A. J. Millis, Phys. Rev.
B 90, 155136 (2014).
J. F. Corney and P. D.Drummond, Phys. Rev. Lett. 93 260401 (2004).
J. F. Corney and P. D. Drummond, Phys. Rev. B 73, 125112 (2006).
M. Troyer and U.-J. Wiese, Phys. Rev. Lett. 94, 170201 (2005).
P. Corboz, M. Troyer, A. Kleine, I. P. McCilloch, U. Schollwöck, and F. F. Assaad,
Phys. Rev. B 77, 085108 (2008).
M. Ögren, K. V. Kheruntsyan, and J. F. Corney, Comp. Phys. Commun. 182, 1999
(2011).
P. Deuar and P. D. Drummond, Phys. Rev. A 66, 033812 (2002).
A. B. Harris and R. V. Lang, Phys. Rev. 157, 295 (1967).
J. Hubbard, Proc. R. Soc. London Ser. A 276, 238 (1963); 277, 237 (1964); 281, 401
(1964); 285, 542 (1965); 296, 82 (1967); 296, 100 (1967).
L. M. Falicov and R. A. Harris, J. Chem. Phys. 51, 3153 (1969).
O. J. Heilmann and E. H. Lieb, Trans. N. Y. Acad. Sci. 33, 116 (1971).
M. Mierzejewski, L. Vidmar, J. Bonca, and P. Prelovsek, Phys. Rev. Lett. 106, 196401
(2011).
H. Lu, S. Sota, H. Matsueda, J. Bonca, and T. Tohyama, Phys. Rev. Lett. 109 197401
(2012).
E. R. Davidson, J. Comp. Phys. 17, 87 (1975).
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
31
C. Lanczos, J. Res. Nat. Bur. Stand. 45, 255 (1950).
H.-R. Fang and Y. Saad, SIAM J. Sci Comput. 34, A2220 (2012).
H. Trotter, Proc. Amer. Math. Soc. 10, 545 (1959).
A. Alverman and H. Feske, J. Comput. Phys. 230, 5930 (2011); A. Alverman, H.
Feske, and P. B. Littlewood, New J. Phys. 14, 105008 (2012).
J. Crank and P. Nicolson, Proc. Camb. Phil. Soc. 43, 50 (1947).
L. Greenman, P. J. Ho, S. Pabst, E. Kamarchik, D. A. Mazziotti, and R. Santra, Phys.
Rev. A 82, 023406 (2010).
D. Hochstuhl and M. Bonitz, Phys. Rev. A 86, 053424 (2012).
K. Balzer, Z. Li, O. Vendrell, and M. Eckstein, preprint, arxiv:1407.6578 (2014).
P. Hohenberg and W. Kohn, Phys. Rev. 136, B864 (1964).
W. Kohn and L. J. Sham, Phys. Rev. 140, A1133 (1965).
E. Runge and E. K. U. Gross, Phys. Rev. Lett. 52, 997 (1984).
C. A. Ulrich and Z.-H. Yang, Braz. J. Phys. 44, 154 (2014).
M. Schiró and M. Fabrizio, Phys. Rev. Lett. 105, 076401 (2010); M. Schiró and M.
Fabrizio, Phys. Rev. B 83, 165105 (2011).
A. Jreissaty, J. Carrasquilla, F. A. Wolf, and M. Rigol, Phys. Rev. A 84, 043610
(2011).
P. Anderson, Phys. Rev. 124, 41 (1961).
J. Kondo, Prog. Theor. Phys. 32, 37 (1964).
J. K. Freericks, V. M. Turkowski, and V. Zlatić, Phys. Rev. Lett. 97, 266408 (2006).
R. N. Silver, D. S. Sivia, and J. E. Gubernatis, Phys. Rev. B 41, 2380 (1990); M.
Jarrell and J. E. Gubernatis, Phys. Rep. 269, 133 (1996).
J. E. Hirsch and R. M. Fye, Phys. Rev. Lett. 56, 2521 (1986).
A. N. Rubtsov, V. V. Savkin, and A. I. Lichtenstein, Phys. Rev. B 72, 035122 (2005);
E. Gull, A. J. Millis, A. I. Lichtenstein, A. N. Rubtsov, M. Troyer, and Ph. Werner,
Rev. Mod. Phys. 83, 349 (2011).
Ph. Werner, A. Comanac, L. de Medici, M. Troyer, and A. J. Millis, Phys. Rev. Lett.
97, 076405 (2006).
J. E. Hirsch, Phys. Rev. B 28, 4059(R) (1983).
J. Hubbard, Phys. Rev. Lett. 3, 77 (1959).
R. L. Stratonovich, Sov. Phys. Doklady 2, 416 (1958).
N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and E. Teller, J.
Chem. Phys. 21, 1087 (1953).
K. Mikelsons, A. Macridin, and M. Jarrell, Phys. Rev. E 79, 057701 (2009).
K. van Houcke, F. Werner, E. Kozik, N. Prokof’ev, B. Svistunov, M. J. H. Ku, A.
T. Sommer, L. W. Cheuk, A. Schirotzek, and M. W. Zwierlein, Nature Phys. 8, 366
(2012).
E. Gull, D. R. Reichman, and A. J. Millis, Phys. Rev. B 84, 085134 (2011).
L. Mühlbacher and E. Rabani, Phys. Rev. Lett. 100, 176403 (2008).
M. Schiró and M. Fabrizio, Phys. Rev. B 79, 153302 (2009); M. Schiró, Phys. Rev. B
81, 085126 (2010).
M. Eckstein, M. Kollar, and Ph. Werner, Phys. Rev. Lett. 103, 056403 (2009).
G. Cohen, D. R. Reichman, A. J. Millis, and E. Gull, Phys. Rev. B 89, 115139 (2014).
N. Prokof’ev and B. Svistunov, Phys. Rev. B 77, 020408(R) (2008).
J. Ecalle, Les Fonctions Resurgentes, Vols. I−III. (Orsay, Publ. Math. 1981).
O. Costin, R. D. Costin, and J. L. Lebowitz, J. Stat. Phys. 116, 283 (2004).
G. Carleo, F. Becca, M. Schiró, and M. Fabrizio, Scientific Rep. 2, 243 (2011).
G. Carleo, F. Becca, L. Sanchez-Palencia, S. Sorella, and M. Fabrizio, Phys. Rev. A
89, 031602(R) (2014).
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
32
Freericks, Nikolić and Frieder
58.
59.
60.
61.
62.
63.
64.
K. Wilson, Rev. Mod. Phys. 47, 773 (1975).
S. R. White, Phys. Rev. Lett. 69, 2863 (1992).
S. Östlund and S. Rommer, Phys. Rev. Lett. 75, 3537 (1995.
G. Vidal, Phys. Rev. Lett. 91, 147902 (2003).
G. Vidal, Phys. Rev. Lett. 93, 040502 (2004).
F. Verstraete, D. Porras, and J. I. Cirac, Phys. Rev. Lett. 93, 227205 (2004).
E. M. Stoudenmire, L. O. Wagner, S. R. White, and K. Burke, Phys. Rev. Lett. 109,
056402 (2012).
J. Jordan, R. Orus, G. Vidal, F. Verstraete, and J. I. Cirac, Phys. Rev. Lett. 101,
250602 (2008).
G. Vidal, Phys. Rev. Lett. 99, 220405 (2007); G. Evenbly and G. Vidal, Phys. Rev. B
79, 144108 (2009); G. Evenbly and G. Vidal, Phys. Rev. Lett. 102, 180406 (2009).
S. Dusuel, M. Kamfor, R. Orus, K. P. Schmidt, and J. Vidal, Phys. Rev. Lett. 106,
107203 (2011).
Ph. Corboz, T. M. Rice, and M. Troyer, Phys. Rev. Lett. 113, 046402 (2014).
Ph. Corboz and Frederic Mila, Phys. Rev. Lett. 112, 147203 (2014).
M. P. Zaletel, R. S. K. Mong, Ch. Karrasch, J. E. Moore, and F. Pollmann, preprint,
arXiv:1407.1832 (2014).
F. B. Anders and A. Schiller, Phys. Rev. Lett. 95, 196801 (2005); F. B. Anders and
S. Schmitt, J. Phys: Confer. Ser. 220, 012021 (2010).
H. T. M. Nghiem and T. A. Costi, Phys. Rev. B 90, 035129 (2014).
F. Guettge, F. B. Anders, U. Schollwoeck, E. Eidelstein, and A. Schiller, Phys. Rev.
B 87, 115115 (2013).
Ch. Gramsch, K. Balzer, M. Eckstein, and M. Kollar, Phys. Rev. B 88, 235106 (2013).
F. A. Wolf, I. P. McCulloch and U. Schollwöck, preprint arxiv:1410.3342 (2014).
M. A. Cazalilla and J. B. Marston, Phys. Rev. Lett. 88, 256403 (2002); M. A. Cazalilla
and J. B. Marston, Phys. Rev. Lett. 91, 049702 (2003).
S. R. White and A. E. Feiguin, Phys. Rev. Lett. 93, 076401 (2004).
F. A. Wolf, I. P. McCulloch, O. Parcollet, and U. Schollwöck, Phys. Rev. B 90, 115124
(2014).
Y. Meir and N. S. Wingreen, Phys. Rev. Lett. 68, 2512 (1992); N. S. Wingreen, A.-P.
Jauho, and Y. Meir, Phys. Rev. B 48, 8487 (1993).
S. Datta, Electronic transport in mesoscopic systems (Cambridge University Press,
Cambridge, 1995).
G. Stefannuci and R. van Leuween, Nonequilibrium many-body theory of quantum
systems: A modern introduction (Cambridge University Press, Cambridge, 1995).
F. Mahouzi and B. K. Nikolić, Phys. Rev. B 90, 045115 (2014).
B. Gaury, J. Weston, M. Santin, M. Houzet, Ch. Groth, and X. Waintal, Phys. Rep.
534, 1 (2014).
L. D. Landau and E. M. Lifshitz, Quantum Mechanics, Third ed. (Burlington, MA,
Elsevier Butterworth-Heinemann, 1977).
K. Göttfried, Quantum Mechanics, Vol. 1. Fundamentals (New York, Benjamin, 1966).
A. R. Hurson and K. M. Kavi, Dataflow Computers: Their history and future, in Wiley
Encyclopedia of Computer Science and Engineering (New York, John Wiley and Sons,
2007).
P. Henderson and J. H. Morris, Conference Record of the Third ACM symposium on
principles of programming languages (1976); P. Hudak, ACM Computing Surveys 21,
383 (1989).
M. Carlsson, Proceedings of the seventh ACM SIGPLAN international conference on
functional programming (2002).
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
December 10, 2014
1:18
WSPC/INSTRUCTION FILE
extreme˙data˙v6
The nonequilibrium quantum many-body problem as a . . .
33
89. A. M. Shvaika and J. K. Freericks, Condens. Matter Phys. 11, 425 (2008).
90. N. Wiener and E. Hopf, Sitzber. Preuss. Akad. Wiss. Berlin, Kl. Math. Phys. Tech.,
696 (1931).
91. M. G. Krein, Uspekhi. Mat. Nauk. 13, 3 (1958) [Am. Math. Soc. Transl. 22, 163
(1962)].
92. B. M. MCoy and T. T. Wu, The two-dimensional Ising model, (Cambridge, MA,
Harvard University Press, 1973).
93. M. E. Fisher and R. E. Hartwig, Adv. Chem. Phys. 15 333 (1968).
94. H. Fotso, K. Mikelsons, and J. K. Freericks, Scientific Rep. 4, 4699 (2014).
95. H. Mera, T. G. Pedersen, and B. K. Nikolić, preprint, arXiv:1405.7956 (2014).
96. E. Delabaere, H. Dillinger, and F. Pham, Ann. Inst. Fourier 43, Fascicule 1, 163
(1993).
97. M. Mariño, Fortschr. Phys. 62, 455 (2014).
98. G. Cohen, E. Y. Wilner, and E. Rabani, New J. Phys. 15, 073018 (2013).
99. G. Cohen, E. Gull, D. R. Reichman, A. J. Millis, and E. Rabani, Phys. Rev. B 87,
195108 (2013).
100. P. Wang, G. Cohen, and S. Xu, preprint, arxiv:1410.1480 (2014).
101. Y. Lu, M. Höppner, O. Gunnarsson, and M. W. Haverkort, Phys. Rev. B 90, 085102
(2014).
102. W. Magnus, Commun. Pure Appl. Math. VII, 649 (1954).
| 5cs.CE
|
1
Active Anomaly Detection in Heterogeneous
Processes
arXiv:1704.00766v2 [cs.IT] 27 Jun 2017
Boshuang Huang, Kobi Cohen, Qing Zhao
Abstract— An active inference problem of detecting an anomalous process among M heterogeneous processes is considered. At
each time, a subset of processes can be probed. The objective is to
design a sequential probing strategy that dynamically determines
which processes to observe at each time and when to terminate
the search so that the expected detection time is minimized
under a constraint on the probability of misclassifying any
process. This problem falls into the general setting of sequential
design of experiments pioneered by Chernoff in 1959, in which
a randomized strategy, referred to as the Chernoff test, was
proposed and shown to be asymptotically optimal as the error
probability approaches zero. For the problem considered in this
paper, a low-complexity deterministic test is shown to enjoy the
same asymptotic optimality while offering significantly better
performance in the finite regime and faster convergence to the
optimal rate function, especially when the number of processes
is large. Furthermore, the proposed test offers considerable
reduction in implementation complexity. Extensions to detecting
multiple anomalous processes are also discussed.
Index Terms— Active hypothesis testing, sequential design
of experiments, anomaly detection, dynamic search.
I. I NTRODUCTION
We consider the problem of detecting an anomalous process
(referred to as the target) among M heterogeneous processes
(referred to as the cells). At each time, K (1 ≤ K < M ) cells
can be probed simultaneously to search for the target. Each
search of cell i generates a noisy observation drawn i.i.d. over
time from two different distributions fi and gi , depending on
whether the target is absent or present. The objective is to
designa sequential search strategy that dynamically determines
which cells to probe at each time and when to terminate the
search so that the expected detection time is minimized under
a constraint on the probability of declaring a wrong location
of the target.
The above problem is prototypical of searching for rare
events in a large number of data streams or a large system. The
rare events could be opportunities (e.g., financial trading opportunities or transmission opportunities in dynamic spectrum
access [1]), unusual activities in surveillance feedings, frauds
in financial transactions, attacks and intrusions in communication and computer networks, anomalies in infrastructures such
as bridges, buildings, and the power grid that may indicate
Boshuang Huang and Qing Zhao are with the School of Electrical and
Computer Engineering, Cornell University, Ithaca, NY, 14853, USA. Email:
{bh467, qz16}@cornell.edu
Kobi Cohen is with the Department of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105, Israel. Email:
[email protected]
This work was supported by the National Science Foundation under Grant
CCF-1534957.
catastrophes. Depending on the application, a cell may refer
to an autonomous data stream with a continuous data flow or
a system component that only generates data when probed.
A. Main Results
The anomaly detection problem considered in this paper
is a special case of active hypothesis testing originated from
Chernoff’s seminal work on sequential design of experiments
in 1959 [2]. Compared with the classic passive sequential
hypothesis testing pioneered by Wald [3], where the observation model under each hypothesis is predetermined, active
hypothesis testing has a control aspect that allows the decision maker to choose the experiment to be conducted at
each time. Different experiments generate observations from
different distributions under each hypothesis. Intuitively, as
more observations are gathered, the decision maker becomes
more certain about the true hypothesis, which in turn leads to
better choices of experiments.
In [2], Chernoff proposed a randomized strategy, referred
to as the Chernoff test, and established its asmyptotic (as the
error probability diminishes) optimality1 . This randomized test
chooses, at each time, a probability distribution that governs
the selection of the experiment to be carried out at this time.
This distribution is obtained by solving a minimax problem so
that the next observation generated under the random action
can best differentiate the current maximum likelihood estimate
of the true hypothesis (using all past observations) from its
closest alternative, where the closeness is measured by the
Kullback-Liebler (KL) divergence. Due to the complexity in
solving this minimax problem at each time, the Chernoff test
can be expensive to compute and cumbersome to implement,
especially when the number of hypotheses or the number of
experiments is large.
It is not difficult to see that the problem at hand is a special
case of the general active hypothesis testing problem. Specically, the available experiments are in the form of different
subsets of K cells to probe, and the number of experiments
is M
K . Under each hypothesis that cell m (m = 1, ..., M )
is the target, the distribution of the next observation (a vector
of dimension K) depends on which K cells are chosen. The
Chernoff test thus directly apply. Unfortunately, with the large
number of hypotheses and the large number of experiments,
it can be computationally prohibitive to obtain the Chernoff
test.
1 The asymptotic optimality of the Chernoff test was shown under the
assumption that the hypotheses are distinguishable under every experiment.
2
In this paper, we show that the anomaly detection problem
considered here exhibits sufficient structures to admit a lowcomplexity deterministic policy with strong performance. In
particular, we develop a deterministic test that explicitly specifies which K cells to search at each given time and show
that this test enjoys the same asymptotic optimality as the
Chernoff test2 . Furthermore, extensive simulation examples
have demonstrated a significant performance gain over the
Chernoff test in the finite regime and faster convergence to the
optimal rate function, especially when M is large. In contrast
to the Chernoff test, the proposed test requires little offline
or online computation. The test can also be extended to cases
with multiple targets as discussed in Section V. Its asymptotic
optimality is preserved for K = 1.
We point out that proving the asymptotic optimality of the
deterministic policy is much more involved comparing with
the Chernoff test, due to the time dependency in the test
statistics, namely, the log-likelihood ratios (LLRs), introduced
by deterministic actions. In particular, since the distribution of
the random action chosen by the Chernoff test depends only on
the current maximimum likelihood estimate of the underlying
hypothesis which becomes time-invariant after an initial phase
with a bounded duration, the stochastic behaviors of the
LLRs are independent over time, resulting in a much easier
analysis of the detection delay. The deterministic actions of the
proposed test, however, lead to complex time dependencies in
LLRs that make the analysis much more involved.
B. Related Work
Chernoff’s pioneering work on sequential design of experiments focuses on sequential binary composite hypothesis
testing [2]. Variations and extensions of the problem were
studied in [4]–[9], where the problem was referred to as
controlled sensing for hypothesis testing in [5]–[7] and active
hypothesis testing in [8], [9]. As variants of the Chernoff test,
the tests developed in [4]–[9] are all randomized tests.
There is an extensive literature on dynamic search and target
whereabout problems under various scenarios, most of them
focusing on homogeneous processes. We discuss here existing
studies within the sequential inference setting, which is the
most relevant to this work. In [10], the problem of searching
among Gaussian signals with rare mean and variance values
was studied and an adaptive group sampling strategy was
developed. In [11], searching over homogeneous Poisson point
processes with unknown rates was investigated and an asymptotically optimal randomized test was developed. In [12], the
problem of tracking a target that moves as a Markov Chain in a
finite discrete environment is studied and a search strategy that
provides the most confident estimate is developed. In [13], an
important case of multichannel sequential change detection is
studied and an asymptotic framework in which the number
of sensors tends to infinity was proposed. Asymptotically
optimal search policies over homogeneous processes were
established in [14] under a non-parametric setting with finite
discrete distributions and in [15] under a parametric composite
2 The asymptotic optimality of the proposed test holds for all but at most
three singular values of K (see Lemma 1 and Theorem 1).
hypothesis setting with continuous distributions. In [16], [17],
the problem of quickly detecting anomalous components under
the objective of minimizing system-wide cost incurred by
all anomalous components was studied. The objective of
minimizing operational cost as opposed to detection delay led
to a different problem from the one considered in this paper.
Other related work on quickest search over multiple processes
under various models and formulations includes [18]–[21]
and references therein. Sequential spectrum sensing within
both the passive and active hypothesis testing frameworks has
also received extensive attention in the application domain
of cognitive radio networks (see, for example, [22]–[25] and
references therein). The readers are also referred to [26] for
a comprehensive survey on the problem of detecting outlying
sequences.
A prior study by Cohen and Zhao considered the problem
for homogeneous processes (i.e., fi ≡ f and gi ≡ g) [27]. This
work builds upon this prior work and addresses the problem
in heterogeneous systems where the absence distribution fi
and the presence distribution gi are different across processes.
Allowing heterogeneity significantly complicates the design
of the test and the establishment of asymptotic optimality.
Specifically, since each process has different observation distributions, the rate at which the state of a cell can be inferred is different across processes. Hence, the decision maker
must balance the search time effectively among the observed
processes, which makes both the algorithm design and the
performance analysis much more involved under the heterogeneous case. In terms of algorithm design, when dealing with
homogeneous processes, the search strategy is often static in
nature [11], [14], [18], [27]. In contrast, the asymptotically
optimal search strategy developed here for heterogeneous processes dynamically changes based on the current belief about
the location of the target. In terms of performance analysis,
handling heterogeneity adds new challenges and difficulties
for establishing asymptotic optimality. When searching over
homogeneous processes, the resulting rate function (which
is inversely proportional to the search time) always obeys a
certain averaging over the KL divergences between normal and
abnormal distributions of all process. This observation follows
from the fact that the decision maker completes gathering
the required information from all the processes at approximately the same time due to the homogeneity. In contrast,
when searching over heterogeneous processes, the overall rate
function does not always obey a simple averaging across the
KL divergences of all processes. In Section IV, we show that
the search time can be analyzed by considering two separate
scenarios, referred to as the balanced and the unbalanced
cases. The balanced case holds when the a judicious allocation
of probing resources can ensure the information gathering
from all the processes be completed at approximately the
same time, in which case the rate function is a weighted
average among the heterogeneous processes. The unbalanced
case occurs when there is a process with a sufficiently small
KL divergence that it dominates the overall rate function of
the search. We establish asymptotic optimality by analyzing
the sum LLR dynamics of the heterogeneous processes under
these two cases which adds significant technical difficulties as
3
compared to the homogeneous case as detailed in Section IV.
Besides the active inference approach to anomaly detection
considered in this paper, there is a growing body of literature
on various approaches to the general problem of anomaly
detection. We refer the readers to [28], [29] for comprehensive
surveys on this topic.
II. P ROBLEM F ORMULATION
We consider the problem of detecting a single target located
in one of M cells. If the target is in cell m, we say that
hypothesis Hm is true. The aPpriori probability that Hm is
M
true is denoted by πm , where m=1 πm = 1. To avoid trivial
solutions, it is assumed that 0 < πm < 1 for all m.
When cell m is observed at time n, an observation ym (n)
is drawn, independent of previous observations. If cell m
contains a target, ym (n) follows distribution gm (y). Otherwise, ym (n) follows distribution fm (y). Let Pm be the
probability measure under hypothesis Hm and Em the operator
of expectation with respect to the measure Pm .
An active search strategy Γ consists of a stopping rule τ
governing when to terminate the search, a decision rule δ for
determining the location of the target at the time of stopping,
and a sequence of selection rules {φ(n)}n≥1 governing which
K cells to probed at each time n. Let y(n) be the set of all
cell selections and observations up to time n. A deterministic
selection rule φ(n) at time n is a mapping from y(n − 1)
K
to {1, 2, ..., M } . A randomized selection rule φ(n) is a
mapping from y(n − 1) to probability mass functions over
K
{1, 2, ..., M } .
PThe error probability under policy Γ is defined as Pe (Γ) =
m πm αm (Γ), where αm (Γ) = Pm (δ 6= m|Γ) is the
probabilityPof declaring δ 6= m when Hm is true. Let
M
E(τ |Γ) = m=1 πm Em (τ |Γ) be the average detection delay
under Γ.
We adopt a Bayesian approach as in Chernoff’s original
study [2] by assigning a cost of c for each observation and
a loss of 1 for a wrong declaration. Note that c represents
the ratio of the sampling cost to the cost of wrong detections.
The Bayes risk under strategy Γ when hypothesis Hm is true
is given by:
Rm (Γ) , αm (Γ) + cEm (τ |Γ).
(1)
The average Bayes risk is given by:
R(Γ) =
M
X
πm Rm (Γ) = Pe (Γ) + cE(τ |Γ).
(2)
m=1
The objective is to find a strategy Γ that minimizes the
Bayes risk R(Γ):
inf R(Γ).
(3)
Fig. 1: Typical sample paths of sum LLRs.
III. T HE D ETERMINISTIC DGF I P OLICY
In this section we propose a deterministic policy, referred
to as the DGFi policy.
A. DGFi policy for K = 1
We first consider the case where only a single process can
be observed at a time, i.e., K = 1.
Let 1m (n) be the indicator function, where 1m (n) = 1 if
cell m is observed at time n, and 1m (n) = 0 otherwise. Let
`m (n) , log
and
Sm (n) ,
gm (ym (n))
,
fm (ym (n))
n
X
`m (t)1m (t)
(6)
(7)
t=1
be the log-likelihood ratio (LLR) and the observed sum LLRs
of cell m at time n, respectively. Let D(g||f ) denote the KL
divergence between two distributions g and f given by
Z ∞
g(x)
D(g||f ) ,
log
g(x) dx.
(8)
f
(x)
−∞
Illustrated in Fig. 1 are typical sample paths of the sum LLRs
of M = 4 cells, where, without loss of generality, we assume
that cell 1 is the target. Note that the sum LLR of cell 1 is a
random walk with a positive expected increment D(g1 ||f1 ),
whereas the sum LLR of cell i is a random walk with a
negative expected increment −D(fi ||gi ) for i = 2, 3, 4. Thus,
when the gap between the largest sum LLR and the second
largest sum LLR is sufficiently large, we can declare with
sufficient accuracy that the cell with the largest sum LLR is
the target. This is the intuition behind the stopping rule and
the decision rule. Specifically, we define m(i) (n) as the index
of the cell with the ith largest observed sum LLRs at time n.
Let
∆S(n) , Sm(1) (n) (n) − Sm(2) (n) (n)
(9)
Γ
∗
A strategy Γ is asymptotically optimal if
lim
c→0
R(Γ∗ )
= 1,
inf Γ R(Γ)
(4)
which is denoted as
R(Γ∗ ) ∼ inf R(Γ).
Γ
denote the difference between the largest and the second
largest observed sum LLRs at time n. The stopping rule and
the decision rule under the DGFi policy are given by:
τ = inf {n : ∆S(n) ≥ − log c} ,
(10)
δ = m(1) (τ ) .
(11)
and
(5)
4
We now specify the selection rule of the DGFi policy. The
intuition behind the selection rule is to select a cell from
which the observation can increase ∆S(n) at the fastest rate.
The selection rule is thus given by comparing the rate at
which Sm(1) (n) increases with the rate at which Sm(2) (n) (n)
decreases. If Sm(1) (n) is expected to increase faster than
Sm(2) (n) (n) decreases, cell m(1) (n) is chosen. Otherwise, cell
m(2) (n) is chosen. This leads to the following selection rule:
(1)
m (n) if D(gm(1) (n) ||fm(1) (n) ) ≥ Fm(1) (n)
,
φ(n) =
m(2) (n) otherwise
(12)
where
1
.
Fm , P
(13)
1
j6=m D(fj ||gj )
The selection rule in (12) can be intuitively understood by
noticing that D(gm(1) (n) ||fm(1) (n) ) is the asymptotic increasing rate of Sm(1) (n) when cell m(1) is probed at each time.
This is due to the fact that m(1) (n) is the true target after an
initial phase (defined by the last passage time that m(1) (n)
is an empty cell) which can be shown to have a bounded
expected duration. Similarly, even though much more involved
to prove, Fm(1) (n) is the asymptotic rate at which Sm(2) (n) (n)
decreases when cell m(2) (n) is probed at each time. To see
the expression of Fm for any m as given in (13), consider
the following analogy. Consider M − 1 cars being driven
by a single driver from 0 to −∞. Car j (j = 1, . . . , M ,
j 6= m) has a constant speed of D(fj ||gj ). At each time,
the car closest to the origin is chosen by the driver and driven
by one unit of time. We are interested in the average moving
speed of the position of the closest car to the origin. It is not
difficult to see that it is given by Fm in (13). This analogy,
concerned with deterministic processes, only serves as an
intuitive explanation for the expression of Fm . As detailed
in Sec. IV, proving Fm(1) (n) to be the asymptotic decreasing
rate of Sm(1) (n) (n) requires analyzing the trajectories of the
M sum LLRs {Sm (n)}M
m=1 , which are stochastic processes
with complex dependencies both in time and across processes.
B. DGFi under multiple simultaneous observations
Next we extend the DGFi policy to the case where multiple
simultaneous observations are allowed, i.e., K > 1.
The stopping rule and the decision rule remains the same
as given in (10), (11), whereas the selection rule requires
significant modification. The main reason is that when K cells
can be observed simultaneously, the asymptotic increasing
rate of Sm(1) (n) (n) and the asymptotic decreasing rate of
Sm(2) (n) (n) are much more involved to analyze.
The selection rule is as follows. At each time n, the selection
rule φ(n), as given in (14), chooses either the K cells with
(
φ(n) =
m(1) (n), m(2) (n), ..., m(K) (n)
m(2) (n), m(3) (n), ..., m(K+1) (n)
the top K largest sum LLRs or those with the second to the
(K + 1)th largest sums LLRs, where
Fm (K) , min{ P
K
1
j6=m D(fj ||gj )
, min D(fj ||gj )}.
j6=m
(15)
Similar to the case with K = 1, the intuition behind the
selection rule is to select K cells from which the observations
increase ∆S(n) at the fastest rate. Specifically, Fm(1) (n) (K) is
the asymptotic decreasing rate of Sm(2) (n) (n) when K cells
with the second largest to the (K + 1)th largest sum LLRs
are probed each time. The expression of Fm (K) for any m
as given in (15) can be explained with the same car analogy,
except now there are K > 1 drivers. It is not difficult to see
that Fm (K) is upper bounded by the speed minj6=m D(fj ||gj )
of the slowest car among the M − 1 cars. In particular, when
the speed of the slowest car is sufficiently small, this car
always lags behind even with a dedicated driver. We refer
to this case as the unbalanced case, which presents the most
challenge in proving the asymptotic optimality of DGFi (see
Theorem 1 and Appendix B). With this intuitive understanding
of Fm (K), we can see that the asymptotic increasing rate
of ∆S(n) is D(gm(1) (n) ||fm(1) (n) ) + Fm(1) (n) (K − 1) when
the cells with the top K largest sum LLRs are probed each
time, where D(gm(1) (n) ||fm(1) (n) ) is the asymptotic increasing
rate of Sm(1) (n) (n) and Fm(1) (n) (K − 1) is the asymptotic
decreasing rate of Sm(2) (n) (n).
It is easy to see that when K = 1, the policy reduces to the
one described in section III-A.
IV. P ERFORMANCE A NALYSIS
In this section, we establish the asymptotic optimality of the
DGFi policy. While the intuitive exposition of DGFi given in
Sec. III may make its asymptotic optimality seem expected,
constructing a proof is much more involved. In particular,
bounding the detection time of DGFi requires analyzing the
trajectories of the M stochastic processes {Sm (n)}M
m=1 which
exhibit complex dependencies both over time and across
processes as induced by the deterministic selection rule.
We first state the following assumption.
Assumption 1: Under hypothesis Hm , assume that
u∗m , arg max uD(gm ||fm ) + Fm (K − u)
u∈[0,1]
(16)
takes value of either 0 or 1, where we allow the domain of
Fm (·) defined in (15) to be all real numbers.
In the following lemma, we give an explicit characterization
on when Assumption 1 is violated and at what values of K.
Lemma 1: For any given {D(gi ||fi ), D(fi ||gi )}M
i=1 , we
have the following statements.
if D(gm(1) (n) ||fm(1) (n) ) + Fm(1) (n) (K − 1) ≥ Fm(1) (n) (K)
otherwise
(14)
5
1) For each m = 1, . . . , M , Assumption 1 holds if at least
one of the following two statements is true:
P
minj6=m D(fj ||gj )
(a)
is an integer,
j6=m
D(fj ||gj )
1
P
(b) D(gm ||fm ) ≥
.
1
j6=m D(fj ||gj )
If neither is true, then Assumption 1 does not hold for a
single value of K, denoted as K̃m , as given below.
X minj6=m D(fj ||gj )
(17)
K̃m =
D(fj ||gj )
j6=m
2) All {K̃m }M
m=1 take at most three distinct values.
Proof: See Appendix A.
From Lemma 1, we conclude that for every given M
and {D(gi ||fi ), D(fi ||gi )}M
i=1 , Assumption 1 always holds for
K = 1. For the general case and with an arbitrarily large
M , Assumption 1 holds for all but at most three values of
K ∈ {1, 2, . . . , M }.
Next, we establish the asymptotic optimality of DGFi under
Assumption 1. Define
Im , max{D(gm ||fm ) + Fm (K − 1), Fm (K)},
(18)
which is the increasing rate of ∆S(n) under hypothesis
Hm . For a given a priori distribution {πm }M
m=1 of the true
hypothesis, define
I ∗ , PM
1
πm
m=1 Im
.
(19)
As shown in Theorem 1 below, I ∗ is the optimal rate function
of the Bayes risk.
Theorem 1: Let R∗ and R(Γ) be the Bayes risks under the
DGFi policy and an arbitrary policy Γ, respectively. Assume
that Assumption 1 holds for all m = 1, . . . , M . Then,
R∗ ∼
−c log c
∼ inf R(Γ)
Γ
I∗
small such that the increasing rate of ∆S(n) is given by a
certain averaging among the heterogeneous
P processes.
The unbalanced case is when K/ j6=m D(fj1||gj ) >
minj6=m D(fj ||gj ). In this case, there is a process with a
sufficiently small information acquisition rate D(fj ||gj ) such
that it becomes the bottleneck of the detection process and
determines the asymptotic increasing rate of ∆S(n). Directly
bounding the dynamic range of all sum LLR trajectories
is no longer tractable. Instead, the proof is built upon the
analysis of the trajectory of the sum LLR with the smallest
expected increment. In particular, we recognize that the key
in handling the imbalance in the information acquisition rates
among empty cells is to define a last passage time as the last
time at which the empty cell with the smallest D(fj ||gj ) is
not probed and then analyze, separately, the detection process
before and after this last passage time.
c
is an asymptotic lower bound
Next, we show that −cIlog
∗
on the Bayes risk. This is done by first proving that if the
Bayes risk is sufficiently small under strategy Γ, i.e., R(Γ) =
O(−c log c), the difference between the largest sum LLRs and
the second largest sum LLRs must be sufficiently large when
the test terminates, i.e. ∆S(τ ) = Ω(− log c). Otherwise, it
is not possible to achieve a risk O(−c log c) due to a large
error probability. We then show that in order to make ∆S(n)
sufficiently large, the sample size must be large enough, i.e.,
c
E[τ |Γ] ≥ − Ilog
. Since each sample costs c, the total risk will
∗
c
be lower bounded by −cIlog
as desired.
∗
(20)
Proof: Here we provide a sketch of the proof. The detailed
proof can be found in Appendix B.
We first show that the proposed DGFi policy achieves a
Bayes risk −c log c/I ∗ asymptotically. First, we show that
when ∆S(τ ) is large, the probability of error is small, i.e.
Pe = O(c). As a result, by the definition of the Bayes risk,
it suffices to show that the detection time is upper bounded
by − log c/I ∗ . By the definition of I ∗ in (19), it suffices to
show that the detection time is upper bounded by − log c/Im
under hypothesis Hm . Since the decision maker might not
complete to gather the required information from all the cells
at the same time, we carry out the analysis by considering the
balanced
P and the unbalanced cases separately. In particular,
if K/ j6=m D(fj1||gj ) < minj6=m D(fj ||gj ), we refer to this
case as the balanced case. Otherwise, we refer to this case as
the unbalanced case.
P
The balanced case is when K/ j6=m D(fj1||gj ) ≤
minj6=m D(fj ||gj ). The key to bounding the detection time in
this case is to show that the dynamic range of the M − 1 sum
LLRs corresponding to the M − 1 empty cells are sufficiently
V. E XTENSION TO D ETECTING M ULTIPLE TARGETS
In this section we extend the DGFi policy to the case with
L > 1 targets. The number of hypotheses in this case is M
L .
We consider first K = 1. The DGFi policy can be extended
to detect multiple targets as follows. The stopping rule and
decision rule are given below, similar in principle to those for
L = 1 as described in Section III:
τ = inf {n : ∆SL (n) ≥ − log c} ,
(21)
δ = {m(1) (τ ), m(2) (τ ), ..., m(L) (τ )},
(22)
∆SL (n) , Sm(L) (n) (n) − Sm(L+1) (n) (n)
(23)
where
denotes the difference between the Lth and the (L + 1)th
largest observed sum LLRs at time n.
For the selection rule, define, for a given set D ⊂
{1, 2, . . . , M } with |D| = L,
FD , P
1
1
j ∈D
/ D(fj ||gj )
.
(24)
Similar to Fm defined in (13), FD can be viewed as the
asymptotic increasing rate of ∆SL (n) when the L targets are
given by set D and we probe the cell with the (L+1)th largest
sum LLR. We also define
1
GD , P
,
(25)
1
j∈D D(gj ||fj )
6
which can be viewed as the asymptotic increasing rate for
∆SL (n) when we probe the cell with the Lth largest sum
LLR.
The selection rule follows the same design principle of
maximizing the asymptotic increasing rate of ∆SL (n), and
is given by
(L)
m (n)
if GD(n) ≥ FD(n)
φ(n) =
,
(26)
m(L+1) (n) otherwise
where
D(n) = {m(1) (n), m(2) (n), ..., m(L) (n)}.
The asymptotic optimality of DGFi for L > 1 and K > 1
remains open. We have, however, strong belief of the following
conjecture.
Conjecture 1: The DGFi policy preserves its asymptotic
optimality if
u∗D , arg max FD (K − u) + GD (u)
where
u∈[0,K]
D(n) = {m(1) (n), m(2) (n), ..., m(L) (n)}.
(27)
It is not difficult to see that when L = 1, the policy reduces
to the one described in Section III.
Next, we establish the asymptotic optimality of the DGFi
policy for L > 1 and K = 1. Let D denote a subset of L cells
and πD the prior probability of hypothesis HD (i.e, the target
cells are given by D). Define
ID , max{FD , GD },
1
IL∗ , P πD ,
(28)
D ID
where IL∗ is again the optimal rate function of the Bayes risk
as shown in the theorem below, and reduces to the one defined
in (19) when L = 1.
∗
Theorem 2: Let RL
and RL (Γ) be the Bayes risks under
the DGFi policy and an arbitrary policy Γ, respectively. Then,
for K = 1,
−c log c
∼ inf R(Γ) .
Γ
IL∗
R∗ ∼
(29)
Proof: See Appendix C.
When K > 1, the stopping rule and the decision rule remain
the same. For the selection rule, define
K
FD (K) , min{ P
1
j ∈D
/ D(fj ||gj )
, min D(fj ||gj )}.
j ∈D
/
K
1
j∈D D(gj ||fj )
, min D(gj ||fj )},
j∈D
(31)
which can be viewed as the asymptotic increasing rate of
∆SL (n) when we probe the cells with the (L − K + 1)th
to the Lth largest sum LLR.
Let
∗
, arg max FD (K − k) + GD (k),
kD
0≤k≤K
(32)
which can be interpreted as the optimal number of target
cells that should be probed at each time for maximizing the
asymptotic increasing rate of ∆SL (n). The selection rule of
DGFi is thus given by
∗
∗
(35)
is an integer for all D, where we allow the domain of FD (·)
and GD (·) to be real numbers.
VI. C OMPARISON WITH THE C HERNOFF T EST
In this section, we compare the performance of the proposed
DGFi policy and the Chernoff test in terms of both computational complexity and sample complexity.
A. The Chernoff Test
The Chernoff test has a randomized selection rule. Specifically, let q = (q1 , ..., qκ ) be a probability mass function over
κ
a set of κ available experiments {ui }i=1 that the decision
maker can choose from, where qi is the probability of choosing
experiment ui . Note that in our case, κ = M
K . For a
general M -ary active hypothesis testing problem, the action
at time n under the Chernoff test is drawn from a distribution
q ∗ (n) = (q1∗ (n), ..., qκ∗ (n)) that depends on the past actions
and observations:
X
i
q ∗ (n) = arg max
min
qi D(puî(n)
||puj i ) , (36)
q
j∈M\{î(n)} u
i
where M is the set of the M hypotheses, î(n) is the ML
estimate of the true hypothesis at time n based on past actions
and observations, and puj i is the observation distribution under
hypothesis j when action ui is taken. The stopping rule and
the decision rule are the same as in (10), (11).
(30)
Similar to Fm (K) defined in (15), FD (K) can be viewed as
the asymptotic increasing rate of ∆SL (n) when the L targets
are given by set D and we probe those K cells with the (L +
1)th to the (L + K)th largest sum LLR. Similarly,
GD (K) , min{ P
(34)
φ(n) = {m(L−kD(n) +1) (n), · · · , m(L−kD(n) +K) (n)}, (33)
B. Comparison in computational complexity
Here we compare the computational complexity of the
proposed DGFi policy with the Chernoff test. We show that
the Chernoff test can be expensive to compute especially when
the number of processes or the number of experiments is large.
In contrast to the Chernoff test, the DGFi policy requires little
computaion.
For the case of detecting a single target (L = 1), computing
the selection rule of Chernoff test defined in (36) requires solving M minimax problems, each corresponding to a particular
value of the ML estimate î(n) ∈ {1, . . . , M }. One efficient
way of solving minimax problems is through linear programming which takes polynomial time with respect to the number
of variables and constraints.
For this problem, however, the
number of variables is M
K , which is not polynomial and can
be exponential in M in the worst case.
The only computation involved in the selection rule of DGFi
is (15), which requires M summations each with M − 1
elements. As a result, the compuational time is O(M 2 ), which
is polynomial in M and independent of K.
7
(m)
= 9 +
Fig. 4: Performance comparison (L = 2, K = 1, λg
(m)
m, λf = 0.0188, c = 10−5 ).
(m)
= 9 +
Fig. 5: Performance comparison (M = 20, L = 2, K =
(m)
(m)
2, λg = 50 + 0.1m, λf = 2).
Fig. 2: Performance comparison (K = 1, λg
(m)
m, λf = 0.0188, c = 10−5 ).
Fig. 3: Performance comparison (K = 2, λg
(m)
m, λf = 0.0188, c = 10−5 ).
C. Comparison in sample complextity
Although both the Chernoff test and the DGFi policy
are asymptotically optimal3 , we show below via simulation
examples the significant performance gain of DGFi over the
Chernoff test in the finite regime (i.e., when the sample cost
c is bounded away from 0).
Consider a uniform prior and exponentially distributed ob(m)
(m)
servations: fm ∼ exp(λf ) and gm ∼ exp(λg ). The KL
divergences can be easily computed as follows.
(m)
(m)
D(gm ||fm ) = log(λ(m)
g ) − log(λf ) +
λf
(m)
−1,
λg
(m)
(m)
D(fm ||gm ) = log(λf ) − log(λ(m)
g )+
λg
(m)
−1.
λf
Shown in Fig. 2 is the performance comparison between
DGFi policy and Chernoff test for L = 1 and K = 1.
The figure clearly demonstrates the significant reduction in
detection delay offered by the DGFi policy as compared with
the Chernoff test. The performance gain increases drastically
as M increases. A similar comparison is observed in Fig. 3
3 While the assumption of positive KL divergence between every pair of
hypotheses under every probing action as required in Chernoff’s proof of
asymptotic optimality does not hold here, it can be shown that Chernoff test
preserves its asymptotic optimality for the problem at hand.
(m)
= 9+
with K = 2. The performance comparison for a case with
multiple targets is shown in Fig. 4 with L = 2, K = 1.
In Fig. 5, we consider a case of L = 2 and K = 2 and
examine the performance of DGFi as c approaches 0. Also
c
plotted in Fig. 5 is the asymptotic lower bound − Ilog
on the
∗
L
detection delay which increases linearly with − log c with rate
1/IL∗ as given in (28). We observe that the increasing rate of
the detection delay offered by DGFi quickly converges to that
of the lower bound, which supports the conjecture that DGFi
preserves its asymptotic optimality for the case with L > 1
and K > 1. Besides showing the same level of reduction
in the finite regime compared with the Chernoff test, Fig. 5
also reveals a significantly faster convergence to the optimal
rate function IL∗ with the detection delay of the Chernoff test
increasing at a faster rate even at c = 10−10 .
Next, we provide an intuition argument for the better finitetime performance of DGFi. Consider a special case where
K = 1 and all fi and gi are identical, i.e., fi ≡ f and
gi ≡ g and we assume D(f ||g) > (M − 1)D(g||f ). In
this case, the DGFi policy chooses, at each time, the cell
with the second largest sum LLR whereas the Chernoff test
randomly and uniformly chooses a cell from all but the one
with the largest sum LLR at each time. Consider a short
horizon scenario where the sampling cost c is sufficiently high
such that D(f ||g) > − log c. This means each empty cell only
need one observation (with high probability) to distinguish
8
from the true cell. We can formulate this as coupon collectors
problem, where each empty cell is a coupon and the goal is
to collect all M − 1 coupons.
Since Chernoff test employs a randomized strategy that
chooses empty cells with equal probability, based on results
in coupon collectors problem, the expected probing time will
be roughly M log M . However, the proposed DGFi policy is
deterministic and guaranteed to collect a new coupon at each
time, therefore the expected probing time will only be M .
VII. C ONCLUSION
The problem of detecting anomalies among a large number
of heterogeneous processes was considered. A low-complexity
deterministic test was developed and shown to be asymptotically optimal. Its finite-time performance and computational
complexity were shown to be superior to the classic Chernoff
test for active hypothesis testing, especially when the problem
size is large.
A PPENDIX A: PROOF OF L EMMA 1
Define
hm (u) = uD(gm ||fm ) + Fm (K̃m − u).
(37)
If u∗m takes value other than 0 or 1, i.e., u∗m ∈ (0, 1), then
h0m (u) > 0 for u ∈ (0, u∗m ) and h0m (u) < 0 for u ∈ (u∗m , 1).
By taking the derivative of hm (u), we have
0
h0m (u) = D(gm ||fm ) − Fm
(K̃m − u),
(38)
where
0
Fm
(u)
=
P
1
1
j6=m D(fj ||gj )
, if u <
P
minj6=m D(fj ||gj )
D(fj ||gj )
if u >
P
minj6=m D(fj ||gj )
.
D(fj ||gj )
0,
j6=m
j6=m
(39)
0
(u) is piecewise constant with a breakpoint
Since Fm
P
minj6=m D(fj ||gj )
, h0m (u) is piecewise constant with a
j6=m
D(fj ||gj )
P
minj6=m D(fj ||gj )
breakpoint K̃m − j6=m
. Therefore,
D(fj ||gj )
K̃m = u∗m +
X minj6=m D(fj ||gj )
.
D(fj ||gj )
(40)
j6=m
Since
h0m (u)
.
(41)
Note that u∗m ∈ (0, 1) and K̃m is an integer. Such K̃m exists
only if neither (a) or (b) holds and we have
X minj6=m D(fj ||gj )
.
K̃m =
(42)
D(fj ||gj )
j6=m
Next we show that there are only three possible values of K.
Let j 0 = arg minj D(fj ||gj ). Since there is only one possible
K̃j 0 as proved above. It remains to show that there are only
two possible values of Km when m 6= j 0 . Let
M
X
D(fj 0 ||gj 0 )
j=1
≤ 1, we have
X minj6=m D(fj ||gj )
D(fj 0 ||gj 0 )
=V −
∈ [V − 1, V ]
D(fj ||gj )
D(fm ||gm )
j6=m
for all m 6= j 0 . Combining (42) implies that K̃m , m 6= j 0 can
only take 2 possible integers as desired.
A PPENDIX B: PROOF OF T HEOREM 1
The structure of the proof is as follows. In subsection A,
we show that −c log c/I ∗ is an asymptotic upper bound on
the Bayes risk that DGFi achieves. Specifically, the asymptotic
optimality property of DGFi is based on Lemma 8, showing
that the asymptotic expected search time is upper bounded
by − log c/I ∗ , while the error probability is O(c) following
Lemma 2. In subsection B, we provide the sum LLR analysis
of the heterogeneous empty cells. The analysis is based on
studying two cases, referred to as balanced and unbalanced
cases. For the balanced case, the decision maker can balance
the remaining information required to be gathered among the
processes. For the unbalanced case, there is a process with a
very small KL divergence so that it dominates the increasing
rate. Finally, in subsection C we show that the asymptotic
Bayes risk that can be achieved by any policy is lower bounded
by −c log c/I ∗ , in which together with Appendix A completes
the proof.
Throughout the this section, we use the following notations.
Let
n
X
Nj (n) ,
1j (t)
(43)
t=1
be the number of times that cell j has been observed up to
time n. Let
∆Sm,j (n) , Sm (n) − Sj (n)
(44)
be the difference between the observed sum of LLRs of cells
m and j. We also define
∆Sm (n) , min ∆Sm,j (n) .
j6=m
(45)
∆S(n) = Sm(1) (n) (n) − Sm(2) (n) (n) = max ∆Sm (n) . (46)
1
1
j6=m D(fj ||gj )
V ,
D(fj 0 ||gj 0 )
D(fm ||gm )
As a result, we have:
< 0 for u ∈ (u∗m , 1),
D(gm ||fm ) < P
Since 0 ≤
D(fj ||gj )
.
m
Without loss of generality we prove the theorem when
hypothesis m is true. We define
`k (i) − D(gk ||fk ) , if k = m,
`˜k (i) =
(47)
`k (i) + D(fk ||gk ) , if k 6= m,
which is a zero-mean r.v under hypothesis Hm .
A. The Asymptotic Upper Bound on the Bayes Risk under
DGFi
In this subsection we show that the Bayes risk obtained by
DGFi policy is upper bounded by −c log c/I ∗ as c approaches
zero..
9
Lemma 2: If DGFi policy is used, then the error probability
is upper bounded by:
Pe ≤ (M − 1)c .
(48)
Proof:
P Let αm,j = Pm (δ = j) for all j 6= m. Thus,
αm =
j6=m αm,j . By the definition of the stopping rule
under DGFi (see (10)), accepting Hj is done when ∆Sj (n) ≥
− log c which implies ∆Sj,m ≥ − log c. Hence, for all j 6= m
we have:
αm,j = Pm (δ = j)
≤ Pm (∆Sj,m (τ ) ≥ − log c)
(49)
≤ cPj (∆Sj,m (τ ) ≥ − log c) ≤ c ,
where changing the measure in the second inequality follows
by the fact that ∆Sj,m (τ ) ≥ − log c. As a result,
X
αm =
αm,j ≤ (M − 1)c .
j6=m
Lemma 3: There exist constants C > 0 and γ > 0 such
that for any fixed 0 < q < 1, under any arbitrary policy, the
following statements hold:
Pm (Sj (n) ≥ Sm (n), Nj (n) ≥ qn) ≤ Ce−γn ,
(50)
Pm (Sj (n) ≥ Sm (n), Nm (n) ≥ qn) ≤ Ce−γn ,
(51)
and
for m = 1, 2, ..., M and j 6= m.
Pm (Sj (n) ≥ Sm (n), Nj (n) ≥ qn)
n
X
Pm
≤
n
X
r
X
`j (i) +
i=1
r=dqne k=0
n h
X
k
X
ir h
r=dqne
n
X
k=0
≤
∞
X X
Pm (Sj (t) ≥ Sm (t)) .
j6=m t=n
(55)
Following (55), it suffices to show that there exist C > 0 and
γ > 0 such that Pm (Sj (n) ≥ Sm (n)) ≤ Ce−γn .
(52)
Em es(−`m (1))
e−γ1 k ≤ Ce−γn .
maxj6=m D(fj ||gj )
,
minj6=m D(fj ||gj )
= arg min D(fj ||gj ),
km =
−`m (i) ≥ 0
ik
jm
ρm =
for all s > 0.
Since a moment generating function (MGF) is equal to one
at s = 0 and Em (`j (1)) = −D(fj ||gj ) < 0, Em (−`m (1)) =
−D(gm ||fm ) < 0 are strictly negative, differentiating the
MGFs of `j (1), `m (1) with respect to s yields strictly negative
derivatives at s = 0. As
a result, there exist
s > 0 and γ1 > 0
such that Em es`j (1) , Em es(−`m (1)) are strictly less than
e−γ1 < 1. Hence, there exist C > 0 and γ = γ1 · q > 0 such
that
Pm (Sj (n) − Sm (n) ≥ 0, Nj (n) ≥ qn)
e−γ1 r
Proof: We focus on proving for M > 2. Proving for
M = 2 is straightforward. Note that the event τ1 > n implies
that there exists a time instant t for t ≥ n in which for some
j 6= m, Sj (t) > Sm (t). Hence,
Pm (τ1 > n) ≤ Pm max sup (Sj (t) − Sm (t)) ≥ 0
We next establish the required exponential decay. Let
r=dqne k=0
n
X
(54)
for m = 1, 2, ..., M .
!
i=1
Em es`j (1)
≤
Lemma 4: If the selection rule of DGFi is implemented
indefinitely, there exist C > 0 and γ > 0 such that
j6=m t≥n
Proof: We start with proving (50). Note that
Nj (n), Nm (n) can take integer values Nj (n)
=
dqne, dqne + 1, ...n, and Nm (n) = 0, ..., n. Applying
the Chernoff bound and using the i.i.d. property of the
observations across time yield:
n
X
Note that τ1 is not a stopping time since it depends on the
future. τ1 is a last passage time. It is the last time in which
Sm (n) crosses Sj (n) for all j 6= m. In Lemma 4 we show that
the probability that τ1 is greater than n decreases exponentially
with n. This result will be used when evaluating the asymptotic
expected search time to show that it is not affected by τ1 .
Remark 1: We often analyze the dynamic of the sum LLRs
according to the selection rule of DGfi in the asymptotic
regime. Thus, when we say that the selection rule of DGFi
policy is implemented indefinitely we mean that we probe the
cells according to the selection rule of DGFi as given in (14)
indefinitely, while the stopping rule is disregarded.
Pm (τ1 > n) ≤ Ce−γn ,
Hence, (48) follows.
≤
For proving (51) we can use the Chernoff bound with minor
modifications.
Definition 1: τ1 is defined as the smallest integer such that
Sm (n) > Sj (n) for all j 6= m for all n ≥ τ1 .
(53)
j6=m
(56)
1
.
8(km + 1)(M − 2)
Note that 0 < ρm ≤ 1/16. Thus, we can write
Pm (Sj (n) ≥ Sm (n))
≤ Pm (Sj (n) ≥ Sm (n), Nj (n) < ρm n, Nm (n) < ρm n)
+Pm (Sj (n) ≥ Sm (n), Nj (n) ≥ ρm n)
+Pm (Sj (n) ≥ Sm (n), Nm (n) ≥ ρm n)
(57)
The second and the third terms on the RHS of (57) decay
exponentially with n by Lemma 3. Thus, it remains to show
that the first term decays exponentially with n as well. Note
that the event (Nj (n) < ρm n, Nm (n) < ρm n) implies that at
least ñ = n − Nj (n) − Nm (n) ≥ n (1 − 2ρm ) times cells j, m
10
er (n) as the number of times in
are not probed. We define N
which cell r 6= j, m has been probed and cells j, m have not
been probed by time n. There exists a cell r 6= j, m such that
er (n) ≥ ñ = n(1−2ρm ) . Hence, we can upper bound (57)
N
M −2
M −2
as follows:
Pm (Sj (n) ≥ Sm (n))
X
n(1 − 2ρm )
, Nj (n) < ρm n,
≤
Pm Ñr (n) >
M −2
r6=j,m
Nm (n) < ρm n + 2De−γ1 n
for all n0 ≤ ρm n. Therefore,
(58)
i=1
ζn+q
X
n0 =0
i=1
q=0
`r (i) +
i=1
=
ζn+q
X
i=1
−`j (i)
i=1
i=1
n
X
≤
i=1
`˜r (i) +
ζn+q
X
`˜r (i) +
n
X
−`˜j (i) ≥ C1 (n + q + n0 )
i=1
0
×e−sC1 (n+q+n )
h
˜
iζn+q
= Em es(`r (1)−C1 )
(65)
for all s > 0.
Since Em (`˜r (1)−C1 ) = −C1 < 0 and Em (−`˜j (1)−C1 ) =
−C1 < 0 are strictly negative, by applying a similar argument
as at the end of the proof
of Lemma
0 and
3, there
exist s >
(s`˜r (1)−C1 )
s(−`˜j (1)−C1 )
, Em e
and
γ2 > 0 such that Em e
e−sC1 are strictly less than e−γ2 < 1. Hence,
0
ζn+q
n
X
X
0
(66)
Pm
`j (i) ≤
`r (i) ≤ e−γ2 (n+q+n ) ,
i=1
0
n−ζn
mn
X ρX
Pm
n0 =0
(61)
in (56) and (59), we have
≤ e−γ2 n
0
n
X
`j (i) ≤
i=1
n−ζn
X
the ease of presentation, throughout the proof we assume that ζn,
ρm n are integers. This assumption does not affect the exponential decay
of the Chernoff bound but only the exact value of C > 0 in (54) (since
αn − 1 ≤ bαnc ≤ dαne ≤ αn + 1 holds for all α ≥ 0 for all n = 0, 1, ...).
ζn+q
X
`r (i)
i=1
e−γ2 q
ρ
mn
X
(67)
0
e−γ2 n ≤ C2 e−γ2 n ,
n0 =0
q=0
−2
4 For
0
i=1
−`˜j (i) − D(fjm ||gjm ) (ζn + q − km n0 ) ,
and by the definitions of ζ, km , ρm
(64)
h
iζn+q h
in0
˜
˜
≤ Em es`r (1)
Em es(−`j (1))
q=0
i=1
> 0.
and
i=1
n0
X
4(M − 2)
i=1
i=1
−`˜j (i)
−D(fr ||gr ) (ζn + q) + D(fn0 ||gn0 )n
ζn+q
X
D(fjm ||gjm )
Applying the Chernoff bound yields:
0
ζn+q
n
X
X
Pm
`j (i) ≤
`r (i)
0
`˜r (i) +
(63)
in0
h
˜
× e−sC1 (n−ζn) .
× Em es(−`j (1)−C1 )
0
n
X
(62)
i=1
≤ Pm
(60)
For upper bounding the first term on the RHS of (60) we write
the sum LLRs as follows:
ζn+q
X
−`˜j (i) ≥ C1 (n + q + n0 ) ,
C1 =
i=1
i=1
`˜r (i) +
n
X
where
Sr (t̃rζn )
4
0
n−ζn
ζn+q
n
mn
X ρX
X
X
+
Pm
`m (i) ≤
`r (i) .
n0 =0
−`j (i) ≥ 0
i=1
0
i=1
(59)
Sm (t̃rζn )
n
X
implies
Note that the event
≤
or
≤
must occur (otherwise, cell j or m will be probed). Hence ,
m)
Pm Ñr (n) > n(1−2ρ
,
N
(n)
<
ρ
n,
N
(n)
<
ρ
n
j
m
m
m
M −2
0
n−ζn
ζn+q
n
mn
X ρX
X
X
=
Pm
`j (i) ≤
`r (i)
q=0
`r (i) +
i=1
1 − 2ρm
.
ζ,
2(M − 2)
Sr (t̃rζn )
0
ζn+q
X
where the second and third terms on the RHS of (57) are
upper bounded by De−γ1 n (there exist such D > 0, γ1 > 0
by Lemma 3), and the first term on the RHS of (57) is upper
bounded by the first term (i.e., the summation term) on the
RHS of (58). Next, we show that each term in the summation
decays exponentially with n to get the desired result.
Let t̃r1 , t̃r2 , ..., t̃rÑ (n) be the indices for the time instants in
r
which cell r 6= j, m has been probed and cells j, m have not
been probed by time n. Let
Sj (t̃rζn )
ζn + q − km n0 ≥ ζn + q − km n0 − (km + 1) (ρm n − n0 )
1
n + q + n0
= n (ζ − (km + 1)ρm ) + q + n0 ≥
4(M − 2)
1
≥
(n + q + n0 ) ,
4(M − 2)
where C2 = (1 − e−γ2 )
.
A similar Chernoff bounding technique can be applied to
upper bound the second term on the RHS of (60).
11
Next, we consider two cases:
1) the balanced case, referring to the case when
1
minj6=m D(fj ||gj ) ≥ P
;
j6=m 1/D(fj ||gj )
2) the unbalanced case, when the above inequality is reversed.
The reason for referring to the first case as the balanced
case is that DGFi policy is able to balance the detection
time so that the difference between the largest sum LLR
and the sum LLRs of any other cell exceeds the threshold
− log c approximately at the same time. As a result, the rate
function is determined by a certain averaging among the KL
divergences of the heterogeneous processes. On the other hand,
when the smallest KL divergence is too small, then too many
measurements are required to be gathered from that cell. In
that case, the difference between the largest sum LLR and
the sum LLR gathered from the cell with the smallest KL
divergence exceeds the threshold − log c significantly after the
difference between the largest sum LLR and the sum LLR
gathered from any other cell does. As a result, the rate function
is dominated by the smallest KL divergence.
For the unbalanced case, the proof follows directly from
subsection B.2. Thus, here it remains to show the proof for
the balanced case.
2: τ2 is defined as the smallest integer such that
PDefinition
n
i=τ1 +1 `jn (i)1jn (i) ≤ log c for some jn 6= m for all n ≥
τ2 ≥ τ1 .
We also define n2 , τ2 − τ1 as the total amount of time
between τ1 and τ2 .
In Lemma 5 we show that the probability that n2 is greater
than n decays exponentially with n when n is greater than
− log c/Im . Later, we will show that the asymptotic search
time is dominated by n2 , which together with Lemma 5 yields
the desired search time − log c/Im under hypothesis Hm .
Lemma 5: If the selection rule of DGFi is implemented
indefinitely, then for every fixed > 0 there exist C > 0 and
γ > 0 such that
Pm (n2 > n) ≤ Ce−γn
∀n > −(1 + ) log c/Im ,
(68)
for all m = 1, 2, ..., M .
Proof: First, we consider the case where Im >
D(gm ||fm ). Note that cell m isPnot observed for all n ≥ τ1 in
τ1 +t
1 (i) and j ∗ (τ1 +t) =
this case. Define Nj0 (τ1 +t) = i=τ
1 +1 j
0
arg maxj Nj (τ1 + t)D(fj ||gj ). Thus,
(69)
t≥n i=τ +1
1
Since Kt is the total number of obeservation from τ1 to τ1 +t,
by the definition of j ∗ (t) we have
Kt =
j6=m
≤
j6=m
`j ∗ (τ1 +t) (i)1j ∗ (τ1 +t) (i) − log c
i=τ1 +1
τX
1 +t
`˜j ∗ (τ1 +t) (i)1j ∗ (τ1 +t) (i)
=
i=τ1 +1
−Nj0 ∗ (τ1 +t) (τ1 + t)D(fj ∗ (τ1 +t) ||gj ∗ (τ1 +t) ) − log c
τX
1 +t
≤
`˜j ∗ (τ1 +t) (i)1j ∗ (τ1 +t) (i)
i=τ1 +1
Kt
− log c
1/D(f
j ||gj )
j6=m
−P
≤
≤
τX
1 +t
i=τ1 +1
τX
1 +t
`˜j ∗ (τ1 +t) (i)1j ∗ (τ1 +t) (i) − tIm + tIm /(1 + )
`˜j ∗ (τ1 +t) (i)1j ∗ (τ1 +t) (i) − t1
i=τ1 +1
(72)
for all t ≥ n > −(1 + ) log c/Im . By applying the Chernoff
bound,
Pτit+tcan be shown that there exists γ1 > 0 such that
Pm ( τ11 +1 −`˜j ∗ (τ1 +t) (i) ≥ t1 ) < e−γ1 t for all t ≥ n >
−(1 + ) log c/Im . Hence, there exist C1 > 0 and γ1 > 0 such
that Pm (n2 > n) ≤ C1 e−γ1 n for all n > −(1 + ) log c/Im .
A similar argument applies for case where Im ≤ D(gm ||fm ).
In what follows we define a r.v. DR(t) as the dynamic
range between sum LLRs of empty cells, maxj6=m Sj (t) −
minj6=m Sj (t). Note that the dynamic range at time τ2 (which
is the time in which sufficient information has been gathered
to distinguish Hm from at least one false hypothesis) can be
viewed as a measure of the amount of information remains
to gather in order to distinguish Hm from any other false
hypothesis. Lemma 6 below shows that the dynamic range at
time τ2 is sufficiently small.
Definition 3: The dynamic range between sum LLRs of
empty cells at time t is defined as follows:
DR(t) , max Sj (t) − min Sj (t) .
j6=m
(73)
Lemma 6: If the selection rule of DGFi is implemented
indefinitely. Then, for every fixed 1 > 0, 2 > 0 there exist
C > 0 and γ > 0 such that
Pm (DR(τ2 ) > 1 n) ≤ Ce−γn
(74)
for all m = 1, 2, ..., M .
j6=m
D(fj ||gj )
τX
1 +t
∀n > −(1 + 2 ) log c/Im ,
X Nj0 (τ1 + t)D(fj ||gj )
Nj0 (τ1 + t) =
D(fj ||gj )
X Nj0 ∗ (τ1 +t) (τ1 + t)D(fj ∗ (τ1 +t) ||gj ∗ (τ1 +t) )
Then,
j6=m
Pm (n2 > n)
τX
1 +t
`j ∗ (τ1 +t) (i)1j ∗ (τ1 +t) (i) ≥ log c).
≤ Pm (sup
X
P
Let 1 = Im /(1 + ). Since Im = j6=m K/D(fj ||gj ), we
have
K
P
.
(71)
1 =
(1 + ) j6=m 1/D(fj ||gj )
(70)
.
Proof: The proof follows directly by applying Lemma 5
and substituting τ2 in subsection B.2.
12
Definition 4: τ3j is defined as the smallest integer such that
Sj (n) ≥ − log c for all n ≥ τ2 . We also define τ3 = maxj τ3j .
Note that by the definitions of the last passage times we
have τ3j ≥ τ2 .
Remark 2: Using some algebraic manipulations, it can
be verified that ∆Sm,j (n) ≥ − log c for all j 6= m for
all n ≥ τ3j . Since τ3 = maxj6=m τ3j we have ∆S(n) =
Sm (n) − Sm(2) (n) (n) ≥ − log c for all n ≥ τ3 . Recall that
DGFi stops the test once ∆S(n) first occurs. Thus, in the
sequel we will use τ3 as an upper bound on the actual stopping
time τ .
Definition 5: n3 , τ3 − τ2 is defined as the total amount of
time between τ2 and τ3 .
In Lemma 7 we show that n3 is sufficiently small with high
probability. We will use this result to show that the asymptotic
expected search time is not affected by n3 .
Lemma 7: If the selection rule of DGFi is implemented
indefinitely, then for every fixed > 0 there exist C > 0 and
γ > 0 such that
Pm (n3 > n) ≤ Ce−γn
∀n > − log c/Im ,
(75)
for all m = 1, 2, ..., M .
Proof: To prove the Lemma, we first define N3j as the
total number of observations that the decisionP
maker collected
from cell j between τ2 and τ3j . Since n3 ≤ j N3j , we only
need to show that Pm (N3j > n) decays exponentially with n.
We can write Pm (N3j > n) as follows:
minj D(fj ||gj )
)
2
(76)
minj D(fj ||gj )
j
)
+Pm (N3 > n|DR(τ2 ) ≤ n
2
Lemma 6 provides the desired decay for the first term on the
RHS. We next show the desired decay for the second term.
Let t1 , t2 , · · · denote the time indices when cell j is observed
between τ2 and τ3j . We can write:
P(N3j > n) ≤ Pm (DR(τ2 ) > n
minj D(fj ||gj )
Pm (N3j > n|DR(τ2 ) ≤ n
)
2
r
X
minj D(fj ||gj )
≤ Pm ( inf
−`j (ti ) < n
)
r>n
2
i=1
r
X
minj D(fj ||gj )
≤ Pm (
`˜j (ti ) > r
).
2
i=1
(77)
Em (τ ) ≤ − (1 + o(1))
log(c)
,
Im
(78)
for some C3 , γ3 which completes the proof.
The following Lemma provides an upper bound on the
detection time when DGFi policy implemented (i.e., the cells
are probed based on the selection rule and the test terminates
based on the stopping rule).
(79)
for m = 1, ..., M .
Proof: Since the actual detection time under DGFi is
upper bounded by: τ ≤ τ3 = τ1 + n2 + n3 , combining
Lemmas 4, 5 and 7 proves the statement.
B. Analyzing the Dynamic of Empty Cells under DGFi
In this appendix we analyze the sum LLRs dynamics
at empty cells under DGFi, used to prove the theorem in
subsection A. To analyze the sum LLR of empty cells, we
introduce the following (slightly different) active hypothesis
testing problem. It should be noted that in what follows we
slightly change the notations for the new problem setting for
convenience and differentiating it from the original problem.
At each time, only k cells can be observed from cells
1, 2, · · · , m. When cell j is observed at time n, an observation xj (n) is drawn independently from previous times and
xj (n) follows distribution fj . We also assume that gj , j =
1, 2, · · · , m are m known distributions.
For the ease of the presentation when analyzing the sum
LLRs of empty cells. we remove the subscript m from Pm ()
when referring to the probability measure.
Let 1j (n) be the indicator function, where 1j (n) = 1 if cell
j is observed at time n, and 1j (n) = 0 otherwise.
Let
fj (xj (n))
(80)
lj (n) , log
gj (xj (n))
and
Sj (n) ,
n
X
lj (t)1j (t)
(81)
t=1
Note that we are now focusing on empty cells. Thus, for
convenience the LLR is defined as negative LLR defined in
the original problem. The sum LLR is defined accordingly.
We know that
Z
fj (x)
E[lj (n)] =
fj (x) log
dx = D(fj ||gj ).
(82)
gj (x)
x
Thus, here the sum LLR of an empty cell j is a random walk
with a positive increment D(fj ||gj ). Similarly, we define
˜lj (n) , lj (n) − D(fj ||gj ),
Using the Chernoff bound and the i.i.d. property of `˜j (ti )
yields:
n
X
minj D(fj ||gj )
Pm (
`˜j (ti ) > n
) < C3 e−γn
2
i=1
Lemma 8: If DGFi policy is implemented, then the expected
detection time τ is upper bounded by:
(83)
which is a zero mean r.v.. Without loss of generality, we
assume D(f1 ||g1 ) ≤ D(f2 ||g2 ) ≤ · · · ≤ D(fm ||gm ). We also
define
1
v̄ , P
.
(84)
1/D(f
j ||gj )
j
Let r(i) (n) denotes the cell index with the ith smallest sum
LLR collected from this cell up to time n. We define the
following random variables:
U (n) , max Sj (n), L(n) , min Sj (n),
j
j
(85)
13
DRjk (n) , Sr(k) (n) (n) − Sr(j) (n) (n),
(86)
DR(n) , DR1m (n) = U (n) − L(n),
(87)
and
Since kt is the total number of observations by time t, by the
definition of j(t) we have
kt =
Nj (t) =
1j (i),
Nj (t) =
X Nj (t)D(fj ||gj )
D(fj ||gj )
j
j
X Nj(t) (t)D(fj(t) ||gj(t) )
≥
.
D(fj ||gj )
j
Also, let
t
X
X
(88)
(94)
i=1
Hence,
j(t) = arg min Nj (t)D(fj ||gj ),
(89)
j̄(t) = arg max Nj (t)D(fj ||gj ).
(90)
j
j
1
= t · kv̄. (95)
1/D(f
j ||gj )
j
Nj(t) (t)D(fj(t) ||gj(t) ) ≤ kt · P
Therefore,
Sj(t) (t) > t · kv̄ + n
Remark 3: Note that we defined the LLR in this appendix as
the negative LLR which was defined in the original problem.
Thus, the corresponding DGFi policy in this appendix chooses
the k cells with smallest sum LLRs (in contrast to the selection
of the empty cells with the top sum LLRs as done in the
original problem).
Definition 6: The modified selection rule of DGFi for the
active hypothesis testing problem defined in this appendix is
given by: φ(n) = {r(1) (n), r(2) (n), · · · , r(k) (n)}.
Next, we provide the outline for the next lemmas. Lemma 9
states that the smallest observed sum LLR is sufficiently small
as requireed with high probability. Lemma 10 states that the
largest observed sum LLR is sufficiently large as required with
high probability. Lemma 11 shows that under (the modified)
DGFi policy, the difference between the largest sum LLR and
the (m − k + 1)th largest sum LLR is sufficiently small as
required with high probability. Whether the smallest sum LLR
is approximately equal to the largest sum LLR depends on
which one of balanced or unbalanced cases is valid. For the
balanced case, Lemma 12 claims that the dynamic range is
small under DGFi policy. Hence, DGFi can balance the search
time among all the processes so that the search time is a
certain averaging of their KL divergences. For the unbalanced
case, Lemma 13 states that the sum LLRs of the cell with
the smallest KL divergence cannot be too small (which will
determine the rate function function for the search in this case)
with high probability. Lemma 14 shows that the sum LLR of
other cells are larger than that of the cell with the smallest KL
divergence. Finally, Lemma 15 upper bounds the asymptotic
search time.
Lemma 9: For any selection rule, ∀t, ∀ > 0, there exist
C, γ > 0 such that
P(L(t) > t · kv̄ + n) < Ce
−γn
∀n > t.
(96)
implies
t
X
˜lj(t) (i)1j(t) (i) > n.
(97)
i=1
Since ˜lj(t) (t) is a zero mean r.v. with a bounded moment generating function, applying the Chernoff inequality completes
the proof.
Lemma 10: For any selection rule, ∀t, ∀, there exist C, γ >
0 such that
P(U (t) < t · kv̄ − n) < Ce−γn
∀n > t.
(98)
Proof: Note that
P(U (t) > t · kv̄ − n) ≤ P(Sj̄(t) (t) < t · kv̄ − n),
(99)
and
Sj̄(t) (t) = Nj̄(t) (t)D(fj̄(t) ||gj̄(t) )+
t
X
˜lj̄(t) (i)1j̄(t) (i). (100)
i=1
Since kt is the total number of observations by time t, by the
definition of j̄(t) we have
X
X Nj (t)D(fj ||gj )
kt =
Nj (t) =
D(fj ||gj )
j
j
(101)
X Nj̄(t) (t)D(fj̄(t) ||gj̄(t) )
.
≤
D(fj ||gj )
j
Hence,
1
= t·kv̄. (102)
j 1/D(fj ||gj )
Nj̄(t) (t)D(fj̄(t) ||gj̄(t) ) ≥ kt· P
Therefore,
Sj̄(t) (t) < t · kv̄ − n
(91)
(103)
implies
t
X
Proof: Note that
P(L(t) > t · kv̄ + n) ≤ P(Sj(t) (t) > t · kv̄ + n),
(92)
and
Sj(t) (t) = Nj(t) (t)D(fj(t) ||gj(t) ) +
t
X
i=1
˜lj(t) (i)1j(t) (i). (93)
˜lj(t) (i)1j(t) (i) < −n.
(104)
i=1
Since ˜lj(t) (t) is a zero mean r.v. with a bounded moment generating function, applying the Chernoff inequality completes
the proof.
14
Lemma 11: For DGFi selection rule, ∀t, ∀, there exist
C, γ > 0 such that
P(DRkm (t)
> D(fm ||gm ) + n) < Ce
−γn
∀n > t. (105)
Proof: We prove by induction with respect to t. When
t = 1, DRkm (1) > D(fm ||gm ) + n indicates that
3) ∀t, ∀, there exist C, γ > 0 such that
P(DR(t) > k · D(fm ||gm ) + n) < Ce−γn
∀n > t.
(113)
Proof: We prove by induction with respect to k. For k =
1, statement 3 follows directly from Lemma 11. For statement
1,
P(U (t) > t · v̄ + D(fm ||gm ) + n)
D(fm ||gm ) + n < lj (1) = ˜lj (1) + D(fj ||gj )
≤ ˜lj (1) + D(fm ||gm )
(106)
≤P(L(t) > t · v̄ + n or DR(t) > D(fm ||gm ) + n)
≤P(L(t) > t · v̄ + n) + P(DR(t) > D(fm ||gm ) + n),
(114)
which indicates that
˜lj (1) > n.
Using the Chernoff bound completes the induction base.
If the statement is true for t − 1, then for t we have
P(DRkm (t) > D(fm ||gm ) + n)
=P(DRkm (t) > D(fm ||gm ) + n, r(m) (t) = r(m) (t − 1))
+ P(DRkm (t) > D(fm ||gm ) + n, r(m) (t) 6= r(m) (t − 1)).
(107)
which can be bounded by Lemma 9 and 11. Similarly, we can
prove statement 2 using Lemmas 10 and 11.
If the statement is true for k − 1, for k we first prove
statement 3. For any fixed t, let j̄ = arg minj Sj (t), and let
t0 be the smallest integer such that j̄ ∈ φ(τ ), ∀t0 < τ ≤ t.
From Lemma 11 it follows that ∀, there exist C, γ > 0 such
that
P(DRkm (t0 ) > D(fm ||gm ) + n) < Ce−γn ,
∀n > t0 .
Since j̄ ∈
/ φ(t0 ), we have:
For the first term on the RHS, we have
P(DRkm (t) > D(fm ||gm ) + n, r(m) (t) = r(m) (t − 1))
n
≤ P(DRkm (t − 1) > D(fm ||gm ) + , r(m) (t) = r(m) (t − 1)
2
n
or lr(k) (t−1) (t) < − , r(m) (t) = r(m) (t − 1))
2
n
≤ P(DRkm (t − 1) > D(fm ||gm ) + )
2
n
+P(lr(k) (t−1) (t) < − ) ≤ C1 e−γ1 n ,
2
(108)
where the first term can be bounded using assumptions on
t − 1 and the second term can be bounded using the Chernoff
bound.
P(Sj̄ (t0 ) − U (t0 ) < −D(fm ||gm ) − n) < Ce−γn , ∀n > t0 .
(115)
Since that j̄ ∈ φ(τ ), ∀t0 < τ ≤ t we have:
P(Sj̄ (t) − U (t0 ) < (t − t0 )D(fj̄ ||gj̄ ) − D(fm ||gm ) − n)
< Ce−γn ,
∀n > t
(116)
by applying the Chernoff bound.
Next, consider a subproblem where cell j̄ is removed and
only k − 1 cells can be selected. Let Sj0 (n) be the sum LLR
in this subproblem. Then, by statement 1 with assumption on
k − 1 we have that ∀, there exist C, γ > 0 such that
For the second term on the RHS of (107), we have
P (U (t − t0 ) > (t − t0 ) · (k − 1)v̄ 0
P(DRkm (t) > D(fm ||gm ) + n, r(m) (t) 6= r(m) (t − 1))
≤P(lr(m) (t) (t) > D(fm ||gm ) + n)
≤P(˜lr(m) (t) (t) > n) < C2 e−γ2 n
+ (k − 1)D(fm ||gm ) + n)
(117)
< Ce−γn , ∀n > t − t0
(109)
where
1
.
1/D(f
j ||gj )
j6=j̄
v̄ 0 = P
Combining (107), (108), (109) completes the proof.
Now, for the original problem, we have Sj (t) = Sj (t0 ) +
Sj0 (t − t0 ) ≤ U (t0 ) + Sj0 (t − t0 ). By (117) we have
1) The Balanced Case:
Lemma 12: Under the DGFi selection rule, if
D(f1 ||g1 ) ≥ k · v̄
P(U (t) − U (t0 ) > (t − t0 ) · (k − 1)v̄ 0
+(k − 1)D(fm ||gm ) + n)
(110)
holds, then we have the following statements:
1) ∀t, ∀, there exist C, γ > 0 such that
P(U (t) > t·kv̄ +kD(fm ||gm )+n) < Ce−γn
(118)
∀n > t
since D(f1 ||g1 ) ≥ kv̄ implies D(fj̄ ||gj̄ ) ≥ (k−1)v̄ 0 . By (116)
and (118) we have that ∀, there exist C, γ > 0 such that
∀n > t.
(111)
2) ∀t, ∀, there exist C, γ > 0 such that
P(L(t) < t · kv̄ − kD(fm ||gm ) − n) < Ce−γn
< Ce
−γn
∀n > t.
(112)
P(U (t) − Sj̄ (t) > k · D(fm ||gm ) + n) < Ce−γn
∀n > t,
(119)
which proves statement 3 for k as desired. Then, statements
1 and 2 can be proved using Lemma 9 and 10 with statement
3 similar to the case with k = 1.
15
which indicates that the LHS has positive means. By applying
the Chernoff bound and using the i.i.d. property of ˜lj (ti ) we
have:
2) The Unbalanced Case:
Lemma 13: Under the DGFi selection rule, if
D(f1 ||g1 ) < k · v̄
(120)
then ∀t, ∀, there exist C, γ > 0 such that
P(S1 (t) < tD(f1 ||g1 ) − n) < Ce−γn
∀n > t.
(121)
Proof: Define t0 as the smallest integer such that cell 1
is observed at time i for all t0 < i ≤ t. Then, by our selection
rule, cell 1 is the one of the top m − k sum LLRs at time t0 .
Then, by applying t = t0 to Lemma 11 we have
P(U (t0 ) − S1 (t0 ) > n) < C1 e−γ1 n
∀n > t0
(122)
for some C1 , γ1 . Substituting t = t0 in Lemma 10 we have:
P(U (t0 ) < t0 · kv̄ − n) < C2 e−γ2 n
∀n > t0
(123)
∀n > t0
(124)
for some C2 , γ2 . Hence,
P(S1 (t0 ) < t0 · kv̄ − n) < C3 e−γ3 n
for some C3 , γ3 . Then, by the definition of t0 and using the
Chernoff bound we have
P(S1 (t) − S1 (t0 ) < (t − t0 )D(f1 ||g1 ) − n) < C4 e−γ4 n
∀n > (t − t0 ).
(125)
P(S1 (t) < tD(f1 ||g1 ) − n) < C5 e−γ5 n
∀n > t
Lemma 14: For every fixed > 0, there exists C > 0 and
γ > 0, such that for all j we have:
P(S1 (τ̃2 ) − Sj (τ̃2 ) > n) ≤ Ce−γn ,
∀n > τ̃2 .
(127)
tj0
Proof: For fixed j, define
as the smallest integer
such that S1 (n) > Sj (n) for all tj0 < i ≤ τ̃2 . By definition, S1 (tj0 ) ≤ Sj (tj0 ). Then, by our selection rule, for
all tj0 < i ≤ τ̃2 , whenever cell 1 is observed, cell j must
be observed based on their ranking of sum LLRs. Note that
D(f1 ||g1 ) ≤ D(fj ||gj ). Thus,
lj (i)1j (i) −
τ̃2
X
l1 (i)11 (i)
˜lj (i)1j (i) −
˜l1 (i)11 (i)
τ̃2
X
1j (i) − D(f1 ||g1 )
i=tj0
i=tj0
,
(130)
∀n > τ̃2
as desired.
Definition 8: Define τ̃3j as the smallest integer such that
Sj (n) ≥ − log c for all n ≥ τ̃3j . We also define τ̃3 = maxj τ̃3j .
Definition 9: ñ3 , τ̃3 − τ̃2 denotes the total amount of time
between τ̃2 and τ̃3 .
Lemma 15: For every fixed > 0, there exists C > 0 and
γ > 0 such that
P(ñ3 > n) < Ce−γn ,
∀n > − log c/D(f1 ||g1 ). (131)
Proof: By substituting t = τ̃2 in Lemma 13 we have:
P(S1 (τ̃2 ) < − log c − n) < C1 e−γ1 n
∀n > τ̃2
(132)
for some C1 , γ1 . By applying Lemma 14, we have:
∀n > τ̃2 , j = 1, 2, · · · , m
(133)
˜lj (i)1j (i) −
Let N3j denote that total number of observations,
taken from
P j
cell j between τ̃2 and τ̃3j . Since ñ3 ≤
N3 , it suffices to
show that P(N3j > n) decays exponentially with n. Note that
P(N3j > n)
D(f1 ||g1 )
≤ P Sj (τ̃2 ) < − log c − n
2
D(f1 ||g1 )
+P N3j > n|Sj (τ̃2 ) ≥ − log c − n
.
2
τ̃2
X
i=tj0
τ̃2
X
i=tj0
˜l1 (i)11 (i),
(128)
11 (i)
(134)
By (133) it remains to show that the second term decays
exponentially with n. Let t1 , t2 , · · · denote the time indices
when cell j is observed between τ̃2 and τ̃3j . Then,
r
X
D(f1 ||g1 )
2
i=1
!
r
X
D(f
||g
)
1
1
˜lj (ti ) > r
≤P
.
2
i=1
≤P
i=tj0
+D(fj ||gj )
τ̃2
X
≤ Ce
P(N3j > n|Sj (τ̃2 ) ≥ − log c − n
i=tj0
τ̃2
X
i=tj0
≥
−γn
for some C2 , γ2 > 0.
Definition 7: Define τ̃2 = − log c/D(f1 ||g1 ).
=
≤ P(S1 (τ̃2 ) − S1 (tj0 ) − (Sj (τ̃2 ) − Sj (tj0 )) > n)
(126)
as desired.
i=tj0
τ̃2
X
P(S1 (τ̃2 ) − Sj (τ̃2 ) > n)
P(Sj (τ̃2 ) < − log c − n) < C2 e−γ2 n
Since kv̄ > D(f1 ||g1 ), we have:
τ̃2
X
P(S1 (τ̃2 ) − S1 (tj0 ) − (Sj (τ̃2 ) − Sj (tj0 )) > n) ≤ Ce−γn ,
(129)
for some C, γ. Since S1 (tj0 ) ≤ Sj (tj0 ), we have:
inf
r>n
D(f1 ||g1 )
)
! 2
lj (ti ) < n
Applying the Chernoff bound and using the i.i.d. property of
˜lj (ti ) across time we have
!
r
X
D(f
||g
)
1
1
˜lj (ti ) > r
P
< C3 e−γn
(135)
2
i=1
16
is monotonically increasing with t for 0 ≤ t ≤ n.
Proof: Differentiation d(t) with respect to t yields:
for some C3 , γ3 which completes the proof.
C. The Asymptotic Lower Bound on the Bayes Risk
In this appendix, we show that the asymptotic Bayes risk
that can be achieved by any policy is lower bounded by
−c log c/I ∗ .
Lemma 16: Assume that αj (Γ) = O(−c log c) for all j =
1, ..., M . Let 0 < < 1. Then:
∂d(t)
1
= D(gm ||fm ) − P
≥0,
1
∂t
j6=m D(fj ||gj )
which completes the proof.
For the next lemma we define
j ∗ (t) , arg min Nj (t)D(fj ||gj ),
Pm (∆Sm (τ ) < − (1 − ) log c | Γ) = O(−c log c) , (136)
j6=m
(144)
and
for all m = 1, ..., M .
Proof: Note that:
∗
Wm
(t) ,
Pm (∆Sm (τ ) < − (1 − ) log c|Γ)
t
X
`˜m (i)1m (i) −
i=1
t
X
`˜j ∗ (t) (i)1j ∗ (t) (i),
(145)
i=1
= Pm (∆Sm (τ ) < − (1 − ) log c , δ = m|Γ)
which is a sum of zero-mean r.v.
+Pm (∆Sm (τ ) < − (1 − ) log c , δ 6= m|Γ)
Lemma 18: For every fixed > 0 there exist C > 0 and
γ > 0 such that
∗
Pm max Wm
(t) ≥ n|Γ ≤ Ce−γn
(146)
≤ Pm (∆Sm (τ ) < − (1 − ) log c , δ = m|Γ) + αm (Γ),
(137)
where αm (Γ) = O(−c log c) by assumption. In what follows,
we upper bound
Pm (∆Sm (τ ) < − (1 − ) log c , δ = m|Γ) .
Similar to [2, Lemma 4] we can show that for all j 6= m
there exists G > 0 such that:
−Gc log c ≥ Pj (δ 6= j|Γ) ≥ Pj (δ = m|Γ)
≥ Pj (∆Sm,j (τ ) ≤ −(1 − ) log c , δ = m|Γ)
≥ c1− Pm (∆Sm,j (τ ) < − (1 − ) log c , δ = m|Γ) ,
(138)
where the last inequality holds by changing the measure as in
[2, Lemma 4]. Thus,
1≤t≤n
for all m = 1, ..., M and for any policy Γ.
Proof: We upper bound (146) by summing over any
possible values that Nm (t), Nj ∗ (t) (t) can take and using the
Chernoff bound:
∗
Pm max Wm (t) ≥ n|Γ
1≤t≤n
=
t X
t
n X
X
t=1 i=0 j=0
Pm
t
X
`˜m (r)1m (r) +
r=1
−`˜j ∗ (t) (r)1j ∗ (t) (r) ≥ n,
r=1
Nm (t) = i, Nj ∗ (t) = j|Γ
Pm (∆Sm,j (τ ) < − (1 − ) log c , δ = m|Γ)
= O (−c log c) ∀j 6= m .
t
X
(139)
t h
t X
n X
ii
X
˜
Em es(`m (1)−/2)
≤
×
As a result,
t=1 i=0 j=0
h
Pm (∆Sm (τ ) < − (1 − ) log c , δ = m|Γ)
X
≤
Pm (∆Sm,j (τ ) < − (1 − ) log c , δ = m|Γ)
j6=m
= O (−c log c) .
(140)
Finally,
Pm (∆Sm (τ ) < − (1 − ) log c|Γ) = O (−c log c) .
(141)
ij
˜
Em es(−`j∗ (t) (1)−/2)
×
o
n
exp −s (2n − i − j) ,
2
(147)
for all s > 0.
Since Em (`˜m (1) − /2) = −/2 < 0 and Em (−`˜j ∗ (t) (1) −
/2) = −/2 < 0 are strictly negative, using a similar
argument as at the end of the proof of Lemma
3, there
˜
exist s > 0 and γ 0 > 0 such that Em es(`m (1)−/2) ,
˜
Em es(−`j∗ (t) (1)−/2) and e−s/2 are strictly less than
0
e−γ < 1. Since 2n − i − j ≥ 0, there exist C > 0 and
γ > 0, such that summing over t, i, j yields (146).
Lemma 17: Assume that
1
D(gm ||fm ) ≥ P
1
j6=m D(fj ||gj )
Then, the function:
"
.
(142)
Lemma 19: For any fixed > 0,
Pm max ∆Sm (t) ≥ n (Im + ) | Γ → 0
1≤t≤n
d(t) , t D(gm ||fm ) + P
n
t
−1
1
j6=m D(fj ||gj )
#
(143)
as n → ∞ ,
(148)
17
for all m = 1, ..., M and for any policy Γ.
Proof: We next show exponential decay of (148) (which
is stronger than the polynomial decay shown under the binary
composite hypothesis testing case in [2, Lemma 5]). Let
∗
∆Sm
(t) , Sm (t) − Sj ∗ (t) (t).
Proof: For any > 0 let nc = −(1 − )
log c
. Note that
Im +
Pm (τ ≤ nc | Γ)
= Pm (τ ≤ nc , ∆Sm (τ ) ≥ − (1 − ) log c | Γ)
∗
∆Sm
(t)
Note that ∆Sm (t) ≤
for all m and t. As a result,
Pm max ∆Sm (t) ≥ n (Im + ) |Γ
1≤t≤n
(149)
∗
≤ Pm max ∆Sm (t) ≥ n (Im + ) |Γ .
+Pm (τ ≤ nc , ∆Sm (τ ) < − (1 − ) log c | Γ)
≤ Pm max ∆Sm (t) ≥ − (1 − ) log c | Γ
(155)
t≤nc
+Pm (∆Sm (τ ) < − (1 − ) log c | Γ) .
1≤t≤n
We next prove the lemma for the case where Im = Fm (K).
Proving the lemma for the cases where Im = D(gm ||fm ) +
Fm (K − 1) applies with minor modifications.
Note that:
∗
∗
∆Sm
(t) = Wm
(t) + Nm (t)D(gm ||fm )
Both terms on the RHS approaches zero as c → 0 by
Lemmas 16, 19. Hence,
Em (τ |Γ) ≥
∞
X
nPm (τ = n|Γ)
(156)
n=nc +1
≥ nc Pm (τ ≥ nc + 1|Γ) → nc as c → 0
+Nj ∗ (t) (t)D(fj ∗ (t) ||gj ∗ (t) )
1
1/D(f
j ||gj )
j6=m
∗
≤ Wm
(t) + Nm (t) · P
(150)
Since > 0 is arbitrarily small we have Em (τ |Γ) ≥
− (1 + o(1)) log(c)/Im . As a result, Rm (Γ) ≥ cEm (τ |Γ) ≥
− (1 + o(1)) c log(c)/Im .
+Nj ∗ (t) (t)D(fj ∗ (t) ||gj ∗ (t) ).
Since that j ∗ (t) = arg minj6=m Nj (t)D(fj ||gj ) and Kt −
Nm (t) is the total number of observations taken from M − 1
cells j 6= m, we have:
X Nj ∗ (t) D(fj ∗ (t) ||gj ∗ (t) )
≤ Kt − Nm (t) ≤ Kn − Nm (t).
D(fj ||gj )
j6=m
(151)
Hence,
∗
∗
(t) + Kn P
(t) ≤ Wm
∆Sm
j6=m
1
1/D(fj ||gj )
∗
(t) + nIm .
= Wm
(152)
Therefore,
∗
(t) ≥ n (Im + )
∆Sm
implies
∗
Wm
(t) ≥ n.
By Lemma 18 we have:
Pm max ∆Sm (t) ≥ n (Im + )
1≤t≤n
∗
≤ Pm max Wm (t) ≥ n
(153)
1≤t≤n
Finally, we show that the Bayes risk cannot be made smaller
than −c Ilog(c)
:
m
Lemma 20: Any policy Γ that satisfies Rj (Γ) = O(−c log c)
for all j = 1, ..., M must satisfy:
for all m = 1, ..., M .
c log(c)
.
Im
We now focus on proving asymptotic optimality for L > 1,
and K = 1. For L > 1, we define τ1 as the smallest integer
such that Sm (n) > Sj (n) for all m ∈ D, j 6= D and n ≥ τ1 .
Note that when K = 1 and n ≥ τ1 the decision maker always
probe the consistent cell (target or not depending on the order
of GD and FD ) for making the difference between the Lth
and (L + 1)th largest sum LLRs greater than the threshold
− log c. As a result, the decision maker can always balance
the detection time so that the difference between the largest
sum LLR and the sum LLRs of any other cell exceeds the
threshold − log c approximately at the same time as c → 0.
Thus, proving the asymptotic optimality of DGFi for L > 1
and K = 1 follows similar arguments as in the balanced case
in the proof of Theorem 1 given in Appendix B, and we focus
here only on the key modifications. Let
∆SD (n) ,
≤ Ce−γn → 0 as n → ∞.
Rm (Γ) ≥ − (1 + o(1))
A PPENDIX C: PROOF OF T HEOREM 2
(154)
min
m∈D,j ∈D
/
∆Sm,j (n),
(157)
where ∆Sm,j (n) is defined in (44). Without loss of generality
we prove the theorem when set D contains all the targets. We
define
`k (i) − D(gk ||fk ) , if k ∈ D,
`˜k (i) =
(158)
`k (i) + D(fk ||gk ) , if k ∈
/ D,
which is a zero-mean r.v.
We start with sowing the upper bound on the Bayes risk
obtained by DGFi. Similar to Lemma 2, we can show that
the error probability under DGFi is O(c). Specifically, we can
show that the error probability is upper bounded by:
Pe ≤ (M − L)L · c .
(159)
18
We can show this by letting αD = PD (δ 6= D) and αD,j =
PD (j ∈ δ) for all j ∈
/ D, where the subscript D denotes
the
measure
when
set
D
contains all the targets. Thus, αD ≤
P
j ∈D
/ αD,j . By the stopping rule, accepting j ∈ δ implies
∆Sj,m ≥ − log c for some m ∈ D. Hence, for all j ∈
/ D we
have:
αD,j = PD (j ∈ D)
P
≤ m∈D PD (∆Sj,m (τ ) ≥ − log c)
X
≤
cPD∪j\m (∆Sj,m (τ ) ≥ − log c) ≤ L · c,
(160)
m∈D
where we changed the measure in the second inequality. As a
result,
X
αD ≤
αD,j ≤ (M − L)L · c,
which yields (159).
≤ Ce−γn
(167)
and
GD
D(gm ||fm )−
Proof: For each j, define tj (n) as the time when cell j
is observed for the nth time. By DGFi selection rule, if cell
j is observed at time t, then there exists m ∈ D such that
Sj (t) ≥ Sm (t). Hence,
PD (Nj (n) > qn)
(168)
for all t < n.
Since (167) can be shown similarly as in (163), it remains to
show (168). By the definition of GD , if Nm (t) > D(gmG||fDm )− ·
n, there exists m0 ∈ D and 0 > 0 such that Nm0 (t) <
GD
0 ||f 0 )+0 · t. Hence,
D(gm
m
GD
PD Nm (t) >
· n,
D(gm ||fm ) −
∀m0 ∈ D : Sm0 (t) > Sm (t)
≤
X
PD Nm (t) >
m0 ∈D
PD (Nj (t) > qn, ∃m ∈ D : Sj (t) > Sm (t))
(162)
Sm0 (t) >
t=1
0
Sm (t), Nm
(t)
×PD (t (dqne) = t).
It suffices to show that there exist constants C, γ such that
PD (Nj (t) > qn, ∃m ∈ D : Sj (t) > Sm (t)) ≤ Ce−γn (163)
for all t ≤ n.
First we have
(164)
≤
m∈D
Fix m, then we have
≤
n
X
PD
r=dqne k=0
n
X
i=1
n
X
bs2 tc
X
PD
`j (i) +
k
X
≤
bs2 tc
X
PD
r=ds1 ne k=0
!
−`m (i) ≥ 0
n
X
(165)
k=1
+
≤ Cm e−γm n .
The last inequality can be shown using the Chernoff bound as
in Lemma 3.
P
To show (163), we let C = m Cm , γ = minm γm , which
completes the proof.
k
X
r
X
i=1
r=ds1 ne k=0
PD (Nj (t) > qn, Sj (t) > Sm (t))
GD
<
·t .
0 ||f 0 ) + 0
D(gm
m
Fix m0 , and let s1 = D(gmG||fDm )− , s2 =
Then, we have
GD
PD Nm (t) >
· n,
D(gm ||fm ) −
0
Sm0 (t) > Sm (t), Nm
(t) <
PD (Nj (t) > qn, ∃m ∈ D : Sj (t) > Sm (t))
X
≤
PD (Nj (t) > qn, Sj (t) > Sm (t)).
r
X
(169)
GD
· n,
D(gm ||fm ) −
j
n
X
· n, ∀m0 ∈ D : Sm0 (t) > Sm (t)
≤ Ce−γn
Here we consider the case where ID = GD , the case ID =
FD applies with minor modifications. For showing that τ1 is
sufficiently small we need to show first the following Lemmas:
Lemma 21: For all j ∈
/ D, ∀0 < q < 1, there exist C, γ > 0
such that
PD (Nj (n) > qn) < Ce−γn
(161)
n
X
Proof: For each m, define tm (n) as the time when cell
m is observed for the nth time. By DGFi selection rule, if cell
m is observed at time t, either there exists j ∈
/ D such that
Sj (n) > Sm (n) or Sm0 (n) > Sm (n) for all m0 ∈ D. Similar
to (162), it suffices to show that
/ D : Sj (t) > Sm (t)
PD Nm (t) > D(gmG||fDm )− · n, ∃j ∈
PD Nm (t) >
j ∈D
/
≤
Lemma 22: For all m ∈ D, and > 0, there exist C, γ > 0
such that
GD
PD Nm (n) >
· n ≤ Ce−γn
(166)
D(gm ||fm ) −
GD
D(gm0 ||fm0 )+ .
GD
·t
D(gm0 ||fm0 ) + 0
−`m (i) +
k
X
!
`m0 (i) ≥ 0
i=1
D(gm ||fm ) − − `m (i)
i=1
!
`m0 (i) − D(gm0 ||fm0 ) − 0 ≥ 0
i=1
≤
n
X
bs2 tc h
X
ir h
ik
0
˜
ED es(−`m (1)−)
ED es(`m0 (1)− )
r=ds1 ne k=0
≤ Cm0 e−γm0 n
(170)
19
The last inequality can be shown using the Chernoff
bound
P
as in Lemma 3. To show (169), we let C = m0 Cm0 , γ =
minm0 γm0 , which completes the proof.
Lemma 23: For all m ∈ D, ∀ > 0, there exist C, γ > 0
such that
GD
PD Nm (n) < (
)n ≤ Ce−γn .
(171)
2D(gm ||fm )
0m
Proof: By choosing
qj Pand
in Lemma 21 and
P
0
Lemma 22 such that j qj + m 0m = 2D(gGmD||fm ) , we have
GD
PD Nm (n) < (
)n
2D(gm ||fm )
X
≤
PD (Nj (n) > qj n)
j ∈D
/
+
X
0
P D Nm
(n) > (
m0 ∈D
GD
+ 0m )n
0 ||f 0 )
D(gm
m
for all D and m ∈ D. Then, we define:
j ∗ (t) , arg min Nj (t)D(fj ||gj ),
(177)
m∗ (t) , arg min Nm∗ (t) (t)D(gm ||fm ),
(178)
j ∈D
/
m∈D
and
WD∗ (t) ,
t
X
`˜m∗ (t) (i)1m∗ (t) (i) −
i=1
≤ Cm0 e
−γn
(172)
Next, similar to Lemma 4, we can show that the probability
that τ1 is greater than n decreases exponentially with n. This
result is used when evaluating the asymptotic expected search
time to show that it is not affected by τ1 . We can show this
by noting that
PD (τ1 > n) ≤ PD
max sup (Sj (t) − Sm (t)) ≥ 0
i=1
(179)
where WD∗ (t) is a sum of zero-mean r.v. Using these definitions, similar to Lemma 18, we can show that for every fixed
> 0 there exist C > 0 and γ > 0 such that
PD max WD∗ (t) ≥ n|Γ ≤ Ce−γn
(180)
for all D and for any policy Γ.
Next, similar to Lemma 19 we can show that for any fixed
> 0,
PD max ∆SD (t) ≥ n (ID + ) | Γ → 0
1≤t≤n
as n → ∞ ,
(181)
for all D and for any policy Γ.
Finally, similar to Lemma 20, we can show that any policy
Γ that satisfies RD (Γ) = O(−c log c) for all D must satisfy:
j ∈D,m∈D
/
t≥n
≤
∞
X
RD (Γ) ≥ − (1 + o(1))
PD (Sj (t) ≥ Sm (t)) .
(173)
Following (173), it suffices to show that PD (Sj (n) ≥ Sm (n))
decays exponentially with n. Note that
GD
≤ PD Sj (n) ≥ Sm (n), Nm (n) ≥ (
)n
2D(g
m ||fm )
GD
)n
+PD Nm (n) < (
2D(gm ||fm )
(174)
The first term decays exponentially with n by Lemma 3 (with
minor modifications). The second term decays exponentially
with n by Lemma 23.
Note that we obtained that the expectation of τ1 is bounded,
and we can use similar arguments as in the balanced case of
Theorem 1 in Appendix B to obtain the detection rate ID
for n ≥ τ1 . Combining these results yields that the expected
detection time τ under the DGFi policy is upper bounded by:
ED (τ ) ≤ − (1 + o(1))
log(c)
,
ID
c log(c)
.
ID
(182)
for all D.
t=n
j ∈D,m∈D
/
PD (Sj(n) ≥ Sm (n))
`˜j ∗ (t) (i)1j ∗ (t) (i),
1≤t≤n
as desired.
X
t
X
(175)
for m = 1, ..., M .
Finally, showing that the asymptotic Bayes risk is lower
bounded by −c log c/IL∗ follows a similar outline as in Appendix B. Specifically, similar to Lemma 16, if αD (Γ) =
O(−c log c) for all D, and we let 0 < < 1, then:
PD (∆Sm (τ ) < − (1 − ) log c | Γ) = O(−c log c) , (176)
R EFERENCES
[1] Q. Zhao and B. M. Sadler, “A survey of dynamic spectrum access,”
IEEE signal processing magazine, vol. 24, no. 3, pp. 79–89, 2007.
[2] H. Chernoff, “Sequential design of experiments,” The Annals of Mathematical Statistics, vol. 30, no. 3, pp. 755–770, 1959.
[3] A. Wald, “Sequential analysis. 1947,” Zbl0029, vol. 15805, 1947.
[4] S. A. Bessler, “Theory and applications of the sequential design of
experiments, k-actions and infinitely many experiments. part i. theory,”
tech. rep., DTIC Document, 1960.
[5] S. Nitinawarat, G. K. Atia, and V. V. Veeravalli, “Controlled sensing
for hypothesis testing,” in 2012 IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), pp. 5277–5280,
IEEE, 2012.
[6] S. Nitinawarat, G. K. Atia, and V. V. Veeravalli, “Controlled sensing
for multihypothesis testing,” IEEE Transactions on Automatic Control,
vol. 58, no. 10, pp. 2451–2464, 2013.
[7] S. Nitinawarat and V. V. Veeravalli, “Controlled sensing for sequential
multihypothesis testing with controlled markovian observations and nonuniform control cost,” Sequential Analysis, vol. 34, no. 1, pp. 1–24,
2015.
[8] M. Naghshvar and T. Javidi, “Active sequential hypothesis testing,” The
Annals of Statistics, vol. 41, no. 6, pp. 2703–2738, 2013.
[9] M. Naghshvar and T. Javidi, “Sequentiality and adaptivity gains in
active hypothesis testing,” IEEE Journal of Selected Topics in Signal
Processing, vol. 7, no. 5, pp. 768–782, 2013.
[10] A. Tajer and H. V. Poor, “Quick search for rare events,” IEEE Transactions on Information Theory, vol. 59, no. 7, pp. 4462–4481, 2013.
[11] N. K. Vaidhiyan and R. Sundaresan, “Learning to detect an oddball
target,” arXiv preprint arXiv:1508.05572, 2015.
[12] K. Leahy and M. Schwager, “Always choose second best: Tracking
a moving target on a graph with a noisy binary sensor,” in Control
Conference (ECC), 2016 European, pp. 1715–1721, IEEE, 2016.
20
[13] G. Fellouris, G. V. Moustakides, and V. V. Veeravalli, “Multistream
quickest change detection: Asymptotic optimality under a sparse signal,”
in Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE
International Conference on, pp. 6444–6447, IEEE, 2017.
[14] S. Nitinawarat and V. V. Veeravalli, “Universal scheme for optimal
search and stop,” in Information Theory and Applications Workshop
(ITA), 2015, pp. 322–328, IEEE, 2015.
[15] B. Hemo, K. Cohen, and Q. Zhao, “Asymptotically optimal search of
unknown anomalies,” in Proc. of the 16th IEEE Symposium on Signal
Processing and Information Technology (ISSPIT), (Limassol, Cyprus),
Dec. 2016.
[16] K. Cohen and Q. Zhao, “Asymptotically optimal anomaly detection via
sequential testing,” IEEE Transactions on Signal Processing, vol. 63,
no. 11, pp. 2929–2941, 2015.
[17] K. Cohen, Q. Zhao, and A. Swami, “Optimal index policies for anomaly
localization in resource-constrained cyber systems,” IEEE Transactions
on Signal Processing, vol. 62, no. 16, pp. 4224–4236, 2014.
[18] D. A. Castanon, “Optimal search strategies in dynamic hypothesis
testing,” IEEE transactions on systems, man, and cybernetics, vol. 25,
no. 7, pp. 1130–1138, 1995.
[19] L. Lai, H. V. Poor, Y. Xin, and G. Georgiadis, “Quickest search over
multiple sequences,” IEEE Transactions on Information Theory, vol. 57,
no. 8, pp. 5375–5386, 2011.
[20] M. L. Malloy, G. Tang, and R. D. Nowak, “Quickest search for a rare
distribution,” in Information Sciences and Systems (CISS), 2012 46th
Annual Conference on, pp. 1–6, IEEE, 2012.
[21] J. Heydari, A. Tajer, and H. V. Poor, “Quickest linear search over correlated sequences,” IEEE Transactions on Information Theory, vol. 62,
no. 10, pp. 5786–5808, 2016.
[22] Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, “Energy-efficient design of
sequential channel sensing in cognitive radio networks: optimal sensing
strategy, power allocation, and sensing order,” IEEE Journal on Selected
Areas in Communications, vol. 29, no. 8, pp. 1648–1659, 2011.
[23] R. Caromi, Y. Xin, and L. Lai, “Fast multiband spectrum scanning
for cognitive radio systems,” IEEE Transactions on Communications,
vol. 61, no. 1, pp. 63–75, 2013.
[24] L. Ferrari, Q. Zhao, and A. Scaglione, “Utility maximizing sequential
sensing over a finite horizon,” IEEE Transactions on Signal Processing,
vol. 65, no. 13, pp. 3430–3445, 2017.
[25] M. Egan, J.-M. Gorce, and L. Cardoso, “Fast initialization of cognitive
radio systems,” in IEEE International Workshop on Signal Processing
Advances in Wireless Communications, 2017.
[26] A. Tajer, V. V. Veeravalli, and H. V. Poor, “Outlying sequence detection
in large data sets: A data-driven approach,” IEEE Signal Processing
Magazine, vol. 31, no. 5, pp. 44–56, 2014.
[27] K. Cohen and Q. Zhao, “Active hypothesis testing for anomaly detection,” IEEE Transactions on Information Theory, vol. 61, no. 3,
pp. 1432–1450, 2015.
[28] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,”
ACM computing surveys (CSUR), vol. 41, no. 3, p. 15, 2009.
[29] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly
detection: methods, systems and tools,” IEEE Communications Surveys
& Tutorials, vol. 16, no. 1, pp. 303–336, 2014.
| 7cs.IT
|
arXiv:1507.07778v3 [math.GT] 6 Nov 2017
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS
AND MAPS OF NON-ZERO DEGREE
CHRISTOFOROS NEOFYTIDIS
A BSTRACT. We define a new class of irreducible groups, called groups not infinite-index presentable by products or not IIPP. We prove that certain aspherical manifolds with fundamental
groups not IIPP do not admit maps of non-zero degree from direct products. This extends previous results of Kotschick and Löh, providing new classes of aspherical manifolds – beyond those
non-positively curved ones which were predicted by Gromov – that do not admit maps of non-zero
degree from direct products.
A sample application is that an aspherical geometric 4-manifold admits a map of non-zero degree
from a direct product if and only if it is a virtual product itself. This completes a characterization of
the product geometries due to Hillman. Along the way we prove that for certain groups the property
IIPP is a criterion for reducibility. This especially implies the vanishing of the simplicial volume
of the corresponding aspherical manifolds. It is shown that aspherical manifolds with reducible
fundamental groups do always admit maps of non-zero degree from direct products.
1. I NTRODUCTION
A fundamental topic in topology is the study of maps of non-zero degree between manifolds of
the same dimension. The existence of a map of non-zero degree defines a transitive relation, called
domination relation, on the homotopy types of closed oriented manifolds. Whenever such a map
M −→ N exists we say that M dominates N and denote this by M ≥ N. Gromov suggested investigating the domination relation as defining a partial order of manifolds and formulated several
conjectures for candidate classes that might (not) be comparable under ≥ [14, 13, 15, 4, 38, 20].
A particular case of the domination question is when the domain is a non-trivial direct product.
That case was raised in Gromov’s theory of functorial semi-norms (such as the simplicial volume,
see also [25]) and of topological rigidity, where Gromov predicted that the fundamental classes of
certain aspherical manifolds with large universal covers are not dominated by products. Furthermore, the domination-by-products question has its own independent interest, being a special case
of Steenrod’s classical problem on the realization of homology classes by manifolds [7].
The homotopy types of aspherical manifolds are determined by their fundamental groups. Longstanding rigidity conjectures state that their homeomorphism types are determined by their fundamental groups as well. Several related questions concern the decomposition of the fundamental
group of an aspherical manifold as a direct product and the realization of finitely presented Poincaré
duality groups as fundamental groups of aspherical manifolds. An open question in this context is
Date: November 7, 2017; c C. Neofytidis 2015–2017.
2010 Mathematics Subject Classification. 57M05, 57M10, 57M50, 55M25, 22E25, 57N65, 53C23, 20F34.
1
2
CHRISTOFOROS NEOFYTIDIS
whether every closed aspherical manifold M with fundamental group Γ1 × Γ2 can be decomposed
as a product of closed manifolds with fundamental groups Γ1 and Γ2 respectively. In particular, it
is an open question whether aspherical manifolds with reducible fundamental groups (that is, virtual products of two infinite groups) are finitely covered – and therefore dominated – by products.
Lück showed how to obtain an affirmative answer in dimensions higher than four, relying on very
strong assumptions concerning the Farrell-Jones conjecture and the cohomological dimensions of
the involved groups [24]. For non-positively curved manifolds an affirmative answer is given by
Gromoll-Wolf’s isometric splitting theorem [12].
1.1. Summary of results. Before stating the main results in detail, we give a general overview of
the content of this paper. First, applying Thom’s emphatic answer (in rational homology) [33] of
Steenrod’s realization problem, we will show that every closed aspherical manifold with reducible
fundamental group is indeed dominated by products (Theorem A). Therefore, in this paper we are
interested to investigate whether aspherical closed manifolds with irreducible (i.e. not reducible)
fundamental group admit arbitrary maps of non-zero degree by non-trivial direct products (clearly
such maps cannot be homotopic to coverings).
Our goal is to introduce a new algebraic obstruction to domination by products for aspherical
manifolds whose fundamental groups have non-trivial center. This property will be termed “groups
not infinite-index presentable by products” or “not IIPP” for short (cf. Definition 1.1). We will
obtain new classes of aspherical manifolds that are not dominated by direct products, extending
a previous obstruction of Kotschick and Löh [20] (called “groups not presentable by products”),
and expanding Gromov’s predictions (about irreducible, non-positively curved manifolds [14])
to aspherical manifolds with non-trivial center. In particular, we will show that large classes of
circle bundles with fundamental groups not IIPP are not dominated by products (Theorem B). In
many cases, we will prove that the existence of a map of non-zero degree from a direct product is
equivalent to the existence of a finite covering of the same product type (Theorem C).
By definition, a group not presentable by products is not IIPP and a group not IIPP is irreducible,
but none of those implications can be reversed (cf. Remark 1.2). Nevertheless, the characterization
of Theorem C contains a special case of equivalence between “irreducible” and “not IIPP” for
arbitrary (i.e. not necessarily finitely generated or torsion-free) groups: If the quotient of a group Γ
by its center C(Γ) is not presentable by products, then Γ is reducible if and only Γ is IPPP (Theorem
D). This result fails when Γ/C(Γ) is presentable by products. For example, the 5-dimensional
Heisenberg group H5 – whose quotient by its center is Z4 and thus presentable by products – is IIPP
but irreducible (cf. Example 1.7). Dimension five is the sharp dimension in which this phenomenon
occurs, since “IIPP” and “reducible” are equivalent for fundamental groups of aspherical geometric
manifolds (in the sense of Thurston) in dimensions ≤ 4; cf. Section 6.2, in particular Theorem 6.7.
As a sample application of this study we deduce (combining Theorems A and D) the vanishing
of the simplicial volume of certain aspherical manifolds (Corollary 1.5). Moreover, our results
combined with Hillman’s work [17] show that a 4-dimensional geometric manifold is dominated by
a product if and only if it is covered by a product (Theorem F). Further applications about ordering
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
3
manifolds using maps of non-zero degree [4, 38] and the monotonicity of Kodaira dimensions
with respect to the existence of maps of non-zero degree [39] will be presented in a subsequent
paper [28].
1.2. Main theorems. In the development of the theory of bounded cohomology, Gromov [13]
conjectured that the fundamental classes of irreducible, locally symmetric spaces of non-compact
type cannot be represented by non-trivial products (of surfaces). Kotschick and Löh [20] verified
Gromov’s conjecture, by finding an algebraic obstruction to domination by products for rationally
essential manifolds. A closed oriented connected n-dimensional manifold M is called rationally
essential if the classifying map of the universal covering cM : M −→ Bπ1 (M) sends the fundamental class of M to a non-trivial element in Hn (Bπ1 (M); Q); see [14, 13]. The non-domination
criterion of [20], given in Theorem 2.4 below, reads as follows: An infinite group Γ is called not
presentable by products if, for every homomorphism ϕ : Γ1 ×Γ2 −→ Γ onto a finite index subgroup
of Γ one of the factors Γi has finite image ϕ(Γi ) ⊂ Γ.
As we shall see in Section 2.2, the proof of Theorem 2.4 was obtained by showing that the
existence of a map of non-zero degree f : X1 × X2 −→ M, with M rationally essential, implies
a presentation by products Γ1 × Γ2 −→ π1 (M), where Γi := im(π1 (f Xi )). However, the proof
of that statement does not give any insight on the index of the presenting factors Γ1 , Γ2 in π1 (M).
In fact, all the possibilities for the indices [π1 (M) : Γi ] may occur, as we will see in Example 4.1.
The targets of that example are however direct products of (aspherical) manifolds. Hence, a main
question is to understand how close to “reducible” must the fundamental group of an aspherical
manifold be, in order this manifold to be dominated by products. Indeed, the case of reducible
fundamental groups has a complete affirmative answer:
Theorem A. A closed aspherical manifold with reducible fundamental group is dominated by a
non-trivial direct product of closed oriented manifolds.
Thus our purpose in this article is to examine aspherical manifolds with irreducible fundamental
groups. We extend the notion “group not presentable by products”, including groups with (virtually) infinite center:
Definition 1.1. An infinite group Γ is called not infinite-index presentable by products or not IIPP
if, for every homomorphism ϕ : Γ1 × Γ2 −→ Γ onto a finite index subgroup of Γ at least one of
the images ϕ(Γi ) has finite index in Γ.
Otherwise, if such homomorphism ϕ exists with [Γ : ϕ(Γi )] = ∞ for both i, then Γ is called
infinite-index presentable by products or IIPP.
Remark 1.2. The following inclusions hold immediately by definition:
{groups not presentable by products} ⊂ {groups not IIPP} ⊂ {irreducible groups}.
However, none of the inverse inclusions hold: For the first inclusion, the infinite cyclic group is
a trivial example of a group presentable by products, but not IIPP. For the second inclusion, the
5-dimensional Heisenberg group is an example of an IIPP irreducible group; cf. Example 1.7.
4
CHRISTOFOROS NEOFYTIDIS
The strong feature of the property “not IIPP” is that it detects at once all the possible dimensions
of the factors of a product that dominates (with a π1 -surjective map) a rationally essential manifold
with torsion-free fundamental group. For aspherical manifolds one of the factors can be taken as
simple as possible:
Up to finite covers, if an aspherical manifold M with fundamental group not IIPP is dominated
by a product X1 × X2 , then X1 × T dim X2 ≥ M, where dim X2 ≤ rankC(π1 (M)).
Our first main non-domination result deals with circle bundles:
Theorem B. Let M be a circle bundle over a closed oriented aspherical manifold B, so that
π1 (M) is not IIPP and its center remains infinite cyclic in finite covers. Then M is not dominated
by any non-trivial direct product of closed oriented manifolds.
Example 1.3. Closed Nil4 -manifolds fulfill the conditions of Theorem B and therefore are never
dominated by products; cf. Propositions 6.10 and 6.22. Examples of such manifolds can easily be
constructed as mapping tori of suitable self-homeomorphisms of T 3 ; see Remark 6.12.
The fundamental group of M in Theorem B is presentable by products having infinite (cyclic)
center. By Eberlein’s works [5, 6] or, more generally, by the stirring work of Farb and Weinberger [9], irreducible manifolds of dimension higher than one with fundamental groups with
center do not admit metrics of non-positive sectional curvature. The non-domination results of
Kotschick and Löh [20] deal mostly with non-positively curved manifolds. More precisely, they
show that non-positively curved manifolds are dominated by products if and only if they are virtually diffeomorphic to products. Equivalently, the fundamental groups of those manifolds are
reducible if and only if they are presentable by products. In the case of fiber bundles (which
includes manifolds that do not admit metrics of non-positive sectional curvature [18]), the results
of [20] deal with targets whose fiber and base have fundamental groups not presentable by products
and with targets with positive simplicial volume.
A circle bundle M over an aspherical manifold has vanishing simplicial volume [13, 23]. Moreover, the infinite cyclic fundamental group of the S 1 -fiber is presentable by products and, as mentioned above, central in π1 (M), which means that π1 (M) is presentable by products. However,
as noted in Remark 1.2, the property “presentable by products” is not generally equivalent to
“reducible”, and this applies as well to fundamental groups of many circle bundles; e.g. the fundamental group of any circle bundle over a closed surface with non-zero rational Euler class is
irreducible and presentable by products (but it is not IIPP; see Proposition 6.3). In fact, when
the base of the circle bundle has fundamental group not presentable by products, then π1 (M) is
reducible if and only if it is IIPP. The following result characterizes circle bundles with the latter
property, and is a partial converse to Theorem B:
π
Theorem C. Let M −→ B be a circle bundle over a closed aspherical manifold B whose fundamental group π1 (B) is not presentable by products. Then the following are equivalent:
(1) M is dominated by a non-trivial product of closed oriented manifolds;
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
5
(2) M is finitely covered by a product S 1 × B ′ , for some finite cover B ′ −→ B;
(3) π1 (M) is reducible;
(4) π1 (M) is IIPP.
Example 1.4. A closed 4-manifold M carrying the geometry Sol14 is virtually a circle bundle
over a closed oriented Sol3 -manifold, and π1 (M) is not IIPP (see Propositions 6.15 and 6.24
respectively). Since Sol3 -manifold groups are not presentable by products (cf. Proposition 6.2),
Theorem C implies that M is not dominated by products. Actually, a circle bundle over a closed
oriented Sol3 -manifold is dominated by a product if and only if it possesses the geometry Sol3 × R
(see also Theorem 6.1).
The idea of Theorem C is that the center of π1 (B) remains trivial in finite covers, being not
presentable by products and torsion-free. In fact, the equivalence between (3) and (4) holds in its
greatest generality with no assumptions on finite generation, torsion freeness or the virtual rank of
the center:
Theorem D. Let Γ be a group with center C(Γ) such that the quotient Γ/C(Γ) is not presentable
by products. Then, Γ is reducible if and only if it is IIPP.
In the light of Theorem A we obtain the following consequence of Theorem D:
Corollary 1.5. Let M be a closed oriented aspherical manifold such that π1 (M) is IIPP and
π1 (M)/C(π1 (M)) is not presentable by products. Then there exists a closed oriented manifold
N such that T k × N ≥ M, where T k is the k-dimensional torus with k < rankC(π1 (M)). In
particular, M has zero simplicial volume.
Remark 1.6. It is a long-standing conjecture that the simplicial volume of a closed aspherical manifold whose fundamental group contains a non-trivial amenable normal subgroup vanishes [23]. The vanishing result in Corollary 1.5 is a straightforward consequence of the domination T k × N ≥ M (applying Theorems D and A). Alternatively, after showing that π1 (M) is a
virtual product with an Abelian factor (by Theorem D), the vanishing of the simplicial volume of
M follows as well by Gromov’s isometry theorem with respect to the simplicial ℓ1 -norm [13].
The property IIPP truly recognizes reducibility of a group Γ whenever the quotient Γ/C(Γ) is
not presentable by products. Indeed, IIPP is not anymore a criterion for a group Γ to be reducible
when the quotient Γ/C(Γ) is presentable by products:
Example 1.7. The 5-dimensional Heisenberg group H5 is irreducible and IIPP, with H5 /C(H5 )
isomorphic to Z4 ; cf. Lemma 8.1. Also, H5 is realizable by a non-trivial circle bundle over T 4 .
In Theorem 8.2, we will prove that this manifold is not dominated by products. This seems to be
the first example of an aspherical manifold whose fundamental group admits a presentation by a
product of two non-trivial subgroups of infinite index, but this manifold is still not dominated by
products. Previously, examples of rationally essential, but not aspherical, manifolds with reducible
fundamental groups that are not dominated by products were given in [20].
6
CHRISTOFOROS NEOFYTIDIS
Also, this example shows that the converse of Theorem B does not hold in general. In particular,
the assumptions of Theorem C (which is a partial converse of Theorem B) cannot be removed.
The Heisenberg group H5 has cohomological dimension five which allows enough space for the
existence of two infinite commuting subgroups Γi ⊂ H5 such that H5 is presented by Γ1 × Γ2 and
[H5 : Γi ] = ∞. This is not true in lower dimensions as we shall see in Theorem E below.
1.3. Examples and applications. We now characterize the fundamental groups of certain aspherical manifolds, giving non-trivial examples of groups presentable by products, but not IIPP. Then,
we apply our main results to show that an aspherical 4-manifold possessing a Thurston geometry
is dominated by a direct product if and only if it is virtually a direct product.
1.3.1. Non-trivial examples of groups not IIPP. The condition “not IIPP” is the crucial property for the non-existence results of this paper. The following result gathers together some nonelementary examples of groups not IIPP.
Theorem E. Irreducible fundamental groups of aspherical manifolds that possess a Thurston solvable geometry in dimensions ≤ 4 are not IIPP.
The above statement contains solvable groups that are not presentable by products as well,
4
namely Sol3 -, Sol04 - and Solm6
=n -manifold groups. Theorem E says, roughly, that in low dimensions the properties “reducible” and “IIPP” are actually equivalent. The requirement on the cohomological dimension being at most four is crucial in the above theorem, because as we have seen
in Example 1.7 the 5-dimensional Heisenberg group H5 is irreducible and IIPP.
1.3.2. Domination by products for geometric 4-manifolds. After [20], it is natural to ask to what
extent the condition “presentable by products” on the fundamental group of a rationally essential
manifold M would be sufficient for X1 × X2 ≥ M. Theorem A says that reducibility suffices
for aspherical manifolds. A complete answer is known in dimension three [22], where Kotschick
and the author proved that a closed 3-manifold is dominated by products if and only if it is either
a virtual product or a virtual connected sum of copies of S 2 × S 1 . Thus, in particular, non-trivial
circle bundles over closed oriented aspherical surfaces are never dominated by products, although
their fundamental groups are presentable by products, having infinite center. It is well known [34,
g2 if and only if it is
30] that a closed 3-manifold possesses one of the geometries Nil3 or SL
virtually a non-trivial circle bundle over a closed aspherical surface (torus or a hyperbolic surface
respectively). A main application of Theorems B and C, together with the examples of groups not
IIPP given in Theorem E, is the following characterization in dimension four:
Theorem F. A closed oriented aspherical geometric 4-manifold M is dominated by a non-trivial
product if and only if it is finitely covered by a product. Equivalently, M carries one of the product
geometries X3 × R or the reducible H2 × H2 geometry.
The existence of finite coverings of (diffeomorphism) type N × S 1 for manifolds modeled on
product geometries X3 × R is due to Hillman [17] (note that domination by products alone follows
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
7
by Theorem A as well). The above theorem says that only geometric aspherical 4-manifolds that
are virtual products admit maps of non-zero degree from direct products.
Remark 1.8. We note that we could have included non-aspherical geometries as well in the above
statement, however those geometries are not interesting for the domination-by-products question,
either because they are products themselves or because their representatives are simply connected.
The latter geometries were contained as trivial examples in [26], where we constructed maps from
products to every simply connected 4-manifold.
Acknowledgements. Most of the content of this paper stems by a large part of author’s thesis,
which was defended in Munich. The author is grateful to his advisor, Dieter Kotschick, for his wise
guidance and support. Among several other people, the author is particularly grateful to Clara Löh
and to Shicheng Wang for useful discussions and many suggestions; Shicheng Wang’s previous
numerous works on maps of non-zero degree have been a great source of inspiration and have
strongly influenced this research project. The financial support of the Deutscher Akademischer
Austausch Dienst (DAAD) is also gratefully acknowledged.
2. BACKGROUND
AND
P RELIMINARIES
In this section, we give a short description of the background of the topic of this paper, explain
the notation, and give some elementary properties of groups presentable by products.
2.1. The domination relation. In the early 1940s, Steenrod raised the question of whether every n-dimensional integral homology class can be realized as the image of the fundamental class
of a closed oriented n-dimensional manifold under a continuous map [7, Problem 25]. About a
decade later, Thom answered affirmatively Steenrod’s question in degrees up to six, and found a
7-dimensional integral homology class which is not realizable by a closed manifold. (Since then,
other non-realizability results have been obtained.) Nevertheless, Thom proved that, in all degrees,
some multiple of each integral homology class can be realized by a closed smooth manifold [33].
In this paper, we are interested in the realization of fundamental classes of closed oriented manifolds (especially by direct products of manifolds), and therefore we deal with the notion of the
degree of a continuous map. Namely, suppose that f : M −→ N is a continuous map between two
closed oriented n-dimensional manifolds. The degree of f is defined to be the integer d so that
Hn (f ; Z)([M]) = d · [N], where [M] ∈ Hn (M; Z) and [N] ∈ Hn (N; Z) denote the fundamental
classes of M and N respectively. Whenever d is not zero, we say that M dominates N (or that M
d-dominates N), and write M ≥ N (or M ≥d N). The degree of f is denoted by deg(f ). Unless
otherwise stated, in this paper we consider continuous maps between the homotopy types of closed
oriented connected manifolds.
Gromov suggested to investigate the domination relation as defining an ordering of manifolds
and as a tool to understand the values of functorial semi-norms on homology, most notably the
simplicial volume [14, 13, 4]. The simplicial volume of a closed manifold M is completely determined by the classifying space of the fundamental group, Bπ1 (M), because the classifying map
8
CHRISTOFOROS NEOFYTIDIS
of the universal covering, cM : M −→ Bπ1 (M), induces an isometry H∗ (cM ; Q) : H∗ (M; Q) −→
H∗ (Bπ1 (M); Q) with respect to the simplicial ℓ1 -norm [13]. This gives rise to the following definition:
Definition 2.1 ([13]). A closed oriented connected n-dimensional manifold M is called rationally
essential if Hn (cM ; Q)([M]) 6= 0 ∈ Hn (Bπ1 (M); Q), where cM : M −→ Bπ1 (M) classifies the
universal covering of M. Otherwise, M is called rationally inessential.
Clearly, every closed aspherical manifold is rationally essential. In fact, the notion of essentialness expands widely the class of aspherical manifolds, because for example every connected sum
containing a rationally essential summand is rationally essential itself, and every manifold with
non-zero simplicial volume is rationally essential [13].
2.2. Kotschick-Löh’s non-domination criterion. Gromov conjectured that there might exist certain classes of (rationally essential) manifolds which are not dominated by products, pointing out
irreducible locally symmetric spaces of non-compact type as potential candidates; cf. [14, Chapter 5G+ ]. Kotschick and Löh [20] verified Gromov’s suggestion, by finding a condition on the
fundamental groups of rationally essential manifolds that are dominated by products:
Definition 2.2 ([20]). An infinite group Γ is called presentable by products if there is a homomorphism ϕ : Γ1 × Γ2 −→ Γ onto a finite index subgroup of Γ so that the restriction of ϕ to each factor
Γi has infinite image ϕ(Γi ).
The property of being (not) presentable by products is clearly preserved under passing to finite
index subgroups.
Example 2.3.
(1) A reducible group is obviously presentable by products, being a virtual product of two
infinite groups.
(2) Let Γ be a group which contains a finite index subgroup Γ with infinite center. Then Γ is
presentable by products through the multiplication homomorphism C(Γ) × Γ −→ Γ.
These two examples include every torsion-free group presentable by products [20, Prop. 3.2].
Suppose now that M is a rationally essential n-dimensional manifold and let f : X1 ×X2 −→ M
be a map of non-zero degree, where the Xi are closed oriented manifolds of positive dimensions.
Consider the induced map π1 (f ) : π1 (X1 ) × π1 (X2 ) −→ π1 (M) and set
Γ := im(π1 (f )) ⊂ π1 (M) and Γi := im(π1 (f |Xi )) ⊂ Γ
for the image of π1 (f ) and the images under π1 (f ) of the restrictions of f to the two factors
Xi respectively. The multiplication map ϕ : Γ1 × Γ2 −→ Γ is then a well-defined surjective
homomorphism, because the Γi commute element-wise and Γ1 ∪ Γ2 generates Γ. Moreover, the
outer commutative diagram in Figure 1 implies that X1 × X2 is rationally essential [20].
Let cXi : Xi −→ Bπ1 (Xi ) be the classifying maps of the universal coverings of the Xi and
Bπ1 (f |Xi ) : Bπ1 (Xi ) −→ BΓi be the maps induced by π1 (f |Xi ) on the level of classifying spaces.
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
f
X1 × X2
cX1 ×X2
Bϕ
❤❤❤❤
❤❤❤❤
❤
❤
❤
❤
❤❤❤❤
❤❤❤❤
M
(Bπ1 (f |X1 )◦cX1 )×(Bπ1 (f |X2 )◦cX2 )
BΓ1 × BΓ2
33
Bπ1 (X1 × X2 )
//
9
cM
//
66
Bπ1 (M)
Bπ1 (f )
F IGURE 1. Domination by products on the level of classifying spaces.
Also, let Bϕ : BΓ1 × BΓ2 −→ BΓ be the map induced by ϕ; here we apply the homotopy
equivalence BΓ1 ×BΓ2 ≃ B(Γ1 ×Γ2 ). We then have for i = 1, 2 the maps Bπ1 (f |Xi )◦cXi : Xi −→
BΓi , and the corresponding rational homology classes
(1)
αi := Hdim Xi (Bπ1 (f |Xi ) ◦ cXi )([Xi ]) ∈ Hdim Xi (BΓi ; Q),
where [Xi ] denote the fundamental classes of the factors Xi . According to this notation, the key
observation of Kotschick and Löh [20], shown in the commutative rectangle of Figure 1, is
0 6= deg(f ) · Hn (cM )([M]) = Hn (Bϕ)(α1 × α2 ).
This means that the αi are not trivial and therefore the Γi are both infinite. In particular, Γ is
presented by the product ϕ : Γ1 × Γ2 −→ Γ. This proves the following:
Theorem 2.4 (Kotschick-Löh [20]). If M is a rationally essential manifold and π1 (M) is not
presentable by products, then M is not dominated by products.
Remark 2.5. A consequence of Theorem 2.4 is that Gromov’s prediction was indeed correct.
Namely, a locally symmetric space of non-compact type is dominated by a product if and only if it
is virtually (isometric to) a product; cf. [20, Cor. 4.2].
2.3. Groups presentable by products. We end this preliminary section with some elementary
properties of groups presentable by products, mainly as introduced in [20, Section 3].
If a group Γ is presentable by a product through a homomorphism ϕ : Γ1 × Γ2 −→ Γ, then
the images ϕ(Γi ) commute with each other and ϕ(Γ1 ) ∪ ϕ(Γ2 ) generates im(ϕ). This means that,
whenever a group Γ is presented by a product ϕ : Γ1 × Γ2 −→ Γ, we can replace each Γi by its
image ϕ(Γi ), Γ by its finite index subgroup im(ϕ) and ϕ by the multiplication map. Therefore we
may always assume that Γ can be presented by two element-wise commuting subgroups Γi through
the multiplication map. The following properties can be easily verified:
10
CHRISTOFOROS NEOFYTIDIS
Lemma 2.6 ([20, Lemma 3.3]). Suppose Γ1 , Γ2 are element-wise commuting subgroups of Γ so
that Γ1 ∪Γ2 generates Γ. Then the multiplication map ϕ : Γ1 ×Γ2 −→ Γ is a well-defined surjective
homomorphism and the following statements hold:
(1) the intersection Γ1 ∩ Γ2 is a subgroup of the center C(Γ);
(2) the kernel of ϕ is isomorphic to the Abelian group Γ1 ∩ Γ2 .
In particular, there exists a short exact sequence
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ Γ −→ 1,
(2)
where the isomorphism between Γ1 ∩ Γ2 and the kernel of ϕ is given by the antidiagonal. For
groups with finitely generated center we moreover observe the following:
Lemma 2.7. Let Γ be a finitely generated group with finitely generated center. Assume that Γ is
presented by a product Γ1 × Γ2 as in Lemma 2.6. Then each of the factors Γi is finitely generated.
Proof. For i, j ∈ {1, 2}, i 6= j, there exist (two) short exact sequences
1 −→ Γi −→ Γ −→ Γj /(Γ1 ∩ Γ2 ) −→ 1,
(3)
where Γ −→ Γj /(Γ1 ∩Γ2 ) is obtained by composing the isomorphism Γ ∼
= (Γ1 ×Γ2 )/(Γ1 ∩Γ2 ) (cf.
sequence (2)) with the homomorphism induced by the projection from Γ1 ×Γ2 to Γj (see also [21]).
Since Γ is finitely generated, the short exact sequence (3) implies that the group Γj /(Γ1 ∩ Γ2 )
is also finitely generated. Moreover, the center C(Γ) is finitely generated Abelian and thus the
intersection Γ1 ∩ Γ2 is also finitely generated Abelian by Lemma 2.6. This shows that Γj is also
finitely generated.
3. T HE
CASE OF REDUCIBLE GROUPS ( PROOF OF
T HEOREM A)
If M is a closed aspherical n-dimensional manifold whose fundamental group π1 (M) is reducible, then there exists a finite cover of M with fundamental group isomorphic to a direct product Γ1 × Γ2 . Thus, up to finite covers, we may identify π1 (M) with Γ1 × Γ2 . Then BΓ1 × BΓ2
is homotopy equivalent to M. In particular, there exists a non-trivial class α ∈ Hn (BΓ1 × BΓ2 )
mapping to the fundamental class [M] ∈ Hn (M).
Since each of the Γi has infinite index in π1 (M) and M is aspherical manifold of dimension n,
a theorem of Strebel [32] implies that the cohomological dimensions of each of the Γi is less than
n. Thus, the Künneth formula (with rational coefficients) in degree n for the product BΓ1 × BΓ2
implies that there exist non-trivial homology classes a1 ∈ Hk (BΓ1 ) and a2 ∈ Hn−k (BΓ2 ), where
0 < k < n, such that α = a1 ⊗ a2 .
By Thom’s theorem [33], there exist two closed smooth manifolds X1 and X2 of dimensions
k and n − k respectively, together with continuous maps gi : Xi −→ BΓi , i = 1, 2, such that
H∗ (gi )([Xi ]) = di · ai , for some non-zero integers di . Finally, the product map
g1 ×g2
X1 × X2 −→ BΓ1 × BΓ2 ≃ M
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
11
is continuous and in homology of degree n maps the fundamental class [X1 × X2 ] to a non-zero
multiple of [M]. This finishes the proof of Theorem A.
4. C IRCLE
BUNDLES WITH FUNDAMENTAL GROUPS NOT
( PROOFS
OF
T HEOREMS B
AND
IIPP
C)
The purpose of this section is to introduce (in more detail) the property IIPP and prove Theorems
B and C.
4.1. Motivation and definition of the property IIPP. Two basic examples of groups presentable
by products are given by the reducible ones and by groups containing a finite index subgroup with
infinite center; cf. Example 2.3. If follows by Lemma 2.6 that these two - not generally distinct classes contain all torsion-free groups presentable by products [20, Prop. 3.2].
A reducible group Γ can always be presented (being a virtual product) by a product Γ1 × Γ2
so that both subgroups Γi have infinite index in Γ, whereas a group with infinite center does not
generally have this property; a trivial example is given by the infinite cyclic group. On the topological level, Theorem 2.4 states that whenever a rationally essential manifold M is dominated by a
product, its fundamental group is presentable by products. However, (the proof of) that result does
not give any additional information on the index of the factors of a product presenting π1 (M). The
following example shows that all the possibilities can actually occur:
Example 4.1.
(1) Let M be a closed oriented manifold of positive dimension and infinite fundamental group.
The identity map idM ×M of the product M × M is obviously π1 -surjective of degree one
and both subgroups im(π1 (idM )) = π1 (M) have infinite index in π1 (M × M).
(2) For g ≥ 1, let Σg+1 = Σg #(Sa1 × Sb1 ) be a closed oriented surface of genus g + 1. Let the
composition
(4)
q
id∨p
Σg #(Sa1 × Sb1 ) −→ Σg ∨ (Sa1 × Sb1 ) −→ Σg ∨ Sb1 ,
where q is the quotient map pinching to a point the essential circle defining the connected
sum Σg #(Sa1 × Sb1 ), id is the identity map of Σg and the map p pinches to a point the
meridian of the torus Sa1 × Sb1 ; cf. Figure 2. Denote by h the composition (id ∨ p) ◦ q. Now,
let the composite map
h×id
g
Σg+1 × Sc1 −→c (Σg ∨ Sb1 ) × Sc1 −→ Σg × Sc1 ,
where idc is the identity map of Sc1 and g is the identity on Σg and Sc1 , and sends the
generator b of Sb1 to the generator c of Sc1 . Let f := g ◦ (h × idc ) : Σg+1 × Sc1 −→ Σg × Sc1 .
Then H3 (f )([Σg+1 × S 1 ]) = [Σg × S 1 ], i.e. deg(f ) = 1. By the definition of f , we obtain
an index-one subgroup of π1 (Σg × S 1 ), namely im(π1 (f |Σg+1 )) = π1 (Σg × S 1 ), and the
infinite-index subgroup im(π1 (f |S 1 )) = π1 (S 1 ) ⊂ π1 (Σg × S 1 ).
12
CHRISTOFOROS NEOFYTIDIS
q
id∨p
−→
−→
F IGURE 2. The map (id ∨ p) ◦ q : Σg+1 −→ Σg ∨ Sb1
(3) Let two copies of a closed oriented surface of genus three,
Σ3 = (Sg11 × Sg12 )#(Sa11 × Sa12 )#(Sb11 × Sb12 )
Σ′3 = (Sg11′ × Sg12′ )#(Sa1′1 × Sa1′2 )#(Sb1′1 × Sb1′2 ).
As in the previous example (cf. Figure 2), define h : Σ3 −→ (Sg11 × Sg12 ) ∨ Sa12 ∨ Sb12 as the
composition
q
id∨p∨p
Σ3 −→ (Sg11 × Sg12 ) ∨ (Sa11 × Sa12 ) ∨ (Sb11 × Sb12 ) −→ (Sg11 × Sg12 ) ∨ Sa12 ∨ Sb12
(see above for the notation). Now, let the composition
g
h×h′
Σ3 × Σ′3 −→ ((Sg11 × Sg12 ) ∨ Sa12 ∨ Sb12 ) × ((Sg11′ × Sg12′ ) ∨ Sa1′2 ∨ Sb1′2 ) −→ Sg11 × Sg12 × Sg11′ × Sg12′ ,
where h, h′ are defined above, and g restricts to the identity map on each Sg1j and Sg1′ , and
j
is given as follows on the rest of the circles:
a2 7→ g1′ , b2 7→ g2′ , a′2 7→ g1 , b′2 7→ g2 .
We define f : Σ3 × Σ′3 −→ T 4 to be the composition g ◦ (h × h′ ). Again, f is a degree
one map. However, both im(π1 (f |Σ3 )) and im(π1 (f |Σ′3 )) are now of index one in π1 (T 4 ).
We note that this construction cannot be generalized when the target is not a product of
two tori, T 2 × T 2 , because the generators of higher genus surfaces do not commute with
each other. Actually, it will be transparent by the discussion in the upcoming subsection
(cf. Lemma 4.3), that, if an n-dimensional aspherical manifold M admits a map f : X1 ×
X2 −→ M so that both subgroups im(π1 (f |Xi )) ⊂ π1 (M) are of finite index, then M is a
virtual n-dimensional torus T n .
In this paper, we analyze groups presentable by products by adding a constraint on the index of
the presenting factors. More precisely, we introduce the following class of groups:
Definition 4.2. An infinite group Γ is called infinite-index presentable by products (IIPP) if there is
a homomorphism ϕ : Γ1 ×Γ2 −→ Γ onto a finite index subgroup of Γ so that for both factors Γi the
images ϕ(Γi ) ⊂ Γ are of infinite index in Γ. Otherwise, Γ is called not infinite-index presentable
by products (not IIPP).
In the upcoming subsection, we will show that an aspherical manifold with fundamental group
not IIPP can be dominated by a product only if it is dominated by a product containing a torus
factor. This will imply that large classes of aspherical manifolds with fundamental groups not IIPP
cannot be dominated by products. In the case of circle bundles, we will prove that, under a certain
assumption on the fundamental group of the base, the condition “IIPP” characterizes aspherical
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
13
circle bundles that are dominated by products. Without that additional assumption on the base, this
characterization does not generally hold (as we have already mentioned in Example 1.7).
4.2. Not IIPP as a non-domination criterion (proof of Theorem B). We first extend the nonexistence results of [20] to certain rationally essential manifolds with fundamental groups presentable by products, but not IIPP. The strong feature of such torsion-free groups is that one of the
presenting subgroups must be Abelian:
Lemma 4.3. Let Γ be a finitely generated torsion-free group with finitely generated center. Suppose
that there exist element-wise commuting subgroups Γ1 , Γ2 ⊂ Γ so that Γ1 ∪ Γ2 generates Γ. If Γ is
not IIPP, then one of the Γi is isomorphic to Zk for some k ≤ rankC(Γ).
Proof. By Lemma 2.6, there is a short exact sequence
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ Γ −→ 1,
where ϕ is the multiplication map and the intersection Γ1 ∩ Γ2 is contained in the finitely generated
center C(Γ). Since Γ is torsion-free, we have that Γ1 ∩ Γ2 is isomorphic to Zk for some k ≤
rankC(Γ). Moreover, each Γi is finitely generated by Lemma 2.7.
Because Γ is not IIPP, one of the Γi , say Γ1 , must have finite index in Γ. This means that Γ2 is
virtually Γ1 ∩ Γ2 , and so it is virtually Abelian. Moreover, the intersection Γ1 ∩ Γ2 is central in Γ2 ,
which implies that Γ2 /C(Γ2 ) is finite (because Γ2 is virtually Γ1 ∩ Γ2 ). By Schur’s theorem [29],
we conclude that the commutator [Γ2 , Γ2 ] is also finite and so trivial, because Γ2 is torsion-free.
This shows that Γ2 is Abelian itself and thus isomorphic to Zk .
As a warm-up, we observe that, in the torsion-free case, Lemma 4.3 yields the following dimension restrictions on the factors of a product that dominates a rationally essential manifold:
Proposition 4.4. Let M be a rationally essential manifold so that π1 (M) is torsion-free and
rankC(π1 (M)) = r. If π1 (M) is not IIPP, then there is no π1 -surjective non-zero degree map
X1 × X2 −→ M, whenever min{dim X1 , dim X2 } > r.
Proof. Suppose that there exist X1 , X2 closed oriented manifolds of positive dimensions and a
π1 -surjective non-zero degree map f : X1 × X2 −→ M. Then there is a short exact sequence
(5)
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ π1 (M) −→ 1,
where ϕ is the multiplication map, Γi := π1 (f |Xi )(π1 (Xi )) and Γ1 ∩ Γ2 ⊂ C(π1 (M)); see Section
2.2. In particular, Γ1 ∩ Γ2 is isomorphic to Zk , for some k ≤ r = rankC(π1 (M)), because it
is torsion-free. We moreover observe that k ≥ 1, otherwise π1 (M) would be isomorphic to the
product Γ1 × Γ2 by (5) and so IIPP.
We now apply Lemma 4.3 to π1 (M) to conclude that one of the Γi , say Γ2 , is isomorphic to Zk .
This means that BΓ2 ≃ T k and by the non-vanishing (cf. Section 2.2) of
α2 := Hdim X2 (Bπ1 (f |X2 ) ◦ cX2 )([X2 ]) ∈ Hdim X2 (T k ; Q),
we deduce that dim X2 ≤ k. This is possible only if min{dim X1 , dim X2 } ≤ r.
14
CHRISTOFOROS NEOFYTIDIS
In the case where M is aspherical, then the above proposition says that, if f : X1 × X2 −→ M
is a π1 -surjective map of non-zero degree, then there is a finite cover M of M such that f factors
through the map Bϕ : M × T k −→ M which is induced by the multiplication homomorphism
ϕ : Γ1 × Γ2 −→ π1 (M), for some k ≤ rankC(π1 (M)); cf. Figure 1. In particular, there exist two non-trivial homology classes α1 ∈ Hdim X1 (M; Q) and α2 ∈ Hdim X2 (T k ; Q) such that
Hn (Bϕ)(α1 × α2 ) = deg(f ) · [M]. Thus X1 × T m ≥ M, where m = dim X2 ≤ k.
Example 4.5 (1-domination). Let M be a closed aspherical manifold. If π1 (M) has infinite cyclic
center and it is not IIPP, then M can admit a degree one map by a product X1 × X2 only if one of
the Xi is a circle. (Recall that a map of degree one is π1 -surjective.)
Aspherical manifolds whose fundamental groups have infinite cyclic center are of special interest, in particular with respect to the study of circle bundles and circle actions; see [3] and the
references there. We begin with two general facts about finite coverings of circle bundles:
π
Lemma 4.6. Let M −→ B be a circle bundle over a closed oriented manifold B.
p′
p
(1) Every finite cover M −→ M is a circle bundle over a finite cover B ′ −→ B. If moreover
B is aspherical and π1 (B) is not presentable by products, then π1 (M ) and π1 (M) have
infinite cyclic center.
(2) ([2]) If the Euler class of M is torsion, then M is a virtually trivial circle bundle over a
finite cover of B.
Proof. (1) Since π1 (p)(π1 (M )) has finite index in π1 (M) and π1 (π)(π1 (M)) = π1 (B), the imp′
age H := π1 (π ◦ p)(π1 (M )) has finite index in π1 (B). Let B ′ −→ B be the finite covering
π′
corresponding to H. Then π ◦ p lifts to M −→ B ′ , which is the desired circle bundle.
If B is aspherical, then the S 1 fiber is central in the fundamental group of M. If, in addition,
π1 (B) is not presentable by products, then it has trivial center (because it is torsion-free), and
so the center of π1 (M) is infinite cyclic. Now π1 (B ′ ) has finite index in π1 (B), and so it is not
presentable by products as well and therefore the center of π1 (M ) is also infinite cyclic.
(2) Consider the Abelianization H1 (B) = π1 (B)/[π1 (B), π1 (B)]. Since the Euler class of M is
torsion, the Universal Coefficient Theorem implies that the torsion part of H1 (B) is not trivial. Let
now the composition
π1 (B) −→ H1 (B) −→ TorH1 (B),
where the first map is the quotient map and the second is the projection to the torsion of H1 (B).
p′
If B ′ −→ B is the finite covering corresponding to the kernel of the above composition, then the
pullback bundle (p′ )∗ (M) is the product S 1 × B ′ ; see [2, Prop. 3] for more details.
p
Remark 4.7. Conversely to part (2) of the above lemma, let M = S 1 × B ′ −→ M be a finite
p′
cover, where B ′ −→ B is a finite covering between the bases (the map p′ is covered by p). The
Euler class of M is trivial, that is eM = H 2 (p′ ; Z)(eM ) = 0 ∈ H 2 (B ′ , Z), where eM ∈ H 2 (B; Z)
is the Euler class of M. By the fact that H 2 (p′ ; Q) is injective (since deg(p′ ) 6= 0), we conclude
that eM is torsion.
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
15
A basic ingredient of our proof is the following lemma which generalizes [22, Lemma 1]:
π
Lemma 4.8 (Factorization Lemma). Let M −→ B be a non-trivial n-dimensional circle bundle
over a closed oriented aspherical manifold B. Suppose that the Euler class of M is not torsion
and that the center of π1 (M) remains infinite cyclic in finite covers. Then X × S 1 M for any
closed oriented manifold X.
Proof. Since M is a non-trivial circle bundle whose integer Euler class eM ∈ H 2 (B; Z) is not
torsion, the rational Euler class of M is not trivial as well. The same property holds for every (fiber
preserving) finite cover of M, by Lemma 4.6 and Remark 4.7. By Poincaré duality, there exists
a non-trivial class α ∈ H n−3(B; Q) so that eM ⌣ α is a non-zero multiple of the cohomology
fundamental class ωB of B. Since H n−1 (B; Q) = Q, the Gysin sequence
H n−1 (π)
⌣e
M
· · · −→ H n−3(B; Q) −→
H n−1(B; Q) −→ H n−1(M; Q) −→ · · ·
implies that ker(H n−1(π)) = im(⌣ eM ) = H n−1 (B; Q). Therefore H n−1 (π) = 0.
Suppose now that there exists a non-zero degree map f : X × S 1 −→ M. After passing to a
finite cover, if necessary, we may assume that f is π1 -surjective and that the center of π1 (M) is
infinite cyclic. The latter means that the circle fiber of M represents (up to multiples) the only
central factor in π1 (M). By the surjectivity of π1 (f ), we deduce that the composite map π ◦ f
kills the homotopy class of the S 1 factor of the product X × S 1 , because this factor is central in
π1 (X × S 1 ). Since B is aspherical, we conclude that π ◦ f factors up to homotopy through the
projection p1 : X × S 1 −→ X. In particular, there is a continuous map g : X −→ B, so that
π ◦ f = g ◦ p1 up to homotopy. (We note that X is not necessarily aspherical. It is, however,
rationally essential, because f has non-zero degree and M is aspherical.)
Let ωX be the cohomology fundamental class of X. Since H n−1 (p1 ; Q)(ωX ) = ωX ∈ H n−1(X×
S 1 ; Q) and H n−1 (π; Q)(ωB ) = 0 ∈ H n−1(M; Q), the homotopy equation π ◦ f = g ◦ p1 implies
that g must be of zero degree. Let now the pullback of M under g:
g ∗M = {(x, y) ∈ X × M | g(x) = π(y)} .
The map f : X × S 1 −→ M factors through g ∗M as follows:
X × S 1 −→
g ∗M
π
2
−→
M
(x, t) 7→ (x, f (x, t)) 7→ f (x, t) .
However, the degree of the pullback map π2 : g ∗ M −→ M is zero, being equal to the degree of g,
which contradicts our assumption on deg(f ). This completes the proof.
We now finish the proof of Theorem B:
Proof of Theorem B. Since π1 (M) is not IIPP, M is a non-trivial circle bundle and, moreover, its
Euler class is not torsion by Lemma 4.6 (2). After passing to a finite cover, if necessary, suppose
16
CHRISTOFOROS NEOFYTIDIS
that there is a π1 -surjective non-zero degree map f : X1 × X2 −→ M, where dim Xi > 0 and
C(π1 (M)) = Z; cf. Lemma 4.6 (1). As before, there is a short exact sequence
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ π1 (M) −→ 1,
where Γi := im(π1 (f |Xi )) ⊂ π1 (M), ϕ is the multiplication map and Γ1 ∩ Γ2 ⊂ C(π1 (M)) = Z,
see Section 2.2.
Lemma 4.3 implies that one of the Γi , say Γ2 , must be infinite cyclic, because π1 (M) is not IIPP
and torsion-free. Therefore, BΓ2 ≃ S 1 and because the rational class
α2 := Hdim X2 (Bπ1 (f |X2 ) ◦ cX2 )([X2 ]) ∈ Hdim X2 (S 1 ; Q)
is not trivial we conclude that dim X2 = 1, i.e. X2 = S 1 . Now, we have a π1 -surjective dominant
map X1 × S 1 −→ M, where C(π1 (M)) = Z. The proof follows by Lemma 4.8.
4.3. A characterization for circle bundles (proof of Theorem C). A main motivation for Theorem 2.4 was to show that non-positively curved manifolds which are not virtual products are not
dominated by products. Actually, the property “fundamental group presentable by products” suffices for domination by products for non-positively curved manifolds (of dimension higher than
one) and it is equivalent to “reducible”; cf. [20, Theorem 4.1]. Another consequence of the results
of [20], which moreover deals with manifolds that do not admit any metric of non-positive sectional curvature (cf. [18]), concerns fibrations whose fiber and base have fundamental groups not
presentable by products:
π
Theorem 4.9 ([20, Theorem 5.1]). Let F −→ M −→ B be a fiber bundle whose fiber F and base
B are closed oriented aspherical manifolds with fundamental groups not presentable by products.
Then M is dominated by products if and only if it is a virtual product F ′ × B ′ , where F ′ and B ′
are finite covers of F and B respectively.
Corollary 4.10 ([20, Cor. 5.3]). Let M be a closed oriented 4-manifold which is the total space of
a surface bundle whose fiber F and base B are both hyperbolic surfaces. Then the following are
equivalent:
(1)
(2)
(3)
(4)
M is dominated by a non-trivial product of closed oriented manifolds;
M is virtually diffeomorphic to a trivial surface bundle;
π1 (M) is reducible;
π1 (M) is presentable by products.
Remark 4.11. The fact that hyperbolic groups are not presentable by products is proved in [20].
Moreover, we note that 4-manifolds satisfying one (and therefore every) property in the above
corollary constitute the class of closed reducible H2 × H2 -manifolds; cf. Section 6.1.
Now, if we replace the fiber F by S 1 in Theorem 4.9, then π1 (M) is presentable by products
having infinite cyclic center. Theorem C, which is a partial converse of Theorem B, says that the
conclusion of Theorem 4.9 still holds when the fiber is S 1 . However, domination by products is
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
17
now equivalent to the conditions “π1 (M) IIPP” and “π1 (M) reducible”; compare with the equivalence between (3) and (4) of Corollary 4.10.
Proof of Theorem C. Since B is aspherical, M is also aspherical and its fundamental group fits
into a short exact sequence
(6)
π1 (π)
1 −→ π1 (S 1 ) −→ π1 (M) −→ π1 (B) −→ 1,
where π1 (S 1 ) is in the center of π1 (M). Moreover, π1 (B) has trivial center, because it is torsionfree and not presentable by products. Thus C(π1 (M)) = π1 (S 1 ) = Z.
Suppose that there is a non-zero degree map f : X1 × X2 −→ M. After passing to a finite cover,
if necessary, we may assume that f is π1 -surjective. (The finite cover of M is a circle bundle with
infinite cyclic center, by Lemma 4.6 (1).) As before, we have a short exact sequence
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ π1 (M) −→ 1,
where Γi := im(π1 (f |Xi )) ⊂ π1 (M) and Γ1 ∩ Γ2 ⊂ C(π1 (M)) = Z. Moreover, we obtain two
non-trivial rational homology classes
αi := Hdim Xi (Bπ1 (f |Xi ) ◦ cXi )([Xi ]) 6= 0 ∈ Hdim Xi (BΓi ; Q),
see Sections 2.2 and 2.3 for the details.
The composite homomorphism
π1 (π)
ϕ
Γ1 × Γ2 −→ π1 (M) −→ π1 (B) ∼
= π1 (M)/π1 (S 1 )
maps one of the Γi , say Γ1 , to the neutral element of π1 (B), because π1 (B) is not presentable by
products and torsion-free. This means that Γ1 is contained in C(π1 (M)) = π1 (S 1 ) = Z and it is
therefore isomorphic to C(π1 (M)) = Z. In particular, BΓ1 ≃ BZ = S 1 and so the non-vanishing
of α1 ∈ Hdim X1 (S 1 ; Q) implies that dim X1 ≤ 1. Since dim X1 > 0, we have that X1 = S 1 , i.e.
S 1 × X2 ≥ M. It follows by Lemma 4.8 that M is a virtual product and, more precisely, that it is
finitely covered by a product S 1 × B ′ for some finite cover B ′ −→ B. Thus (1) implies (2). The
converse is trivially true and so (1) is equivalent to (2).
Next, we show that the properties (2) and (3) are equivalent. Obviously (2) implies (3). Assume
now that π1 (M) is reducible. Then there exists a finite cover M ′ −→ M so that π1 (M ′ ) is isomorphic to a direct product ∆1 × ∆2 , where ∆i are non-trivial (and therefore infinite) subgroups
of π1 (M ′ ). The cover M ′ is a circle bundle over a finite cover B ′ of B, where π1 (B ′ ) is not presentable by products being a finite index subgroup of π1 (B); cf. Lemma 4.6 (1). We therefore
obtain a short exact sequence
(7)
1 −→ π1 (S 1 ) −→ ∆1 × ∆2 −→ π1 (B ′ ) −→ 1,
where π1 (S 1 ) = C(π1 (M ′ )) ∼
= C(∆1 ) × C(∆2 ). Since π1 (B ′ ) is not presentable by products
and torsion-free, one of the ∆i , say ∆1 , maps trivially to π1 (B ′ ) ∼
= π1 (M ′ )/π1 (S 1 ) in (7). Thus
∆1 ⊂ π1 (S 1 ) (and so ∆1 is isomorphic to Z) and ∆2 surjects onto π1 (B ′ ). Moreover, π1 (S 1 ) maps
trivially to ∆2 , otherwise ∆2 would have finite index in π1 (M ′ ), which is impossible, because
18
CHRISTOFOROS NEOFYTIDIS
π1 (M ′ ) ∼
= ∆1 × ∆2 and both ∆i are infinite. Therefore ∆2 maps isomorphically onto π1 (B ′ ). We
have now proved that π1 (M ′ ) ∼
= π1 (S 1 × B ′ ) and so M ′ is homotopy equivalent to S 1 × B ′ . Thus
(3) implies (2).
Finally, the equivalence between (3) and (4) follows from the more general group-theoretic
Theorem D, whose proof is given in the upcoming section.
Remark 4.12. An alternative argument for the last step in the proof of the implication (3) ⇒ (2)
is the following: Having that ∆1 maps trivially to π1 (B ′ ) ∼
= π1 (M ′ )/π1 (S 1 ), we conclude that
π1 (S 1 ) maps trivially to ∆2 because the center of π1 (M ′ ) ∼
= ∆1 × ∆2 is infinite cyclic, isomorphic
1
to π1 (S ). Actually, taking for granted that the circle fiber of M ′ is the only central factor in
π1 (M ′ ), we can relax the condition “not presentable by products” for the fundamental group of the
base B ′ to “irreducible”.
Also, note that after showing the implication (1) ⇒ (2) and since the implication (2) ⇒ (3) is
trivial, we can deduce the equivalence of (1), (2) and (3) by Theorem A (which gives the implication (3) ⇒ (1)).
This discussion yields a topological example of groups not IIPP in any dimension:
Corollary 4.13. If M is a circle bundle with non-trivial rational Euler class over a closed aspherical manifold B so that π1 (B) is not presentable by products, then π1 (M) is not IIPP.
Proof. Since π1 (B) is not presentable by products, π1 (M) is IIPP if and only if it is reducible, by
the equivalence between (3) and (4) in Theorem C (or by Theorem D below). However, π1 (M) is
not reducible, otherwise M would be covered by S 1 × B ′ , for some finite cover B ′ −→ B (by the
equivalence between (2) and (3) of Theorem C), which is impossible because the Euler class of M
is not torsion; cf. Remark 4.7.
5. T HE IIPP
PROPERTY AS A CRITERION FOR REDUCIBILITY ( PROOF OF
T HEOREM D)
In this section we show that the properties “IIPP” and “reducible” are equivalent for a group Γ,
whenever Γ/C(Γ) is not presentable by products.
Proof of Theorem D. Since every reducible group is IIPP, we only need to show that the converse
is also true when the quotient of our group by its center is not presentable by products.
Let Γ be an IIPP group such that Γ/C(Γ) is not presentable by products. Since Γ is IIPP, there
exists a finite index subgroup Γ ⊂ Γ and two element-wise commuting subgroups Γ1 , Γ2 ⊂ Γ of
infinite index such that Γ = Γ1 Γ2 . Thus we obtain the following composite surjective homomorphism
Γ1 × Γ2 −→ Γ −→ Γ/Γ ∩ C(Γ),
whose image Γ/Γ ∩ C(Γ) is of finite index in Γ/C(Γ). In particular, Γ/Γ ∩ C(Γ) is not presentable
by products. Thus, for one of the Γi , say for Γ2 , the quotient Γ2 /Γ2 ∩C(Γ) is finite. Since Γ2 ∩C(Γ)
is central in Γ2 , we deduce that Γ2 is virtually C(Γ2 ), in particular it is virtually Abelian.
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
19
We claim that [Γ : Γ1 C(Γ2 )] < ∞. First, we have that
Γ = Γ1 Γ2 = Γ1 C(Γ2 )Γ2 .
(8)
Next, we observe that
(9)
Γ1 C(Γ2 ) ∩ Γ2 = C(Γ2 ).
Indeed, on the one hand it is clear that C(Γ2 ) ⊂ Γ1 C(Γ2 ) ∩ Γ2 . On the other hand, every element
in Γ1 C(Γ2 ) ∩ Γ2 is central in Γ2 , because it belongs to Γ2 and the Γi commute element-wise. By
(8), (9) and since Γ2 /C(Γ2 ) is finite, we obtain
[Γ : Γ1 C(Γ2 )] = [Γ2 : Γ1 C(Γ2 ) ∩ Γ2 ] = [Γ2 : C(Γ2 )] < ∞,
as claimed.
Let now the presentation of Γ1 C(Γ2 ) by
(10)
Γ1 ∩ C(Γ2 ) −→ Γ1 × C(Γ2 ) −→ Γ1 C(Γ2 ).
Since [Γ : Γ1 ] = ∞ and [Γ : Γ1 C(Γ2 )] < ∞, we conclude that
[C(Γ2 ) : Γ1 ∩ C(Γ2 )] = [Γ1 C(Γ2 ) : Γ1 ] = ∞.
Thus Γ1 C(Γ2 ) is isomorphic to the product Γ1 × (C(Γ2 )/Γ1 ∩ C(Γ2 )), where the quotient group
C(Γ2 )/Γ1 ∩ C(Γ2 ) is Abelian of positive rank.
Theorem D proves in particular the equivalence between (3) and (4) in Theorem C, for circle
bundles over aspherical manifolds with fundamental groups not presentable by products.
As pointed out in the introduction, the property IIPP on a group Γ is not anymore a criterion for
reducibility of Γ if the quotient Γ/C(Γ) is presentable by products. More precisely, we have seen
in Example 1.7 that the 5-dimensional Heisenberg group H5 – whose quotient H5 /C(H5 ) is Z4 –
is irreducible and not IIPP. This nilpotent group is realized as the fundamental group of a circle
bundle over T 4 . As we shall see in the next section (cf. Theorem E), dimension four is the sharp
dimension in which irreducible fundamental groups of solvable manifolds are not IIPP.
We note that the center of Γ in Theorem D can be assumed to be infinite, otherwise Γ is trivially
not presentable by products. At the other end, for groups whose every finite index subgroup has
finite center, the notions “presentable by products” and “IIPP” are equivalent:
Proposition 5.1. If every subgroup of finite index in Γ has finite center, then Γ is presentable by
products if and only if it is IIPP.
Proof. It suffices to show that presentability by products implies IIPP. Suppose that Γ1 , Γ2 are
commuting infinite subgroups of Γ and that there is a short exact sequence
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ Γ −→ 1,
where ϕ is the multiplication homomorphism and Γ1 ∩ Γ2 lies in the center of Γ; cf. Lemma 2.6.
Since C(Γ) is finite, we deduce that Γ1 ∩ Γ2 is also finite and so it has infinite index in both Γi .
The proof now follows by the short exact sequence (3) in the proof of Lemma 2.7.
20
CHRISTOFOROS NEOFYTIDIS
6. F UNDAMENTAL
GROUPS OF GEOMETRIC MANIFOLDS IN LOW DIMENSIONS
( PROOF
OF
T HEOREM E)
After the characterization of groups (not) IIPP in the preceding section (whose topology fits in
the concept of Theorem C), we now give further non-trivial examples of groups presentable by
products but not IIPP, which fit in the concept of Theorem B as well. These examples include
irreducible fundamental groups of low-dimensional solvable manifolds with infinite center. To
this end, we characterize in terms of the IIPP property the fundamental groups of all aspherical
geometric manifolds in dimensions ≤ 4. After Theorem D, the most prominent examples in the
present section (that are not covered by Theorem D) will be irreducible fundamental groups of
nilpotent manifolds, because the quotients of these groups by their center are still presentable by
products (being again nilpotent and torsion-free). We begin this section with a brief review of
Thurston’s geometries.
6.1. Enumeration of the low-dimensional geometries. Let Xn be a complete simply connected
n-dimensional Riemannian manifold. We say that a closed manifold M is an Xn -manifold, or that
M possesses the Xn geometry in the sense of Thurston, if it is diffeomorphic to a quotient of Xn
by a lattice Γ in the group of isometries of Xn (acting effectively and transitively). The group Γ
denotes the fundamental group of M. We say that Xn and Yn are the same geometries if there
exists a diffeomorphism ψ : Xn −→ Yn and an isomorphism Isom(Xn ) −→ Isom(Yn ) mapping
each g ∈ Isom(Xn ) to ψ ◦ g ◦ ψ −1 ∈ Isom(Yn ).
In dimension 1, the circle is the only closed manifold being a quotient of the real line R. In
dimension 2, a closed surface possesses one of the geometries S 2 , R2 or H2 . In dimension 3,
Thurston [34] proved that there exist eight (homotopically unique) geometries, namely the geomeg2 , H2 × R, Nil3 , R3 , S 2 × R and S 3 (see also [30]).
tries H3 , Sol3 , SL
The classification of the 4-dimensional geometries is due to Filipkiewicz [10]. According to
that, there exist eighteen geometries in dimension four with compact representatives. There is an
additional geometry which, however, cannot be realized by any compact 4-manifold. Here, we
deal only with the aspherical geometries, because the non-aspherical ones are not interesting for
domination by products. Namely, the non-aspherical geometries are either products of a sphere
with a non-compact factor (H2 × S 2 , R2 × S 2 , S 3 × R), or compact themselves (S 2 × S 2 , CP2 ,
S 4 ), and all of their representatives are dominated by products [17, 20, 26].
Enumeration of the aspherical geometries in dimension four. We enumerate the aspherical 4dimensional geometries, following Wall’s papers [36] and [37]. Our list is adapted to the dominationby-products question, and this list will be used as an organizing principle; see Table 1.
Hyperbolic geometries. There exist two aspherical irreducible symmetric geometries, namely the
real and the complex hyperbolic, denoted by H4 and H2 (C) respectively.
Product geometries. Seven of the aspherical geometries are products of lower dimensional geg2 × R, Nil3 × R, H2 × R2 , R4 and H2 × H2 . Closed manifolds
ometries: H3 × R, Sol3 × R, SL
possessing a geometry of type X3 × R satisfy the following property:
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
Type
Geometry X4
Hyperbolic
H4 , H2 (C)
Product
Solvable
non-product
21
H3 × R, Sol3 × R,
g2 × R, N il3 × R,
SL
H2 × R2 , R4 ,
H2 × H2
N il4 ,
4
4
Solm6
=n , Sol0
Sol14
TABLE 1. The 4-dimensional aspherical Thurston geometries with compact representatives.
Theorem 6.1 ([17, Sections 8.5 and 9.2]). Let X3 be a 3-dimensional aspherical geometry. A
closed 4-manifold possessing the geometry X3 × R is finitely covered by a product N × S 1 , where
N is a closed oriented 3-manifold carrying the geometry X3 .
The geometry H2 × H2 can be realized both by manifolds that are virtual products of two closed
hyperbolic surfaces and by manifolds that are not even (virtual) surface bundles. These two types
are known as the reducible and the irreducible H2 × H2 geometry respectively; see [17, Section
9.5] for further details and characterizations.
Solvable non-product geometries. Finally, there exist four aspherical non-product geometries of
solvable type. Below, we describe their model Lie groups.
4
3
The nilpotent Lie
group Nil
is defined as the semi-direct product R ⋊ R, where R acts on
0 t 0
3
R by t 7→ exp 0 0 t . The model spaces for the three non-product solvable – but not
0 0 0
nilpotent – geometries are defined as follows:
Let m and n be positive integers and a > b > c reals such that a + b + c = 0 and ea , eb , ec are
4
roots of the equation Pm,n (λ) = λ3 − mλ2 + nλ − 1 = 0. If m 6= n, the Lie group Solm6
=n is
at
e
0 0
defined as R3 ⋊R, where R acts on R3 by t 7→ 0 ebt 0 . We remark that the case m = n
0 0 ect
gives b = 0 and corresponds to the product geometry Sol3 × R.
22
CHRISTOFOROS NEOFYTIDIS
If we require two equal roots of the polynomial Pm,n , then we obtain the model space of the
4
Sol
again defined as R3 ⋊ R, where now the action of R on R3 is given by t 7→
0 geometry,
et 0
0
t
0 .
0 e
0 0 e−2t
The last solvable model space is an extension of R by the 3-dimensional Heisenberg group Nil3 .
4
3
3
Namely,the Lie group Sol
1 is defined as the semi-direct product Nil ⋊ R, where R acts on Nil
1 e−t x z
by t 7→ 0
1
et y .
0
0
1
4
3
Every closed Sol04 - or Solm6
=n -manifold is a mapping torus of a self-homeomorphism of T
and every closed oriented Nil4 - or Sol14 -manifold is a mapping torus of a self-homeomorphism
of a Nil3 -manifold [17, Sections 8.6 and 8.7]. We note that non-orientable closed Nil4 - or
Sol14 -manifolds are not mapping tori of Nil3 -manifolds [17, Theorem 8.9]. Further details about
manifolds possessing a solvable non-product geometry, in particular concerning their fundamental
groups, will be provided while examining each geometry individually.
A crucial property for our study is that the 4-dimensional geometries are homotopically unique
by a result of Wall; cf. [37, Theorem 10.1] and [19, Prop. 1]. In particular, a closed aspherical
geometric 4-manifold M is finitely covered by a closed X4 -manifold if and only if it possesses the
geometry X4 .
6.2. Proof of Theorem E in dimensions ≤ 3. Dimension 1 gives already the first (trivial) example of a solvable group presentable by products but not IIPP, namely the infinite cyclic group,
which is the fundamental group of S 1 . In dimension 2, the only non-trivial solvable fundamental
group of an oriented manifold is the fundamental group of T 2 which is the product Z × Z. The
fundamental groups of higher genus surfaces are (non-elementary) hyperbolic and therefore not
presentable by products as shown in [20].
We now deal with infinite fundamental groups of closed 3-manifolds. First, using Epstein’s
factorization theorem for 3-manifold groups [8] and the fact that not virtually cyclic free products
are not presentable by products [21], we obtain that the fundamental group of a closed 3-manifold
is presentable by products if and only if it has virtually infinite center [22, Theorem 8]. These two
properties are moreover equivalent to M being Seifert fibered (with infinite fundamental group),
by the Seifert fiber space conjecture, which was independently proven by Gabai and by CassonJungreis. Recall that a closed 3-manifold M (possibly with finite fundamental group) is Seifert
fibered if and only if it is virtually a circle bundle over a closed oriented surface, by the works
g2 ,
of Seifert, Thurston and Scott; cf. [34, 30]. Equivalently, M carries one of the geometries SL
H2 × R, Nil3 , R3 , S 2 × R or S 3 . Thus, we have the following consequence of [22, Theorem 8]:
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
23
Proposition 6.2 ([22]). Suppose M is a closed 3-manifold with infinite fundamental group. Then
π1 (M) is presentable by products if and only if M is a virtual circle bundle over a closed oriented
g2 , H2 × R, Nil3 or R3 .
surface. Equivalently, M possesses one of the geometries SL
However, if the circle fiber of M is not (virtually) a direct factor, i.e. if M is not modeled on
H × R or R3 , then π1 (M) cannot be IIPP:
2
Proposition 6.3. The fundamental group of a non-trivial circle bundle M over a closed oriented
aspherical surface Σ is not IIPP.
Proof. If Σ is hyperbolic, then π1 (M) fits into a non-split central extension
1 −→ Z −→ π1 (M) −→ π1 (Σ) −→ 1.
In particular, π1 (M) fulfills the conditions of Theorems C and D, because non-virtually cyclic
hyperbolic groups are not presentable by products [20]. By Epstein’s factorization theorem [8] and
Stallings fibering criterion [31], the fundamental group of a non-trivial circle bundle over a closed
oriented surface is never reducible, and so Theorem D implies that π1 (M) is not IIPP.
The remaining case is when Σ has genus one, i.e. when M is a non-trivial circle bundle over T 2
(and therefore a Nil3 -manifold). In that case, π1 (M) fits into a non-split central extension
1 −→ Z −→ π1 (M) −→ Z2 −→ 1,
where C(π1 (M)) = Z. Suppose that π1 (M) is IIPP. Then we may assume that there exist nontrivial infinite-index commuting subgroups Γ1 , Γ2 ⊂ π1 (M) and a short exact sequence
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ π1 (M) −→ 1,
where ϕ is the multiplication map and Γ1 ∩ Γ2 ⊂ C(π1 (M)). (Note that both Γi are torsionfree, because π1 (M) is torsion-free.) We observe that Γ1 ∩ Γ2 cannot be trivial, otherwise π1 (M)
would be Abelian (equivalently, M would be T 3 ). This means that Γ1 ∩ Γ2 must be isomorphic
to C(π1 (M)) = Z. Moreover, since [π1 (M) : Γi ] = ∞ and π1 (M) has cohomological dimension
three, we conclude that each of the Γi is of cohomological dimension at most two [32]. Now,
Γ1 ∩ Γ2 is central in both Γi which means that the quotients Γi /(Γ1 ∩ Γ2 ) are finitely generated
and virtually free groups Fki , by a result of Bieri [1, Cor. 8.7]. Passing to finite coverings, we may
assume that these quotient groups are free and therefore the central extensions
1 −→ Γ1 ∩ Γ2 −→ Γi −→ Fki −→ 1
split. We have finally reached the absurd conclusion that π1 (M) is virtually isomorphic to a direct
product Z × Fk1 × Fk2 .
Remark 6.4. The case of nilpotent groups in the above proposition could be treated in a different
way, using the Hirsch length, however, the dimensions here were suitable to appeal to Bieri’s [1]
result on central extensions. In fact, the cohomological dimension of a finitely generated torsionfree nilpotent group coincides to its Hirsch length [16]. We will return and use the Hirsch length
of nilpotent groups in Section 6.3.3.
24
CHRISTOFOROS NEOFYTIDIS
Because the fundamental group of S 2 × S 1 is infinite cyclic and therefore not IIPP, we have now
determined all fundamental groups of closed 3-manifolds that are (not) IIPP:
Corollary 6.5. Suppose that the fundamental group of a closed oriented 3-manifold M is infinite.
Then π1 (M) is IIPP if and only if it is reducible. Equivalently, π1 (M) is a virtual product π1 (Σ) ×
Z, where Σ is a closed oriented aspherical surface.
In particular, we have proved Theorem E in dimension three.
6.3. Proof of Theorem E in dimension four. We will prove Theorem E in dimension four in two
steps. First, we will determine which closed aspherical geometric 4-manifolds have fundamental
groups (not) presentable by products:
Theorem 6.6. The fundamental group of a closed aspherical geometric 4-manifold M is presentable by products if and only if M possesses one of the geometries X3 × R, Nil4 , Sol14 or the
reducible H2 × H2 geometry.
Then, Theorem E will follow as a consequence of the next characterization:
Theorem 6.7. The fundamental group of a closed aspherical geometric 4-manifold M is reducible
if and only if it is IIPP. Equivalently, M carries one of the product geometries X3 × R or the
reducible H2 × H2 geometry.
Groups presentable by products: Proof of Theorem 6.6. We proceed by examining case by
case all aspherical geometries, following the enumeration given at the beginning of this section
(cf. Table 1).
6.3.1. Hyperbolic geometries. As we have already seen (and used in the proof of Proposition 6.3),
non-virtually cyclic hyperbolic groups are not presentable by products; we refer to [20, Prop. 3.6]
for the details. Since the fundamental groups of closed 4-manifolds with hyperbolic geometries
H4 or H2 (C) are obviously not (virtually) infinite cyclic, we deduce that they are not presentable
by products.
6.3.2. Product geometries. An equivalent formulation of Theorem 6.1 is the following:
Corollary 6.8. The fundamental group of a closed aspherical 4-manifold M carrying a product
geometry X3 × R is a virtual product π1 (N) × Z, where N is a closed aspherical X3 -manifold. In
particular, π1 (M) is presentable by products and C(π1 (M)) is virtually infinite.
As mentioned previously, the geometry H2 × H2 is an exceptional type among the product
geometries, because not every closed H2 × H2 -manifold has a finite cover which is a product of
two closed hyperbolic surfaces. This property distinguishes closed H2 × H2 -manifolds into two
classes, the reducible and the irreducible ones. Since H2 × H2 -manifolds admit metrics of nonpositive sectional curvature, Theorem 4.1 of [20] implies that irreducible lattices in the group of
isometries of H2 × H2 are not presentable by products:
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
25
Proposition 6.9. The fundamental group of a closed H2 × H2 -manifold M is presentable by products if and only if it is a virtual product of two closed hyperbolic surface groups. Equivalently, M
carries the reducible H2 × H2 geometry.
6.3.3. Solvable non-product geometries. We finally deal with solvable non-product geometries,
4
4
4
i.e. the geometries Nil4 , Solm6
=n , Sol0 and Sol1 . As we shall see, only the fundamental groups of
closed manifolds modeled on the geometries Nil4 or Sol14 are presentable by products.
The geometry Nil4 .
Proposition 6.10. A closed Nil4 -manifold M is a virtual circle bundle over a closed oriented
Nil3 -manifold and the center of π1 (M) remains infinite cyclic in finite covers.
Proof. Let M be a closed Nil4 -manifold. After possibly passing to a double cover, we may assume
that M is oriented and so π1 (M) fits into a short exact sequence
1 −→ π1 (N) −→ π1 (M) −→ Z −→ 1,
where N is a closed oriented Nil3 -manifold and a generator t ∈ Z acts by conjugation on π1 (N);
cf. [17, Sections 8.6 and 8.7]. Passing to another finite cover, if necessary, we may assume that N
is a non-trivial circle bundle over T 2 with fundamental group
π1 (N) = hx, y, z | [x, y] = z, xz = zx, yz = zyi,
where C(π1 (N)) = hzi; cf. [30].
Since M is a Nil4 -manifold, the automorphism of π1 (N)/hzi ∼
= Z2 , induced by the action of
t ∈ Z on π1 (N),
! is given (after possibly passing to another finite cover) by a matrix (conjugate to)
1 k
A=
∈ GL2 (Z), for some k 6= 0; cf. [17, Theorem 8.7]. The relation xm y n = z mn y n xm
0 1
in π1 (N) gives the following presentation of π1 (M) (see also [11] and [35, pg. 522] for further
details):
π1 (M) = hx, y, z, t | txt−1 = x, tyt−1 = xk yz l , tzt−1 = z det A = z, [x, y] = z, xz = zx, yz = zyi,
where C(π1 (M)) = hzi. Thus we have a short exact sequence
(11)
1 −→ hzi −→ π1 (M) −→ Q −→ 1,
where Q = π1 (M)/hzi = hx, y, t | [t, y] = xk , xt = tx, xy = yxi. In particular, the classifying
space BQ is a non-trivial circle bundle over T 2 and thus a Nil3 -manifold. Now, the induced
sequence of the classifying spaces corresponding to (11) implies that M is homotopically a circle
bundle over BQ. Finally, the center of π1 (M) remains infinite cyclic in finite covers, generated by
multiples of z, because k 6= 0.
Remark 6.11. Since every non-trivial nilpotent group has non-trivial center and because the property of being “nilpotent” is closed under subgroups and quotient groups, the proof of the above
26
CHRISTOFOROS NEOFYTIDIS
proposition could be obtained using the fact that every nilpotent group of cohomological dimension three is either Abelian or isomorphic to Q (as in the above proof); see Proposition 6.19,
Lemma 6.20 and Remark 6.21.
Remark 6.12. Note that π1 (M) is (virtually) an extension of Z2 = hy, ti by Z2 = hz, xi, and
so M is (virtually) a T 2 -bundle over T 2 , whose T 2 -fiber contains the S 1 -fiber of the circle bundle
S 1 −→ M −→ BQ of the above proposition. It is a result of Ue [35, Theorem B] that every closed
Nil4 -manifold is a virtual T 2 -bundle over T 2 . We refer to a work of Fukuhara and Sakamoto [11]
for a classification of T 2 -bundles over T 2 .
We furthermore observe that π1 (M) is
(virtually) an extension
of Z = hyi by Z3 = hz, x, ti,
1 −1 −l
3
where the automorphism of Z is given by 0 1 −k and it has infinite order. In particular,
0 0
1
3
M is a (virtual) mapping torus of T ; see also [17, Section 8.6].
4
4
The geometries Solm6
=n and Sol0 .
Proposition 6.13. The fundamental group of a closed 4-manifold possessing one of the geometries
4
4
Solm6
=n or Sol0 is not presentable by products.
In order to prove Proposition 6.13, we will use the concept of “acentral” subgroups which was
introduced in [21]: A subgroup A of a group Γ is called acentral if for every non-trivial element
g ∈ A the centralizer CΓ (g) is contained in A. An acentral extension is an extension of groups
1 −→ N −→ Γ −→ Q −→ 1 such that the normal subgroup N is acentral.
Proposition 6.14 ([21, Prop. 3.2]). If a group contains an infinite acentral subgroup of infinite
index, then it is not presentable by products.
Proposition 6.14 implies that if an extension 1 −→ N −→ Γ −→ Q −→ 1 is acentral, with
N and Q infinite, then Γ is not presentable by products [21, Cor. 3.3]. Also, if Γ is a semi-direct
product N ⋊θ Q, where N is non-trivial Abelian and Q is infinite acting freely outside 0 ∈ N, then
the extension 0 −→ N −→ Γ −→ Q −→ 1 is acentral and N is infinite. In particular, Γ is not
presentable by products [21, Cor. 3.5]. This gives an alternative proof that Sol3 -manifold groups
are not presentable by products [21, Section 3].
4
4
Proof of Proposition 6.13. We will show that the fundamental groups of closed Solm6
=n - or Sol0 manifolds contain acentral subgroups of infinite index.
4
4
Every manifold M with geometry modeled on Solm6
=n or Sol0 is a mapping torus of a selfhomeomorphism of T 3 [17, Section 8.6] (see also [36, 37]) and its fundamental group is a semidirect product Z3 ⋊θ Z, where the automorphism θ of Z3 is induced by the action by conjugation
of a generator t ∈ Z.
4
Now, if M is a Solm6
=n -manifold, then θ has three real distinct eigenvalues and none of them is
equal to ±1, because M is neither nilpotent nor carries the Sol3 × R geometry (which is the case
m = n); cf. [36] and [17, pg. 164/165] (or Section 6.1).
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
27
If M is a Sol04 -manifold, then θ has two complex eigenvalues that are not roots of unity and a
real eigenvalue not equal to ±1; cf. [36] and [17, pg. 164/165] (or Section 6.1).
In both cases we derive that the centralizer Cπ1 (M ) (g) of each g ∈ Z3 \ {0} is contained in Z3 (it
is actually equal to Z3 ). This means that the infinite-index normal subgroup Z3 is acentral and so
π1 (M) is not presentable by products by Proposition 6.14 or [21, Cor 3.3 or Cor 3.5].
The geometry Sol14 .
Proposition 6.15. A closed Sol14 -manifold M is a virtual circle bundle over a mapping torus of T 2
with hyperbolic monodromy. In particular, π1 (M) is presentable by products.
Proof. Let M be a closed Sol14 -manifold. After passing to a double cover, we may assume that M
is oriented, and so its fundamental group fits into a short exact sequence
1 −→ π1 (N) −→ π1 (M) −→ Z −→ 1,
where N is a closed oriented Nil3 -manifold and a generator t ∈ Z acts by conjugation on π1 (N);
cf. [17, Sections 8.6 and 8.7]. If necessary, we pass to another finite cover of M and so we can
assume that the fiber N is a non-trivial circle bundle over T 2 and that its fundamental group has a
presentation
π1 (N) = hx, y, z | [x, y] = z, xz = zx, yz = zyi
with center C(π1 (N))
! = hzi; cf. [30].
a b
Let A =
∈ GL2 (Z) be the automorphism of π1 (N)/hzi ∼
= Z2 induced by the action
c d
of t ∈ Z on π1 (N). The eigenvalues λ1 , λ2 of A satisfy det(A) = λ1 λ2 = ±1. Actually, det A = 1,
because M is oriented. Moreover, λi 6= ±1, because π1 (M) is not nilpotent; see also [17, Theorem
8.7]. We conclude that A is a hyperbolic automorphism.
Now the relation xm y n = z mn y n xm in π1 (N) implies that a presentation of the fundamental
group of M is given by
π1 (M) = hx, y, z, t | txt−1 = xa y c z k , tyt−1 = xb y d z l , tzt−1 = z det A = z,
[x, y] = z, xz = zx, yz = zyi, k, l ∈ Z,
where the infinite cyclic group generated by z is central in π1 (M). Thus we obtain a short exact
sequence
(12)
1 −→ hzi −→ π1 (M) −→ Q −→ 1,
where Q = π1 (M)/hzi = hx, y, t | txt−1 = xa y c, tyt−1 = xb y d , xy = yxi. Clearly, the group Q
fits into an extension
1 −→ Z2 −→ Q −→ Z −→ 1,
!
a
b
where t ∈ Z acts on Z2 by the hyperbolic automorphism A =
. We have now shown
c d
that Q is the fundamental group of a mapping torus of T 2 with hyperbolic monodromy, i.e. BQ is
28
CHRISTOFOROS NEOFYTIDIS
a closed oriented Sol3 -manifold. Therefore, M is homotopically a circle bundle over BQ, by the
induced sequence in homotopy corresponding to the short exact sequence (12).
The proof of Theorem 6.6 is now complete.
Groups not IIPP: Proof of Theorem 6.7. Since reducible groups are IIPP, in order to complete
the proof of Theorem 6.7 we need to show that the fundamental groups of manifolds modeled on
Nil4 or Sol14 are not IIPP.
Closed Nil4 -manifolds. Since torsion-free nilpotent groups have infinite center, an immediate consequence of Proposition 6.10 (see also Proposition 6.19) is the following:
Lemma 6.16. The fundamental group of a closed Nil4 -manifold is not a virtual product.
In the preceding section (Proposition 6.3), we showed that closed Nil3 -manifolds have fundamental groups not IIPP using Bieri’s results [1], since the cohomological dimensions of those
groups (and of their subgroups) were suitable for that purpose. Passing now one dimension higher,
we cannot appeal anymore to those results. However, instead of the cohomological dimension,
we may use the Hirsch length (which is in fact equal to the cohomological dimension for finitely
generated torsion-free nilpotent groups by a theorem of Gruenberg, cf. [16, §8.8]). The Hirsch
length generalizes the notion of the rank of free Abelian groups:
Definition 6.17 ([16]). Let Γ be a (virtually) polycyclic group with a series
Γ = Γ0 ⊃ Γ1 ⊃ · · · ⊃ Γn = 1,
so that the quotients Γi /Γi+1 are cyclic. The sum of the ranks of these quotients is independent of
the choice of the series of groups and is called the Hirsch length of Γ. We denote the Hirsch length
of Γ by h(Γ).
Example 6.18. A finitely generated torsion-free nilpotent group Γ is polycyclic, admitting a central
series Γ = Γ0 ⊃ Γ1 ⊃ · · · ⊃ Γn = 1, so that the quotients Γi /Γi+1 are infinite cyclic for all
i = 0, 1, ..., n − 1. Therefore Γ has a well-defined Hirsch length (equal to n).
The following proposition gives some basic properties of nilpotent groups and their Hirsch
length. For a proof see [27, pg. 75–77].
Proposition 6.19. Let Γ be a finitely generated nilpotent group.
(1) If Γ is torsion-free, then C(Γ) has positive rank and Γ/C(Γ) is torsion-free.
(2) If K is a normal subgroup of Γ, then K and Γ/K are finitely generated nilpotent and
(a) h(Γ) = h(K) + h(Γ/K); (b) h(K) = h(Γ) if and only if [Γ : K] < ∞.
Using Proposition 6.19, we determine all torsion-free nilpotent groups of Hirsch length three.
Lemma 6.20. A torsion-free nilpotent group Γ of Hirsch length three is isomorphic to Gn :=
hx, y, z | zy = yz, zx = xz, [x, y] = z n i, for some n ≥ 0. In particular, Γ is the fundamental
group of a circle bundle over T 2 .
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
29
Proof. First, we observe that Γ is finitely generated, because it is nilpotent of finite Hirsch length.
Moreover, since Γ is torsion-free, we have that its center C(Γ) is free Abelian of positive rank, the
quotient group Q := Γ/C(Γ) is again nilpotent and torsion-free and the short exact sequence
(13)
1 −→ C(Γ) −→ Γ −→ Q −→ 1,
yields that 0 ≤ h(Q) ≤ 2, because h(C(Γ)) ≥ 1; cf Proposition 6.19.
If h(Q) = 0 or 1, then it is easy to see that Γ is free Abelian of rank three. Indeed, this is obvious
if h(Q) = 0. If h(Q) = 1, then Q is infinite cyclic, and therefore the central extension (13) splits.
Suppose, finally, that h(Q) = 2. Since Q is torsion-free nilpotent, it has non-trivial center C(Q).
Therefore, it fits into a short exact sequence
1 −→ C(Q) −→ Q −→ Q/C(Q) −→ 1,
where the quotient Q/C(Q) is again a torsion-free nilpotent group. By the additivity of the Hirsch
length for the above exact sequence, we deduce that h(Q/C(Q) ≤ 1. This finally implies that Q
is free Abelian of rank two. Therefore, the central extension (13) takes the form
1 −→ Z −→ Γ −→ Z2 −→ 1.
Choosing presentations Z = hzi and Z2 = hx, y | [x, y] = 1i, we deduce that Γ is isomorphic to
Gn for some n ≥ 0.
Remark 6.21. In the light of Gruenberg’s theorem [16, §8.8], Lemma 6.20 determines all finitely
generated nilpotent groups of cohomological dimension three. Moreover, it yields another proof of
the fact that closed Nil4 -manifolds are virtual circle bundles over closed oriented Nil3 -manifolds;
compare Proposition 6.10.
We now finish the proof that Nil4 -manifold groups are not IIPP:
Proposition 6.22. The fundamental group of a closed Nil4 -manifold M is not IIPP.
Proof. We know that π1 (M) is presentable by products and that M is virtually a non-trivial circle
bundle over a closed oriented Nil3 -manifold (cf. Proposition 6.10). We need to prove that π1 (M)
cannot be presented by a product of subgroups Γ1 and Γ2 so that both Γi have infinite index in
π1 (M). We proceed again by contradiction. After passing to suitable finite index subgroups,
suppose that there exist two infinite-index commuting subgroups Γi ⊂ π1 (M) and a short exact
sequence
(14)
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ π1 (M) −→ 1,
where ϕ is the multiplication map and Γ1 ∩ Γ2 ⊂ C(π1 (M)); cf. Section 2.3. Also we have
that C(π1 (M)) = Z (by Proposition 6.10) and that the Γi are finitely generated, torsion-free and
nilpotent.
Since π1 (M) is not reducible (Lemma 6.16), we conclude that the intersection Γ1 ∩ Γ2 is not
trivial and so it must be infinite cyclic, as a subgroup of C(π1 (M)) = Z. Also, Proposition 6.19
and Lemma 6.20 imply that the Hirsch length of π1 (M) is h(π1 (M)) = 4. Applying again the
30
CHRISTOFOROS NEOFYTIDIS
additivity of the Hirsch length to the short exact sequence (14), we have that h(Γ1 ×Γ2 ) = 5. Since
both Γi have infinite index in π1 (M), we deduce that h(Γi ) ≤ 3 by Proposition 6.19. Therefore, one
of the Γi must be of Hirsch length three and the other of Hirsch length two (again by Proposition
6.19). Let us assume that h(Γ1 ) = 3 and h(Γ2 ) = 2. Since Γ1 is a torsion-free nilpotent group
of Hirsch length three, Lemma 6.20 implies that Γ1 isomorphic to Gn for some n ≥ 0. Moreover,
Γ2 is isomorphic to Z2 , because it is torsion-free nilpotent of Hirsch length two (see the proof of
Lemma 6.20). We have now reached the conclusion that the rank of the center of Γ1 × Γ2 is at least
three. This is however not possible, according to the next lemma, because Γ1 × Γ2 is an extension
of π1 (M) by Z and C(π1 (M)) = Z.
Lemma 6.23. If a group Γ with finitely generated center C(Γ) fits into a central extension 1 −→
π
Zk −→ Γ −→ Q −→ 1, where Q is torsion-free, then rankC(Γ) ≤ rankC(Q) + k.
Proof. It follows by the fact that if x ∈ C(Γ), then π(x) ∈ C(Q).
Closed Sol14 -manifolds. We finally deal with the Sol14 geometry.
Proposition 6.24. The fundamental group of a closed Sol14 -manifold is not IIPP.
Proof. By Proposition 6.15, a closed Sol14 -manifold M is a virtual circle bundle over a closed
oriented Sol3 -manifold N. In particular, its fundamental group π1 (M) satisfies all the assumptions
of Theorem D (recall that π1 (N) is not presentable by products; see Proposition 6.2). Thus, π1 (M)
is IIPP if and only if it is a virtual product π1 (N)×Z. The latter is impossible by Wall’s uniqueness
theorem [37, Theorem 10.1].
This finishes the proof of Theorem 6.7 and therefore the proof of Theorem E.
7. D OMINATION
BY PRODUCTS IN DIMENSION FOUR ( PROOF OF
T HEOREM F)
In this section we determine which geometric 4-manifolds are (not) dominated by products. To
this end, we combine the algebraic results of the previous section with the topological statements
of Theorem 2.4 and Theorems B and C to prove Theorem F, which completes Hillman’s characterization of product geometries given in Theorem 6.1.
Proof of theorem F. Theorem 6.1 says that closed manifolds possessing one of the product geometries X3 × R are finitely covered by products of type N × S 1 . Moreover, closed manifolds carrying
the reducible H2 × H2 geometry are virtually products of closed hyperbolic surfaces. In particular,
all those manifolds are dominated by products. (Note that domination by products alone follows
by Theorem A as well.)
By Wall’s uniqueness theorem of the 4-dimensional geometries, it suffices to show that closed
4-manifolds possessing either a hyperbolic geometry, the irreducible H2 × H2 geometry, or a nonproduct solvable geometry cannot be dominated by products.
For the hyperbolic geometries H4 and H2 (C), the irreducible H2 ×H2 geometry, and the solvable
4
4
geometries Solm6
=n and Sol0 our claim can be deduced by Theorem 2.4, because the fundamental
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
31
groups of closed 4-manifolds carrying one of those geometries are not presentable by products; see
Section 6.3 for the details.
If now M is a closed Nil4 -manifold, then it is a virtual circle bundle over a closed oriented
Nil3 -manifold and the center of its fundamental group remains infinite cyclic in finite covers; cf.
Proposition 6.10. Moreover, π1 (M) is not IIPP, by Proposition 6.22, and so Theorem B implies
that M cannot be dominated by products.
Finally, if M is a closed Sol14 -manifold, then it is a virtual circle bundle over a closed oriented
Sol3 -manifold and π1 (M) is not IIPP; cf. Propositions 6.15 and 6.24 respectively. Therefore, M
is not dominated by products by Theorem C, because closed Sol3 -manifolds have fundamental
groups not presentable by products. (Equivalently, M is not dominated by products because of the
equivalence between (1) and (2) in Theorem C and by Wall’s uniqueness theorem.)
The proof is now complete.
Combining Theorem E with the characterizations of groups (infinite-index) presentable by products in Section 6, we obtain the following purely algebraic characterization:
Corollary 7.1. A closed oriented aspherical geometric 4-manifold M is dominated by a product
if and only if
(1) either π1 (M) is a virtual product π1 (N) × Z, for some closed aspherical geometric 3manifold N, or
(2) π1 (M) is a virtual product of two closed hyperbolic surface groups.
8. T HE 5- DIMENSIONAL H EISENBERG
MANIFOLD
In this section we give the first example of an aspherical manifold whose fundamental group is
IIPP and irreducible, and show that this manifold is not dominated by products.
Lemma 8.1. The 5-dimensional Heisenberg group
H5 = hx, y, u, v, z | [x, y] = [u, v] = z, all other commutei
is IIPP and irreducible.
Proof. We observe that the groups Γ1 = hx, y, z | [x, y] = z, xz = zx, yz = zyi and Γ2 =
hu, v, z | [u, v] = z, uz = zu, vz = zvi are infinite index subgroups of H5 that commute
element-wise, and Γ1 Γ2 = H5 . In particular, H5 is presented by the product Γ1 × Γ2 through
the multiplication homomorphism Γ1 × Γ2 −→ H5 . Thus H5 is IIPP.
Now we show that H5 is irreducible. First of all, H5 is not a product itself, otherwise its center
would have been of rank greater than 1, because subgroups of nilpotent groups are nilpotent themselves and torsion-free nilpotent groups have infinite center. Second, every finite index subgroup
H5 ⊂ H5 fits into a short exact sequence
1 −→ hz k i −→ H5 −→ Q −→ 1,
32
CHRISTOFOROS NEOFYTIDIS
where Q is a finite index subgroup of Z4 = H5 /hzi. In particular, Q is isomorphic to Z4 , generated
by some powers of x, y, u and v. If H5 were a direct product, then the relations [xm , y n ] = z mn and
[um , v n ] = z mn in H5 would imply that z is a torsion element. However, H5 is torsion-free and the
lemma follows.
The classifying space of H5 is a non-trivial circle bundle over T 4 , called the 5-dimensional
Heisenberg manifold.
Theorem 8.2. The Heisenberg manifold BH5 is not dominated by products.
Proof. Suppose, for contrast, that there exists a map of non-zero degree f : X1 × X2 −→ BH5
which is π1 -surjective, after possibly replacing BH5 by a finite cover; this cover will remain a
non-trivial circle bundle over T 4 with center C(H5 ) ∼
= Z, by Lemma 8.1. We have a short exact
sequence
(15)
ϕ
1 −→ Γ1 ∩ Γ2 −→ Γ1 × Γ2 −→ H5 −→ 1,
where Γi := im(π1 (f |Xi )) ⊂ H5 , Γ1 ∩ Γ2 ⊂ C(H5 ) = Z and ϕ is the multiplication homomorphism; see Sections 2.2 and 2.3 for the details. In particular, Γ1 ∩ Γ2 is isomorphic to Z, because
H5 is irreducible. Since the Γi are finitely generated torsion-free nilpotent groups, the above exact
sequence implies that it suffices (up to order) to examine what happens when the Hirsch length of
Γ1 takes the values one, two and three.
Case I. Suppose first that h(Γ1 ) = 1. Then X1 = S 1 (see the proof of Theorem C), and so
S 1 × X2 ≥ BH5 . The latter is not possible by the Factorization Lemma 4.8.
Case II. Next, suppose that h(Γ1 ) = 2. Then Γ1 is isomorphic to Z2 (see the proof of Lemma 6.20).
Since Γ2 is nilpotent and torsion-free, its center has positive rank. Thus rankC(Γ1 ×Γ2 ) ≥ 3, which
contradicts Lemma 6.23 because Γ1 × Γ2 fits into the short exact sequence (15), where Γ1 ∩ Γ2 and
C(H5 ) are both infinite cyclic.
Case III. The only remaining case is when h(Γ1 ) = 3. In that case, h(Γ2 ) = 3. By Lemma 6.20,
each of the groups Γi is isomorphic to some Gni = hx, y, z | [x, y] = z ni , xz = zx, yz = zyi, for
ni ≥ 0. As in Case II, none of the Γi can be Abelian of rank greater than 1, by Lemma 6.23. We
conclude that ni ≥ 1. According to the proof of Theorem 2.4 (cf. Section 2.2) and because BH5
is aspherical, there exist two non-trivial homology classes αi ∈ Hdim Xi (BΓi ; Q) such that
H5 (Bϕ)(α1 × α2 ) = deg(f ) · [BH5 ].
Moreover, we know by Case I that one of the Xi must have dimension two and the other dimension
three. Without loss of generality, suppose that dim X1 = 3 and dim X2 = 2. Recall that, for n ≥ 1,
every Gn is realizable by a non-trivial circle bundle over T 2 . Therefore the cycle α1 ∈ H3 (BΓ2 ; Q)
is realized by such a nilpotent 3-manifold N and the cycle α2 ∈ H2 (BΓ2 ; Q) is realized by T 2 .
This means that there exists a continuous composite map
T 2 × N −→ BΓ1 × BΓ2 −→ BH5 ,
FUNDAMENTAL GROUPS OF ASPHERICAL MANIFOLDS AND MAPS OF NON-ZERO DEGREE
33
which in degree 5 homology maps the fundamental class [T 2 × N] to a non-trivial multiple of
[BH5 ]. In particular, the product S 1 × (S 1 × N) dominates BH5 which is impossible as we have
seen in Case I.
After having examined all the possibilities for the groups Γ1 and Γ2 , we conclude that BH5
cannot be dominated by products.
R EFERENCES
1. R. Bieri, Homological dimension of discrete groups, Second edition. Queen Mary College Mathematical Notes,
Queen Mary College, Department of Pure Mathematics, London, 1981.
2. J. Bowden, The topology of symplectic circle bundles, Trans. Amer. Math. Soc., 361 (2009), no. 10, 5457–5468.
3. S. Cappell, S. Weinberger and M. Yan, Closed aspherical manifolds with center, J. Topol., 6 (2013), no. 4, 1009–
1018.
4. J. A. Carlson and D. Toledo, Harmonic mappings of Kähler manifolds to locally symmetric spaces, Inst. Hautes
Études Sci. Publ. Math., 69 (1989), 173–201.
5. P. Eberlein, Lattices in spaces of nonpositive curvature, Ann. of Math. (2), 111 (1980), no. 3, 435–476.
6. P. Eberlein, Isometry groups of simply connected manifolds of nonpositive curvature II, Acta Math., 149 (1982),
no. 1-2, 41–69.
7. S. Eilenberg, On the problems of topology, Ann. of Math. (2), 50 (1949), 247–260.
8. D. B. A. Epstein, Factorization of 3-manifolds, Comment. Math. Helv., 36 (1961), 91–102.
9. B. Farb and S. Weinberger, Isometries, rigidity and universal covers, Ann. of Math., 186 (2008), no. 3, 915–940.
10. R. Filipkiewicz, Four-dimensional geometries, PhD thesis, University of Warwick, 1983.
11. S. Fukuhara and K. Sakamoto, Classification of T 2 -bundles over T 2 , Tokyo J. Math., 6 (1983), no. 2, 310–327.
12. D. Gromoll and J. A. Wolf, Some relations between the metric structure and the algebraic structure of the fundamental group in manifolds of nonpositive curvature, Bull. Amer. Math. Soc., 77 (1971), 545–552.
13. M. Gromov, Volume and bounded cohomology, Inst. Hautes Études Sci. Publ. Math., 56 (1982), 5–99.
14. M. Gromov, Metric Structures for Riemannian and Non-Riemannian Spaces, With appendices by M. Katz, P.
Pansu and S. Semmes, translated from the French by S. M. Bates, Progress in Mathematics 152, Birkhäuser
Verlag, 1999.
15. M. Gromov, Singularities, expanders and topology of maps. I. Homology versus volume in the spaces of cycles,
Geom. Funct. Anal., 19 (2009), no. 3, 743–841.
16. K. W. Gruenberg, Cohomological topics in group theory, Lecture Notes in Mathematics 143, Springer-Verlag,
Berlin-New York, 1970.
17. J. A. Hillman, Four-manifolds, geometries and knots, Geometry and Topology Monographs 5, Coventry, 2002.
18. M. Kapovich and B. Leeb, Actions of discrete groups on nonpositively curved spaces, Math. Ann., 306 (1996),
no. 2, 341–352.
19. D. Kotschick, Remarks on geometric structures on compact complex surfaces, Topology, 31 (1992), no. 2, 317–
321.
20. D. Kotschick and C. Löh, Fundamental classes not representable by products, J. London Math. Soc., 79 (2009),
545–561.
21. D. Kotschick and C. Löh, Groups not representable by products, Groups Geom. Dyn., 7 (2013), 181–204.
22. D. Kotschick and C. Neofytidis, On three-manifolds dominated by circle bundles, Math. Z., 274 (2013), 21–32.
23. W. Lück, L2 -invariants: theory and applications to geometry and K-theory, Springer-Verlag, Berlin, 2002.
24. W. Lück, Survey on aspherical manifolds, European Congress of Mathematics, Eur. Math. Soc., 53–82, 2010.
25. J. Milnor and W. Thurston Characteristic numbers of 3-manifolds Enseignement Math. (2), 23 (1977), no. 3-4,
249–254.
34
CHRISTOFOROS NEOFYTIDIS
26. C. Neofytidis, Branched coverings of simply connected manifolds, Topol. Appl., 178 (2014), 360–371.
27. C. Neofytidis, Non-zero degree maps between manifolds and groups presentable by products, Munich thesis,
2014, available online at http://edoc.ub.uni-muenchen.de/17204/.
28. C. Neofytidis, Ordering Thurston’s geometries by maps of non-zero degree, J. Topol. Anal. (to appear).
29. I. Schur, Über die Darstellung der endlichen Gruppen durch gebrochene lineare Substitutionen, Journal für die
reine und angewandte Mathematik, 127 (1904), 20–50.
30. P. Scott, The geometries of 3-manifolds, Bull. London Math. Soc., 15 (1983), 401–487.
31. J. Stallings, On fibering certain 3-manifolds, In Topology of 3-manifolds and related topics (Proc. The Univ. of
Georgia Institute, 1961), 95–100, Prentice-Hall, Englewood Cliffs, N.J., 1962.
32. R. Strebel, A remark on subgroups of infinite index in Poincaré duality groups, Comment. Math. Helv., 52 (1977),
no. 3, 310–314.
33. R. Thom, Quelques propriétés globales des variétés différentiables, Comment. Math. Helv., 28 (1954), 17–86.
34. W. P. Thurston, Three-Dimensional Geometry and Topology, Princeton University Press, 1997.
35. M. Ue, Geometric 4-manifolds in the sense of Thurston and Seifert 4-manifolds I, J. Math. Soc. Japan, 42 (1990),
511–540.
36. C. T. C. Wall, Geometries and geometric structures in real dimension 4 and complex dimension 2, In Geometry
and Topology (College Park, Md., 1983/84), Lecture Notes in Math., 1167, Springer, Berlin, (1985), 268–292.
37. C. T. C. Wall, Geometric structures on compact complex analytic surfaces, Topology, 25 (1986), no. 2, 119–153.
38. S. Wang, The existence of maps of non-zero degree between aspherical 3-manifolds, Math. Z., 208 (1991), 147–
160.
39. W. Zhang, Geometric structures, Gromov norm and Kodaira dimensions, Adv. Math. 308 (2017), 1–35.
D EPARTMENT OF M ATHEMATICAL S CIENCES , SUNY B INGHAMTON , B INGHAMTON , NY 13902-6000, USA
E-mail address: [email protected]
| 4math.GR
|
Distributed Cooperative Decision-Making in Multiarmed Bandits:
Frequentist and Bayesian Algorithms
arXiv:1606.00911v2 [cs.SY] 24 Sep 2016
Peter Landgren, Vaibhav Srivastava, and Naomi Ehrich Leonard
Abstract— We study distributed cooperative decision-making
under the explore-exploit tradeoff in the multiarmed bandit
(MAB) problem. We extend state-of-the-art frequentist and
Bayesian algorithms for single-agent MAB problems to cooperative distributed algorithms for multi-agent MAB problems in
which agents communicate according to a fixed network graph.
We rely on a running consensus algorithm for each agent’s
estimation of mean rewards from its own rewards and the
estimated rewards of its neighbors. We prove the performance
of these algorithms and show that they asymptotically recover
the performance of a centralized agent. Further, we rigorously
characterize the influence of the communication graph structure on the decision-making performance of the group.
I. I NTRODUCTION
Cooperative decision-making under uncertainty is ubiquitous in natural systems as well as in engineering networks.
A fundamental feature of decision-making under uncertainty
is the explore-exploit tradeoff: the decision-making agent
needs to learn the unknown system parameters (exploration),
while maximizing its parameter-dependent decision-making
objective (exploitation).
Multiarmed bandit (MAB) problems are canonical formulations of the explore-exploit tradeoff. In a stochastic MAB
problem a set of options (arms) is given. A stochastic reward
with an unknown mean is associated with each option. A
player can pick only one option at a time, and the player’s
objective is to maximize the cumulative expected reward over
a sequence of choices. In an MAB problem, the player needs
to balance the tradeoff between learning the mean reward at
each arm (exploration), and picking the arm with maximum
mean reward (exploitation).
MAB problems are pervasive across a variety of scientific
communities and have found application in diverse areas
including control and robotics [1], [2], ecology [3], [4], and
communications [5]. Despite the prevalence of the MAB
problem, the research on MAB problems has primarily
focused on policies for a single agent. The increasing importance of networked systems warrants the development
of distributed algorithms for multiple communicating agents
faced with MAB problems. In this paper, we build upon previous work by extending two popular single-agent algorithms
for the stochastic MAB problem to the distributed multiple
This research has been supported by ONR grant N00014-14-1-0635, ARO
grant W911NF-14-1-0431, and the DoD through the NDSEG Program.
P. Landgren and N. E. Leonard are with the Department of Mechanical
and Aerospace Engineering, Princeton University, Princeton, NJ, USA,
{landgren, naomi}@princeton.edu.
V. Srivastava is with the Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI, USA,
[email protected]
agent setting and analyze decision-making performance as a
function of the network structure.
The MAB problem has been extensively studied (see [6]
for a survey). In their seminal work, Lai and Robbins [7]
established a logarithmic lower bound on the expected number of times a sub-optimal arm needs to be selected by an
optimal policy in a frequentist setting. In another seminal
work, Auer et al. [8] developed the upper confidence bound
(UCB) algorithm for the stochastic MAB problem, which
achieves the lower bound in [7] uniformly in time.
The MAB problem has also been studied in the Bayesian
setting. Kaufmann et al. [9] proposed the Bayes-UCB algorithm and showed that it achieves Lai-Robbins’ lower bound
for Bernoulli rewards and uninformative priors. Reverdy et
al. [10] developed and analyzed the upper credible limit
(UCL) algorithm for correlated multiarmed bandits by applying the approach of [9] to the case of Gaussian rewards.
The classical single-agent MAB problem was extended by
Anantharam et al. [11] to the setting of multiple centralized
players. Recently, researchers [12], [13], [5] have studied the
decentralized multi-player MAB problem with no communication among agents. Kar et al. [14] investigated the multiagent MAB problem in a leader-follower setting. Here, we
use a running consensus algorithm [15] for assimilation of information. Running consensus has been used to study related
collective decision-making models in social networks [16].
In the present paper we study the distributed cooperative
MAB problem in which agents are faced with a stochastic
MAB problem and communicate their information with their
neighbors in an undirected and connected communication
graph. We use a set of running consensus algorithms for
cooperative estimation of the mean reward at each arm, and
we design an arm selection heuristic that leads to an orderoptimal performance for the group. The major contributions
of this paper are as follows.
First, we propose and thoroughly analyze the coop-UCB2
and coop-UCL algorithms. We derive bounds on decisionmaking performance for the group and characterize the
influence of the network structure on performance. To predict
nodal performance, we propose a measure of nodal “exploreexploit centrality,” which depends on the location of the node
in the graph.
Second, we demonstrate that the ordering of nodes by
performance predicted by our explore-exploit centrality measure matches the order obtained using numerical simulations.
We also show that the incorporation of priors that are wellinformative about the correlation structure markedly improve
performance.
The remainder of the paper is organized as follows. In
Section II we introduce the cooperative MAB problem. In
Section III we recall a cooperative estimation algorithm. We
review the coop-UCB algorithm in Section IV, and propose
and analyze the improved coop-UCB2 and new coop-UCL
algorithms. We illustrate our analytic results with numerical
examples in Section VI. We conclude in Section VII.
II. C OOPERATIVE M ULTIARMED BANDIT P ROBLEM
Consider an MAB problem with N arms and M decisionmaking agents. The reward associated with arm i ∈
{1, . . . , N } is a random variable with an unknown mean mi .
Let the communication topology of agents be modeled by an
undirected graph G in which each node represents an agent
and edges represent the communication between agents. Let
A ∈ RM ×M be the adjacency matrix associated with G and
let L ∈ RM ×M be the corresponding Laplacian matrix. We
assume that the graph G is connected, i.e., there exists a path
between each pair of nodes.
Let the k-th agent choose arm ik (t) at time t ∈ {1, . . . , T }
and receive a reward rk (t). The objective of each decisionmaker k is to choose using its local information a sequence
of arms {ik (t)}t∈{1,...,T } such that the total expected cumuPM PT
lative reward k=1 t=1 mik (t) is maximized, where T is
the horizon length of the sequential allocation process.
For an MAB problem, the expected regret of agent k
at time t is defined by Rk (t) = mi∗ − mik (t) , where
mi∗ = max{mi | i ∈ {1, . . . , N }}. The collective
objective of the M decision-makers can be equivalently
defined
minimizing the expected
regret defined
PMas P
PM Pcumulative
T
N
k
k
by
R
(t)
=
∆
E[n
i
i (T )], where
k=1
t=1
k=1
i=1
k
ni (T ) is the total cumulative number of times arm i has
been chosen by agent k until time T and ∆i = mi∗ − mi
is the expected regret due to picking arm i instead of arm
i∗ . It is known that the regret of any algorithm for an MAB
problem is asymptotically lower bounded by a logarithmic
function of the horizon length T [7], [11], i.e., no algorithm
can achieve an expected cumulative regret smaller than a
logarithmic function of horizon length as T → ∞.
In this paper, we focus on Gaussian rewards, i.e., the
reward at arm i is sampled from a Gaussian distribution
with mean mi and variance σs2 . We assume that the variance
σs2 is known and is the same at each arm. In the context
of Gaussian rewards, the lower bound [11] on the expected
number of times a suboptimal arm i is selected by a fusion
center that has access to reward for each agent is
M
X
k=1
E[nki (T )] ≥
2σ 2
s
∆2i
+ o(1) ln T.
(1)
In the following, we will design policies that sample a
suboptimal arm i within a constant factor of the above bound.
III. C OOPERATIVE E STIMATION OF M EAN R EWARDS
In this section we recall the algorithm for cooperative estimation of mean rewards proposed in our earlier work [17].
A. Cooperative Estimation Algorithm
For distributed cooperative estimation of the mean reward
at each arm i, we employ two running consensus algorithms
to estimate (i) total reward provided at the arm, and (ii) the
total number of times the arm has been sampled.
Let ŝki (t) and n̂ki (t) be agent k’s estimate of the total
reward provided at arm i per unit agent and the total number
of times arm i has been selected until time t per unit agent,
respectively. Using ŝki (t) and n̂ki (t) agent k can calculate
µ̂ki (t), the estimated empirical mean of arm i at time t as
µ̂ki (t) =
ŝki (t)
.
n̂ki (t)
(2)
Let ik (t) be the arm sampled by agent k at time t and let
ξik (t) = 1(ik (t) = i) where 1(·) is the indicator function,
which is equal to 1 if ik (t) = i and 0 otherwise. Define
rik (t) = rnd · 1(ik (t) = i), where rnd is a random variable
sampled from N (mi , σs2 ). Let P be a row stochastic matrix
given by
κ
P = IM −
L,
(3)
dmax
where IM is the identity matrix of order M , κ ∈ (0, 1]
is a step size parameter [18], dmax = max{deg(k) | k ∈
{1, . . . , M }}, and deg(k) is the degree of node k.
The estimates n̂ki (t) and ŝki (t)are updated locally using
running consensus [15] as follows:
n̂i (t + 1) = P n̂i (t) + P ξi (t),
and ŝi (t + 1) = Pŝi (t) + P ri (t),
(4)
(5)
where n̂i (t), ŝi (t), ξi (t), and ri (t) are vectors of n̂ki (t),
ŝki (t), ξik (t), and rik (t), k ∈ {1, . . . , M }, respectively.
B. Analysis of the Cooperative Estimation Algorithm
We now recall the performance of the
algorithm
Ptestimation
1
>
1
ξ
(τ
) be the
defined by (2–5). Let ncent
(t)
≡
i
i
τ =0 M
M
total number of times arm i has been
selected
per
unit
agent
Pt
1
>
1
r
(τ
)
be
the
total
until time t, and let scent
i
i (t) ≡ M
M
τ =0
reward provided at arm i per unit agent until time t. Also, let
λi denote the i-th largest eigenvalue of P , ui the eigenvector
corresponding to λi , udi the d-th entry of ui , and
√
M
X
|λp |
.
1
−
|λp |
p=2
√
Note that λ1 = 1 and u1 = 1M / M . Let us define
n =
+sum
νpj
=
M
M
X
(6)
udp udj 1((up u>
j )kk ≥ 0)
d=1
-sum
and νpj
=
M
X
udp udj 1((up u>
j )kk ≤ 0).
d=1
We also define
+sum
>
>
νpj (up uj )kk , if λp λj ≥ 0 & (up uj )kk ≥ 0,
-sum
bpj (k) = νpj
(up u>
if λp λj ≥ 0 & (up u>
j )kk ,
j )kk ≤ 0,
max
>
νpj |(up uj )kk |, if λp λj < 0,
(7)
max
-sum
+sum
where νpj
= max {|νpj
|, νpj
}. Furthermore, let
kc = M
M X
M
X
p=1 j=2
|λp λj |
bpj (k).
1 − |λp λj |
We note that both n and kc depend only on the topology
of the communication graph and are measures of distributed
cooperative estimation performance. We now recall the following result from [17].
Proposition 1 (Performance of cooperative estimation):
For the distributed estimation algorithm defined in (2–5),
the following statements hold
(i) the estimate n̂ki (t) satisfies
k
cent
ncent
i (t) − n ≤ n̂i (t) ≤ ni (t) + n ;
(ii) the estimator µ̂ki (t) is unbiased, i.e., E[µ̂ki (t)] = mi ;
(iii) the variance of the estimate µ̂ki (t) satisfies
Var[µ̂ki (t)] ≤
σs2 n̂ki (t) + kc
.
M (n̂ki (t))2
IV. F REQUENTIST C OOPERATIVE D ECISION -M AKING
In this section, we first review the coop-UCB algorithm
proposed in our earlier work [17]. We then improve on this
algorithm with a new algorithm: coop-UCB2. Unlike coopUCB the improved algorithm does not require each agent to
know the global graph structure. Finally, we compute bounds
on the performance of the group for this algorithm as a
function of the graph structure.
A. The coop-UCB Algorithm
The coop-UCB algorithm is analogous to the UCB algorithm [8], and uses a modified decision-making heuristic
that captures the effect of the additional information an agent
receives through communication with other agents as well as
the rate of information propagation through the network.
The coop-UCB algorithm is initialized by each agent
sampling each arm once and proceeds as follows. At each
time t, each agent k updates its cooperative estimate of the
mean reward at each arm using the distributed cooperative
estimation algorithm described in (2–5). Then, at time t each
agent k selects the arm with maximum Qki (t) = µ̂ki (t) +
Cik (t), where
s
n̂k (t) + k ln t
k
Ci (t) = σs 2γ i k c · k .
(8)
M n̂i (t) n̂i (t)
The coop-UCB provides a distributed, cooperative solution
to the MAB problem such that every agent in the network
achieves logarithmic regret. However, the heuristic Qki may
be overly restrictive in the sense that it requires the agent k to
know kc , which depends on the global graph structure. Further, agents with a relatively high kc are essentially forced to
explore more while better positioned agents exploit, leading
to wide disparities in performance across some networks. We
will develop the coop-UCB2 algorithm that addresses these
issues in the next section.
B. The coop-UCB2 Algorithm
The coop-UCB2 algorithm is initialized by each agent
sampling each arm once and proceeds as follows. At each
time t, each agent k updates its cooperative estimate of the
mean reward at each arm using the distributed cooperative
estimation algorithm described in (2–5). Then, at time t each
agent k selects the arm with maximum Qki (t) = µ̂ki (t) +
Cik (t), where
s
n̂k (t) + f (t) ln t
· k ,
(9)
Cik (t) = σs 2γ i
M n̂ki (t)
n̂i (t)
f (t) is an increasing sublogarthmic function, and γ > 1.
Note that the heuristic Qki requires the agent k to know the
total number of agents M , but not the global graph structure.
Theorem 1 (Regret of the coop-UCB2 Algorithm): For
the coop-UCB2 algorithm and the cooperative Gaussian
MAB problem, the number of times a suboptimal arm i is
selected by all agents until time T satisfies
s
M
X
4γσs2
∆2i M f (T )
k
E[ni (T )] ≤
1
+
1
+
ln T
∆2i
2γσs2 ln T
k=1
+M n +
M
X
1 + k
c
k=1
kc
k
c
(t†k ) 1+kc +
(t†k )1−γ
1
1
− k + † ,
γ−1
c
tk
where t†k = f −1 (kc ).
Proof: We proceed similarly to [8]. The number of selections
of a suboptimal arm i by all agents until time T is
M
X
k=1
nki (T ) ≤
M X
T
X
1(Qki (t) ≥ Qki∗ (t))
k=1 t=1
M X
T
X
≤η+
1(Qki (t) ≥ Qki∗ (t), M ncent
≥ η),
i
k=1 t=1
(10)
where η > 0 is a constant that will be chosen later.
At a given time t an individual agent k will choose a
suboptimal arm only if Qki (t) ≥ Qki∗ (t). For this condition
to be true at least one of the following three conditions must
hold:
µ̂i∗ (t) ≤ mi∗ − Cik∗ (t)
(11)
Cik (t)
2Cik (t).
(12)
µ̂i (t) ≥ mi +
mi∗ < mi +
(13)
We now bound the probability that (11) holds:
E[µ̂i∗ (t)] + Cik∗ (t) − mi∗
p
P((11) holds) = P z ≥
Var(µ̂ki∗ (t))
C k∗ (t)
=P z≥ p i
Var(µ̂ki∗ (t))
2
1
(Cik∗ (t))
≤ exp −
,
(14)
2
2Var(µ̂ki∗ (t))
where z is the standard Gaussian random variable and the
last inequality follows from the tail bounds for the error
function [19] and the second statement of Proposition 1.
We now examine the argument of (14). Note that
s
2γ ln t n̂ki∗ (t) + f (t)
1
Cik∗ (t)
p
= σs
k
M
n̂ki∗ (t)
Var(µ̂ki∗ (t))
Var(µ̂i∗ (t))
s
n̂i∗ (t) + f (t)
≥ σs 2γ ln t ·
.
n̂i∗ (t) + kc
Now for t > t†k ,
n̂i∗ (t)+f (t)
n̂i∗ (t)+k
c
≥ 1, and therefore
P((11) holds | t ≥ t†k ) ≤
the group as a function of the graph structure, and the
logarithmic portion of the bound is independent of agent
location. However, the constant factor is dependent on
the agent’s position in the network since it depends on
kc . In this sense, kc can be thought of as a measure of
“explore-exploit centrality,” which indicates that agents with
a higher kc will contribute more to the group’s regret.
1
.
2tγ
If t < t†k , then
(t)
1 − n̂n̂i∗∗+f
1 − 1
t i +kc ≤ t 1+kc .
2
2
P((11) holds | t < t†k ) ≤
It follows analogously that
V. BAYESIAN C OOPERATIVE D ECISION -M AKING
1
P((12) holds | t ≥ t†k ) ≤
2t
1
1 − 1+
†
k
c .
P((12) holds | t < tk ) ≤ t
2
We now examine the event (13).
mi∗ < mi + 2Cik (t)
∆2 M
=⇒ n̂ki (t)2 i 2 − γ n̂ki (t) ln(t) − γf (t) ln(t) < 0. (15)
8σs
The quadratic equation (15) can be solved to find the roots,
and if n̂i (t) is greater than the larger root the inequality will
never hold. Solving the quadratic equation (15), we obtain
that event (13) does not hold if
s
4γσ 2 ln(t) 2
4σs2 γ ln(t)
8σ 2
s
k
n̂i (t) ≥
+
+ 2 s f (t)γ ln(t)
2
2
∆i M
∆i M
∆i M
s
∆2 M f (t)
4σ 2 γ ln t
= s2
1 + 1 + i2
.
∆i M
2σs γ ln t
q
l
m
∆2i M f (T )
4σ 2 γ ln T
Now, we set η = M n + s∆2 (1+ 1 + 2γσ
2 ln T ) .
s
i
It follows from monotonicity of f (t) and ln(t) and statement (i) of Proposition 1 that event (13) does not hold if
M ncent
i (t) > η. Therefore, from (10) we get that
M
X
†
E[nki (T )]
≤η+
k=1
M tX
k −1
X
t=1
k=1
−
t
1
1+k
c
T
X
1
+
. (16)
tγ
†
t=tk
The argument of the first summation of the RHS yields
t†k −1
X
t
−
1
1+k
c
+
t=1
Z
t†k −1
−
t
Z
t=t†k
t=1
≤
1 + kc †
(tk )
kc
T
dt +
k
c
1+k
c
+
1
1
dt + 1 + †
tγ
tk
Qi (t) = νi (t) + σi (t)Φ−1 (1 − 1/t),
(17)
where νi (t) is the posterior mean and σi (t) the posterior
standard deviation of mean reward at time t. Φ−1 (·) is the
standard Gaussian inverse cumulative distribution function.
Let the prior on rewards from each arm be multivariate
Gaussian with mean vector ν0 ∈ RN and covariance matrix
Σ0 ∈ RN ×N . Then, the posterior mean and covariance of
mean reward at time t can be computed using the following
recursive update rule [20]:
(18)
where φ(t) and ν(t) are column vectors of φi (t) and νi (t),
respectively, and φi (t) is the indicator function of selecting
arm i at time t. The update equation (18) can be reduced to
1
1
1
1
− k + †.
†
γ−1
γ − 1 (t )
c
tk
Substituting into (16) then establishes the theorem.
Remark 1 (Asymptotic Regret for coop-UCB2): In
f (t)
limit t → +∞, ln(t)
→ 0+ , and
M
8σ 2 γ
X
s
E[nki (T )] ≤
+ o(1) ln T,
2
∆i
The UCL algorithm developed in [10] applies the approach
of Bayes-UCB [9] to correlated Gaussian bandits. The UCL
algorithm at each time computes the posterior distribution of
mean rewards at each option and then computes the (1−1/t)
upper-credible-limit for each arm, i.e., an upper bound that
holds with probability (1 − 1/t). The algorithm chooses the
arm with highest upper credible limit. For Gaussian rewards,
the (1 − 1/t) upper-credible-limit can be written as
r(t)φ(t)
+ Λ(t − 1)ν(t − 1)
σs2
φ(t)> φ(t)
Λ(t) =
+ Λ(t − 1), Σ(t) = Λ(t)−1
σs2
ν(t) = Σ(t)q(t),
T
X
1
tγ
†
1
1+k
c
A. The UCL Algorithm
q(t) =
t=tk
≤
In this section, we extend the coop-UCB2 algorithm to a
Bayesian setting and develop the coop-UCL algorithm. The
Bayesian setting allows us to model correlated bandits and
incorporate a priori knowledge about reward and correlation
structure in the Bayesian prior. We first recall the UCL algorithm proposed in [10], [9] and extend it to the cooperative
setting. We then analyze the performance of this algorithm
for an uninformative prior.
ν(t) = (Λ0 + Γ(t)−1 )−1 (Γ(t)−1 µ(t) + Λ0 ν0 )
the
k=1
and we recover the upper bound on regret for a centralized
agent as given in (1) within a constant factor.
Remark 2 (Performance of Individual Agents):
Theorem 1 provides bounds on the performance of
Λ(t) = Λ0 + Γ(t)−1 ,
Σ(t) = (Λ(t))−1 ,
(19)
where Λ0 = Σ−1
0 , Γ(t) is a diagonal matrix with entries
σs2
ni (t) , and µ(t) is the vector of µi (t), which is the empirical
mean of rewards from arm i ∈ {1, . . . , N } until time t. Note
that diagonal entries of Σ(t) are (σi (t))2 , i ∈ {1, . . . , N }.
B. The coop-UCL Algorithm
We now extend the UCL algorithm to the distributed
cooperative setting and propose the coop-UCL algorithm. In
the coop-UCL algorithm, each agent first computes an approximate posterior distribution of mean rewards conditioned
on rewards obtained by all the agents. To this end, each
agent uses the approximate frequentist estimator µ̂ki from
Section III in update equation (19).
Let the prior of agent k be a multivariate Gaussian
distribution with mean ν0k and covariance Σk0 . Let Σ̂k (t)
and ν̂ k (t) be the estimated covariance matrix and posterior
mean respectively at time t. Then, the coop-UCL algorithm
performs cooperative approximate Bayesian estimation:
ν̂ k (t) = (Λk0 + Γk (t)−1 )−1 (Γk (t)−1 µ̂k (t) + Λk0 ν0k )
Λ̂k (t) = Λk0 + Γk (t)−1 ,
Σ̂k (t) = (Λ̂k (t))−1 ,
(20)
where Γk (t) is a diagonal matrix with diagonal entries
σs2 /M n̂ki (t), i ∈ {1, . . . , N }, and Λk0 = (Σk0 )−1 .
After computing ν̂ k (t) and Σ̂k (t), the coop-UCL algorithm at time t requires each agent k to choose the option
with maximum (1 − α(t))-upper-credible-limit given by
Qki (t) = ν̂ik (t) + σ̂ik (t)Φ−1 (1 − α(t)),
(21)
where α(t) is defined such that
s
n̂ki (t) + f (t) −1
1
Φ−1 (1 − α(t)) =
,
Φ
1
−
tγ
n̂ki (t)
ν̂ik (t) is the i-th entry of ν̂ k (t), and (σ̂ik (t))2 is the i-th
diagonal entry of Σ̂k (t).
C. Regret of the coop-UCL Algorithm
We now derive bounds on the expected cumulative regret
for each agent using the coop-UCL algorithm for uninformative priors for each agent. For an uninformative prior,
Λk0 = 0, for each k ∈ {1, . . . , M }, and consequently,
ν̂ k (t) = µ̂k (t) and Σ̂k (t) = Γk (t).
Theorem 2 (Regret of the coop-UCL Algorithm): For
the Gaussian MAB problem and the coop-UCL algorithm
with uninformative priors for each agent, the number of
times a suboptimal arm i is selected by all agents until time
T satisfies
M
X
M
X
1 + k
k
c
(t† )1−γ 1 1
− +
kc
γ − 1 kc t†k
k=1
k=1
s
4γσs2 ln T
∆2i M f (t)
†
+max M n+
1+ 1 +
,tmax ,
∆2i
2σs2 γ ln T
E[nki (t)] ≤ 2
c
(t†k ) 1+kc +
where t†max = maxk∈{1,...,M } t†k .
Proof: For uninformative priors, coop-UCL is analogous to
coop-UCB2 with Cik (t) = σ̂ik (t)Φ−1 (1 − α(t)). Similar to
the proof of Theorem 1, we note that
C k∗ (t)
P((11) holds) = P z ≥ p i
Var(µ̂ki∗ )
s
n̂ki (t) + f (t) −1
1
≤P z≥
Φ
1−
. (22)
k
tγ
n̂i (t) + kc
It follows that for t ≥ t†k := f −1 (kc )
P((11) holds | t ≥ t†k ) ≤
1
.
tγ
Similarly, P((12) holds | t ≥ t†k ) ≤ t1γ .
We now examine the event (13). For a standard Gaussian
2
random variable z, P(z ≥ w) ≤ 21 e√−w /2 [19]. It follows
that for α ∈ [0, 0.5], Φ−1 (1 − α) ≤ −2 ln α.
Following the argument in the proof of Theorem 1 and using the upper bound on Φ−1 (·), we obtain that the event (13)
does not hold if
s
4σs2 γ ln t
∆2i M f (t)
k
n̂i (t) ≥
1
+
1
+
.
∆2i M
2σs2 γ ln t
q
m
l
∆2 M
4σ 2 γ ln T
1+ 1 + 2σi 2 γ fln(t)
and η =
We set η̄ = M n + s∆2
T
i
s
max{η̄, t†max }. The theorem follows by proceeding similarly
to the proof of Theorem 1.
VI. N UMERICAL I LLUSTRATIONS
In this section, we elucidate our theoretical analyses from
the previous sections with numerical examples. We first
demonstrate that the ordering of the performance of nodes
obtained through numerical simulations is identical to the
ordering predicted by the nodal explore-exploit centrality
measure: the larger the kc the lower the performance. We
then investigate the effect of the graph connectivity on the
performance of agents in random graphs.
For all simulations we consider a 10-armed bandit problem
with mean rewards drawn from a normal random distribution
with mean 75 and standard deviation 25. The sampling
standard deviation is σs = 30. These parameters were
selected to give illustrative results within the displayed time
horizon, but the relevant conclusions hold across a√wide
variation of parameters. The simulations used f (t) = ln t.
Example 1 (Regret on Fixed Graphs): Consider the set
of agents communicating according to the graph in Fig. 1(a)
and using the coop-UCB2 algorithm to handle the exploreexploit tradeoff in the distributed cooperative MAB problem.
The values of kc for nodes 1, 2, 3, and 4 are 2.31, 2.31, 0,
and 5.43, respectively. As noted in Remark 2, agent 3 should
have the lowest regret, agents 1 and 2 should have equal
and intermediate regret, and agent 4 should have the highest
regret. These predictions are validated in our simulations
shown in Fig. 1(a). The expected cumulative regret in our
simulations is computed using 5000 Monte-Carlo runs.
Fig. 1(b) demonstrates the relative performance differences
between coop-UCB, coop-UCB2, coop-UCL, and single
agent UCB with the same run parameters. Here the coopUCL algorithm is shown with an informative prior and no
correlation structure. Each agent in the coop-UCL simulation
shown here has Σ0 = 625 · IM and ν0 = 75 · 1M . The use
of priors markedly improves performance.
We now explore the effect of kc on the performance of an
agent in an Erdös-Réyni (ER) random graph. ER graphs are
a widely used class of random graphs where any two agents
are connected with a given probability ρ [21].
Expected Cumulative Regret
1200
1000
800
600
400
0
1
2
3
ǫkc
(a)
(b)
(c)
Fig. 1: (a) Simulation results comparing expected cumulative regret for different agents in the fixed network shown, using P as in (3) and κ = d dmax
.
max −1
Note that agents 1 and 2 have nearly identical expected regret. (b) Simulation results of expected cumulative regret for several different MAB algorithms
k
using the fixed network shown in Fig. 1(a). (c) Simulation results of expected cumulative regret as a function of normalized c for nodes in ER graphs at
T = 500. Also shown in red is the best linear fit.
Example 2 (Regret on Random Graphs): Consider a set
of 10 agents communicating according to an ER graph
and using the coop-UCB2 algorithm to handle the exploreexploit tradeoff in the aforementioned MAB problem. In
our simulations, we consider 100 connected ER graphs, and
for each ER graph we compute the expected cumulative
regret of agents using 1000 Monte-Carlo simulations with
ρ = ln(10)/10, P as in (3), and κ = dmax /(dmax − 1).
We show the behavior of the expected cumulative regret of
each agent as a function of the normalized kc in Fig. 1(c).
It is evident that increased kc results in a sharp decrease
in performance. Conversely, low kc is indicative of better
performance. This disparity is due to the relative scarcity of
information at nodes that are in general less “central.”
VII. F INAL R EMARKS
In this paper we used the distributed multi-agent MAB
problem to explore cooperative decision-making in networks.
We designed the coop-UCB2 and coop-UCL algorithms,
which are frequentist and Bayesian distributed algorithms,
respectively, in which agents do not need to know the
graph structure. We proved bounds on performance, showing
order-optimal performance for the group. Additionally, we
investigated the performance of individual agents in the
network as a function of the graph topology, using a proposed
measure of nodal explore-exploit centrality.
Future research directions include rigorously exploring
other communications schemes, which may offer better performance or be more suitable for modeling certain networked
systems. It will be important to consider the tradeoff between
communication frequency and performance as well as the
presence of noisy communications.
R EFERENCES
[1] V. Srivastava, P. Reverdy, and N. E. Leonard. Surveillance in an
abruptly changing world via multiarmed bandits. In IEEE CDC, pages
692–697, 2014.
[2] M. Y. Cheung, J. Leighton, and F. S. Hover. Autonomous mobile
acoustic relay positioning as a multi-armed bandit with switching
costs. In IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, pages
3368–3373.
[3] J. R. Krebs, A. Kacelnik, and P. Taylor. Test of optimal sampling by
foraging great tits. Nature, 275(5675):27–31, 1978.
[4] V. Srivastava, P. Reverdy, and N. E. Leonard. On optimal foraging
and multi-armed bandits. In Allerton Conference on Comm., Control,
and Computing, pages 494–499, 2013.
[5] A. Anandkumar, N. Michael, A. K. Tang, and A. Swami. Distributed
algorithms for learning and cognitive medium access with logarithmic regret. IEEE Journal on Selected Areas in Communications,
29(4):731–745, 2011.
[6] S. Bubeck and N. Cesa-Bianchi. Regret analysis of stochastic
and nonstochastic multi-armed bandit problems. Machine Learning,
5(1):1–122, 2012.
[7] T. L. Lai and H. Robbins. Asymptotically efficient adaptive allocation
rules. Advances in Applied Mathematics, 6(1):4–22, 1985.
[8] P. Auer, N. Cesa-Bianchi, and P. Fischer. Finite-time analysis of the
multiarmed bandit problem. Machine Learning, 47(2):235–256, 2002.
[9] E. Kaufmann, O. Cappé, and A. Garivier. On Bayesian upper
confidence bounds for bandit problems. In Int. Conf. on Artificial
Intelligence and Statistics, pages 592–600, 2012.
[10] P. B. Reverdy, V. Srivastava, and N. E. Leonard. Modeling human
decision making in generalized Gaussian multiarmed bandits. Proceedings of the IEEE, 102(4):544–571, 2014.
[11] V. Anantharam, P. Varaiya, and J. Walrand. Asymptotically efficient
allocation rules for the multiarmed bandit problem with multiple playspart I: I.I.D. rewards. IEEE Transactions on Automatic Control,
32(11):968–976, Nov 1987.
[12] D. Kalathil, N. Nayyar, and R. Jain. Decentralized learning for
multiplayer multiarmed bandits. IEEE Transactions on Information
Theory, 60(4):2331–2345, 2014.
[13] Y. Gai and B. Krishnamachari. Distributed stochastic online learning
policies for opportunistic spectrum access. IEEE Transactions on
Signal Processing, 62(23):6184–6193, 2014.
[14] S. Kar, H. V. Poor, and S. Cui. Bandit problems in networks:
Asymptotically efficient distributed allocation rules. In IEEE CDC
and ECC, pages 1771–1778, 2011.
[15] P. Braca, S. Marano, and V. Matta. Enforcing consensus while
monitoring the environment in wireless sensor networks. IEEE
Transactions on Signal Processing, 56(7):3375–3380, 2008.
[16] V. Srivastava and N. E. Leonard. Collective decision-making in ideal
networks: The speed-accuracy trade-off. IEEE Transactions on Control
of Network Systems, 1(1):121–132, 2014.
[17] P. Landgren, V. Srivastava, and N. E. Leonard. On distributed
cooperative decision-making in multiarmed bandits. In European
Control Conference, Aalborg, Denmark, 2016.
[18] R. Olfati-Saber and R. M. Murray. Consensus problems in networks
of agents with switching topology and time-delays. IEEE Transactions
on Automatic Control, 49(9):1520–1533, 2004.
[19] M. Abramowitz and I. A. Stegun, editors. Handbook of Mathematical
Functions: with Formulas, Graphs, and Mathematical Tables. Dover
Publications, 1964.
[20] S. M. Kay. Fundamentals of Statistical Signal Processing, Volume I :
Estimation Theory. Prentice Hall, 1993.
[21] B. Bollobás. Random Graphs. Springer, 1998.
| 3cs.SY
|
Stable Matching with Evolving Preferences∗
Varun Kanade†1 , Nikos Leonardos‡2 , and Frédéric Magniez§3
1
University of Oxford
University of Athens
3
CNRS and IRIF, Univ Paris Diderot, Sorbonne Paris-Cité, France
arXiv:1509.01988v2 [cs.GT] 28 Jun 2016
2
Abstract
We consider the problem of stable matching with dynamic preference lists. At each timestep, the preference list of some player may change by swapping random adjacent members.
The goal of a central agency (algorithm) is to maintain an approximately stable matching,
in terms of number of blocking pairs, at all time-steps. The changes in the preference lists
are not reported to the algorithm, but must instead be probed explicitly. We design an
algorithm that in expectation and with high probability maintains a matching that has at
most O((log n)2 ) blocking pairs.
1
Introduction
In the world of massive and distributed data, it is hardly reasonable to assume that data are
static. Yet, one must design algorithms that maintain a solution for a given problem that is
(approximately) consistent with the requirements, e.g., a permutation that is almost sorted.
Thus, it is important to design algorithms and data structures that are robust to changes in
their input, i.e., they produce an output with some performance guarantee (quickly).
There are a few different dynamic data models that have been considered. The area of
dynamic graph algorithms consists of maintaining some property or structure, such as connectivity, matchings, or spanning trees, even when the underlying graphs are changing [EGI99,
OR10, NS13, GP13]. Here, it is assumed that the changes to the graph may be arbitrary, but
are reported to the algorithm; and the focus is on designing data structures and algorithms that
adapt efficiently (typically in terms of computational time) to changes in the input. The area of
streaming algorithms studies the setting where the data can only be accessed as a stream and
the focus is on producing the desired output with highly space-efficient procedures (typically
poly-logarithmic in the size of the input). In the area of online algorithms, one must design
procedures that, even when data is revealed bit by bit, produce an output that is competitive
with algorithms that see the entire input at once.
Recently, Anagnostopoulos et al. [AKMU11] proposed the evolving data model to take into
account the dynamic aspects of massive data. In this model, the changes to the data are not
∗
Partially supported by the French ANR Blanc project ANR-12-BS02-005 (RDAM) and the European Commission IST STREP project Quantum Algorithms (QALGO) 600700. Most of the work was carried out when
V.K and N. L. were at LIAFA (now IRIF). During this time V.K. was supported by the Fondation Sciences
Mathmatiques de Paris (FSMP).
†
[email protected]
‡
[email protected]
§
[email protected]
1
revealed to the algorithm; instead, an algorithm has query access to the data. However, it
is assumed that the changes to the data are stochastic, not adversarial. In this setting, the
focus is not on computational complexity (which is allowed to be polynomial at each timestep), but query complexity, the number of probes made by the algorithm. Anagnostopoulos
et al. [AKMU11] studied the problem of maintaining the minimum element of a permutation
and an approximately sorted permutation, motivated by questions such as maintaining high
(page)-ranked pages. In their setup, a permutation evolves by choosing a random element and
swapping it with an adjacent element. In later work, Anagnostopoulos et al. [AKM+ 12] studied
evolving graph models and problems such as s-t connectivity and minimum spanning tree.
In this work, our aim is to bring this notion to game theory starting from the basic problem
of computing a stable matching. In other words, we introduce the notion of evolving agents,
who may not report any updates to their strategy (or preferences) without an explicit request.
In the stable matching problem, the input consists of two sets A, B of equal size, and for each
member a total order (preference) over members in the other set. Given a matching between A
and B, a pair (x, y) with x ∈ A and y ∈ B is blocking if they prefer each other to their matches.
A matching is stable if there are no blocking pairs. Gale and Shapley showed that a stable
matching always exists and can be found by an efficient algorithm [GS62]. We consider the
setting where the preference lists evolve over time. The preference lists can evolve over time,
by swapping adjacent elements. More precisely, while the algorithm can perform one query per
time-step, we assume that a total number of α swaps events also occur, where α = Θ(1) is
some fixed parameter, called the evolution rate. This assumption is similar to previous works
and models the critical regime: with less evolution events the input is basically static, and with
more the input evolves too fast. The goal is to maintain a matching that has few blocking pairs.
We summarize our results as follows. All three statements hold in expectation and with
high probability.
(i) Using the results of Anagnostopoulos et al. [AKMU11] for sorting permutations, we
design an algorithm that maintains a matching with at most O(n log n) blocking pairs,
at all time-steps after roughly the first n2 log n steps (Theorem 3.1). Also, we observe
that any analysis that uses their method as a black-box, cannot improve on this bound
(Remark 3.1).1
(ii) In a restricted setting, where only one side, say the B side, has evolving preference lists,
and if the A side has uniform random permutations as preference lists (known to the central
agency), we design an algorithm that maintains a matching with O(log n) blocking pairs
at all time-steps after roughly the first n log n steps (Theorem 3.2).
(iii) Finally, we design an algorithm in the general setting, that maintains a matching with
at most O((log n)2 ) blocking pairs at all time-steps after roughly the first n2 log n steps
(Theorem 4.1).
2
Preliminaries
In the rest of the paper, n ≥ 1 denotes an integer parameter and [n] the set of integers
{1, 2, . . . , n}. For a non-negative random variable X, parametrized by some integer n, we
write “X = O(f (n)) in expectation and with high probability” when for any constant c there
exist constants n0 , c′ , c′′ > 0 such that E[X] ≤ c′ f (n) and P(X > c′′ f (n)) ≤ n−c , for every
integer n ≥ n0 .
1
We don’t rule out the possibility that a more fine-grained analysis of the algorithm may give better bounds;
instead we design new algorithms.
2
2.1
Stable Matching
We only consider the bipartite stable matching problem, also known as stable marriage. There
are two sets of players A and B, with |A| = |B| = n. Each player x ∈ A (y ∈ B) holds a
permutation of B (A), denoted πx : B → [n] (πy : A → [n]) indicating their preferences over
players in the set B (A). Thus, for y ∈ B, πx (y) denotes the rank of y in x’s preference list
(where 1 is the highest rank).
Let M : A → B be a matching (a bijection). A pair (x, y) is said to be blocking if y ≺πx M (x)
and x ≺πy M −1 (y), where z ≺π z ′ indicates that z is ranked higher than z ′ according to
permutation π (i.e., π(z) < π(z ′ )). In words, x prefers y to M (x) and y prefers x to M −1 (y).
A matching M is stable if there are no blocking pairs. Then the stable matching problem
is to find a stable matching given preference lists {πz : z ∈ A ∪ B)}. Gale and Shapley [GS62]
proved that a stable matching always exists, and gave an algorithm that given the preferences
lists as input finds a stable matching in O(n2 ) time.
The Gale-Shapley algorithm is simple to describe. Only players in the set A make proposals.
Initially all players are unmatched. Let M denote a partial matching at some point. If there
is an unmatched player x ∈ A, x makes a proposal to y ∈ B, where y is the highest-ranked
player in πx to whom x has not yet proposed. If y is unmatched, or prefers x to M −1 (y), then
y accepts the proposal and we set M (x) = y. In the latter case, the agent previously matched
to y, i.e., M −1 (y) before M was updated, becomes unmatched once more. Gale and Shapley
showed that this algorithm always results in a stable matching.
Wilson [Wil72] studied the problem where all the preference lists are independent and uniformly random permutations; in this case, he showed that the number of proposals made by
the Gale-Shapley algorithm is O(n log n) in expectation and with high probability (see also
[MR95]). In fact, only the proposing side needs to be random in their statement. We provide
a proof sketch for completeness.
Theorem 2.1 ([Wil72]). If the permutations {πx : x ∈ A} are chosen randomly, the number of
proposals made in the Gale-Shapley algorithm (where only A makes proposals) is O(n log n) in
expectation and with high probability.
Proof sketch. Following the proof in [MR95] (see also [Knu97]), analyze an alternative procedure
where every proposal is uniform over the whole of B. If it happens that x ∈ A proposes to a
y ∈ B that has already rejected x, then a rejection is guaranteed. It is not hard to show that the
number of proposals such an algorithm makes stochastically dominates the number of proposals
of the classical algorithm. Next, by the method of deferred decisions, fix the randomness in
the algorithm only when needed. Then observe that the number of proposals is equal to the
number of coupons chosen in the coupon-collector’s problem.
2.2
Model for evolving input
A general framework for studying dynamic data was introduced in [AKMU11]. Here we are
only concerned with evolving preference lists (or permutations). In our model, we consider
discrete time-steps. In each time-step, the algorithm is competing against nature as follows:
the algorithm can query the input locally, nature lets the input evolve according to one or more
evolution events.
A query to the stable matching input is a triplet (z, u, v) ∈ (A×B 2 )∪(B×A2 ) and the answer
is whether πz (u) < πz (v). One evolution event consists of the following: pick z ∈ A ∪ B and
i ∈ [n − 1] uniformly at random and swap u = πz−1 (i) and v = πz−1 (i + 1) (i.e., set πz (u) = i + 1
and πz (v) = i).
3
While the algorithm can perform one query per time-step, α evolution events also occur,
where α ≥ 1 is some integer called the evolution rate. We further assume that α = Θ(1), meaning
that evolution events occur basically as often than the algorithm probes. We emphasize that
the rate-limiting factor is the queries made by the algorithm. In particular, the algorithm may
perform arbitrary (polynomial-time) computations in between time-steps. We are now ready to
define our problem:
Evolving Stable Matching (ESM): Given query access to an instance of the
stable matching problem with evolution rate α = Θ(1), maintain a matching that
minimizes the number of blocking pairs.
2.3
Sorting evolving permutations
The problem of sorting a single evolving permutation has been already addressed in [AKMU11].
In this context, the evolution rate is still constant, but denotes the evolution rate of this single
permutation. We will use the algorithm Quicksort of [AKMU11]. It is simply the randomized
version of quicksort which is shown to be robust with respect to an evolving input. The first
lemma shows that the running time of quicksort is not affected by evolution events.2
Lemma 2.1 (Proposition 3 in [AKMU11]). The running time of Quicksort is O(n log n) in
expectation and with high probability, for any rate of evolution when the pairs to be swapped are
chosen randomly.
Second, Lemma 6 in [AKMU11] states that Quicksort when run on an evolving permutation π, computes a permutation π̃ in which every element is approximately sorted. At time-step
t, let π t the denote the current permutation, and π̃ t its approximation computed by the algorithm.
Lemma 2.2 (Lemma 6 in [AKMU11]). Let t be the time-step of completion of Quicksort, then
given an element u, the number of pairs (u, v) that the permutations π t and π̃ t rank differently
is O(log n) in expectation and with high probability.
In our setting there are 2n evolving permutations over some set of n elements. Algorithm 1
simply sorts m (out of 2n) permutations, denoted by π1 , . . . , πm using Quicksort one after
another. (We always invoke Algorithm 1 with either n or 2n permutations.)
Algorithm 1 : Sequential sorting
procedure SequentialSort({πj : j = 1, . . . , m})
for j = 1 to m do
3:
π̃j ← Quicksort(πj )
1:
⊲ Only have query access to input
2:
4:
return {π̃j : j = 1, . . . , m}
Using Lemma 2.2 (Lemma 6 of [AKMU11]) we can argue that Algorithm 1 maintains all
permutations approximately sorted. While the evolving rate is still α = Θ(1), there are now 2n
evolving permutations, and the total number of evolution events is α per time-step.
Lemma 2.3. Let t be the time-step when Algorithm 1 terminates. Then, for m ≤ 2n, given
any element u and j ∈ [m], the number of pairs (u, v) that the permutations πjt and π̃jt rank
differently is O(log n) in expectation and with high probability.
2
We remark that Anagnostopoulos et al. [AKMU11] use ‘whp’ to denote events that hold with probability
1 − o(1), rather than the stronger notion we use in this paper. However, their proofs for the results used in our
paper actually prove the stronger bounds. They have other results that do not satisfy the stronger notion and
these are not used in our work.
4
Proof. Fix some j ∈ [n]. Suppose that π̃jt was computed at time-step t′ ≤ t (the time-step when
Quicksort for this particular list terminates). By Lemma 2.2 the statement holds for u at
time-step t′ . Due to Lemma 2.1 we have t − t′ = O(n2 log n) with high probability. During this
time, the number of evolution steps that have swapped u with an adjacent element is O(log n)
with high probability. This follows from a balls-and-bins experiment where we throw O(n2 log n)
balls (corresponding to the evolution steps) into m(n − 1) bins (corresponding to the adjacent
pairs). It is known (see Exercise 3.1 in [MR95]) that in this particular case the number of balls
in every bin is of the order of its mean with high probability. Therefore, during this time, at
most O(log n) more elements may be swapped with u.
2.4
Chernoff Bound with dependent variables
We will require the following extension of the Chernoff bound. It follows from (the more general)
Theorem 3.8 in [McD98].
Theorem 2.2. For i ∈ [n], letQYi be a random variable over some set Yi and Xi be a Boolean
random variable. For any y ∈ ni=1 Yi and k ∈ [n], let Ek (y) denote the event Y1 = y1 , . . . , Yk =
yk . Suppose P[Xk = 1|Ek−1 (y)] ≤ p, for all y and k as above. Then, for any t ≥ 0,
i
hX
Xk ≥ pn + t ≤ exp −
P
3
3t2
.
6pn + 2t
Two simple cases
In this section we present two simple arguments in two different settings. First, we consider
how the original Gale-Shapley algorithm performs when run, without any modification, on lists
produced by running quicksort on the evolving input. We present a simple analysis showing a
bound of O(n log n) on the number of blocking pairs, which is better than the trivial bound of
order n2 . Next, we analyze the Gale-Shapley algorithm when evolution events only occur on one
side and the preference lists are uniformly random permutations; in particular the preference
lists on the A side are chosen uniformly at random, and the preference lists on the B-side are
subject to evolution events.3 We present a simple analysis showing an O(log n) bound on the
number of blocking pairs for this special case.
3.1
A simple algorithm
Our first algorithm ignores evolution of preference lists and runs the standard Gale-Shapley
algorithm to produce a matching. More specifically, it first obtains the preferences lists for all
2n agents using the Quicksort algorithm of [AKMU11] (i.e., using Algorithm 1) and then
produces a matching by running the Gale-Shapley algorithm on these lists (ignoring the fact
that these lists are only approximately correct).
We show that this simple algorithm maintains a matching with at most O(n log n) blocking
pairs. Note that the number of blocking pairs is trivially at most n2 . We further argue that
improving the bound would require new ideas that either go around Lemma 2.3 (Lemma 6 of
[AKMU11]) or improve the analysis in a substantial way.
Algorithm 2 runs in perpetuity. The matching M is maintained as the output until the new
matching based on the newly sorted preference lists can be computed.
3
Note that after sufficiently many time-steps (though still polynomial) the evolution events ensure that all
permutations are uniformly random. This follows from analyzing the mixing time of the corresponding Markov
chain over permutations. See for example the book [LPW09].
5
Algorithm 2 : Simple dynamic stable matching
1: while True do
2:
{π̃z : z ∈ A ∪ B} ← SequentialSort({πz : z ∈ A ∪ B})
⊲ Calling Algorithm 1
3:
return Gale-Shapley matching M on the (approximately) sorted lists {π̃z : z ∈ A ∪ B}
Theorem 3.1. For a sufficiently large constant c0 and any time-step t ≥ c0 n2 log n, Algorithm 2
maintains a matching with O(n log n) blocking pairs in expectation and with high probability.
Proof. We consider the number of blocking pairs at time-step T ≤ t when the current matching
M was computed. In the following discussion, we use the following notation: for x ∈ A, y ∈ B,
if M (x) = y, then M (y) = x (rather than M −1 ). At time-step T , for each z ∈ A ∪ B, define
the indicator function Iz (w) to be 1 when M (z) ≺π̃z w and w ≺πz M (z) and 0 otherwise. (We
don’t explicitly use superscripts on the preference lists π as time-step T is fixed until specified
otherwise.) By Lemma 2.3, in expectation and with high probability,
X
Iz (w) = {w : w ≺πz M (z) and M (z) ≺π̃z w} = O(log n),
(1)
w
If a pair (x, y) is blocking at time-step T , then x ≺πy M (y) and y ≺πx M (x). Assume x ≺π̃y
M (y) and y ≺π̃x M (x). Since y ≺π̃x M (x), x must have proposed to y at some point during the
execution of the Gale-Shapley algorithm. By the properties of the Gale-Shapley algorithm, y
should have been matched to an element of A with rank according to π̃y at least as high as the
rank of x in π̃y . This contradicts x ≺π̃y M (y). It follows that either M (y) ≺π̃y x or M (x) ≺π̃x y.
Define U (x, y) to be 1 when (x, y) is blocking and 0 otherwise. We have argued that
U (x, y) ≤ Ix (y) + Iy (x).
By the union bound, Equation 1 holds for every z ∈ A ∪ B with high probability. Summing
over all pairs (x, y) and applying the union bound again
XX
X
X
XX
U (x, y) ≤
Ix (y) + Iy (x) =
Ix (y) +
Iy (x) = O(n log n),
x,y
x,y
x
y
y
x
in expectation and with high probability.
Next, let t′ = t − T . We need to account for blocking pairs that may have arisen during
these t′ time-steps. First, we observe that by Lemma 2.1 and union bound, with high probability
t′ = O(n2 log n) (as otherwise another matching more up-to-date than the one at time-step T
would be available). During the t′ time-steps from T to t, evolution may create a blocking
pair only if the swap decreases the rank of M (z) in πz , for some z ∈ A ∪ B. Therefore, each
step of the evolution introduces—independently—a new blocking pair with probability at most
α/(n − 1). The expected number of blocking pairs introduced is therefore at most O(n log n)
for α = Θ(1) (and assuming t′ = O(n2 log n)). The result follows by a simple application of the
Chernoff and union bounds.
Remark 3.1. We present a pair of instances to the stable matching problem with preference
lists πz and π̃z for z ∈ A ∪ B, for which the conclusion of Lemma 2.3 is satisfied, i.e., for any z
the number of pairs (i, j) that are ordered differently in πz and π̃z are O(log n). We then show
that a matching that is stable with respect to π̃ as preference lists has Ω(n log n) blocking pairs
with respect to π. Thus, it follows that using the Quicksort algorithm of Anagnostopoulos et
6
1
2
3
4
5
6
7
A-side lists π
3 2 1 4 5 6
4 3 2 5 6 7
5 4 3 6 7 1
6 5 4 7 1 2
7 6 5 1 2 3
1 7 6 2 3 4
2 1 7 3 4 5
7
1
2
3
4
5
6
1
2
3
4
5
6
7
B-side lists
6 7 1 5 4
7 1 2 6 5
1 2 3 7 6
2 3 4 1 7
3 4 5 2 1
4 5 6 3 2
5 6 7 4 3
π
3
4
5
6
7
1
2
2
3
4
5
6
7
1
1
2
3
4
5
6
7
A-side lists π̃
1 2 3 4 5 6
2 3 4 5 6 7
3 4 5 6 7 1
4 5 6 7 1 2
5 6 7 1 2 3
6 7 1 2 3 4
7 1 2 3 4 5
7
1
2
3
4
5
6
1
2
3
4
5
6
7
B-side lists
1 7 6 5 4
2 1 7 6 5
3 2 1 7 6
4 3 2 1 7
5 4 3 2 1
6 5 4 3 2
7 6 5 4 3
π̃
3
4
5
6
7
1
2
2
3
4
5
6
7
1
Figure 1: Instances π and π̃ demonstrating tightness of Algorithm 2.
al. [AKMU11] and its analysis as a blackbox will not result in a stronger result than the one
provided in Theorem 3.1.
First, we define the preference lists π̃z for z ∈ A ∪ B. Let A = B = [n]. Then for x ∈ A,
the preference list (ranking) π̃x is defined as x, x + 1, . . . , n, 1, 2, . . . , x − 1. On the other hand
for y ∈ B, the preference list (ranking) π̃y is defined as y, y − 1, . . . , 1, n, n − 1, . . . , y + 1. The
rankings πz , z ∈ A ∪ B, are now defined as follows: let k be some parameter, πz simply as the
elements at rank 1 and k swapped. Figure 1 shows an example with n = 7 and k = 3. Clearly,
when k = Θ(log n), πz and π̃z satisfy the conclusion of Lemma 2.3. Yet, it is easy to see that
M (i) = i is a stable matching for the preference lists π̃z , z ∈ A ∪ B, and for this matching with
respect to the preference lists πz , z ∈ A ∪ B, every pair (i, j) with 0 < j − i < k is a blocking
pair.
3.2
One-sided evolution
In this section we analyze how the Gale-Shapley algorithm performs when the initial preference
lists are random, but there is no evolution on the lists of the elements in A. Furthermore, we
are going to assume that the algorithm knows each permutation in {πx : x ∈ A}. We call this
setting one-sided evolution.
Algorithm 3 Gale-Shapley Algorithm
1: M ← φ
2: for x ∈ A do
3:
new match ← False
4:
p←x
5:
while new match = False do
6:
y ← first as yet unproposed as per πp
7:
if M (y) not yet set then
8:
M (p) ← y
9:
M (y) ← p
10:
new match = True
11:
else if p ≺πy M (y) then
12:
p′ ← M (y)
13:
M (y) ← p
14:
M (p) ← y
15:
p ← p′
16: return M
⊲ Initialize empty matching
⊲ y prefers p to M (y)
In this setting, the standard Gale-Shapley algorithm is implemented (basic pseudocode is
7
shown in Algorithm 3). Note that the only time the preference lists on the B-side are used is in
Line 11. Thus, it is only for these steps that we need to query the input (since the preference lists
on the A-side are known to the algorithm). Thus, the number of queries made by the algorithm
is bounded by the number of proposals. It was already observed that the number of proposals
made in a random instance of the stable matching problem is O(n log n). The actual algorithm
keeps implementing the Gale-Shapley algorithm from scratch after completion. The matching
from the previous completed run is used as the current matching. We prove the following result
for the one-sided evolution setting.
Theorem 3.2. For a sufficiently large constant c0 and any time-step t ≥ c0 n log n, the GaleShapley algorithm (repeatedly run and using the matching of the last completed run as the
output) under one-sided evolution maintains a matching with at most O(log n) blocking pairs in
expectation and with high probability.
Proof. To prove the bound on the number of blocking pairs, call an evolution event on y’s list
critical if it involves the then match of y. Suppose that after the algorithm terminates, y ∈ B is
involved in k blocking pairs (x1 , y), . . . , (xk , y). We observe that each one of the x1 , . . . , xk was
involved in at least one critical evolution step. To see this note that if (x, y) is blocking, then x
proposed to y during the execution of the algorithm and got rejected subsequently (because πx
didn’t change and y ≺πx M (x)). But since at the end of the execution it forms a blocking pair,
it must ranked higher than M (y). This is only possible if x was swapped with the then match
of y in some evolution event during the execution of the algorithm.
Given this observation, we estimate the number of blocking pairs by estimating the number
of critical evolution steps. Note that an evolution step is critical with probability at most
2α/(n − 1) (at most 2n out of n(n − 1) pairs involve the matching). Let T be a random
variable equal to the number of proposals before the algorithm outputs a matching and label
the corresponding time-steps as 1, 2, . . . , T . For each step k, let Xk be a Boolean random
variable that is equal to 1 if at the time-step labeled k some evolution event was critical.
First note that from a coupon-collecting argument as in Theorem 2.1 it follows that T =
O(n log n) in expectation and with high probability. This is because for that argument the
distribution of {πy : y ∈ B} is irrelevant and {πx : x ∈ A} being random permutations suffices.
Therefore, we may fix an appropriately large constant C so that T ≤ Cn log n with high
probability and let m = Cn log n. As noted above, at any given step and given any information
from the previous steps, an evolution step is critical with probability at most 2α/(n − 1); thus,
by Theorem 2.2,
m
hX
i
P
Xk > 2C log n = O(n−C ),
k=1
for sufficiently large C. We have
T
T
hX
i
hX
i
P
Xk > 2C log n ≤ P T > Cn log n + P
Xk > 2C log n ∧ T ≤ Cn log n
k=1
k=1
m
hX
i
≤ P T > Cn log n + P
Xk > 2C log n .
k=1
By the observation at the beginning of this paragraph the claimed bound holds with high
probability. The bound on the expectation follows by noting that there can be at most n2
blocking pairs.
8
Finally, note that there will be at most O(n log n) time-steps before a new matching is
computed. As in the final paragraph in the proof of Theorem 3.1, one can show that evolution
cannot produce more than O(log n) blocking pairs in these many steps.
4
General Case: Improved algorithm
We now consider the general setting where the preference lists on both sides may be evolving.
We present a modified version of the Gale-Shapley algorithm that takes advantage of Lemma 2.3
(Lemma 6 of [AKMU11]) and maintains a stable matching with at most O((log n)2 ) blocking
pairs. The algorithm consists of two separate processes that run in an interleaved fashion:
the sorting process on even time-steps and the matching process on odd ones. The sorting
process is basically a call to SequentialSort({πx | x ∈ A}) that produces approximately
sorted preference lists on the A side, {π̃x | x ∈ A}. The algorithm runs in perpetuity, in the
sense that as soon as it terminates it restarts, though the copies {π̃x | x ∈ A} from the previous
execution are retained to be used by the stable matching process. Initially, the π̃x are set to be
random permutations, thus, for the first O(n2 log n) steps, until one run of the sorting process
is complete, the matching output by the algorithm will be garbage.
Algorithm 4 : Interleaving Sorting and Matching
1: for t = 1, 2, . . . do
2:
if t is Even then
3:
Perform query for Algorithm 1
4:
else if t is Odd then
5:
Perform query for Algorithm 5
We note that what is counted here is only time-steps; making queries is the bottleneck.
Additional computations required by the algorithm can be performed in between time-steps at
no additional cost.
The sorting process performs queries only during even steps and its purpose it to keep the
preference list of each x ∈ A approximately sorted, where by approximately sorted we meant
that the conclusion of Lemma 2.3 holds.
The matching process performs queries during odd steps. Our stable matching algorithm,
which is a variant of the Gale-Shapley algorithm, is presented in Algorithm 5. Note that the
{π̃x | x ∈ A} used in Algorithm 5 are static and are the output of the latest completed run of
Algorithm 1. However, the comparisons made are all on dynamic data. The difference from the
standard Gale-Shapley algorithm is that whenever some x ∈ A is about to make a proposal,
first the best y ∈ B among the O(log n) highest ranked as per the ranking π̃x that have not
yet rejected x is found. Note however, that the best is with respect to the dynamic (current)
preference list πx (otherwise, it would be trivial since π̃x is static). This operation is basically
the algorithm to find the minimum element, which can be implemented in O(log n) time using
only comparison queries (see Section 3 in [AKMU11]). We don’t need to use any particular
result regarding finding the minimum element; instead, we incorporate the errors that may
have occurred while finding the minimum due to the dynamic nature of the data, into our
stable matching analysis directly.
We first describe the high-level idea of the proof. The sorting process needs O(n2 log n)
comparisons with high probability. The approximations {π̃x : x ∈ A} of {πx : x ∈ A} that are
being computed are used by the modified Gale-Shapley algorithm. By Lemma 2.3 we are able
to claim that for any element u in the preference list of any x ∈ A, the number of pairs (u, v)
that are ordered differently in π̃x and πx are O(log n). Therefore, when x is about to propose it
9
Algorithm 5 : Modified Gale-Shapley Algorithm
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
M ←∅
for x ∈ A do
new match ← False
p←x
while new match = False do
S ← C log n highest-ranked, not-yet-proposed elements in B per π̃x
y ← best(S)
⊲ Best with respect to dynamic πx
if M (y) not yet set then
M (p) ← y
M (y) ← p
new match ← True
else if p ≺πy M (y) then
p′ ← M (y)
M (y) ← p
M (p) ← y
p ← p′
return M
suffices to look among O(log n) elements in π̃x to find the y to which the proposal will be made.
Since the matching process is expected to make O(n log n) proposals, it is expected to require
O(n(log n)2 ) comparisons. It turns out that, during these steps, evolution creates a blocking
pair with probability at most α/n. Therefore we expect O((log n)2 ) blocking pairs.
We now provide the details of the proof. In order to bound the number of blocking pairs,
it is crucial that during the matching process not too many queries are made, or alternatively
that not too many proposals are made. We therefore need an analog of Theorem 2.1. To apply
the coupon-collecting argument from the proof of that theorem we prove the following lemma.
Lemma 4.1. Provided πx was chosen uniformly at random at time-step 0 and only comparison
queries are made, the element y chosen at line 7 of Algorithm 5 is a random element from the
subset of B to which x has not by that point made any proposals.
Proof. The proof of the lemma relies on the fact that the dynamic quicksort algorithm used to
obtain π̃x for x ∈ A and the procedure used to find the best element in line 7 of Algorithm 5
only use comparison queries.
Let πx be the preference list of x before the first comparison is queried. Fix an arbitrary
sequence of evolution steps that occurs during the computation of y. Suppose that given these
choices of nature, y = πx (k). Then, given the same evolution steps, for any other permutation
πx′ , y = πx′ (k). Since πx is a random permutation, y = πx (k) is a random element of σx .
Remark 4.1. We remark that the requirement on the implementation of Quicksort and
best using only comparison queries is necessary and the lemma does not hold for an arbitrary
algorithm.
Lemma 4.2. The number of proposals during one execution of the matching process is O(n log n)
in expectation and with high probability.
Proof. Suppose x proposes to y and at that point k elements of B are unmatched. Note that
it must be the case that x has not proposed to any of these elements (otherwise, they would
not be currently unmatched). Thus, by the previous lemma, each of these k elements receives
10
a proposal with probability at least 1/n. The stated bound follows from the analysis of coupon
collector’s problem as in Theorem 2.1.
As in the one-sided setting, the analysis will rely on estimating the occurrence of a specific
kind of critical evolution steps. In the present case the definition of a critical evolution step is
a little more involved than its one-sided counterpart.
Definition 4.1. An evolution event on the preference list πz of z ∈ A ∪ B is critical if one of
the following holds:
1. An evolution event involves a swap of the then match of z, M (z).
2. If z ∈ A, the evolution event involves swapping the then best element as per πz to which
z has not yet proposed.
The following claim establishes the link between the critical evolution steps and the number
of blocking pairs.
Claim 4.1. Assume that for the duration of one run of the matching process, the preference
lists {πz | z ∈ A ∪ B} satisfy the conditions of Lemma 2.3, and suppose that (x, y) is a blocking
pair with respect to the returned matching. Then there was a critical evolution event on the
preference list of at least one of x and y during the execution of the matching process.
Proof. First consider the case that x proposed to y during the execution of the matching process.
It follows that y rejected x at some point in favor of some other element. When x was rejected,
the then M (y) satisfies M (y) ≺πy x. Subsequently, M (y) may change but has to become better,
unless there was a swap that involves the then M (y), which is a critical event on πy . Since,
we know that in the end x ≺πy x′ , where x′ is the final match of y, there must have been
some evolution event where x was swapped with the then match of y. Thus, by part 1 of
Definition 4.1, a critical evolution event occurred on πy .
On the other hand, suppose x never proposed to y, and let y ′ be the final match of x.
Suppose that when x proposed to y ′ , y ≺πx y ′ ; it follows that best on line 7 of Algorithm 5
failed to return the best element to which x had not yet proposed. Since, we are assuming that
π̃x is a sufficient approximation of πx , it must be because the actual best element was swapped at
least once while best was being executed. Thus, by part 2 of Definition 4.1, a critical evolution
event occurred on πx . Finally, if when x proposed to y ′ , it was the case that y ′ ≺πx y, but (x, y)
is a blocking pair, it must be that y ′ was involved in a swap subsequently leading to a critical
event involving x’s the then match.
Theorem 4.1. Provided the initial preference lists are drawn randomly,4 for all z ∈ A ∪ B,
for a sufficiently large constant c0 and any time-step t ≥ c0 n2 log n, Algorithm 5 maintains a
matching with at most O((log n)2 ) blocking pairs in expectation and with high probability.
Proof. As a result of Claim 4.1, we can estimate the number of blocking pairs by estimating
the number of critical evolution steps. Let T be a random variable equal to the number of
queries of Algorithm 5 before it outputs a matching and label the corresponding time-steps as
1, 2, . . . , T . For each step k, let Xk be a Boolean random variable that is equal to 1 if at the
time-step labeled k the evolution was critical. Furthermore, denote by E the event that during
these T time-steps the lists were approximately sorted. By Lemma 2.3, the event E occurs with
high probability.
4
This is not actually required, since after sufficiently long (though still polynomial) time, all the preference
lists will be close to random due to a mixing time argument on the set of permutations.
11
By Lemma 4.2 it follows that T = O(n(log n)2 ) in expectation and with high probability,
since we are wasting O(log n) queries per proposal. Therefore, we may fix an appropriately
large constant C so that T ≤ Cn(log n)2 with high probability and let m = Cn(log n)2 . Note
that—given any history of evolution steps—an evolution step is critical with probability at most
O(α/n), since for each z ∈ A ∪ B there is a constant number of elements that evolution has to
swap in order to be critical. Thus, by Theorem 2.2,
m
hX
i
P
Xk > 2C(log n)2 = O(n−C ),
k=1
for sufficiently large C. We have
T
hX
i
¯
P
Xk > 2C(log n)2 ≤ P T > Cn(log n)2 + P[E]
k=1
T
i
hX
+P
Xk > 2C(log n)2 ∧ T ≤ Cn(log n)2 ∧ E
k=1
2
≤ P T > Cn(log n)
¯ +P
+ P[E]
m
hX
i
Xk > 2C(log n)2 .
k=1
It follows that the claimed bound holds with high probability. The bound on the expectation
follows by noting that there can be at most n2 blocking pairs.
Acknowledgments
For earlier discussions, F.M. would like to thank Marcos Kiwi who, among other things, introduced him to the line of works on evolving data and shared preliminary thoughts on the
possibility of computing stable matchings in this context. We also thank a reviewer for (minor)
corrections in our main theorem.
References
[AKM+ 12] A. Anagnostopoulos, R. Kumar, M. Mahdian, E. Upfal, and F. Vandin. Algorithms
on evolving graphs. In Proc. of 3rd Innovations in Theoretical Computer Science,
2012.
[AKMU11] A. Anagnostopoulos, R. Kumar, M. Mahdian, and E. Upfal. Sorting and selection on dynamic data. Theoretical Computer Science, 412(24):2564 – 2576, 2011.
Selected Papers from 36th International Colloquium on Automata, Languages and
Programming.
[EGI99]
D. Eppstein, Z. Galil, and G. F. Italiano. Dynamic graph algorithms. In M. Atallah,
editor, Algorithms and Theory of Computation Handbook, chapter 8. CRC Press,
1999.
[GP13]
M. Gupta and R. Peng. Fully dynamic (1+ e)-approximate matchings. In Proc. of
54th IEEE Foundations of Computer Science, pages 548–557, Oct 2013.
[GS62]
D. Gale and L. S. Shapley. College admissions and the stability of marriage. The
American Mathematical Monthly, 69(1):9–15, 1962.
12
[Knu97]
D. Knuth. Stable Marriage and Its Relation to Other Combinatorial Problems:
An Introduction to the Mathematical Analysis of Algorithms. CRM proceedings &
lecture notes. American Mathematical Society, 1997.
[LPW09]
David Asher Levin, Yuval Peres, and Elizabeth Lee Wilmer. Markov Chains and
Mixing Times. American Mathematical Society, 2009.
[McD98]
C. McDiarmid. Concentration. In M. Habib, C. McDiarmid, J. Ramirez-Alfonsin,
and B. Reed, editors, Probabilistic Methods for Algorithmic Discrete Mathematics,
volume 16 of Algorithms and Combinatorics, pages 195–248. Springer Berlin Heidelberg, 1998.
[MR95]
R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge International
Series on Parallel Computation. Cambridge University Press, 1995.
[NS13]
O. Neiman and S. Solomon. Simple deterministic algorithms for fully dynamic
maximal matching. In Proc. of 45th ACM Symposium on Theory of Computing,
pages 745–754, 2013.
[OR10]
K. Onak and R. Rubinfeld. Maintaining a large matching and a small vertex cover.
In Proc. of 42nd ACM Symposium on Theory of Computing, pages 457–464, 2010.
[Wil72]
L. B. Wilson. An analysis of the stable marriage assignment algorithm. BIT Numerical Mathematics, 12(4):569–575, 1972.
13
| 8cs.DS
|
Modular Construction of Shape-Numeric Analyzers
Bor-Yuh Evan Chang
Xavier Rival
University of Colorado Boulder
INRIA, ENS, and CNRS
[email protected]
[email protected]
The aim of static analysis is to infer invariants about programs that are precise enough to establish
semantic properties, such as the absence of run-time errors. Broadly speaking, there are two major
branches of static analysis for imperative programs. Pointer and shape analyses focus on inferring
properties of pointers, dynamically-allocated memory, and recursive data structures, while numeric
analyses seek to derive invariants on numeric values. Although simultaneous inference of shapenumeric invariants is often needed, this case is especially challenging and is not particularly well
explored. Notably, simultaneous shape-numeric inference raises complex issues in the design of the
static analyzer itself.
In this paper, we study the construction of such shape-numeric, static analyzers. We set up an
abstract interpretation framework that allows us to reason about simultaneous shape-numeric properties by combining shape and numeric abstractions into a modular, expressive abstract domain. Such
a modular structure is highly desirable to make its formalization and implementation easier to do
and get correct. To achieve this, we choose a concrete semantics that can be abstracted step-by-step,
while preserving a high level of expressiveness. The structure of abstract operations (i.e., transfer,
join, and comparison) follows the structure of this semantics. The advantage of this construction is
to divide the analyzer in modules and functors that implement abstractions of distinct features.
1
Introduction
The static analysis of programs written in real-world imperative languages like C or Java are challenging
because of the mix of programming features that the analyzer must handle effectively. On one hand, there
are pointer values (i.e., memory addresses) that can be used to create dynamically-allocated recursive
data structures. On the other hand, there are numeric data values (e.g., integer and floating-point values)
that are integral to the behavior of the program. While it is desirable to use distinct abstract domains to
handle such different families of properties, precise analyses require these abstract domains to exchange
information because the pointer and numeric values are often interdependent. Setting up the structure of
the implementation of such a shape-numeric analyzer can be quite difficult. While maintaining separate
modules with clearly defined interfaces is a cornerstone of software engineering, such boundaries also
impede the easy exchange of semantic information.
In this manuscript, we contribute a modular construction of an abstract domain [10] that layers a
numeric abstraction on a shape abstraction of memory. The construction that we present is parametric
in the numeric abstraction, as well as the shape abstraction. For example, the numeric abstraction may
be instantiated with an abstract domain such such as polyhedra [12] or octagons [27], while the shape
abstraction may be instantiated with domains such as Xisa [5,7] or TVLA [31]. Note that the focus of this
paper is on describing the formalization and construction of the abstract domain. Empirical evaluation
of implementations based on this construction are given elsewhere [5, 7, 8, 22, 29, 36, 37].
We describe our construction in four steps:
1. We define a concrete program semantics for a generic imperative programming language focusing
on the concrete model of mutable memory (Section 2).
A. Banerjee, O. Danvy, K.-G. Doh, J. Hatcliff (Eds):
David A. Schmidt’s 60th Birthday Festschrift
EPTCS 129, 2013, pp. 161–185, doi:10.4204/EPTCS.129.11
c B.-Y. E. Chang and X. Rival
This work is licensed under the
Creative Commons Attribution License.
Modular Construction of Shape-Numeric Analyzers
162
typedef struct s {
struct s ⋆ a; int b; int c;
} t;
void f() {
t y;
t ⋆ x = &y;
y · a = malloc(sizeof(t));
y · b = 24; y · c = 178;
y · a -> a = NULL;
y · a -> b = 70;
y · a -> c = 89;
}
(a)
&x = 0x...a0 0x...b0
&y = &(y · a) = 0x...b0 0x...c0
&(y · b) = 0x...b4
24
178
&(y · c) = 0x...b8
&(y · a -> a) = 0x...c0
&(y · a -> b) = 0x...c4
&(y · a -> c) = 0x...c8
(b)
0x0
70
89
E:
σ:
X −→
x 7−→
y 7−→
A
0x...a0
0x...b0
−→
7−→
7−→
7−→
7−→
7−→
7−→
7−→
V
0x...b0
0x...c0
24
178
0x0
70
89
A
0x...a0
0x...b0
0x...b4
0x...b8
0x...c0
0x...c4
0x...c8
(c)
Figure 1: A concrete memory state consists of an environment E and a store σ shown in (c). This
example state corresponds to the informal box diagram shown in (b) and a state at the return point of the
C-procedure f in (a).
2. We describe a step-by-step abstraction of program states as a cofibered construction of a numeric
abstraction layer on top of a shape abstraction layer (Section 3). In particular, we characterize a
shape abstraction as a combination of an exact abstraction of memory cells along with a summarization operation. Then, we describe how a value abstraction can be applied both globally on
materialized memory locations and locally within summarized regions.
3. We detail the abstract operators necessary to implement an abstract program semantics in terms of
interfaces that a shape abstraction and a value abstraction must implement (Section 4).
4. We overview a modular construction of a shape-numeric static analyzer based on our abstract
operators (Section 5).
2
A concrete semantics
We first define a concrete program semantics for a generic imperative programming language.
2.1 Concrete memory states
We define a “bare metal” model of machine memory. A concrete store is a partial function σ ∈ H =
A ⇀fin V from addresses to values. An address a ∈ A is also considered a value v ∈ V, that is, we assume
that A ⊆ V. For simplicity, we assume that all cells of any store σ have the same size (i.e., word-sized)
and that all addresses are aligned (i.e., word-aligned). For example, we can imagine a standard 32-bit
architecture where all values are 4-bytes and all addresses are 4-byte–aligned. We write for dom(σ ) the
set of addresses at which σ is defined, and we let σ [a ← v] denote the heap obtained after updating the
cell at address a with value v. A concrete environment E ∈ E = X → A maps program variables to their
addresses. That is, we consider all program variables as mutable cells in the concrete store—the concrete
environment E indicates where each variable is allocated. A concrete memory state m simply pairs a
concrete environment and a concrete store: (E, σ ). Thus, the set of memory states M = E × H is the
product of the set of concrete environments and the set of concrete stores.
B.-Y. E. Chang and X. Rival
163
Figure 1(c) shows an example concrete memory state at the return point of the procedure f in (a).
The environment E has two bindings for the variables x and y that are in scope. For concreteness, we
show the concrete store for this example laid out using 32-bit addresses and a C-style layout for struct s.
The figure shown in (b) shows the concrete store as an informal box diagram.
Related work and discussion. Observe that we do not make the distinction between stack and heap
space in a concrete store σ (as in a C-style model), nor have we partitioned a heap on field names (as
in Java-style model). We have intentionally chosen this rather low-level definition of concrete memory
states—essentially an assembly-level model of memory—and leave any abstraction to the definition of
abstract memory states. An advantage of this approach is the ability to use a common concrete model
for combining abstractions that make different choices about the details they wish to expose or hide [22].
For example, Laviron et al. [22] defines an abstract domain that treats precisely C-style aggregates: both
structs and unions with sized-fields and pointer arithmetic. Another abstract domain [36] abstracts
nested structures using a hierarchical abstraction. Rival and Chang [29] defines an abstraction that simultaneously summarizes the stack of activation records and the heap data structures (with a slightly
extended notion of concrete environments), which is useful for analyzing recursive procedures.
2.2 Concrete program semantics
For the most part, we can be agnostic about the particulars of the imperative programming language
of interest. To separate concerns between abstracting memory and control points on which abstract
interpretation collects, all we assume is that a concrete execution state consists of a control state and a
concrete memory state. A shape-numeric abstract domain as we define in Section 3 abstracts the concrete
memory state component.
Definition 1 (Execution states). An execution state s ∈ S consists of a triple (ℓ, E, σ ) where ℓ ∈ L is a
control state, E ∈ E is an concrete environment, and σ ∈ H is a concrete store. The memory component
of an execution state is the pair (E, σ ) ∈ M.
Thus, the set of execution states S = L × E × H ≡ L × M. A program execution is described by a finite
trace, that is, a finite sequence of states hs0 , . . . , sn i. We let T = S⋆ denote the set of finite traces over S.
To make our examples more concrete, we consider a C-like programming language whose syntax is
shown in Figure 2. A location expression loc names a memory cell, which can be a program variable x,
a field offset from another memory location loc1 · f, or the memory location named by a pointer value
⋆exp. We write f ∈ F for a field name and implicitly read any field as an offset, that is, we write a + f for
the address a′ ∈ A obtained by offsetting an address a with field f. To emphasize that we mean C-style
field offset as opposed to Java-style field dereference, we write x · f for what is normally written as x.f
in C. As in C, we write exp -> f for Java-style field dereference, which is a shorthand for (⋆exp) · f. An
expression exp can be a memory location expression loc, an address of a memory location &loc, or any
value literal v, some other n-ary operator ⊕(exp). Like in C, a memory location expression loc used as
an expression (i.e., “r-value”) refers to the contents of the named memory cell, while the &loc converts
the location’s address (i.e., “l-value”) into a pointer “r-value.” We leave the value literals v (e.g., 1) and
expression operators ⊕ (e.g., !, +, ==) unspecified.
An operational semantics: Given a program p, we assume its execution is described by a transition
relation → p ⊆ S × S. This relation defines a small-step operational semantics, which can be defined as
a structured operational semantics judgment s → p s′ . Such a definition is completely standard for our
language, so we do not detail it here.
Modular Construction of Shape-Numeric Analyzers
164
loc (∈ LX ) ::= x
(x ∈ X)
| loc1 · f (loc1 ∈ LX ; f ∈ F)
| ⋆exp
(exp ∈ EX )
p (∈ PX ) ::=
|
|
|
|
|
loc = exp
loc = malloc({f1 , . . . , fn })
free(loc)
p1 ; p2
if (exp) p1 else p1
while (exp) p1
exp (∈ EX ) ::=
|
|
|
⊕ ::=
loc
&loc
v
⊕(exp)
···
(loc ∈ LX ; exp ∈ EX )
(loc ∈ LX ; [f1 , . . . , fn ] ∈ F∗ )
(loc ∈ LX )
(p1 , p2 ∈ PX )
(exp ∈ EX ; p1 , p2 ∈ PX )
(exp ∈ EX ; p1 ∈ PX )
(loc ∈ LX )
(loc ∈ LX )
(v ∈ V)
(exp ∈ EX )
assignment
memory allocation
memory deallocation
sequence
condition test
loop
Figure 2: Abstract syntax for a C-like imperative programming language. A program p consists of
assignment, dynamic memory allocation and deallocation, sequences, condition tests, and loops. An
assignment is specified by a location expression loc that names a memory cell to update and an expression
exp that is evaluated to yield the new contents for the cell. For simplicity, we specify allocation with a
list of field names (i.e., malloc({f1 , . . . , fn })).
As an example rule, consider the D OA SSIGNMENT
case for an assignment loc = exp (ℓ , E, σ ) →
pre
loc = exp (ℓpost , E, σ [LJlocK(E, σ ) ← EJexpK(E, σ )])
where ℓpre and ℓpost are the control
def
def
points before and after the assignLJ⋆expK = EJexpK
LJxK(E, σ ) = E(x)
def
def
ment, respectively. We assume that
EJlocK(E, σ ) = σ ◦ LJlocK(E, σ )
EJ&locK = LJlocK
the semantics of a location expresdef
LJloc · fK(E, σ ) = LJlocK(E, σ ) + f
sion LJlocK is a function from memory states to addresses M → A and
Figure 3: A small-step operational semantics for programs.
that the semantics of an expression
EJexpK is a function from memory states to values M → V. Then, the transition relation for assignment
simply updates the input store σ at the address given by loc with the value given by exp as shown in
Figure 3. The evaluation of locations loc and expressions exp, that is, LJlocK(E, σ ) and EJexpK(E, σ ),
respectively, can be defined by induction on their structure. The environment E is used to lookup the
allocated address for program variables in LJxK. The value for a memory location EJlocK is obtained by
looking up the contents in the store σ . Dereference ⋆exp and &loc mediate between address and value
evaluation, while field offset loc · f is simply an address computation. The evaluation of the remaining
expression forms is completely standard.
Example 1 (Evaluating an assignment). Using the concrete memory state (E, σ ) shown in Figure 1,
the evaluation of the assignment x -> a -> b = y · c proceeds as follows. First, the right-hand side gets
evaluated by noting that E(y) = 0x...b0 and following
EJy · cK(E, σ ) = σ (LJy · cK(E, σ )) = σ (LJyK(E, σ ) + c) = σ (E(y) + c) = σ (0x...b8) = 178 .
Second, the left-hand side gets evaluated by noting that E(x) = 0x...a0 and then following the location
evaluation LJx -> a -> bK(E, σ ) = σ (σ (0x...a0) + a) + b) = σ (0x...b0 + a) + b = 0x...c0 + b = 0x...c4.
Finally, the store is updated at address 0x...c4 with the value 178 with σ [0x...c4 ← 178].
B.-Y. E. Chang and X. Rival
165
Concrete program semantical definitions: Several notions of program semantics can be used as a
basis for static analysis, which each depend on the desired properties and the kinds of invariants needed
to establish them. A semantical definition expressed as the least fixed-point of a continuous function
F over a concrete, complete lattice is particularly well-suited to the design of abstract interpreters [10].
Following this analysis design methodology, an abstract interpretation consists of (1) choosing an abstraction of the concrete lattice (Section 3), (2) designing abstract operators that over-approximate the
effect of the transition relation → p and concrete joins ∪ (Section 4), and (3) applying abstract operators
to over-approximate F using widening (Section 5).
Definition 2 (A concrete domain). Let us fix a form for our concrete domains D to be the powerset of
some set of concrete objects O, that is, let D = P(O). Domain D form a complete lattice with subset
containment ⊆ as the partial order. Hence, concrete joins are simply set union ∪.
For a program p, let ℓpre be its entry point (i.e., its initial control state). A standard definition of
interest is the set of reachable states, which is sufficient for reasoning about safety properties.
Example 2 (Reachable states). We write JpKr for the set of reachable states of program p, that is,
JpKr = {s | (ℓpre , E, σ ) →⋆p s for some E ∈ E and σ ∈ H}
def
where →⋆p is the reflexive-transitive closure of the single-step transition relation →. Alternatively, JpKr
can be defined as lfp Fr , the least-fixed point of Fr , where Fr : P(S) → P(S) is as follows:
Fr (S) = {(ℓpre , E, σ ) | E ∈ E and σ ∈ H} ∪ {s′ | s ∈ S and s → p s′ for some s′ ∈ S} .
def
Note that we have let the concrete objects O be the execution states S in this example.
def
We can also describe the reachable states denotationally [34]—JpKd (E, σ ) = {s | (ℓpre , E, σ ) →⋆p s}—
that enables a compositional way to reason about programs. Here, we let the set of concrete objects be
functions from memory states to sets of states (i.e., M → P(S)).
Related work and discussion. For additional precision or for richer properties, it may be critical to
retain some information about the history of program executions (i.e., how a state can be reached) [30].
In this case, we might choose a trace semantics as a concrete semantics where the concrete objects O are
def
chosen to be traces T. For instance, the finite prefix traces semantics is defined by JpKt = {hs0 , . . . , sn i |
s0 : (ℓpre , E0 , σ0 ) and si → p si+1 for some E0 ∈ E, σ0 ∈ H and for all 0 ≤ i < n}. Or we may to choose to
define a trace semantics denotationally JpKdh : M → P(T) that maps input memory states into traces
starting from them.
In this section, we have left the definition of a control state essentially abstract. A control state is
simply a member of a set of labels on which an interpreter visits. In the intraprocedural setting, the
control state is usually a point in the program text corresponding to a program counter. Since the set
of program points is finite, the control state can be left unabstracted yielding a flow-sensitive analysis.
Meanwhile, richer notions of control states are often needed for interprocedural analysis [26, 35].
3
Abstraction of memory states
In this section, we discuss the abstraction of memory states, including environments and stores, as well
as the values stored in them. A shape abstraction typically abstracts entire stores but only the pointer
values (i.e., addresses) in them. In contrast, a numeric abstraction is typically applied only to the data
Modular Construction of Shape-Numeric Analyzers
166
values stored in program variables (i.e., the part of the store containing the global and local variables).
We defer the abstraction of program executions to Section 5.
Following the abstract interpretation framework [10], an abstraction or abstract domain is a set of
abstract properties D♯ together with a concretization function and sound abstract operators.
Definition 3 (Concretization). A concretization function γ : D♯ → D defines the meaning of D♯ in terms
of a concrete domain D = P(O) for some set of concrete objects O. An abstract inclusion d1♯ ⊑ d2♯ for
abstract elements d1♯ , d2♯ ∈ D♯ should be sound with respect to concrete inclusion: γ (d1♯ ) ⊆ γ (d2♯ ), and
γ should be monotone. For each concrete operation f , we expect a sound abstract counterpart f ♯ ; for
example, an abstract operation f ♯ : D♯ → D♯ is sound with respect to a concrete operation f : D → D if
and only if γ (d ♯ ) ⊆ γ ◦ f ♯ (d ♯ ) for all d ♯ ∈ D♯ .
In this section, we focus on the abstract domains and concretization functions, while the construction
of abstract operations are detailed in Section 4.
3.1 An exact store abstraction based on separating shape graphs
An abstract heap σ ♯ ∈ H♯ should over-approximate a set of concrete heaps with a compact representation.
This set of abstract heaps H♯ form the domain of abstract heaps (or the shape abstract domain). For
simplicity, we first consider an exact abstraction of heaps with no unbounded dynamic data structures.
That is, such an abstraction explicitly enumerates a finite number of memory cells and performs no
summarization. Summarization is considered in Section 3.3.
A heap can be viewed as a set of disjoint cells (cf., Figure 1). At the abstract level, it is convenient
to make disjointness explicit and describe disjoint cells independently. Thus, we write σ0♯ ∗ σ1♯ for the
abstract heap element that denotes all that can be partitioned into a sub-heap satisfying σ0♯ and another
disjoint sub-heap satisfying σ1♯ . This observation about disjointness underlies separation logic [28] and
thus we borrow the separating conjunction operator ∗ from there. An individual cell is described by an
exact points-to predicate of the form α · f 7→ β where α , β are symbolic variables (or, abstract values)
drawn from a set V♯ . The symbolic variable α denotes an address, while β represents the contents at the
memory cell with address α · f (i.e., α offset by a field f). An exact heap abstraction is thus a separating
conjunction of a set of exact points-to predicates.
Such abstract heap predicates can be represented using
αy
αx
βa
δa
a
a
separating shape graphs [8, 22] where nodes are symbolic
variables and edges represent heap predicates. An exact
b
b
βb
δb
points-to predicate α · f 7→ β is denoted by an edge from
c
c
node α to node β with a label for the field offset f. For
βc
δc
example, βa denotes the value corresponding to the C expression y · a.
The concretization γH of a separating shape graph Figure 4: separating shape graph abstracmust account for symbolic variables that denote some con- tion of σ in Figure 1. Symbolics αx and αy
crete values, so it also must yield an instantiation or a denote the address of x and y, respectively.
valuation ν : V♯ → V. Thus, this concretization has type
γH : H♯ → P(H × (V♯ → V)) and is defined as follows (by induction on the structure σ ♯ ):
γH (α · f 7→ β ) = {([ν (α ) + f 7→ ν (β )], ν ) | ν ∈ V♯ → V}
def
/ .
γH (σ0♯ ∗ σ1♯ ) = {(σ0 ⊎ σ1 , ν ) | (σ0 , ν ) ∈ γH (σ0♯ ) and (σ1 , ν ) ∈ γH (σ1♯ ) and dom(σ0 ) ∩ dom(σ1 ) = 0}
def
That is, an exact points-to predicate corresponds to a single cell concrete store under a valuation ν ,
and a separating conjunction of abstract heaps is a concrete store composed of disjoint sub-stores that
B.-Y. E. Chang and X. Rival
typedef struct {
int a;
int b;
} t;
t x;
&x = 0x...
&x = 0x...
167
0
2
8
18
&x = 0x...
&x = 0x...
3
7
10
21
a
βa
αx
b
βb
0 ≤ βa ≤ 10 ∧ βa ≤ 2βb + 1
Figure 5: An example separating shape graph enriched with a numeric constraint (right) with four concrete instances (center) for the C type declaration (left).
are individually abstracted by the conjuncts under the same instantiation (as in separation logic [28]).
Symbolic variables can be viewed as existentially-quantified variables that are bound at the top-level of
the abstraction. The valuation makes this explicit and thus is a bit similar to a concrete environment E.
Related work and discussion. Separating conjunction manifests itself in separating shape graphs as
simply distinct edges. In other words, distinct edges denote disjoint heap regions. Separating shape
graphs are visually quite similar to classical shape and points-to graphs [9, 31] but are actually quite
different semantically. In classical shape and points-to graphs, the nodes represent memory cells, and
typically, a node corresponds to one-or-more concrete cells. Distinct nodes represent disjoint memory
memory regions, and edges express variants of may or must points-to relations between two sets of cells.
In contrast, it is the edges in separating shape graphs that correspond to disjoint memory cells, while
the nodes simply represent values. We have found two main advantages of this approach. First, because
there is no a priori requirement that two nodes be distinct values, we do not need to case split simply
to speak about the contents of cells (e.g., consider two pointer variables x and y and representing to
which objects they point; a classic shape graph must consider two cases where x and y are aliases or
not, while a separating shape graph does not). Limiting case splits is critical to getting good analysis
performance [5]. Second, a separating shape graph is agnostic to the type of values that nodes represent.
Nodes may represent addresses, but they can just as easily represent non-address values, such as integer, Boolean, or floating-point values. We take advantage of this observation to interface with numeric
abstract domains [7], which we discuss further next in Section 3.2.
3.2 Enriching shapes with a numeric abstraction
From Section 3.1, we have an exact heap abstraction based on a separating shape graph with a finite number of exact points-to edges. Intuitively, this abstraction is quite weak, as we have simply enumerated the
memory cells of interest. We have, however, given names to all values—both addresses and contents—of
potential interest. Here, we enrich the abstraction with information about the values contained in data
structures, not just the pointer shape. We focus on scalar numeric values, such as integers or floatingpoint values, but other types of values could be handled similarly. A separating shape graph defines a
set of symbolic variables corresponding to values, so we can abstract the values those symbolic variables
represent. First, we consider a simple example, shown in Figure 5. In Figure 5, we show four concrete
stores such that 0 ≤ x · a ≤ 10 and x · a ≤ 2(x · b) + 1. The separating shape graph on the right clearly
abstracts the shape of the four stores (i.e., two fields a and b off a struct at variable x). The symbolic
variables βa and βb represent the contents of cells x · a and x · b, respectively, so the numeric property
specified above can expressed simply by using a logical formula involving βa and βb (as shown).
In general, a separating shape graph σ ♯ is defined over a set of symbolic variables V♯ [σ ♯ ] where
♯
V [σ ♯ ] ⊆ V♯ . The properties of the values stored in heaps described by σ ♯ can be characterized by
Modular Construction of Shape-Numeric Analyzers
168
σ4♯
bC
b
σ3♯
Dnum hσ4♯ i
b
Dnum hσ3♯ i
bC
b
b
σ1♯
bC
b
b
Dnum hσ1♯ i
b
b
σ2♯
Dnum hσ2♯ i
bC
b
b
b
bC
b
σ0♯
b
b
Dnum hσ0♯ i
b
Figure 6: The combined shape-numeric abstract domain is a cofibered layering of a numeric abstract
domain on a shape abstract domain.
logical formulas over V♯ [σ ♯ ]. Such logical formulas expressing numeric properties can be represented
using a numeric abstract domain Dnum hV♯ [σ ♯ ]i that abstracts functions from V♯ [σ ♯ ] to V, that is, it
comes with concretization function parametrized by a set of symbolic values V♯ [σ ♯ ] of the following
type: γnum hV♯ [σ ♯ ]i : Dnum hV♯ [σ ♯ ]i → P(V♯ [σ ♯ ] → V). For example, the numeric property mentioned
in Figure 5 could be expressed using the convex polyhedra abstract domain [12]. As a shape graph
concretizes into a set of pairs composed of a heap σ and a valuation ν : V♯ [σ ♯ ] → V, such numeric
constraints simply restrict the set of admissible valuations.
The need to combine a shape graph with a numeric constraint suggests using a product abstraction [11] of a shape abstract domain H♯ and a numeric abstract domain Dnum h−i. However, note that
the numeric abstract domain that needs to be used depends on the separating shape graph, as the set of
dimensions is equal to the set of nodes in the separating shape graph. Therefore, the conventional notion
of a symmetric reduced product does not apply here. Instead, we use a different construction known as a
cofibered abstract domain [38] (in reference with the categorical notion underlying this construction).
Definition 4 (Combined shape-numeric abstract domain). Given a shape domain H♯ and a numeric domain Dnum h−i parametrized by a set of symbolic variables. We let N♯ denote the set of numeric abstract
def S
values corresponding to any shape graph (i.e., N♯ = {Dnum hV i | V ⊆ V♯ }), and we define the combined
shape-numeric abstract domain H♯ ⇒ N♯ and its concretization γH♯ ⇒N♯ : (H♯ ⇒ N♯ ) → P(H×(V♯ → V))
as follows:
H♯ ⇒ N♯ = {(σ ♯ , ν ♯ ) | σ ♯ ∈ H♯ and ν ♯ ∈ Dnum hV♯ [σ ♯ ]i}
def
γH♯ ⇒N♯ (σ ♯ , ν ♯ ) = {(σ , ν ) | (σ , ν ) ∈ γH (σ ♯ ) and ν ∈ γnum hV♯ [σ ♯ ]i(ν ♯ )}
def
This product is clearly asymmetric, as the left member defines the abstract lattice to which the right
member belongs. We illustrate this structure in Figure 6. The left part depicts the lattice of abstract
heaps, while the right part illustrates a lattice of numeric lattices. Each element of the lattice of lattices
is an instance of the numeric abstract domain over the symbolic variables defined by the abstract heap,
that is, it is the image of the function σ ♯ 7→ Dnum hV♯ [σ ♯ ]i.
This dependence is not simply theoretical but has practical implications on both the representation
of abstract values and the design of abstract operations in the combined abstract domain. For instance,
B.-Y. E. Chang and X. Rival
169
a
a
αx
β1
∧ β1 = δ1
αx
β0
b
b
δ1
Figure 7: Two abstractions drawn from the combined abstract domain H♯ ⇒ N♯ that have equivalent
concretizations but with non-isomorphic sets of symbolic variables.
αx
a
b
β
−→x·b=x·a
δ
αx
a
b
β
δ
Figure 8: Applying the transfer function for an assignment on a separating shape graph that changes the
set of “live” symbolic variables.
Figure 7 shows two separating shape graphs together with numerical invariants that represent the same set
of concrete stores even though they use two different sets of symbolic variables (even up to α -renaming).
Both of these combined shape-numeric abstract domain elements represent a store with two fields x · a
and x · b such that x · a = x · b. In the right abstract domain element, the contents of both fields are
associated with distinct nodes, and the values denoted by those nodes are constrained to be equal by the
numeric domain. In the left graph, the contents of both fields are associated to the same node, which
implies that they must be equal (without any constraint in the numeric domain).
Now, with respect to the design of abstract operations in the combined abstract domain, the set of
nodes in the shape graph will in general change during the course of the analysis. For instance, the
analysis of an assignment of the value contained into field a to field b from the abstract state shown in
the left produces the one in the right in Figure 8. After this transformation takes place, node δ becomes
“garbage” or irrelevant, as it is not linked anywhere in the shape graph, and no numeric property is
attached to it. This symbolic variable δ should thus be removed or projected from the numeric abstract
domain. Other operations can cause new symbolic variables to be added, and this issue is only magnified
with summaries (cf., Section 3.3). Thus, the combined abstract domain must take great care in ensuring
the consistency of the numeric abstract values with the shape graphs, as well as dealing with graphs
with different sets of nodes. Considering again the diagram in Figure 6, whenever two shape graphs
are ordered σ0♯ ⊑ σ1♯ , there exists a symbolic variable renaming function Φhσ0♯ , σ1♯ i : V♯ [σ1♯ ] → V♯ [σ0♯ ]
that expresses a renaming of the symbolic variables from the weaker shape graph σ1♯ to the stronger
one σ0♯ . For example, the symbolic renaming function Φ for the shape graphs shown in Figure 7 is
[αx 7→ αx , β1 7→ β0 , δ1 7→ β0 ].
Related work and discussion. In practice, the implementation of the shape abstract domain takes the
form of a functor (in the ML programming sense) that takes as input a module implementing a numeric
domain interface (e.g., a wrapper on top of the A PRON library [20]) and outputs another module that
implements the memory abstract domain interface. The construction that we have shown in this section
is general to analyses where the set of symbolic variables is dynamic during the course of the analysis
and where the inference of this set is bound to the inference of cell contents. In other words, it is wellsuited to applying shape analyses for summarizing memory cells and then reasoning about their contents
with another domain. This construction has been used not only in Xisa [7] but also in a TVLA-based
setup [25] and one based on a history of heap updates [6].
Another approach that avoids this construction by performing a sequence of analyses: first, a shape
170
Modular Construction of Shape-Numeric Analyzers
analysis infers the set of symbolic variables; then, a numeric static analysis relies on this set [23, 24].
While less involved, this approach prevents the exchange of information between both analyses, which is
often required to achieve a satisfactory level of precision [7]. This sequencing of heap analysis followed
by value analysis is similar to the application of a pre-pass pointer analysis followed by model checking
over a Boolean abstraction exemplified in SLAM [1] and BLAST [18]
3.3 Enhancing store abstractions with summaries
So far, we have considered very simple abstract heaps described by separating shape graphs where all
concrete memory cells are abstracted by exact points-to edges. To support abstracting a potentially
unbounded number of concrete memory cells via dynamic memory allocation, we must extend abstract
heaps with summarization, that is, a way of providing a compact abstraction for possibly unbounded,
possibly non-contiguous memory regions.
As an example, consider the conαx
&x 0x...
&x 0x...
&x 0x0
crete stores shown in the left part of Figure 9 consisting of a series of linked lists
0x0
0x...
...
...
with 0, 1, and 2 elements. These conβ
crete stores are just instances among inlist
0x0
finitely many ones where x stores a ref...
erence to a list of arbitrary length. Each
of these instances consist of two re- Figure 9: Summarizing linked lists with inductive predicate
gions: the cell corresponding to variable edges in separating shape graphs.
x (green) and the list elements (blue).
To abstract all of these stores in a compact and precise manner, we need to summarize the second region with a predicate. We can define such a predicate for summarizing such a region using an inductive
definition list following the structure of lists: α · list := (emp ∧ α = 0x0) ∨ (α · a 7→ β0 ∗ α · b 7→ β1 ∗
β0 · list ∧ α 6= 0x0). This definition notation is slightly non-standard to match the graphical notation: the
predicate name is list and α is the formal induction parameter. A list memory region is empty if the root
pointer α of the list is null, or otherwise, there is a head list element with two fields a and b such that the
contents of cell α · a called β0 is itself a pointer to a list. Then, in Figure 9, if variable x contains a pointer
value denoted by β , the second region can be summarized by the inductive predicate instance β · list.
Furthermore, the three concrete stores are abstracted by the abstract heap αx 7→ β ∗ β · list (drawn as a
graph to the right). The inductive predicate β · list is drawn as the bold, thick edge from node β .
Materialization: The analyzer must be able to apply transfer functions on summarized regions. However, designing precise transfer functions on arbitrary summaries is extremely difficult. An effective
approach is to define direct transfer functions only on exact predicates and then define transfer functions
on summaries indirectly via materialization [32] of exact predicates from them. In the following, we
focus on the case where summaries are derived from inductive predicates [8] and thus call the materialization operation unfolding. In practice, unfolding should be guided by a specification of the summarized
region where the analyzer needs to perform local reasoning on materialized cells (see Section 4.2). However, from the theoretical point of view, we can let an unfolding operator be defined as some function
♯
♯
, νn−1
).
that replaces one abstract (σ ♯ , ν ♯ ) with a finite set of abstract elements (σ0♯ , ν0♯ ), . . . , (σn−1
Definition 5 (Materialization). Let us write
⊆ (H♯ ⇒ N♯ ) × Pfin (H♯ ⇒ N♯ ) for the unfolding relation.
B.-Y. E. Chang and X. Rival
171
Then, any unfolding of an abstract element should be sound with respect to concretization:
If (σ ♯ , ν ♯ )
♯
♯
, νn−1
) , then γH♯ ⇒N♯ (σ ♯ , ν ♯ ) ⊆
(σ0♯ , ν0♯ ), . . . , (σn−1
[
γH♯ ⇒N♯ (σi♯ , νi♯ ) .
0≤i<n
As seen above, the finite set of abstract elements that results from materialization represents a disjunction
of abstract elements (i.e., materialization is a form of case analysis). For precision, we typically want
an equality instead of inclusion in the conclusion, which motivates a need to represent a disjunction of
abstract elements (cf., Section 3.4).
Example 3 (Unfolding an inductively-defined list). For instance, the abstract element from H♯ ⇒ N♯
depicted in Figure 9 can be unfolded to two elements:
(αx 7→ β ∗ β · list, ⊤)
(αx 7→ β , β = 0x0), (αx 7→ β ∗ β · a 7→ β0 ∗ β · b 7→ β1 ∗ β0 · list, β 6= 0x0) ,
which means that the list pointer β is either a null pointer or points to a list element whose a field contains
a pointer to another list.
Related work and discussion. Historically, the idea of using compact summaries for an unbounded
number of concrete memory cells goes back to at least Jones and Muchnick [21], though the set of
abstract locations was fixed a priori before the analysis. Chase et al. [9] considered dynamic summarization during analysis, while Sagiv et al. [32] introduced materialization. We make note of existing
analysis algorithms that make use of summarization-materialization. TVLA summary nodes [31] represent unbounded sets of concrete memory cells with predicates that express universal properties of all
the concrete cells they denote. The use of three-valued logic enables abstraction beyond a set of exact
points-to constraints (i.e., the separating shape graphs in Section 3.1 are akin to two-valued structures in
TVLA), and summarization is controlled by instrumentation predicates that limits the compaction done
by canonical abstraction. Fixed list segment predicates [2, 14] characterize consecutive chains of list
elements by its first and last pointers. Thus, a predicate of the form ls(α , α ′ ) denotes all chains of list
elements (of any length) starting at α and ending at α ′ . Then, an abstract heap consists of a separating
conjunction of points-to predicates (Section 3.1) and list segments. These predicates can be generalized
to other structure segments. Inductive predicates [7, 8] generalize the list segment predicates in several
ways. First, the abstract domain may be parametrized by a set of user-supplied inductive definitions.
Note that as parameters to the abstract domain and thus the analyzer, the inductive definitions specify
possible templates for summarization. A sound analysis can only infer a summary predicate essentially
if it exhibits an exact instance of the summary. The “correctness” of such inductive definitions are
not assumed, but rather a disconnect between the user’s intent and the meaning an inductive predicate
could lead to unexpected results. Second, inductive predicates can correspond to complete structures
(e.g., a tree that is completely summarized into a single abstract predicate), whereas segments correspond to incomplete structures characterized by a missing sub-structure. Inductive predicates can be
generically lifted to unmaterializable segment summaries [8] or materializable ones [7]. Independently,
array region predicates [15] have been used to describe the contents of zones in arrays. Some analyses
on arrays and containers have used index variables into summaries instead of explicit materialization
operations [13, 16, 17].
3.4 Lifting store abstractions to disjunctive memory state abstractions
At this point, we have described an abstraction framework for concrete stores σ . To complete an abstraction for memory states m : (E, σ ), we need two things: (1) an abstract counterpart to E and (2) a
disjunctive abstraction for when a single abstract heap σ ♯ is insufficient for precisely abstracting the set
of possible concrete stores.
Modular Construction of Shape-Numeric Analyzers
172
Abstract environments: Since the abstract counterpart for addresses are symbolic variables (or nodes)
in shape graphs, an abstract environment E ♯ can simply be a function mapping program variables to
nodes, that is, E ♯ ∈ E♯ = X → V♯ . Now, the memory abstract domain M♯ is defined by M♯ = E♯ × (H♯ ⇒
N♯ ), and its concretization γM : M♯ → P(E × H) can be defined as follows:
γM (E ♯ , (σ ♯ , ν ♯ )) = {(ν ◦ E ♯ , σ ) | (σ , ν ) ∈ γH (σ ♯ ) and ν ∈ γnum hV♯ [σ ♯ ]i(ν ♯ )} .
def
Note that in an abstract memory state m♯ : (E ♯ , σ ♯ ), the abstract environment E ♯ simply gives the symbolic address of program variables, while the abstract heap σ ♯ abstracts all memory cells—just like the
concrete model in Section 2.2.
We let the abstract environment be depicted by node x
y
a
a
αy
labels in the graphical representation of abstract heaps. αx
βa
δa
For instance, the concrete memory state shown in Figure 1
βb
δb
b
b
can be described by the diagram in Figure 10.
c
c
βc
δc
Disjunctive abstraction: Recall that the unfolding operation from Section 3.3 generates a finite disjunction of Figure 10: Depicting a memory abstraction
abstract facts—specifically, combined shape-numeric ab- including the abstract heap from Figure 4
stract elements {. . . , (σi♯ , νi♯ ), . . .} ⊆ H♯ ⇒ N♯ . Thus, a dis- and an abstract environment.
junctive abstraction layer is required regardless of other
analysis reasons (e.g., path-sensitivity). We assume the
disjunctive abstraction is defined by an abstract domain M♯∨ and a concretization function γ∨ : M♯∨ →
P(M). We do not prescribe any specific disjunctive abstraction. A simple choice is to apply a disjunctive completion [11], but further innovations might be possible by taking advantage of being specific to
memory.
Example 4 (Disjunctive completion). For a memory abstract domain M♯ , its disjunctive completion M♯∨
is defined as follows:
M♯∨ = Pfin (M♯ )
def
γ∨ (s♯ ) =
def
[
{γM (m♯ ) | m♯ ∈ s♯ } .
In Figure 11, we sum up the structure of the abstract domain for abstracting memory states M as a
stack of layers, which are typically implemented as ML-style functors. Each layer corresponds to the
abstraction of a different form of concrete semantics (as shown in the diagram).
Related work and discussion. Trace partitioning [30] relies on control-flow history to manage disjunctions, which could be used as an alternative to disjunctive completion. However, it is a rather general
construction and can be instantiated in multiple ways with a large effect on precision and performance.
4
Static analysis operations
In this section, we describe the main abstract operations on the memory abstract domain M♯ and demonstrate how they are computed through the composition of abstract domains discussed in Section 3. Our
presentation describes each kind of operation (i.e., transfer functions for commands like assignment, abstract comparison, and abstract join) one by one and shows how unfolding and folding operations are
triggered by their application. The end result of this discussion is a description of how these domains
implement the interfaces shown in Figure 12. For these interfaces, we let B denote the set of booleans
{true, false} and U denote an undefined value for some functions that may fail to produce a result. We
write XU for X ⊎ {U} for any set X (i.e., an option type).
B.-Y. E. Chang and X. Rival
173
disjunctive abstract domain
γ∨ : M♯∨ → P(M)
memory abstract domain
γM : M♯ → P(M)
M♯ = E♯ × (H♯ ⇒ N♯ )
combined shape-numeric abstract domain
γH♯ ⇒N♯ : (H♯ ⇒ N♯ ) → P(H × (V♯ → V))
shape abstract domain
γH : H♯ → P(H × (V♯ → V))
numeric abstract domain
γnum hV♯ [σ ♯ ]i : Dnum hV♯ [σ ♯ ]i → P(V♯ [σ ♯ ] → V)
Figure 11: Layers of abstract domains to yield a disjunctive memory state abstraction. From an implementation perspective, the edges correspond to inputs for ML-style functor instantiations.
4.1 Assignment over materialized cells
First, we consider the transfer function for assignment. In this subsection, for simplicity, we focus on
the case where none of the locations that appear in either side of the assignment are summarized, and we
defer the case of transfer functions over summarized graph regions to Section 4.2. Because of this simplification, the types of the abstract operators mentioned will not exactly match those given in Figure 12.
At the same time, this transfer function captures the essence of the shape-numeric combination.
Recall that loc ∈ LX and exp ∈ EX are location and value expressions, respectively, in our programming language (cf., Figure 2). The transfer function assignmem : LX × EX × M♯ → M♯ should compute
a sound post-condition for the assignment command loc = exp stated as follows:
Condition 1 (Soundness of assignmem ). If (E, σ ) ∈ γM (m♯ ), then
(E, σ [LJlocK(E, σ ) ← EJexpK(E, σ )]) ∈ γM (assignmem (loc, exp, m♯ )) .
Assignments of the form loc = loc′ . Let us first assume that right hand side of the assignment is a
location expression. As an example, consider the assignment shown in Figure 13 and applying assignmem
to the pre-condition on the left to yield the post-condition on the right. The essence is that loc dictates an
edge that should be updated to point to the node specified by loc′ .
To compute a post-condition in this case, assignmem should update the abstract heap, that is, the preheap σ ♯ ∈ H♯ . An assignmem call should eventually forward the assignment to the heap abstract domain
via the eval[l]shape operation that evaluates a location expression loc to an edge, eval[e]shape that evaluates
a value expression exp to a node, and mutateshape that swings a points-to edge.
The base of a sequence of pointer dereferences is given by a program variable, so the first step consists
of replacing the program variables in the assignment with the symbolic names corresponding to their
addresses using the abstract environment E ♯ . For our example, this results in the call to assigncomb (α0 ->
a · b, α0 · b, (σ ♯ , ν ♯ )) at the combined shape-numeric layer, which should satisfy a soundness condition
similar to that of assignmem (Condition 1). The next step consists of traversing the abstract heap σ ♯
Modular Construction of Shape-Numeric Analyzers
174
• A shape abstract domain H♯
eval[l]shape :
eval[e]shape :
mutateshape :
unfoldshape :
newshape :
delete[n]shape :
delete[e] shape :
compareshape :
joinshape :
widenshape :
LV♯ × H♯
EV♯ × H♯
V♯ × F × V♯ × H♯
(LV♯ × F) × H♯
V♯ × H♯
V♯ × H♯
V♯ × F × H♯
(V♯ → V♯ ) × H♯ × H♯
((V♯ )2 → V♯ ) × H♯ × H♯
((V♯ )2 → V♯ ) × H♯ × H♯
(V♯ × F × H♯)U
(V♯ × H♯ )U
H♯U
Pfin (H♯ × EV♯ )
H♯
H♯
H♯
{false} ⊎ {true} × (V♯ → V♯ )
H♯ × (V♯ → V♯ )2
H♯ × (V♯ → V♯ )2
−→
−→
−→
−→
−→
−→
−→
−→
−→
−→
• A numeric abstract domain over symbolic variables N♯
assignnum :
guardnum :
newnum :
delete[n]num :
renamenum :
comparenum :
joinnum :
widennum :
LV♯ × EV♯ × N♯
EV♯ × N♯
V♯ × N♯
V♯ × N♯
(V♯ → V♯ ) × N♯
N♯ × N♯
N♯ × N♯
N♯ × N♯
−→
−→
−→
−→
−→
−→
−→
−→
N♯
N♯
N♯
N♯
N♯
B
N♯
N♯
−→
−→
−→
−→
−→
−→
−→
−→
Pfin (H♯ ⇒ N♯ )U
Pfin (H♯ ⇒ N♯ )U
Pfin (H♯ ⇒ N♯ )U
Pfin (H♯ ⇒ N♯ )U
Pfin (H♯ ⇒ N♯ )U
{false} ⊎ {true} × (V♯ → V♯ )
(H♯ ⇒ N♯ )
(H♯ ⇒ N♯ )
• A combined shape-numeric abstract domain H♯ ⇒ N♯
assigncomb :
guardcomb :
unfoldcomb :
alloccomb :
freecomb :
comparecomb :
joincomb :
widencomb :
LV♯ × EV♯ × H♯ ⇒ N♯
EV♯ × (H♯ ⇒ N♯ )
LV♯ × H♯ ⇒ N♯
LV♯ × F∗ × (H♯ ⇒ N♯ )
LV♯ × F∗ × (H♯ ⇒ N♯ )
(V♯ → V♯ ) × (H♯ ⇒ N♯ ) × (H♯ ⇒ N♯ )
((V♯ )2 → V♯ ) × (H♯ ⇒ N♯ ) × (H♯ ⇒ N♯ )
((V♯ )2 → V♯ ) × (H♯ ⇒ N♯ ) × (H♯ ⇒ N♯ )
• A memory abstract domain M♯
assignmem :
guardmem :
allocmem :
freemem :
comparemem :
joinmem :
widenmem :
LX × EX × M♯
EX × M♯
LX × F∗ × M♯
LX × F∗ × M♯
M♯ × M♯
M♯ × M♯
M♯ × M♯
−→
−→
−→
−→
−→
−→
−→
Pfin (M♯ )U
Pfin (M♯ )U
Pfin (M♯ )U
Pfin (M♯ )U
B
M♯
M♯
Figure 12: Interfaces for the abstract domain layers shown in Figure 11 (except the disjunctive abstraction
layer).
B.-Y. E. Chang and X. Rival
y
a
α0
b
a
α1
α2
175
b
α3
y · a -> b = y · b
y
a
α0
b
α4
α1
α2
b
a
α3
α4
Figure 13: Applying assignmem to an example assignment of the form loc = loc′ .
L OC A DDRESS
L OC F IELD
L OC VAL
eval[l]shape (loc · g, σ ♯ ) = (α , f + g)
eval[l]shape (⋆exp, σ ♯ ) = (α , 0)
/
eval[l]shape (loc, σ ♯ ) = (α , f)
eval[l]shape (α , σ ♯ ) = (α , 0)
/
VAL D EREFERENCE
eval[l]shape (loc, σ ♯ ) = (α , f)
σ ♯ = σ0♯ ∗ α · f 7→ β
eval[e]shape (loc, σ ♯ ) = β
eval[e]shape (exp, σ ♯ ) = α
VAL L OC
eval[l]shape (loc, σ ♯ ) = (α , 0)
/
eval[e]shape (&loc, σ ♯ ) = α
Figure 14: Evaluating dereferences in an abstract heap.
according to the location expression and the value expression of the assignment. As mentioned above,
this evaluation is performed using the location evaluation function eval[l]shape that yields an edge and the
value expression evaluation function eval[e]shape that yields a node.
Condition 2 (Soundness of eval[l]shape and eval[e]shape ). Let (σ , ν ) ∈ γH (σ ♯ ). Then,
If eval[l]shape (loc, σ ♯ ) = (α , f) , then LJlocK(σ ) = ν (α ) + f .
If eval[e]shape (loc, σ ♯ ) = β , then EJlocK(σ ) = ν (β ) .
In Figure 14, we define eval[l]shape and eval[e]shape following the syntax of location and value expressions (over symbolic variables). We write 0/ for a designated 0-offset field. This abstract evaluation
corresponds directly to the concrete evaluation defined in Figure 3. Note that abstract evaluation is
not necessarily defined for all expressions. For example, an points-to edge may simply not exist for
the computed address in VAL D EREFERENCE. The edge may need to be materialized by unfolding (cf.,
Section 4.2) or otherwise is a potential memory error.
Returning to the example in Figure 13, we get eval[l]shape (α0 -> a · b, σ ♯ ) = (α1 , b)—the cell being
assigned-to corresponds to the exact points-to edge α1 · b 7→ α4 —and eval[e]shape (α0 · b) = α2 —the value
to assign is abstracted by α2 . The abstract post-condition returned by assigncomb should reflect the
swinging of that edge in the shape graph, which is accomplished by the mutateshape function:
mutateshape (α , f, β , (α · f 7→ δ ) ∗ σ ♯ ) = (α · f 7→ β ) ∗ σ ♯ .
This function simply replaces a points-to edge named by the address α and field f with a new one for
the updated contents (and fails if such a points-to edge does not exist in the abstract heap σ ♯ ). The
effect of this assignment can be completely reflected in the abstract heap since the cell corresponding
to the assignment is abstracted by exactly one points-to edge and the new value to store in that cell is
also exactly abstracted by one node. We note that node α4 is no longer reachable in the shape graph,
and thus the value that this node denotes is no longer relevant when concretizing the abstract state. As a
consequence, it can be safely removed both in H♯ (using function delete[n] shape ) and in N♯ (using function
Modular Construction of Shape-Numeric Analyzers
176
a
α0
b
y
c
a
α1
α2
∧ α3 ≤ α2
y·c=y·b+1
α0
y
α1
c
α3
∧ α3 ≤ α2
∧ α4 = α2 + 1
α2
b
α4
α3
Figure 15: Applying assignmem to an example assignment of the form loc = exp.
x
α0
y
α2
list
α1
x
∧ α2 6= 0x0
y = x -> next
α0
α2
y
next
d
α1
α3
list
∧ α2 6= 0x0
α4
Figure 16: Applying assignmem to an example that affects the summarized region α2 · list.
delete[n] num ). Such an existential projection or “garbage collection” step may be viewed as a conversion
operation in the cofibered lattice structure shown in Figure 6.
Assignments of the form loc = exp. In general, the right-hand side of an assignment is not necessarily
a location expression. The evaluation of left-hand side loc proceeds as above, but the evaluation of the
right-hand side expression exp is extended. As an example, consider the assignment shown in Figure 15.
The evaluation of the location expression down to the abstract heap level works as before where
we find that eval[l]shape (α0 · c, σ ♯ ) = (α0 , c). For the right-hand–side expression, it is not obvious what
eval[e]shape (α0 ·b+ 1, σ ♯ ) should return, as no symbolic node is equal to that value in the concretization of
all elements of σ ♯ . It is possible to evaluate sub-expression α0 · b to α2 , but then eval[e]shape (α2 + 1, σ ♯ )
cannot be evaluated any further. The solution is to create a new symbolic variable and constrain it to
represent the value of the right-hand–side expression. Therefore, the evaluation of assigncomb proceeds
as follows: (1) generate a fresh node α4 ; (2) add α4 to the abstract heap σ ♯ and the numeric abstract
value ν ♯ using the function newshape and newnum , respectively; (3) update the numeric abstract value ν ♯
using assignnum (α4 , α2 + 1, ν ♯ ), which over-approximates constraining α4 = α2 + 1; and (4) mutate with
mutateshape with the new node α4 (i.e., mutateshape (α0 , c, α4 , σ ♯ )).
4.2 Unfolding and assignment over summarized cells
We now consider assignmem in the presence of
summary predicates, which intuitively “get in struct list { struct list ⋆ next; int d; };
the way” of evaluating location and value ex- α · list := (emp ∧ α = 0x0)
∨ (α · next 7→ β0 ∗ α · d 7→ β1 ∗ β0 · list ∧ α 6= 0x0)
pressions in a shape graph. For instance, consider trying to apply the assignment shown in
Figure 16. On the left, we have a separating shape graph where α2 is a list described by the inductive definition shown inset. For clarity, we also show the C-style struct definition that corresponds to the layout of
each list element. In applying the assignment, the evaluation of the right-hand–side expression x -> next
fails. While x evaluates to node α2 , there is no points-to edge from α2 . Thus, eval[e]shape (α0 -> next)
fails. It is clear that the reason for this failure is that the memory cell corresponding to the right-hand–
side expression is summarized as part of the α2 · list predicate. To materialize this cell, this predicate
B.-Y. E. Chang and X. Rival
177
should be unfolded; then, the assignment can proceed as in the previous section (Section 4.1). We can
now describe the transfer function for assignment assignmem (loc, exp, (σ ♯ , ν ♯ )) in general:
1. It should call the underlying assigncomb and follow the process described previously in Section 4.1.
If evaluation via eval[l]shape or eval[e]shape fail, then they should return a failure address, which
consists of a pair (β , f) corresponding to the node and field offset that does not have a materialized
points-to edge. In the example in Figure 16, the failure address is (α2 , next). Note that the interface
for evaluation shown in Figure 16 does not show the contents of the failure case for simplicity.
2. Then, assigncomb in the combined domain performs an unfolding of the abstract heap by calling
a function unfoldshape that implements the unfolding relation
with the target points-to edge to
materialize (β , f).
Condition 3 (Soundness of unfoldshape ).
γH (σ ♯ ) ⊆
[
{(σ , ν ) ∈ γH (σu♯ ) | (σu♯ , expu ) ∈ unfoldshape ((β , f), σ ♯ ) and Jexpu K(ν ) = true} .
Note that unfolding of an abstract heap returns pairs consisting of an unfolded abstract heap and
a numeric constraint as an expression expu ∈ EV♯ [σ ♯ ] over the symbolic variables of the unfolded
u
abstract heap. This expression allows a summary to contain constraints not expressible in a shape
graph itself. For instance, in the list inductive definition, each case comes with a nullness or nonnullness condition on the head pointer. Or more interestingly, we can imagine an orderedness
constraint for an inductive definition describing an ordered list. For the example from Figure 16,
unfolding the shape graph at (α2 , next) generates two disjuncts, but the one corresponding to the
empty list can be eliminated due to the constraint that α2 has to be non-null.
3. The numeric constraints should be evaluated in the numeric abstract domain using a condition test
operator guardnum .
Condition 4 (Soundness of guardnum ). Let V ⊆ V♯ , ν ♯ ∈ Dnum hV i, and ν ∈ γnum hV i(ν ♯ ). Then,
If JexpK(ν ) = true , then ν ∈ γnum hV i(guardnum (exp, ν ♯ )) .
Thus, the initial abstract state in the combined domain (σ ♯ , ν ♯ ) ∈ H♯ ⇒ N♯ can be over-approximated
by the following finite set of abstract states:
unfoldcomb (loc, (σ ♯ , ν ♯ )) = {(σu♯ , guardnum (expu , ν ♯ )) | (σu♯ , expu ) ∈ unfoldshape ((β , f), σ ♯ )}
def
4. Finally, assigncomb should perform the same set of operations as described in Section 4.1 to reflect
the assignment on each unfolded heap. The assigncomb returns a finite set of elements because
of potential unfolding (and similarly for assignmem ). The soundness condition for assignmem is
therefore as follows.
Condition 5 (Soundness of assignmem ). Let (E, σ ) ∈ γM (m♯ ). Then,
(E, σ [LJlocK(E, σ ) ← EJexpK(E, σ )]) ∈
[
{γM (m♯u ) | m♯u ∈ assignmem (loc, exp, m♯ )} .
A very similar soundness condition applies to assigncomb .
Figure 16 shows the resulting abstract state for the assignment after unfolding and mutation on the
right. In certain cases, the unfolding process may have to be performed multiple times due to repeated
failures of calling eval[l]shape and eval[e]shape as shown in Chang and Rival [7]. This behavior is expected,
as unfolding may fail to materialize the correct region, and thus, termination should be enforced with a
bound on the number of unfolding steps.
Modular Construction of Shape-Numeric Analyzers
178
x
α0
x
α2
list
∧ α2 6= 0x0
assume(x -> next 6= 0x0)
α0
α2
next
d
α3
list
∧ α2 =
6 0x0
∧ α3 =
6 0x0
α4
Figure 17: Applying the condition test guardmem to an example that affects a summarized region α2 · list.
4.3 Other transfer functions
Unfolding is also the basis for most other transfer functions. Once the points-to edges in question are
materialized, their definition is straightforward as it was for assignment (cf., Section 4.1).
• Condition test. The abstract domain M♯ should define an operator guardmem that takes an expression (of Boolean type) and an abstract value and then returns an abstract value that has taken into
account the effect of the guard expression. Just like with assignment, this function may need to
perform an unfolding and thus returns in general a finite set of abstract states.
Condition 6 (Soundness of guardmem ). Let m ∈ γM (m♯ ). Then,
If JexpK(m) = true , then m ∈
[
{γH (σu♯ ) | σu♯ ∈ γM (guardmem (exp, m♯ ))} .
It applies the transfer function assignnum provided by N♯ satisfying a similar soundness condition,
which is fairly standard (e.g., the A PRON library provides such a function).
• Memory allocation. Transfer function allocmem accounts for the allocation of a fresh memory
block, and the assignment of the address of this block to a given location. Given abstract precondition σ ♯ , the abstract allocation function allocmem (loc, [f1 , . . . , fn ], σ ♯ ) returns a sound abstract
post-condition for the statement loc = malloc({f1 , . . . , fn }).
• Memory deallocation. Similarly, transfer function freemem accounts for freeing the block pointed
to by an instruction such as free. It takes as argument a location pointing to the block being
freed, a list of fields, and the abstract pre-condition. It may also need to perform unfolding to
materialize the location. It calls freecomb in the H♯ ⇒ N♯ level, which then materializes pointsto edges corresponding to the block to remove and deletes them from the graph using function
delete[e] shape defined by delete[e] shape (α , f, α · f 7→ β ∗ σ0♯ ) = σ0♯ . After removing these edges, some
symbolic nodes may become unreachable in the graph and should be removed using delete[n]shape
and delete[n]num .
The analysis of a more full featured programming language would require additional classical transfer
functions, such as support for variable creation and deletion, though this can be supported completely at
the memory abstract domain M♯ layer with the abstract environment E ♯ .
As an example of a condition test, consider applying guardmem in Figure 17. In the same way as
for the example assignment of Figure 16, the first attempt to compute guardcomb (α2 -> next 6= 0x0, σ ♯ )
fails, as there is no points-to edge labeled with next starting from node α2 . Thus guardcomb must first
call unfoldcomb . The unfolding returns a pair of abstract elements, yet the one corresponding to the
case where the list is empty does not need to be considered any further due to the numerical constraint
α2 6= 0x0. Therefore, only the second abstract elements remains, which corresponds to a list with the
first element materialized. At this stage, expression α2 -> next can be evaluated. Finally, the condition
test is reflected by applying guardnum in the numerical abstract domain N♯ .
B.-Y. E. Chang and X. Rival
179
m♯1 : (E1♯ , (σ1♯ , ν1♯ ))
m♯0 : (E0♯ , (σ0♯ , ν0♯ ))
x
α0
α2
next
d
y
α1
α3
α4
next
α5
d
α6
x
list
α7
∧ α3 ≤ α5
∧ α5 ≤ α7
α′0
α′2
⊑
next
d
y
α′1
α′3
α′4
list
α′5
∧ α3′ ≤ α5′
Figure 18: An abstract inclusion that holds and shows the need for a node relation Φ. In both abstract
heaps, variable x points to a list and y points to a number. On the left, the abstract heap describes a list
with at least two elements, while on the right, it describes one with at least one element. The number
pointed to by y is less than or equal to the data field d of the first element in both abstract heaps. The
data field of the first element is less than or equal to the data field of the second in the left abstract heap.
4.4 Abstract comparison
Abstract interpreters make use of inclusion testing operations in many situations, such as checking that
an abstract post-fixed point has been reached in a loop invariant computation or that some, for example,
user-supplied post-condition can be verified with the analysis results. As inclusion is often not decidable,
the comparison function is not required to be complete but should meet a soundness condition:
Condition 7 (Soundness of comparemem ). If comparemem (m♯0 , m♯1 ) = true, then γM (m♯0 ) ⊆ γM (m♯1 )
The implementation of such an operator is complicated by the fact that the underlying abstract heaps
may have distinct sets of symbolic nodes. This issue is a manifestation of the the cofibered abstract
domain construction (Section 3.2). The concretizations of all abstract domains below H♯ ⇒ N♯ make
use of valuations, and thus the inclusion checking operator needs to account for a relation between the
symbolic nodes of the graphs. This relation between nodes in two graphs Φ is computed step-by-step
during the course of the inclusion checking.
The example in Figure 18 illustrates these difficulties. It is quite intuitive that any state in the concretization of m♯0 is also in the concretization of m♯1 . To see the role of the node relation Φ, let us consider
concretizations of m♯0 and m♯1 . Clearly, if concrete state (E, σ ) is in the concretization of m♯0 and in the
concretization of m♯1 , then node α0 in m♯0 and α0′ denotes the address of x. Thus α0 and α0′ denote the
same value, that is, valuations used as part of the concretization should map those two nodes to the same
value. The Φ should relate these two nodes akin to a unification substitution. Similarly, α2 and α2′ both
denote the value stored in variable x, thus should be related in Φ. On the other hand, node α6 of abstract
state m♯0 has no counterpart in m♯1 —it corresponds to a null or non-null address in the region summarized
by the inductive edge.
We notice Φ can be viewed as a map from nodes in m♯1 to nodes of m♯0 and in this example, defined
by Φ(αi′ ) = αi for 0 ≤ i ≤ 5. Also, we notice that mapping Φ can be derived step-by-step, starting from
the abstract environments. Thus, compareshape and comparecomb each take as a parameter a set of pairs of
symbolic nodes that should be related in Φ. We call this initial set the roots, as they are used as a starting
point in the computation of Φ.
We can now describe the steps of computing comparemem (m♯0 : (E0♯ , (σ0♯ , ν0♯ )), m♯1 : (E1♯ , (σ1♯ , ν1♯ ))):
1. First, an initial node mapping Φ : V♯ [σ1♯ ] → V♯ [σ0♯ ] is derived from the abstract environments:
def
Φ = E0♯ ◦(E1♯ )−1 . This definition states that the addresses of the program variables in m♯1 correspond
to the respective addresses of the program variables in m♯0 . It is well-defined, as two distinct
Modular Construction of Shape-Numeric Analyzers
180
variables cannot be allocated at the same physical address.
2. Then, it calls comparecomb (Φ, (σ0♯ , ν0♯ ), (σ1♯ , ν1♯ )) that forwards to a call of compareshape (Φ, σ0♯ , σ1♯ ).
3. The abstract heap comparison function compareshape attempts to match σ0♯ and σ1♯ region-by-region
using a set of local rules:
♯
♯
• (Decomposition) Suppose σ0♯ and σ1♯ can be decomposed as σ0♯ = σ0,0
and σ1♯ =
∗ σ0,1
♯
♯
σ1,0 ∗ σ1,1 . And if the corresponding sub-regions can be shown to satisfy the inclusions
♯
♯
, σ1,0
) = (true, Φ′ ) and
compareshape (Φ, σ0,0
♯
♯
compareshape (Φ′ , σ0,1
, σ1,0
) = (true, Φ′′ ) ,
then the overall inclusion holds—compare shape (Φ, σ0♯ , σ1♯ ) returns (true, Φ′′ );
♯
♯
, σ1♯ = α1 · f 7→ β1 ∗ σ1,r
and Φ(α1 ) = α0 , then
• (Points-to edges) If σ0♯ = α0 · f 7→ β0 ∗ σ0,r
we can conclude inclusion holds locally and extend Φ with Φ(β1 ) = β0 ;
♯
♯
such that compareshape (Φ, σ0♯ , σ1,u
)=
• (Unfolding) If there is an unfolding of σ1♯ called σ1,u
(true, Φ′ ), then compareshape (Φ, σ0♯ , σ1♯ ) = (true, Φ′ ).
4. When compareshape (Φ, σ0♯ , σ1♯ ) succeeds and returns (true, Φ′ ), it means the inclusion holds with
respect to the shape. We, however, still need to check for inclusion with respect to the numeric properties. Recall that the base numeric domain elements ν0♯ ∈ Dnum hV♯ [σ0♯ ]i and ν1♯ ∈
Dnum hV♯ [σ1♯ ]i have incomparable sets of symbolic variables. An inclusion check in the base numeric domain can only be performed after renaming symbolic names so that they are consistent.
The node mapping Φ′ computed by the above is precisely the renaming that is needed. Thus, the
last step to perform to decide inclusion is to compute comparenum (ν0♯ , renamenum (Φ′ , ν1♯ )) and return it as a result for comparecomb (Φ, (σ0♯ , ν0♯ ), (σ1♯ , ν1♯ )). Note that function renamenum should be
sound in the following sense:
∀ν ♯ ∈ Dnum hV i, ∀ν ∈ γnum hV i(ν ♯ ), (ν ◦ Φ) ∈ γnum hΦ(V )i(renamenum (Φ, ν ♯ ))
where Φ(V ) is the set of symbolic variables obtained by applying Φ to set V .
5. If any of the above steps fail, comparemem returns false.
To summarize, the soundness conditions of the inclusion tests for the lower-level domains on which
comparemem relies are as follows:
Condition 8 (Soundness of inclusion tests).
1. If comparenum (ν0♯ , ν1♯ ) = true , then γnum hV i(ν0♯ ) ⊆ γnum hV i(ν1♯ ) .
2. If compareshape (Φ, σ0♯ , σ1♯ ) = (true, Φ′ ) , then (σ , ν ◦ Φ′ ) ∈ γH (σ1♯ ) for all (σ , ν ) ∈ γH (σ0♯ ) .
3. If comparecomb (Φ, (σ0♯ , ν0♯ ), (σ1♯ , ν1♯ )) = (true, Φ′ ) , then (σ , ν ◦ Φ′ ) ∈ γH♯ ⇒N♯ (σ1♯ , ν1♯ )
for all (σ , ν ) ∈ γH (σ0♯ , ν0♯ ) .
Returning to the example in Figure 18, after starting with Φ = [α0′ 7→ α0 , α1′ 7→ α1 ], the compareshape
operation consumes the points-to edges one-by-one extending Φ incrementally, unfolding the inductive
edges in the right argument before concluding that inclusion holds in the shape domain. With the final
mapping Φ′ (αi′ ) = αi for all i, the numeric inclusion simply needs to check that comparenum (α3 ≤ α5 ∧
α5 ≤ α7 , renamenum (Φ′ , α3′ ≤ α5′ )) = comparenum (α3 ≤ α5 ∧ α5 ≤ α7 , α3 ≤ α5 ) = true.
4.5 Join and widening
As is standard, the joinmem operation should satisfy the following:
B.-Y. E. Chang and X. Rival
181
m♯1 : (E1♯ , (σ1♯ , ν1♯ ))
m♯0 : (E0♯ , (σ0♯ , ν0♯ ))
x
α0
α2
next
d
y
α1
α4
list
α5
⊔
x
α′0
y
α′1
α′3
α3
list
α′2
♯
m♯⊔ : (E⊔♯ , (σ⊔
, ν⊔♯ ))
list
x
α′′
0
α′′
2
y
α′′
1
α′′
3
Z=⇒
next
d
α′4
list
list
list
α′5
Figure 19: An abstract join showing the need for different sets of symbolic variables for each of the inputs
and the result. The inputs are the two possible abstract heaps where a possibly-empty and a non-empty
list are pointed to by two non-aliased program variables x and y, so the most precise over-approximation
is the abstract heap where both x and y point to two possibly-empty lists.
Condition 9 (Soundness of joinmem ). For all m♯0 and m♯1 , γM (m♯0 ) ∪ γM (m♯1 ) ⊆ γM (joinmem (m♯0 , m♯1 )).
Like the comparison operator, the join operator takes two abstract heaps that have distinct sets of
symbolic variables as input. Additionally, it generates a new abstract heap, which requires another set of
symbolic variables, as it may not be possible to use the same set as either input. The example shown in
Figure 19 illustrates this situation. In left input m♯0 , variable x points to a non-empty list and y points to a
possibly empty list, whereas right input m♯1 describes the opposite. The most precise over-approximation
of m♯0 and m♯1 corresponds to the case where both x and y point to lists of any length (as shown on
the right side of the figure). These three elements all have distinct sets of nodes (that cannot be put
in a bijection). Thus, the join algorithm uses a slightly different notion of symbolic node mapping Ψ
that binds three-tuples of nodes consisting of one node from each parameter and one node in the output
abstract heap. Conceptually, the output abstract heap is a kind of product construction, so it is composed
of new symbolic variables corresponding to pairs of nodes with one from each input.
Overall, the join algorithm proceeds in a similar way as the inclusion test: the abstract heap join
produces a mapping relating symbolic variables along with a new abstract heap. This mapping is then
used to rename symbolic variables in the base numeric domain elements consistently to then apply the
join in the base domain. Similar to the inclusion test, an initial mapping Ψ is constructed using the
abstract environment at the M♯ level and then extended step-by-step at the H♯ level. For instance, in
Figure 19, the initial mapping is {(α0 , α0′ , α0′′ ), (α1 , α1′ , α1′′ )}, and then pairs (α2 , α2′ , α2′′ ) and (α3 , α3′ , α3′′ )
are added by joinshape . Note that nodes α3 , α4 , α3′ , α4′ have no counterpart in the result.
The local rules abstract heap join rules used in joinshape belong to two main categories:
• (Bijection) When two fragments of each input are isomorphic modulo Ψ, they can be joined into
another such fragment. In the example, the points-to edges α0 7→ α2 and α0′ 7→ α2′ can both be
over-approximated by α0′′ 7→ α2′′ . Applying this rule adds the triple (α2 , α2′ , α2′′ ) to the mapping Ψ.
• (Weakening) When a heap fragment can be shown to be included in a more simple, summary
fragment (in terms of their concretizations), we can over-approximate the original fragment with
the summary. For instance, fragment α2 · next 7→ α3 ∗ α2 · d 7→ α4 ∗ α3 · list can be shown to be
included in α2 · list. The other input can be an effective means for directing the choice of possible
summary fragments [7, 8].
The widening operator widenmem can be defined similarly to joinmem . If the heap join rules enforce
termination (i.e., joinshape can be used as a widening) and joinnum is replaced with a widening operator
widennum , the cofibered domain definition guarantees the resulting operator enforces termination [38].
Modular Construction of Shape-Numeric Analyzers
182
4.6 Disjunctive abstract domain interface
Recall from Sections 3.3 and 4.2 that unfolding returns
partition∨ : C × Pfin(M♯∨ )
−→ M♯∨
a finite set of abstract elements interpreted disjunctively
♯
collapse∨ : C × M∨
−→ M♯∨
and thus justifies the need for a disjunctive abstracassign∨ : C × LX × EX × M♯∨ −→ M♯∨
tion layer—independent of other possible reasons like
−→ M♯∨
guard∨ : C × EX × M♯∨
a desire for path-sensitivity. In this subsection, we dealloc∨ : C × LX × N × M♯∨ −→ M♯∨
scribe the interface for a disjunctive abstraction layer M♯∨
free∨ : C × LX × N × M♯∨ −→ M♯∨
shown in Figure 20 that sits above the memory layer M♯ .
compare∨ : M♯∨ × M♯∨
−→ B
The following discussion completes the picture of the ab♯
♯
−→ M♯∨
join∨ : M∨ × M∨
stract domain interfaces (cf., Figure 11). There are two
♯
♯
widen∨ : M∨ × M∨
−→ M♯∨
main differences in the interface as compared to the one
for M♯ . First, the disjunctive abstract domain should pro- Figure 20: Disjunctive abstraction interface.
vide two additional operations partition∨ and collapse∨
that create and collapse partitions, respectively. A partition represents a disjunctive set of base domain
elements. Second, the transfer functions take an additional context information parameter c ∈ C that can
be used in M♯∨ to tag each disjunct with how it arose in the course of the abstract interpretation.
Condition 10 (Soundness of partition ∨ and collapse∨ ). Let s♯ : M♯∨ and S♯ : Pfin (M♯∨ ).
S
{γ∨ (s♯ ) | s♯ ∈ S♯ } ⊆ γ∨ (partition ∨ (c, S♯ ))
γ∨ (s♯ ) ⊆ γ∨ (collapse∨ (c, s♯ ))
Note that contexts play no role in the concretization, but operations can use them, for example, to decide
which disjuncts to merge using joinmem and which disjuncts to preserve.
Transfer functions assign∨ , guard∨ , alloc∨ , and free∨ all follow the same structure. They first call the
underlying operation on the memory abstract domain M♯ and then apply the partition ∨ partition on the
output. For instance, assign∨ is defined as follows while satisfying the expected soundness condition:
def
assign∨ (c, loc, exp) = partition ∨ (c, {assignmem (loc, exp, m♯ ) | m♯ ∈ s♯ })
(E, σ [LJlocK(E, σ ) ← EJexpK(E, σ )]) ∈ γ∨ (assign∨ (c, loc, exp, s♯ ))
(definition)
(soundness)
Inclusion (compare∨ ), join, and widening operations should satisfy the usual soundness conditions. The
collapse ∨ operator may be used to avoid generating too many disjuncts (and termination of the analysis).
5
A compositional abstract interpreter
In this section, we assemble an abstract interpreter for the language defined in Section 2 using the abstraction set up in Section 3 and the interface of abstract operations described in Section 4.
The abstract semantics of a program p is a function JpK♯ : M♯∨ → M♯∨ , which takes an abstract precondition as input and produces an abstract post-condition as output. Based on an abstract interpretation
of the denotational semantics of programs [33, 34], we can define the abstract semantics by induction
over the syntax of programs as shown in Figure 21 in a completely standard manner. We let C [. . .] stand
for computing some context information based on, for example, the control state ℓ and/or the branch
taken. This context information may be used, for instance, by the disjunctive domain M♯∨ to guide trace
partitioning [30]. The abstract transitions for sequencing, assignment, dynamic memory allocation, and
deallocation are straightforward with the latter three calling the corresponding transfer function in the
top-layer abstract domain M♯∨ . For if, the pre-condition is first constrained by the guard condition via
B.-Y. E. Chang and X. Rival
183
def
def
Jp0 ; p1 K♯ (s♯ ) = Jp1 K♯ ◦ Jp0 K♯ (s♯ )
Jℓ : loc = malloc(n)K♯ (s♯ ) = alloc∨ (C [ℓ], loc, n, s♯ )
def
def
♯
♯
♯
Jℓ : loc = expK (s ) = assign∨ (C [ℓ], loc, exp, s )
Jℓ : free(loc)K♯ (s♯ ) = free∨ (C [ℓ], loc, n, s♯ )
def
Jℓ : if (exp) pt else pf K♯ (s♯ ) = join∨ (Jpt K♯ (guard∨ (C [ℓ, true], exp, s♯ )),
Jpf K♯ (guard∨ (C [ℓ, false], exp = false, s♯ )))
Jℓ : while (exp) pK♯ (s♯ ) = guard∨ (C [ℓ, false], exp = false, lfp♯s♯ F ♯ )
where F ♯ : M♯∨ −→ M♯∨
7−→ JpK♯ (guard∨ (C [ℓ, true], exp, s♯0 ))
s♯0
def
Figure 21: A denotational-style abstract interpreter for the programming language defined in Section 2.2.
guard∨ to interpret the two branches and then the resulting states are joined via join∨ . For while, we
write lfp♯ for an abstract post–fixed-point operator. The lfp♯ operator relies on widen∨ to terminate and
on compare∨ to verify the stability of the abstract post-fixed point. It may also use join∨ to increase the
level of precision when computing the first iterations. We omit a full definition of lfp♯ as there are many
well-known ways to obtain such an operator. The most simple one consists of applying only widen∨
until stabilization can be shown by compare∨ . We simply state its soundness condition:
Condition 11 (Soundness of lfp♯ ). For all concrete transformers F : P(S) → P(S) monotone, all abstract transformers F ♯ : M♯∨ → M♯∨ , and all abstract states s♯ ∈ M♯∨ ,
if F ◦ γ∨ ⊆ γ∨ ◦ F ♯ , then lfpγ∨ (s♯ ) F ⊆ γ∨ (lfp♯s♯ F ♯ ) .
We write lfpS for the least post–fixed point that is at least S and similarly for lfp♯s♯ . Finally, the static
analysis is sound in the following sense:
Theorem 1 (Soundness of the analysis). Let p be a program, and let s♯ ∈ M♯∨ be an abstract precondition. Then, the result of the analysis is sound:
∀s ∈ γ∨ (s♯ ), JpKd (s) ⊆ γ∨ (JpK♯ (s♯ )) .
Soundness can be proven by induction over the syntax of programs and by composing the local soundness
conditions of all abstract operators.
Related work and discussion. An advantage of this iteration strategy, is that it leads to an intuitive
order of application of the abstract equations corresponding to the program [10], eliminating complex
iteration strategies [19]. It also simplifies the choice of widening points [4], as it applies widening
naturally, at loop heads, though it also allows one to make different choices in strategy by, for example,
modifying lfp♯ to unroll loop iterations [3].
6
Conclusion
We have presented a modular construction of a static analysis that is able to reason both about the
shape of data structures and their numeric contents simultaneously. Our construction is parametric in
the desired numeric abstraction, as well as the shape abstraction, making it possible to continuously
substitute improvements for each component or with variants targeted at different classes of programs
or even different programming languages. The main advantage of a modular construction is that it
184
Modular Construction of Shape-Numeric Analyzers
allows one to design, prove, and implement each component of the analysis independently. Modular
construction is a cornerstone of quality software engineering, and our experience has been that this nice
property becomes even more important when dealing with the complexity of creating a static analysis
that simultaneously reasons about shape and numeric properties.
Acknowledgments We are inspired by Dave Schmidt’s continual effort in formalizing the foundations
of static analysis, abstract interpretation, and the semantics of programming languages. We would also
wish to thank Dave for being a pillar in the static analysis community and supporting the research community with often thankless, behind-the-scenes work.
This work has been supported in part by the European Research Council under the FP7 grant agreement 278673, Project MemCAD and the United States National Science Foundation under grant CCF1055066.
References
[1] T. Ball, R. Majumdar, T. D. Millstein & S. K. Rajamani (2001): Automatic Predicate Abstraction of C
Programs. In: PLDI’01, pp. 203–213, doi:10.1145/378795.378846.
[2] J. Berdine, C. Calcagno, B. Cook, D. Distefano, P. O’Hearn, T. Wies & H. Yang (2007): Shape Analysis for
Composite Data Structures. In: CAV’07, pp. 178–192, doi:10.1007/978-3-540-73368-3_22.
[3] B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux & X. Rival (2003): A
static analyzer for large safety-critical software. In: PLDI’03, pp. 196–207, doi:10.1145/781131.781153.
[4] F. Bourdoncle (1992): Abstract Interpretation by Dynamic Partitioning. Journal of Functional Programming
2(4), pp. 407–423, doi:10.1017/S0956796800000496.
[5] B.-Y. E. Chang (2008): End-User Program Analysis. Ph.D. thesis, University of California, Berkeley.
[6] B.-Y. E. Chang & R. Leino (2005): Abstract Interpretation with Alien Expressions and Heap Structures. In:
VMCAI’05, pp. 147–163, doi:10.1007/978-3-540-30579-8_11.
[7] B.-Y. E. Chang & X. Rival (2008): Relational inductive shape analysis. In: POPL’08, pp. 247–260,
doi:10.1145/1328438.1328469.
[8] B.-Y. E. Chang, X. Rival & G. Necula (2007): Shape Analysis with Structural Invariant Checkers. In:
SAS’07, pp. 384–401, doi:10.1007/978-3-540-74061-2_24.
[9] D. R. Chase, M. Wegman & F. K. Zadeck (1990): Analysis of Pointers and Structures. In: PLDI’90, pp.
296–310, doi:10.1145/93542.93585.
[10] P. Cousot & R. Cousot (1977): Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints.
In: POPL’77, pp. 238–252,
doi:10.1145/512950.512973.
[11] P. Cousot & R. Cousot (1979): Systematic Design of Program Analysis Frameworks. In: POPL’79, pp.
269–282, doi:10.1145/567752.567778.
[12] P. Cousot & N. Halbwachs (1978): Automatic discovery of linear restraints among variables of a program.
In: POPL’78, pp. 84–97, doi:10.1145/512760.512770.
[13] I. Dillig, T. Dillig & A. Aiken (2011): Precise reasoning for programs using containers. In: POPL’11, pp.
187–200, doi:10.1145/1926385.1926407.
[14] D. Distefano, P. O’Hearn & H. Yang (2006): A Local Shape Analysis Based on Separation Logic. In:
TACAS’06, pp. 287–302, doi:10.1007/11691372_19.
[15] D. Gopan, T. W. Reps & M. Sagiv (2005): A framework for numeric analysis of array operations. In:
POPL’05, pp. 338–350, doi:10.1145/1040305.1040333.
B.-Y. E. Chang and X. Rival
185
[16] S. Gulwani, B. McCloskey & A. Tiwari (2008): Lifting abstract interpreters to quantified logical domains.
In: POPL’08, pp. 235–246, doi:10.1145/1328438.1328468.
[17] N. Halbwachs & M. Péron (2008): Discovering properties about arrays in simple programs. In: PLDI’08,
pp. 339–348, doi:10.1145/1375581.1375623.
[18] T. A. Henzinger, R. Jhala, R. Majumdar & G. Sutre (2002): Lazy abstraction. In: POPL’02, pp. 58–70,
doi:10.1145/503272.503279.
[19] S. Horwitz, A. J. Demers & T. Teitelbaum (1987): An Efficient General Iterative Algorithm for Dataflow
Analysis. Acta Informatica 24(6), pp. 679–694, doi:10.1007/BF00282621. Springer.
[20] B. Jeannet & A. Miné (2009): Apron: A Library of Numerical Abstract Domains for Static Analysis. In:
CAV’09, pp. 661–667, doi:10.1007/978-3-642-02658-4_52.
[21] N. Jones & S. Muchnick (1981): Flow Analysis and Optimization of LISP-like Structures. In: Program Flow
Analysis: Theory and Applications, chapter 4, Prentice-Hall, pp. 102–131.
[22] V. Laviron, B.-Y. E. Chang & X. Rival (2010): Separating Shape Graphs. In: ESOP’10, pp. 387–406,
doi:10.1007/978-3-642-11957-6_21.
[23] S. Magill, J. Berdine, E. Clarke & B. Cook (2007): Arithmetic Strengthening for Shape Analysis. In: SAS’07,
pp. 419–436, doi:10.1007/978-3-540-74061-2_26.
[24] S. Magill, M.-H. Tsai, P. Lee & Y.-K. Tsay (2010): Automatic numeric abstractions for heap-manipulating
programs. In: POPL’10, pp. 211–222, doi:10.1145/1706299.1706326.
[25] B. McCloskey, T. Reps & M. Sagiv (2010): Statically Inferring Complex Heap, Array, and Numeric Invariants. In: SAS’10, pp. 71–99, doi:10.1007/978-3-642-15769-1_6.
[26] A. Milanova, A. Rountev & B. G. Ryder (2005): Parameterized object sensitivity for points-to analysis for
Java. TOSEM 14(1), pp. 1–41, doi:10.1145/1044834.1044835.
[27] A. Miné (2006): The octagon abstract domain. HOSC 19(1), pp. 31–100, doi:10.1007/s10990-006-8609-1.
[28] J. Reynolds (2002): Separation Logic: A Logic for Shared Mutable Data Structures. In: LICS’02, pp. 55–74,
doi:10.1109/LICS.2002.1029817.
[29] X. Rival & B.-Y. E. Chang (2011): Calling context abstraction with shapes. In: POPL’11, pp. 173–186,
doi:10.1145/1926385.1926406.
[30] X. Rival & L. Mauborgne (2007): The trace partitioning abstract domain. ACM TOPLAS 29(5), pp. 26–69,
doi:10.1145/1275497.1275501.
[31] M. Sagiv, T. Reps & R. Wilhelm (2002): Parametric shape analysis via 3-valued logic. ACM TOPLAS
24(3), pp. 217–298, doi:10.1145/514188.514190.
[32] M. Sagiv, T. W. Reps & R. Wilhelm (1998): Solving Shape-Analysis Problems in Languages with Destructive
Updating. ACM TOPLAS 20(1), pp. 1–50, doi:10.1145/271510.271517.
[33] D. A. Schmidt (1986): Denotational semantics: a methodology for language development. William C. Brown
Publishers, Dubuque, IA, USA.
[34] D. A. Schmidt (2009): Abstract Interpretation From a Denotational-semantics Perspective. ENTCS 249, pp.
19–37, doi:10.1016/j.entcs.2009.07.082.
[35] M. Sharir & A. Pnueli (1981): Two approaches to interprocedural data flow analysis. In: Program Flow
Analysis: Theory and Applications, chapter 7, Prentice-Hall, pp. 189–233.
[36] P. Sotin & X. Rival (2012): Hierarchical Shape Abstraction of Dynamic Structures in Static Blocks. In:
APLAS’12, pp. 131–147, doi:10.1007/978-3-642-35182-2_10.
[37] A. Toubhans, B.-Y. E. Chang & X. Rival (2013): Reduced Product Combination of Abstract Domains for
Shapes. In: VMCAI’13, pp. 375–395, doi:10.1007/978-3-642-35873-9_23.
[38] A. Venet (1996): Abstract Cofibered Domains: Application to the Alias Analysis of Untyped Programs. In:
SAS’96, pp. 366–382, doi:10.1007/3-540-61739-6_53.
| 6cs.PL
|
Measurement-based adaptation protocol with quantum reinforcement learning
F. Albarrán-Arriagada,1, ∗ J. C. Retamal,1, 2 E. Solano,3, 4, 5 and L. Lamata3
arXiv:1803.05340v1 [quant-ph] 14 Mar 2018
1
Departamento de Fı́sica, Universidad de Santiago de Chile (USACH), Avenida Ecuador 3493, 9170124, Santiago, Chile
2
Center for the Development of Nanoscience and Nanotechnology 9170124, Estación Central, Santiago, Chile
3
Department of Physical Chemistry, University of the Basque Country UPV/EHU, Apartado 644, 48080 Bilbao, Spain
4
IKERBASQUE, Basque Foundation for Science, Maria Diaz de Haro 3, 48013 Bilbao, Spain
5
Department of Physics, Shanghai University, 200444 Shanghai, China
(Dated: March 15, 2018)
Machine learning employs dynamical algorithms that mimic the human capacity to learn, where the reinforcement learning ones are among the most similar to humans in this respect. On the other hand, adaptability is an
essential aspect to perform any task efficiently in a changing environment, and it is fundamental for many purposes, such as natural selection. Here, we propose an algorithm based on successive measurements to adapt one
quantum state to a reference unknown state, in the sense of achieving maximum overlap. The protocol naturally
provides many identical copies of the reference state, such that in each measurement iteration more information
about it is obtained. In our protocol, we consider a system composed of three parts, the “environment” system, which provides the reference state copies; the register, which is an auxiliary subsystem that interacts with
the environment to acquire information from it; and the agent, which corresponds to the quantum state that is
adapted by digital feedback with input corresponding to the outcome of the measurements on the register. With
this proposal we can achieve an average fidelity between the environment and the agent of more than 90% with
less than 30 iterations of the protocol. In addition, we extend the formalism to d-dimensional states, reaching
an average fidelity of around 80% in less than 400 iterations for d = 11, for a variety of genuinely quantum as
well as semiclassical states. This work paves the way for the development of quantum reinforcement learning
protocols using quantum data, and the future deployment of semi-autonomous quantum systems.
I.
INTRODUCTION
Machine learning (ML) is an area of artificial intelligence that focuses on the implementation of learning algorithms, and which has undergone great development in recent
years [1–3]. ML can be classified into two broad groups,
namely, learning by means of big data and through interactions. For the first group we have two classes, supervised
learning, which uses previously classified data to train the
learning program, inferring the function of relationship to
classify new data. This is the case, e.g., of pattern recognition problems [4–7]. The other class is unsupervised learning,
which does not require training data, but this paradigm uses
the big data distribution to obtain an optimal way to classify
it using specific characteristics. An example is the clustering
problem [8, 9].
For the second group, learning from interactions, we have
the case of reinforcement learning (RL) [10, 11]. RL is the
more similar paradigm to the human learning process. Its general framework is as follows: we define two basic systems,
an agent A and an environment E, while often it is useful to
define a register R as an auxiliary system. The concept consists of A inferring information by direct interaction with E,
or indirectly, using as a mediator the system R. With the obtained information, A makes a decision to perform a certain
task. If the result of this task is good, then the agent receives
a reward, otherwise a punishment. In addition, the RL algorithms can be divided into three basic parts, the policy, the
reward function (RF) and the value function (VF). The policy
can be subdivided into three stages: first, interaction with the
∗
F. Albarrán-Arriagada
[email protected]
environment. In this stage, the way in which A or R interacts
with E is specified. Second, information extraction, which indicates how A obtains information from E. Finally, action,
where A takes the decision of what to do with the information
of the previous step. RF refers to the criterion to award the
reward or punishment A in each iteration. And VF evaluates
the utility of A referred to the given task. An example of RL
consists in artificial players for go or chess [12, 13].
Other essential aspect of the RL protocols is the
exploitation-exploration relation. Exploitation refers to the
ability to make good decisions, while exploration is the possibility of making different decisions. For example, if we want
to select a gym to do sports, the exploitation is given by the
quality of the gym we tested, while the exploration is the size
of the search area in which we will choose a new gym to test.
In the RL paradigm, a good exploitation-exploration relation
can guarantee the convergence of the learning process, and its
optimization depends on each algorithm.
(a)
(b)
FIG. 1. (a) Bloch representation of the environment state at initial
time, with |0i the state of the agent. (b) Bloch representation of the
environment in the jth iteration, where |0̄ j i is the state of the agent,
which was rotated in the previous iterations.
2
On the other hand, quantum mechanics is known to improve computational tasks [14], so a natural question is: how
are the learning algorithms modified in the quantum domain?
To answer this question the quantum machine learning field
(QML) has emerged. In recent years, QML has been a fruitful area [15–22], in which quantum algorithms have been developed [23–26], that show a possible speedup in certain situations in relation with their classical counterparts [27, 28].
However, these novel works focus mainly on learning from
classical data encoded in quantum systems, processed with a
quantum algorithm and decoded to be read by a classical machine. In this context, the speedup of quantum machine learning is often balanced with the necessary resources to encode
and decode the information, which leads to an unclear quantum supremacy. On the other hand, recent works analyze the
QML paradigm in a purely quantum way [29–31], in which
quantum systems learn quantum data.
In this article, we present a quantum machine learning algorithm based on a reinforcement learning approach, to convert the quantum state of a system (Agent), into an unknown
state encoded, via multiple identical copies, in another system
(Environment), assisted by measurements on a third system
(Register). We propose to use coherent feedback loops, conditioned to the measurements in order to perform the adaptation process without human intervention. In our numerical
calculations we obtain average fidelities of more than 90% for
qubit states after less than 40 measurements, while for qudits
the protocol achieves average fidelities of 80% using 400 iterations with d = 11 dimensions, either for genuinely quantum
or semiclassical states. This proposal can be useful in the way
to implement semi-autonomous quantum devices.
II.
THE QUANTUM ADAPTATION ALGORITHM
Our framework is as follows. We assume a known quantum system called agent (A), and many copies of an unknown
quantum state provided by a system called environment (E).
We also consider an auxiliary system called register (R) which
interacts with E. Then, we obtain information about E by
measuring R, and employ the result as an input to the reward
(RF) function. Finally, we perform a partially-random unitary
transformation on A, which depends on the output of the RF.
The idea is to improve the fidelity between A and E, without
projecting the state of A with measurements.
This protocol differs from quantum state estimation [32–
37] in the fact that we propose a semi-autonomous quantum
agent, that is, the aim is that in the future a quantum agent
will learn the state of the environment without any human intervention. Other authors have considered the inverse problem, an unknown state evolved to a known state assisted by
measurements [38], which deviate from the machine learning paradigm. Therefore, an optimal measurement is not performed in each step, but after a certain number of autonomous
iterations, the agent converges to a large fidelity with the unknown state.
In the rest of the article we use the following notation: the
subscripts A, R and E refer to each subsystem, and the super-
scripts indicate the iteration. For example, O(k)
α refers to the
operator O that acts on the subsystem α during the kth iteration. Moreover, the lack of any of these indices indicates that
we are referring to a general object in the iterations and/or in
the subsystems.
We start with the case where each subsystem is described
by a qubit state. We assume that A(R) is described by |0iA(R) ,
and E by an arbitrary state expressed in the Bloch sphere as
(1)
|EiE = cos(θ(1) /2)|0iE + e−iφ sin(θ(1) /2)|1iE [see Fig. 1 (a)].
The initial state reads
(1)
|ψ(1) i = |0iA |0iR [cos(θ(1) /2)|0iE + eiφ sin(θ(1) /2)|1iE ]. (1)
First of all, we will introduce the general elements of our reinforcement learning protocol, such as policy, the RF and the
VF. For the policy, we perform a Controlled-NOT (CNOT)
NOT
gate (U E,R
) with E as control and R as target (i.e., the interaction with the environment), in order to copy information of
E into R, obtaining
NOT (1)
|Ψ1 i =U E,R
|ψ i
h
i
(1)
=|0iA cos(θ(1) /2)|0iR |0iE + eiφ sin(θ(1) /2)|1iR |1iE . (2)
We then measure the register qubit in the basis {|0i, |1i}, with
(1)
2
2
probability p(1)
0 = cos (θ1 /2), or p1 = sin (θ1 /2), to obtain
the state |0i or |1i respectively (i.e., information extraction).
If the result is |0i, it means that we collapse E into A and
do nothing, but if the result is |1i, it means that we measure
the orthogonal component to A of E, and thus we accordingly
modify the agent. As we do not have additional information
about the environment, we perform a partially-random uniz(1) (1)
x(1) (1)
tary operator on A given by U A(1) (α(1) , β(1) ) = e−iS A α e−iS A β
(action), where α(1) and β(1) are random angles of the form
α(β)(1) = ξα(β) ∆(1) , with ξα(β) ∈ [−1/2, 1/2] a random number,
∆(1) is the range of random angles, α(β)(1) ∈ [−∆(1) /2, ∆(1) /2],
and S k(1)
= S k is the kth spin component. Now, we initialize
A
the register qubit state and employ a new copy of E, obtaining
the next initial state for the second iteration
|ψ(2) i = UA(1) |0iA |0iR |EiE = |0̄i(2)
A |0iR |EiE ,
(3)
h
i
UA(1) = m(1) U A(1) (α(1) , β(1) ) + (1 − m(1) )IA .
(4)
with
Here, m(1) = {0, 1}, is the outcome of the measurement, I is
the identity operator, and we define the new agent state as
(1)
|0̄i(2)
1 = U1 |0i1 .
Now, we define the RF to modify the exploration range of
the kth iteration ∆(k) as
∆(k) = (1 − m(k−1) )R + m(k−1) P ∆(k−1) ,
(5)
where m(k−1) is the outcome of the (k − 1)th iteration, while
R and P are the reward and punishment ratios, respectively.
Equation (5) means, that the value of ∆ is modified by R∆
for the next iteration when the previous outcome is m = 0,
and by P∆ when the outcome is m = 1. In our protocol, we
3
NOT
the gate U E,R
NOT
|Φ(k) i = U E,R
|0̄i(k)
A |0iR |ĒiE
(k)
(k)
= |0̄iA cos(θ(k) /2)|0iR |0iE + eiφ sin(θ(k) /2)|1iR |1iE , (10)
M
FIG. 2. Quantum circuit diagram for the measurement-based adaptation protocol. The box labelled with M indicates the projective
measurement process, and the red lines denote feedback loops.
choose for simplicity R = < 1 and P = 1/ > 1, such
that, every time that the state |0i is measured, the value of ∆
is reduced, and increased in the other case. Also, the fact that
R · P = 1 means that the punishment and the reward have
the same strength, or in other words, if the protocol yields the
same number of outcomes 0 and 1, the exploration range does
not change. Finally, the VF is defined as the value of ∆(n) after
all iterations. Therefore, ∆(n) → 0 if the protocol improves the
fidelity between A and E.
To illustrate the behaviour of the protocol, we consider the
kth iteration. The initial state is given by
|ψi(k) = |0̄i(k)
A |0iR |EiE ,
(6)
(k)
(k)
(k−1) (k−1)
where |0̄i(k)
UA , with U(1)
A = UA |0iA , UA = UA
A = IA ,
z( j) ( j)
x( j) ( j)
and UA( j) given by Eq. (4). Also U A( j) = e−iS A α e−iS A β ,
where we define
1
(|0̄i(Aj) h0̄| − |1̄i(Aj) h1̄|) = UA( j−1)† S z(A j−1) UA( j−1) ,
2
1
= (|0̄i(Aj) h1̄| + |1̄i(Aj) h0̄|) = UA( j−1)† S Ax( j−1) UA( j−1) , (7)
2
S z(A j) =
S Ax( j)
with (Aj) h0̄|1̄i(Aj) = 0. We can write the state of E in the Bloch
representation using |0̄ j i as a reference axis (see Fig. 1 (b)),
and apply the operator U(k)†
E , obtaining for E,
(k)†
(k)
(k)
(k)
(k)
iφ(k)
U(k)†
|Ei
=U
cos(θ
/2)|
0̄i
+
e
sin(θ
/2)|
1̄i
E
E
E
E
E
(k)
=cos(θ(k) /2)|0iE + eiφ sin(θ(k) /2)|1iE = |Ēi(k)
E . (8)
We can write the states |0̄(k) i and |1̄(k) i in terms of the initial
logical states |0i and |1i, and the unknown angles θ(k) , θ(1) , φ(k)
and φ(1) as follows
!
!
θ(1) − θ(k)
θ(1) − θ(k)
(1)
|0̄(k) i =cos
|0i + eiφ sin
|1i
2
2
!
!
θ(1) − θ(k)
θ(1) − θ(k)
(k)
−iφ(k)
i(φ(1) −φ(k) )
sin
|1̄ i =−e
|0i + e
sin
|1i.
2
2
(9)
Therefore, the operator U(k)† performs the necessary rotation
to transform |0̄(k) i → |0i and |1̄(k) i → |1i. Then, we perform
and we measure R, with probabilities p0(k) = cos2 (θ(k) /2), and
2 (k)
(k)
p(k)
= 0 and m(k) = 1,
1 = sin (θ /2), for the outcomes m
respectively. Finally, we apply the RF given by Eq. (5). We
point out that, probabilistically, when p(k)
0 → 1, ∆ → 0, and
when p(k)
→
1,
∆
→
4π.
In
terms
of
exploitation-exploration
1
relation this means that when the exploitation decreases (we
measure |1i often), we increase the exploration (we increase
the value of ∆) to increase the probability of making a beneficial change, and when the exploitation improves (we measure
|0i many times), we reduce the exploration to allow only small
changes in the following iterations. The diagram of this protocol is shown in Fig. (2).
Fig. 3 (a) shows the numerical calculation of mean fidelity
between A and E for the single-qubit case. For this computation we use 2000 random initial states with = 0.1 (blue line),
= 0.3 (red line), = 0.5 (yellow line), = 0.7 (purple line),
and = 0.9 (green line). We can see that the protocol can
reach fidelities over 90% in less than 30 iterations. Fig. 3 (b)
depicts the evolution of the exploration parameter ∆ for each
iteration for the same values of constant . We can see from
Fig. 3, that when the parameter is small, the fidelity between
A and E increases quickly (the learning speed increases), requiring less iterations to reach high fidelities, however, the
maximum value of the average fidelity (maximum learning) is
smaller than when increases. This means that small changes
in the scan parameter ∆ (large ) result in a higher but slower
learning.
III.
MULTILEVEL PROTOCOL
In this section, we extend the previous protocol to the case
where A, R, and E are described by one d-dimensional qudit
state. One of the ingredients in the qubit case is the CNOT
gate. Here, we use the extension of the CNOT gate to mulXOR
tilevel states, also known as the XOR gate [39] (Ua,b
). The
action of this gate is given by
XOR
Ua,b
| jia |kib = | jia | j
kib ,
(11)
where the index a(b) refers to control(target) state, respectively, and
denotes the difference modulo d, with d the
dimension of each subsystem. The CNOT gate has two imNOT
portant properties, namely, (i) Ua,b
is Hermitian, and (ii)
NOT
Ua,b | jia |kib = | jia |0ib if and only if j = k. These two properties are maintained in the XOR gate defined in Eq. (11).
The Policy and VF are essentially the same than in previous case, but now we consider the multiple outcomes (m( j) ∈
{0, 1, . . . , d−1}) that result of measuring R. First, we introduce
|1̄ j iA = |m( j) iA for the definition of S z(A j) and S Ax( j) in Eq. (7).
As in the previous case, we assume the initial state of A to
be |0iA , while R is initialized in |0iR . Moreover, the state of
4
1 (a)
0.9
3
0.8
2
0.7
1
0.6
0
0.85 (a)
4 (b)
100
200
0
4 (b)
3
0.55
2
1
0
100
200
0.25
0
500
0
1000
0
500
1000
FIG. 3. Performance of the measurement-based adaptation protocol
for the qubit case. (a) shows the mean fidelity for 2000 initial random
states, and (b) the value of ∆( j) in each iteration. For both figures, we
have = 0.1 (blue line), = 0.3 (red line), = 0.5 (yellow line),
= 0.7 (purple line),and = 0.9 (green line). The black dashed line
indicates an average fidelity of 90%.
FIG. 4. Performance of the measurement-based adaptation protocol
for a total random state given by Eq. (15). (a) shows the mean fidelity for 2000 initial random states, and (b) the value of ∆ j in each
iteration. For both figures, we have = 0.1 (blue line), = 0.3 (red
line), = 0.5 (yellow line), = 0.7 (purple line),and = 0.9 (green
line). The black dashed line indicates an average fidelity of 80%.
P
E is arbitrary, and expressed as |EiE = d−1
j=0 c j | jiE , where
Pd−1 2
|c
|
=
1,
and
d
is
the
dimension
of
E.
We
can rewrite E
j=0 j
in a more convenient way as
Consider the protocol for three different multilevel examples for the E state. First, we consider a total random state
with d = 11 of the form
(1)
|EiE = cos(θ(1) /2)|0̄(1) iE + eiφ sin(θ(1) /2)|0̄(1)
(12)
⊥ iE ,
P
d−1
where |0̄(1) iE = |0iE , |0̄(1)
⊥ iE = (1/N)
j=1 c j | jiE is the orthogPd−1
2
onal component to |0iE , and N = j=1 |c j |2 . Subsequently,
XOR
we perform the XOR gate U E,R
obtaining
XOR
|Φ0 i =U E,R
|0iA |0iR |EiE
h
i
(1)
= |0iA cos(θ(1) /2)|0iR |0iE + eiφ sin(θ(1) /2)|κiR,E , (13)
P
with |κiR,E = d−1
j=1 (1/N)c j |d − jiR | jiE . As in the previous
case, we measure R, but now we have multiple outcomes.
Therefore, we separated them in two groups. First, the outcome |0i with probability p(1)
= cos2 (θ1 /2). Second, out0
comes | ji with j , 0, and probability to obtain any of them
2 (1)
of p(1)
⊥ = sin (θ /2). As in the previous case, this means that
either we measure in the state of A or in the orthogonal subspace. With this information, we perform a partially-random
z(1) (1)
x(1) (1)
unitary operation on the agent UA(1) = e−iS A α e−iS A β , using the definition (7) with |1̄A i = |m(1) iA , where m(1) = j is the
outcome of the measurement. If m(1) = 0, then UA(1) = IA . The
random angles α(1) and β(1) are defined as in the qubit case.
Now, the RF changes slightly and is given by
∆( j) = δm( j−1) ,0 R + (1 − δm( j−1) ,0 )P ∆( j−1) ,
(14)
where δ j,k is the delta function. Equation (14) means that if we
measure |0i in R, the value of ∆ decreases for the next iteration, and if we measure | ji with j , 0, ∆ increases. Remember
that R = < 1 and P = 1/ > 1. As in the qubit case, the RF
is binary, since all the results | ji with j , 0 are equally nonbeneficial, so we give the same punishment to the agent. For
this reason we use the same policy than in the qubit protocol
for the case of multiple levels. As in the case of a single qubit
state, the parameter plays a fundamental role in the learning
process by handling the speed of learning and the maximum
learning as we will understand in what follows.
|EiE =
10
1 X
ck |kiE ,
N k=0
ck = a + ib,
(15)
where a, b ∈ [0, 1) are random numbers, and N is a normalization factor. Figure 4 shows the numerical calculations for
this case, where (a) gives the average fidelity for 2000 initial
states given by Eq. (15), and (b) the evolution of ∆ in each
iteration. It also shows how this exploration parameter is reduced when the fidelity between E and A grows (increasing
the exploitation). We can see from Fig. 4 (a) that the protocol
can reach mean fidelities of 80% with about 400 iterations, or,
equivalently, the protocol increases the mean fidelity between
A and E in about 0.5 using 400 iterations.
Second, consider the protocol for the coherent state defined
by
|αi = e−|α| /2
2
0.9
(16)
4
0.85
3
0.8
2
0.75
1
0.7
0.65
∞
X
αn
√ |ni
n!
n=0
0
100
200
300
0
0
100
200
300
FIG. 5. Performance of the measurement-based adaptation protocol
for a coherent state of the form in Eq. (16). (a) shows the mean
fidelity for 2000 random pairs {a, b} ∈ [0, 1), where α = a + ib; and
(b) the value of ∆ j in each iteration. For both figures, we have = 0.1
(blue line), = 0.3 (red line), = 0.5 (yellow line), = 0.7 (purple
line), and = 0.9 (green line). The black dashed line indicates an
average fidelity of 85%.
5
0.95 (a)
1 (b)
0.9
0.9
0.85
0.8
0.8
0.7
0.75
0.7
0
250
500
0.6
0
50
100
FIG. 6. Performance of the measurement-based adaptation protocol
for genuinely quantum states. (a) shows the mean fidelity for 2000
cat states of the form in Eq. (17), and (b) the mean fidelity for 2000
√
repetitions of the protocol using the superposition (|0iE + |10iE )/ 2
for the environment. In both figures, we use = 0.1 (blue line),
= 0.3 (red line), c = 0.5 (yellow line), = 0.7 (purple line), and
= 0.9 (green line). The black dashed line indicates an average
fidelity of 85%.
for this case we use α = a + ib, with a and b positive real
random numbers smaller than 1. As |α|2 ≤ 2, we can truncate the sum (16) to n = 10, since the probabilities
√ to 2ob−|α|2 /2 10
10!| ≤
tain√|ni with
n
>
10
are
bounded
by
|e
α
/
√
e−1 210 / 10! u 0.0062. Figure 5 (a) shows the fidelity between A and E for each iteration, reaching values of 85% in
less than 100 iterations. Figure 5 (b) depicts the value of ∆ in
this process. We can also observe that the exploration is reduced when A approaches E (increasing the exploitation), as
in the previous case.
Finally, we consider two quantum states, a cat state of the
form
r
1
|EiE =
|αi + | − αi
(17)
Nα
where |αi is given by Eq. (16) and Nα is a normalization
factor. Additionally, we study the superposition
r
1
|EiE =
|0i + |ni
(18)
2
with n = 10. Figure 6 (a) shows the calculation for cat
states (17). In this case, we reach fidelities over 90% in about
60 measurements. Moreover, Fig. 6 (b) shows results similar
to the qubit case given by Fig. (3), surpassing fidelities of 90%
in less than 40 iterations. The last figure reflects the fact that
for the state in Eq. (18), the protocol is reduced to the qubit
case, given that only two states are involved in the superposition. Thus, all states of the form in Eq. (18) have the same
performance as the qubit case.
We can see from Figs. 4, 5 and 6, that the learning speed is
inversely proportional to the parameter , which means that a
small value of implies a rapid increase in fidelity between R
and E, that is, it increases the speed of learning. On the other
hand, the maximum learning is also directly proportional to
, in other words, a small value of means lower maximum
fidelities between R and E. It is pertinent to emphasize that
our protocol for qubit and multilevel cases employs two-level
operators UA(k) , and each iteration only needs to calculate the
operator U(k) = U (k−1) U(k−1) . Hence, the protocol does not
need to store the complete agent history, which is an advantage in terms of the required resources.
This protocol can be implemented in any platform that enNOT
XOR
ables the logical operator Ua,b
for qubits, or Ua,b
for qudits, and digital feedback loops, as is the case of circuit quantum electrodynamics (cQEDs). This platform takes particular
relevance due to its fast development in quantum computation [40–46]. Current technology in cQEDs allows for digital
quantum feedback loops with elapsed times about 2[µs] and
fidelities around 99% [47, 48], well-controlled one and twoqubits gates with fidelities over 99% in less than 1[µs] [49],
with qubits with coherence times about 100[µs] [50, 51]. This
allows for more than 20 iterations of our protocol, a sufficient number for a feasible implementation. Aditionally, in
the last decade, multilevel gates have been theoretically proposed [52–54], as well as efficient multiqubit gates have recently been proposed using a ML approach [55, 56] providing
all the necessary elements for the experimental implementation of the general framework of this learning protocol.
IV.
CONCLUSIONS
We propose and analyse a quantum reinforcement learning
protocol to adapt a quantum state (the agent) to another, unknown, quantum state (the environment), in the context where
several identical copies of the unknown state are available.
The main goal of our proposal is for the agent to acquire information about the environment in a semi-autonomous way,
namely, in the reinforcement learning spirit. We show that the
fidelity increases rapidly with the number of iterations, reaching for qubit states average fidelities over 90% with less than
30 measurements. Also, for states with dimension d > 2,
we obtain average fidelity over 80% for d = 11, with about
400 measurements. The performance is improved for special
cases such as coherent states (average fidelities of 85% with
less than 100 iterations), cat states (average fidelities of 90%
√
with about 60 iterations) and states of the form (|0i + |ni)/ 2
(average fidelities of 90% with less than 40 iterations).
The performance of the protocol is handled by the value
of the parameter and by the number of states involved in
the superposition of the environment state, E, in the measurement basis. For a small we get a high learning speed and a
reduced maximum learning. Moreover, the number of states
in the superposition is related to the overall performance of
the protocol, that is, a superposition of fewer terms provides
better performance, which increases learning speed as well as
maximum learning, requiring less iterations to obtain high fidelity. These two facts imply that a possible improvement of
the protocol can be achieved by using a dynamic parameter
and a measurement device that can change its measurement
basis throughout the protocol to reduce the number of states
involved in the overlap of the state of E. Besides, since our
protocol increases the fidelity with a small number of iterations, it is useful even when the number of copies of E is limited. Finally, this protocol opens up the door to the implementation of semi-autonomous quantum reinforcement learning, a
6
next step for achieving quantum artificial life.
The authors acknowledge support from CONICYT Doctorado Nacional 21140432, Dirección de Postgrado USACH,
FONDECYT Grant No. 1140194, Ramón y Cajal Grant
RYC-2012-11391, MINECO/FEDER FIS2015-69983-P and
Basque Government IT986-16.
[1] S. Russell and P. Norvig, Artificial Intelligence: A modern approach (Prentice hall, 1995).
[2] R. S. Michalski, J. G. Carbonell, and T. M. Mitchell, Machine
learning: An artificial intelligence approach (Springer Science
& Business Media, 2013).
[3] M. I. Jordan and T. M. Mitchell, Science 349, 255 (2015).
[4] M. Kawagoe and A. Tojo, Pattern Recognition 17, 295 (1984).
[5] R. V. Shannon, F.-G. Zeng, V. Kamath, J. Wygonski, and
M. Ekelid, Science 270, 303 (1995).
[6] A. K. Jain, Nature 449, 38 (2007).
[7] J. Carrasquilla, and R. G. Melko, Nat. Phys. 13, 431 (2017).
[8] A. Fahad, N. Alshatri, Z. Tari, A. Alamri, I. Khalil, A. Y.
Zomaya, S. Foufou, and A. Bouras, IEEE Transactions on
Emerging Topics in Computing 2, 267 (2014).
[9] P. Baldi, P. Sadowski, and D. Whiteson, Nat. Comm. 5, 4308
(2014).
[10] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction (MIT press Cambridge, 1998).
[11] M. L. Littman, Nature 521, 445 (2015).
[12] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou,
A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton,
Y. Chen, T. Lillicrap, F. Hui, L. Sifre, G. van den Driessche,
T. Graepel, and D. Hassabis, Nature 550, 354 (2017).
[13] D. Silver, T. Hubert, J. Schrittwieser, I. Antonoglou, M. Lai,
A. Guez, M. Lanctot, L. Sifre, D. Kumaran, T. Graepel, et al.,
arXiv preprint arXiv:1712.01815 (2017).
[14] M. A. Nielsen and I. L. Chuang, Quantum computation and
quantum information (Cambridge University Press, Cambridge,
UK, 2010).
[15] M. Schuld, I. Sinayskiy, and F. Petruccione, Contemporary
Physics 56, 172 (2015).
[16] J. Adcock, E. Allen, M. Day, S. Frick, J. Hinchliff, M. Johnson,
S. Morley-Short, S. Pallister, A. Price, and S. Stanisic, arXiv
preprint arXiv:1512.02900 (2015).
[17] V. Dunjko, J. M. Taylor, and H. J. Briegel, Phys. Rev. Lett. 117,
130501 (2014).
[18] V. Dunjko and H. J. Briegel, arXiv preprint arXiv:1709.02779
(2017).
[19] J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe,
and S. Lloyd, Nature 549, 195 (2017).
[20] R. Biswas, Z. Jiang, K. Kechezhi, S. Knysh, S. Mandrà,
B. O’Gorman, A. Perdomo-Ortiz, A. Petukhov, J. RealpeGómez, E. Rieffel, D. Venturelli, F. Vasko, and Z. Wang, Parallel Computing 64, 81 (2017), high-End Computing for NextGeneration Scientific Discovery.
[21] A. Perdomo-Ortiz, M. Benedetti, J. Realpe-Gómez, and
R. Biswas, arXiv preprint arXiv:1708.09757 (2017).
[22] A. Perdomo-Ortiz, A. Feldman, A. Ozaeta, S. V. Isakov, Z. Zhu,
B. O’Gorman, H. G. Katzgraber, A. Diedrich, H. Neven,
J. de Kleer, et al., arXiv preprint arXiv:1708.09780 (2017).
[23] M. Sasaki and A. Carlini, Phys. Rev. A 66, 022303 (2002).
[24] S. Lloyd, M. Mohseni, and P. Rebentrost, arXiv preprint
arXiv:1307.0411 (2013).
[25] M. Benedetti, J. Realpe-Gómez, R. Biswas, and A. PerdomoOrtiz, Phys. Rev. X 7, 041052 (2017).
[26] M. Benedetti, J. Realpe-Gómez, and A. Perdomo-Ortiz, arXiv
preprint arXiv:1708.09784 (2017).
[27] E. Aı̈meur, G. Brassard, and S. Gambs, Machine Learning 90,
261 (2013).
[28] G. D. Paparo, V. Dunjko, A. Makmal, M. A. Martin-Delgado,
and H. J. Briegel, Phys. Rev. X 4, 031002 (2014).
[29] L. Lamata, Scientific Reports 7, 1609 (2017).
[30] F. Cárdenas-López, L. Lamata, J. C. Retamal, and E. Solano,
arXiv preprint arXiv:1709.07848 (2017).
[31] U. Alvarez-Rodriguez, L. Lamata, P. Escandell-Montero, J. D.
Martı́n-Guerrero, and E. Solano, Scientific Reports 7, 13645
(2017).
[32] R. B. A. Adamson and A. M. Steinberg, Phys. Rev. Lett. 105,
030406 (2010).
[33] H. Sosa-Martinez, N. K. Lysne, C. H. Baldwin, A. Kalev, I. H.
Deutsch, and P. S. Jessen, Phys. Rev. Lett. 119, 150401 (2017).
[34] A. Lumino, E. Polino, A. S. Rab, G. Milani, N. Spagnolo,
N. Wiebe, and F. Sciarrino, arXiv preprint arXiv:1712.07570v1
(2017).
[35] A. Rocchetto, S. Aaronson, S. Severini, G. Carvacho,
D. Poderini, I. Agresti, M. Bentivegna, and F. Sciarrino, arXiv
preprint arXiv:1712.00127 (2017).
[36] G. Torlai, G. Mazzola, J. Carrasquilla, M. Troyer, R. Melko,
and G. Carleo, arXiv preprint arXiv:1703.05334 (2017).
[37] L.-L. Sun, Y. Mao, F.-L. Xiong, S. Yu, and Z.-B. Chen, arXiv
preprint arXiv:1802.00140 (2018).
[38] L. Roa, A. Delgado, M. L. Ladrón de Guevara, and A.
B. Klimov, Phys. Rev. A 73, 012322 (2006).
[39] G. Alber, A. Delgado, N. Gisin, and I. Jex, arXiv preprint
quant-ph/0008022 (2000).
[40] A. Blais, R.-S. Huang, A. Wallraff, S. M. Girvin, and R. J.
Schoelkopf, Phys. Rev. A 69, 062320 (2004).
[41] M. H. Devoret, A. Wallraff, and J. M. Martinis, arXiv preprint
cond-mat/0411174 (2004).
[42] M. Hofheinz, E. M. Weig, M. Ansmann, R. C. Bialczak,
E. Lucero, M. Neeley, A. D. O’Connell, H. Wang, J. M. Martinis, and A. N. Cleland, Nature 454, 310 (2008).
[43] M. Hofheinz, H. Wang, M. Ansmann, R. C. Bialczak,
E. Lucero, M. Neeley, A. D. O’Connell, D. Sank, J. Wenner,
J. M. Martinis, and A. N. Cleland, Nature 459, 546 (2009).
[44] L. DiCarlo, J. M. Chow, J. M. Gambetta, L. S. Bishop, B. R.
Johnson, D. I. Schuster, J. Majer, A. Blais, L. Frunzio, S. M.
Girvin, and R. J. Schoelkopf, Nature 460, 240 (2009).
[45] M. H. Devoret and R. J. Schoelkopf, Science 339, 1169 (2013).
[46] J. Otterbach, R. Manenti, N. Alidoust, A. Bestwick, M. Block,
B. Bloom, S. Caldwell, N. Didier, E. S. Fried, S. Hong, et al.,
arXiv preprint arXiv:1712.05771 (2017).
[47] D. Ristè, J. G. van Leeuwen, H.-S. Ku, K. W. Lehnert, and
L. DiCarlo, Phys. Rev. Lett. 109, 050507 (2012).
[48] D. Ristè, C. C. Bultink, K. W. Lehnert, and L. DiCarlo, Phys.
Rev. Lett. 109, 240502 (2012).
[49] R. Barends, A. Shabani, L. Lamata, J. Kelly, A. Mezzacapo,
U. Las Heras, R. Babbush, A. Fowler, B. Campbell, Y. Chen,
Z. Chen, B. Chiaro, A. Dunsworth, E. Jeffrey, E. Lucero,
A. Megrant, J. Y. Mutus, M. Neeley, C. Neil, P. J. J. O’Malley,
C. Quintana, P. Roushan, D. Sank, A. Vainsencher, J. Wenner,
T. C. White, E. Solano, H. Neven, and J. M. Martinis, Nature
7
534, 222 (2016).
[50] H. Paik, D. I. Schuster, L. S. Bishop, G. Kirchmair, G. Catelani,
A. P. Sears, B. R. Johnson, M. J. Reagor, L. Frunzio, L. I. Glazman, S. M. Girvin, M. H. Devoret, and R. J. Schoelkopf, Phys.
Rev. Lett. 107, 240501 (2011).
[51] C. Rigetti, J. M. Gambetta, S. Poletto, B. L. T. Plourde, J. M.
Chow, A. D. Córcoles, J. A. Smolin, S. T. Merkel, J. R. Rozen,
G. A. Keefe, M. B. Rothwell, M. B. Ketchen, and M. Steffen,
Phys. Rev. B 86, 100506 (2012).
[52] F. W. Strauch, Phys. Rev. A 84, 052313 (2011).
[53] B. Mischuck and K. Mølmer, Phys. Rev. A 87, 022341 (2013).
[54] E. O. Kiktenko, A. K. Fedorov, O. V. Man’ko, and V. I.
Man’ko, Phys. Rev. A 91, 042312 (2015).
[55] E. Zahedinejad, J. Ghosh, and B. C. Sanders, Phys. Rev. Lett.
114, 200502 (2015).
[56] E. Zahedinejad, J. Ghosh, and B. C. Sanders, Phys. Rev. Applied 6, 054005 (2016).
| 2cs.AI
|
arXiv:1601.00590v2 [math.GR] 17 Mar 2016
SPINORS AND ESSENTIAL DIMENSION
SKIP GARIBALDI AND ROBERT M. GURALNICK
With an appendix by Alexander Premet
Abstract. We prove that spin groups act generically freely on various spinor
modules, in the sense of group schemes and in a way that does not depend on
the characteristic of the base field. As a consequence, we extend the surprising calculation of the essential dimension of spin groups and half-spin groups
in characteristic zero by Brosnan–Reichstein–Vistoli (Annals of Math., 2010)
and Chernousov–Merkurjev (Algebra & Number Theory, 2014) to fields of
characteristic different from 2. We also complete the determination of generic
stabilizers in spin and half-spin groups of low rank.
1. Introduction
The essential dimension of an algebraic group G is, roughly speaking, the number of parameters needed to specify a G-torsor. Since the notion was introduced in
[BR97] and [RY00], there have been many papers calculating the essential dimension of various groups, such as [KM03], [CS06], [Flo08], [KM08], [GR09], [Mer10],
[BM12], [LMMR13], etc. (See [Mer15a], [Mer13], or [Rei10] for a survey of the
current state of the art.) For connected groups, the essential dimension of G tends
to be less than the dimension of G as a variety; for semisimple adjoint groups this
is well known1. Therefore, the discovery by Brosnan–Reichstein–Vistoli in [BRV10]
that the essential dimension of the spinor group Spinn grows exponentially as a
function of n (whereas dim Spinn is quadratic in n), was startling. Their results,
together with refinements for n divisible by 4 in [Mer09] and [CM14], determined
the essential dimension of Spinn for n > 14 if char k = 0. One goal of the present
paper is to extend this result to all characteristics except 2.
Generically free actions. The source of the characteristic zero hypothesis in
[BRV10] is that the upper bound relies on a fact about the action of spin groups on
spinors that is only available in the literature in case the field k has characteristic
zero. Recall that a group G acting on a vector space V is said to act generically
freely if there is a dense open subset U of V such that, for every K ⊇ k and every
u ∈ U (K), the stabilizer in G of u is the trivial group scheme. We prove:
Theorem 1.1. Suppose n > 14. Then Spinn acts generically freely on the spin
representation if n ≡ 1, 3 mod 4; a half-spin representation if n ≡ 2 mod 4; or
a direct sum of the vector representation and a half-spin representation if n ≡
0 mod 4. Furthermore, if n ≡ 0 mod 4 and n ≥ 20, then HSpinn acts generically
freely on a half-spin representation.
2010 Mathematics Subject Classification. Primary 11E72; Secondary 11E88, 20G10.
Guralnick was partially supported by NSF grants DMS-1265297 and DMS-1302886.
1See [GG15a] for a proof that works regardless of the characteristic of the field.
1
2
SKIP GARIBALDI AND ROBERT M. GURALNICK
(We also compute the stabilizer of a generic vector for the values of n not covered
by Theorem 1.1. See below for precise statements.)
Throughout, we write Spinn for the split spinor group, which is the simply
connected cover (in the sense of linear algebraic groups) of the split group SOn . To
be precise, the vector representation is the map Spinn → SOn , which is uniquely
defined up to equivalence unless n = 8. For n not divisible by 4, the kernel µ2 of
this representation is the unique central µ2 subgroup of Spinn .
For n divisible by 4, the natural action of Spinn on the spinors is a direct sum
of two inequivalent representations, call them V1 and V2 , each of which is called a
half-spin representation. The center of Spinn in this case contains two additional
copies of µ2 , namely the kernels of the half-spin representations Spinn → GL(Vi ),
and we write HSpinn for the image of Spinn (the isomorphism class of which does
not depend on i). For n ≥ 12, HSpinn is not isomorphic to SOn .
Theorem 1.1 is known under the additional hypothesis that char k = 0, see
[AP71, Th. 1] for n ≥ 29 and [Pop88] for n ≥ 15. The proof below is independent
of the characteristic zero results, and so gives an alternative proof.
We note that Guerreiro proved that the generic stabilizer in the Lie algebra
spinn , acting on a (half) spin representation, is central for n = 22 and n ≥ 24, see
Tables 6 and 9 of [Gue97]. At the level of group schemes, this gives the weaker
result that the generic stabilizer is finite étale. Regardless, we recover these cases
quickly, see §3; the longest part of our proof concerns the cases n = 18 and 20.
Generic stabilizer in Spinn for small n. For completeness, we list the stabilizer
in Spinn of a generic vector for 6 ≤ n ≤ 14 in Table 1. The entries for n ≤ 12 and
char k 6= 2 are from [Igu70]; see sections 7–9 below for the remaining cases. The
case n = 14 is particularly important due to its relationship with the structure of
14-dimensional quadratic forms with trivial discriminant and Clifford invariant (see
[Ros99a], [Ros99b], [Gar09], and [Mer15b]), so we calculate the stabilizer in detail
in that case.
n
6
7
8
9
10
char k 6= 2
(SL3 ) · (Ga )3
G2
Spin7
Spin7
(Spin7 ) · (Ga )8
char k = 2
same
same
same
same
same
n char k 6= 2
char k = 2
11
SL5
SL5 ⋊Z/2
12
SL6
SL6 ⋊Z/2
13 SL3 × SL3 (SL3 × SL3 ) ⋊ Z/2
14 G2 × G2
(G2 × G2 ) ⋊ Z/2
Table 1. Stabilizer sub-group-scheme in Spinn of a generic vector
in an irreducible (half) spin representation for small n.
For completeness, we also record the following.
Theorem 1.2. Let k be an algebraically closed field. The stabilizer in HSpin16 of
a generic vector in a half-spin representation is isomorphic to (Z/2)4 × (µ2 )4 .
The proof when char k =
6 2 is short, see Lemma 4.2. The case of char k = 2
is treated in an appendix by Alexander Premet. (Eric Rains has independently
proved this result.)
SPINORS AND ESSENTIAL DIMENSION
3
Essential dimension. We recall the definition of essential dimension. For an
extension K of a field k and an element x in the Galois cohomology set H 1 (K, G), we
define ed(x) to be the minimum of the transcendence degree of K0 /k for k ⊆ K0 ⊆
K such that x is in the image of H 1 (K0 , G) → H 1 (K, G). The essential dimension
of G, denoted ed(G), is defined to be max ed(x) as x varies over all extensions
K/k and all x ∈ H 1 (K, G). There is also a notion of essential p-dimension for
a prime p. The essential p-dimension edp (x) is the minimum of ed(resK ′ /K x) as
K ′ varies over finite extensions of K such that p does not divide [K ′ : K], where
resK ′ /K : H 1 (K, G) → H 1 (K ′ , G) is the natural map. The essential p-dimension
of G, edp (G), is defined to be the minium of edp (x) as K and x vary; trivially,
edp (G) ≤ ed(G) for all p and G, and edp (G) = 0 if for every K every element of
H 1 (K, G) is killed by some finite extension of K of degree not divisible by p.
Our Theorem 1.1 gives upper bounds on the essential dimension of Spinn and
HSpinn regardless of the characteristic of k. Combining these with the results of
[BRV10], [Mer09], [CM14], and [Löt13] quickly gives the following, see §6 for details.
Corollary 1.3. For n > 14 and char k 6= 2,
(n−1)/2
− n(n−1)
2
2
ed2 (Spinn ) = ed(Spinn ) = 2(n−2)/2 − n(n−1)
2
(n−2)/2 n(n−1)
2
− 2 + 2m
if n ≡ 1, 3 mod 4;
if n ≡ 2 mod 4; and
if n ≡ 0 mod 4
where 2m is the largest power of 2 dividing n in the final case. For n ≥ 20 and
divisible by 4,
n(n − 1)
.
2
Although Corollary 1.3 is stated and proved for split groups, it quickly implies
analogous results for non-split forms of these groups, see [Löt13, §4] for details.
Combining the corollary with the calculation of ed(Spinn ) for n ≤ 14 by Markus
Rost in [Ros99a] and [Ros99b] (see also [Gar09]), we find for char k 6= 2:
ed2 (HSpinn ) = ed(HSpinn ) = 2(n−2)/2 −
n
5
ed(Spinn ) 0
6 7
0 4
8 9
5 5
10 11 12 13 14 15 16 17 18 19 20
4 5 6 6 7 23 24 120 103 341 326
Notation. Let G be an affine group scheme of finite type over a field k, which
we assume is algebraically closed and of characteristic different from 2. (If G is
additionally smooth, then we say that G is an algebraic group.) If G acts on a
variety X, the stabilizer Gx of an element x ∈ X(k) is a sub-group-scheme of G
with R-points
Gx (R) = {g ∈ G(R) | gx = x}
for every k-algebra R.
If Lie(G) = 0 then G is finite and étale. If additionally G(k) = 1, then G is the
trivial group scheme Spec k.
For a representation ρ : G → GL(V ) and elements g ∈ G(k) and x ∈ Lie(G), we
denote the fixed spaces by V g := ker(ρ(g) − 1) and V x := ker(dρ(x)).
We use fraktur letters such as g, spinn , etc., for the Lie algebras Lie(G), Lie(Spinn ),
etc.
Acknowledgements. We thank Alexander Merkurjev and Zinovy Reichstein for helpful
comments, and for posing the questions answered in Proposition 9.1 and Theorem 1.1.
4
SKIP GARIBALDI AND ROBERT M. GURALNICK
2. Fixed spaces of elements
Fix some n ≥ 6. Let V be a (half) spin representation for Spinn , of dimension
2⌊(n−1)/2⌋ .
Proposition 2.1. For n ≥ 6:
(1) For all noncentral x ∈ spinn , dim V x ≤ 43 dim V .
(2) For all noncentral g ∈ Spinn , dim V g ≤ 43 dim V .
If n > 8, char k 6= 2, and g ∈ Spinn is noncentral semisimple, then dim V g ≤
5
8 dim V .
In the proof, in case char k 6= 2, we view SOn as the group of matrices
SOn (k) = {A ∈ SLn (k) | SA⊤ S = A−1 },
where S is the matrix 1’s on the “second diagonal”, i.e., Si,n+1−i = 1 and the other
entries of S are zero. The intersection of the diagonal matrices with SOn are a maxi−1
mal torus. For n even, one finds elements of the form (t1 , t2 , . . . , tn/2 , t−1
n/2 , . . . , t1 ),
and we abbreviate these as (t1 , t2 , . . . , tn/2 , . . .). Explicit formulas for a triality automorphism σ of Spin8 of order 3 are given in [Gar98, §1], and for g =
(t1 , t2 , t3 , t4 , . . .) ∈ Spin8 the elements σ(g) and σ 2 (g) have images in SO8
q
q
q
q
t1 t2 t3
t1 t4 t2
t1 t3 t4
t1
ε
(2.2)
and
t4 ,
t3 ,
t2 ,
t2 t3 t4 , . . .
q
q
q
√
t1 t2 t3 t4 , tt13 tt24 , tt21 tt34 , tt21 tt34 , . . . ,
ε
where ε = ±1 is the only impecision in the expression.
Proof. For (1), in the Jordan decomposition x = s + n where s is semisimple, n is
nilpotent, and [s, n] = 0, we have V x ⊆ V s ∩ V n , so it suffices to prove (1) for x
nilpotent or semisimple.
Suppose first that x is a root element. If n = 6, then spinn ∼
= sl4 and V is
the natural representation of sl4 , so we have the desired equality. For n > 6, the
module restricted to son−1 is either irreducible or the direct sum of two half spins
and so the result follows.
If x is nonzero nilpotent, then we may replace x by a root element in the closure
of (Ad G)x. If x is noncentral semisimple, choose a root subgroup Uα of SOn
belonging to a Borel subgroup B such that x lies in Lie(B) and does not commute
with Uα . Then for all y ∈ Lie(Uα ) and all scalars λ, x + λy is in the same Ad(SOn )orbit as x and y is in the closure of the set of such elements; replace x with y. If x
is nonzero nilpotent, then root elements are in the closure of Ad(G)x.
(In case n is divisible by 4, the natural map spinn → hspinn is an isomorphism
on root elements. It follows that for noncentral x ∈ hspinn , dim V x ≤ 43 dim V by
the same argument.)
For (2), we may assume that g is unipotent or semisimple. If g is unipotent,
then by taking closures, we may pass to root elements and argue as for x in the Lie
algebra.
If g is semisimple, we actually prove a slightly stronger result: all eigenspaces
have dimension at most 34 dim V .
Suppose now that n is even. The image of g in SOn can be viewed as an element
of SOn−2 × SO2 , where it has eigenvalues (a, a−1 ) in SO2 . Replacing if necessary
g with a multiple by an element of the center of Spinn , we may assume that g is
SPINORS AND ESSENTIAL DIMENSION
5
in the image of Spinn−2 × Spin2 . Then V = V1 ⊕ V2 where the Vi are distinct half
spin modules for Spinn−2 and the Spin2 acts on each (since they are distinct and
Spin2 commutes with Spinn−2 ). By induction every eigenspace of g has dim at
most 43 dim Vi and the Spin2 component of g acts as a scalar, so this is preserved.
If n is odd, then the image of g in SOn has eigenvalue 1 on the natural module,
so is contained in a SOn−1 subgroup. Replacing if necessary g with gz for some z
in the center of G, we may assume that g is in the image of Spinn−1 and the claim
follows by induction.
For the final claim, view g as an element in the image of (g1 , g2 ) ∈ Spin8 × Spinn−8 .
The result is clear unless in some 8-dimensional image of Spin8 , g1 has diagonal
image (a, 1, 1, 1, . . .) ∈ SO8 . We may assume that the image of g has prime order
in GL(V ).
If g1 has odd order or order 4, then as in (2.2), on the other two 8 dimensional
representations of Spin8 it has no fixed space and each eigenspace of dimension at
most 4. So on the sum of any two of these representations the largest eigenspace is
at most 10-dimensional (out of 16), and the claim follows.
If g1 has order 2, then it maps to an element of order 4 in the other two 8dimensional representations via (2.2) and again the same argument applies.
The proposition will feed into the following elementary lemma, which resembles
[AP71, Lemma 4] and [Gue97, §3.3].
Lemma 2.3. Let V be a representation of a semisimple algebraic group G over an
algebraically closed field k.
(1) If for every unipotent g ∈ G and every noncentral semisimple g ∈ G of
prime order we have
dim V g + dim g G < dim V,
(2.4)
then for generic v ∈ V , Gv (k) is central in G(k).
(2) Suppose char k = p > 0 and let h be a G-invariant subspace of g. If for
every nonzero x ∈ g \ h such that x[p] ∈ {0, x} we have
dim V x + dim(Ad(G)x) < dim V,
(2.5)
then for generic v ∈ V , Lie(Gv ) ⊆ h.
We will apply this to conclude that Gv is the trivial group scheme for generic v,
so the hypothesis on char k in (2) is harmless. When char k = 0, the conclusion of
(1) suffices.
Proof. For (1), see [GG15b, §10] or adjust slightly the following proof of (2). For
x ∈ g, define
[
gV x .
V (x) := {v ∈ V | there is g ∈ G(k) s.t. xgv = 0} =
g∈G(k)
x
Define α : G × V → V by α(g, w) = gw, so the image of α is precisely V (x).
The fiber over gw contains (gc−1 , cw) for Ad(c) fixing x, and so dim V (x) ≤
dim(Ad(G)x) + dim V x .
Let X ⊂ g be the set of nonzero x ∈ g \ h such that x[p] ∈ {0, x}; it is a union of
finitely many G-orbits. (Every toral element — i.e., x with x[p] = x — belongs to
Lie(T ) for a maximal torus T in G by [BS66], and it is obvious that there are only
finitely many conjugacy classes of toral elements in Lie(T ).) Now V (x) depends
6
SKIP GARIBALDI AND ROBERT M. GURALNICK
only on the G-orbit of X (because V Ad(g)x = gV x ), so the union ∪x∈X V (x) is a
finite union. As dim V (x) < dim V by the previous paragraph, the union ∪V (x) is
contained in a proper closed subvariety Z of V , and for every v in the (nonempty,
open) complement of Z, gv does not meet X.
For each v ∈ (V \ Z)(k) and each y ∈ gv , we can write y as
y = yn +
r
X
αi yi ,
[yn , yi ] = [yi , yj ] = 0 for all i, j
i=1
[p]
such that y1 , . . . , yr ∈ gv are toral, and yn ∈ gv satisfies yn = 0, see [SF88,
Th. 3.6(2)]. Thus yn and the y1 , . . . , yr are in h by the previous paragraph.
Note that, in proving Theorem 1.1, we may assume that k is algebraically closed
(and so this hypothesis in Lemma 2.3 is harmless). Indeed, suppose G is an algebraic
group acting on a vector P
space V over a field k. Fix a basis v1 , . . . , vn of V and
consider the element η := ti vi ∈ V ⊗ k(t1 , . . . , tn ) = V ⊗ k(V ) for indeterminates
t1 , . . . , tn ; it is a sort of generic point of V . Certainly, G acts generically freely on
V over k if and only if the stabilizer (G × k(V ))v is the trivial group scheme, and
this statement is unchanged by replacing k with an algebraic closure. That is, G
acts generically freely on V over k if and only if G × K acts generically freely on
V ⊗ K for K an algebraic closure of k.
3. Proof of Theorem 1.1 for n > 20
Suppose n > 2, and put V for a (half) spin representation of Spinn . Recall that
dim Spinn = r(2r − 1) and
dim V = 2r−1
if n = 2r
whereas
dim Spinn = 2r2 + r
and
dim V = 2r
if n = 2r + 1
and in both cases rank Spinn = r. Proposition 2.1 gives an upper bound on dim V g
for noncentral g, and certainly the conjugacy class of g has dimension at most
dim Spinn −r. If we assume n ≥ 21 and apply these, we obtain (2.4) and consequently the stabilizer S of a generic v ∈ V has S(k) central in Spinn (k). Repeating
this with the Lie algebra spinn (and h the center of spinn ) we find that Lie(S)
is central in spinn . For n not divisible by 4, the representation Spinn → GL(V )
restricts to a closed embedding on the center of Spinn , so S is the trivial group
scheme as claimed in Theorem 1.1.
For n divisible by 4, we conclude that HSpinn acts generically freely on V (using
that Proposition 2.11 holds also for hspinn ). As the kernel µ2 of Spinn → HSpinn
acts faithfully on the vector representation W , it follows that Spinn acts generically
freely on V ⊕ W , completing the proof of Theorem 1.1 for n > 20.
4. Proof of Theorem 1.1 for n ≤ 20 and characteristic 6= 2
In this section we assume that char k 6= 2, and in particular the Lie algebra spinn
(and hspinn in case n is divisible by 4) is naturally identified with son .
Case n = 18 or 20. Take V to be a half-spin representation of G = Spinn (if
n = 18) or G = HSpinn (if n = 20). To prove Theorem 1.1 for these n, it suffices to
prove that G acts generically freely on V , which we do by verifying the inequalities
(2.4) and (2.5).
SPINORS AND ESSENTIAL DIMENSION
7
Nilpotents and unipotents. Let x ∈ g with x[p] = 0. The argument for unipotent
elements of G is essentially identical (as we assume char k 6= 2) and we omit it.
If, for a particular x, we find that the centralizer of x has dimension > 89 (if
n = 18) or > 62 (if n = 20), then dim(Ad(G)x) < 41 dim V and we are done by
Proposition 2.1.
For x nilpotent, the most interesting case is where x is has partition (22t , 1n−2t )
for some t. If n = 20, then such a class has centralizer of dimension at least 100,
and we are done. If n = 18, we may assume by similar reasoning that t = 3 or
4. The centralizer of x has dimension ≥ 81, so dim(Ad(G)x) ≤ 72. We claim that
dim V x ≤ 140; it suffices to prove this for an element with t = 3, as the element with
t = 4 specializes to it. View it as an element in the image of so9 × so9 → so18 where
the first factor has partition (24 , 1) and the second has partition (22 , 15 ). Now,
triality on so8 sends elements with partition 24 to elements with partition 24 and
(3, 15 ) — see for example [CM93, p. 97] — consequently the (24 , 1) in so9 acts on
the spin representation of so9 as a (3, 24 , 15 ). Similarly, the (22 , 15 ) acts on the spin
representation of so9 as (24 , 18 ). The action of x on the half-spin representation of
so18 is the tensor product of these, and we find that dim V x ≤ 140 as claimed.
Suppose x is nilpotent and has a Jordan block of size at least 5. An element
with partition (5, 1) in so6 is a regular nilpotent in sl4 with 1-dimensional kernel.
Using the tensor product decomposition as in the proof of Proposition 2.1, we
deduce that an element y ∈ son with partition (5, 1n−5 ) has dim V y ≤ 41 dim V ,
and consequently by specialization dim V x ≤ 14 dim V . As dim(Ad(G)x) ≤ dim G −
rank G < 34 dim V , the inequality is verified for this x.
Now suppose x is nilpotent and all Jordan blocks have size at most 4, so it is a
specialization of (44 , 12 ) if n = 18 or 45 if n = 20. These classes have centralizers
of dimension 41 and 50 respectively, hence dim(Ad(G)x) < 12 dim V . If x has at
least two Jordan blocks of size at least 3, then x specializes to (32 , 1n−6 ); as triality
sends elements with partition (32 , 12 ) to elements with the same partition, we find
dim V x ≤ 12 dim V . We are left with the case where x has partition (3, 22t , 1n−2t−3 )
for some t. If t = 0, then the centralizer of x has dimension 121 or 154 and we are
done. If t > 0, then x specializes to y with partition (3, 22 , 1n−7 ). As triality on
so8 leaves the partition (3, 22 , 1) unchanged, we find dim V x ≤ dim V y ≤ 12 dim V ,
as desired, completing the verification of (2.5) for x nilpotent.
Semisimple elements in Lie(G). For x ∈ son semisimple, the most interesting case
is when x is diagonal with entries (at , (−a)t , 0n−2t ) where exponents denote multiplicity
a∈ k × . The centralizer of x is GLt ×SOn−2t , so dim(Ad(SOn )x) =
2 and
n
n−2t
. This is less than 41 dim V for n = 20, settling that case. For n = 18,
2 −t −
2
if t = 1 or 2, x is in the image of an element (a, −a, 0, 0) or (a/2, a/2, −a/2, −a/2)
in sl4 ∼
= so6 , and the tensor product decomposition gives that dim V x ≤ 21 dim V
and again we are done. If t > 2, we consider a nilpotent y = ( 00 Y0 ) not commuting
with x where Y is 9-by-9 and y specializes to a nilpotent y ′ with partition (24 , 18 ).
′
Such a y ′ acts on V as 16 copies of (3, 24 , 15 ), hence dim V y = 160. By specializing
x
x to y as in the proof of Proposition 2.1, we find dim V ≤ 160 and again we are
done.
Semisimple elements in G. Let g ∈ G(k) be semisimple, non-central, and of prime
order. If n = 20, then dim g G ≤ 180 < 83 dim V and we are done by Proposition
8
SKIP GARIBALDI AND ROBERT M. GURALNICK
2.1. So assume n = 18. If we find that the centralizer of g has dimension > 57,
then dim g G < 38 dim V and we are done by Proposition 2.1.
If g has order 2, then it maps to an element of order 2 in SO18 whose centralizer
is no smaller than SO8 × SO10 of dimension 73, and we are done. So assume g has
odd prime order. We divide into cases depending on the image g ∈ SO18 of g.
If g has at least 5 distinct eigenvalues, then either it has at least 6 distinct eigenvalues a, a−1 , b, b−1 , c, c−1 , or it has 4 distinct eigenvalues that are not equal to 1,
and the remaining eigenvalue is 1. In the latter case set c = 1. View g as the image
of (g1 , g2 ) ∈ Spin6 × Spin12 where g1 maps to a diagonal (a, b, c, c−1 , b−1 , a−1 ) in
SO6 , a regular semisimple element. Therefore, the eigenspaces of the image of g1
under the isomorphism Spin6 ∼
= SL4 are all 1-dimensional and the tensor decomposition argument shows that dim V g ≤ 14 dim V . As dim g G ≤ 144 < 43 dim V , we
are done in this case.
If g has exactly 4 eigenvalues, then the centralizer of g is at least as big as
GL4 × GL5 of dimension 41, so dim g G ≤ 112 < 21 dim V . Viewing g as the image
of (g1 , g2 ) ∈ Spin8 × Spin10 such that the image g 1 of g1 in SO8 exhibits all 4
eigenvalues, then g1 has eigenspaces all of dimension 2 or of dimensions 3, 3, 1, 1.
Considering the possible images of g 1 as in (2.2), each eigenspaces in each of the
8-dimensional representations is at most 4, so dim V g ≤ 12 dim V and this case is
settled.
In the remaining case, g has exactly 2 nontrivial (i.e., not 1) eigenvalues a, a−1 .
If 1 is not an eigenvalue of g, then the centralizer of g is GL9 of dimension 81,
and we are done. If the eigenspaces for the nontrivial eigenvalues are at least 4dimensional, then we can take g to be the image of (g1 , g2 ) ∈ Spin10 × Spin8 where
g1 maps to (a, a, a, a, 1, . . .) ∈ SO10 . The images of (a, a, a, a, . . .) ∈ SO8 as in
(2.2) are (a, a, a, a−1 , . . .) and (a2 , 1, 1, 1, . . .), so the largest eigenspace of g1 on a
half-spin representation is 6, so dim V g ≤ 83 dim V . As the conjugacy class of a
regular element has dimension 144 < 85 dim V , this case is complete. Finally, if g
has eigenspaces of dimension at most 2 for a, a−1 , then dim g G ≤ 58 < 38 dim V
and the n = 18 case is complete.
Case n = 17 or 19. For n = 17 or 19, the spin representation of Spinn can be
viewed as the restriction of a half-spin represenation of the overgroup HSpinn+1 .
We have already proved that this representation of HSpinn+1 is generically free.
Case n = 15 or 16. We use the general fact:
Lemma 4.1. Let G be a quasi-simple algebraic group and H a proper closed subgroup of G and X finite. Then for generic g ∈ G, H ∩ gXg −1 = H ∩ X ∩ Z(G).
Proof. For each x ∈ X \ Z(G), note that W (x) := {g ∈ G | xg ∈ H} is a proper
closed subvariety of G and, since X is finite, ∪W (x) is also proper closed. Thus for
an open subset of g in G, g(X \ Z(G))g −1 does not meet H.
Lemma 4.2. Let G = HSpin16 and V a half-spin representation over an algebraically closed field k of characteristic 6= 2. The stabilizer of a generic vector in
V is isomorphic to (Z/2)8 , as a group scheme.
Proof. Consider Lie(E8 ) = Lie(G) ⊕ V where these are the eigenspaces of an involution in E8 . That involution inverts a maximal torus T of E8 and so there is
maximal Cartan subalgebra t = Lie(T ) on which the involution acts as −1. As E8 is
SPINORS AND ESSENTIAL DIMENSION
9
smooth and adjoint, for a generic element τ ∈ t, the centralizer CE8 (τ ) has identity
component T by [DG70, XIII.6.1(d), XIV.3.18], and in fact equals T by [GG15a,
Prop. 2.3]. Since t misses Lie(G), the annihilator of τ in Lie(G) is 0 as claimed.
Furthermore, Gv (k) = T (k) ∩ G(k), i.e., the elements of T (k) that commute with
the involution, so Gv (k) ∼
= µ2 (k)8 .
Corollary 4.3. If char k 6= 2, then Spin15 acts generically freely on V.
Proof. Of course the Lie algebra does because this is true for Lie(Spin16 ).
For the group, a generic stabilizer is Spin15 ∩X where X is a generic stabilizer
in Spin16 . Now X is finite and meets the center of Spin16 in the kernel of Spin16 →
HSpin16 , whereas Spin15 injects in to HSpin16 . Therefore, by Lemma 4.1 a generic
conjugate of X intersect Spin15 is trivial.
Corollary 4.4. If char k 6= 2, then Spin16 acts generically freely on V ⊕ W , where
V is a half-spin and W is the natural (16-dimensional) module.
Proof. Now the generic stabilizer is already 0 for the Lie algebra on V whence on
V ⊕ W.
In the group Spin16 , a generic stabilizer is conjugate to X g ∩ Spin15 where X
is the finite stabilizer on V and as in the proof of the previous corollary, this is
generically trivial.
5. Proof of Theorem 1.1 for n ≤ 20 and characteristic 2
To complete the proof of Theorem 1.1, it remains to prove, in case char k = 2,
that the following representations G → GL(V ) are generically free:
(1) G = Spin15 , Spin17 , Spin19 and V is a spin representation.
(2) G = Spin18 and V is a half-spin representation.
(3) G = Spin16 or Spin20 and V is a direct sum of the vector representation
and a half-spin representation.
(4) G = HSpin20 and V is a half-spin representation.
Since we are in bad characteristic, the class of unipotent and nilpotent elements
are more complicated. On the other hand, since we are in a fixed small characteristic
and the dimensions of the modules and Lie algebras are relatively small, one can
actually do some computations.
In particular, we check that in each case that there exists a v ∈ V over the field
of 2 elements such that Lie(Gv ) = 0. (This can be done easily in various computer
algebra systems.) It follows that the same is true over any field of characteristic 2.
Since the set of w ∈ V where Lie(Gw ) = 0 is an open subvariety of V , this shows
that Lie(Gw ) is generically 0.
It remains to show that the group of k-points Gv (k) of the stabilizer of a generic
v ∈ V is the trivial group.
First consider G = Spin16 . By Lemma 4.1, it suffices to show that, for generic
w in a half-spin representation W , Gw (k) is finite, which is true by the appendix. Alternatively, the finiteness of Gw (k) was proved in [GLLT16] by working in
Lie(E8 ) = hspin16 ⊕ W and exhibiting a regular nilpotent of Lie(E8 ) in W whose
stabilizer in hspin16 is trivial. Since the set of w where (Spin16 )w (k) is finite is
open, the result follows.
Similarly, Spin15 acts generically freely on the spin representation.
10
SKIP GARIBALDI AND ROBERT M. GURALNICK
As in the previous section, it suffices to show that for G one of HSpin20 and
Spin18 and V a half spin representation, Gv (k) = 1 for generic v ∈ V .
We first consider involutions. We recall that an involution g ∈ SO2n = SO(W )
(in characteristic 2) is essentially determined by the number r of nontrivial Jordan
blocks of g (equivalently r = dim(g − 1)W ) and whether the subspace (g − 1)W is
totally singular or not with r even (and r ≤ n) — see [AS76], [LS12] or see [FGS16,
Sections 5,6] for a quick elementary treatment. If r < n or (g − 1)V is not totally
singular, there is 1 class for each possible pair of invariants. If r = n (and so n is
even) and (g − 1)V is totally singular, then there are two such classes interchanged
by a graph automorphism of order 2.
Lemma 5.1. Suppose char k = 2. Let G = Spin2n , n > 4 and let W be a halfspin representation. If g ∈ G is an involution other than a long root element, then
dim W g ≤ (5/8) dim W .
Proof. By passing to closures, we may assume that r = 4. Thus, g ∈ Spin8 ≤ G.
There is the class of long root elements (which have r = 2). The largest class
is invariant under graph automorphisms and so has a 4-dimensional fixed space
on each of the three 8 dimensional representations. The other three classes are
permuted by the graph automorphisms. Thus, it follows they have a 4 dimensional
fixed space on two of the 8-dimensional representations and a 5-dimensional fixed
space on the third such representation. Since the class of g is invariant under triality,
g has a 4-dimensional fixed space on each of the 8-dimensional representations of
Spin8 . Since the a half-spin representation of Spin10 is a sum of two distinct halfspin representations for Spin8 , the result is true for n = 5.
The result now follows by induction (since W is a direct sum of the two half spin
representations of Spin2n−2 ).
Lemma 5.2. Suppose char k = 2. Let G = Spin18 or HSpin20 with V a half spin
representation of dimension 256 or 512 respectively. Then Gv (k) = 1 for generic
v ∈V.
Proof. This is proved in [GLLT16] but we give a different proof. As in the previous
section, it suffices to show that dim V g + dim g G < dim V for every non-central
g ∈ G with g of prime order. If g has odd prime order (and so is semisimple), then
the argument is exactly the same as in the previous section (indeed, it is even easier
since there are no involutions to consider). Alternatively, since we know the result
in characteristic 0, it follows that generic stabilizers have no nontrivial semisimple
elements as in the proof of [GG15b, Lemma 10.3].
Thus, it suffices to consider g of order 2. Let r be the number of nontrivial
Jordan blocks of g. If g is not a long root element, then dim V g ≤ (5/8) dim V . On
the other hand, dim g G ≤ 99 for n = 10 and 79 for n = 9 by [AS76], [LS12], or
[FGS16]; in either case dim g G < (3/8) dim V .
The remaining case to consider is when g is a long root element. Then dim V g =
(3/4) dim V while dim g G = 34 or 30 respectively and again the inequality holds.
6. Proof of Corollary 1.3
For n not divisible by 4, the (half) spin representation Spinn is generically free
by Theorem 1.1, so by, e.g., [Mer13, Th. 3.13] we have:
ed(Spinn ) ≤ dim V − dim Spinn .
SPINORS AND ESSENTIAL DIMENSION
11
This gives the upper bound on ed(Spinn ) for n not divisible by 4. For n = 16,
we use the same calculation with V the direct sum of the vector representation
of Spin16 and a half-spin representation. For n ≥ 20 and divisible by 4, Theorem
1.1 gives that ed(HSpinn ) is at most the value claimed; with this in hand, the
argument in [CM14, Th. 2.2] (referring now to [Löt13] instead of [BRV10] for the
stacky essential dimension inequality) establishes the upper bound on ed(Spinn ) for
n ≥ 20 and divisible by 4.
It is trivially true that ed2 (Spinn ) ≤ ed(Spinn ). Finally, that ed2 (Spinn ) is at
least the expression on the right side of the display was proved in [BRV10, Th. 33(a)] for n not divisible by 4 and in [Mer09, Th. 4.9] for n divisible by 4; the lower
bound on ed2 (HSpinn ) is from [BRV10, Remark 3-10].
7. Spinn for 6 ≤ n ≤ 12 and characteristic 2
Suppose now that 6 ≤ n ≤ 12 and char k = 2. Let us now calculate the stabilizer
in Spinn of a generic vector v in a (half) spin representation, which will justify
those entries in Table 1. For n = 6, the Spin6 ∼
= SL4 and the representation is the
natural representation. For n = 8, the half-spin representation is indistinguishable
from the vector representation Spin8 → SO8 and again the claim is clear.
For the remaining n, we verify that the k-points (Spinn )v (k) of the generic
stabilizer are as claimed, i.e., that the claimed group scheme is the reduced subgroup-scheme of (Spinn )v . The cases n = 9, 11, 12 are treated in [GLMS97, Lemma
2.11] and the case n = 10 is [Lie87, p. 496].
For n = 7, view Spin7 as the stabilizer of an anisotropic vector in the vector
representation of Spin8 ; it contains a copy of G2 . As a G2 -module, the half-spin
representation of Spin8 is self-dual and has composition factors of dimensions 1, 6,
1, so G2 fixes a vector in V . As G2 is a maximal closed connected subgroup of
Spin7 , it is the identity component of the reduced subgroup of (Spin7 )v .
We have verified that the reduced sub-group-scheme of (Spinn )v agrees with the
corresponding entry, call it S, in Table 1. We now proceed as in §5 and find a w
such that dim(spinn )w = dim S, which shows that (Spinn )v is smooth, completing
the proof of Table 1 for n ≤ 12.
8. Spin13 and Spin14 and characteristic 6= 2
In this section, we determine the stabilizer in Spin14 and Spin13 of a generic
vector in the (half) spin representation V of dimension 64. We assume that char k 6=
2 and k is algebraically closed.
Let C0 denote the trace zero subspace of an octonion algebra with quadratic
norm N . We may view the natural representation of SO14 as a sum C0 ⊕ C0
endowed with the quadratic form N ⊕ −N . This gives an inclusion G2 × G2 ⊂ SO14
that lifts to an inclusion G2 × G2 ⊂ Spin14 . There is an element of order 4 in SO14
such that conjugation by it interchanges the two copies of G2 — the element of
order 2 in the orthogonal group with this property has determinant −1 — so the
normalizer of G2 × G2 in SO14 (k) is isomorphic to ((G2 × G2 )⋊ µ4 )(k) and in Spin14
it is ((G2 × G2 ) ⋊ µ8 )(k).
Viewing V as an internal Chevalley module for Spin14 (arising from the embedding of Spin14 in E8 ), it follows that Spin14 has an open orbit in P(V ). Moreover,
the unique (G2 × G2 )-fixed line kv in V belongs to this open orbit, see [Pop80,
12
SKIP GARIBALDI AND ROBERT M. GURALNICK
p. 225, Prop. 11], [Ros99a], or [Gar09, §21]. That is, for H the reduced sub-groupscheme of (Spin14 )v , H ◦ ⊇ G2 × G2 . By dimension count this is an equality. A
computation analogous to the one in the preceding paragraph shows that the idealizer of Lie(G2 × G2 ) in so14 is Lie(G2 × G2 ) itself, hence Lie((Spin14 )v ) = Lie(H ◦ ),
i.e., (Spin14 )v is smooth. It follows from the construction above that the stabilizer
of kv in Spin14 is all of (G2 × G2 ) ⋊ µ8 (as a group scheme). The element of order 2
in µ8 is in the center of Spin14 and acts as −1 on V , so the stabilizer of v is G2 × G2
as claimed in Table 1.
Now fix a vector (c, c′ ) ∈ C0 ⊕ C0 so that N (c), N (c′ ) and N (c) − N (c′ ) are all
nonzero. The stabilizer of (c, c′ ) in Spin14 is a copy of Spin13 , and the stabilizer of
v in Spin13 is its intersection with G2 × G2 , i.e., the product (G2 )c × (G2 )c′ . Each
term in the product is a copy of SL3 (see for example [KMRT98, p. 507, Exercise
6]), as claimed in Table 1. (On the level of Lie algebras and under the additional
hypothesis that char k = 0, this was shown by Kac and Vinberg in [GV78, §3.2].)
9. Spin13 and Spin14 and characteristic 2
We will calculate the stabilizer in Spinn of a generic vector in an irreducible
(half-)spin representation for n = 13, 14 over a field k of characteristic 2.
Proposition 9.1. The stabilizer in Spin14 (over a field k of characteristic 2) of a
generic vector in a half-spin representation is the group scheme (G2 × G2 ) ⋊ Z/2.
We use the following construction. Let X ⊃ R, V1 , V2 be vector spaces endowed
with quadratic forms qX , qR := qX |R , q1 , q1 such that qR is totally singular; qX , q1 ,
and q2 are nonsingular; R is a maximal totally singular subspace of X; and there
exist isometric embeddings fi : (X, qX ) ֒→ (Vi , qi ). For example, one could take
V1 and V2 to be copies of an octonion algebra C, R to be the span of the identity
element 1C , and X to be a quadratic étale subalgebra of C. There is a natural
quadratic form on the pushout (V1 ⊕ V2 )/(f1 − f2 )(X); if we write Vi ∼
= Vi′ ⊥ fi (X),
′
′
then the quadratic space is isomorphic to V1 ⊥ V2 ⊥ X. We can perform a similar
construction where the role of Vi is played by the codimension-1 subspace fi (R)⊥
and the pushout is (f1 (R)⊥ ⊕ f2 (R)⊥ )/(f1 − f2 )(R), giving a homomorphism of
algebraic groups Bℓ1 × Bℓ2 → Bℓ1 +ℓ2 where 2ℓi + 2 = dim Vi .
Proof of Proposition 9.1. The 7-dimensional Weyl module of the split G2 gives an
embedding G2 ֒→ SO7 . Combining this with the construction in the previous
paragraph gives maps
G2 × G2 → SO7 × SO7 → SO13 → SO14
which lift to maps where every SO is replaced by Spin.
Put V for a half-spin representation of Spin14 . It restricts to the spin representation of Spin13 . Calculating the restriction of the weights of V to Spin7 × Spin7
using the explicit description of the embedding, we see that V is the tensor product
of the 8-dimensional spin representations of Spin7 . By triality, the restriction of
one of the spin representations to G2 is the action of G2 on the octonions C, which
is a uniserial module with 1-dimensional socle S (spanned by the identity element
in C) and 7-dimensional radical, the Weyl module of trace zero octonions. The
restriction of V = C ⊗ C to the first copy of G2 is eight copies of C, so has an
8-dimensional fixed space S ⊗ C. As (S ⊗ C)1×G2 = S ⊗ S, we find that S ⊗ S is
the unique line in V stabilized by G2 × G2 .
SPINORS AND ESSENTIAL DIMENSION
13
We now argue that the Spin14 -orbit of S ⊗ S is open in P(V ). To see this, by
[Röh93], it suffices to verify that G2 × G2 is not contained in the Levi subgroup of
a parabolic subgroup of Spin14 . This is easily verified; the most interesting case is
where the Levi has type A6 , and G2 × G2 cannot be contained in such because the
restriction of V to A6 has composition factors of dimension 1, 7, 21, and 35. We
conclude that every nonzero v ∈ S ⊗ S is a generic vector in V and (Spin14 )v has
dimension 28.
If one constructs on a computer the representation V of the Lie algebra spin14
over a finite field F of characteristic 2, then it is a matter of linear algebra to
calculate the dimension of the stabilizer (spin14 )x of a random vector x ∈ V . One
finds for some x that the stabilizer has dimension 28, which is the minimum possible,
so by semicontinuity of dimension dim((spin14 )v ) = 28 = dim(G2 × G2 ). That
is, (Spin14 )v is smooth with identity component G2 × G2 . Consequently we may
compute (Spin14 )v by determining its K-points for K an algebraic closure of k. The
map Spin14 (K) → SO14 (K) is an isomorphism of concrete groups. The normalizer
of (G2 × G2 )(K) in the latter group is (G2 × G2 )(K) ⋊ Z/2, where the nonidentity
element τ ∈ Z/2 interchanges the two copies of SO7 (K), hence of G2 (K). As τ
normalizes (G2 × G2 )(K), it leaves the fixed subspace S ⊗ S ⊗ K = Kv invariant,
and we find a homomorphism χ : Z/2 → Gm given by τ v = χ(τ )v which must be
trivial because char K = 2.
The above proof, which is somewhat longer than some alternatives, was chosen
because of the details it provides on the embedding of G2 × G2 in Spin14 .
Proposition 9.2. The stabilizer in Spin13 (over a field of characteristic 2) of a
generic vector in the spin representation is the group scheme (SL2 × SL2 ) ⋊ Z/2.
Proof. We imitate the argument used in §8. View Spin13 as (Spin14 )y for an
anisotropic y in the 14-dimensional vector representation of Spin14 . That representation, as a representation of Spin13 , has socle ky and radical y ⊥ . Let v be a
generic element of the spin representation V of Spin13 . Our task is to determine
the group
(9.3)
(Spin13 )v = (Spin14 )y ∩ (Spin14 )v .
The stabilizer (Spin14 )v described above is contained in a copy (Spin14 )e of
Spin13 where ke is the radical of the 13-dimensional quadratic form given by the
pushout construction. As v is generic, y and e are in general position, so tracing
through the pushout construction we see that the intersection (9.3) contains the
product of 2 copies of the stabilizer in G2 of a generic octonion z. The quadratic
étale subalgebra of C generated by z has normalizer SL3 ⋊Z/2 in G2 , hence the
stabilizer of z is SL3 . We conclude that, for K an algebraic closure of k, the group
of K-points of (Spin13 )v equals that of the claimed group, hence the stabilizer has
dimension 16. Calculating with a computer as in the proof for Spin14 , we find that
dim(spin13 )v ≤ 16, and therefore the stabilizer of v is smooth as claimed.
Appendix A. Generic stabilizers associated with a peculiar half-spin
representation
by Alexander Premet
14
SKIP GARIBALDI AND ROBERT M. GURALNICK
A.0. The main theorem. Throughout this appendix we work over an algebraically
closed field k of characteristic 2. Let G = HSpin16 (k) and let V be the natural (halfspin) G-module. The theorem stated below describes the generic stabilizers for the
actions of G and g = Lie(G) on V .
Theorem A.1. The following are true:
(i) There exists a non-empty Zariski open subset U in V such that for every
x ∈ U the stabilizer Gx is isomorphic to (Z/2Z)4 .
(ii) For any x ∈ U the stabilizer gx is a 4-dimensional toral subalgebra of g.
(iii) If x, x′ ∈ U then the stabilizers Gx and Gx′ and the infinitesimal stabilizers
gx and gx′ are G-conjugate.
(iv) The scheme-theoretic stabilizer of any x ∈ U is isomorphic to (Z/2Z)4 ×
(µ2 )4 .
A more precise description of Gx and gx with x ∈ U is given in §A.4. It should
be mentioned here that our Theorem A.1 can also be deduced from more general
invariant-theoretic results recently announced by Eric Rains.
e be a simple algebraic
A.1. Preliminary remarks and recollections. Let G
e
group of type E8 over k and g̃ = Lie(G). The Lie algebra g̃ is simple and carries an (Ad G)-equivariant [p]-th power map x 7→ x[p] . Since p = 2, Jacobson’s
formula for [p]-th powers is surprisingly simple: we have that
(x + y)[2] = x[2] + y [2] + [x, y]
(∀ x, y ∈ g̃) .
e and t = Lie(T ). Write Φ̃ for the root system of
Let T be a maximal torus of G
e
G with respect to T . In what follows we will make essential use of Bourbaki’s
description of roots in Φ̃; see [Bou02, Planche VII]. More precisely, let E be an
8-dimensional Euclidean space over R with orthonormal basis {ε1 , . . . , ε8 }. Then
Φ̃ = Φ̃0 ⊔ Φ̃1 where
Φ̃0 = {±εi ± εj | 1 ≤ i < j ≤ 8}
and
Φ̃1 =
n P
8
1
2
ν(i)
εi |
i=1 (−1)
o
ν(i)
∈
2Z
.
i=1
P8
The roots α1 = 21 (ε1 + ε8 − ε2 − ε3 − ε4 − ε5 − ε6 − ε7 ), α2 = ε1 + ε2 , α3 = ε2
α4 = ε3 − ε2 , α5 = ε4 − ε3 , α6 = ε5 − ε4 , α7 = ε6 − ε5 , α8 = ε7 − ε6 form a
− ε1 ,
basis
of simple roots in Φ̃ which we denote by Π̃. Let ( · | · ) be the scalar product of E.
It is invariant under the action of the Weyl group W (Φ̃) ⊂ GL(E).
e and a
Given α ∈ Φ̃ we denote by Uα and eα the unipotent root subgroup of G
root vector in Lie(Uα ). Let V be the k-span of of all eα with α ∈ Φ̃1 and write G for
e generated by T and all Uα with α ∈ Φ̃0 . It is well known (and
the subgroup of G
straightforward to see) that the algebraic k-group G is isomorphic to HSpin16 (k)
and the G-stable subspace V of g̃ is isomorphic to the natural (half-spin) G-module:
one can choose a Borel subgroup B of G in such a way that the fixed-point space
V Ru (B) is spanned by e−α1 . We write W for the subgroup of W (Φ̃) generated all
orthogonal reflections sα with α ∈ Φ̃0 . Clearly, W ∼
= NG (T )/T is the Weyl group
of G relative to T . Since G has type D8 the group W is a semidirect product
of its subgroup W0 ∼
= S8 acting by permutations of the set {ε1 , . . . , ε8 } and its
abelian normal subgroup A ∼
= (Z/2Z)7 consisting of all maps εi 7→ (±1)i εi with
Q8
i=1 (±1)i = 1; see [Bou02, Planche IV].
SPINORS AND ESSENTIAL DIMENSION
15
We may (and will) assume further that the eα ’s are obtained by base change
from a Chevalley Z-form, g̃Z , of a complex Lie algebra of type E8 . Since the group
e is a simply connected the nonzero elements hα := [eα , e−α ] ∈ t with α ∈ Φ̃ span
G
t. They have the property that [hα , e±α ] = ±2e±α = 0 and hα = h−α for all α ∈ Φ̃.
[2]
[2]
It is well known that eα = 0 and hα = hα for all α ∈ Φ̃. The set {hα | α ∈ Π̃} is a
k-basis of t. Since g̃ is a simple Lie algebra, for every nonzero t ∈ t there is a simple
root β ∈ Π̃ such that (dβ)e (t) 6= 0. This implies that t admits a non-degenerate
W (Φ̃)-invariant symplectic bilinear form h · , · i such that hhα , hβ i = (α|β) mod 2
for all α, β ∈ Φ̃.
A.2. Orthogonal half-spin roots and Hadamard–Sylvester matrices. Following the Wikipedia webpage on Hadamard matrices we define the matrices H2k
of order 2k , where k ∈ Z≥0 , by setting H1 = [1] and
H2k
H2k
H2k+1 =
= H2 ⊗ H2k
H2k −H2k
for k ≥ 0. These Hadamard matrices were first introduced by Sylvester in 1867 and
they have the property that H2k · H2Tk = 2k · I2k for all k. We are mostly interested
in
1
1
1
1
1
1
1
1
1 −1
1 −1
1 −1
1 −1
1
1 −1 −1
1
1 −1 −1
1 −1 −1
1
1 −1 −1
1
.
H 8 = H 2 ⊗ H2 ⊗ H 2 =
1
1
1 −1 −1 −1 −1
1
1 −1
1 −1 −1
1 −1
1
1
1 −1 −1 −1 −1
1
1
1 −1 −1
1 −1
1
1 −1
To each row ri = (ri1 , . . . , ri8 ) of H8 we assign the root γi = 21 (ri1 ε1 + · · · + ri8 ε8 ).
This way we obtain 16 distinct roots ±γ1 , . . . , ±γ8 in Φ̃1 with the property that
(γi |γj ) = 0 for all i 6= j. As ±γi ± γj 6∈ Φ̃ for i 6= j, the semisimple regular subgroup
e generated by T and all U±γi is connected and has type A8 . It is immediate
S of G
1
e that G ∩ S = NG (T ) ∩ NS (T ).
from the Bruhat decomposition in G
Using the explicit
form of the simple roots α1 , . . . , α8 it is routine to determine
the matrix M := (γi |αj ) 1≤i,j≤8 . It has the following form:
−1 1
0
0
0
0
0
0
0 0 −1
1 −1
1 −1
1
0 1
0 −1
0
1
0 −1
1 0 −1
0
1
0 −1
0
.
M =
0
0
0 −1
0
0
0 1
1 0 −1
1 −1
0
1 −1
1 1
0 −1
0
0
0
1
0 0 −1
0
1 −1
1
0
It is then straightforward to check
that M is row-equivalent over the integers to
M1 M2
a block-triangular matrix M ′ =
with M1 , M2 , M3 ∈ Mat4 (Z) and
O4 2M3
det(M1 ) = det(M3 ) = 1. From this it follows that γ1 , . . . , γ8 span E over R and
16
SKIP GARIBALDI AND ROBERT M. GURALNICK
hγ1 , . . . , hγ8 span a maximal (4-dimensional) totally isotropic subspace of the symplectic space t. We call it t0 .
A.3. A dominant morphism. Put Γ = {γ1 , . . . , γ8 } and let r denote the subspace
P8
of V spanned by eγ with γ ∈ ±Γ. If x = i=1 (λi eγi + µi e−γi ) ∈ r then Jacobson’s
P
8
formula shows that x[2] = i=1 (λi µi )hγi ∈ t0 . It follows that
P8
k+1
k
(A.2)
x[2]
= i=1 (λi µi )2 hγi
∀k ≥ 0 .
Our discussion at the end of §A.2 shows that t0 has a basis t1 , . . . , t4 contained in
[2]
[2]
the F2 -span of {hγ | γ ∈ Γ}. Since hα = hα for all roots α, we have that ti = ti
for 1 ≤ i ≤ 4. In view of (A.2) this yields that the subset of r consisting of all x as
k
above such that λi µi 6= λj µj for i 6= j and {x[2] | 1 ≤ k ≤ 4} spans t0 is non-empty
and Zariski open in r. We call this subset r◦ and consider the morphism
ψ : G × r −→ V, (g, x) 7→ (Ad g) · x.
Note that dim(G × r) = 120 + 16 = 136 and dim V = 128. By the theorem on fiber
dimensions of a morphism, in order to show that ψ is dominant it suffices to find a
point (g, x) ∈ G × r such that all components of ψ −1 ((Ad g) · x) containing (g, x)
have dimension ≤ 8.
We take x ∈ r◦ and g = 1Ge . Clearly, ψ −1 (x) ⊂ {(g, y) ∈ G × r | y ∈ (Ad G) · x}.
k
If (g, y) ∈ ψ −1 (x) then y ∈ r and (Ad g)−1 maps the k-span, t(x), of {x[2] | 1 ≤
k
k ≤ 4} onto the k-span, t(y), of {y [2] | 1 ≤ k ≤ 4}. As y [2] ∈ t0 and t0 is a
restricted subalgebra of t, this implies that t(x) = t(y) = t0 . It follows that Ad g
preserves the Lie subalgebra cg (t0 ) of g. The centralizer cg̃ (t0 ) is spanned by t and
all root vectors eα such that hhα , hγi i = (dα)e (hγi ) = 0 for 1 ≤ i ≤ 8. As t0 is a
maximal totally isotropic subspace of the symplectic space t, our concluding remark
in §A.2 shows that cg̃ (t0 ) = Lie(S). Since cg (t0 ) = g ∩ Lie(S) = t we obtain that
g ∈ NG (T ). But then ψ −1 (x) ⊆ {(g, (Ad g)−1 · x) ∈ G × r◦ | g ∈ NG (T )}. Since
dim NG (T ) = dim T = 8, all irreducible components of ψ −1 (x) have dimension ≤ 8.
We thus deduce that the morphism ψ is dominant. As the set G × r◦ is Zariski
open in G × r, the G-saturation of r◦ in V contains a Zariski open subset of V .
P8
P8
A.4. Generic stabilizers. Let x = i=1 λi eγi + i=1 µi e−γi ∈ r◦ . In view of
our discussion in §A.3 we now need to determine the stabilizer Gx . If g ∈ Gx then
i
Ad g fixes t0 = span{x[2] | 1 ≤ i ≤ 4} and hence preserves cg (t0 ) = t. This yields
Gx ⊆ NG (T ). Working over a field of characteristic 2 has some advantages: after
reduction modulo 2 we are no longer affected by the ambiguity in the choice of a
Chevalley basis in g̃Z and the torus T has no elements of order 2. It follows that
NGe (T ) contains a subgroup isomorphic W (Φ̃) which intersects trivially with T . In
the notation of [Ste68, §3] this group is generated by all elements ωα = wα (1) with
α ∈ Φ̃. As a consequence, W embeds into NG (T ) in such a way that NG (T ) =
W ⋉ T.
Our discussion in §A.2 implies that for any α ∈ Π̃ the element 16α ∈ ZΦ̃ lies
e is a group
in the Z-span of γ1 . . . , γ8 . Since T has no elements of order 2 and G
× 8
of adjoint type, it follows that for any collection (t1 , . . . , t8 ) ∈ (k ) there exists a
unique element h = h(t1 , . . . , t8 ) ∈ T with γi (h) = ti for all 1 ≤ i ≤ 8. Conversely,
ex ∩ T = {1 e }. For 1 ≤ i ≤ 8
any element of T has this form. As a consequence, G
G
we set hi := h(1, . . . , µi /λi , . . . , 1), an element of T , where the entry µi /λi occupies
the i-th position. Since Ad sγi permutes e±γi and fixes e±γj with j 6= i, it is
SPINORS AND ESSENTIAL DIMENSION
17
ex . If w0 is the longest element of W (Φ̃)
straightforward to check that sγi hi ∈ G
Q
then it acts on ZΦ̃ as −Id and hence lies in A ⊂ W ֒→ NG (T ). Since w0 = 8i=1 sγi
Q8
we now deduce that n0 := w0
i=1 hi ∈ Gx .
ex ∩ N e (T ) contains an element n = wh, where w ∈ W (Φ̃) and h =
Suppose G
G
h(a1 , . . . , a8 ) ∈ T , such that w(γi ) = γj for i 6= j. Then n(eγi ) = ai eγj and
−1
n(e−γi ) = a−1
i e−γj implying that λj = λi ai and µj = µi ai . But then λj /λi =
µi /µj forcing λi µi = λj µj for i 6= j. Since x ∈ r◦ this is false. As n0 ∈ Gx and
e x ∩ N e (T ) = hni | 1 ≤ i ≤ 8i
w0 (±γi ) = ∓γi for all i, this argument shows that G
G
is isomorphic to an elementary abelian 2-group of order 28 .
k
Let A2k ∼
= (Z/2Z)2 denote the direct product of 2k copies of {±1} ∼
= Z/2Z. The
group operation in A2k is defined componentwise. We write u • v for the product
of u, v ∈ A2k and denote by 12n the identity element of A2k (all components of
12k are equal to 1). The set of rows, R2k , of the Hadamard–Sylvester matrix H2k
may be regarded as a subset A2k and easy induction on k shows that ±R2k is a
subgroup of A2k . In particular, ±R8 is a subgroup of A8 . As mentioned in §A.1
the subgroup W0 ∼
= S8 of the Weyl group W = W (Φ̃0 ) acts on A8 by permuting
components whereas the normal subgroup A ∼
= (Z/2Z)7 of W embeds into A8 and
acts on it by translations.
If n ∈ Gx then n = wh ∈ NG (T ) and w preserves ±R8 setwise. If w = aσ,
where σ ∈ W0 and a ∈ A, then our discussion in the previous paragraph shows
that w(u) = (aσ)(u) = ±u for all u ∈ ±R8 . Taking u = 18 we get σ(18 ) = 18 and
±18 = w(18 ) = a • σ(18 ) = a • 18 = a. This yields a = ±18 implying that w ∈ W0
preserves ±R8 . Also, Gx ∩ A is a cyclic group of order 2 generated by n0 .
We now consider three commuting involutions σ1 = (1, 5)(2, 6)(3, 7)(4, 8), σ2 =
(1, 4)(2, 3)(5, 8)(6, 7) and σ3 = (1, 2)(3, 4)(5, 6)(7, 8) in W ∼
= S8 . One can see by
inspection that each of them maps every r ∈ R8 to ±r. Hence σi ∈ hsγi | 1 ≤ i ≤ 8i.
e x for 1 ≤ i ≤ 8, each σi admits a unique lift in Gx ⊂ NG (T ) which
Since sγi hi ∈ G
will be denoted by ni . The subgroup hni | 0 ≤ i ≤ 3i of Gx is isomorphic to (Z/2Z)4 .
Next we show that any element σh ∈ Gx with σ ∈ W0 ∼
= S8 lies in the subgroup
generated by the ni ’s. Since w maps 18 to ±18 and n0 ∈ Gx we may assume that
w(18 ) = 18 . Since σ maps (14 , −14 ) to ±(14 , −14 ) and n1 ∈ Gx we may also assume
that σ fixes (14 , −14 ). Since σ maps (12 , −12 , 12 , −12 ) to ±(12 , −12 , 12 , −12 ) and
n2 ∈ Gx we may assume that σ fixes (12 , −12 , 12 , −12 ) as well. Finally, since
σ maps (1, −1, 1, −1, 1, −1, 1, −1) to ±(1, −1, 1, −1, 1, −1, 1, −1) and n3 ∈ Gx we
may assume that σ fixes (1, −1, 1, −1, 1, −1, 1, −1). This entails that σ(i) = i for
i ∈ {1, 2, 3, 4}. As σ(r) = ±r for all r ∈ R8 the latter shows that σ = id proving
statement (i) of Theorem A.1.
i
Since gx contains the spanning set {x[2] | 1 ≤ i ≤ 4} of t0 , our remarks in §A.3
show that gx ⊂ t. Since [t, x] = 0 for every t ∈ gx it must be that (dγ)e (t) = 0 for
all γ ∈ Γ. Since (dγ)e (t) = hhγ , ti and t0 is a maximal isotropic subspace of the
symplectic space t, we obtain that t ∈ t0 . As a result, gx = t0 for every x ∈ r◦ .
Statement (ii) follows.
P8
In proving statement (iii) we may assume that x = i=1 (λi eγi + µi e−γi ) and
P8
x′ = i=1 (λ′i eγi + µ′i e−γi ) are two elements of r◦ . Our discussion in the previous
paragraph shows that gx = gx′ = t0 . Let h′i := h(1, . . . , µ′i /λ′i , . . . , 1), where the
entry µ′i /λ′i occupies the i-th position. There is a unique element h = h(b1 , . . . , b8 ) ∈
18
SKIP GARIBALDI AND ROBERT M. GURALNICK
T such that
(1 ≤ i ≤ 8).
h · sγi hi · h−1 = sγi h′i
p
′
′
(We need to take bi = (λi µi )/(λi µi ) ∈ k for all 1 ≤ i ≤ 8.) Our earlier remarks
in this section now show that h · Gx · h−1 = Gx′ . This proves statement (iii).
P8
Remark. We stress that for an element x = i=1 (λi eγi + µi e−γi ) to be in r◦ it is
necessary that λi µi 6= λj µj for all i 6= j. If one removes this condition and only
i
requires that the set {x[2] | 1 ≤ i ≤ 4} ⊂ t is linearly independent, then one obtains
an a priori bigger Zariski open subset, r′ , in r which still has the property that Gx
is a finite group and gx = t0 for every x ∈ r′ . However, it is not immediately clear
that the stabilizers in G of any two elements in r′ are isomorphic. It would be
interesting to investigate this situation in more detail.
e be a reductive group scheme over k with
Scheme-theoretic stabilizers. Let G
e and let G be the regular
root system Φ̃ with respect to a maximal torus T ⊂ G
e
group subscheme of G with root system Φ̃0 . We may assume that T(k) = T ,
e
e and G(k) = G. In this situation, we wish to describe the schemeG(k)
= G,
theoretic stabilizer Gx of x ∈ r◦ , an affine group subscheme of G defined over
k.
Let F be any commutative associative k-algebra with 1. The subscheme NG (T)
of G is smooth and since p = 2 we have an isomorphism NG (T) = W × T of affine
group schemes over k. Arguing as in §A.4 one observes that Gx (F ) is contained in
the group of F -points of NG (T). Since the latter contains Gx = Gx (k) it follows
that Gx (F ) is generated by Gx = (Gx )red and the scheme-theoretic stabilizer Tx .
More precisely,
Gx ∼
= (Z/2Z)4 × Tx
= (Gx )red × Tx ∼
as affine group schemes over k. Our concluding remarks in §A.2 imply that the root
lattice ZΦ̃ contains free Z-submodules Λ1 and Λ2 of rank 4 such that ZΦ̃ = Λ1 ⊕ Λ2
and ZΓ := Zγ1 ⊕ · · · ⊕ Zγ8 = Λ1 ⊕ 2Λ2 . Since T(F ) = HomZ (ZΦ̃, F × ), we have a
short exact sequence
1 → HomZ (Λ2 /2Λ2 , F × ) → T(F ) → HomZ (ZΓ, F × ) → 1
which shows that the groups Tx (F ) and HomZ (Λ2 /2Λ2 , F × ) are isomorphic. Since
Λ2 /2Λ2 ∼
= (Z/2Z)4 and HomZ (Z/2Z, F × ) = µ2 (F ) we have HomZ (Λ2 /2Λ2 , F × ) ∼
=
4
(µ2 ) (F ). Consequently, Tx ∼
= (µ2 )4 as affine group schemes over k. This completes
the proof of Theorem A.1.
References
[AP71]
[AS76]
[BM12]
[Bou02]
[BR97]
[BRV10]
E.M. Andreev and V.L. Popov, Stationary subgroups of points of general position in
the representation space of a semisimple Lie group, Functional Anal. Appl. 5 (1971),
no. 4, 265–271.
M. Aschbacher and G. Seitz, Involutions in Chevalley groups over fields of even order,
Nagoya Math. J. 63 (1976), 1–91.
Sanghoon Baek and Alexander S. Merkurjev, Essential dimension of central simple
algebras, Acta Math. 209 (2012), no. 1, 1–27. MR 2979508
N. Bourbaki, Lie groups and Lie algebras: Chapters 4–6, Springer-Verlag, Berlin,
2002.
J. Buhler and Z. Reichstein, On the essential dimension of a finite group, Compositio
Math. 106 (1997), 159–179.
P. Brosnan, Z. Reichstein, and A. Vistoli, Essential dimension, spinor groups, and
quadratic forms, Ann. of Math. (2) 171 (2010), no. 1, 533–544.
SPINORS AND ESSENTIAL DIMENSION
[BS66]
19
A. Borel and T.A. Springer, Rationality properties of linear algebraic groups, Algebraic Groups and Discontinuous Subgroups (Proc. Sympos. Pure Math., Boulder,
Colo., 1965), Amer. Math. Soc., Providence, R.I., 1966, pp. 26–32.
[CM93]
D. Collingwood and W.M. McGovern, Nilpotent orbits in semisimple Lie algebras,
Van Nostrant Reinhold, New York, 1993.
[CM14]
V. Chernousov and A.S. Merkurjev, Essential dimension of spinor and Clifford
groups, Algebra & Number Theory 8 (2014), no. 2, 457–472.
[CS06]
V. Chernousov and J-P. Serre, Lower bounds for essential dimensions via orthogonal
representations, J. Algebra 305 (2006), 1055–1070.
[DG70]
M. Demazure and A. Grothendieck, Schémas en groupes II: Groupes de type multiplicatif, et structure des schémas en groupes généraux, Lecture Notes in Mathematics,
vol. 152, Springer, 1970.
[FGS16]
J. Fulman, R. Guralnick, and D. Stanton, Asymptotics of the number of involutions
in finite classical groups, arxiv:1602.03611, 2016.
[Flo08]
M. Florence, On the essential dimension of cyclic p-groups, Invent. Math. 171 (2008),
no. 1, 175–189. MR 2358058 (2008i:12006)
[Gar98]
S. Garibaldi, Isotropic trialitarian algebraic groups, J. Algebra 210 (1998), 385–418.
, Cohomological invariants: exceptional groups and spin groups, Memoirs
[Gar09]
Amer. Math. Soc., no. 937, Amer. Math. Soc., Providence, RI, 2009, with an appendix by Detlev W. Hoffmann.
[GG15a]
S. Garibaldi and R.M. Guralnick, Essential dimension of exceptional groups, including
bad characteristic, preprint, 2015, arxiv:1512.09158.
[GG15b]
, Simple groups stabilizing polynomials, Forum of Mathematics: Pi 3 (2015),
e3 (41 pages).
[GLLT16] R.M. Guralnick, R. Lawther, M. Liebeck, and D. Testerman, Generic stabilizers for
actions of simple algebraic groups, in preparation, 2016.
[GLMS97] R.M. Guralnick, M.W. Liebeck, D. Macpherson, and G.M. Seitz, Modules for algebraic
groups with finitely many orbits on subspaces, J. Algebra 196 (1997), 211–250.
[GR09]
P. Gille and Z. Reichstein, A lower bound on the essential dimension of a connected
linear group, Comment. Math. Helv. 84 (2009), no. 1, 189–212.
[Gue97]
M. Guerreiro, Exceptional representations of simple algebraic groups in prime characteristic, Ph.D. thesis, University of Manchester, 1997, arxiv:1210.6919.
[GV78]
V. Gatti and E. Viniberghi, Spinors of 13-dimensional space, Adv. in Math. 30 (1978),
no. 2, 137–155.
[Igu70]
J.-I. Igusa, A classification of spinors up to dimension twelve, Amer. J. Math. 92
(1970), 997–1028.
[KM03]
N. Karpenko and A. Merkurjev, Essential dimension of quadrics, Invent. Math. 153
(2003), no. 2, 361–372. MR 1992016 (2004f:11029)
, Essential dimension of finite p-groups, Invent. Math. 172 (2008), no. 3, 491–
[KM08]
508. MR 2393078 (2009b:12009)
[KMRT98] M.-A. Knus, A.S. Merkurjev, M. Rost, and J.-P. Tignol, The book of involutions,
Colloquium Publications, vol. 44, Amer. Math. Soc., 1998.
[Lie87]
M.W. Liebeck, The affine permutation groups of rank 3, Proc. London Math. Soc. 54
(1987), 477–516.
[LMMR13] Roland Lötscher, Mark MacDonald, Aurel Meyer, and Zinovy Reichstein, Essential
dimension of algebraic tori, J. Reine Angew. Math. 677 (2013), 1–13. MR 3039772
[Löt13]
R. Lötscher, A fiber dimension theorem for essential and canonical dimension, Compositio Math. 149 (2013), no. 1, 148–174.
[LS12]
M. Liebeck and G. Seitz, Unipotent and nilpotent classes in simple algebraic groups
and Lie algebras, Math. Surveys and Monographs, no. 180, Amer. Math. Soc., 2012.
[Mer09]
A. Merkurjev, Essential dimension, Quadratic forms–algebra, arithmetic, and geometry (R. Baeza, W.K. Chan, D.W. Hoffmann, and R. Schulze-Pillot, eds.), Contemp.
Math., vol. 493, 2009, pp. 299–325.
, Essential p-dimension of PGL(p2 ), J. Amer. Math. Soc. 23 (2010), no. 3,
[Mer10]
693–712.
[Mer13]
, Essential dimension: a survey, Transform. Groups 18 (2013), no. 2, 415–481.
, Essential dimension, Séminaire Bourbaki, 67ème année, #1101, June 2015.
[Mer15a]
20
[Mer15b]
[Pop80]
[Pop88]
[Rei10]
[Röh93]
[Ros99a]
[Ros99b]
[RY00]
[SF88]
[Ste68]
SKIP GARIBALDI AND ROBERT M. GURALNICK
, Invariants of algebraic groups and retract rationality of classifying spaces,
preprint, 2015.
V.L. Popov, Classification of spinors of dimension 14, Trans. Moscow Math. Soc.
(1980), no. 1, 181–232.
A.M. Popov, Finite isotropy subgroups in general position of simple linear Lie groups,
Trans. Moscow Math. Soc. (1988), 205–249, [Russian original: Trudy Moskov. Mat.
Obschch. 50 (1987), 209–248, 262].
Z. Reichstein, Essential dimension, Proceedings of the International Congress of
Mathematicians 2010, World Scientific, 2010.
G. Röhrle, On certain stabilizers in algebraic groups, Comm. Algebra 21 (1993), no. 5,
1631–1644.
M. Rost, On 14-dimensional quadratic forms, their spinors, and the difference of two
octonion algebras, unpublished note, March 1999.
, On the Galois cohomology of Spin(14), unpublished note, March 1999.
Z. Reichstein and B. Youssin, Essential dimensions of algebraic groups and a resolution theorem for G-varieties, Canad. J. Math. 52 (2000), no. 5, 1018–1056, with an
appendix by J. Kollár and E. Szabó.
H. Strade and R. Farnsteiner, Modular Lie algebras and their representations, Monographs and textbooks in pure and applied math., vol. 116, Marcel Dekker, New York,
1988.
R. Steinberg, Lectures on Chevalley groups, Yale University, New Haven, Conn., 1968.
| 4math.GR
|
Learning activation functions from data
using cubic spline interpolation
Simone Scardapane, Michele Scarpiniti, Danilo Comminiello, and Aurelio Uncini
arXiv:1605.05509v2 [stat.ML] 11 May 2017
Department of Information Engineering, Electronics and Telecommunications (DIET),
“Sapienza” University of Rome,
Via Eudossiana 18, 00184, Rome.
Email: {simone.scardapane, michele.scarpiniti, danilo.comminiell}@uniroma1.it;
[email protected]
Abstract. Neural networks require a careful design in order to perform properly
on a given task. In particular, selecting a good activation function (possibly in
a data-dependent fashion) is a crucial step, which remains an open problem in
the research community. Despite a large amount of investigations, most current
implementations simply select one fixed function from a small set of candidates,
which is not adapted during training, and is shared among all neurons throughout the different layers. However, neither two of these assumptions can be supposed optimal in practice. In this paper, we present a principled way to have
data-dependent adaptation of the activation functions, which is performed independently for each neuron. This is achieved by leveraging over past and present
advances on cubic spline interpolation, allowing for local adaptation of the functions around their regions of use. The resulting algorithm is relatively cheap to
implement, and overfitting is counterbalanced by the inclusion of a novel damping criterion, which penalizes unwanted oscillations from a predefined shape.
Preliminary experimental results validate the proposal.
Keywords: Neural network, activation function, spline interpolation
1
Introduction
Neural networks (NNs) are extremely powerful tools for approximating complex nonlinear functions [7]. The nonlinear behavior is introduced in the NN architecture by the
elementwise application of a given nonlinearity, called the activation function (AF), at
every layer. Since AFs are crucial to the dynamics and computational power of NNs,
the history of the two over the last decades is deeply connected [15]. As an example,
the use of differentiable AFs was one of the major breakthroughs in NNs, leading directly to the back-propagation algorithm. More recently, progress on piecewise linear
functions was shown to facilitate backward flow of information for training very deep
networks [4]. At the same time, it is somewhat surprising that the vast majority of NNs
only use a small handful of fixed functions, to be hand-chosen by the practitioner before the learning process. Worse, there is no principled reason to believe that a ‘good’
nonlinearity might be the same across all layers of the network, or even across neurons
in the same layer.
2
Scardapane et al.
This is shown clearly in a recent work by Agostinelli et al. [1], where every neuron
in a deep network was endowed with an adaptable piecewise linear function with possibly different parameters, concluding that “the standard one-activation-function-fits-all
approach may be suboptimal” in current practice. Experiments in AF adaptation have a
long history, but they have never met a wide applicability in the field. The simplest approach is to parameterize each sigmoid function in the network by one or more ‘shape’
parameters to be optimized, such as in the seminal 1996 paper by Chen and Chang
[3] or the later work by Trentin [16]. Along a similar line, one may consider the use
of polynomial AFs, wherein each coefficient of the polynomial is adapted by gradient
descent [11]. Additional investigations can be found in [20,5,2,10,9]. One strong drawback of these approaches is that the parameters involved affect the AF globally, such
that a change in one region of the function may be counterproductive on a different,
possibly faraway, region.
Several years ago, an alternative approach was introduced by using spline interpolating functions as AFs [17,6], resulting in what was called a spline AF (SAF). Splines
are an attractive choice for interpolating unknown functions, since they can be described
by a small amount of parameters, yet each parameter has a local effect, and only a fixed
number of them is involved every time an output value is computed [18]. The original
works in [17,6] had two main drawbacks that prevented a wider use of the underlying theory. First, SAFs were only investigated in an online setting, where updates are
computed one sample at a time. Whether an efficient implementation is possible (and
feasible) also for batch (or mini-batch) settings was not shown. Secondly, the obtained
SAFs had a tendency to overfit training data, resulting in oscillatory behaviors which
hindered performance. Inspired by recent successes in the field of nonlinear adaptive
filtering [13,14], our aim in this paper is two-fold. On one hand, we provide a modern
introduction to the use of SAFs in neural networks, with a particular emphasis on their
efficient implementation in the case of batch (or mini-batch) training. Our treatment
clearly shows that the major problem in their implementation, which is evident from
the discussion above, is the design of an efficient way to regularize their control points.
In this sense, as a second contribution we provide a simple (yet effective) ‘damping’ criterion to prevent unwanted oscillations in the testing phase, which penalizes deviations
from the original points in terms of `2 norm. A restricted set of experiments shows that
the resulting formulation is able to achieve a lower test error than a standard NN with
fixed AFs, while at the same time learning non-trivial activations with different shapes
across different neurons.
The rest of the paper is organized as follows. Section 2 presents the basic theory of
SAFs for the case of a single neuron. Section 3 extends the treatment to the case of a NN
with one hidden layer, by deriving the gradient equations for the SAFs parameters in the
internal layer. Then, Section 4 goes over the experimental results, while we conclude
with some final remarks in Section 5.
2
The spline activation function
We begin our treatment of SAFs with the simplest case of a single neuron endowed
with a flexible AF (see [17,13] for additional details). Given a generic input x ∈ RD , the
Learning activation functions from data
3
output of the SAF is computed as:
s = wT x ,
(1)
y = ϕ(s; q) ,
(2)
where w ∈ RD (we suppose that an eventual bias term is added directly to the input vector), and the AF ϕ(·) is parameterized by a vector q ∈ RQ of internal parameters, called
knots. The knots are a sampling of the AF values over Q representative points spanning
the overall function. In particular, we suppose the knots to be uniformly spaced, i.e.
qi+1 = qi + ∆ x, for a fixed ∆ x ∈ R, and symmetrically spaced around the origin. Given
s, the output is computed by spline interpolation over the closest knot and its P rightmost neighbors. The common choice P = 3, which we adopt in this paper, corresponds
to cubic interpolation, and it is generally a good trade-off between locality of the output
and interpolating precision.
Given the index i of the closest knot, we can define the normalized abscissa value
between qi and qi+1 as:
j s k
s
.
(3)
u=
−
∆x
∆x
where b·c is the floor operator. From u we can compute the normalized reference
T
vector u = uP uP−1 . . . u 1 , while from i we can extract the relevant control points
qi = [qi qi+1 . . . qi+P ]T . We refer to the vector qi as the ith span. The output (2) is then
computed as:
(4)
y = ϕ(s) = uT Bqi ,
where B ∈ R(P+1)×(P+1) is called the spline basis matrix. In this work, we use the
Catmull-Rom (CR) spline with P = 3, given by:
−1 3 −3 1
1 2 −5 4 −1
.
(5)
B=
2 −1 0 1 0
0 2 0 0
Different bases give rise to alternative interpolation schemes, e.g. a spline defined by a
CR basis passes through all the control points, but its second derivative is not continuous.
Apart from the locality of the output, SAFs have two additional interesting properties. First, the output in (4) is extremely efficient to compute, involving only vectormatrix products of very small dimensionality. Secondly, derivatives with respect to the
internal parameters are equivalently simple and can be written down in closed form. In
particular, the derivative of the nonlinearity ϕ(s) with respect to the input s is given by:
∂ ϕ(s)
∂ ϕ(s) ∂ u
1
= ϕ 0 (s) =
·
=
u̇Bqi ,
(6)
∂s
∂u
∂s
∆x
where:
u̇ =
T
∂ u P−1
= Pu
(P − 1)uP−2 . . . 1 0 .
∂u
(7)
4
Scardapane et al.
Given this, the derivative of the SAF output y with respect to w is straightforward:
∂ ϕ(s)
∂s
= ϕ 0 (s) ·
= ϕ 0 (s)x ,
∂w
∂w
(8)
∂ ϕ(s)
= BT u .
∂ qi
(9)
Similarly, for qi we obtain:
while we have
3
3.1
∂ ϕ(s)
∂ qk
= 0 for any element qk outside the current span qi .
Designing networks with SAF neurons
Computing outputs and inner derivatives
Now we consider the more elaborate case of a single hidden layer NN, with a Ddimensional input, H neurons in the hidden layer, and O output neurons.1 Every neuron
in the network uses a SAF with possibly different adaptive control points, which are
set independently during the training process. For easiness of computation, we suppose
that the sampling set of the splines is the same for every neuron (i.e., each neuron has
Q points equispaced according to the same ∆ x), and we also have a single shared basis
matrix B. The forward phase of the network is similar to that of a standard network.
In particular, given the input x, we first compute the output of the ith hidden neuron,
i = 1, . . . , H, as:
hi = ϕ(wThi x; qhi ) .
(10)
These are concatenated in a single vector h = [h1 , . . . , hH , 1]T , and the ith output of the
network, i = 1, . . . , O, is given by:
fi (x) = yi = ϕ(wTyi h; qyi ) .
(11)
The derivatives with respect to the parameters wyi , qyi , i = 1, . . . , O can be computed
directly with (8)-(9), substituting x with h. By back-propagation, the derivative of the
ith output with respect to the jth (inner) weight vector wh j is similar to a standard NN:
∂yj
= ϕ 0 (sy j ) · ϕ 0 (shi ) · bwhi c j · x ,
∂ whi
(12)
where with a slight abuse of notation we let sy j denote the activation of the jth output
(and similarly for shi ), b·c j extracts the jth element of its input vector, and the two ϕ 0 (·)
are given by (6). For the derivative of the control points of the ith hidden neuron, denote
by qhi ,k the currently active span, and by uhi the corresponding reference vector. The
derivative with respect to the jth output is then given by:
∂yj
= ϕ 0 (sy j ) · bwhi c j · BT uhi .
∂ qhi ,k
1 We
(13)
note that the following treatment can be extended easily to the case of a network with
more than one hidden layer. However, restricting it to a single layer allow us to keep the discussion
focused on the problems/advantages arising in the use of SAFs. We leave this extension to a future
work.
Learning activation functions from data
3.2
5
Initialization of the control points
An important aspect that we have not discussed yet is how to properly initialize the
control points. One immediate choice is to sample their values from an AF which is
known to work well on the given problem, e.g. a hyperbolic tangent. In this way, the
network is guaranteed to work similarly to a standard NN in the initial phase of learning.
Additionally, we have found good improvements in error by adding Gaussian noise
N (0, σ 2 ) with small variance σ 2 to a randomly chosen subset of control points (around
5% in our experiments). This provides a good variability in the beginning, similarly to
how connections are set close to (but not identically equal to) zero during initialization.
3.3
Choosing a training criterion
Suppose we are provided with a training set of N input/output pairs in the form {xi
, di }Ni=1 .
For simplicity
of notation, we denote by w the concatenation of all weight vectors whi
and wyi , and by q a similar concatenation of all control points. Training can be formulated as the minimization of the following cost function:
J(w, q) =
1 N
∑ L(di , f(xi )) + λw Rw (w) + λq Rq (q) ,
N i=1
(14)
where L(·, ·) is an error function, while Rw (·) and Rq (·) provide meaningful regularization on the two set of parameters. The first two terms are well-known in the neural
network literature [7], and they can be set accordingly. Particularly, in our experiments
we consider a squared error term L(di , f(xi )) = kdi − f(xi )k22 , and `2 regularization on
the weights Rw (w) = kwk22 . The derivatives of L(·, ·) can be computed straightforwardly
with the formulas presented in Section 3.1.
The term Rq (q) is used to avoid overfitted solutions for the control points. In fact,
its presence is the major difference with respect to previous attempts at implementing
SAFs in neural networks [17], wherein overfitting was counterbalanced by choosing a
large value for ∆ x, which in a way goes outside the philosophy of spline interpolation
itself. At the same time, choosing a proper form for the regularization term is non-trivial,
as the term should be cheap to compute, and it should introduce just as much a priori
information as needed, without hindering the training process. Most of the literature
on regularizing w cannot be used here, as the corresponding formulations do not make
sense in the context of spline interpolation. As an example, simply penalizing the `2
norm of q leads to functions close to the zero function, while imposing sparsity is also
meaningless.
For the purpose of this paper, we consider the following ‘damping’ criterion:
Rq (q) = kq − qo k22 ,
(15)
where qo represents the initial values for the control points, as discussed in the previous
section (without considering additional noise). The criterion makes intuitive sense as
follows: while for w we wish to penalize unwanted deviations from very small weights
(which can be justified with arguments from learning theory), in the case of q we are
6
Scardapane et al.
interested in penalizing changes with respect to a ‘good’ function parameterized by the
initial control points qo , namely one of the standard AFs used in NN training. In fact,
setting a value for λq very high essentially deactivates the adaptation of the control
points. Clearly, other choices are possible, and in this sense this paper serves as a starting point for further investigations towards this objective. As an example, we may wish
to penalize first (or second) order derivatives of the splines in order to force a desired
level of smoothness [18].
3.4
Remarks on the implementation
In order to be usable in practice, SAFs require an efficient implementation to compute
outputs and derivatives concurrently for the entire training dataset or, alternatively, for a
properly chosen mini-batch (in the case of stochastic optimization algorithms). To begin
with, we underline that the equations for the reference vector (see (3)) do not depend on
the specific neuron, and for this reason they can easily be vectorized layer-wise on most
numerical algebra libraries to obtain all vectors concurrently. Additionally, the indexes
and relative terms Bqi in (4) can be cached during the forward pass, to be reused during
the computation of the derivatives. In this sense, the outputs of a layer and its derivatives
can be computed by one 4×4 matrix-vector computation, and three 4-dimensional inner
products, which have to be repeated for every pair input/neuron. In our experience,
the cost of a relatively well-optimized implementation does not exceed twice that of a
standard network for medium-sized batches, where the most onerous operation is the
reshaping of the gradients in (9) and (13) into a single vector of gradients relative to the
global vector q.
4
4.1
Experimental results
Experimental setup
To evaluate the preliminary proposal, we consider two simple regression benchmarks
for neural networks, the ‘chemical’ dataset (included among MATLAB’s testbeds for
function fitting), and the ‘California Housing’.2 They have respectively 498 and 20640
examples, and 8 numerical features. Inputs are normalized in the [−1, +1] range, while
outputs are normalized in the [−0.5, +0.5] range. We compare a NN with 5 hidden neurons and tanh(·) AFs (denoted as ‘Standard’ in the results), and a NN with the same
number of neurons and SAF nonlinearities. The weight vector w is initialized with the
method described in [4]. Each SAF is initialized from a tanh(·) nonlinearity, and control
points are defined in the [−2, +2] range with ∆ x = 0.2, which is a good compromise
between locality of the SAFs and the overall number of adaptable parameters. For the
first scenario, λq is kept to a small value of 10−5 . For each experiment, a random 30%
of the dataset is kept for testing, and results are averaged over 15 different splits to average out statistical effects. Error is computed with the Normalized Root Mean-Squared
Error (NRMSE). The optimization problems are solved using a freely available MATLAB implementation of the Polack-Ribiere variant of the nonlinear conjugate gradient
2 http://www.dcc.fc.up.pt/
˜ltorgo/Regression/cal_housing.html
Learning activation functions from data
7
Table 1. Average results for scenario 1 (λw = 1), together with one standard deviation.
Dataset
Nonlinearity Tr. RMSE T.st NRMSE
Chemical
Standard
SAF
1.00 ± 0.00 1.00 ± 0.01
0.29 ± 0.02 0.31 ± 0.02
Calhousing
Standard
SAF
1.02 ± 0.00 1.01 ± 0.01
0.56 ± 0.01 0.57 ± 0.02
optimization algorithm by C.E. Rasmussen. [12].3 The optimization process is allowed
1500 maximum iterations. MATLAB code for the experiments is also available on the
web.4 We briefly remark that the MATLAB library, apart from repeating the experiments presented here, is also designed to handle networks with more than a single
hidden layer, and implements the ADAM algorithm [8] for stochastic training in case
of a larger dataset.
4.2
Scenario 1: strong underfitting
As a first example, we consider a scenario of strong underfitting, wherein the user has
misleadingly selected a very large value of λw = 1, leading in turn to extremely small
values for the elements of w after training. Results in terms of training and test RMSE
are provided in Tab. 1. Since the activations of the NN tend to be very close to 0 (where
the hyperbolic tangent operates in an almost-linear regime), standard NNs have a constant zero output, leading to a RMSE of 1. Nonetheless, SAF networks are able to reach
a very satisfactory level of performance, which in the first case is almost comparable to
that of a fully optimized network (see the following section).
To show the reasons for this, we have plotted four representative nonlinearities after
training in Fig. 1. It is easy to see that the nonlinearities have adapted to act as ‘amplifiers’ for the activations in their operating regime, with mild and strong peaks around 0.
Of particular interest is the fact that the resulting SAFs need not be perfectly centered
around 0 (e.g. Fig. 1c), or even symmetrical around the y-axis (e.g. Fig. 1d). In fact, the
splines are able to efficiently counterbalance a bad setting for the weights, with behaviors which would be very hard (or close to impossible) using standard setups with fixed,
shared, mild nonlinearities.
4.3
Scenario 2: well-optimized parameters
In our second scenario, we consider a similar comparison with respect to before, but
we fine-tune the parameters of the two methods using a grid-search with a 3-fold crossvalidation on the training data as performance measure. Both λw and λq (only for the
3 http://learning.eng.cam.ac.uk/carl/code/minimize/
4 [The
URL has been hidden for the review process.]
8
Scardapane et al.
1
Spline value
Spline value
1
0
-1
-1
-2
0
Activation s
2
-2
0
Activation s
2
-2
0
Activation s
2
2
Spline value
2
Spline value
0
1
0
-1
1
0
-1
-2
0
Activation s
2
Fig. 1. Non-trivial representative SAFs after training for scenario 1.
Table 2. Optimal parameters (averaged over the runs) found by the grid-search procedure for
scenario 2.
Dataset
Nonlinearity λw
Chemical
Standard
SAF
10−3 —
10−2 10−4
Calhousing
Standard
SAF
10−4 —
10−3 10−4
λq
proposed algorithm) are searched in an exponential interval 2 j , with j = −10, . . . , 5.
Optimal parameters found by the grid-search are listed in Table 2, while results in terms
of training and test NRMSE are collected in Table 3.
Overall, we see that the NNs endowed with the SAF nonlinearities are able to surpass by a large margin a standard NN, and the results from the previous scenario. The
only minor drawback evidenced in Table 3 is that the SAF network has some overfitting
occurring in the ‘chemical’ dataset (around 2 points of NRMSE), showing that there is
still some room for improvement in terms of spline optimal regularization.
Also in this case, we plot some representatives SAFs after training (taken among
those which are not trivially identical to the tanh nonlinearity) in Fig. 2. As before, in
general SAFs tend to provide an amplification (with a possible change of sign) of their
activation around some region of operation. It is interesting to observe that, also in this
case, the optimal shape need not be symmetric (e.g. Fig. 2a), and might even be far
Learning activation functions from data
9
Table 3. Average results for scenario 2 (fine-tuning for parameters), together with one standard
deviation.
Dataset
Nonlinearity Tr. RMSE T.st NRMSE
Chemical
Standard
SAF
0.32 ± 0.01 0.32 ± 0.02
0.26 ± 0.01 0.28 ± 0.02
Calhousing
Standard
SAF
0.55 ± 0.01 0.55 ± 0.01
0.51 ± 0.02 0.51 ± 0.02
0
-1
0
-1
-2
0
Activation s
2
0
Activation s
2
-1
0
-1
-2
0
Activation s
2
-2
0
Activation s
2
-2
0
Activation s
2
2
Spline value
Spline value
1
0
0
-1
-2
1
Spline value
1
Spline value
1
Spline value
Spline value
1
1
0
-1
-2
0
Activation s
2
Fig. 2. Non-trivial representative SAFs after training for scenario 2.
from centered around 0 (e.g. Fig. 2c). Resulting nonlinearities can also present some
additional non-trivial behaviors, such as a small region of insensibility around 0 (e.g.
Fig. 2d), or a region of pre-saturation before the actual tanh saturation (e.g. Fig.s 2e-2f).
5
Conclusion
In this paper, we have presented a principled way to adapt the activation functions of a
neural network from training data, locally and independently for each neuron. Particularly, each nonlinearity is implemented with cubic spline interpolation, whose control
points are adapted in the optimization phase. Overfitting is controlled by a novel `2 regularization criterion avoiding unwanted oscillations. Albeit efficient, this criterion does
constrain the shapes of the resulting functions by a certain degree. In this sense, the design of more advanced regularization terms is a promising line of research. Additionally,
10
Scardapane et al.
we plan on exploring the application of SAFs to deeper networks, where it is expected
that the statistics of the neurons’ activations can change significantly layer-wise [4].
References
1. Agostinelli, F., Hoffman, M., Sadowski, P., Baldi, P.: Learning activation functions to improve deep neural networks. arXiv preprint arXiv:1412.6830 (2014)
2. Chandra, P., Singh, Y.: An activation function adapting training algorithm for sigmoidal feedforward networks. Neurocomputing 61, 429–437 (2004)
3. Chen, C.T., Chang, W.D.: A feedforward neural network with function shape autotuning.
Neural networks 9(4), 627–641 (1996)
4. Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Int. conf. on artificial intell. and stat. pp. 249–256 (2010)
5. Goh, S., Mandic, D.: Recurrent neural networks with trainable amplitude of activation functions. Neural Networks 16(8), 1095–1100 (2003)
6. Guarnieri, S., Piazza, F., Uncini, A.: Multilayer feedforward networks with adaptive spline
activation function. IEEE Trans. Neural Netw. 10(3), 672–683 (1999)
7. Haykin, S.: Neural networks and learning machines. Pearson Education, 3rd edn. (2009)
8. Kingma, D., Ba, J.: Adam: A method for stochastic optimization. In: 3rd International Conference for Learning Representations (2015), arXiv preprint arXiv:1412.6980
9. Lin, M., Chen, Q., Yan, S.: Network in network. arXiv preprint arXiv:1312.4400 (2013)
10. Ma, L., Khorasani, K.: Constructive feedforward neural networks using hermite polynomial
activation functions. IEEE Trans. Neural Netw. 16(4), 821–833 (2005)
11. Piazza, F., Uncini, A., Zenobi, M.: Artificial neural networks with adaptive polynomial activation function. In: Int. Joint Conf. on Neural Networks. vol. 2, pp. II–343. IEEE/INNS
(1992)
12. Rasmussen, C.: Gaussian processes for machine learning. MIT Press (2006)
13. Scarpiniti, M., Comminiello, D., Parisi, R., Uncini, A.: Nonlinear spline adaptive filtering.
Signal Process. 93(4), 772–783 (2013)
14. Scarpiniti, M., Comminiello, D., Scarano, G., Parisi, R., Uncini, A.: Steady-state performance of spline adaptive filters. IEEE Trans. Signal Process. 64(4), 816–828 (2016)
15. Schmidhuber, J.: Deep learning in neural networks: An overview. Neural Networks 61, 85–
117 (2015)
16. Trentin, E.: Networks with trainable amplitude of activation functions. Neural Networks
14(4), 471–493 (2001)
17. Vecci, L., Piazza, F., Uncini, A.: Learning and approximation capabilities of adaptive spline
activation function neural networks. Neural Networks 11(2), 259–270 (1998)
18. Wahba, G.: Spline models for observational data. Siam (1990)
19. Wang, Y., Shen, D., Teoh, E.: Lane detection using catmull-rom spline. In: IEEE Int. Conf.
on Intell. Vehicles. pp. 51–57 (1998)
20. Zhang, M., Xu, S., Fulcher, J.: Neuron-adaptive higher order neural-network models for
automated financial data modeling. IEEE Trans. Neural Netw. 13(1), 188–204 (2002)
| 9cs.NE
|
ON SELF-SIMILAR FINITE p-GROUPS
arXiv:1603.04879v1 [math.GR] 15 Mar 2016
AZAM BABAI, KHADIJEH FATHALIKHANI,
GUSTAVO A. FERNÁNDEZ-ALCOBER, AND MATTEO VANNACCI
Abstract. In this paper, we address the following question: when is a
finite p-group G self-similar, i.e. when can G be faithfully represented as
a self-similar group of automorphisms of the p-adic tree? We show that,
if G is a self-similar finite p-group of rank r, then its order is bounded
by a function of p and r. This applies in particular to finite p-groups of
a given coclass. In the particular case of groups of maximal class, that
is, of coclass 1, we can fully answer the question above: a p-group of
maximal class G is self-similar if and only if it contains an elementary
abelian maximal subgroup over which G splits. Furthermore, in that
case the order of G is at most p p+1 , and this bound is sharp.
1. Introduction
A lot of interest has been raised in the past decades around groups of automorphisms of rooted trees, since they provide many examples and counterexamples for significant problems in group theory. Prominent among
these examples are the groups constructed by Grigorchuk [6], and by Gupta
and Sidki [7], which act on the p-adic tree, i.e. a regular rooted tree with
p children at each vertex, where p is a prime number. One of the most
important properties of the Grigorchuk and Gupta-Sidki groups is the fact
that they are self-similar . In other words, for every automorphism g in such
a group G, and for every vertex u of the tree, the section gu also belongs to
G. (See the beginning of Section 2 for the definition of sections and other
relevant concepts from the theory of groups of automorphisms of rooted
trees.)
Given an abstract group G and a prime p, the question arises as to whether
or not G can be faithfully represented as a self-similar group of automorphisms of the p-adic tree. If the answer is positive, then we say that G is
self-similar for the prime p. Nekrashevych and Sidki [14] showed that free
abelian groups of finite rank are self-similar for the prime 2, a result which
can similarly be established for all primes [13, Section 2.9.2]. On the contrary, if a finitely generated nilpotent group G is self-similar for the prime p
and the corresponding action is transitive on the first level of the tree, then
G is either free abelian or a finite p-group, as proved by Berlatto and Sidki
2010 Mathematics Subject Classification. Primary 20E08.
Key words and phrases. finite p-groups, p-adic tree, self-similarity, virtual endomorphisms.
The second author is supported by the University of Kashan, under grant no.
364988/10. The third author is supported by the Spanish Government, grants MTM201128229-C02-02 and MTM2014-53810-C2-2-P, and by the Basque Government, grants
IT753-13 and IT974-16.
1
2 A. BABAI, KH. FATHALIKHANI, G.A. FERNÁNDEZ-ALCOBER, AND M. VANNACCI
in [1, Corollary 2]. Further results about self-similar general abelian groups
can be found in [2]; for example, abelian torsion groups of infinite exponent
are not self-similar with level-transitive action.
Not much is known about self-similarity of finite p-groups. We can mention the work of Šunić [16], who proved that a finite p-group is isomorphic
to a self-similar group of automorphisms of the p-adic tree with abelian first
level stabilizer (so in particular with an abelian maximal subgroup) if and
only if it is a split extension of an elementary abelian group by a cyclic
group of order p. Actually, as we show in Theorem 2.2, this characterization
extends to all finite p-groups with an abelian maximal subgroup, without
needing to specify any properties of its action on the tree. On the other
hand, since a direct power of a self-similar group is again self-similar [13,
Proposition 2.9.3], there are self-similar p-groups without abelian maximal
subgroups.
In this paper we show that self-similarity is a strong condition to impose
on a finite p-group. More specifically, in our first main theorem we prove
that, for every prime p, there are only finitely many self-similar p-groups
of a given rank. This should be compared with the fact that every finite
p-group can be faithfully represented as a group of automorphisms of the
p-adic tree, by using its action on the coset tree corresponding to a chief
series.
Theorem A. Let G be a finite self-similar p-group of rank r. Then the
order of G is bounded by a function of p and r.
As a consequence, the order of a self-similar p-group can be bounded in
terms of the prime p and its coclass. We can give more detailed information
in the case of finite p-groups of coclass 1, i.e. groups of maximal class. As a
matter of fact, in our second main theorem we fully characterize self-similar
p-groups of maximal class. Furthermore we obtain the best possible bound
for the order of such a group.
Theorem B. Let G be a finite p-group of maximal class. Then G is selfsimilar if and only if G possesses an elementary abelian maximal subgroup
over which G splits. If that is the case, then the order of G is at most p p+1 ,
and this bound is sharp.
Thus for groups of maximal class we get the same characterization obtained by Šunić, even if most groups of maximal class do not have abelian
maximal subgroups. Observe that Theorem B gives plenty of examples of
finite p-groups which are not self-similar; in this respect, see Sections 3.1
and 8.2 of the book [11] by Leedham-Green and McKay.
Notation. If G is a finitely generated group, we use d(G) to denote the
minimum number of generators of G. On the other hand, if G is a finite
p-group and i ≥ 0 is an integer, Ωi (G) is the subgroup generated by all
i
elements of G of order at most pi , and Gp is the subgroup generated by all
pi th powers of elements of G.
ON SELF-SIMILAR FINITE p-GROUPS
3
2. Preliminaries
We briefly recall some concepts about the theory of groups of automorphisms of regular rooted trees. Let X be a set of cardinality k. The k-adic
tree T is the graph whose vertices are the elements of the free monoid X ∗
generated by X, and v is a descendant of u if and only if v = ux for some
x ∈ X. The words in X ∗ of length n form the nth level of T . An automorphism g of T is a bijective map from X ∗ to itself that preserves incidence.
The section of g at a vertex u, which we denote by gu , is the automorphism
of T which is defined by the rule
g(uv) = g(u)gu (v),
for every v ∈ X ∗ .
The automorphisms of T form a group Aut T under composition. A subgroup G of Aut T is self-similar if gu ∈ G for every u ∈ X ∗ .
A virtual endomorphism of a group G is a homomorphism φ : H → G,
where H is a subgroup of G of finite index. If |G : H| = k then φ is said to be
a virtual k1 -endomorphism. Also, we say that φ is simple if the only subgroup
of H which is normal in G and φ-invariant (in the sense that φ(H) ⊆ H)
is the trivial subgroup. Every self-similar group G of automorphisms of the
k-adic tree T acting transitively on the first level defines a simple virtual
1
k -endomorphism, by taking H = StabG (x), where x ∈ X, and defining
φ : H → G by φ(h) = hx . The converse is also true: every simple virtual
1
k -endomorphism φ : H → G can be used to define a faithful action of G on
T that identifies G with a self-similar group acting transitively on the first
level, and in which H is the stabilizer of a letter of X. This is accomplished
by using a coset tree; see [12] and [13] for further details.
We are interested in the following question: if p is a prime, when can
a finite p-group G be faithfully represented as a self-similar group of automorphisms of the p-adic tree? One can easily see that a non-trivial finite
p-group with a self-similar action on the p-adic tree is transitive on the
first level. Thus, according to the previous paragraph, the question reduces
to this: given a finite p-group G, when does there exist a simple virtual
endomorphism φ : H → G for some maximal subgroup H of G?
As mentioned in the introduction, Šunić gave an answer to this question
when H is abelian, which corresponds to the action of G having an abelian
first-level stabilizer. In that case, there exists a simple virtual endomorphism
φ : H → G if and only if H is elementary abelian and G splits over H. Next
we want to show that Šunić’s result applies to all finite p-groups with an
abelian maximal subgroup, without any requirements about the action of
the group on the tree. We need the following lemma (see [9, Lemma 4.6 and
its proof]).
Lemma 2.1. Let G be a finite p-group with an abelian maximal subgroup
A. Then the following hold:
(i) For every g ∈ G r A, we have G′ = {[g, a] | a ∈ A}. Thus |G′ | =
|A : CA (g)|.
(ii) If G is not abelian, then |G : Z(G)| = p|G′ |.
4 A. BABAI, KH. FATHALIKHANI, G.A. FERNÁNDEZ-ALCOBER, AND M. VANNACCI
Theorem 2.2. Let G be a finite p-group with an abelian maximal subgroup.
Then G is self-similar if and only if G possesses an elementary abelian
maximal subgroup over which G splits.
Proof. By Šunić’s result, we only have to prove the ‘only if’ part. Assume
then that G is self-similar, and consider a simple virtual endomorphism
φ : H → G, where H is maximal in G. Again by Šunić’s theorem, it suffices
to prove that H is abelian. By way of contradiction, suppose that H is
not abelian. Let A be an abelian maximal subgroup of G, which exists by
hypothesis.
We first prove that φ is injective. If there exists x ∈ ker φ r A then, since
A ∩ H is an abelian maximal subgroup of H, we have H ′ = [x, A ∩ H] by
Lemma 2.1. Thus φ(H ′ ) = 1 and, since φ is simple, we have H ′ = 1. This
is contrary to our assumption. Thus ker φ ⊆ A and A normalizes ker φ. It
follows that ker φ E G, and consequently ker φ = 1, as desired.
Let g ∈ H r A, and observe that G′ = [g, G] by Lemma 2.1. If there exists
a ∈ CA (g) r H then G = haiH and G′ = [g, H]. Hence G′ = H ′ . Since
φ(H ′ ) ⊆ G′ , it follows that G′ = 1, which is a contradiction. Consequently
CA (g) ⊆ H, in other words, Z(G) ⊆ Z(H). Then, again by Lemma 2.1,
|G′ | = |A : CA (g)| = p|A ∩ H : CA (g)| = p|A ∩ H : CA∩H (g)| = p|H ′ |.
Since also |G : Z(G)| = p|G′ | and |H : Z(H)| = p|H ′ |, it follows that
Z(G) = Z(H). Now if we put K = φ(H) then φ−1 defines a simple virtual
1
p -endomorphism from K to G. Thus we also have Z(G) = Z(K). Then
φ(Z(G)) = φ(Z(H)) = Z(K) = Z(G),
which is impossible, since φ is simple. This final contradiction shows that
H must be abelian.
The last theorem naturally raises the following question: if G is a finite
p-group with an abelian maximal subgroup A, is it true that G is self-similar
if and only if A itself is elementary abelian and G splits over A? This is
equivalent to asking whether all abelian maximal subgroups of a self-similar
p-group are elementary abelian. As we next see, this question has a positive
answer for odd primes, but not for the prime 2.
Corollary 2.3. Let G be a finite p-group, where p is an odd prime. If G
has an abelian maximal subgroup A, then G is self-similar if and only if A
is elementary abelian and G splits over A.
Proof. By Theorem 2.2, there exists an elementary abelian maximal subgroup H over which G splits. Then A ∩ H ⊆ Z(G) and G has class at
most 2. Let hgi be a complement to H in G, and write g = ah with a ∈ A
and h ∈ H. Then a = gh−1 is of order p, since G is a regular p-group.
Consequently A = ha, A ∩ Hi is elementary abelian.
On the other hand, note that the dihedral group D8 is self-similar and
possesses a non-elementary abelian maximal subgroup.
ON SELF-SIMILAR FINITE p-GROUPS
5
3. Finite p-groups of a given rank
In this section we prove Theorem A, which shows that there are only
finitely many self-similar finite p-groups of a given rank. Recall that the
(Prüfer) rank of a finite group is the maximum of the values of d(H) as H
ranges over all subgroups of G. The proof of Theorem A relies on the theory
of powerful p-groups. A finite p-group G is called powerful if G′ ≤ Gp for
p > 2, or G′ ≤ G4 for p = 2. The main results about powerful p-groups can
be found in the books [3] and [10].
Given a finite group G, a tuple (a1 , . . . , ad ) is said to be a basis of G
if every g ∈ G can be uniquely written in the form g = an1 1 . . . and d with
0 ≤ ni < |ai | for i = 1, . . . , d. By [3, Chapter 2, Exercise 9], every powerful
p-group has bases. On the other hand, if G = hx1 , . . . , xr i is a powerful
p-group then G = hx1 i . . . hxr i (see [3, Corollary 2.8]). As a consequence, all
bases of G have d(G) elements, and the order of the elements in a basis of
G is irrelevant. In the remainder, when we consider a basis (a1 , . . . , ad ) of a
powerful p-group, we will always assume that |a1 | ≥ · · · ≥ |ad |.
As we next see, a basis of a powerful p-group G can be used to obtain the
subgroup Ω1 (G) if p is odd, and the same result is true for G2 if p = 2.
Lemma 3.1. Let G be a powerful p-group, and let N = G2 . If {a1 , . . . , ad }
is a basis of N , and |ai | = mi for every i = 1, . . . , d, then
mi /p
Ω1 (N ) = hai
| i = 1, . . . , di.
Proof. Since N is powerful and d = d(N ), we have |N : N p | = |N : Φ(N )| =
pd . It follows that |Ω1 (N )| = pd , by [5, Theorem 1]. On the other hand,
since {a1 , . . . , ad } is a basis of N , the subgroup
mi /p
hai
| i = 1, . . . , di
of Ω1 (N ) has cardinality at least pd . This completes the proof.
Of course, G2 coincides with G if p is odd, and stating the last lemma for
is only a trick to avoid a case distinction according as p is odd or p = 2.
G2
We can now prove Theorem A. We use the expression ‘(p, r)-bounded’ as
shorthand for ‘bounded above by a function of p and r’.
Theorem 3.2. Let G be a self-similar finite p-group of rank r. Then the
order of G is (p, r)-bounded.
Proof. Let φ : H → G be a simple virtual endomorphism from a maximal
subgroup H of G. By Proposition 2.12 and Theorem 2.13 of [3], there exists a
normal subgroup P of G of (p, r)-bounded index with the property that every
subgroup of P which is normal in G is powerful. If we put N = (P ∩ H)2 ,
then N has also (p, r)-bounded index in G, and it suffices to show that N
has (p, r)-bounded order.
Let us consider a basis (a1 , . . . , ad ) of the powerful group N , and observe
that d = d(N ) ≤ r. Set |ai | = mi for i = 1, . . . , d, and md+1 = 1. If e denotes
the exponent of G/N , we claim that mi ≤ emi+1 for every i = 1, . . . , d. By
way of contradiction, assume that mj > emj+1 for some j, and for simplicity,
put m = mj+1 . Now, we have
(1)
φ(Ω1 (N em )) ⊆ Ω1 (Gem ) ⊆ Ω1 (N m ),
6 A. BABAI, KH. FATHALIKHANI, G.A. FERNÁNDEZ-ALCOBER, AND M. VANNACCI
since Ge ⊆ N . On the other hand, by [3, Theorem 2.7],
m
m
m
N m = ham
1 i . . . had i = ha1 i . . . haj i,
m
m
and (am
1 , . . . , aj ) is a basis of N . Since |ai | > em for i = 1, . . . , j, we
em
em
similarly obtain that (a1 , . . . , aj ) is a basis of N em . By Lemma 3.1,
m /p
mj /p
Ω1 (N m ) = ha1 1 , . . . , aj
i = Ω1 (N em ).
Thus, by (1), we get φ(Ω1 (N em )) ⊆ Ω1 (N em ). Since φ is simple, this implies
that Ω1 (N em ) = 1. This contradiction proves the claim. It follows that
mi ≤ ed−i+1 for all i = 1, . . . , d, and consequently
|N | = m1 . . . md ≤ ed(d+1)/2 .
Since d ≤ r and e is (p, r)-bounded, we conclude that the order of N is
(p, r)-bounded, as desired.
Corollary 3.3. Let G be a self-similar finite p-group of coclass s. Then the
order of G is (p, s)-bounded.
Proof. According to [15, Theorems 1.2 and 1.5], G contains a powerful characteristic subgroup N with (p, s)-bounded index and at most ps+1 generators. Thus rk(N ) ≤ ps+1 , by [3, Theorem 2.9]. Consequently G has (p, s)bounded rank, and the result follows from Theorem 3.2.
Corollary 3.4. Let G be a self-similar finite d-generator p-group of class
c. Then the order of G is (p, d, c)-bounded.
Proof. This follows immediately from Theorem 3.2, since the rank of a dgenerator nilpotent group of class c is (d, c)-bounded.
Of course, the number d of generators is necessary in the bound of the
previous corollary, since elementary abelian p-groups are all self-similar.
The following result, whose proof is contained in the proof of Theorem
3.2, may be of independent interest.
Proposition 3.5. Let G be a self-similar finite p-group, and let φ : H → G
be a simple virtual endomorphism, with H maximal in G. If U ⊆ H is a
uniform normal subgroup of G then exp(U ) ≤ exp(G/U ) if p is odd, and
exp(U ) ≤ 4 exp(G/U ) if p = 2.
Proof. Put N = U 2 , and use the same notation as in the proof of Theorem
3.2. Since N is uniform, we have exp(N ) = md , and on the other hand,
md ≤ exp(G/N ) by the proof of Theorem 3.2. Thus exp(N ) ≤ exp(G/N ),
and the result follows.
4. p-groups of maximal class
In this final section, we deal with finite p-groups of coclass 1, also known
as p-groups of maximal class. We prove Theorem B, which gives a full
characterization of self-similar p-groups of maximal class and determines the
best bound for the order of a self-similar p-group of maximal class. Observe
that, by Theorem 2.2, we need only consider p-groups of maximal class of
order at least p4 .
ON SELF-SIMILAR FINITE p-GROUPS
7
Before proceeding, we need to introduce some concepts and results from
the theory of groups of maximal class, for which we refer the reader to [4]
and [8, Chapter III, Section 14]. A p-group G of order pn with n ≥ 2 is said
to be of maximal class if its nilpotency class is n − 1. If we put Gi = γi (G)
for every i ≥ 2, this means that |G : G2 | = p2 and |Gi : Gi+1 | = p for every
i = 2, . . . , n − 1. The upper central series of a p-group of maximal class
coincides with its lower central series; in particular, Z(G) is of order p for
n ≥ 3. Actually, it is easy to describe all normal subgroups of G: we only
have to add the p + 1 maximal subgroups to the terms of the lower central
series of G.
For a group of maximal class G of order pn ≥ p4 , we put G1 = CG (G2 /G4 ),
so that |G : G1 | = |G1 : G2 | = p. Then the largest integer ℓ ∈ {0, . . . , n − 3}
such that [Gi , Gj ] ≤ Gi+j+ℓ for all i, j ≥ 1 is called the degree of commutativity of G, and we write ℓ = ℓ(G). A fundamental fact in the theory
of p-groups of maximal class is that ℓ(G/Z(G)) ≥ 1 for all n ≥ 5. As a
consequence, all the so-called two-step centralizers CG (Gi /Gi+2 ) (which are
maximal subgrups of G) coincide with G1 for i = 2, . . . , n − 3, and the remaining two-step centralizer, i.e. CG (Gn−2 ), is equal to G1 if and only if
ℓ(G) ≥ 1. Another key result that we will need is that a finite p-group is
of maximal class if and only if it contains an element s whose centralizer is
of order p2 . The elements satisfying this property are exactly the elements
in the difference G r (G1 ∪ CG (Gn−2 )), and they are called uniform elements of G. If s is a uniform element, then the order of s is p or p2 , and
sp ∈ Z(G). Also, for every 1 ≤ i ≤ n − 2, if x ∈ Gi r Gi+1 then we have
[x, s] ∈ Gi+1 r Gi+2 .
Our analysis of the representation of a p-group of maximal class G as a
self-similar group of automorphisms of the p-adic tree requires a thorough
understanding of the subgroups of G which contain a uniform element. Certainly, these groups are of maximal class again, but much more can be said.
We need the following straightforward lemma.
Lemma 4.1. Let G be a p-group of maximal class of order pn ≥ p4 , and let
K be a subgroup of G which contains a uniform element. If there exists an
element x of K lying in the difference Gt \ Gt+1 , then Gt ≤ K.
Proof. If s ∈ K is a uniform element of G, then [x, s] ∈ Gt+1 \Gt+2 , [x, s, s] ∈
Gt+2 \ Gt+3 , and so on until we get an element in Gn−1 r Gn . Since all these
elements lie in K, we conclude that Gt ≤ K.
Proposition 4.2. Let G be a p-group of maximal class of order pn ≥ p4 ,
and let K be a subgroup of G which contains a uniform element s. If the
order of K is pn−t , then K = hs, Gt+1 i.
Proof. Since G = hsiG1 and s ∈ K, we have K = hsi(K ∩G1 ), by Dedekind’s
law. Hence K ∩ G1 is of order pn−t−1 . The result is obvious for t = n − 1,
so we assume that t ≤ n − 2. Then K ∩ G1 6= 1, and so we can consider
j = min{i | 1 ≤ i ≤ n − 1, K ∩ (Gi r Gi+1 ) 6= ∅}.
Now it is clear from Lemma 4.1 that K ∩ G1 = Gj . Since |Gj | = pn−j , we
conclude that j = t + 1. Thus K = hs, Gt+1 i, as desired.
8 A. BABAI, KH. FATHALIKHANI, G.A. FERNÁNDEZ-ALCOBER, AND M. VANNACCI
Proposition 4.3. Let G be a p-group of maximal class of order at least p4 ,
and let H be a maximal subgroup of G different from G1 . Then, there is no
simple virtual endomorphism from H to G.
Proof. First of all, we observe that H ′ = [H, G2 ], since H/G2 is cyclic. The
commutator [H, G2 ] is a normal subgroup of G which is strictly contained in
G2 , so it must coincide with Gi for some i ≥ 3. Now [H, G2 ] is not contained
in G4 , since otherwise H = G1 . Hence [H, G2 ] = G3 .
By way of contradiction, let us assume that φ : H → G is a simple virtual
endomorphism. Then φ(H) is a proper subgroup of G, and we can consider
a maximal subgroup M of G containing φ(H). Now we have
φ(H ′ ) = φ(H)′ ≤ M ′ = [M, G2 ] ≤ G3 = H ′ ,
which is impossible, since φ is simple and H ′ 6= 1.
At this moment, we can prove the second part of Theorem B, namely the
bound for the order of a self-similar p-group of maximal class. This bound is
sharp, since the wreath product Cp ≀ Cp is a self-similar p-group of maximal
class of order p p+1 .
Corollary 4.4. Let G be a p-group of maximal class. If G is self-similar
then |G| ≤ p p+1 .
Proof. Assume that |G| > p p+1 . By Theorem 4.9 of [4], we have Gp1 = Gp .
Since sp ∈ Z(G) for every s ∈ G r G1 , it follows that Gp = Gp1 6= 1. Now let
φ : H → G be a simple 1p -endomorphism of G, and observe that H = G1 by
Proposition 4.3. Then φ(Gp ) = φ(Gp1 ) ⊆ Gp , which is a contradiction, since
φ is simple.
The following result completes the proof of Theorem B.
Theorem 4.5. Let G be a p-group of maximal class of order at least p4 .
Then G is self-similar if and only if G1 is elementary abelian, and G is a
split extension over G1 .
Proof. By Šunić’s result, we only need to prove the ‘only if’ part of the
statement of the theorem. So assume that G is self-similar, and let φ : H →
G be a simple virtual endomorphism, where H is a maximal subgroup of G.
By Proposition 4.3, H must be G1 .
Let G be of order pn , and suppose first that ℓ(G) ≥ 1. Since φ is simple,
it follows that φ(G1 ) * G1 . If s ∈ φ(G1 ) r G1 , then s is a uniform element
of G, since CG (Gn−2 ) = G1 in this case. Consequently, by Proposition 4.2,
we have φ(G1 ) = hs, Gt+1 i, for some integer t. If |φ(G1 )| ≥ p3 , then the
centre of φ(G1 ) is of order p, since this group is also of maximal class. As a
consequence, we get Z(φ(G1 )) = Z(G). On the other hand, since Z(G1 ) is
a normal subgroup of G, it follows that Z(G) ≤ Z(G1 ). Consequently,
φ(Z(G1 )) ≤ Z(φ(G1 )) = Z(G) ≤ Z(G1 ),
which is a contradiction, since φ is simple. Thus |φ(G1 )| = p or p2 , and then
φ(G′1 ) = φ(G1 )′ = 1. Since φ is simple, this implies that G1 is abelian. By
Šunić’s result, we know that G1 is elementary abelian and G splits over G1 ,
as desired.
ON SELF-SIMILAR FINITE p-GROUPS
9
Assume now that ℓ(G) = 0. Since Z(G1 ) is normal in G, we must have
Z(G1 ) = Gi for some i. But we have [G1 , Gn−2 ] 6= 1, since G1 6= CG (Gn−2 )
in this case. Thus Z(G1 ) = Gn−1 is of order p. If φ is not injective, then
Z(G1 ) ≤ ker φ. Therefore, φ(Z(G1 )) = 1, which is a contradiction, since
φ is simple. On the other hand, if φ is injective, then φ(G1 ) is a maximal
subgroup of G. Since G′1 = [G1 , G2 ] ≤ G4 , we have |G1 : G′1 | ≥ p3 , and
G1 is not of maximal class. So neither φ(G1 ) is of maximal class. But
we know that all maximal subgroups of G other than G1 and CG (Gn−2 )
are of maximal class, and also φ(G1 ) 6= G1 , since φ is simple. Thus we
necessarily have φ(G1 ) = CG (Gn−2 ). This implies that G1 and CG (Gn−2 )
are isomorphic, but notice that |Z(G1 )| = p, while Z(CG (Gn−2 )) contains
Gn−2 , which is of order p2 . This contradiction shows that we cannot have
ℓ(G) = 0, which completes the proof of the theorem.
If G is a p-group of maximal class with G1 elementary abelian, one cannot guarantee that G is a self-similar p-group. Indeed, it may perfectly
happen that all elements in G r G1 (i.e. all uniform elements) are of order
p2 . However, we have the following result.
Corollary 4.6. Let G be a p-group of maximal class of order at most p p+1
in which G1 is abelian. Then G/Z(G) is a self-similar p-group.
Proof. This is an immediate consequence of Theorem 4.5, since by Theorem
4.7 of [4] the quotient group G/Z(G) is of exponent p.
Acknowledgment. We thank Prof. Said Sidki for helpful comments.
References
[1] A. Berlatto, S. Sidki, Virtual endomorphisms of nilpotent groups, Groups Geom. Dyn.
1 (2007), 21–46.
[2] A.M. Brunner, S.N. Sidki, Abelian state-closed subgroups of automorphisms of m-ary
trees, Groups Geom. Dyn. 4 (2010), 455–472.
[3] J.D. Dixon, M.P.F. du Sautoy, A. Mann, D. Segal, Analytic pro-p groups, second edition, Cambridge Studies in Advanced Mathematics 61, Cambridge University Press,
1999.
[4] G.A. Fernández-Alcober, An introduction to finite p-groups: regular p-groups and
groups of maximal class, Mat. Contemp. 20 (2001), 155–226.
[5] G.A. Fernández-Alcober, Omega subgroups of powerful p-groups, Israel J. Math. 162
(2007), 75–79.
[6] R.I. Grigorchuk, On Burnside’s problem on periodic groups, Functional Anal. Appl.
14 (1980), 41–43.
[7] N. Gupta, S. Sidki, On the Burnside problem for periodic groups, Math. Z. 182
(1983), 385–388.
[8] B. Huppert, Endliche Gruppen, I , Grundlehren der mathematischen Wissenschaften
134, Springer, 1967.
[9] I.M. Isaacs, Finite Group Theory, Graduate Studies in Mathematics 92, American
Mathematical Society, 2008.
[10] E.I. Khukhro, p-Automorphisms of finite p-groups, London Mathematical Society
Lecture Note Series 246, Cambridge University Press, 1997.
[11] C.R. Leedham-Green, S. McKay, The Structure of Groups of Prime Power Order ,
London Mathematical Society Monographs New Series 27, Oxford University Press,
2002.
[12] V. Nekrashevych, Virtual endomorphisms of groups, Algebra Discrete Math. 1 (2002),
88–128.
10 A. BABAI, KH. FATHALIKHANI, G.A. FERNÁNDEZ-ALCOBER, AND M. VANNACCI
[13] V. Nekrashevych, Self-similar groups, Mathematical Surveys and Monographs 117,
American Mathematical Society, 2005.
[14] V. Nekrashevych, S. Sidki, Automorphisms of the binary tree: state-closed subgroups
and dynamics of 1/2-endomorphisms, in Groups: Topological, Combinatorial and
Arithmetic Aspects, London Mathematical Society Lecture Note Series 311, Cambridge University Press, 2004, 375–404.
[15] A. Shalev, The structure of finite p-groups: effective proof of the coclass conjectures,
Invent. Math. 115 (194), 315–345.
[16] Z. Šunić, Finite self-similar p-groups with abelian first-level stabilizer, Internat. J.
Algebra Comput. 21 (2011), 355–364.
Department of Mathematics, University of Qom, Qom, Iran
E-mail address: a [email protected]
Department of Pure Mathematics, Faculty of Mathematical Sciences, University of Kashan, Kashan 87317-51167, Iran
E-mail address: [email protected]
Department of Mathematics, University of the Basque Country UPV/EHU,
48080 Bilbao, Spain
E-mail address: [email protected]
Mathematisches Institut der Heinrich-Heine-Universität, Universitätsstr. 1,
40225 Düsseldorf, Germany
E-mail address: [email protected]
| 4math.GR
|
arXiv:1708.09047v1 [math.GR] 29 Aug 2017
Computable groups which do not embed into
groups with decidable conjugacy problem
Arman Darbinyan
1
Abstract
We show the existence of finitely generated torsion-free groups with decidable
word problem that cannot be embedded into groups with decidable conjugacy
problem. This answers a well-known question of Collins from the early 1970’s.
2
Introduction
Two of the most central decision problems associated with finitely generated
groups are word and conjugacy problems. One of the important questions about
these problems is concerning about the relation between them. For example, if
the conjugacy problem is decidable for a finitely generated group G, then the
word problem is decidable as well. However, in general, the inverse is far from
being true, [16, 6, 17, 15, 8].
If G is a finitely generated group and H ≤ G is a subgroup of finite index,
then the word problem in G is decidable if and only if it is decidable for H.
However, it is shown by Goryaga-Kirkinskii, [10], and independently by CollinsMiller, [7], that subgroups of index 2 of some specific finitely generated groups
have decidable (respectively, undecidable) conjugacy problem, while the groups
themselves have undecidable (respectively, decidable) conjugacy problem.
Another important type of questions about word and conjugacy problems
in groups is the following: Is it true that every finitely generated group with
decidable word problem (respectively, conjugacy problem) embeds in a finitely
presented group with decidable word problem (respectively, conjugacy problem)? Both of these questions have positive answer. The answer for the word
problem is obtained by Clapham in 1967, [5], based on the classical embedding
theorem of Higman (see [13]), while the analogous question for the conjugacy
problem was a long-standing open problem until it got positive answer in 2004
by a work of Olshanskii and Sapir. See [18] and also [19].
In light of the aforementioned, a natural question about the connection of
word and conjugacy problems in groups is the following question, asked by
1
Donald Collins in the early 1970s.
Question 1. Can every torsion-free group with solvable word problem
be embedded in a group with solvable conjugacy problem?
This question appears in the 1976 edition of The Kourovka Notebook as Problem 5.21, [12]. Probably, the first source where this problem was posed in a
written form is [3]. For yet another source, see [2].
It was mentioned by Collins in [12] that due to an example by A. Macintyre, there exists a group with torsions which cannot be embedded into a
finitely generated group with decidable conjugacy problem. However, the case
for torsion-free groups remained open until now. Indeed, one of the reasons
why the torsion and torsion-free cases are different is based on the observation
that conjugate elements in a group must have the same order, and since in a
torsion-free group all non trivial elements have the same (infinite) order, one
cannot make use of this observation in order to answer Question 1.
In [19], Olshanskii and Sapir showed the following theorem which gives a
positive answer to Question 1 under the stronger assumption of decidability of
the power problem.
Theorem 1 (Olshanskii-Sapir, [19]). Every countable group with solvable power
and order problems is embeddable into a 2-generated finitely presented group with
solvable conjugacy and power problems.
Note that as it is defined in [19], for a given group G the power problem is
said to be decidable, if there exists an algorithm which for any given pair (g, h)
of elements from G decides whether or not g is equal to some power of h in G.
The order problem is decidable in G if there exists an algorithm which for each
input g ∈ G computes the order of g.
The main result of the current work is the negative answer to Question 1 in
the general case.
Theorem 2. There exists a finitely presented torsion-free group G with decidable word problem such that G cannot be embedded into a group with decidable
conjugacy problem.
A remarkable theorem of Osin (see [20]) says that every torsion-free countable group can be embedded into a two generated group with exactly two conjugacy classes. In the context of this theorem, it is very natural to ask whether
or not every torsion-free countable group with decidable word problem (= computable group) can be embedded into a group with exactly two conjugacy classes
and with decidable word problem. A more relaxed version of this question would
be whether or not every torsion-free countable group with decidable word problem can be embedded in a finitely generated recursively presented group with
finitely many conjugacy classes.
It turns out that a direct consequence of Theorem 2 gives negative answer
to both of these questions.
2
In fact, the decidability of the conjugacy problem for groups with exactly two
conjugacy classes is equivalent to the decidability of the word problem. Even
more, as it is shown in a recent paper of Miasnikov and Schupp [15], a finitely
generated recursively presented group with finitely many conjugacy classes has
decidable conjugacy problem. Therefore, a direct corollary from Theorem 2 is
the following.
Theorem 3. There exists a torsion-free finitely presented group with decidable word problem that cannot be embedded into a finitely generated recursively
presented group with finitely many conjugacy classes.
Proof. Just take the group G from Theorem 2.
Remark 1. In fact, the mentioned result of Miasnikov and Schupp is true not
only for finitely generated recursively presented groups, but for all recursively
presented groups in general. Therefore, Theorem 3 stays true after dropping
the assumption that the group in which the initial group is embedded is finitely
generated. (The exact definition of recursive presentations of groups is given in
the next section.)
Acknowledgements. I would like to thank Alexander Olshanskii for his
thoughtful comments on this work.
3
3.1
Preliminaries
Groups with decidable word problem
A countable group G is said to have recursive presentation, if G can be presented
as G = hX | Ri such that X and R are enumerable by some algorithm (i.e.
Turing machine). See [11]. If in addition, there is an algorithm which for
each pair of words (w, w′ ) from (X ∪ X −1 )∗ verifies whether or not w and w′
represent the same element of G, then the presentation G = hX | Ri is called
computable and in case G possesses such a presentation, the group G itself is
called computable as well. Modulo some slight variances, the original definition
of the concept of computable groups is due to Rabin [21] and Mal’cev [14].
In case the group G is finitely generated (i.e. |X| < ∞) computability property of G is the same as saying that G has decidable word problem. It is not
hard to notice that decidability of the word problem does not depend on the
finite generating sets. From the computability perspective, the last observation
is one of the main advantages of finitely generated groups over countably generated ones, because in case of finitely generated groups decidability of the word
problem is an intrinsic property of a group, rather than of its presentation.
However, in this paper, to keep the notations as uniform as possible, we say
that G has decidable word problem if it is given by a computable presentation.
3
Let G = hx1 , x2 , . . . | r1 , r2 , . . .i, where {x1 , x2 , . . .} and {r1 , r2 , . . .} are
recursive enumerations of X and R, respectively. Then, the embedding constructions of [9] and [19] imply the following theorem.
Theorem 4. If G = hx1 , x2 , . . . | r1 , r2 , . . .i has decidable word problem, then
there exists an embedding Φ : G → H of G into a two generated group H such
that the following holds.
(1). The word problem is decidable in H;
(2). The map i 7→ Φ(xi ) is computable;
(3). An element of H is of finite order if and only if it is conjugate to an image
under Φ of an element of finite order in G.
3.2
HNN-extensions
In the proof of the existence of the group G from Theorem 2 we use some
group theoretical constructions based on HNN-extensions. Therefore, in this
subsection we would like to recall some well-known basic facts about HNNextensions. The basics of the theory of HNN-extensions can also be found in
[13].
Suppose that A, B ≤ H and φ : A → B is a group isomorphism from A to
B. Then the HNN-extension H ′ of H with respect to A and B (and φ) and
with stable letter t is defined as
H ′ = hH, t | t−1 at = φ(a), a ∈ Ai.
In the current text, the isomorphism φ will be clear from the context, hence
we will simply use the notation H ′ = hH, t | t−1 At = Bi.
Clearly, every element h′ of H ′ can be decomposed as a product
h ′ = h 0 tǫ 1 h 1 . . . t ǫ n h n ,
(1)
where ǫi ∈ {±1}, hj ∈ H for 1 ≤ i ≤ n, 0 ≤ j ≤ n.
The decomposition (1) is said to be in reduced form, if it does not contain
subproduct of one of the forms t−1 gi t, gi ∈ A or tgi t−1 , gi ∈ B, for 1 ≤ i ≤ n.
Analogously, if H = hXi, then the word u′ ∈ (X ∪ X −1 ∪ {t±1 })∗ given by
u ′ = u 0 tǫ 1 u 1 tǫ 2 . . . t ǫ n u n ,
where ǫi ∈ {±1}, uj ∈ (X ∪ X −1 )∗ , is said to be a reduced word with respect to
the HNN-extension H ′ if the decomposition h0 tǫ1 h1 . . . tǫn hn is in reduced form,
where hi corresponds to the word ui in H.
The following well-known lemma is attributed to Britton in [13].
Lemma 1 (Britton’s Lemma). If the decomposition (1) is reduced and n ≥ 1,
then h′ 6= 1 in H ′ .
4
Lemma 2 (See Theorem 2.1 in [13]). Let H ′ = hH, t | t−1 At = Bi be an HNNextension with respect to isomorphic subgroups A and B. Then H embeds in H ′
by the maps h 7→ h, h ∈ H.
Lemma 3 (The Torsion Theorem for HNN-extensions. See Theorem 2.4 in
[13]). Let H ′ = hH, t | t−1 At = Bi be an HNN-extension. Then every element
of finite order in H ′ is a conjugate of an element of finite order in the base H.
Thus H ′ has elements of finite order n if an only if H has elements of order n.
4
Proof of Theorem 2
In order to show the existence of G from Theorem 2, first, we will construct a
special countable group Ġ with decidable word problem, then G will be defined
as a group in which Ġ embeds in a certain way.
Two disjoint sets of natural numbers S1 , S2 ⊂ N are called recursively inseparable if there is no recursive set T ⊂ N such that S1 ⊆ T and S2 ⊆ N \ T . The
set T is called separating set. Clearly, if two disjoint sets are recursively inseparable, then they cannot be recursive. Indeed, if, say, S1 and S2 are disjoint and,
say, S1 is recursive, then as a recursive separating set one could simply take
S1 . Nevertheless, it is a well-known fact that there exist disjoint recursively
enumerable and recursively inseparable sets. See, for example, [22].
Let us fix two disjoint recursively enumerable and recursively inseparable
sets N = {n1 , n2 , . . .} ⊂ N and M = {m1 , m2 , . . .} ⊂ N such that the maps
i 7→ ni and i 7→ mi are computable.
Now, for all n ∈ N, define An as a torsion-free abelian additive group of rank
two with basis {an,0 , an,1 }, i.e.
An = han,0 i ⊕ han,1 i
and such that the groups A1 , A2 , . . . are disjoint.
For all n ∈ N, define the groups Ȧn as follows.
if n ∈
/ N ∪M ,
An
Ȧn =
An / ≪ an,1 = 2i an,0 ≫ if n = ni ∈ N ,
An / ≪ an,1 = 3i an,0 ≫ if n = mi ∈ M.
For all n ∈ N and m ∈ {0, 1}, let us denote the images of an,m under the
natural homomorphisms An → Ȧn by ȧn,m .
Convention. In this text, whenever we deal with an additive group, say, A,
∗
with finite generating set, say, {a1 , . . . , ak }, by
P {±a1 , . . . , ±ak } we denote the
set of formal finite sums of the form w =
λi aji , where λi ∈ Z and aji ∈
5
{a1 , . . . , ak }, and we say that w is a word formed by letters {±a1 , . . . , ±ak }.
Note that this is the additive analogue of the central in combinatorial group
theory concept of words, where the alphabet composing P
the words is a set of
group generators. This is why the finite formal sums w = λi aji we call words
from {±a1 , . . . , ±ak }∗ .
Before moving forward, we prove the following important lemma.
Lemma 4. There exists an algorithm such that for each input n ∈ N and
w ∈ {±ȧn,0 , ±ȧn,1 }∗ , it decides whether or not w represents the trivial element
in the group Ȧn .
Proof. Indeed, since Ȧn is abelian with generating set {ȧn,0 , ȧn,1 }, each word w
from {±ȧn,0 , ±ȧn,1 }∗ can be effectively transformed to a word of the form
w′ = λ0 ȧn,0 + λ1 ȧn,1
which represents the same element in Ȧn as the initial word w, where λ0 , λ1 ∈ Z.
Now, assuming that λ0 6= 0, λ1 6= 0, in order w′ to represent the trivial
element in Ȧn it must be that n ∈ N ∪ M, because otherwise, by definition, the
group Ȧn is torsion-free abelian of rank 2 with basis {ȧn,0 , ȧn,1 }.
In case n ∈ N , by definition we have that ȧn,1 = 2x ȧn,0 , where x is the index
of n in N , i.e. n = nx .
Similarly, in case n ∈ M, by definition we have that ȧn,1 = 3x ȧn,0 , where x
is the index of n in M, i.e. n = mx .
Now, if λ0 = 0 and λ1 = 0, then clearly w′ (hence also w) represents the
trivial element in Ȧn . Therefore, without loss of generality we can assume that
at least one of λ0 and λ1 is not 0. Then, if we treat x as an unknown variable,
depending on whether n = nx or n = mx , the equality w′ = 0 would imply one
of the following equations:
λ0 + λ1 2x = 0
(2)
λ0 + λ1 3x = 0,
(3)
or
respectively.
This observation suggests that in case λ0 6= 0 or λ1 6= 0, in order to verify
whether or not w′ = 0 in Ȧn , we can first try to find x satisfying (2) or (3),
and in case such an x does not exist, conclude that w′ (hence, also w) does not
represent the trivial element in Ȧn . Otherwise, if x is the root of the equation
(2), we can check whether or not n = nx (since N is recursively enumerable,
this checking can be done algorithmically). Similarly, if x is the root of the
equation (3), we can check whether or not n = mx .
If as a result of this checking, we get n = nx (respectively, n = mx ), then
the conclusion will be that w′ (hence, also w) represents the trivial element in
6
Ȧn , otherwise, if n 6= nx (respectively, n 6= mx ), then the conclusion will be
that w′ (hence, also w) does not represent the trivial element in Ȧn .
Now, for all n ∈ N, define the group Bn as a torsion-free additive abelian
group of rank 2, that is
Bn = hbn,0 i ⊕ hbn,1 i
such that B1 , B2 , . . . are disjoint.
Now, for all n ∈ N, define the groups Ḃn as follows.
Bn
if n ∈
/ N ∪M ,
Ḃn =
Bn / ≪ bn,1 = 2i bn,0 ≫ if n = ni ∈ N or n = mi ∈ M.
For all n ∈ N, m ∈ {0, 1}, let us denote the images of bn,m under the natural
homomorphism Bn → Ḃn by ḃn,m .
It follows from the definitions of Ȧn and Ḃn that for all n ∈ N, these groups
are infinite and torsion free.
Lemma 5. There exists an algorithm such that for each input n ∈ N and
w ∈ {±ḃn,0 , ±ḃn,1 }∗ , it decides whether or not w represents the trivial element
in the group Ḃn .
Proof. Follows from the repetition of arguments of the proof of Lemma 4.
Lemma 6. The map ȧn,0 7→ ḃn,0 , ȧn,1 7→ ḃn,1 induces a group isomorphism
between the groups hȧn,0 , ȧn,1 i = Ȧn and hḃn,0 , ḃn,1 i = Ḃn if and only if n ∈
N \ M.
Proof. Indeed, in case n ∈ N , by definition, hȧn,0 , ȧn,1 i = hȧn,0 i and ȧn,1 =
2i ȧn,0 , where i is the index of n in N . Also hḃn,0 , ḃn,1 i = hḃn,0 i and ḃn,1 = 2i ḃn,0 .
Therefore, in case n ∈ N , the map ȧn,0 7→ ḃn,0 , ȧn,1 7→ ḃn,1 induces a group
isomorphism between the groups hȧn,0 , ȧn,1 i and hḃn,0 , ḃn,1 i.
In case n ∈ N \ (N ∪ M), the groups Ȧn and Ḃn are torsion-free and abelian
of rank 2 with generating sets {ȧn,0 , ȧn,1 } and {ḃn,0 , ḃn,1 }, respectively. Therefore, if n ∈ N \ (N ∪ M), the map ȧn,0 7→ ḃn,0 , ȧn,1 7→ ḃn,1 induces a group
isomorphism between the groups hȧn,0 , ȧn,1 i and hḃn,0 , ḃn,1 i as well.
Now suppose that n ∈ M. Then, hȧn,0 , ȧn,1 i = hȧn,0 i and hḃn,0 , ḃn,1 i =
hḃn,0 i, however, by definition, ȧn,1 = 3i ȧn,0 while ḃn,1 = 2i ḃn,0 . Therefore, the
map ȧn,0 7→ ḃn,0 , ȧn,1 7→ ḃn,1 does not induce a group isomorphism between the
groups hȧn,0 , ȧn,1 i and hḃn,0 , ḃn,1 i when n ∈ M.
7
Now, let T = F (t1 , t2 , . . .) be a free group with countable free basis {t1 , t2 , . . .}.
Denote the infinite free products Ȧ1 ∗ Ȧ1 ∗ . . . and Ḃ1 ∗ Ḃ1 ∗ . . . by ∗∞
n=1 Ȧn
and ∗∞
Ḃ
,
respectively.
Then
define
n=1 n
∞
Ġ = (∗∞
n=1 Ȧn ) ∗ (∗n=1 Ḃn ) ∗ T / ≪ R ≫,
(4)
where the set of defining relators R is defined as
R = t−1
i ȧni ,0 ti = ḃni ,0 | i ∈ N .
Define
∞
Ġ0 = (∗∞
n=1 Ȧn ) ∗ (∗n=1 Ḃn ),
and for all k ∈ N, define Ġk as
∞
Ġk = (∗∞
n=1 Ȧn ) ∗ (∗n=1 Ḃn ) ∗ F (t1 , . . . , tk )/ ≪ Rk ≫,
where the set of defining relators Rk is defined as
Rk = t−1
i ȧni ,0 ti = ḃni ,0 | 1 ≤ i ≤ k .
Then, clearly the group Ġ is the direct limit of the sequence of group {Ġk }∞
k=0
connected by homomorphisms ǫk : Ġk → Ġk+1
such that ǫk are the homomorphisms induced by the identity maps from ȧn,0 , ȧn,1 , ḃn,0 , ḃn,1 , ti | n ∈ N, i ∈
{1, 2, . . . , k} to themselfs for all k ∈ N.
Let us denote
S0 = ± ȧn,m , ± ḃn,m | n ∈ N, m ∈ {0, 1}
and for k ∈ N,
Sk =
±1
± ȧn,m , ± ḃn,m , t±1
| n ∈ N, m ∈ {0, 1} .
1 , . . . , tk
Note that since the sets N and M are recursively enumerable, the groups
Ġ and Ġk have recursive presentations with respect to the generating sets
S0 ∪ {t1 , t2 , . . .} and Sk , k ∈ N ∪ {0}, respectively.
Lemma 7. There exists an algorithm such that for each input w ∈ S0∗ it decides
whether or not w = 1 in Ġ0 .
Moreover, there exists an algorithm such that for each input (w, i), w ∈ S0∗ ,
i ∈ N, it decides whether or not w represents an element from hȧni ,0 i, and in
case it represents such an element, the algorithm returns λȧni ,0 , λ ∈ Z, such
that w = λȧni ,0 in Ġ0 . Analogous statement remains true when we replace ȧni ,0
with ḃni ,0 .
8
Proof. Indeed, these properties immediately follow from the basic properties of
the direct products of groups combined with Lemmas 4 and 5.
Lemma 8. For all k ∈ N ∪ {0} and n ∈ N, the following holds.
(i). The groups Ȧn and Ḃn embed into Ġk under the maps induced by ȧn,m 7→
ȧn,m and ḃn,m 7→ ḃn,m for m ∈ {0, 1}, respectivley;
(ii). The group Ġk+1 is an HNN-extension of the group Ġk . More precisely,
Ġk+1 = hĠk , tk+1 | t−1
k+1 ȧnk+1 ,0 tk+1 = ḃnk+1 ,0 i.
Proof. Indeed, if k = 0, then (i) and (ii) are obvious. Now, let us apply induction with respect to k.
Suppose that for all 0 ≤ l < k, the statements of (i) and (ii) are true.
Then, since by the inductive assumption, Ġk is obtained from Ġk−1 as an HNNextension with respect to the isomorphic subgroups hȧnk ,0 i ⋍ hḃnk ,0 i, by the
basic properties of HNN-extensions (see Lemma 2), we get that the statement of
(i) holds for Ġk . Therefore, since the subgroups hȧnk+1 ,0 i ≤ Ġk and hḃnk+1 ,0 i ≤
Ġk are isomorphic, and in the definition of Ġk+1 the only defining relation which
−1
involves the letters t±1
k+1 is the relation tk+1 ȧnk+1 ,0 tk+1 = ḃnk+1 ,0 , we get that
the statement of (ii) holds as well.
Corollary 1. If k < l, then the group Ġk embeds into the group Ġl under the
map induced by
ȧn,m 7→ ȧn,m , ḃn,m 7→ ḃn,m for n ∈ N and m ∈ {0, 1}
and
t1 7→ t1 , . . . , tk 7→ tk .
Proof. Indeed, by Lemma 8, the group Ġl is obtained from the group Ġk by
(multiple) HNN-extensions. Therefore, the statement follows from the basic
properties of HNN-extensions, namely, by Lemma 2.
Corollary 2. The map ȧn,0 7→ ḃn,0 , ȧn,1 7→ ḃn,1 induces a group isomorphism
between the subgroups hȧn,0 , ȧn,1 i = Ȧn and hḃn,0 , ḃn,1 i = Ḃn of Ġ if and only
if n ∈ N \ M.
Proof. By Corollary 1, Ġ0 embeds in Ġ by the map induced by ȧn,0 7→ ȧn,0 ,
ȧn,1 7→ ȧn,1 , ḃn,0 7→ ḃn,0 , ḃn,1 7→ ḃn,1 for n ∈ N. Therefore, the statement of the
corollary follows from Lemma 6.
Definition 1 (Reduced words over Sk∗ ). Let k ∈ N. Then, for a given word
w ∈ Sk∗ , we say that w is a reduced word over Sk∗ if the following properties hold.
9
(0). w is freely reduced, i.e. w does not contain subwords of the form xx−1 ,
x ∈ Sk ;
(1). For all 1 ≤ i ≤ k, w does not contain subwords of the form t−1
i uti , where
u ∈ S0∗ is such that u = λȧni ,0 in Ġ0 for some λ ∈ Z;
(2). For all 1 ≤ i ≤ k, w does not contain subwords of the form ti vt−1
i , where
v ∈ S0∗ is such that v = λḃni ,0 in Ġ0 for some λ ∈ Z.
∗
Lemma 9. For all k ∈ N, if w ∈ Sk∗ \ Sk−1
is a reduced word over Sk∗ , then
∗
w 6= 1 in Ġk . Moreover, w 6= u in Ġk for any word u ∈ Sk−1
.
Proof. Let us prove by induction on k. If k = 1, then the group Ġ1 = hĠ0 , t1 |
t−1
1 ȧn1 ,0 t1 = ḃn1 ,0 i is an HNN-extension of Ġ0 with respect to the isomorphic
subgroups hȧn1 ,0 i ≤ Ġ0 and hḃn1 ,0 i ≤ Ġ0 . Therefore, by Britton’s Lemma (see
Lemma 1), w 6= 1 in Ġ1 provided that it is a reduced word over S1∗ .
Also for any u ∈ S0∗ , the word wu−1 is a reduced word with respect to
the HNN-extension Ġ1 = hĠ0 , t1 | t−1
1 ȧn1 ,0 t1 = ḃn1 ,0 i. Therefore, by Britton’s
Lemma (see Lemma 1), wu−1 6= 1 in Ġ1 or, in other words, w 6= u in Ġ1 .
∗
Now assume that k > 1 and w ∈ Sk∗ \ Sk−1
is a reduced word over Sk∗ . Also,
suppose that the statement of the lemma is true for all l < k. Then, first of
all, note that from the definition of the reduced words over Sk∗ it follows that if
∗
∗
.
, then v is a reduced word over Sk−1
v is a subword of w such that v ∈ Sk−1
−1
−1
Consequently, by the inductive hypothesis, if tk utk (or tk utk ) is a subword of
∗
w such that u ∈ Sk−1
and u represents an element from the image of Ȧnk (or
Ḃnk ) in Ġk , then u ∈ S0∗ . However, this contradicts the assumption that w is a
reduced word over Sk∗ . Therefore, since Ġk = hĠk−1 , tk | t−1
k ȧnk ,0 tk = ḃnk ,0 i is
an HNN-extension of Ġk−1 with respect to the isomorphic subgroups hank ,0 i =
Ȧnk ≤ Ġk−1 and hbnk ,0 i = Ḃnk ≤ Ġk−1 , we get that if w is a reduced word over
Sk∗ , then w is a reduced word over this HNN-extension. Hence, by Britton’s
Lemma, we get that w 6= 1 in Ġk . Similarly, for any u ∈ S0∗ , again by Britton’s
Lemma, we get that wu−1 6= 1 in Ġk or, in other words, w 6= u in Ġk .
Lemma 10. There exists an algorithm such that for each input (k, w), k ∈
N ∪ {0}, w ∈ Sk∗ , it decides whether or not w = 1 in Ġk .
Proof. Let (k, w) be a fixed input. Without loss of generality assume that w is
a freely reduced word in Sk∗ .
If k = 0, then one can apply the word problem algorithm for the group
Ġ0 = hS0∗ i. See Lemma 7.
Otherwise, if k ≥ 1, for each k1 ≤ k such that w contains a letter from
{tk1 , t−1
k1 }, do the following: Find all subwords of w which are of one of the forms
−1
∗
ut
t−1
k1 or tk1 vtk1 , where u, v ∈ S0 and u = λȧnk1 ,0 , v = λḃnk1 ,0 in Ġ0 for some
k1
λ ∈ Z. (By Lemma 7, subwords of these form can be found algorithmically.)
Then, if, say, a subword of the form t−1
k1 utk1 is found, replace it with λḃnk1 ,0 .
10
Thanks to the identity t−1
k1 λȧnk1 ,0 tk1 = λḃnk1 ,0 , the newly obtained word is
equal to w in Ġk . Then repeat this procedure on the newly obtained word until
there is no more subwords of the mentioned forms. Let w1 be the word obtained
as a result of this procedure. Then, by Lemma 9, either w1 ∈ S0∗ or for some
k0 ≥ 1, w1 ∈ Sk∗0 \ Sk∗0 −1 . Then, in the last case, by Lemma 9, w1 is a reduced
word over Sk∗0 . Also in the first case (i.e. when w1 ∈ S0∗ ), w1 = 1 in Ġk if and
only if w1 = 1 in Ġ0 , hence by Lemma 7, in this case, the identity w1 = 1 can
be checked algorithmically. In the second case, by Lemma 9, w1 6= 1 in Ġk .
Lemma 11. The word problem in Ġ is decidable with respect to the presentation
(4).
Proof. Suppose that w is a finite word with letters from
±1
Sk = ± ȧn,m , ± ḃn,m , t±1
| n ∈ N, m ∈ {0, 1} ,
1 , . . . , tk
where k is some natural number. Also suppose that w represents the trivial
element in Ġ. Then, since Ġ is a direct limit of the groups {Ġi }∞
i=1 , there exists
a minimal integer N ≥ 0 such that w represents the trivial element in ĠN .
We claim that N ≤ k. Indeed, if N > k, then since N was chosen as the
minimal index such that w = 1 in ĠN , we get w 6= 1 in Ġk . However, by
Corollary 1, Ġk embeds into ĠN under the map induces by
ȧn,m 7→ ȧn,m and t1 7→ t1 , . . . , tk 7→ tk , for n ∈ N, m ∈ {0, 1},
which implies that if w 6= 1 in Ġk , then w 6= 1 in ĠN . A contradiction.
Thus, if w ∈ Sk∗ represents the trivial element in Ġ, then it represents the
trivial element in Ġk as well. In other words, in order to check whether or not
w represents the trivial element in Ġ it is enough to check its triviality in Ġk .
Therefore, since for each w ∈ S ∗ one can algorithmically find (the minimal)
k ∈ N such that w ∈ Sk∗ , the decidability of the word problem in Ġ follows from
Lemma 10.
Lemma 12. The group Ġ is torsion-free.
Proof. First of all, notice that by the properties of the groups Ȧk , Ḃk , k ∈ N,
and by the basic properties of direct products, the group Ġ0 is torsion free.
Now, suppose that u ∈ S ∗ is such that it represents a torsion element of
Ġ. Then, since Ġ is a direct limit of the groups {Ġi }∞
i=1 , there exists k ∈ N
such that u ∈ Sk∗ and u represents a torsion element in Ġk as well. Since Ġk
is obtained from Ġ0 by multiple HNN-extensions, then, by Lemma 3, Ġk is a
torsion free group. Therefore, u represents the trivial element in Ġk as well as
in Ġ.
11
Now suppose that Φ : Ġ ֒→ G̈ is an embedding of the group Ġ into a finitely
generated torsion-free group G̈ such that the maps
φ1 : (n, m) 7→ Φ(ȧn,m ), φ2 : (n, m) 7→ Φ(ḃn,m ), and φ3 : n 7→ Φ(tn ),
where n ∈ N, m ∈ {0, 1},
are computable, and G̈ has decidable word problem. Then the next lemma
shows that the group G̈ has the desirable properties we were looking for.
Lemma 13. The group G̈ cannot be embedded in a group with decidable conjugacy problem.
Proof. By contradiction, let us assume that G̈ embeds in a group Ḡ which has
decidable conjugacy problem. Then, for the purpose of convenience, without
loss of generality let us assume that G̈ is a subgroup of the group Ḡ.
Below we show that the decidability of the conjugacy problem in Ḡ contradicts the assumption that N and M are disjoint and recursively inseparable.
Let us define C ⊆ N as
C = n ∈ N | Φ(ȧn,0 ) is conjugate to Φ(ḃn,0 ) in Ḡ .
Then, the decidability of the conjugacy problem in Ḡ implies that the set C is
recursive, because, since the group Ḡ has decidable conjugacy problem, and since
by our assumptions, the above mentioned maps φ1 , φ2 and φ3 are computable,
for any input n ∈ N one can algorithmically verify whether or not Φ(ȧn,0 ) is
conjugate to Φ(ḃn,0 ) in Ḡ.
Therefore, since for groups with decidable conjugacy problem one can algorithmically find conjugator element for each pair of conjugate elements of the
group, we also get that there exists a computable map
f : C → Ḡ
such that for all n ∈ C we have
f (n)−1 Φ(ȧn,0 )f (n) = Φ(ḃn,0 ).
For n ∈ C, let us denote
f (n) = gn ∈ Ḡ.
Now let us define
A = n ∈ C | gn−1 Φ(ȧn,1 )gn = Φ(ḃn,1 ) ⊆ N.
12
Since the word problem in Ḡ is decidable, the sets C is recursive and the maps
Φ and f are computable, we get that the set A is a recursive subset of N. Also
since the following identities
ȧni ,1 = 2i ȧni ,0 , ḃni ,1 = 2i ḃni ,0 and ti−1 ȧni ,0 ti = ḃni ,0 , for i ∈ N,
hold in Ġ, we get that in Ḡ the following identities hold
i
i
Φ(ȧni ,1 ) = Φ(ȧni ,0 )2 , Φ(ḃni ,1 ) = Φ(ḃni ,0 )2
and
Φ(ti )−1 Φ(ȧni ,0 )Φ(ti ) = Φ(ḃni ,0 ) for all ni ∈ N .
Therefore, we get that
N ⊆ A.
On the other hand, Corollary 2 implies that for any n ∈ M, the pairs of elements
Φ(ȧn,0 ), Φ(ḃn,0 ) and Φ(ȧn,1 ), Φ(ḃn,1 )
cannot be conjugate in Ḡ by the same conjugator. Therefore, we get that
A ∩ M = ∅.
Thus we get that N ⊆ A and A ∩ M = ∅, which implies that A ⊂ N is a
recursive separating set for N and M, which contradicts the assumption that
N and M are recursively inseparable.
Finally, the embedding Φ : Ġ ֒→ G̈ with the prescribed properties exists,
thanks to Theorem 4. Therefore, the group G̈ with the above mentioned properties exists. Also by a version of Higman’s embedding theorem described by
Aanderaa and Cohen in [1], the group G̈ can be embedded into a finitely presented group G with decidable word problem. By a recent result of Chiodo
and Vyas, [4], the group G defined this way will also inherit the property of
torsion-freeness from the group G̈.
Clearly, since G̈ cannot be embedded into a group with decidable conjugacy
problem, this property will be inherited by G. Thus Theorem 2 is proved.
13
References
[1] S. Aanderaa, D. E. Cohen, Modular machines I, II, in [2], Stud. Logic
Found. Math. 95 (1980), 1-18, 19-28.
[2] G. Baumslag, A. Myasnikov, V. Shpilrain et al., Open problems in Combinatorial and Geometric Group Theory, http://www.grouptheory.info/.
[3] W.W. Boone, F.B. Cannonito, and R.C. Lyndon, Word Problems: Decision
Problems and the Burnside Problem in Group Theory, Studies in Logic
and the Foundations of Mathematics, vol. 71, North-Holland, Amsterdam,
1973.
[4] M. Chiodo, R. Vyas, Torsion length and finitely presented groups,
arXiv:1604.03788, 2016.
[5] Clapham C.R.J., An embedding theorem for finitely generated groups.
Proc. London Math. Soc. (1967) 17:419-430.
[6] D.J. Collins, Representation of Turing reducibility by word and conjugacy
problems in finitely presented groups, Acta Math. 128 , (1972) no. 1-2,7390.
[7] D.J. Collins, C.F. Miller III , The conjugacy problem and subgroups of
finite index, Proc. London Math. Soc. (3) 34 (1977), no. 3, 535-556.
[8] A. Darbinyan, Word and conjugacy problems in lacunary hyperbolic
groups, arXiv:1708.04591.
[9] A. Darbinyan, Group embeddings with algorithmic properties, Communications in Algebra, 43:11 (2015), 4923-4935.
[10] A.V. Gorjaga, A.S. Kirkinski , The decidability of the conjugacy problem
cannot be transferred to finite extensions of groups. (Russian) Algebra i
Logika 14 (1975), no. 4, 393-406.
[11] G. Higman. Subgroups of finitely presented groups. Proc. Roy. Soc. Ser. A,
262:455-475, 1961.
[12] Kourovka Notebook. Unsolved Problems in Group Theory. 5th edition,
Novosibirsk, 1976.
[13] R.C. Lyndon, P.E. Schupp, Combinatorial group theory, Springer, Berlin,
1977.
[14] A. Mal’cev, Constructive algebras. I, Uspehi Mat. Nauk, vol. 16 (1961), no.
3 (99), pp. 3-60.
[15] A. Miasnikov, P. Schupp, Computational complexity and the conjugacy
problem. Computability, 2016.
14
[16] C. F. Miller III. On group-theoretic decision problems and their classification, volume 68 of Annals of Mathematics Studies. Princeton University
Press, 1971.
[17] C.F. Miller III, Decision Problems for Groups Survey and Reflections.
Algorithms and Classification in Combinatorial Group Theory (1992) 23:159.
[18] A.Yu. Olshanskii, M. Sapir, The conjugacy problem and Higman embeddings. Mem. Amer. Math. Soc. 170 (2004), no. 804
[19] A. Yu. Olshanskii, M.V. Sapir, Subgroups of finitely presented groups with
solvable conjugacy problem. Internat. J. Algebra Comput., 15(5-6):10751084, 2005.
[20] D. Osin, Small cancellations over relatively hyperbolic groups and embedding theorems, Ann. Math. 172 (2010), no. 1, 1-39.
[21] M. Rabin, Computable algebra, general theory and theory of computable
fields., Trans. Amer. Math. Soc., vol. 95 (1960), pp. 341-360.
[22] J. R. Shoenfield, Mathematical logic. Addison Wesley, 1967.
A. Darbinyan, Department of Mathematics, Vanderbilt University,
1326 Stevenson Center, Nashville, TN 37240
E-mail address: [email protected]
15
| 4math.GR
|
Unsupervised Pretraining for Sequence to Sequence Learning
Prajit Ramachandran and Peter J. Liu and Quoc V. Le
Google Brain
{prajit, peterjliu, qvl}@google.com
Abstract
arXiv:1611.02683v2 [cs.CL] 22 Feb 2018
This work presents a general unsupervised learning method to improve the accuracy of sequence to sequence (seq2seq)
models. In our method, the weights of
the encoder and decoder of a seq2seq
model are initialized with the pretrained
weights of two language models and then
fine-tuned with labeled data. We apply this method to challenging benchmarks in machine translation and abstractive summarization and find that it significantly improves the subsequent supervised models. Our main result is that
pretraining improves the generalization of
seq2seq models. We achieve state-of-theart results on the WMT English→German
task, surpassing a range of methods using both phrase-based machine translation and neural machine translation. Our
method achieves a significant improvement of 1.3 BLEU from the previous best
models on both WMT’14 and WMT’15
English→German. We also conduct human evaluations on abstractive summarization and find that our method outperforms a purely supervised learning baseline in a statistically significant manner.
1
Introduction
Sequence to sequence (seq2seq) models
(Sutskever et al., 2014; Cho et al., 2014;
Kalchbrenner and Blunsom, 2013; Allen, 1987;
Ñeco and Forcada, 1997) are extremely effective
on a variety of tasks that require a mapping
between a variable-length input sequence to
a variable-length output sequence. The main
weakness of sequence to sequence models, and
deep networks in general, lies in the fact that they
can easily overfit when the amount of supervised
training data is small.
In this work, we propose a simple and effective technique for using unsupervised pretraining
to improve seq2seq models. Our proposal is to
initialize both encoder and decoder networks with
pretrained weights of two language models. These
pretrained weights are then fine-tuned with the labeled corpus. During the fine-tuning phase, we
jointly train the seq2seq objective with the language modeling objectives to prevent overfitting.
We benchmark this method on machine translation for English→German and abstractive summarization on CNN and Daily Mail articles. Our
main result is that a seq2seq model, with pretraining, exceeds the strongest possible baseline
in both neural machine translation and phrasebased machine translation. Our model obtains
an improvement of 1.3 BLEU from the previous best models on both WMT’14 and WMT’15
English→German. On human evaluations for abstractive summarization, we find that our model
outperforms a purely supervised baseline, both in
terms of correctness and in avoiding unwanted
repetition.
We also perform ablation studies to understand
the behaviors of the pretraining method. Our study
confirms that among many other possible choices
of using a language model in seq2seq with attention, the above proposal works best. Our study
also shows that, for translation, the main gains
come from the improved generalization due to the
pretrained features. For summarization, pretraining the encoder gives large improvements, suggesting that the gains come from the improved optimization of the encoder that has been unrolled
for hundreds of timesteps. On both tasks, our proposed method always improves generalization on
the test sets.
W
X
Y
Z
<EOS>
Softmax
Second RNN Layer
First RNN Layer
Embedding
A
B
C
<EOS>
W
X
Y
Z
Figure 1: Pretrained sequence to sequence model. The red parameters are the encoder and the blue
parameters are the decoder. All parameters in a shaded box are pretrained, either from the source side
(light red) or target side (light blue) language model. Otherwise, they are randomly initialized.
2
Methods
In the following section, we will describe our basic
unsupervised pretraining procedure for sequence
to sequence learning and how to modify sequence
to sequence learning to effectively make use of the
pretrained weights. We then show several extensions to improve the basic model.
2.1
Basic Procedure
Given an input sequence x1 , x2 , ..., xm and an
output sequence yn , yn−1 , ..., y1 , the objective of
sequence to sequence learning is to maximize the
likelihood
p(yn , yn−1 , ..., y1 |x1 , x2 , ..., xm ).
Common sequence to sequence learning methods decompose this objective
as
p(yn , yn−1 , ..., y1 |x1 , x2 , ..., xm )
=
Q
n
p(y
|y
,
...,
y
;
x
,
x
,
...,
x
).
t t−1
1 1 2
m
t=1
In sequence to sequence learning, an RNN encoder is used to represent x1 , ..., xm as a hidden
vector, which is given to an RNN decoder to produce the output sequence. Our method is based
on the observation that without the encoder, the
decoder essentially acts like a language model on
y’s. Similarly, the encoder with an additional output layer also acts like a language model. Thus it
is natural to use trained languages models to initialize the encoder and decoder.
Therefore, the basic procedure of our approach
is to pretrain both the seq2seq encoder and decoder networks with language models, which can
be trained on large amounts of unlabeled text data.
This can be seen in Figure 1, where the parameters in the shaded boxes are pretrained. In the following we will describe the method in detail using
machine translation as an example application.
First, two monolingual datasets are collected,
one for the source side language, and one for the
target side language. A language model (LM) is
trained on each dataset independently, giving an
LM trained on the source side corpus and an LM
trained on the target side corpus.
After two language models are trained, a multilayer seq2seq model M is constructed. The embedding and first LSTM layers of the encoder and
decoder are initialized with the pretrained weights.
To be even more efficient, the softmax of the decoder is initialized with the softmax of the pretrained target side LM.
2.2
Monolingual language modeling losses
After the seq2seq model M is initialized with the
two LMs, it is fine-tuned with a labeled dataset.
However, this procedure may lead to catastrophic
forgetting, where the model’s performance on the
language modeling tasks falls dramatically after
fine-tuning (Goodfellow et al., 2013). This may
hamper the model’s ability to generalize, especially when trained on small labeled datasets.
To ensure that the model does not overfit the labeled data, we regularize the parameters that were
pretrained by continuing to train with the monolingual language modeling losses. The seq2seq and
language modeling losses are weighted equally.
In our ablation study, we find that this technique
is complementary to pretraining and is important
in achieving high performance.
2.3
Other improvements to the model
Pretraining and the monolingual language modeling losses provide the vast majority of improvements to the model. However in early experimentation, we found minor but consistent improvements with two additional techniques: a) residual
connections and b) multi-layer attention (see Figure 2).
X
W
Attention
+
A
W
B
(a)
<EOS>
C
(b)
Figure 2: Two small improvements to the baseline
model: (a) residual connection, and (b) multi-layer
attention.
Residual connections: As described, the input
vector to the decoder softmax layer is a random
vector because the high level (non-first) layers of
the LSTM are randomly initialized. This introduces random gradients to the pretrained parameters. To avoid this, we use a residual connection
from the output of the first LSTM layer directly to
the input of the softmax (see Figure 2-a).
Multi-layer attention: In all our models, we use
an attention mechanism (Bahdanau et al., 2015),
where the model attends over both top and first
layer (see Figure 2-b). More concretely, given a
query vector qt from the decoder, encoder states
from the first layer h11 , . . . , h1T , and encoder states
L
from the last layer hL
1 , . . . , hT , we compute the attention context vector ct as follows:
exp(qt · hN
i )
αi = PT
N
j=1 exp(qt · hj )
cN
t =
T
X
αi hN
i
c1t =
T
X
αi h1i
i=1
ct = [c1t ; cN
t ]
i=1
3
Experiments
In the following section, we apply our approach
to two important tasks in seq2seq learning: ma-
chine translation and abstractive summarization.
On each task, we compare against the previous
best systems. We also perform ablation experiments to understand the behavior of each component of our method.
3.1
Machine Translation
Dataset and Evaluation: For machine translation, we evaluate our method on the WMT
English→German task (Bojar et al., 2015). We
used the WMT 14 training dataset, which is
slightly smaller than the WMT 15 dataset. Because the dataset has some noisy examples, we
used a language detection system to filter the
training examples. Sentences pairs where either the source was not English or the target
was not German were thrown away. This resulted in around 4 million training examples.
Following Sennrich et al. (2015a), we use subword units (Sennrich et al., 2015b) with 89500
merge operations, giving a vocabulary size around
90000. The validation set is the concatenated newstest2012 and newstest2013, and our test sets are
newstest2014 and newstest2015. Evaluation on
the validation set was with case-sensitive BLEU
(Papineni et al., 2002) on tokenized text using
multi-bleu.perl. Evaluation on the test
sets was with case-sensitive BLEU on detokenized
text using mteval-v13a.pl. The monolingual
training datasets are the News Crawl English and
German corpora, each of which has more than a
billion tokens.
Experimental settings: The language models
were trained in the same fashion as (Jozefowicz
et al., 2016) We used a 1 layer 4096 dimensional
LSTM with the hidden state projected down to
1024 units (Sak et al., 2014) and trained for one
week on 32 Tesla K40 GPUs. Our seq2seq model
was a 3 layer model, where the second and third
layers each have 1000 hidden units. The monolingual objectives, residual connection, and the modified attention were all used. We used the Adam
optimizer (Kingma and Ba, 2015) and train with
asynchronous SGD on 16 GPUs for speed. We
used a learning rate of 5e-5 which is multiplied
by 0.8 every 50K steps after an initial 400K steps,
gradient clipping with norm 5.0 (Pascanu et al.,
2013), and dropout of 0.2 on non-recurrent connections (Zaremba et al., 2014). We used early
stopping on validation set perplexity. A beam size
of 10 was used for decoding. Our ensemble is con-
System
Phrase Based MT (Williams et al., 2016)
Supervised NMT (Jean et al., 2015)
Edit Distance Transducer NMT (Stahlberg et al., 2016)
Edit Distance Transducer NMT (Stahlberg et al., 2016)
Backtranslation (Sennrich et al., 2015a)
Backtranslation (Sennrich et al., 2015a)
Backtranslation (Sennrich et al., 2015a)
No pretraining
Pretrained seq2seq
Pretrained seq2seq
ensemble?
single
single
ensemble 8
single
ensemble 4
ensemble 12
single
single
ensemble 5
BLEU
newstest2014 newstest2015
21.9
23.7
22.4
21.7
24.1
22.9
25.7
22.7
25.7
23.8
26.5
24.7
27.6
21.3
24.3
24.0
27.0
24.7
28.1
Table 1: English→German performance on WMT test sets. Our pretrained model outperforms all other
models. Note that the model without pretraining uses the LM objective.
M
LST
&
s
s
pus
r
ding
ding
er
ia
cor
d
d
l
d
e
e
e
o
ode
l
b
b
l
c
c
iped
a
e
m
n
m
e
k
r
v
i
e
e
e
d
i
a
g
t
p
W
n
n
n
n
n
c
ai
ai
ai
ai
n
n
ini
obje
retr
retr
retr
retr
in o
in o
etra
p
p
p
p
a
a
r
M
r
r
t
p
y
L
y
y
y
t
l
l
l
l
Pre
No
On
No
On
On
On
Pre
0.0
0.3
Difference in BLEU
0.5
1.0
1.0
1.5
1.6
2.0
2.1
2.0
2.0
1.6
2.0
Figure 3: English→German ablation study measuring the difference in validation BLEU between various
ablations and the full model. More negative is worse. The full model uses LMs trained with monolingual
data to initialize the encoder and decoder, plus the language modeling objective.
structed with the 5 best performing models on the
validation set, which are trained with different hyperparameters.
Results: Table 1 shows the results of our
method in comparison with other baselines. Our
method achieves a new state-of-the-art for single model performance on both newstest2014
and newstest2015, significantly outperforming the
competitive semi-supervised backtranslation technique (Sennrich et al., 2015a). Equally impressive
is the fact that our best single model outperforms
the previous state of the art ensemble of 4 models.
Our ensemble of 5 models matches or exceeds the
previous best ensemble of 12 models.
Ablation study: In order to better understand
the effects of pretraining, we conducted an ablation study by modifying the pretraining scheme.
We were primarily interested in varying the pretraining scheme and the monolingual language
modeling objectives because these two techniques
produce the largest gains in the model. Figure
3 shows the drop in validation BLEU of various
ablations compared with the full model. The full
model uses LMs trained with monolingual data to
initialize the encoder and decoder, in addition to
the language modeling objective. In the follow-
• Only pretraining the decoder is better than
only pretraining the encoder: Only pretraining the encoder leads to a 1.6 BLEU point
drop while only pretraining the decoder leads
to a 1.0 BLEU point drop.
the pretrained models degrade less as the labeled
dataset becomes smaller.
BLEU
ing, we interpret the findings of the study. Note
that some findings are specific to the translation
task.
Given the results from the ablation study, we
can make the following observations:
Pretrain
No pretrain
22
21
20
19
18
17
16
15
• Pretrain as much as possible because the benefits compound: given the drops of no pretraining at all (−2.0) and only pretraining the
encoder (−1.6), the additive estimate of the
drop of only pretraining the decoder side is
−2.0 − (−1.6) = −0.4; however the actual
drop is −1.0 which is a much larger drop than
the additive estimate.
Figure 4: Validation performance of pretraining
vs. no pretraining when trained on a subset of the
entire labeled dataset for English→German translation.
• Pretraining the softmax is important: Pretraining only the embeddings and first LSTM
layer gives a large drop of 1.6 BLEU points.
3.2
• The language modeling objective is a strong
regularizer: The drop in BLEU points of pretraining the entire model and not using the
LM objective is as bad as using the LM objective without pretraining.
• Pretraining on a lot of unlabeled data is essential for learning to extract powerful features: If the model is initialized with LMs
that are pretrained on the source part and
target part of the parallel corpus, the drop
in performance is as large as not pretraining at all. However, performance remains
strong when pretrained on the large, nonnews Wikipedia corpus.
To understand the contributions of unsupervised pretraining vs. supervised training, we track
the performance of pretraining as a function of
dataset size. For this, we trained a a model with
and without pretraining on random subsets of the
English→German corpus. Both models use the
additional LM objective. The results are summarized in Figure 4. When a 100% of the labeled
data is used, the gap between the pretrained and
no pretrain model is 2.0 BLEU points. However,
that gap grows when less data is available. When
trained on 20% of the labeled data, the gap becomes 3.8 BLEU points. This demonstrates that
20
40
60
80
100
Percent of entire labeled dataset used for training
Abstractive Summarization
Dataset and Evaluation: For a low-resource
abstractive summarization task, we use the
CNN/Daily Mail corpus from (Hermann et al.,
2015). Following Nallapati et al. (2016), we modify the data collection scripts to restore the bullet
point summaries. The task is to predict the bullet
point summaries from a news article. The dataset
has fewer than 300K document-summary pairs. To
compare against Nallapati et al. (2016), we used
the anonymized corpus. However, for our ablation study, we used the non-anonymized corpus.1
We evaluate our system using full length ROUGE
(Lin, 2004). For the anonymized corpus in particular, we considered each highlight as a separate sentence following Nallapati et al. (2016). In
this setting, we used the English Gigaword corpus (Napoles et al., 2012) as our larger, unlabeled
“monolingual” corpus, although all data used in
this task is in English.
Experimental settings: We use subword units
(Sennrich et al., 2015b) with 31500 merges, resulting in a vocabulary size of about 32000. We
use up to the first 600 tokens of the document and
1
We encourage future researchers to use the nonanonymized version because it is a more realistic summarization setting with a larger vocabulary. Our numbers on
the non-anonymized test set are 35.56 ROUGE-1, 14.60
ROUGE-2, and 25.08 ROUGE-L. We did not consider highlights as separate sentences.
System
Seq2seq + pretrained embeddings (Nallapati et al., 2016)
+ temporal attention (Nallapati et al., 2016)
Pretrained seq2seq
ROUGE-1
32.49
35.46
32.56
ROUGE-2
11.84
13.30
11.89
ROUGE-L
29.47
32.65
29.44
Table 2: Results on the anonymized CNN/Daily Mail dataset.
STM
gs
pus
er
er
cor
ddin
ddin
d
d
l
e
e
o
o
e
l
b
b
al
ve
dec
em
em
enc
par
ecti
ning
ain
ain
ain
ain
j
n
i
r
r
r
r
t
b
t
t
t
o
a
r
e
o
e
e
e
t
n
pre
y pr
LM
y pr
y pr
y pr
trai
No
Onl
No
Onl
Onl
Onl
Pre
L
gs &
0
Difference in ROUGE
1
2
3
4
5
ROUGE1
ROUGE2
ROUGEL
Figure 5: Summarization ablation study measuring the difference in validation ROUGE between various
ablations and the full model. More negative is worse. The full model uses LMs trained with unlabeled
data to initialize the encoder and decoder, plus the language modeling objective.
predict the entire summary. Only one language
model is trained and it is used to initialize both
the encoder and decoder, since the source and target languages are the same. However, the encoder
and decoder are not tied. The LM is a one-layer
LSTM of size 1024 trained in a similar fashion to
Jozefowicz et al. (2016). For the seq2seq model,
we use the same settings as the machine translation experiments. The only differences are that
we use a 2 layer model with the second layer having 1024 hidden units, and that the learning rate is
multiplied by 0.8 every 30K steps after an initial
100K steps.
Results: Table 2 summarizes our results on the
anonymized version of the corpus. Our pretrained
model is only able to match the previous baseline seq2seq of Nallapati et al. (2016). Interestingly, they use pretrained word2vec (Mikolov
et al., 2013) vectors to initialize their word em-
beddings. As we show in our ablation study, just
pretraining the embeddings itself gives a large improvement. Furthermore, our model is a unidirectional LSTM while they use a bidirectional LSTM.
They also use a longer context of 800 tokens,
whereas we used a context of 600 tokens due to
GPU memory issues.
Ablation study: We performed an ablation
study similar to the one performed on the machine translation model. The results are reported in Figure 5. Here we report the drops on
ROUGE-1, ROUGE-2, and ROUGE-L on the nonanonymized validation set.
Given the results from our ablation study, we
can make the following observations:
• Pretraining appears to improve optimization: in contrast with the machine translation
model, it is more beneficial to only pretrain
the encoder than only the decoder of the sum-
marization model. One interpretation is that
pretraining enables the gradient to flow much
further back in time than randomly initialized
weights. This may also explain why pretraining on the parallel corpus is no worse than
pretraining on a larger monolingual corpus.
• The language modeling objective is a strong
regularizer: A model without the LM objective has a significant drop in ROUGE scores.
Human evaluation: As ROUGE may not be
able to capture the quality of summarization, we
also performed a small qualitative study to understand the human impression of the summaries
produced by different models. We took 200 random documents and compared the performance of
a pretrained and non-pretrained system. The document, gold summary, and the two system outputs were presented to a human evaluator who was
asked to rate each system output on a scale of 1-5
with 5 being the best score. The system outputs
were presented in random order and the evaluator
did not know the identity of either output. The
evaluator noted if there were repetitive phrases or
sentences in either system outputs. Unwanted repetition was also noticed by Nallapati et al. (2016).
Table 3 and 4 show the results of the study. In
both cases, the pretrained system outperforms the
system without pretraining in a statistically significant manner. The better optimization enabled by
pretraining improves the generated summaries and
decreases unwanted repetition in the output.
NP > P
29
NP = P
88
NP < P
83
Table 3: The count of how often the no pretrain
system (NP) achieves a higher, equal, and lower
score than the pretrained system (P) in the side-byside study where the human evaluator gave each
system a score from 1-5. The sign statistical test
gives a p-value of < 0.0001 for rejecting the null
hypothesis that there is no difference in the score
obtained by either system.
4
Related Work
Unsupervised pretraining has been intensively
studied in the past years, most notably is the work
by Dahl et al. (2012) who found that pretraining
with deep belief networks improved feedforward
Pretrain
No repeats
Repeats
No pretrain
No repeats Repeats
67
65
24
44
Table 4: The count of how often the pretrain and
no pretrain systems contain repeated phrases or
sentences in their outputs in the side-by-side study.
McNemar’s test gives a p-value of < 0.0001 for
rejecting the null hypothesis that the two systems
repeat the same proportion of times. The pretrained system clearly repeats less than the system
without pretraining.
acoustic models. More recent acoustic models
have found pretraining unnecessary (Xiong et al.,
2016; Zhang et al., 2016; Chan et al., 2015), probably because the reconstruction objective of deep
belief networks is too easy. In contrast, we find
that pretraining language models by next step prediction significantly improves seq2seq on challenging real world datasets.
Despite its appeal, unsupervised learning has
not been widely used to improve supervised training. Dai and Le (2015); Radford et al. (2017) are
amongst the rare studies which showed the benefits of pretraining in a semi-supervised learning
setting. Their methods are similar to ours except
that they did not have a decoder network and thus
could not apply to seq2seq learning. Similarly,
Zhang and Zong (2016) found it useful to add an
additional task of sentence reordering of sourceside monolingual data for neural machine translation. Various forms of transfer or multitask learning with seq2seq framework also have the flavors
of our algorithm (Zoph et al., 2016; Luong et al.,
2015; Firat et al., 2016).
Perhaps most closely related to our method is
the work by Gulcehre et al. (2015), who combined
a language model with an already trained seq2seq
model by fine-tuning additional deep output layers. Empirically, their method produces small improvements over the supervised baseline. We suspect that their method does not produce significant
gains because (i) the models are trained independently of each other and are not fine-tuned (ii) the
LM is combined with the seq2seq model after the
last layer, wasting the benefit of the low level LM
features, and (iii) only using the LM on the decoder side. Venugopalan et al. (2016) addressed (i)
but still experienced minor improvements. Using
pretrained GloVe embedding vectors (Pennington
et al., 2014) had more impact.
Related to our approach in principle is the work
by Chen et al. (2016) who proposed a two-term,
theoretically motivated unsupervised objective for
unpaired input-output samples. Though they did
not apply their method to seq2seq learning, their
framework can be modified to do so. In that case,
the first term pushes the output to be highly probable under some scoring model, and the second
term ensures that the output depends on the input.
In the seq2seq setting, we interpret the first term
as a pretrained language model scoring the output sequence. In our work, we fold the pretrained
language model into the decoder. We believe that
using the pretrained language model only for scoring is less efficient that using all the pretrained
weights. Our use of labeled examples satisfies the
second term. These connections provide a theoretical grounding for our work.
In our experiments, we benchmark our method
on machine translation, where other unsupervised
methods are shown to give promising results (Sennrich et al., 2015a; Cheng et al., 2016). In backtranslation (Sennrich et al., 2015a), the trained
model is used to decode unlabeled data to yield
extra labeled data. One can argue that this method
may not have a natural analogue to other tasks
such as summarization. We note that their technique is complementary to ours, and may lead
to additional gains in machine translation. The
method of using autoencoders in Cheng et al.
(2016) is promising, though it can be argued that
autoencoding is an easy objective and language
modeling may force the unsupervised models to
learn better features.
5
Conclusion
We presented a novel unsupervised pretraining
method to improve sequence to sequence learning.
The method can aid in both generalization and optimization. Our scheme involves pretraining two
language models in the source and target domain,
and initializing the embeddings, first LSTM layers, and softmax of a sequence to sequence model
with the weights of the language models. Using
our method, we achieved state-of-the-art machine
translation results on both WMT’14 and WMT’15
English to German. A key advantage of this technique is that it is flexible and can be applied to a
large variety of tasks.
References
Robert B. Allen. 1987. Several studies on natural language and back-propagation. IEEE First International Conference on Neural Networks.
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2015. Neural machine translation by jointly
learning to align and translate. In ICLR.
Ondřej Bojar, Rajen Chatterjee, Christian Federmann,
Barry Haddow, Matthias Huck, Chris Hokamp,
Philipp Koehn, Varvara Logacheva, Christof Monz,
Matteo Negri, Matt Post, Carolina Scarton, Lucia
Specia, and Marco Turchi. 2015. Findings of the
2015 workshop on statistical machine translation.
In Proceedings of the Tenth Workshop on Statistical
Machine Translation.
William Chan, Navdeep Jaitly, Quoc V. Le, and Oriol
Vinyals. 2015. Listen, attend and spell. arXiv
preprint arXiv:1508.01211.
Jianshu Chen, Po-Sen Huang, Xiaodong He, Jianfeng
Gao, and Li Deng. 2016. Unsupervised learning
of predictors from unpaired input-output samples.
abs/1606.04646.
Yong Cheng, Wei Xu, Zhongjun He, Wei He, Hua
Wu, Maosong Sun, and Yang Liu. 2016. Semisupervised learning for neural machine translation.
arXiv preprint arXiv:1606.04596.
Kyunghyun Cho, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger
Schwenk, and Yoshua Bengio. 2014. Learning
phrase representations using RNN encoder-decoder
for statistical machine translation. In EMNLP.
G. E. Dahl, D. Yu, L. Deng, and A. Acero. 2012.
Context-dependent pre-trained deep neural networks
for large-vocabulary speech recognition. IEEE
Transactions on Audio, Speech, and Language Processing, 20(1):30–42.
Andrew M. Dai and Quoc V. Le. 2015.
supervised sequence learning. In NIPS.
Semi-
Orhan Firat, Baskaran Sankaran, Yaser Al-Onaizan,
Fatos T. Yarman-Vural, and Kyunghyun Cho.
2016.
Zero-resource translation with multilingual neural machine translation. arXiv preprint
arXiv:1606.04164.
Ian J Goodfellow, Mehdi Mirza, Da Xiao, Aaron
Courville, and Yoshua Bengio. 2013. An empirical investigation of catastrophic forgetting in
gradient-based neural networks. arXiv preprint
arXiv:1312.6211.
Caglar Gulcehre, Orhan Firat, Kelvin Xu, Kyunghyun
Cho, Loic Barrault, Huei-Chi Lin, Fethi Bougares,
Holger Schwenk, and Yoshua Bengio. 2015. On using monolingual corpora in neural machine translation. arXiv preprint arXiv:1503.03535.
Karl Moritz Hermann, Tomas Kocisky, Edward
Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman, and Phil Blunsom. 2015. Teaching machines to read and comprehend. In NIPS.
Rico Sennrich, Barry Haddow, and Alexandra Birch.
2015a.
Improving neural machine translation
models with monolingual data. arXiv preprint
arXiv:1511.06709.
Sébastien Jean, Orhan Firat, Kyunghyun Cho, Roland
Memisevic, and Yoshua Bengio. 2015. Montreal
neural machine translation systems for WMT’15. In
Proceedings of the Tenth Workshop on Statistical
Machine Translation.
Rico Sennrich, Barry Haddow, and Alexandra Birch.
2015b.
Neural machine translation of rare
words with subword units.
arXiv preprint
arXiv:1508.07909.
Rafal Jozefowicz, Oriol Vinyals, Mike Schuster, Noam
Shazeer, and Yonghui Wu. 2016.
Exploring
the limits of language modeling. arXiv preprint
arXiv:1602.02410.
Nal Kalchbrenner and Phil Blunsom. 2013. Recurrent
continuous translation models. In EMNLP.
Diederik Kingma and Jimmy Ba. 2015. Adam: A
method for stochastic optimization. In ICLR.
Chin-Yew Lin. 2004. ROUGE: a package for automatic evaluation of summaries. In Proceedings of
the Workshop on Text Summarization Branches Out
(WAS 2004).
Minh-Thang Luong, Quoc V. Le, Ilya Sutskever, Oriol
Vinyals, and Lukasz Kaiser. 2015. Multi-task sequence to sequence learning. In ICLR.
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In NIPS.
Ramesh Nallapati, Bing Xiang, and Bowen Zhou.
2016. Sequence-to-sequence RNNs for text summarization. arXiv preprint arXiv:1602.06023.
Courtney Napoles, Matthew Gormley, and Benjamin
Van Durme. 2012. Annotated gigaword. In Proceedings of the Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge
Extraction. ACL.
Kishore Papineni, Salim Roukos, Todd Ward, and WeiJing Zhu. 2002. BLEU: A method for automatic
evaluation of machine translation. In ACL.
Razvan Pascanu, Tomas Mikolov, and Yoshua Bengio.
2013. On the difficulty of training recurrent neural
networks. ICML.
Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. Glove: Global vectors for
word representation. In EMNLP.
Alec Radford, Rafal Jozefowicz, and Ilya Sutskever.
2017. Learning to generate reviews and discovering
sentiment. arXiv preprint arXiv:1704.01444.
Hasim Sak, Andrew W. Senior, and Françoise Beaufays. 2014. Long short-term memory recurrent
neural network architectures for large scale acoustic
modeling. In INTERSPEECH.
Felix Stahlberg, Eva Hasler, and Bill Byrne. 2016.
The edit distance transducer in action: The university of cambridge english-german system at wmt16.
In Proceedings of the First Conference on Machine
Translation, pages 377–384, Berlin, Germany. Association for Computational Linguistics.
Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. 2014.
Sequence to sequence learning with neural networks. In NIPS.
Subhashini Venugopalan, Lisa Anne Hendricks, Raymond Mooney, and Kate Saenko. 2016. Improving LSTM-based video description with linguistic knowledge mined from text. arXiv preprint
arXiv:1604.01729.
Philip Williams, Rico Sennrich, Maria Nadejde,
Matthias Huck, Barry Haddow, and Ondřej Bojar.
2016. Edinburgh’s statistical machine translation
systems for wmt16. In Proceedings of the First
Conference on Machine Translation, pages 399–
410, Berlin, Germany. Association for Computational Linguistics.
Wayne Xiong, Jasha Droppo, Xuedong Huang, Frank
Seide, Mike Seltzer, Andreas Stolcke, Dong Yu, and
Geoffrey Zweig. 2016. Achieving human parity in
conversational speech recognition. abs/1610.05256.
Wojciech Zaremba, Ilya Sutskever, and Oriol Vinyals.
2014. Recurrent neural network regularization.
arXiv preprint arXiv:1409.2329.
Jiajun Zhang and Chengqing Zong. 2016. Exploiting source-side monolingual data in neural machine
translation. In EMNLP.
Yu Zhang, William Chan, and Navdeep Jaitly. 2016.
Very deep convolutional networks for end-to-end
speech recognition. abs/1610.03022.
Barret Zoph, Deniz Yuret, Jonathan May, and Kevin
Knight. 2016. Transfer learning for low-resource
neural machine translation. In EMNLP.
Ramon P. Ñeco and Mikel L. Forcada. 1997. Asynchronous translations with recurrent neural nets.
Neural Networks.
A
Example outputs
Source Document
( cnn ) like phone booths and typewriters , record stores are a vanishing breed –
another victim of the digital age . camelot music . virgin megastores . wherehouse
music . tower records . all of them gone . corporate america has largely abandoned
brick - and - mortar music retailing to a scattering of independent stores , many of
them in scruffy urban neighborhoods . and that s not necessarily a bad thing . yes , it
s harder in the spotify era to find a place to go buy physical music . but many of the
remaining record stores are succeeding – even thriving – by catering to a passionate
core of customers and collectors . on saturday , hundreds of music retailers will
hold events to commemorate record store day , an annual celebration of , well , your
neighborhood record store . many stores will host live performances , drawings ,
book signings , special sales of rare or autographed vinyl and other happenings .
some will even serve beer . to their diehard customers , these places are more than
mere stores : they are cultural institutions that celebrate music history ( the entire
duran duran oeuvre , all in one place ! ) , display artifacts ( aretha franklin on vinyl !
) , and nurture the local music scene ( hey , here s a cd by your brother s metal band
! ) . they also employ knowledgeable clerks who will be happy to debate the relative
merits of blood on the tracks and blonde on blonde . or maybe , like jack black in
high fidelity , just mock your lousy taste in music . so if you re a music geek , drop
by . but you might think twice before asking if they stock i just called to say i love
you .
Ground Truth summary
saturday is record store day , celebrated at music stores around the world . many
stores will host live performances , drawings and special sales of rare vinyl .
No pretrain
corporate america has largely abandoned brick - brick - mortar music . many of the
remaining record stores are succeeding – even thriving – by catering to a passionate
core of customers .
Pretrained
hundreds of music retailers will hold events to commemorate record store day . many
stores will host live performances , drawings , book signings , special sales of rare or
autographed vinyl .
Table 5: The pretrained model outputs a highly informative summary, while the no pretrain model outputs
irrelevant details.
Source Document
( cnn ) hey , look what i did . that small boast on social media can trigger a whirlwind
that spins into real - life grief , as a texas veterinarian found out after shooting a cat
. dr. kristen lindsey allegedly shot an arrow into the back of an orange tabby s head
and posted a proud photo this week on facebook of herself smiling , as she dangled its
limp body by the arrow s shaft . lindsey added a comment , cnn affiliate kbtx reported
. my first bow kill , lol . the only good feral tomcat is one with an arrow through it
s head ! vet of the year award ... gladly accepted . callers rang the phones hot at
washington county s animal clinic , where lindsey worked , to vent their outrage .
web traffic crashed its website . high price of public shaming on the internet then
an animal rescuer said that lindsey s prey was probably not a feral cat but the pet of
an elderly couple , who called him tiger . he had gone missing on wednesday , the
same day that lindsey posted the photo of the slain cat . cnn has not been able to
confirm the claim . as the firestorm grew , lindsey wrote in the comments underneath
her post : no i did not lose my job . lol . psshh . like someone would get rid of me
. i m awesome ! that prediction was wrong . the clinic fired lindsey , covered her
name on its marquee with duct tape , and publicly distanced itself from her actions
. our goal now is to go on and try to fix our black eye and hope that people are
reasonable and understand that those actions do nt anyway portray what we re for
here at washington animal clinic , said dr. bruce buenger . we put our heart and soul
into this place . the clinic told wbtx that lindsey was not available for comment .
cnn is reaching out to her . she removed her controversial post then eventually shut
down her facebook page . callers also complained to the brenham police department
and washington county animal control , as her facebook post went viral . the sheriff
s office in austin county , where the cat was apparently shot , is investigating , and
lindsey could face charges . its dispatchers were overloaded with calls , the sheriff
posted on facebook . we are asking you to please take it easy on our dispatchers .
as soon as the investigation is complete , we will post the relevant information here
on this page , the post read . animal rights activists are pushing for charges . animal
cruelty must be taken seriously , and the guilty parties should be punished to the
fullest extent of the law , said cat advocacy activist becky robinson . her organization
, alley cat allies , is offering a $ 7,500 reward for evidence leading to the arrest and
conviction of the person who shot the cat . but others stood up for lindsey . she s
amazing . she s caring , said customer shannon stoddard . she s a good vet , so maybe
her bad choice of posting something on facebook was not good . but i do nt think she
should be judged for it . she dropped off balloons at the animal clinic for lindsey with
a thank you note . cnn s jeremy grisham contributed to this report .
Ground Truth summary
dr. kristen lindsey has since removed the post of her holding the dead cat by an arrow
. her employer fired her ; the sheriff s office is investigating . activist offers $ 7,500
reward .
No pretrain
dr. kristen lindsey allegedly shot an arrow into the back of an orange orange tabby s
head . it s the only good good tomcat is one with an arrow through it s head ! vet vet
of the year award .
Pretrained
lindsey lindsey , a texas veterinarian , shot an arrow into the back of an orange tabby
s head . she posted a photo of herself smiling , as she dangled its limp body by the
arrow s shaft . lindsey could face charges , the sheriff s department says .
Table 6: The pretrained model outputs a highly relevant summary but makes a mistake on the feline
executioner’s name. The no pretrain model degenerates into irrelevant details and repeats itself.
Source Document
eugenie bouchard s run of poor form continued as the top seed was beaten 6 - 3 , 6 - 1
by american lauren davis in the second round at the family circle cup in charleston on
wednesday . davis , 21 , had lost her only career meeting with bouchard , but was in
control this time against the world no 7 . davis won nine of the final 11 games of the
match and broke bouchard s serve twice in the final set to pull off the upset . eugenie
bouchard fires down a serve during her second - round match at the family circle cup
bouchard shows her frustrations during her straight - sets defeat by lauren davis on
wednesday i ve never beaten here before , so i came out knowing i had nothing to
lose , said davis , ranked 66th in the world . bouchard was a semi-finalist last year
but had struggled in the lead - up to the charlston green - clay event , losing three of
her last five matches to lower - ranked opponents . davis used precise groundstrokes
to keep bouchard on her heels throughout the second set . davis broke bouchard s
serve to love to take a 3 - 1 lead as the 21 - year - old canadian had a double fault ,
then sailed a forehand long to fall behind . two games later , davis hit a backhand to
send back bouchard s 102mph serve for a winner down the left sideline and a 5 - 1
lead . davis hits a forehand on her way to an impressive win against the canadian top
seed bouchard has struggled recently , this time slumping to her fourth defeat in six
matches the match ended on bouchard s forehand into the net , davis waving to the
cheering crowd . bouchard said : as soon as it was over , definitely a bit of anger , but
also kind of this confusion , slash , like quest to find what s wrong , like this kind of
searching feeling that , ok , like i know something s off . i know something s not right
. so i want to find it . i was definitely a little bit slow today , overpowered . usually ,
i m the one dominating . so it was definitely , just , i do nt know , just not good .
Ground Truth summary
eugenie bouchard suffered her fourth defeat in six matches . the canadian top seed
lost to lauren davis at the family circle cup . world no 66 davis won 6 - 3 , 6 - 1 in
the second round in charleston . davis won nine of the final 11 games of the match to
seal victory . click here for all the latest news from charleston .
No pretrain
bouchard beat american lauren davis 6 - 3 , 6 - 1 in the second round of the family
circle cup in charleston on wednesday . bouchard had lost her only career meeting
with bouchard but was in control this time against the world no 7 . bouchard won
nine of the final 11 games of the match and broke bouchard s serve twice in the final
set to pull off the upset .
Pretrained
eugenie bouchard was beaten 6 - 3 , 6 - 1 by american lauren davis in the second
round . davis had lost her only career meeting with bouchard , but was in control this
time against the world no 7 . davis hit a backhand to send back bouchard s 102mph
serve for a winner down the left sideline .
Table 7: Both models output a relevant summary, but the no pretrain model uses the same name to refer
to both players.
Source Document
( cnn ) mike rowe is coming to a river near you . sometimes , you hear about a person
who makes you feel good about humanity , but bad about yourself , rowe says . on
thursday s episode of somebody s got ta do it , rowe meets up with chad pregracke ,
the founder of living lands & waters , who does just that . pregracke wants to clean
up the nation s rivers one piece of detritus at a time . his quota ? always more . read
mike rowe s facebook post on how to break our litter habit . since he founded the
nonprofit in 1998 at the ripe age of 23 , pregracke and more than 87,000 volunteers
have collected 8.4 million pounds of trash from u.s. waterways . those efforts helped
him earn the 2013 cnn hero of the year award , along with numerous other honors
. wherever you are , no matter if there s a stream , a creek , a lake , whatever , that
needs to be cleaned up , you can do it . just organize it and do it , he told cnn s
anderson cooper after his win . pregracke also gives rowe a tour of the 150 - foot ,
solar - powered barge that the living lands & waters staff calls home during lengthy
cleanups . the part - home , part - office , part - dumpster has seven bedrooms , two
bathrooms , a classroom and a kitchen – and just happens to be made from a recycled
strip club . according to the organization s latest annual report , pregracke has made
it his mission in 2015 to remove 500,000 more pounds of trash . if you d like to help
achieve this goal , visit his website to learn how to help : livinglandsandwaters.org /
get - involved / .
Ground Truth summary
chad pregracke was the 2013 cnn hero of the year . mike rowe visited pregracke for
an episode of somebody s got ta do it .
No pretrain
rowe meets up with chad pregracke , founder of living lands & waters . pregracke
and more than 87,000 volunteers collected 8.4 million pounds of trash from u.s. waterways .
Pretrained
rowe is the founder of living lands & waters , who does just that . pregracke also
gives rowe a tour of the 150 - foot barge that the living lands & waters gets .
Table 8: A failure case. The pretrained model outputs irrelevant details while the no pretrain model
successfully summarizes the document.
Source
Mayor Bloomberg told reporters that, because of that court order, the city had suspended the reopening of the public space and protesters were informed, however, that
local laws do not allow them to re-install with camping shops and sleeping bags.
Ground Truth
Bürgermeister Bloomberg stellt vor der Presse klar , das aufgrund dieser richterlichen Anordnung die erneute Öffnung des Platzes für den Publikumsverkehr und
die Demonstranten aufgehoben worden sei . Die Demonstranten wies er darauf hin ,
dass die Stadtgesetze ihnen nicht erlaubten , sich erneut mit Zelten und Schlafsäcken
an diesem Ort einzurichten .
No pretrain
Der Bürgermeister Bloomberg sagte den Reportern , dass die Stadt aufgrund dieser
Gerichtsentscheidung die Wiedereröffnung des öffentlichen Raumes und die Information der Demonstranten ausgesetzt habe , dass die lokalen Gesetze ihnen nicht
erlauben , mit den Campingplätzen und Schlafsäcken neu zu installieren .
Pretrained
Bürgermeister Bloomberg erklärte gegenüber Journalisten , dass die Stadt aufgrund
dieser Gerichtsentscheidung die Wiedereröffnung des öffentlichen Raums ausgesetzt
habe und dass die Demonstranten darüber informiert wurden , dass die örtlichen
Gesetze es ihnen nicht erlauben würden , sich mit Campingplätzen und Schlafsälen
neu zu installieren .
Table 9: The no pretrain model makes a complete mistranslation when outputting ”und die Information
der Demonstranten ausgesetzt habe”. That translates to ”the reopening of the public space and the information [noun] of the protesters were suspended”, instead of informing the protesters. Furthermore,
it wrongly separated the two sentences, so the first sentence has extra words and the second sentence
is left without a subject. The pretrained model does not make any of these mistakes. However, both
models make a vocabulary mistake of ”zu installieren”, which is typically only used to refer to installing
software. A human evaluator fluent in both German and English said that the pretrained version was
better.
Source
The low February temperatures, not only did they cause losses of millions for the
agricultural sector, but they limited the possibilities of the state economy to grow,
causing a contraction of the economic activity in general of 3.6 percent in the first
half of the year, mainly supported by the historic fall of 31.16 per cent in agriculture,
which affected the dynamics of other economic sectors.
Ground Truth
Die niedrigen Temperaturen im Februar verursachten nicht nur Verluste in Millionenhöhe in der Landwirtschaft , sondern steckten darüber hinaus dem Wachstum der
Staatswirtschaft enge Grenzen und verursachten im ersten Vierteljahr einen allgemeinen Rückgang der Wirtschaftstätigkeit um 3,6 Prozent Dieser geht hauptsächlich
auf den historischen Abbau der landwirtschaftlichen Entwicklung um 31,16 Prozent
zurück , der sich bremsend auf weitere Wirtschaftssektoren auswirkte .
No pretrain
Die niedrigen Temperaturen im Februar führten nicht nur zu Verlusten für die Landwirtschaft , sondern sie beschränkten die Möglichkeiten der staatlichen Wirtschaft ,
wachsen zu wachsen , wodurch die Wirtschaftstätigkeit insgesamt von 3,6 Prozent
in der ersten Hälfte des Jahres , hauptsächlich durch den historischen Rückgang
von 31.16 % in der Landwirtschaft , beeinflusst wurde , was die Dynamik anderer
Wirtschaftssektoren betraf .
Pretrained
Die niedrigen Temperaturen im Februar führten nicht nur zu Verlusten von Millionen
für den Agrarsektor , sondern beschränkten die Möglichkeiten der Staatswirtschaft
, zu wachsen , was zu einer Schrumpfung der Wirtschaftstätigkeit im Allgemeinen
von 3,6 Prozent in der ersten Hälfte des Jahres führte , hauptsächlich durch den historischen Einbruch von 316 Prozent in der Landwirtschaft , der die Dynamik anderer
Wirtschaftsbereiche beeinflusst hatte .
Table 10: The human evaluator noted that the pretrained version is better, as it correctly captures the
meaning and sentence structure of the middle. The no pretrain model does not misses translating the
word ”million”, repeats itself in ”wachsen zu wachsen”, and puts the verb ”beeinflusst wurde” is an
unnatural position. However, the pretrained model makes a mistake in the percentage (316% instead of
31.16%).
Source
To facilitate the inception of the Second World War, they allowed bankers and politicians to create a latent conflict situation by saddling Germany with huge war reparations, thereby making a radicalist example of the impoverished masses, it remained
only to introduce a sufficiently convincing culprit and a leader with a simple solution,
while also creating a multi-racial Czechoslovakia with a strong German minority to
play, and indeed did, the role of a fifth colony, once the war had been ignited.
Ground Truth
Um den Zweiten Weltkrieg einfacher entfachen zu können , ließen die Banker durch
die Politik eine latente Konfliktsituation schaffen , indem sie Deutschland mit gigantischen Kriegsreparationen belegten ; dadurch schufen sie die Voraussetzung verarmter Massen , so dass sie den Deutschen nur noch einen ausreichend starken Führer
unterjubeln mussten , der die Schuldigen benannte und einfache Lösungen anbot ; ein
weiterer Faktor war die Schaffung des Vielvölkerstaates Tschechoslowakei mit einer
starken deutschen Minderheit , die die Funktion einer fünften Kolonne einnehmen
sollte und auch einnahm , um den Kriegsbrand zu entfachen .
No pretrain
Um die Gründung des Zweiten Weltkriegs zu erleichtern , ermöglichte es den
Bankern und Politikern , eine latente Konfliktlage zu schaffen , indem sie Deutschland mit enormen Reparationsforderungen konfrontierte , wodurch ein radikalislamistisches Beispiel der verarmten Massen entstand , es blieb nur , einen ausreichend aussagekräftigen Schuldigen und einen Führer mit einer einfachen Lösung zu
etablieren , während gleichzeitig eine multi-ethnische Tschechoslowakei mit einer
starken deutschen Minderheit zu spielen war und tatsächlich die Rolle einer fünften
Kolonie war .
Pretrained
Um die Einführung des Zweiten Weltkrieges zu erleichtern , ließen sie Banker
und Politiker eine latente Konfliktlage schaffen , indem sie Deutschland mit riesigen Reparationszahlungen belieferten , wodurch ein radikalislamistisches Beispiel
der verarmten Massen entstand , es blieb nur , einen ausreichend überzeugenden
Schuldigen und einen Führer mit einer einfachen Lösung zu präsentieren , während
gleichzeitig eine multiethnische Tschechoslowakei mit einer starken deutschen Minderheit geschaffen wurde , um zu spielen , und tatsächlich , die Rolle einer fünften
Kolonie , sobald der Krieg entfacht worden war .
Table 11: An example where the English source is poorly worded. Both models output poor translations,
but the evaluator noted that the pretrained version is still better than the no pretrain version. Interestingly,
both models mistranslate ”radical” as ”radikalislamistisches”, which means ”radical Islam”, which is
probably a bias in the training data.
Source
The total vote count will also be done if at the end of the ordinary calculation is
established that the difference between the winner and the candidate placed on second
position is equal to or less than one percentage point, as long as there is a request of
the representative of the political party whose candidate came on the second position,
case in which there will be excluded the electoral boxes that have been considered
during the partial recount.
Ground Truth
Die Stimmenauszählung kann auch in ihrer Gesamtheit erfolgen , wenn nach Abschluss der ordentlichen Berechnung festgestellt wird , dass der Unterschied zwischen dem mutmaßlichen Gewinner und dem Kandidaten auf dem zweiten Platz gleich
oder geringer als ein Prozent ist , vorausgesetzt es liegt ein ausdrücklicher Antrag von
einem Vertreter der Partei , deren Kandidat Zweiter geworden ist , vor . In diesem
Fall würden die Wahlpakete , die einer teilweisen Auszählung ausgesetzt wurden ,
ausgeschlossen .
No pretrain
Die gesamte Stimmenanzahl wird auch dann erreicht , wenn am Ende der ordentlichen Berechnung festgestellt wird , dass der Unterschied zwischen dem Sieger
und dem Kandidaten , der auf der zweiten Position liegt , gleich oder weniger als
einen Prozentpunkt beträgt , vorausgesetzt , dass der Vertreter der Partei , deren Kandidat auf der zweiten Position ist , der Fall ist , in dem die Wahlunterlagen , die
während der teilweisen Rückzählung berücksichtigt wurden , ausgeschlossen werden
.
Pretrained
Die Gesamtzahl der Stimmzettel wird auch dann durchgeführt , wenn am Ende der ordentlichen Berechnung festgestellt wird , dass der Unterschied zwischen dem Gewinner und dem auf den zweiten Platz platzierten Kandidaten gleich oder weniger als
einen Prozentpunkt beträgt , solange es einen Antrag des Vertreters der politischen
Partei gibt , dessen Kandidat auf die zweite Position kam , in dem es die Wahlzettel
ausklammert , die während der Teilzählung berücksichtigt wurden .
Table 12: Another example where the English source is poorly worded. Both models get the structure
right, but have a variety of problematic translations. Both models miss the meaning of ”total vote count”.
They both also translate ”electoral boxes” poorly - the no pretrain model calls it ”electoral paperwork”
while the pretrained model calls it ”ballots”. These failures may be because of the poorly worded English
source. The human evaluator found them both equally poor.
| 9cs.NE
|
On the ERM Principle with Networked Data
Yuanhong Wang1,2 , Yuyi Wang3 , Xingwu Liu4,5 , Juhua Pu1,2∗
arXiv:1711.04297v2 [cs.LG] 22 Nov 2017
1
State Key Laboratory of Software Development Environment, Beihang University, Beijing, China
2
Research Institute of Beihang University in Shenzhen, Shenzhen, China
3
Disco Group, ETH Zurich, Switzerland
4
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
5
University of Chinese Academy of Sciences, Beijing, China
Abstract
Networked data, in which every training example involves two
objects and may share some common objects with others, is
used in many machine learning tasks such as learning to rank
and link prediction. A challenge of learning from networked
examples is that target values are not known for some pairs of
objects. In this case, neither the classical i.i.d. assumption nor
techniques based on complete U-statistics can be used. Most
existing theoretical results of this problem only deal with the
classical empirical risk minimization (ERM) principle that
always weights every example equally, but this strategy leads
to unsatisfactory bounds. We consider general weighted ERM
and show new universal risk bounds for this problem. These
new bounds naturally define an optimization problem which
leads to appropriate weights for networked examples. Though
this optimization problem is not convex in general, we devise
a new fully polynomial-time approximation scheme (FPTAS)
to solve it.
1
Introduction
“No man is an island, entire of itself ...”, the beginning of a wellknown poem by the 17th century English poet John Donne,
might be able to explain why social networking websites are
so popular. These social media not only make communications convenient and enrich our lives but also bring us data,
of an unimaginable amount, that is intrinsically networked.
Social network data nowadays is widely used in research on
social science, network dynamics, and as an inevitable fate,
data mining and machine learning (Scott 2017). Similar examples of networked data such as traffic networks (Min and
Wynter 2011), chemical interaction networks (Szklarczyk et
al. 2014), citation networks (Dawson et al. 2014) also abound
throughout the machine learning world.
Admittedly, many efforts have been made to design practical algorithms for learning from networked data, e.g., (LibenNowell and Kleinberg 2007, Macskassy and Provost 2007, Li
et al. 2016, Garcia-Duran et al. 2016). However, not many theoretical guarantees of these methods have been established,
which is the main concern of this paper. More specifically,
this paper deals with risk bounds of classifiers trained with
networked data (CLANET) whose goal is to train a classifier
∗
Corresponding author
Copyright c 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
with examples in a data graph G. Every vertex of G is an
object and described by a feature vector X ∈ X that is drawn
independently and identically (i.i.d.) from an unknown distribution, while every edge corresponds to a training example
whose input is a pair of feature vectors (X, X 0 ) of the two
ends of this edge and whose target value Y is in {0, 1}.
A widely used principle to select a proper model from a
hypothesis set is Empirical Risk Minimization (ERM). Papa,
Bellet, and Clémençon (2016) establish risk bounds for ERM
on complete data graphs, and the bounds are independent
of the distribution of the data. These bounds are of the order O(log(n)/n), where n is the number of vertices in the
complete graph. However, in practice it is very likely that
one cannot collect examples for all pairs of vertices and then
G is usually incomplete, thus techniques based on complete
U -processes in (Papa, Bellet, and Clémençon 2016) cannot
be applied and the risk bounds of the order O(log(n)/n) are
no longer valid in this setting. By generalizing the moment
inequality for U -processes to the case of incomplete graphs,
we prove novel risk bounds for the incomplete graph.
Usually, every training example is equally weighted (or unweighted) in ERM, which seems much less persuasive when
the examples are networked, in particular when the graph is
incomplete. But, most existing theoretical results of learning
from networked examples are based on the unweighted ERM
(Usunier, Amini, and Gallinari 2006, Ralaivola, Szafranski,pand Stempfel 2009), and their bounds are of the order
O( χ∗ (DG )/m) where DG is the line graph of G and χ∗
is the fractional chromatic number of DG (see Section A
in the online appendix1 ) and m is the number of training
examples. In order to improve this bound, Wang, Guo, and
Ramon (2017) propose weighted ERM which adds weights
to training examples according to the data graph, and show
that the
p risk bound for weighted ERM can be of the order
O(1/ ν ∗ (G)) where ν ∗ (G) is the fractional matching number of G, so using weighted ERM networked data can be
more effectively exploited than the equal weighting method,
∗
as basic graph theory tells us νG
≥ m/χ∗ (DG ). However,
Wang, Guo, and Ramon (2017) (in fact, Usunier, Amini, and
Gallinari (2006) and Ralaivola, Szafranski, and Stempfel
(2009) also) assume that any two examples can be arbitrarily
correlated if they share a vertex, which cannot lead to an
1
https://arxiv.org/abs/1711.04297
O(log(n)/n) bound when the graph is complete.
We show that the “low-noise” condition, also called the
Mammen-Tsybakov noise condition (Mammen and Tsybakov
1998), which is commonly assumed in many typical learning
problems with networked data, e.g., ranking (Clémençon,
Lugosi, and Vayatis 2008) and graph reconstruction (Papa,
Bellet, and Clémençon 2016), can be used to reasonably
bound the dependencies of two examples that share a common vertex and then leads to tighter risk bounds.
In summary, in this paper we mainly
Though Wang, Guo, and Ramon (2017) show improved
risk bounds, as far as we know, there is no known tight risk
bound on incomplete graphs for tasks such as pairwise ranking and graph reconstruction that satisfy the “low-noise” condition. Under this condition, the method proposed in (Wang,
Guo, and Ramon 2017) does not work (see Section 6.1).
Before we show new risk bounds and new weighting methods, we present the following three aspects to convey some
intuitions.
• prove new universal risk bounds for CLANET which
Line Graphs Compared to Janson’s decomposition which
is based on line graphs, our method utilizes the additional dependency information in the data graph G. For example, the
complete line graph with three vertices (i.e., triangle) corresponds to two different data graphs, as illuminated in Figure 1.
Hence, line graph based methods ignore some important information in the data graph. This negligence makes it unable
to improve bounds, no matter whether considering weighted
ERM or not (see Section A.1 in the online appendix). In
Section 6.2, we show that our bounds are tighter than that of
line graph based methods.
– can be applied to learning from networked data even if
the data graph is incomplete;
– exploit the property of the “low-noise” condition, and
then become tighter than previous results;
– allow non-identical weights on different examples, so
it is possible to achieve better learning guarantee by
choosing these weights.
• formulate a non-convex optimization problem inspired by
our new risk bounds (because our risk bounds depend
on the weights added to every training example, and a
better weighting scheme leads to a tighter bound), and
then we also design a new efficient algorithm to obtain
an approximate optimal weighting vector and show that
this algorithm is a fully polynomial-time approximation
scheme for this non-convex program.
2
Intuitions
We now have a look at previous works that are closely related
to our work, as shown in Table 1, and present the merits
of our method. Biau and Bleakley (2006), Clémençon, Lugosi, and Vayatis (2008) and Papa, Bellet, and Clémençon
(2016) deal with the case when the graph is complete, i.e.,
the target value of every pair of vertices is known. In this
case, Clémençon, Lugosi, and Vayatis (2008) formulate the
“low-noise” condition for the ranking problem and demonstrate that this condition can lead to tighter risk bounds by
the moment inequality for U -processes. Papa, Bellet, and
Clémençon (2016) further consider the graph reconstruction
problem introduced by Biau and Bleakley (2006) and show
this problem always satisfies the “low-noise” condition.
If the graph is incomplete, one can use either Janson’s
decomposition (Janson 2004, Usunier, Amini, and Gallinari
2006, Ralaivola, Szafranski, and Stempfel 2009, Ralaivola
and Amini 2015) or the fractional matching approach by
Wang, Guo, and Ramon (2017) to derive risk bounds. The
main differences between these two approaches are:
• Wang, Guo, and Ramon (2017) consider the data graph
G while Janson’s decomposition uses only the line graph
DG .
• The fractional matching approach considers weighted
ERM while Janson (2004), Usunier, Amini, and Gallinari (2006), Ralaivola, Szafranski, and Stempfel (2009)
and Ralaivola and Amini (2015) only prove bounds for
unweighted ERM.
Asymptotic Risk As mentioned by Wang, Guo, and Ramon (2017), if several examples share a vertex, then we are
likely to put less weight on them because the influence of
this vertex to the empirical risk should be bounded. Otherwise, if we treat every example equally, then these dependent
examples may dominate the training process and lead to the
risk bounds that do not converge to 0 (see the example in
Section 6.2).
Uniform Bounds Ralaivola and Amini (2015) prove an
entropy-base concentration inequality for networked data
using Janson’s decomposition, but the assumption there is
usually too restrictive to be satisfied (see Section A.2 in the
online appendix). To circumvent this problem, our method
uses the “low-noise” condition (also used in (Papa, Bellet, and
Clémençon 2016)) to establish uniform bounds, in absence
of any restrictive condition imposed on the data distribution.
3
Preliminaries
In this section, we begin with the detailed probabilistic framework for CLANET, and then give the definition of weighted
ERM on networked examples.
3.1
Problem Statement
Consider a graph G = (V, E) with a vertex set V =
{1, . . . , n} and a set of edges E ⊆ {{i, j} : 1 ≤ i 6= j ≤ n}.
For each i ∈ V , a continuous random variable (r.v.) Xi , taking its values in a measurable space X , describes features of
vertex i. The Xi ’s are i.i.d. r.v.’s following some unknown
distribution PX . Each pair of vertices (i, j) ∈ E corresponds
to a networked example whose input is a pair (Xi , Xj ) and
target value is Yi,j ∈ Y. We focus on binary classification
in this paper, i.e., Y = {0, 1}. Moreover, the distribution of
target values only depends on the features of the vertices it
contains but does not depend on features of other vertices,
Principles
Unweighted ERM
(equally weighted)
Weighted ERM
Table 1: Summary of methods for CLANET.
With “low-noise”
Graph type
condition
Complete
graphs
Clémençon, Lugosi, and Vayatis (Ann. Stat. 2008),
Papa, Bellet, and Clémençon
(NIPS 2016)
General
graphs
Ralaivola and Amini (ICML
2015)
General
graphs
This paper
Without “low-noise”
condition
Biau and Bleakley
(Statistics and Decisions
2006)
Usunier, Amini, and Gallinari (NIPS 2006),
Ralaivola, Szafranski, and
Stempfel (AISTATS 2009)
Wang, Guo, and Ramon
(ALT 2017)
that is, there is a probability distribution PY|X 2 such that for
every pair (i, j) ∈ E, the conditional probability
(Hoeffding 1948) of its excess risk can be always obtained if
the problem is symmetric (see Lemma 2).
P [Yi,j = y | x1 , . . . , xn ] = PY|X 2 [y, xi , xj ] .
Definition 2 (symmetry). A learning problem is symmetric if for every xi , xj ∈ X , yi,j ∈ Y and r ∈ R,
`(r, (xi , xj , yi,j )) = `(r, (xj , xi , yj,i )).
Example 1 (pairwise ranking). (Liu 2009) categorize ranking problems into three groups by their input representations
and loss functions. One of these categories is pairwise ranking that learns a binary classifier telling which document
is better in a given pair of documents. A document can be
described by a feature vector from the X describing title,
volume, . . . The target value (rank) between two documents,
that only depends on features of these two documents, is 1 if
the first document is considered better than the second, and
0 otherwise.
The training set S := {(Xi , Xj , Yi,j )}(i,j)∈E is dependent
copies of a generic random vector (X1 , X2 , Y1,2 ) whose distribution P = PX ⊗ PX ⊗ PY|X 2 is fully determined by
the pair (PX , PY|X 2 ). Let R be the set of all measurable
functions from X 2 to Y and for all r ∈ R, the loss function
`(r, (x1 , x2 , y1,2 )) = 1y1,2 6=r(x1 ,x2 ) .
Given a graph G with training examples S and a hypothesis
set R ⊆ R, the CLANET problem is to find a function r ∈ R,
with risk
L(r) := E[`(r, (X1 , X2 , Y1,2 ))]
(1)
that achieves a comparable performance to the Bayes rule
r∗ = arg inf r∈R L(r) = 1η(x1 ,x2 )≥1/2 , whose risk is denoted by L∗ , where η(x1 , x2 ) = PY|X 2 [1, x1 , x2 ] is the regression function.
The main purpose of this paper is to devise a principle to
select a classifier r̂ from the hypothesis set R and establish
bounds for its excess risk L(r̂) − L∗ .
Definition 1 (“low-noise” condition). Let us consider a
learning problem, in which the hypothesis set is F and
the Bayes rule is f ∗ . With slightly abusing the notation,
this problem satisfies the “low-noise” condition if ∀f ∈
F, L(f ) − L∗ ≥ C θ (E[|f − f ∗ |])θ where C is a positive
constant.
As mentioned, the “low-noise” condition can lead to tighter
risk bounds. For this problem, we show that the “low-noise”
condition for the i.i.d. part of the Hoeffding decomposition
Many typical learning problems are symmetric. For example, pairwise ranking problem with symmetric functions r
in the sense that r(X1 , X2 ) = 1 − r(X2 , X1 ) satisfies the
symmetric condition.
3.2
Weighted ERM
ERM aims to find the function from a hypothesis set that minimizes the empirical estimator of (1) on the training examples
S = {(Xi , Xj , Yi,j )}(i,j)∈E :
Lm (r) :=
1 X
`(r, (Xi , Xj , Yi,j )).
m
(2)
(i,j)∈E
where m is the number of training examples. In this paper,
we consider its weighted version, in which we put weights
on the examples and select the minimizer rw of the weighted
empirical risk
Lw (r) :=
1
kwk1
X
wi,j `(r, (Xi , Xj , Yi,j ))
(3)
(i,,j)∈E
where w is a fractional matching of G and kwk1 > 0.
Definition 3 (fractional matching). Given a graph G =
(V, E), a fractional matching w is a non-negative
vector
P
(wi,j )(i,j)∈E that for every vertex i ∈ V, j:(i,j)∈E wi,j ≤
1.
4
Universal Risk Bounds
In this section, we use covering numbers as the complexity
measurement of hypothesis sets to prove that tighter universal
risk bounds are always attained by the minimizers of the
weighted empirical risk (3).
4.1
Covering Numbers
∗
The excess risk L(rw ) − L depends on the hypothesis set
R whose complexity can be measured by covering number
(Cucker and Zhou 2007). A similar but looser result using VCdimension (Vapnik and Chervonenkis 1971) can be obtained
as well.
Definition 4 (covering numbers). Let (F, Lp ) be a metric
space with Lp -pseudometric. We define the covering number
N (F, Lp , ) be the minimal l ∈ N such that there exist l
disks in F with radius covering F. If the context is clear,
we simply denote N (F, Lp , ) by Np (F, ).
In this paper, we focus on the L∞ covering number
N∞ (F, ) and suppose that it satisfies the following assumption.
Assumption 1. There exists a nonnegative number β < 1
and a constant K such that log N∞ (F, ) ≤ K−β for all
∈ (0, 1].
Similar to (Massart and Nédélec 2006) and (Rejchel 2012),
we restrict to β < 1, whereas in the empirical process theory
this exponent usually belongs to [0, 2). This restriction is
needed to prove Lemma 1, which involves the integral of
log N∞ (F, ) through 0. Dudley (1974), Korostelev and Tsybakov (1993) and Mammen and Tsybakov (1995) presented
various examples of classes F satisfying Assumption 1. We
also refer interested readers to (Mammen and Tsybakov 1998,
p. 1813) for more concrete examples of hypothesis classes
with smooth boundaries satisfying Assumption 1.
4.2
order O((1/n)1/(1+β) ) achieve the same results as in (Papa,
Bellet, and Clémençon 2016)2
Remark. Theorem 1 provides universal risk bounds no matter what the distribution of the data is. The factor of 2 in front
of the approximation error inf r∈R L(r) − L∗ has no special
meaning and can be replaced by any constant larger than
1 with a cost of increasing the constant C. Wang, Guo, and
Ramon (2017) obtain risk bounds that has a factor 1 in front
of the approximation
error part, but in their result the bound
p
is O(1/ kwk1 ). Hence, Theorem 1 improves their results if
the approximation error does not dominate the other terms
in the bounds.
In the rest of this section, we outline the main ideas to
obtain this result. We first define
qr (x1 , x2 , y1,2 ) := `(r, x1 , x2 , y1,2 ) − `(r∗ , x1 , x2 , y1,2 )
for every (x1 , x2 , y1,2 ) ∈ X ×X ×Y and let Λ(r) := L(r)−
L∗ = E[qr (X1 , X2 , Y1,2 )] be the excess risk with respect to
the Bayes rule. Its empirical estimate by weighted ERM is
Λw (r) = Lw (r) − Lw (r∗ )
X
1
=
wi,j qr (Xi , Xj , Yi,j ).
kwk1
(i,j)∈E
By Hoeffding’s decomposition (Hoeffding 1948), for all
r ∈ R, one can write
ew (r),
Λw (r) = Tw (r) + Uw (r) + U
where
Risk Bounds
Now we are ready to show the tighter risk bounds for
weighted empirical risk by the following theorem.
Theorem 1 (risk bounds). Let rw be a minimizer of the
weighted empirical risk Lw over a class R that satisfies
Assumption 1. There exists a constant C > 0 such that for all
δ ∈ (0, 1], with probability at least 1 − δ, the excess risk of
rw satisfies
K 0 C log(1/δ)
L(rw ) − L∗ ≤ 2( inf L(r) − L∗ ) +
r∈R
(1 − β)2/(β+1) kwk1
β/(1+β)
kwk1
+ max kwk2 , kwkmax (log(1/δ))1/2 ,
kwk∞ (log(1/δ))
where kwkmax = maxi
√
max(K, K, K 1/(1+β) ).
(5)
qP
j:(i,j)∈E
2
wi,j
and K 0
(4)
=
According to Theorem 1, if the parameter δ is greater than
the value exp − min(kwk2 /kwk∞ , kwk22 /kwk2max ) ,
then the risk bounds above are of the order
O (1/kwk1 )1/(1+β) + kwk2 /kwk1 . In this case,
p
our bounds arep tighter than O(1/ kwk1 ) as
kwk2 /kwk1 ≤ 1/ kwk1 (recall that w must be a
fractional matching and 0 < β < 1). If G is complete
and every example is equally weighted, the bounds of the
Tw (r) = Λ(r) +
n
2 X
kwk1 i=1
X
wi,j hr (Xi )
j:(i,j)∈E
is a weighted average of i.i.d. random variables with
hr (Xi ) = E[qr (Xi , Xj , Yi,j ) | Xi ] − Λ(r),
X
1
Uw (r) =
wi,j (ĥr (Xi , Xj )
kwk1
(i,j)∈E
is a weighted degenerated (i.e., the symmetric kernel
ĥr (x1 , x2 ) such that E[ĥr (X1 , X2 ) | X1 = x1 ] = 0 for
all x1 ∈ X ) U -statistic ĥr (Xi , Xj ) = E[qr (Xi , Xj , Yi,j ) |
Xi , Xj ] − Λ(r) − hr (Xi ) − hr (Xj ) and
X
ew (r) = 1
U
wi,j h̃r (Xi , Xj , Yi,j )
kwk1
(i,j)∈E
with a degenerated kernel h̃r (Xi , Xj , Yi,j ) = qr (Xi , Xj
, Yi,j ) − E[qr (Xi , Xj , Yi,j ) | Xi , Xj ]. In the following, we
ew in (5) respectively.
bound the three terms Tw , Uw and U
Lemma 1 (uniform approximation). Under the same assumptions as in Theorem 1, for any δ ∈ (0, 1/e), we have with
probability at least 1 − δ,
√
kwk log(1/δ)
max(K, K)C1
2
sup|Uw (r)|≤
max
,
1
−
β
kwk
1
r∈R
2
They consider the same range of δ.
kwkmax (log(1/δ))3/2 kwk∞ (log(1/δ))2
,
kwk1
kwk1
Let A be the event that
sup|Uw (r)|≤ κ1 ,
r∈R
and
√
max(K, K)C2 kwk2
e
sup|Uw (r)|≤
1−β
kwk1
r∈R
kwk
3/2
kwk∞ (log(1/δ))2
max (log(1/δ))
,
+ max
kwk1
kwk1
where
κ1 =
where C1 , C2 < +∞ are constants.
ew (r) can be
To prove Lemma 1, we show that Uw (r) and U
bounded by Rademacher chaos using classical symmetrization and randomization tricks combined with the decoupling
method. We handle these Rademacher chaos by generalizing
the moment inequality for U -statistics in (Clémençon, Lugosi, and Vayatis 2008). Specifically, we utilize the moment
inequalities from (Boucheron et al. 2005) to convert them
into a sum of simpler processes, which can be bounded by the
metric entropy inequality for Khinchine-type processes (see
Arcones and Gine 1993, Proposition 2.6) and Assumption 1.
The detailed proofs can be found in Section C in the online
appendix.
Lemma 1 shows that the contribution of the degenerated
ew (r) to the excess risk can be bounded.
parts Uw (r) and U
This implies that minimizing Λw (r) is approximately equivalent to minimizing Tw (r) and thus rw is a ρ-minimizer of
Tw (r) in the sense that Tw (rw ) ≤ ρ + inf r∈R Tw (r). In
order to analyze Tw (r), which can be treated as a weighted
empirical risk on i.i.d. examples, we generalize the results in
(Massart and Nédélec 2006) (see Section B in the online appendix). Based on this result, tight bounds for the excess risk
with respect to Tw (r) can be obtained if the variance of the
excess risk is controlled by its expected value. By Lemma 2,
Tw (r) fulfills this condition, which leads to Lemma 3.
Lemma 2 (condition leads to “low-noise”, (Papa, Bellet,
and Clémençon 2016, Lemma 2)). If the learning problem
CLANET is symmetric, then
Var [E[qr (X1 , X2 , Y1,2 ) | X1 ]] ≤ Λ(r)
(6)
holds for any distribution P and any function r ∈ R.
Lemma 3 (risk bounds for i.i.d. examples). Suppose that r0
is a ρ-minimizer of Tw (r) in the sense that Tw (r0 ) ≤ ρ +
inf r∈R Tw (r) and R satisfies Assumption 1, then there exists
a constant C such that for all δ ∈ (0, 1], with probability at
least 1 − δ, the risk of r0 satisfies
kwk log(1/δ) kwk
3/2
C1
2
max (log(1/δ))
max
,
,
1−β
kwk1
kwk1
kwk∞ (log(1/δ))2
kwk1
for an appropriate constant C1 . Then by Lemma 1, P [A] ≥
1 − δ/4. Similarly, let B be the event that
ew (r)|≤ κ2 .
sup|U
r∈R
where
C2
κ2 =
1−β
kwk
3/2
kwk2
max (log(1/δ))
+ max
,
kwk1
kwk1
kwk∞ (log(1/δ))2
kwk1
for an appropriate constant C2 . Then P [B] ≥ 1 − δ/4.
By (5), it is clear that, if both A and B happen, rw is
a ρ-minimizer of Tw (r) over r ∈ R in the sense that the
difference between the value of this latter quantity at its
minimum and rw is at most (κ1 + κ2 ). Then, from Lemma 3,
with probability at least 1 − δ/2, rw is a (κ1 + κ2 )-minimizer
of Tw (r), which the result follows.
An intuition obtained from our result is how to choose
weights for networked data. By Theorem 1, to obtain tight
risk bounds, we need to maximize kwk1 (under the constraint that this weight vector is a fractional matching),
which resembles the result of (Wang, Guo, and Ramon
2017) (but they only needpto maximize kwk1 and this is
why they end in the O(1/ ν ∗ (G)) bound), while making
kwk2 , kwkmax , kwk∞ as small as possible, which appears
to suggest putting nearly average weights on examples and
vertices respectively. These two objectives, maximizing kwk1
and minimizing kwk2 , kwkmax , kwk∞ , seem to contradict
each other. In the next section, we discuss how to solve this
problem.
5
Weighting Vector Optimization
With Lemma 1 Lemma 3, now we are ready to prove
Theorem 1.
In this section, we first formulate the optimization problem
that minimizes the risk bounds in Theorem 1. Although this
optimization problem is not convex unless β = 0, which
usually means that there is no general efficient way to solve
it, we devise a fully polynomial-time approximation scheme
(FPTAS) to solve it.
Proof of Theorem 1. Let us consider the Hoeffding decomposition (5) of Λw (r) that is minimized over r ∈ R. The
idea of this proof is that the degenerate parts Uw (r) and
ew (r) can be bounded by Lemma 1. Therefore, rw is an
U
approximate minimizer of Tw (r), which can be handled by
Lemma 3.
Definition 5 (FPTAS). An algorithm A is a FPTAS for a
minimization problem Π, if for any input I of Π and > 0,
A finds a solution s in time polynomial in both the size of I
and 1/ that satisfies fΠ (s) ≤ (1 + ) · fΠ (s∗ ), where fΠ is
the (positive) objective function of Π and s∗ is an optimal
solution for I.
CK 1/(1+β) log(1/δ)
Λ(r ) ≤ 2 inf Λ(r) + 2ρ +
.
r∈R
(kwk1 (1 − β)2 )1/(1+β)
0
5.1
Optimization Problem
According to Theorem 1, given a graph G, β ∈ (0, 1) and
δ ∈ (0, 1], one can find a good weighting vector with tight
risk bounds by solving the following program:
1
β/(1+β)
min
kwk1
+ max kwk2 ,
w
kwk1
1/2
kwkmax (log(1/δ)) , kwk∞ (log(1/δ))
X
s.t. ∀(i, j) ∈ E, wi,j ≥ 0 and ∀i,
wi,j ≤ 1
Algorithm 1 FPTAS for weighting vector optimization.
Input: , β, δ and a graph G that contains n vertices and m
edges.
Output: An approximate optimal weighting vector p̄ for the
program (8).
1: Solve the following linear program (LP) efficiently3 , and
obtain an -approximation amin ;
min a
a,p
s.t. ∀(i, j) ∈ E, pi,j ≥ 0
X
∀i,
pi,j − a ≤ 0
j:(i,j)∈E
(7)
To get rid of the fraction of norms in the program above,
we consider a distribution p on P
edges pi,j := wi,j /kwk1
and then kwk1 ≤ 1/maxi=1,...,n j:(i,j)∈E pi,j . Every distribution p corresponds to a valid weighting vector w. By
introducing two auxiliary variables a and b, solving the original program (7) is equivalent to solving
min
a,b,p
s.t.
∀(i, j) ∈ E, pi,j ≥ 0
∀(i, j) ∈ E, pi,j log(1/δ) − b ≤ 0
X
∀i,
pi,j − a ≤ 0
j:(i,j)∈E
(8)
p2i,j log(1/δ)
−b≤0
∀(i, j) ∈ E, pi,j ≥ 0
∀(i, j) ∈ E, pi,j log(1/δ) − b ≤ 0
X
∀i,
pi,j − a ≤ 0
j:(i,j)∈E
(10)
1/2
and
X
pi,j = 1
Note that the constraints are all convex. If β = 0, e.g., the
hypothesis set is finite, then the objective function becomes
linear and thus (8) is a convex optimization problem that
can be solved by some convex optimization method (see
e.g., (Boyd and Vandenberghe 2004)) such as interior-point
method.
If β > 0, the objective function is not convex any more. In
fact, the program (8) becomes a concave problem that may
be optimized globally by some complex algorithms (Benson
1995, Hoffman 1981) that often need tremendous computation. Instead, one may only need to approximate it using
some efficient methods, e.g., Concave-Convex Procedure
(Yuille 2001) and Coordinate Descent (Wright 2015). However, these methods lack in complexity analysis and may lead
to a local optimum.
A Fully Polynomial-time Approximation
Scheme
To solve the program (8) efficiently, we propose Algorithm
1 and show that it is a fully polynomial-time approximation
scheme for (8).
Theorem 2. Algorithm 1 is a FPTAS for the program (8).
3
n(1 − amin )/(1 + β)} and Solutions := ∅.
3: for a ∈ Grid do
Use some efficient interior-point method to obtain an
4:
s.t.
(i,j)∈E
5.2
2: Let Grid := {amin + i · (1 + β)/n | i ∈ N and i ≤
b,p
j:(i,j)∈E
kpk2 −b ≤ 0
pi,j = 1
(i,j)∈E
min b
1/2
X
X
-approximation of the following program and add the
solution (a, b, p) into Solutions.
a1/(1+β) + b
∀i,
(9)
j:(i,j)∈E
For example, some interior-point method.
∀i,
X
p2i,j log(1/δ)
−b≤0
j:(i,j)∈E
kpk2 −b ≤ 0
and
X
pi,j = 1
(i,j)∈E
5: return the vector p̄ which makes a1/(1+β) + b smallest
from Solutions.
Proof. We first analyze the running time of this algorithm.
Note that 1/n ≤ a ≤ 1 if the graph is not empty. In
Algorithm 1, we first divide the problem into at most
1 − 1/n
n−1
=
(1 + β)/n
(1 + β)
convex programs, each of which produces an -approximate
solution by some interior-point method. Since interior-point
method is FPTAS for convex problems (Boyd and Vandenberghe 2004), solving each of these programs needs polynomial time in the problem size m + n and 1/. Thus, the
complexity of Algorithm 1 is also polynomial in m + n and
1/.
Now we show that this algorithm indeed results in an approximation of this optimal solution.
For any optimal solution (a∗ , b∗ , p∗ ), if a∗ achieves minimum for the program (9), we can find a0 in Grid (actually
amin ) such that
X1
0 1/(1+β)
(a )
1/(1+β)
≤ (1 + )
(a )
∗ 1/(1+β)
≤ (1 + )(a )
X2
X1
X2
X1
X4
X3
X2
∗ 1/(1+β)
.
0
X3
(11)
X1
∗
0
Otherwise, we can also find a in Grid such that a ≤ a <
a∗ + (1 + β)/n and thus
X2
X3
(a)
X4
(b)
X3
(c)
X4
(d)
(a0 )1/(1+β) ≤ (a∗ + (1 + β)/n)1/(1+β)
≤ (a∗ )1/(1+β) + (1 + β)/n
1
(a∗ )−β/(1+β)
1+β
(12)
≤ (1 + )(a∗ )1/(1+β)
The third inequality follows from the fact that 1/n ≤ a∗ .
We assume that the optimal solution for the program (10) is
b = b0 when we fix a = a0 . Because (a∗ , b∗ ) is feasible and
a0 > a∗ , (a0 , b∗ ) is always a feasible solution for the program
(10), which leads to b0 ≤ b∗ . Besides, interior-point method
can produce an -approximate solution b00 such that
b00 ≤ (1 + )b0 ≤ (1 + )b∗ .
(13)
Finally, we select the best approximate weighting vector p̄
from all solutions in Solutions. Combining (11), (12) and
(13), we have the objective value for p̄
(ap̄ )1/(1+β) + bp̄ ≤ (a0 )1/(1+β) + b00
≤ (1 + )((a∗ )1/(1+β) + b∗ ).
6
Discussion
In this section, we first show that, according to our bounds,
equal weighting is indeed the best weighting scheme for
complete graphs. Then, we discuss the performance of this
equal weighting scheme when the graph is incomplete.
6.1
Complete Graphs
When graph G is complete, weighting all examples
equally gives
P the best risk bound, as all the terms
maxi=1,...,n j:(i,j)∈E pi,j , kpk2 , kpkmax and kpk∞
achieve minimum. Compared to the results in (Wang, Guo,
and Ramon 2017), our theory puts additional constrains on
kpk2 , kpkmax and kpk∞ which encourages weighting examples fairly in this case, as illustrated in Figure 1. Besides,
this scheme, which coincides with U -statistics that average
the basic estimator applied to all sub-samples, produces the
smallest variance among all unbiased estimators (Hoeffding
1948).
6.2
Figure 1: (a) and (b) are two different data graphs, but both of
them correspond to the same line graph (a triangle). (c) and
(d) are two weighting schemes for a complete graph formed
by points X1 , X2 , X3 , X4 . Solid line means its weight p > 0
while dash line means p = 0. (c): Weight every example
equally. (d): Only the two examples in an independent subset get equally non-zero weights and
P other weights are 0
(dashed line). Note that maxi=1,...,n j:(i,j)∈E pi,j of these
two weighting schemes are the same, but (c) has the tighter
risk bounds, as kpk2 , kpkmax and kpk∞ of (c) are smaller
than that of (d) respectively.
Equal Weighting
Let us discuss further the equal weighting scheme that gives
every example the same weight. Denote by ∆(G) the maximum degree of G (note that this is not the maximum degree
of DG ) and let pi,j = 1/m (recall that m is the number of
examples) for all (i, j) ∈ E. According to program (8), using
equal weighting scheme, the risk bounds are of the order
∆(G) 1/(1+β)
1
O (
)
+√
,
(14)
m
m
if δ ∈ (exp(−m/∆(G)), 1]. In some cases, such as bounded
degree graphs and complete graphs, this scheme provides
reasonable risk bounds. Note that ∆(G) is smaller than the
maximum size of cliques in its corresponding line graph DG
and χ∗ (DG ) is larger than the maximum size of cliques in
DG , these bounds
p above are always better than the bounds of
the order O( χ∗ (DG )/m) built by Janson’s decomposition.
However, as argued in Section 2, one can construct examples to illustrate that if we use the equal weighting strategy
when ∆(G) is large (e.g., if it is linear to m), the risk bounds
(14) are very large and do not converge to 0, while this problem can be solved by simply using a better weighting strategy.
Example 2. Consider a data graph with |E|= m 1 and E
consists of m/2 disjoint edges and m/2 edges sharing a common vertex, then ∆(G) = m/2. Using the equal weighting
scheme, the risk bounds are of the order O(1) that is meaningless. A much better weighting scheme of this case is to weight
the examples of disjoint edges with 2/(m + 2) while weight
the examples of adjacent edges with
pro 4/m(m + 2), which
p
1/(1+β)
vides risk bounds of the order O (1/m)
+ 1/m .
7
Conclusion
In this paper, we consider weighted ERM of the symmetric
CLANET problem and establish new universal risk bounds under the “low-noise” condition. These new bounds are tighter
in the case of incomplete graphs and can be degenerate to
the known tightest bound when graphs are complete. Based
on this result, one can train a classifier with a better risk
bound by putting proper weights on training examples. We
propose an efficient algorithm to obtain the approximate optimal weighting vector and prove that the algorithm is a FPTAS
for the weighting vector optimization problem. Finally, we
discuss two cases to show the merits of our new risk bounds.
Acknowledgments
The authors would like to thank the anonymous reviewers
for their helpful comments. This work was supported by
Guangdong Shannon Intelligent Tech. co., Ltd., National Key
R&D Program of China (2017YFC0803700), National Natural Science Foundation of China (61502320, 61420106013,
61521092) and Science Foundation of Shenzhen City in
China (JCYJ20160419152942010).
References
[Arcones and Gine 1993] Arcones, M. A., and Gine, E. 1993.
Limit theorems for u-processes. The Annals of Probability
1494–1542.
[Benson 1995] Benson, H. P. 1995. Concave Minimization:
Theory, Applications and Algorithms. Springer US.
[Biau and Bleakley 2006] Biau, G., and Bleakley, K. 2006.
Statistical inference on graphs. Statistics & Decisions
24(2):209–232.
[Boucheron et al. 2005] Boucheron, S.; Bousquet, O.; Lugosi,
G.; Massart, P.; et al. 2005. Moment inequalities for functions
of independent random variables. The Annals of Probability
33(2):514–560.
[Bousquet 2002] Bousquet, O. 2002. A bennett concentration inequality and its application to suprema of empirical
processes. Comptes Rendus Mathematique 334(6):495–500.
[Boyd and Vandenberghe 2004] Boyd, S., and Vandenberghe,
L. 2004. Convex optimization. Cambridge university press.
[Clémençon, Lugosi, and Vayatis 2008] Clémençon, S.; Lugosi, G.; and Vayatis, N. 2008. Ranking and empirical
minimization of u-statistics. Annals of Statistics 36(2):844–
874.
[Cucker and Zhou 2007] Cucker, F., and Zhou, D. X. 2007.
Learning theory: an approximation theory viewpoint, volume 24. Cambridge University Press.
[Dawson et al. 2014] Dawson, S.; Gašević, D.; Siemens, G.;
and Joksimovic, S. 2014. Current state and future trends:
A citation network analysis of the learning analytics field.
In Proceedings of the Fourth International Conference on
Learning Analytics and Knowledge, 231–240.
[De la Pena and Giné 2012] De la Pena, V., and Giné, E.
2012. Decoupling: from dependence to independence.
Springer Science & Business Media.
[Dudley 1974] Dudley, R. M. 1974. Metric entropy of some
classes of sets with differentiable boundaries. Journal of
Approximation Theory 10(3):227–236.
[Garcia-Duran et al. 2016] Garcia-Duran, A.; Bordes, A.;
Usunier, N.; and Grandvalet, Y. 2016. Combining two
and three-way embedding models for link prediction in
knowledge bases. Journal of Artificial Intelligence Research
55:715–742.
[Hoeffding 1948] Hoeffding, W. 1948. A class of statistics
with asymptotically normal distribution. The Annals of Mathematical Statistics 293–325.
[Hoffman 1981] Hoffman, K. L. 1981. A method for globally
minimizing concave functions over convex sets. Mathematical Programming 20(1):22–32.
[Janson 2004] Janson, S. 2004. Large deviations for sums of
partly dependent random variables. Random Structures &
Algorithms 24(3):234–248.
[Korostelev and Tsybakov 1993] Korostelev, A. P., and Tsybakov, A. B. 1993. Minimax Theory of Image Reconstruction.
Springer-Verlag.
[Li et al. 2016] Li, J.; Hu, X.; Wu, L.; and Liu, H. 2016.
Robust unsupervised feature selection on networked data. In
Proceedings of the 2016 SIAM International Conference on
Data Mining, 387–395.
[Liben-Nowell and Kleinberg 2007] Liben-Nowell, D., and
Kleinberg, J. 2007. The link-prediction problem for social networks. Journal of the Association for Information
Science and Technology 58(7):1019–1031.
[Liu 2009] Liu, T.-Y. 2009. Learning to rank for information
retrieval. Foundations and Trends R in Information Retrieval
3(3):225–331.
[Macskassy and Provost 2007] Macskassy, S. A., and
Provost, F. 2007. Classification in networked data: A toolkit
and a univariate case study. Journal of Machine Learning
Research 8(May):935–983.
[Mammen and Tsybakov 1995] Mammen, E., and Tsybakov,
A. B. 1995. Asymptotical minimax recovery of sets with
smooth boundaries. Annals of Statistics 23(2):502–524.
[Mammen and Tsybakov 1998] Mammen, E., and Tsybakov,
A. B. 1998. Smooth discrimination analysis. Annals of
Statistics 27(6):1808–1829.
[Massart and Nédélec 2006] Massart, P., and Nédélec, É.
2006. Risk bounds for statistical learning. Annals of Statistics
2326–2366.
[Min and Wynter 2011] Min, W., and Wynter, L. 2011. Realtime road traffic prediction with spatio-temporal correlations.
Transportation Research Part C: Emerging Technologies
19(4):606–616.
[Papa, Bellet, and Clémençon 2016] Papa, G.; Bellet, A.; and
Clémençon, S. 2016. On graph reconstruction via empirical
risk minimization: Fast learning rates and scalability. In
Advances in Neural Information Processing Systems, 694–
702.
[Ralaivola and Amini 2015] Ralaivola, L., and Amini, M.-R.
2015. Entropy-based concentration inequalities for dependent
variables. In International Conference on Machine Learning,
2436–2444.
[Ralaivola, Szafranski, and Stempfel 2009] Ralaivola,
L.;
Szafranski, M.; and Stempfel, G. 2009. Chromatic pac-bayes
bounds for non-iid data. In Artificial Intelligence and
Statistics, 416–423.
[Rejchel 2012] Rejchel, W. 2012. On ranking and generalization bounds. Journal of Machine Learning Research
13(May):1373–1392.
[Scott 2017] Scott, J. 2017. Social network analysis. Sage.
[Szklarczyk et al. 2014] Szklarczyk, D.; Franceschini, A.;
Wyder, S.; Forslund, K.; Heller, D.; Huerta-Cepas, J.; Simonovic, M.; Roth, A.; Santos, A.; Tsafou, K. P.; et al. 2014.
String v10: protein–protein interaction networks, integrated
over the tree of life. Nucleic Acids Research 43(D1):D447–
D452.
[Tsybakov 2004] Tsybakov, A. B. 2004. Optimal aggregation
of classifiers in statistical learning. Annals of Statistics 135–
166.
[Usunier, Amini, and Gallinari 2006] Usunier, N.; Amini,
M.-R.; and Gallinari, P. 2006. Generalization error bounds
for classifiers trained with interdependent data. In Advances
in neural information processing systems, 1369–1376.
[Vapnik and Chervonenkis 1971] Vapnik, V., and Chervonenkis, A. Y. 1971. On the uniform convergence of relative frequencies of events to their probabilities. Theory of
Probability & Its Applications 16(2):264–280.
[Wang, Guo, and Ramon 2017] Wang, Y.; Guo, Z.-C.; and
Ramon, J. 2017. Learning from networked examples. In Proceedings of the 28th International Conference on Algorithmic
Learning Theory, to appear.
[Wright 2015] Wright, S. J. 2015. Coordinate descent algorithms. Mathematical Programming 151(1):3–34.
[Yuille 2001] Yuille, A. L. 2001. The concave-convex procedure (cccp). In Advances in Neural Information Processing
Systems 14, 915 – 936.
Appendix
This appendix is organized as follows. Section A provides
new risk bounds for weighted ERM following the Janson’s
decomposition and show that it cannot improve prior results.
Section B establishes universal risk bounds for weighted
ERM on i.i.d. examples under the ”low-noise” condition
and proves upper bounds involved in covering number for
weighted empirical processes. Section C presents the classical
symmetrization and randomization tricks and decoupling inequality for degenerated weighted U -processes and the degenew (r). Then, some useful inequalities including
erated part U
the moment inequality are proved for weighted Rademacher
chaos. We mainly use these inequalities to bound Uw (r) and
ew (r). Section D provides technical proofs omitted from the
U
main track and the appendix. For the sake of completeness,
we present the Khinchine inequality and the metric entropy
inequality for Rademacher chaos in Section E.
A
Janson’s Decomposition
There are literatures that use Janson’s decomposition derived from (Janson 2004) to study the problem learning
from networked examples (Usunier, Amini, and Gallinari
2006, Biau and Bleakley 2006, Ralaivola, Szafranski, and
Stempfel 2009, Ralaivola and Amini 2015). They usually
model the networked data with the line graph of G.
Definition 6 (line graph). Let G = (V, E) be a data graph
we consider in the main track. We define the line graph of
G as a graph DG = (DV , DE ), in which DV = E and
{i, j} ∈ DE if and only if ei ∩ ej 6= ∅ in G.
This framework differs from our setting and detains less
information from the data graph, as argued in Section 2. One
can analyze this framework by the fractional coloring and the
Janson’s decomposition.
Definition 7 (fractional coloring). Let DG = (DV , DE ) be
a graph. C = {(Cj , qj )}j∈(1,...,J) , for some positive integer
J, with Cj ⊆ DV and qj ∈ [0, 1] is an fractional coloring of
DG , if
• ∀j, Cj is an independent set, i.e., there is no connection
between vertices in Cj .
P
• it is an exact cover of G: ∀v ∈ DV , j:v∈Cj qj = 1.
PJ
The weight W (C) of C is given by W (C) = j=1 qj and
the minimum weight χ∗ (DG ) = minC W (C) over the set of
all fractional colorings is the fractional chromatic number
of DG . By the Janson’s decomposition, one splits all examples into several independent sets according to a fractional
coloring of DG and then analyze each set using the standard
method for i.i.d. examples.
In particular, Theorem 3 (also see Usunier, Amini, and Gallinari 2006, Theorem 2) provides a variation of McDiarmid’s
theorem using the Janson’s decomposition. For simplicity, let
m
S = {zi }m
and
i=1 be the training examples drawn from Z
i
SCj be the examples included in Cj . Also, let kj be the index
of the i-th example of Cj in the training set S.
Theorem 3. Using the notations defined above, let C =
{(Cj , qj )}Jj=1 be a fractional coloring of DG . Let f : Z m →
R such that
• there exist J functions Z |Cj | → R which satisfy ∀S ∈ Z m ,
PJ
f (S) = j=1 qj fj (SCj ).
• there exist ci , . . . , cm ∈ R+ such that ∀j, ∀SCj , SCkj such
that SCj and SkCj differ only in the k-th example, |fj (SCj )−
fj (SCkj )|≤ ckji .
Then, we have
P [f (S) − E[f (S)] ≥ ] ≤ exp −
A.1
22
Pm
χ∗ (DG ) i=1 c2i
.
Weighted ERM
Using the above theorem, we show that the risk bounds for
weighted ERM derived from the Janson’s decomposition
cannot improve the results of (Usunier, Amini, and Gallinari
2006), as shown in the following theorem.
Theorem 4. Consider a minimizer rw of the weighted empirical risk Lw over a class R. For all δ ∈ (0, 1], with probability
at least 1 − δ, we have
p
kwk2
L(r) − Lw (r) ≤ R∗w (R, S) + χ∗ (DG ) log(1/δ)
kwk1
where
J
X
X
2
R∗w (R, S) = Eσ
qj sup
wkji σ i r(zkji ) .
N
r∈R
j=1
i∈Cj
is the weighted empirical fractional Rademacher complexity
of R with respect to DG .
In this setting, although the weights w are no limit to
the fractional matching, the risk bounds cannot improve the
results of p
(Usunier, Amini, and Gallinari 2006),
√ which is of
the order χ∗ (DG )/m, as kwk2 /kwk1 ≤ 1/ m.
A.2
“Low-noise” Condition
If we considering the complete graph with equal weighting
scheme, by the Janson’s decomposition, the empirical risk
Lm (L) can be represented as an average of sums of i.i.d. r.v.’s
bm/2c
X
1
1 X
`(r, (Xπ(i) , Xπ(i)+bm/2c ,
m!
bm/2c i=1
π∈Gn
(15)
Yπ(i),π(i)+bm/2c ))
where the sum is taken over all permutations of Gm , the
symmetric group of order m, and buc denotes the integer part
of any u ∈ R. From (Biau and Bleakley 2006),
√ the bounds for
excess risk of (15) are of the order O(1/ n). Moreover, by
the result in (Ralaivola and Amini 2015), tighter risk bounds
may be obtained under the following assumption which can
lead to “low-noise” condition (Tsybakov 2004, Massart and
Nédélec 2006).
Assumption 2. There exists C > 0 and θ ∈ [0, 1] such that
for all > 0,
1
P |η(X1 , X2 ) − |≤ ≤ Cθ/(1−θ) .
2
The risk bounds of the order O(log(n)/n) may be
achieved if θ = 1 (Massart and Nédélec 2006), which however is very restrictive. We can use the example in Papa,
Bellet, and Clémençon (2016) to show this.
Example 3. Let N be a positive integer. For each vertex
i ∈ {1, . . . , n}, we observe Xi = (Xi1 , Xi2 ) where Xi1 and
Xi2 are two distinct elements drawn from {1, . . . , N }. This
may, for instance, correspond to the two preferred items of a
user i among a list of N items. Consider now the case that
two nodes are likely to be connected if they share common
preference, e.g., Yi,j ∼ Ber(#(Xi ∩ Xj )/2). One can easily check that P [|η(X1 , X2 ) − 1/2|= 0] > 0, so tight risk
bounds cannot be obtained for minimizers of (15).
B
Universal Risk Bounds for Weighted ERM
on i.i.d. Examples
In section 3, the excess risk is split into two types of processes:
the weighted empirical process of i.i.d. examples and two
degenerated processes. In this section, we prove general risk
bounds for the weighted empirical process of i.i.d. examples.
The main idea is similar to (Massart and Nédélec 2006) that
tighter bounds for the excess risk can be obtained if the
variance of the excess risk is controlled by its expected value.
B.1
Bennett Concentration Inequality
First, we prove a concentration inequality for the supremum
of weighted empirical processes derived from (Bousquet
2002).
Theorem 5. Assume the (X1 , . . . , Xi ) are i.i.d. random variable according to P . Let F be a countable set of functions
from X to R and assume that all functions f in F are P measurable and square-integrable. If supf ∈F |f |≤ b, we denote
n
1 X
wi (f (Xi ) − E[f (Xi )]).
Z = sup
f ∈F kwk1 i=1
which {wi }ni=1 are bounded weights such that 0 ≤ wi ≤ 1
for i = 1, . . . , n and kwk1 > 0. Let σ be a positive real
number such that σ 2 ≥ supf ∈F Var[f (X)] almost surely,
then for all x ≥ 0, we have
v
u kwk2
u 2(
2
2 + 4bE[Z])x
σ
2bx
t kwk1
−x
P Z − E[Z] ≥
+
≤e .
kwk1
3kwk1
(16)
It is a variant of Theorem 2.3 of (Bousquet 2002) by just
applying Theorem 2.1 of (Bousquet 2002) with the weighted
empirical process. Then, by Theorem 5, we can generalize
the results of (Massart and Nédélec 2006) to weighted ERM.
We start by describing the probabilistic framework adapts to
our problem.
B.2
General Upper Bounds
Suppose that one observes independent variable ξ1 , . . . , ξn
taking their values in some measurable space Z with common
distribution P . For every i, the variable ξi = (Xi , Yi ) is a
copy of a pair of random variables (X, Y ) where X take its
values in measurable space X . Think of R as being the set of
all measurable functions from X to {0, 1}. Then we consider
some loss function
γ : R × Z → [0, 1].
(17)
Basically one can consider some set R, which is known to
contain the Bayes classifier r∗ that achieves the best (smallest) expected loss P [γ(r, ·)] when r varies in R. The relative
expected loss `¯ is defined by
¯ ∗ , r) = P [γ(r, ·) − γ(r∗ , ·)], ∀r ∈ R
`(r
(18)
Since the empirical process on i.i.d. examples split from the
excess risk is with non-negative weights on all examples, we
define the weighted loss as
n
1 X
γw (r) =
wi γ(r, ξi )
(19)
kwk1 i=1
where
Pn 0 ≤ wi ≤ 1 for all i = 1, . . . , n and kwk1 =
i=1 wi > 0. Weighted ERM approach aims to find a minimizer of the weighted empirical loss r̂ in the hypothesis set
R ⊂ R to approximate r∗ .
We introduce the weighted centered empirical process γw
defined by
γw (r) = γw (r) − P [γ(r, ·)].
(20)
¯ we shall
In addition to the relative expected loss function `,
need another way to measure the closeness between the elements of R. Let d be some pseudo-distance on R × R such
that
Var[γ(r, ·) − γ(r∗ , ·)] ≤ d2 (r, r∗ ), ∀r ∈ R.
(21)
A tighter risk bound for weighted ERM is derived from
Theorem 5 which combines two different moduli of uniform
continuity: the stochastic modulus of uniform continuity of
γw over R with respect to d and the modulus of uniform
¯
continuity of d with respect to `.
Next, we need to specify some mild regularity conditions
functions that we shall assume to be verified by the moduli
of continuity involved in the following result.
Definition 8. We denote by D the class of nondecreasing
and continuous functions ψ from R+ to R+ such that x →
ψ(x)/x is nonincreasing on (0, +∞) and ψ(1) ≥ 1.
In order to avoid measurability problems, we need to consider some separability condition on R. The following one
will be convenient.
Assumption 3. There exists some countable subset R0 of R
such that, for every r ∈ R, there exists some sequence {rk }
of elements of R0 such that, for every ξ ∈ Z, γ(rk , ξ) tends
to γ(r, ξ) as k tends to infinity.
The upper bound for the relative expected loss of any empirical risk minimizer on some given model R will depend
¯ ∗ , R) = inf r∈R `(r
¯ ∗ , r) and the flucon the bias term `(r
tuations of the empirical process γw on R. As a matter of
fact, we shall consider some slightly more general estimators. Namely, given some nonnegative number ρ, we consider
some ρ-empirical risk minimizer, that is, any estimator r
taking its values in R such that γw (r̂) ≤ ρ + inf r∈R γw (r).
Theorem 6 (risk bound for weighted ERM). Let γ be a loss
function such r∗ minimizes P [γ(r, ·)] when r varies in R. Let
φ and ψ belong to the class of functions D defined above and
let R be a subset of R satisfying the separability Assumption
3. Assume that, on the one hand,
p
q
kwk1
∗
¯ ∗ , r)), ∀r ∈ R,
(22)
d(r , r) ≤
ψ( `(r
kwk2
and that, on the other hand, one has, for every r ∈ R0 ,
p
sup
kwk1 E
[γw (r0 ) − γw (r) ≤ φ(σ)
kwk2
kwk1
r 0 ∈R0 , √
d(r 0 ,r)≤σ
Lemma 4. Let F be a countable collection of measurable
functions such that f ∈ [0, 1] for every f ∈ F, and let f0
be a measurable function such that f0 ∈ [0, 1]. Let σ be a
positive number such that P [|f − f0 |] ≤ σ 2 for every f ∈ F.
Then, setting
Z σ
ϕ(σ) =
(log N∞ (F, 2 ))1/2 d,
0
the following inequality is available:
p
kwk1 max(E[sup vw (f0 − f )], E[sup vw (f − f0 )])
f ∈F
≤ 12ϕ(σ).
p
provided that 4ϕ(σ) ≤ σ 2 kwk1 .
C
ew (r)
Inequalities for Uw (r) and U
In this section, we first show the classical symmetrization and randomization tricks for the degenerated weighted
ew (r).
U -statistics Uw (r) and the degenerated part U
Then we establish general exponential inequalities for
weighted Rademacher chaos. This result is generalized from
(Clémençon, Lugosi, and Vayatis 2008) based on moment inequalities obtained for empirical processes and Rademacher
chaos in (Boucheron et al. 2005). With this moment inequality, we prove the inequality for weighted Rademacher chaos,
which involves the L∞ covering number of the hypothesis
set.
Lemma 5 (decoupling and undecoupling). Let (Xi0 )ni=1 be
an independent copy of the sequence (Xi )ni=1 . Then, for all
q ≥ 1, we have:
X
E[ sup |
wi,j fi,j (Xi , Xj )|q ]
fi,j ∈F
(23)
for every positive σ such that φ(σ) ≤ kwk1 σ 2 , where
R0 is given by Assumption 3. Let ∗ be the unique positive
solution of the equation
p
kwk1 2∗ = φ(ψ(∗ )).
(24)
fi,j ∈F
Maximal Inequality for Weighted Empirical
Processes
Next, we present the maximal inequality involved in covering
number for weighted empirical processes. Let us fix some
notation. We consider i.i.d. random variables ξ1 , . . . , ξn with
values in some measurable space Z and common distribution
P . For any
-integrable function f on Z, we define Pw (f ) =
PP
n
1
w
i
i=1 f (ξi ) and vw (f ) = Pw (f ) − P (f ) where
kwk1
Pn
0 ≤ wi ≤ 1 for all i = 1, . . . , n and kwk1 = i=1 wi >
0. Given a collection F of P -integrable functions f , our
purpose is to control the expectation of supf ∈F vw (f ) or
supf ∈F −vw (f ).
X
wi,j fi,j (Xi , Xj0 )|q ]
(26)
(i,j)∈E
If the functions fi,j are symmetric in the sense that for all
Xi , Xj ,
fi,j (Xi , Xj ) = fj,i (Xj , Xi )
and (wi,j )(i,j)∈E is symmetric, then the inequality can be
reversed, that is,
X
E[ sup |
wi,j fi,j (Xi , Xj0 )|q ]
fi,j ∈F
B.3
(i,j)∈E
≤ 4q E[ sup |
p
Then there exists an absolute constant K such that, for every
y ≥ 1, the following inequality holds:
∗
¯ , r̂) > 2ρ + 2`(r
¯ ∗ , R) + Ky2 ≤ e−y .
P `(r
(25)
∗
f ∈F
(i,j)∈E
≤ 4q E[ sup |
fi,j ∈F
X
wi,j fi,j (Xi , Xj )|q ]
(27)
(i,j)∈E
Lemma 6 (randomization). Let (σi )ni=1 and (σi0 )ni=1 be two
independent sequences of i.i.d. Radermacher variables, independent from the (Xi , Xi0 )’s. If f is degenerated, we have
for all q ≥ 1,
X
E[sup |
wi,j f (Xi , Xj0 )|q ]
f ∈F
(i,j)∈E
≤ 4q E[sup |
f ∈F
X
(i,j)∈E
σi σj0 wi,j f (Xi , Xj0 )|q ]
Lemma 7. Let (Xi0 )ni=1 be an independent copy of the sequence (Xi )ni=1 . Consider random variables valued in {0, 1},
(Ỹi,j )(i,j)∈E , conditionally independent given the Xi0 ’s and
the Xi ’s and such that P [Ỹi,j = 1 | Xi , Xj0 ] = η(Xi , Xj0 ).
We have for all q ≥ 1,
X
E[sup|
wi,j h̃r (Xi , Xj , Yi,j )|q ]
r∈R
(i,j)∈E
X
≤ 4q E[sup|
r∈R
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
(28)
(i,j)∈E
and the inequality can be reversed,
X
E[sup|
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
r∈R
(i,j)∈E
X
≤ 4q E[sup|
r∈R
wi,j h̃r (Xi , Xj , Yi,j )|q ]
(29)
(i,j)∈E
Lemma 8. Let (σi )ni=1 and (σi0 )ni=1 be two independent sequences of i.i.d. Radermacher variables, independent from
the (Xi , Xi0 , Yi,j , Ỹi,j )’s. Then, we have for all q ≥ 1,
X
E[sup|
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
r∈R
1
t
t
min (
)2 ,
,
C
E[Uσ ]
E[M ] + F kwk2
s
t
t
(
)2/3 ,
kwkmax F
kwk∞ F
qP
2
where kwkmax = maxi
j:(i,j)∈E wi,j .
≤ exp
If the hypothesis set F is a subset of L ∞ (X 2 ) (upper
bounds on the uniform covering number with L∞ metric
can be calculated (Cucker and Zhou 2007)), we show E[Zσ ],
E[Uσ ] and E[M ] can be bounded by N∞ (F, ) since all these
Rademacher random variables satisfy the Khinchine inequality (see Section E). Following the metric entropy inequality
for Khinchine-type processes (see Section E), it is easy to get
the following Corollary.
Corollary 1. With the same setting of Theorem 7, if F ⊂
L ∞ (X 2 ), we have for any δ < 1/e,
P [Z ≤ κ] ≥ 1 − δ
where
Z
κ ≤C kwk2
X
≤ 4 E[sup|
r∈R
with a universal constant C.
D
D.1
Technical Proofs
Proofs Omitted in Section 4
Proof of Lemma 1. Since R ⊂ L ∞ (X 2 ) (Assumption 1),
by Corollary 1, the weighted degenerated U -process
supr∈R |Uw (r)| can be bounded by the L∞ covering number
of R, that is, for any δ ∈ (0, 1/e), we have
P [sup|Uw (r)|≤ κ] ≥ 1 − δ
r∈R
(i,j)∈E
where E[f (X, x)] = 0 for all x ∈ X , f ∈ F. Assume also
for all x, x0 ∈ X , f (x, x0 ) = f (x0 , x) (symmetric) and
supf ∈F kf k∞ = F . Let (σ i )ni=1 be i.i.d. Rademacher random variables and introduce the random variables
X
Zσ = sup |
wi,j σi σj f (Xi , Xj )|
f ∈F
where
κ≤
Z 1
C1
kwk2
log N∞ (R, )d
kwk1
0
Z 1p
log N∞ (R, )d,
+ max kwk2 log(1/δ)
0
(i,j)∈E
(log(1/δ))
Uσ = sup
X
sup
f ∈F α:kαk2 ≤1
M=
sup
f ∈F ,k=1,...,n
|
3/2
kwkmax , (log(1/δ))2 kwk∞
.
wi,j σi αj f (Xi , Xj )
(i,j)∈E
X
wi,k σi f (Xi , Xk )|
i:(i,k)∈E
Then exists a universal constant C such that for all n and
t > 0,
P [Z ≥ CE[Zσ ] + t]
2F
p
log N∞ (F, )d,
0
(log(1/δ))3/2 kwkmax , (log(1/δ))2 kwk∞ .
(i,j)∈E
f ∈F
log N∞ (F, )d
Z
+ max kwk2 log(1/δ)
σi σj0 wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
Lemma 5 and 6 are applications of Theorem 3.1.1 and
Theorem 3.5.3 of (De la Pena and Giné 2012) respectively,
providing decoupling and randomization inequalities for degenerated weighted U -statistics of order 2. Lemma 7 and
8 are the variants of Lemma 5 and 6 respectively, which is
ew (r).
suitable for the degenerated part U
Theorem 7 (moment inequality). Let X, X1 , . . . , Xn be i.i.d.
random variables and let F be a class of kernels. Consider
a weighted Rademacher chaos Zσ of order 2 on the graph
G = (V, E) indexed by F,
X
Z = sup |
wi,j f (Xi , Xj )|
2F
0
(i,j)∈E
q
−
with a universal constant C1 < ∞. Then the first inequality
for supr∈R |Uw (r)| follows the fact that R satisfies Assumption 1. Similarly, by Lemma 7 and Lemma 8, we can convert
ew (r)| to the moment of Rademacher
the moment of supr∈R |U
chaos
X
4q E[sup|
σi σj0 wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
r∈R
(i,j)∈E
which can be handled by the by-products of Theorem 7. More
specifically, using (46) and (47) combined with the arguments
in Corollary 1 and Assumption 1 will gives the second inew (r)|.
equality for supr∈R |U
Proof of Lemma 2. For any function r ∈ R, observe first
that
E[qr (X1 , X2 , Y1,2 ) | X1 ]
= E[E[qr (X1 , X2 , Y1,2 ) | X1 , X2 ] | X1 ]
= E[|1 − 2η(X1 , X2 )|1r(X1 ,X2 )6=r∗ (X1 ,X2 ) | X1 ]
Then observing that
|1 − 2η(X1 , X2 )|2 ≤ |1 − 2η(X1 , X2 )|
which implies that the modulus of continuity ψ can be taken
as
√
ψ() = 5.
(31)
Then from Lemma 4, we have
p
sup
kw̄k1 E
|γw̄ (r) − γw̄ (r0 )| ≤ φ(σ).
kw̄k2
r 0 ∈R, √
kw̄k1
d(r,r 0 )≤σ
p
provided that φ(σ)/3 ≤ kw̄k1 σ 2 . It remains to bound the
excess risk of rw by the tight bounds for weighted ERM on
i.i.d. examples by Theorem 6. For any δ ∈ (0, 1), we have
with probability at least 1 − δ,
L(rw ) − L∗ ≤ 2( inf L(r) − L∗ ) + 2ρ
r∈R
almost sure, and combining with Jensen inequality, we have
+ K log(1/δ)2∗ )
Var[E[qr (X1 , X2 , Y1,2 ) | X1 ]]
where C is a universal constant and ∗ is the unique positive
solution of the equation
p
kw̄k1 2∗ = φ(ψ(∗ )).
≤ E[(E[qr (X1 , X2 , Y1,2 ) | X1 ])2 ]
≤ E[|1 − 2η(X1 , X2 )|1r(X1 ,X2 )6=r∗ (X1 ,X2 ) ]
= Λ(r).
Proof of Lemma 3. First, we introduce some notations of
weighted
ERM of the i.i.d. case. We denote {w̄i =
P
j:(i,j)∈E wi,j : i = 1, . . . , n} the weights on vertices and
introduce the “loss function”
γ(r, X) = 2hr (X) + Λ(r)
n
1 X
w̄i γ(r, Xi ) = Tw (r).
kw̄k1 i=1
n
1 X
w̄i (γ(r, Xi ) − Λ(r))
kw̄k1 i=1
Proof Omitted in Section A
i∈Cj
(33)
Now, consider, for each j,
X wkji
(E[`(r, z)] − `(r, zkji )).
fj (SCj ) = sup
kwk1
r∈R
and the pseudo-distance
p
1/2
kw̄k1
0
d(r, r ) =
E[(γ(r, X) − γ(r0 , X))2 ]
kw̄k2
for every r, r0 ∈ R. Let φ be
Z σ
φ(σ) = 12
(log N∞ (R, 2 ))1/2 d.
which completes the proof.
Proof of Theorem 4. We write, for all r ∈ R,
"
#
m
1 X
L(r) − Lw (r) ≤ sup E[`(r, z)] −
wi `(r, zi )]
kwk1 i=1
r∈R
J
X
X wkji
≤
pj sup
(E[`(r, z)] − `(r, zkji )) .
kwk
1
r∈R
j=1
Define centered empirical process
γw̄ (r) =
When R satisfies Assumption 1, there exists a universal constant C 0 such that
1
2∗ ≤ C 0 K 1/(1+β) (
)1/(1+β)
(1 − β)2 kw̄k1
D.2
and the weighted empirical loss of vertices
γw̄ (r) =
(32)
i∈Cj
(30)
0
From the definition of “loss function” γ, we have the excess
risk of r is
¯ r∗ ) = Λ(r) − Λ(r∗ ) = Λ(r).
`(r,
According to Lemma 1, as Λ2 (r) ≤ Λ(r), we have for every
r ∈ R,
p
q
kw̄k1
∗
¯ r∗ )
d(r, r ) ≤
5`(r,
kw̄k2
Let f is defined by, for all training set S, f (S) =
PJ
j=1 pj fj (SCj ), then f satisfies the conditions of Theorem 3 with, for any i ∈ {1, . . . , m}, βi ≤ wi /kwk1 . Therefore, we can claim that, with probability at least 1 − δ,
"
"
##
m
1 X
wi `(r, zi )]
L(r) − Lw (r) ≤ E sup E[`(r, z)] −
kwk1 i=1
r∈R
+
p
χ∗ (DG ) log(1/δ)
kwk2
kwk1
Then, using the standard symmetrization technique (see
Usunier, Amini, and Gallinari 2006, Theorem 4), one can
bound the first item in the right hand side by R∗w (R, S) which
completes the proof.
D.3
Proofs Omitted in Section B
Proof of Theorem 5. We use an auxiliary random variable
n
X
e = kwk1 Z = sup 1
Z
wi (f (Xi ) − E[f (Xi )]).
2b
f ∈F 2b i=1
We denote by fk a function such that
X
1
fk =
sup
wi (f (Xi ) − E[f (Xi )]).
2b f ∈F
i6=k
We introduce following auxiliary random variables for k =
1, . . . , n,
X
1
Zk =
sup
wi (f (Xi − E[f (Xi )]))
2b f ∈F
i6=k
and
1
wi (f (Xk ) − E[f (Xk )]).
2b
Denoting by f0 the function achieving the maximum in Z,
we have
1
Ze − Zk ≤ wi (f0 (Xk ) − E[f0 (Xk )]) ≤ 1 a.s.,
2b
e − Zk − Zk0 ≥ 0
Z
Zk0 =
and
E[Zk0 ] = 0.
The first inequality is derived from wi ≤ 1 and
supf ∈F ,X∈X f (X) − E[f (X)] ≤ 2b. Also, we have
n
X
1 X
e
(n − 1)Z =
wi (f0 (Xi ) − E[f0 (Xi )])
2b
≤
k=1
n
X
i6=k
Zk ,
k=1
and
n
X
n
Ekn [Zk02 ] =
k=1
1 X
E[wi2 (fk (Xk ) − E[fk (Xk )])2 ]
2b
k=1
1
kwk22 sup Var[f (X)]
4b2
f ∈F
1
≤ 2 kwk22 σ 2 .
4b
where σ 2 ≥ supf ∈F Var[f (X)]. Notice that we use the fact
the Xi have identical distribution. Applying Theorem 1 of
2
e + kwk22 σ 2 will give
(Bousquet 2002) with v = 2E[Z]
4b
√
e ≥ 2vx + x ] ≤ e−x ,
P [Ze − E[Z]
3
and then
r
kwk1
kwk1
kwk22 2
P[
(Z − E[Z]) ≥ 2x(
E[Z] +
σ )
2b
b
4b2
x
+ ] ≤ e−x
3
which proves the inequality.
≤
Proof of Theorem 6. Since R satisfies Condition 3, we notice
that, by dominated convergence, for every r ∈ R, considering the sequence {rk } provided by Condition 3, one has
P [γ(·, rk )] that tends to P [γ(·, r)] as k tends to infinity. De¯ ∗ , R) = inf r∈R `(r
¯ ∗ , r). Hence,
note the bias term of loss `(r
¯ ∗ , R) = `(r
¯ ∗ , R0 ), which implies that there exists some
`(r
point π(r∗ ) (which may depend on ∗ ) such that π(r∗ ) ∈ R0
and
¯ ∗ , π(r∗ )) ≤ `(r
¯ ∗ , R) + 2 .
`(r
(34)
∗
We start from the identity
¯ ∗ , r̂) = `(r
¯ ∗ , π(r∗ )) + γw (r̂) − γw (π(r∗ ))
`(r
+ γw (π(r∗ )) − γw (r̂)
which, by definition of r̂, implies that
¯ ∗ , r̂) ≤ ρ + `(r,
¯ π(r∗ )) + γw (π(r∗ )) − γw (r̂).
`(r
√
Let x = K 0 y∗ , where K 0 is a constant to be chosen later
such that K 0 ≥ 1 and
γw (π(r∗ )) − γw (r)
.
Vx = sup ¯ ∗
∗
2
r∈R `(r , r) + + x
Then,
¯ ∗ , r̂) ≤ ρ + `(r
¯ ∗ , π(r∗ )) + Vx (`(r
¯ ∗ , r̂) + x2 + 2 )
`(r
∗
and therefore, on the event Vx < 1/2, one has
¯ ∗ , r̂) ≤ 2(ρ + `(r
¯ ∗ , π(r∗ ))) + 2 + x2 ,
`(r
∗
yielding
¯ ∗ , r̂) ≤ 2(ρ + `(r
¯ ∗ , π(r∗ ))) + 32 + x2 ]
P [`(r
∗
(35)
1
≤ P [Vx ≥ ].
2
¯
Since ` is bounded by 1, we may always assume x (and thus
∗ ) to be not larger than 1. Assuming that x ≤ 1, it remains
to control the variable Vx via Theorem 5. In order to use
Theorem 5, we first remark that, by Condition 3,
γw (π(r∗ )) − γw (r)
Vx = sup ¯ ∗
∗
2
r∈R0 `(r , r) + + x
which means that we indeed have to deal with a countably
indexed empirical process. Note that the triangle inequality
implies via (21), (34) and (22) that
1
(Var[γ(r, ·) − γ(π(r∗ ), ·)]) 2 ≤ d(r∗ , r) + d(r∗ , π(r∗ ))
p
q
kwk1
¯ ∗ , r) + 2 )
≤2
ψ( `(r
∗
kwk2
(36)
Since γ takes its values in [0, 1], introducing the functions
ψ1 = min(1, 2ψ) and, we derive from (36) that
√
kwk
( kwk2 1 ψ1 ())2
γw (π(r∗ )) − γw (t)
sup Var[ ¯ ∗
] ≤ sup
(2 + x2 )2
`(r , t) + ∗ + x2
r∈R
≥0
≤
kwk1
ψ1 () 2
sup(
) .
2
2
kwk2 x ≥0 max(, x)
Now the monotonicity assumptions on ψ imply that either
ψ() ≤ ψ(x) if x ≥ or ψ()/ ≤ ψ(x)/x if x ≤ . Hence,
one has in any case ψ()/(max(, x)) ≤ ψ(x)/x, which
finally yields
kwk1 ψ12 (x)
γw (π(r∗ )) − γw (r)
.
]
≤
sup Var[ ¯ ∗
kwk22 x4
`(r , r) + ∗ + x2
r∈R
On the other hand, since γ takes its values in [0, 1], we have
supk
r∈R
γ(r, ·) − γ(π(r∗ ), ·)
1
k∞ ≤ 2 .
∗
2
¯
x
`(r , r) + x
We can therefore apply Theorem 5 with v = ψ12 (x)x−4 and
b = x−2 , which gives that, on a set Ωy with probability larger
than 1 − exp(−y), the inequality
s
2y(ψ12 (x)x−2 + 4E[Vx ])
2y
+
.
Vx < E[Vx ] +
2
kwk1 x
3kwk1 x2
(37)
Now since ∗ is assumed to be not larger than 1, one has
ψ(∗ ) ≥ ∗ and therefore, for every σ ≥ ψ(∗ ), the following
inequality derives from the definition of ∗ by monotonicity:
φ(ψ(∗ ))
φ(ψ(∗ )) p
φ(σ)
≤
≤
= kwk1 .
2
2
σ
w (∗ )
2∗
Thus, (23) holds for every σ ≥ ψ(∗ ). In order to
control E[Vx ], we intend to use Lemma A.5 of (Massart and Nédélec 2006). For every r ∈ R0 , we intro¯ ∗ , π(r∗ )), `(r
¯ ∗ , r)). Then by (34),
duce a2 (r) = max(`(r
∗
2
∗
2
¯
¯
`(r , r) ≤ a (r) ≤ `(r , r) + ∗ . Hence, we have, on the
one hand, that
E[Vx ] ≤ E[ sup
r∈R0
γw (π(r∗ )) − γw (r)
].
a2 (r) + x2
and, on the other hand, that, for every ≥ ∗ ,
E[
sup
γw (π(r∗ )) − γw (r)]
r∈R0 ,a(r)≤
≤ E[
sup
¯ ∗ ,r)≤2
r∈R0 ,`(r
γw (π(r∗ )) − γw (r)].
¯ ∗ , r) ≤
Now by (34) if there exists some r ∈ R0 such that `(r
¯ ∗ , π(r∗ )) ≤ 2 + 2 ≤ 22 and therefore,
2 , then `(r
∗
by assumption (22)
of θ → ψ(θ)/θ,
√ and monotonicity
√
√ √kwk1
kwk1
∗
d(π(r ), r) ≤ 2 kwk2 ψ( 2) ≤ 2 2 kwk2 ψ(), then
√
√kwk2 d(π(r∗ ), r) ≤ 2 2ψ(). Thus, we derive from (23)
kwk1
that, for every ≥ ∗ ,
E[
sup
¯ ∗ ,r)≤2
r∈R0 ,`(r
√
γw (π(r∗ )) − γw (r)] ≤ φ(2 2ψ())
√
and since θ → φ(2 2ψ(θ))/θ is nonincreasing, we can use
Lemma A.5 of (Massart and Nédélec 2006) to get
p
√
E[Vx ] ≤ 4φ(2 2ψ(x))/( kwk1 x2 ),
and by monotonicity of θ → φ(θ)/θ,
p
√
E[Vx ] ≤ 8 2φ(ψ(x))/( kwk1 x2 ).
Thus, using the monotonicity of θ → φ(ψ(θ))/θ, and the
definition of ∗ , we derive that
√
√
√
√
8 2φ(ψ(∗ ))
8 2
8 2∗
8 2
E[Vx ] ≤ p
=
≤√ 0 ≤√ ,
x
Ky
K0
kwk1 x∗
(38)
provided that x ≥ ∗ , which holds since K 0 ≥ 1. Now, the
monotonicity of θ → ψ1 (θ)/θ implies that x−2 ψ12 (x) ≤
2
−2
∗ ψ1 (∗ ), but since φ(θ)/θ ≥ φ(1) ≥ 1 for every θ ∈
[0, 1], we derive from (24) and the monotonicity of φ and
θ → φ(θ)/θ that
ψ12 (∗ )
φ2 (ψ1 (∗ ))
φ2 (2ψ(∗ ))
φ2 (ψ(∗ ))
≤
≤
≤
4
2∗
2∗
2∗
2∗
and, therefore, x−2 ψ12 (x) ≤ 4kwk1 2∗ . Plugging this inequality together with (38) into (37) implies that, on the set Ωy ,
s
√
√
2y
8 2
2y(4kwk1 2∗ + 32/ K 0 )
+
+
.
Vx < √
2
0
kwk1 x
3kwk1 x2
K
It remains to replace x2 by its value K 0 y2∗ to derive that, on
the set Ωy , the following inequality holds:
s
√
√
8 2
8(1 + 4(kwk1 2∗ K 0 )−1 )
2
Vx < √ +
+
.
0
0
K
3kwk1 K 0 2∗
K
Taking into account that φ(ψ(θ)) ≥ φ(min(1, ψ(θ))) ≥ θ
for every θ ∈ [0, 1], we deduce from the definition of ∗
that kwk1 2∗ ≥ 1 and, therefore, the preceding inequality
becomes, on Ωy ,
s
√
√
2
8(1 + 4/ K 0 )
8 2
+
Vx < √
+
.
0
0
0
K
3K
K
Hence, choosing K 0 as a large enough numerical constant
guarantee that Vx < 1/2 on Ωy and, therefore, (35) yields
¯ ∗ , r̂) ≤ 2(ρ + `(r
¯ ∗ , π(r∗ ))) + 32 + x2 ]
P [`(r
∗
≤ P [Ωcy ]
≤ e−y .
We get the required probability bound (6) by setting K =
K 0 + 3.
Proof of Lemma 4. We first perform the control of
E[supf ∈F vw (f − f0 )]. For simplicity, we denote
H∞ (F, ) = log N∞ (F, ). For any integer j, we set
σj = σ2−j and Hj = H∞ (F, σj2 ). By definition of
Hj = H∞ (F, σj2 ), for any integer j ≥ 1, we can define a
mapping Πj from F to some finite collection of functions
such that
log #{Πj F} ≤ Hj
(39)
and
Πj f ≤ f with P (f − Πj f ) ≤ σj2 , ∀f ∈ F.
(40)
For j = 0, we choose Π0 to be identically equal to f0 . For
this choice of Π0 , we still have
P (|f − Π0 f |) = P [|f − f0 |] ≤ σ02 = σ
(41)
for every f ∈ F. Furthermore, since we may always assume
that the extremities of the balls used to cover F take their
values in [0, 1], we also have for every integer j that
0 ≤ Πj f ≤ 1.
H1 ≤ σ1−2 ϕ2 (σ),
p
and under the condition 4ϕ(σ) ≤ σ 2 kwk1 , one has H1 ≤
σ12 kwk1 . Thus, since j → Hj σj−2 increases to infinity, the
set {j ≥ 0 : Hj ≤ σj2 kwk1 } is a nonvoid interval of the
form
{j ≥ 0 : Hj ≤ σj2 kwk1 } = [0, J],
with J ≥ 1. For every f ∈ F, starting from the decomposition
−vw (f ) =
vw (Πj f ) − vw (Πj+1 f ) + σJ2
j=0
and, therefore,
E[ sup [−vw (f )]]
f ∈F
J−1
X
j=0
and, on the other hand,
p
p
2
4 kwk1 σJ+1
≤ 4σJ+1 Hj+1 .
Hence, plugging these inequalities in (43) yields
J+1
X p
p
kwk1 E[sup −vw (f )] ≤ 6
σj Hj ,
E[sup vw (Πj f ) − vw (Πj+1 f )] + σJ2 .
(42)
D.4
Now, it follows from (40) and (41) that, for every integer j
and every f ∈ F, one has
2
2
P [|Πj f − Πj+1 f |] ≤ σj2 + σj+1
= 5σj+1
Zi = Xi if σi = 1, and Xi0 otherwise,
Zi0 = Xi0 if σi = 1, and Xi0 otherwise.
Conditionally upon the Xi and Xi0 , the random vector
(Zi , Zi0 ) takes the values (Xi , Xi0 ) or (Xi0 , Xi ), each with
probability 1/2. In particular, we have:
L(X1 , . . . , Xn , X10 , . . . , Xn0 ) =
and, therefore, since |Πj f − Πj+1 f |≤ 1,
L(Z1 , . . . , Zn , Z10 , . . . , Zn0 )
2
P [|Πj f − Πj+1 f |2 ] ≤ 5σj+1
.
Moreover, (39) ensures that the number of functions of the
form Πj f − Πj+1 f when varies in F is not larger than
exp(Hj + Hj+1 ) ≤ exp(2Hj+1 ), Hence, we derive from
the maximal inequality for random vectors (see Massart and
Nédélec 2006, Lemma A.1) and the by-product of the proof
of Bernstein’s inequality for the weighted sum of networked
random variables (see Wang, Guo, and Ramon 2017, Lemma
16) that
p
kwk1 E[sup [vw (Πj f ) − vw (Πj+1 f )]]
≤ 2[σj+1
p
1
5Hj+1 + p
Hj+1 ]
3 kwk1
Proofs Omitted in Section C
Proof of Lemma 7. This Lemma is derived from Lemma 5,
thus we can follow the similar arguments that can be found
in (De la Pena and Giné 2012).
For any random variable X, we denote by L(X) its distribution. We denote by Σ (respectively Σ0 ) the sigma-filed
generated by {X1 , . . . , Xn } (respectively {X10 , . . . , Xn0 }).
0
Let (Yi,j
)(i,j)∈E be Bernoulli random variables such that
0
P [Yi,j = 1 | Σ, Σ0 ] = η(Xi0 , Xj0 ). Let (σi )ni=1 be independent Rademacher variables and define:
f ∈F
f ∈F
j=1
and the result follows. The control of E[supf ∈F vw (f − f0 )]
can be performed analogously.
we derive, since ΠJ (f ) ≤ f and P (f − Πj (f )) ≤ σJ2 , that
≤
[σj
f ∈F
+vw (ΠJ f ) − vw (f ),
J−1
X
J
X
p
p
1
2
Hj ] + 4 kwk1 σJ+1
5Hj + p
.
3
kwk
1
j=1
(43)
It follows from the definition of J that, on the one hand, for
every j ≤ J,
1
1p
p
Hj ≤
Hj
3
3 kwk1
vw (Πj f ) − vw (Πj+1 f )
j=0
−vw (f ) =
f ∈F
≤2
Noticing that since u → H∞ (F, u2 ) is nonincreasing,
J−1
X
because wi ≤ 1, ∀i ∈ 1, . . . , n, and (42) becomes
p
kwk1 E[sup −vw (f )]
(44)
and
L(X1 , . . . , Xn ) = L(Z1 , . . . , Zn ).
(45)
Let {Ỹi,j }(i,j)∈E be Bernoulli random variables such that
P [Ỹi,j = 1 | Σ, Σ0 ] = η(Xi , Xj0 ) and define for (i, j) ∈ E,
Yi,j if σi = 1 and σj = −1
0
Yi,j if σi = −1 and σj = 1
Ŷi,j =
Ỹ
if σi = 1 and σj = 1
i,j
Ỹi,j if σi = −1 and σj = −1
Notice that for all f ,
Eσ [h̃r (Zi , Zj0 , Ỹi,j )]
1
= (h̃r (Xi , Xj , Yi,j ) + h̃r (Xi0 , Xj , Ỹi,j )
4
0
+ h̃r (Xi , Xj0 , Ỹi,j ) + h̃r (Xi0 , Xj0 , Yi,j
))
≤
where Eσ denotes the expectation taken with respect to
{σi }ni=1 . Moreover, using
0
E[h̃r (Xi0 , Xj0 , Yi,j
) | Σ] = 0
E[h̃r (Xi , Xj0 , Ỹi,j ) | Σ] = 0
(i,j)∈E
| Σ] = 0
(i,j)∈E
X
1
wi,j Eσ [h̃r (Zi , Zj , Ỹi,j )]|q ]
= E[sup|4
2 r∈R
h̃r (Xi , Xj , Yi,j ) = 4E[h̃r (Zi , Zj0 , Ŷi,j ) | Σ]
(i,j)∈E
For all q ≥ 1, we therefore have
X
E[ sup|
wi,j h̃r (Xi , Xj , Yi,j )|q ]
X
1
+ E[sup|2
wi,j h̃r (Xi , Xj , Yi,j )|q ]
2 r∈R
(i,j)∈E
(i,j)∈E
= E[sup|
r∈R
X
(Jansen’s Inequality and the convexity of sup|·|q )
4wi,j E[h̃r (Zi , Zj0 , Ỹi,j ) | Σ]|q ]
r∈R
X
1
wi,j h̃r (Zi , Zj , Ỹi,j )|q ]
≤ E[sup|4
2 r∈R
(i,j)∈E
≤ 4q E[sup|
r∈R
X
wi,j h̃r (Zi , Zj0 , Ỹi,j )|q ]
(i,j)∈E
(i,j)∈E
p
derived from the facts that the supreme and |x| (p ≥ 1) are
convex functions and the Jansen inequality. According to
(44) and the fact that the distribution of Ŷi,j only depends on
the realization Zi , Zj0 , i.e. P [Ŷi,j | Zi , Zj0 ] = η(Zi , Zj0 ), we
obtain
X
4q E[ sup|
wi,j ĥr (Zi , Zj0 , Ỹi,j )|q ]
r∈R
(i,j)∈E
q
= 4 E[sup|
r∈R
X
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
(i,j)∈E
that
r∈R
(i,j)∈E
(According to (45))
X
1
= E[sup|4
wi,j h̃r (Xi , Xj , Yi,j )|q ]
2 r∈R
(i,j)∈E
X
1
wi,j h̃r (Xi , Xj , Yi,j )|q ]
+ E[sup|2
2 r∈R
(i,j)∈E
X
= 4q E[sup|
wi,j h̃r (Xi , Xj , Yi,j )|q ]
(i,j)∈E
which (29) follows.
Proof of Lemma 8. Re-using the notations used in the proof
of Lemma 5, we further introduce (Xi00 )ni=1 , a copy of
(Xi0 )ni=1 , independent from Σ, Σ0 , and denote by Σ00 its sigma00
field. Let (Ỹi,j
)(i,j)∈E Bernoulli random variables such that
00
P [Ỹi,j = 1 | Σ, Σ0 , Σ00 ] = η(Xi , Xj00 ). We now use classic
randomization techniques and introduce our ”ghost” sample:
X
00 q
E[sup|
wi,j h̃r (Xi , Xj0 , Ỹi,j
)| ]
(i,j)∈E
= E[sup|
X
1
+ E[sup|2
wi,j h̃r (Xi , Xj , Yi,j )|q ]
2 r∈R
r∈R
which concludes the proof of (28).
By the symmetry of h̃r in the sense
h̃r (Xi , Xj , Yi,j ) = h̃r (Xj , Xi , Yj,i ), we have
X
E[ sup|
wi,j h̃r (Xi , Xj0 )|q ]
r∈R
+ h̃r (Xi0 , Xj , Ỹi,j ) + h̃r (Xi , Xj , Yi,j )
X
1
0
+ E[sup|2
wi,j h̃r (Xi0 , Xj0 , Yi,j
)|q ]
4 r∈R
we easily get
r∈R
(i,j)∈E
0
+ h̃r (Xi0 , Xj0 , Yi,j
)|q ]
X
1
wi,j h̃r (Xi , Xj , Yi,j )|q ]
+ E[sup|2
4 r∈R
and (degenerated)
E[h̃r (Xi0 , Xj , Ỹi,j )
X
1
wi,j (h̃r (Xi , Xj0 , Ỹi,j )
E[sup|
2 r∈R
1 X
wi,j (h̃r (Xi , Xj0 , Ỹi,j )
2
(i,j)∈E
+ h̃r (Xi0 , Xj , Ỹi,j ))|q ]
1 X
= E[sup|
wi,j (h̃r (Xi , Xj0 , Ỹi,j )
r∈R 2
r∈R
(i,j)∈E
(i,j)∈E
(h̃r is degenerated)
X
00
= E[sup|
wi,j (h̃r (Xi , Xj0 , Ỹi,j
)
+ h̃r (Xi0 , Xj , Ỹi,j ) + h̃r (Xi , Xj , Yi,j )
0
+ h̃r (Xi0 , Xj0 , Yi,j
)
1 X
−
wi,j h̃r (Xi , Xj , Yi,j )
2
r∈R
(i,j)∈E
00
− EΣ00 [h̃r (Xi , Xj00 , Ỹi,j
)])|q ]
(i,j)∈E
(Jansen’s Inequality)
X
00
≤ E[sup|
wi,j (h̃r (Xi , Xj0 , Ỹi,j
)
1 X
0
−
wi,j h̃r (Xi0 , Xj0 , Yi,j
)|q ]
2
r∈R
(i,j)∈E
q
(Triangle’s Inequality and the convexity of sup|·| )
r∈R
(i,j)∈E
00
− h̃r (Xi , Xj00 , Ỹi,j
))|q ]
= E[sup|
n
X
X
r∈R j=1
i:(i,j)∈E
−
√
≤ Eσ [Zσ ] + 3 qEσ Uσ + 4qB
00
wi,j (h̃r (Xi , Xj0 , Ỹi,j
)
where B is defined below
00
h̃r (Xi , Xj00 , Ỹi,j
))|q ]
B = sup
f
Let (σi )ni=1 be independent Rademacher variables, independent of Σ, Σ0 and Σ00 , then we have:
n
X
E[ sup|
X
r∈R j=1
i:(i,j)∈E
wi,j (h̃r (Xi , Xj0 , Ỹi,j )
i:(i,j)∈E
00
− h̃r (Xi , Xj00 , Ỹi,j
))|q | Σ]
(Triangle’s Inequality and the convexity of sup|·|q )
r∈R
n
X
≤ 2q E[sup|
σj
r∈R j=1
X
X
r∈R j=1
00
wi,j h̃r (Xi , Xj00 , Ỹi,j
))|q | Σ]
i:(i,j)∈E
n
X
≤ 2q E[sup|
σj
r∈R j=1
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q | Σ]
i:(i,j)∈E
n
X
q
+ 2 E[sup|
σj
X
α,α0 :kαk2 ,kα0 k2 ≤1
Σ]
i:(i,j)∈E
and get
It remains to derive suitable upper bounds for the expectation
of the three terms on the right hand side.
First term: E[Eσ [Zσ ]q ]. Using the symmetrization trick,
we have
E[Eσ [Zσ ]q ] ≤ 4q E[Eσ [Zσ0 ]q ]
P
0
which Zσ = supf | (i,j)∈E σi σj0 f (Xi , Xj )|. Note that Eσ
now denotes expectation taken with respect to both the σ and
the σ 0 . For simplicity, we denote by A = Eσ [Zσ0 ]. In order
to apply Corollary 3 of (Boucheron et al. 2005), define, for
k = 1, . . . , n, the random variables
X
Ak = Eσ [sup|
wi,j σi σj0 f (Xi , Xj )|].
(i,j)∈E,i,j6=k
It is easy to see that Ak ≤ A.
On the other hand, defining
X
Rk = sup|
wi,k σi f (Xi , Xk )|,
f
E[sup|
r∈R
X
i:(i,k)∈E
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
M = max Rk
(i,j)∈E
k
≤ 2q E[sup|
n
X
σj
r∈R j=1
X
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q ]
Proof of Theorem 7. By the decoupling, undecoupling and
randomization techniques (see Lemma 5, Lemma 6), the
symmetry and the degeneration of f and the symmetry of
(wi,j )(i,j)∈E , we have
X
E[sup|
wi,j f (Xi , Xj )|q ]
(i,j)∈E
≤ 16q E[sup|
f
≤ 64q E[sup|
f
and denoting by f ∗ the function achieving the maximum in
the definition of Z, we clearly have
i:(i,j)∈E
Then repeating the same argument but for the (Xi )ni=1 will
give the similar inequality. The desired inequality will follows
putting these two inequalities together.
f
(i,j)∈E
The second inequality above follows by Theorem 14 of
(Boucheron et al. 2005).
Using the inequality (a + b + c)q ≤ 3(q−1) (aq + bq + cq )
valid for q ≥ 2, a, b, c > 0, we have
f
wi,j h̃r (Xi , Xj0 , Ỹi,j )|q |
wi,j αi αj0 f (Xi , Xj )|.
Eσ [Zσq ] ≤ 3q−1 (Eσ [Zσ ]q + 3q q q/2 Eσ [Uσ ]q + 4q q q B q ).
00
− h̃r (Xi , Xj00 , Ỹi,j
))|q | Σ]
n
X
X
= E[sup|
σj
wi,j (h̃r (Xi , Xj0 , Ỹi,j )
r∈R j=1
X
|
sup
X
and
n
X
(A − Ak ) ≤ 2A.
k=1
Therefore,
n
X
(A − Ak )2 ≤ 4AEσ M.
k=1
Then by Corollary 3 of (Boucheron et al. 2005), we obtain
wi,j σi σj0 f (Xi , Xj0 )|q ]
E[Eσ [Zσ0 ]q ] ≤ 2q−1 (2q (E[Zσ0 ])q + 5q q q E[Eσ [M ]q ]) (46)
wi,j σi σj f (Xi , Xj )|q ]
To bound E[Eσ [M ]q ], observe that Eσ [M ] is a conditional Rademacher average, for which Theorem 13
of (Boucheron et al. 2005) could be applied. Since
maxk supf,i wi,k f (Xi , Xk ) ≤ kwk∞ F , we have
(i,j)∈E
X
A − Ak ≤ 2Eσ [M ]
(i,j)∈E
It means we can convert the moment of the original U -process
to the moment of Rademacher chaos which can be handled
by moment inequalities of (Boucheron et al. 2005).
In particular, for any q ≥ 2,
(Eσ [Zσq ])1/q ≤ Eσ [Zσ ] + (Eσ [(Zσ − Eσ [Zσ ])q+ ])1/q
E[Eσ [M ]q ] ≤ 2q−1 (2q E[M ]q + 5q q q kwkq∞ F q ).
E[Zσ0 ]
(47)
E[Eσ,σ0 [Zσ0 ]]
By undecoupling, we have
=
E[4Eσ [Zσ ]] = 4E[Zσ ]. Collecting all terms, we have
E[Eσ [Zσ ]q ] ≤ 64q E[Zσ ]q + 160q q q E[M ]q
≤
+ 400q kwkq∞ F q q 2q .
Second term: E[Eσ [Uσ ]q ].
By the Cauchy-Schwartz inequality we can observe that
X
sup sup
wi,j αj f (Xi , Xj ) ≤ kwkmax F.
f,i α:kαk2 ≤1
the L∞ metric. For all f, s, we have L2 (zσ0 (f ), zσ0 (g)) ≤
L∞ (f, g). The fact that if ∀f, s ∈ F, L(f, s) ≤ L0 (f, s) then
N (F, L, ) ≤ N (F, L0 , ) combined with (49) will give
E[Zσ ] = 2E[Eσ [sup|zσ (f )|]]
f
j:(i,j)∈E
q
Then similar to the bound of E[Eσ [M ] ], we have
Third term:q
E[B q ]. By the Cauchy-Schwartz inequality,
P
2
we have B ≤
(i,j)∈E wi,j F = kwk2 F so
E[B q ] ≤ kwkq2 F q .
Now it remains to simply put the pieces together to obtain
X
E[sup|
wi,j f (Xi , Xj )|q ]
≤ 2Kkwk2
+
+
+
kwkqmax F q q 3q/2
for an appropriate constant C. In order to derive the exponential inequality, we use Markov inequality P [X ≥ t] ≤
t−q E[Z q ] and choose
t
t
t
t
q = C min (
)2 ,
,
)2/3 ,
,(
E[Uσ ]
E[M ] F kwk2 kwkmax F
s
t
kwk∞ F
for an appropriate constant C.
Proof of Corollary 1. From Theorem 3, it is easy to know
p
κ =C(E[Zσ ] + max(E[Uσ ] log(1/δ), E[M ] log(1/δ),
where K is a universal constant. Similarly,
we
can
also
bound
E[M ]
by
Kkwkmax
R 2F p
∗
log N∞ (F, )d. For Uσ , let α be the (random)
0
vector that maximizes Uσ and define
{uσ (f ) =
n
X
E
Theorem 8 (Khinchine inequality for Rademacher chaos,
De la Pena and Giné (2012, Theorem 3.2.1)). Let F be a
normed vector space and let {σ i }∞
i=1 be a Rademacher sequence. Denote by
X =x+
n
X
X
xi σi +
xi1 ,i2 σ i1 σ i2 + . . .
i1 <i2 ≤n
i=1
X
+
xi1 ...id σ i1 . . . σ id
i1 <···<id ≤n
the Rademacher chaos of order d. Let 1 < p ≤ q < ∞ and
let
p − 1 1/2
γ=(
) .
q−1
Then, for all d ≥ 1,
(i,j)∈E<
(E[|x +
n
X
γxi σi +
X
+
γ 2 xi1 ,i2 σ i1 σ i2 + . . .
γ d xi1 ...id σ i1 . . . σ id |q ])1/q
i1 <···<id ≤n
n
X
X
i=1
i1 <i2 ≤n
≤ (E[|x +
+
X
i1 <i2 ≤n
i=1
0
Recall that supf kf k∞ = F , we have D = 2F . Since this
metric function d is intractable, we need to convert it to
(i,j)∈E
Metric Entropy Inequality
(log(1/δ)) kwk∞ )).
f,g
wi,j αj∗ f (Xi , Xj ), f ∈ F}.
The following theorems are more or less classical and well
known. We present them here for the sake of completeness.
2
where E< = {(i, j) : {i, j} ∈ E, i < j}. Let zσ0 =
zσ /kwk2 , following Theorem 8, we can easily have that
zσ0 satisfies (50) with degree 2. Thus from Theorem 9, we
have
Z D
0
0
Eσ [sup|zσ (f )−zσ (s)|] ≤ K
log N (F, L2 , )d. (49)
X
σi
Clearly, uσ satisfies the Khintchine inequality with degree 1. Also, we need to convert its metric distance
and L2 (uσ (f ), uσ (g)) ≤ L∞ (f, g). Thus, E[Uσ ] ≤
R 2F p
log N∞ (F, )d.
Kkwk2 0
Plugging all these part into (48) will complete the corollary.
log(1/δ)kwk2 , (log(1/δ))3/2 kwkmax ,
(48)
An important character of these Rademacher processes in
(48) is that they all satisfy the Khinchine inequality (50). For
simplicity, we denote the weighted Rademacher processes of
Zσ by
X
{zσ (f ) =
wi,j σi σj f (Xi , Xj ), f ∈ F}.
log N∞ (F, )d
0
i=1
kwkq∞ F q q 2q
F q kwkq2 q q )
2F
Z
(i,j)∈E
≤ C(E[Zσ ]q + q q/2 E[Uσ ]q + q q E[M ]q
log N (F, L2 , )d
0
E[Eσ [Uσ ]q ] ≤ 2q−1 (2q E[Uσ ]q + 5q q q kwkqmax F q ).
f
2F
Z
≤ 2Kkwk2
xi σi +
X
i1 <···<id ≤n
xi1 ,i2 σ i1 σ i2 + . . .
xi1 ...id σ i1 . . . σ id |p ])1/p
Theorem 9 (metric entropy inequality, Arcones and Gine
(1993, Proposition 2.6)). If a process {Yf : f ∈ F} satisfies
(E[|Yf − Yg |p ])1/p ≤ (
p − 1 m/2
)
(E[|Yf − Yg |q ])1/q , (50)
q−1
for 1 < q < p < ∞ and some m ≥ 1, and if
d(f, g) = (E[|Yf − Yg |2 ])1/2 ,
there is a constant K < ∞ such that
Z D
E[sup|Yf − Yg |] ≤ K
(log N (F, d, ))m/2 d.
f,g
0
where D is the d-diameter of F.
(51)
(52)
| 8cs.DS
|
Can the early human visual system compete with Deep Neural Networks?
Samuel Dodge and Lina Karam
Arizona State University
arXiv:1710.04744v1 [cs.CV] 12 Oct 2017
{sfdodge,karam}@asu.edu
Abstract
we wish to test the early human vision system by limiting
the stimuli display time to 100ms. Within 100ms, there is
no time for eye movements [1], thus the human visual system is limited to more global “gist” representations [14].
Can the human visual system still recognize distorted images only by the gist? By contrast, the experiments in [7]
allow the subject to view the image for unlimited duration.
This allows the subject to analyze more local information
that can help classify the stimuli.
We study and compare the human visual system and
state-of-the-art deep neural networks on classification of
distorted images. Different from previous works, we limit
the display time to 100ms to test only the early mechanisms
of the human visual system, without allowing time for any
eye movements or other higher level processes. Our findings
show that the human visual system still outperforms modern
deep neural networks under blurry and noisy images. These
findings motivate future research into developing more robust deep networks.
1.1. Related Works
Human performance on distorted stimuli has been extensively studied. Torralba et al. [22] showed that humans
are able to recognize very low resolution images. Similarly,
studies on face images show that the human visual system
can perform well in the presence of blur [2] and noise [5].
There are also several works that study deep neural network performance on distorted data. Dodge and Karam [6]
studied several different types of common image distortions
and found that noise and blur have the largest effect on
the performance of DNNs on the ImageNet dataset. Rodner et al. show similar findings on smaller fine grained
datasets [17].
Comparing human and machine vision performance has
also been studied in the past. Borji and Itti [3] compare
14 different computer vision models on several datasets and
compare with human performance. However the study does
not consider modern neural networks, which greatly outperform older vision models.
Fleuret et al. compare human and machine vision performance on synthetic visual reasoning tasks [9]. These tasks
are designed such that there must be some sort of reasoning,
instead of pure pattern recognition. For many of these tasks
humans outperform artificial vision systems. A followup
study showed that, for some of these synthetic problems,
state-of-the-art neural networks surprisingly achieve accuracy equivalent with random chance [20].
Parikh [15] studies human and artificial vision system
performance on jumbled images. These jumbled images
are formed by randomly permuting blocks of an image. On
these jumbled images human classification performance is
1. Introduction
It has been shown that state-of-the-art deep neural networks (DNNs) often achieve better performance compared
with human subjects on large scale classification tasks [18].
Given this, we might conclude that the DNNs do a better
job of representing and organizing visual data. But does the
success of DNNs carry over to other more difficult tasks?
Recently it has been discovered that deep neural networks perform poorly in the presence of distortions such as
blur and noise [6, 17]. Blur removes high frequency information and likewise, noise injects high frequency information. Current deep networks seem to experience difficulty
reasoning in the presence of high levels of such distortions.
Do humans have a similar trouble with distorted images?
By studying the human visual system (HVS), we can perhaps gain insight into how to build DNN models that are
more robust to distortions. If human performance on distorted images is better than DNNs, then this exposes a vulnerability in the DNN’s representation of visual data. But
if human performance is also poor, then recognition under
distortions may be inherently difficult.
Previous studies have tested human capability for recognition under noise and blur [22, 5], finding that humans have
some robustness with respect to these distortions. In this
work, we wish to compare human ability and DNN ability
on a common task. Recent works perform similar experiments with distorted images [7, 10]. However, in this work
1
degraded to near the performance of a bag-of-words based
classifier. While the jumbled images may give some insight
into the human visual system, jumbled images are not typical visual stimuli.
Kheradpisheh et al. [13] compare human and DNN performance on images of objects with arbitrary backgrounds
and rotations. The highest performing DNNs match human performance. This is consistent with other studies
(e.g., [18]) that show that DNN classification performance
is at-par with or superior to human performance.
To further evaluate human vs. DNNs for classification
we design our experiments to test highly distorted images.
We extend on the work in [7], where Amazon Mechanical
Turk testing is used to compare human and machine performance on a subset of the ImageNet dataset with added
distortions. In this work there are two primary differences.
First we use human subjects in a controlled lab setting. This
is in contrast to Amazon Mechanical Turk studies where
there is no mechanism to control viewing distance, screen
brightness, etc. Secondly, we use a fixed display time instead of free viewing, which lets us analyze the accuracy
of the HVS without allowing for higher level processes like
eye movements.
A concurrent independent study [10] compares human
and deep learning performance on distorted images. However, the study does not fine tune networks on distorted images. This gives an unfair advantage to the human subjects,
which may have previously seen distorted images. Additionally, we chose a 100ms display time which is less than
the 200ms display time in [10]. This ensures that we are
testing early “gist”-based processes of the visual system.
2. Methods
In this section we first introduce our dataset and image
distortions. Then, we describe our experimental setup to
test classification under distortion by both human subjects
and deep neural networks.
2.1. Dataset
In this paper we wish to test the early vision system.
Thus we chose a simple coarse-grained dataset, instead
of a more difficult fine-grained dataset (as in [7]). We
select 8 classes from the Caltech101 dataset [8]: Butterfly, Crocodile, Dolphin, Elephant, Flamingo, Leopard, and
Llama. This dataset was deliberately chosen to be “easy”
such that under no distortion, neither the human subjects
nor the deep neural networks would have any difficulty in
classification.
We consider two types of distortion: random additive
Gaussian noise and Gaussian blur. For Gaussian noise we
consider noise with a standard deviation ranging from 0
(clean images) to 200 (highly corrupted images). Similarly,
for blur we consider Gaussian blur with a kernel of standard
deviation that ranges from 0 to 10. Figure 1 shows example stimuli of the 8 classes for 3 difference levels of each
distortion.
Our dataset consists of 200 clean training images (25 per
class), and 40 clean validation images (5 per class). We use
80 unique images for testing blur at 5 possible levels for a
total of 400 images. Similarly there are 80 unique images
for testing noise at 5 levels for a total of 400 images. We additionally randomly distort the training images as explained
in Section 2.3. The same training, testing, and validation
split was used for each human trial, as well as for the deep
neural networks.
2.2. Human Experiments
The goal of our human experiments is to test the ability
of the human visual system to identify images using 100ms
“gist”-level information. Other studies have shown that humans can accurately recognize images at display times below 100ms [12, 16]. We choose 100ms because this is the
same display time in the experiments in [4] which are used
to correlate human and DNN neural responses.
We design our experiment to mimic the training, validation, and testing stages used for training and evaluating
DNNs.
As in [7] we first allow the subjects to freely view the
training images. The subject must view images in all of the
categories before allowed to continue with the experiment.
This allows the subjects to familiarize themselves with the
image categories. This training stage is analogous to the
training stage used for deep neural networks.
Before we test the subject on distorted images, we first
test clean images in a validation stage. This stage is to ensure that the subjects are able to correctly classify clean images. As in the rest of our experiments a central fixation
cross is first shown for 500 milliseconds, followed by the
image stimuli for 100 milliseconds, and finally a second fixation cross for 500 milliseconds (Figure 2). Next, a choice
screen allows the subject to choose the most appropriate of
the 8 categories and continue to the next image. This is a
forced-choice response, so the subject must choose a class,
even if the subject is not perfectly clear as to the correct
class.
In the next stage of the experiment the subject is asked to
classify distorted images. The experiment proceeds exactly
as in the validation stage, except that the images are now
distorted. For each image we wish to test the maximum
distortion level at which the subject can make a correct decision. Testing every possible distortion level for every image can accomplish this but has practical limitations. First,
with many distortion levels, the total duration of the experiment becomes prohibitive. Secondly, multiple exposure to
the same image can induce a memory effect that could help
subjects identify highly distorted images that they would
Original
2
Blur σ
6
10
40
Noise σ
120
200
Figure 1. Example image stimuli. Our image categories consist of “coarse” classes that are easily recognizable under no distortion. In
this figure we show three levels of distortions among the 5 levels used in the experiments.
Fixation
Stimuli
500ms
Ti
m
e
Fixation
100ms
Choice
500ms
Figure 2. Timing of validation and testing stages. The subject
is first shown a central fixation marker for 500ms followed by the
image stimuli for 100ms, another fixation marker for 500ms and
finally a choice screen for the subject to input the class estimate.
otherwise not be able to identify.
Instead we follow the procedure in [7], which makes
the assumption that subjects can correctly classify an image with a certain distortion level if the subject has already
correctly classified an image with a higher distortion level.
Thus we begin with each stimuli image at the maximum
distortion level. If the subject incorrectly identifies the image, then the distortion level is reduced and the image is
randomly shown later. If the subject correctly classifies an
image at a particular distortion level, then all of the lower
distortion levels are assumed to be correctly classified and
the lower distortion levels are not tested.
We recruit 8 subjects to participate in our experiment.
All of the subjects were tested for vision and color blindness
before beginning the experiment.
2.3. Deep Neural Networks
Deep networks are the current state-of-the-art approaches for many image recognition tasks. These net-
Figure 3. Human experiment training screen. During the training stage, the subject must view example images from each category
before continuing with the experiment.
works consist of layers of convolutional filtering, pooling,
and nonlinear operations. The parameters of the layers can
be learned by fitting to a training set using gradient descent
based optimization algorithms.
We consider three classification models: VGG16 [19],
Googlenet [21], and ResNet50 [11]. The VGG16 network is
a popular architecture which consists of 16 layers and uses
convolution layers with small 3x3 filters. The Googlenet
architecture introduces blocks that perform parallel convolution with filters of varying size. ResNets employ skip
connections, which aids in training and can yield a more
accurate network.
Each network has been pre-trained on the ImageNet
dataset [18]. We perform fine-tuning to adapt the model to
our new dataset. Specifically, we replace the last fully connected layer with a new fully connected layer with 8 units
(corresponding to the 8 classes in the dataset). The learning
rate of the new layer is 10x the learning rate of the pretrained layers. The network is fine-tuned using stochastic
gradient descent with momentum. We stop learning when
the performance on the validation set plateaus.
We test two scenarios for training. In the first scenario,
the networks are fine-tuned on clean images as previously
described. In the second scenario, the networks are finetuned on a mixture of clean images and distorted images.
We refer to these networks as “distortion-tuned”. During
each mini-batch, half of the training images remain undistorted and the other half are distorted with a random level
uniformly chosen from the minimum distortion level to the
maximum distortion level. This procedure is identical to
that in [7], and ensures that the distortion-tuned networks
can perform well at all levels of distortions, as well as for
clean images.
We test using the same procedure as in the human experiments. The network is first tested on the highest distortion
level, and if the prediction is correct the network is assumed
to correctly classify the same image at all lower levels of
distortions. If the prediction is incorrect, then the network
is tested on a lower level of distortion. This process continues until the network predicts the correct class, or the level
of distortion becomes 0 (i.e., a clean image).
3. Results
On the validation portion of the human test, subjects
scored an average accuracy of 99.3%. This shows that the
subjects are diligently performing the experiment, and that
the subjects are able to classify the images correctly, even
at the display time of 100ms.
Figure 4 shows the comparison between human accuracy
and machine accuracy for our experiments. For clean images human accuracy and DNN accuracy are nearly identical. When distortion is added, human accuracy greatly
exceeds that of neural networks trained on clean images.
When networks are fine-tuned on distorted data, the network performance approaches human performance for most
levels of distortion. However at the largest levels of distortion, the human performance still exceeds that of the
distortion-tuned deep networks.
The network architecture can affect how resilient the network is to distortion, even when the network is distortiontuned. For our dataset, the disortion-tuned ResNet50 model
performs the best on noisy images, but is not the best performing on blurry images. For blurry images the distortiontuned VGG16 model acheives closest to human perfor-
100
80
80
Accuracy (%)
Accuracy (%)
100
60
40
20
0
0
50
100
σ
150
200
(a) Noise
60
40
20
0
0
2
4
σ
6
8
10
Human
VGG16
VGG16 Distortion-tuned
GoogleNet
GoogleNet Distortion-tuned
ResNet50
ResNet50 Distortion-tuned
(b) Blur
ResNet50
Distortion-tuned
ResNet50
Figure 4. Accuracy comparison between DNNs and human subjects for distorted stimuli. Human subjects greatly outperform DNNs
trained on clean data. When networks are trained on data from the respective distortion, the performance gap decreases.
σ=0
σ = 40
σ = 80
σ = 120
σ = 160
σ = 200
σ=0
σ = 40
σ = 80
σ = 120
σ = 160
σ = 200
1.0 Human predicts more often
0.5
0.0
−0.5
−1.0 DNN predicts more often
1.0 Human predicts more often
0.5
0.0
−0.5
−1.0 DNN predicts more often
Figure 5. Confusion matrix difference between humans and ResNet50 for noise. Columns of a confusion matrix correspond to the
actual class, and rows correspond to the predicted class. Rows are normalized to sum to one. This figure shows the difference between
the human confusion matrix and that of the ResNet50 model. Red regions denote pairs that humans predict more often, and blue regions
denote pairs that networks predict more often.
σ=2
σ=4
σ=6
σ=8
σ = 10
σ=0
σ=2
σ=4
σ=6
σ=8
σ = 10
VGG16
Distortion-tuned
VGG16
σ=0
1.0 Human predicts more often
0.5
0.0
−0.5
DNN predicts more often
−1.0
1.0 Human predicts more often
0.5
0.0
−0.5
−1.0 DNN predicts more often
Figure 6. Confusion matrix difference between humans and ResNet50 for blur. Columns of a confusion matrix correspond to the actual
class, and rows correspond to the predicted class. Rows are normalized to sum to one. This figure shows the difference between the human
confusion matrix and that of the VGG16 model. Red regions denote pairs that humans predict more often, and blue regions denote pairs
that networks predict more often.
mance.
An analysis of confusion patterns can yield insight into
the behavior of the DNNs. We compute the difference between the confusion matrices of human subjects and the best
performing DNN model. This tells us which categories are
confused by the DNN relative to the human and vice-versa.
Figure 5 shows this for noise using ResNet50, and Figure
6 shows this for blur using VGG16. For a DNN that has
not seen distorted data during training, at high distortions
the network tends to predict a single class regardless of the
input. The network fine-tuned on distortions shows a confusion matrix that is more similar to humans.
We also show examples of images that are “difficult” or
“easy” for humans or the distortion-tuned ResNet50 model
(Figure 7). We consider an image to be correctly classified by the human subjects if 90% or greater of the subjects selected the correct class. Some images are easy for
both the neural network and human subjects. Others are
consistently missclassified by both. Finally there are some
images correctly classified by humans, but missclassified by
DNNs. Likewise some images classified correctly by DNNs
are classified incorrectly by the human subjects.
Human Incorrect
ResNet50 Incorrect
ResNet50 Correct
Human Correct
Figure 7. Examples of correct and incorrect classifications of
human subjects and distortion-tuned ResNet50 models.
4. Discussion and Conclusion
We performed a set of human experiments for classifying distorted images under a 100ms time constraint. We
find that human performance still exceeds the performance
of state-of-the-art neural networks on distorted images, even
if the display time is very short (100ms). Fine-tuning with
distorted images reduces this gap, but nevertheless a gap
still exists. The 100ms display time does not allow for eye
movements or other higher level visual processes. This tells
us that the human visual system is more efficient at processing “gist” level information than DNNs.
Note that our dataset is noticeably easier than the dataset
in [7]. This was to ensure that the human subjects could
still perform recognition at 100ms display times. A sideeffect of this choice of dataset is that it is much easier for the
deep neural networks to perform recognition. For example,
for such simple classes it may be sufficient to use simple
color information to recognize the images. A more difficult
dataset may expose a larger difference between human and
DNN performance.
These experiments provide a look into the bias and shortcomings of DNNs by comparing them with the human visual system. Future work could analyze other scenarios
where humans still outperform DNNs. These studies can
help motivate future work into more robust deep neural networks.
Acknowledgment
The authors would like to thank NVIDIA Corporation
for the donation of a TITAN X GPU used in these experi-
ments.
References
[1] T. J. Andrews and D. M. Coppola. Idiosyncratic characteristics of saccadic eye movements when viewing different visual environments. Vision research, 39(17):2947–2953,
1999. 1
[2] T. Bachmann. Identification of spatially quantised tachistoscopic images of faces: How many pixels does it take to
carry identity? European Journal of Cognitive Psychology,
3(1):87–103, 1991. 1
[3] A. Borji and L. Itti. Human vs. computer in scene and object
recognition. In IEEE Conference on Computer Vision and
Pattern Recognition (CVPR), pages 113–120, 2014. 1
[4] C. F. Cadieu, H. Hong, D. L. Yamins, N. Pinto, D. Ardila,
E. A. Solomon, N. J. Majaj, and J. J. DiCarlo. Deep neural networks rival the representation of primate IT cortex for
core visual object recognition. PLoS computational biology,
10(12):e1003963, 2014. 2
[5] Y. Chen, R. McBain, and D. Norton. Specific vulnerability
of face perception to noise: A similar effect in schizophrenia patients and healthy individuals. Psychiatry research,
225(3):619–624, 2015. 1
[6] S. Dodge and L. Karam. Understanding how image quality
affects deep neural networks. International Conference on
Quality of Multimedia Experience (QoMEX), 2016. 1
[7] S. Dodge and L. Karam. A study and comparison of human
and deep learning recognition performance under visual distortions. International Conference on Computer Communications and Networks, 2017. 1, 2, 3, 4, 6
[8] L. Fei-Fei, R. Fergus, and P. Perona. Learning generative
visual models from few training examples: An incremental
bayesian approach tested on 101 object categories. Computer
Vision and Image Understanding, 2007. 2
[9] F. Fleuret, T. Li, C. Dubout, E. K. Wampler, S. Yantis, and
D. Geman. Comparing machines and humans on a visual
categorization test. Proceedings of the National Academy of
Sciences, 108(43):17621–17625, 2011. 1
[10] R. Geirhos, D. H. J. Janssen, H. H. Schtt, J. R. M. Bethge,
and F. A. Wichmann. Comparing deep neural networks
against humans: object recognition when the signal gets
weaker. arXiv preprint arXiv:1706.06969, 2017. 1, 2
[11] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning
for image recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 770–778, 2016.
4
[12] C. Keysers, D.-K. Xiao, P. Földiák, and D. I. Perrett. The
speed of sight. Journal of cognitive neuroscience, 13(1):90–
101, 2001. 2
[13] S. R. Kheradpisheh, M. Ghodrati, M. Ganjtabesh, and
T. Masquelier. Deep networks can resemble human feedforward vision in invariant object recognition. Scientific reports, 6:32672, 2016. 2
[14] A. Oliva. Gist of the scene. Neurobiology of attention, 2005.
1
[15] D. Parikh. Recognizing jumbled images: The role of local
and global information in image classification. In IEEE International Conference on Computer Vision (ICCV), pages
519–526, 2011. 1
[16] M. C. Potter, B. Wyble, C. E. Hagmann, and E. S. McCourt.
Detecting meaning in rsvp at 13 ms per picture. Attention,
Perception, & Psychophysics, 76(2):270–279, 2014. 2
[17] E. Rodner, M. Simon, R. B. Fisher, and J. Denzler. Finegrained recognition in the noisy wild: Sensitivity analysis of
convolutional neural networks approaches. British Machine
Vision Conference (BMVC), 2016. 1
[18] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh,
S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein,
A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual
Recognition Challenge. International Journal of Computer
Vision (IJCV), 115(3):211–252, 2015. 1, 2, 4
[19] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. International
Conference on Learning Representations, 2014. 4
[20] S. Stabinger, A. Rodrı́guez-Sánchez, and J. Piater. 25 years
of cnns: Can we compare to human abstraction capabilities?
In International Conference on Artificial Neural Networks,
pages 380–387. Springer, 2016. 1
[21] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed,
D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich.
Going deeper with convolutions. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 1–9,
2015. 4
[22] A. Torralba, R. Fergus, and W. T. Freeman. 80 million tiny
images: A large data set for nonparametric object and scene
recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(11):1958–1970, 2008. 1
[23] F. Wang, M. Jiang, C. Qian, S. Yang, C. Li, H. Zhang,
X. Wang, and X. Tang. Residual attention network for image classification. IEEE Conference on Computer Vision and
Pattern Recognition (CVPR), 2017.
[24] A. R. Zamir, T.-L. Wu, L. Sun, W. Shen, J. Malik, and
S. Savarese. Feedback networks. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
| 1cs.CV
|
Thread-Modular Static Analysis for Relaxed Memory Models
Markus Kusano
Chao Wang
Virginia Tech
Blacksburg, VA, USA
University of Southern California
Los Angeles, CA, USA
arXiv:1709.10077v1 [cs.PL] 28 Sep 2017
ABSTRACT
We propose a memory-model-aware static program analysis method
for accurately analyzing the behavior of concurrent software running on processors with weak consistency models such as x86-TSO,
SPARC-PSO, and SPARC-RMO. At the center of our method is a
unified framework for deciding the feasibility of inter-thread interferences to avoid propagating spurious data flows during static
analysis and thus boost the performance of the static analyzer. We
formulate the checking of interference feasibility as a set of Datalog
rules which are both efficiently solvable and general enough to
capture a range of hardware-level memory models. Compared to
existing techniques, our method can significantly reduce the number of bogus alarms as well as unsound proofs. We implemented
the method and evaluated it on a large set of multithreaded C programs. Our experiments show the method significantly outperforms
state-of-the-art techniques in terms of accuracy with only moderate
runtime overhead.
CCS CONCEPTS
• Software and its engineering → Automated static analysis;
Formal software verification;
KEYWORDS
Concurrency, Abstract interpretation, Thread-modular reasoning,
Datalog, Relaxed memory model, TSO, PSO, RMO
1
INTRODUCTION
Concurrent software written for modern computer architectures,
though ubiquitous, remains challenging for static program analysis.
Although abstract interpretation [13] is a powerful static analysis
technique and prior thread-modular methods [19, 40, 47–49] mitigated interleaving explosion, none was specifically designed for
software running on weakly consistent memory. This is a serious
deficiency since weakly consistent memory may exhibit behaviors
not permitted by uniprocessors. For example, slow memory accesses
may be delayed, increasing performance, but also introducing additional inter-thread non-determinism. Thus, multithreaded software
running on such processors may exhibit erroneous behaviors not
manifesting on sequentially consistent (SC) memory.
Consider x86-TSO (total store order) as an example. Under TSO,
each processor has a store buffer caching memory write operations so they do not block the execution of subsequent instructions [4]. Conceptually, each processor has a queue of pending
writes to be flushed to memory at a later time. The flush occurs
non-deterministically at any time during the program’s execution.
This delay between the time a write instruction executes and the
time it takes effect may cause the write to appear reordered with
subsequent instructions within the same thread. Figure 1 shows an
example where the assertion holds under SC but not TSO. Since x
and y are initialized to 0 and they are not defined as atomic variables, the write operations (x=1 and y=1) may be stored in buffers,
one for each thread, and thus delayed after the read operations.
void thread1 () {
x = 1;
a = y;
}
void thread2 () {
y = 1;
b = x;
}
assert( !(a == 0 && b == 0) );
Figure 1: The assertion holds under SC, but not under x86TSO, SPARC-PSO, and SPARC-RMO memory models.
SPARC-PSO (partial store order) permits even more non-SC behaviors: it uses a separate store buffer for each memory address.
That is, x=1 and y=1 within the same thread may be cached in different store buffers and flushed to memory independently. This permits
the reordering of a write to x with a subsequent read from y, but
also with a subsequent write (e.g., to variable z) in the same thread.
The situation is similar under SPARC-RMO (relaxed-memory order).
We detail how such relaxation leads to errors in Section 2.
Broadly speaking, existing thread-modular abstract interpreters
fall into two categories, neither modeling weak-memory related
behaviors. The first are SC-specific [17, 18, 40]: they are designed
to be flow-sensitive in terms of modeling thread interactions but
consider only behaviors compatible with the SC memory. The second [47–49] are oblivious to memory models (MM-oblivious): they
permit all orderings of memory-writes across threads. Therefore,
MM-oblivious methods may report spurious errors (bogus alarms)
whereas SC-specific methods, although more accurate for SC memory, may miss real errors on weaker memory (bogus proofs). This
flaw is not easy to fix using conventional approaches [49]. For example, maintaining relational invariants at all program points makes
the analysis prohibitively expensive. In Section 2, we use examples
to illustrate issues related to these techniques.
We propose the first thread-modular abstract interpreter for
analyzing concurrent programs under weakly consistent memory.
Our method models thread interactions with flow-sensitivity, and is
memory-model specific: it models memory operations assuming a
processor-level memory model, as shown in Figure 2. In this figure,
the boxes with bold text highlight our main contributions.
Our method builds on a unified framework for modeling the
memory consistency semantics. Specifically, the feasibility of thread
interactions is formulated as a constraint problem via Datalog: it
is efficiently solvable in polynomial time, and adaptable to various
hardware-level memory models. Additionally, our method handles
thread interactions in a flow-sensitive fashion while being threadmodular. Analyzing one thread at a time, as opposed to the entire
program, increases efficiency, especially for large programs. However, unlike prior MM-oblivious methods we do not join all the
effects of remote stores before propagating them to a thread, thus
preserving accuracy. Overall, our method differs from the state-ofthe-art, which either are non-thread-modular [14, 17, 39, 45] or not
specifically targeting weak memory [40, 47–49].
Our method also differs significantly from techniques designed
for bug hunting as opposed to obtaining correctness proofs. For
example, in concurrency testing, stateless dynamic model checking [22, 25] was extended from SC to weaker memory models [1,
void thread1 () {
x = 5;
fence ;
y = 10;
}
Thread-Modular
Analysis
Sequential Abstract
Interpretation
Feasibility of
Thread Interference
Parameterized by
Memory Models
(SC, TSO, PSO,
RMO, etc.)
Figure 2: FruitTree: Our memory-model-aware, threadmodular, static program analysis procedure.
2, 16, 32, 51, 52, 67]. In bounded model checking, Alglave et al. [8]
modeled weak memory through code transformation or direct symbolic encoding [7, 9]. However, these methods cannot be used to
verify properties: if they do not find bugs, it does not mean the
program is correct. In contrast, our method, like other abstract
interpreters, is geared toward obtaining correctness proofs.
We implemented our new method in a tool named FruitTree,
using Clang/LLVM [5] as the C front-end, Apron [37] for abstract
domains, and the µZ [30] Datalog engine in Z3 [15]. We evaluated FruitTree on 209 litmus tests, and 52 larger multithreaded
programs totaling of 61,981 lines of C code. Reachability properties were expressed as embedded assertions. Our results show that
FruitTree is significantly more accurate than state-of-the-art techniques with moderate runtime overhead.
Specifically, we compared FruitTree against the MM-oblivious
analyzer of Miné [49], the SC-specific thread-modular analyzer
Watts [40], and a non thread-modular analyzer named Duet [17,
18]. On the litmus tests, FruitTree is more accurate than the other
three methods. On the larger benchmarks, including Linux device
drivers, FruitTree proved 4,577 properties, compared to 1,752
proved by Miné’s method.
To summarize, we make the following contributions:
• We propose a memory-model aware static analysis method
based on thread-modular abstract interpretation.
• We introduce a declarative analysis framework for deducing the feasibility of thread-interferences on weak memory.
• We implement and evaluate our method on a set of benchmarks to demonstrate its high accuracy and moderate runtime overhead.
The remainder of this paper is organized as follows. First, we
motivate our technique via examples in Section 2. Then, we provide background on memory models and abstract interpretation in
Section 3. We present our new declarative analysis for checking the
feasibility of thread inferences in Section 4, followed by the main
algorithm for thread-modular abstract interpretation in Section 5.
We present our experimental results in Section 6, review related
work in Section 7, and conclude in Section 8.
2
MOTIVATION
Consider the program in Figure 3. The assertion holds under SC,
TSO, PSO, and RMO. But, removing the fence causes it to fail under
PSO and RMO. In this section, we show why MM-oblivious methods
may generate bogus errors, why SC-specific ones may generate
bogus proofs, and how our new method fixes both issues.
2.1
Behaviors under SC, TSO, PSO, and RMO
First, note that the assertion in Figure 3 holds under SC since each
thread executes its instructions in program order, i.e., x = 5 takes
void thread2 () {
if ( y == 10) {
assert ( x == 5);
}
}
Figure 3: The assertion always holds, but if the fence is removed, the assertion may fail under PSO and RMO.
effect before y = 10. So, thread two observing y to be 10 implies x
must have been set to 5.
Next, we explain why the assertion holds under TSO [4]. TSO
permits the delay of a store after a subsequent load to a disjoint
memory address (as in Figure 1). This program-order relaxation is
a performance optimization, e.g., buffering slow stores to speed
up subsequent loads. However, since all stores in a thread go into
the same buffer, TSO does not allow the reordering of two stores
(thread 1, Figure 3). Thus, even without the fence, x = 5 always
takes effect before y = 10, meaning the assertion holds.
Next, we show why removing the fence causes the assertion to
fail under PSO and RMO. Both permit store–store reordering by
allowing each processor to have a separate store buffer for each
memory address. Thus x and y are in separate buffers. Since buffers
are flushed to memory independently, with the fence removed,
y = 10 may take effect before x = 5, as if the two instructions
were reordered in this thread. Thus, the second thread may read 10
from y before 5 is written to x in global memory, thus causing the
assertion to fail.
The fence is important because it forces all stores issued before
the fence to be visible to all loads issued after the fence, i.e., x = 5
takes effect before y = 10, even under PSO and RMO. Thus, the
assertion holds again.
2.2
Ineffectiveness of Existing Methods
MM-oblivious methods [47–49] report bogus alarms because they
were not designed for weak memory, and they ignore the causality of inter-thread data flows. Thus, they tend to drastically overapproximate the interferences between threads.
For example, an MM-oblivious static analysis may work as follows. First, it analyzes each thread as if it were a sequential program.
Then, it joins the effects of all stores on global memory—known as
the thread interferences. Next, it individually analyzes each thread
again, this time in the presence of the thread interferences computed
from the previous iteration: when a thread performs a memory read,
the value may come from any one of these thread interferences.
This iterative process repeats until a fixed point is reached.
Next, we demonstrate how the MM-oblivious analyzer works
on Figure 3. Consider the thread interferences to be a map from
variables to abstract values in the interval domain [13]. Thread
1 generates interferences x 7→ [5, 5] and y 7→ [10, 10]. Within
thread 2, the load of y may read from local memory, [0, 0], or the
interference [10, 10]. Thus, y = [0, 0] ⊔ [10, 10] = [0, 10], where ⊔
is the join operator in the interval domain. Similarly, the load of x
may read from local memory, [0, 0], or the interference [5, 5], i.e.,
x = [0, 5]. Thus, the assertion is incorrectly reported as violated.
While our previous example used the non-relational interval
domain the bogus alarm remains when using a relational abstract
domain: the propagation of interferences in MM-oblivious methods
is inherently non-relational. Inferences map variables to a single values, causing all relations to be forgotten. Conventional approaches
Method
MM-oblivious (e.g. [47–49])
SC
(bogus)
alarm
SC-specific (e.g. [17, 18, 40])
proof
Our method
proof
Program in Figure 1
with fences
without fences
TSO
PSO/RMO
SC
TSO
PSO/RMO
(bogus)
(bogus)
(bogus)
alarm
alarm
alarm
alarm
alarm
(bogus)
(bogus)
(bogus)
(bogus)
proof
proof
proof
proof
proof
proof
proof
proof
alarm
alarm
SC
(bogus)
alarm
proof
proof
Program in Figure 3
with fences
without fences
TSO
PSO/RMO
SC
TSO
PSO/RMO
(bogus)
(bogus)
(bogus)
(bogus)
alarm
alarm
alarm
alarm
alarm
(bogus)
(bogus)
(bogus)
(bogus)
proof
proof
proof
proof
proof
proof
proof
proof
proof
alarm
Figure 4: Comparing the effectiveness of various methods in handling the example programs in Figure 1 and Figure 3.
cannot easily fix this since maintaining relational invariants at all
global program points is prohibitively expensive.
In contrast, prior SC-specific methods [17, 18, 40] do not report
bogus alarms: they assume x = 5 takes effect before y = 10. This
leads to more accurate analysis results for SC, but is unsound under
weak memory, e.g., they miss the assertion failure in Figure 3 under
PSO or RMO when the fence is removed.
Figure 4 summarizes the ineffectiveness of prior techniques on
the programs in Figures 1 and 3 with and without fences. Note
that in Figure 1 the fence instruction may be added between the
write and read instructions of both threads. The table in Figure 4
shows how prior MM-oblivious methods report bogus alarms, prior
SC-specific methods report bogus proofs, while our new method
eliminates both.
2.3
How Our Method Handles Memory Models
Some prior techniques lead to bogus alarms because they overapproximate thread interferences, i.e., they allow a load to read
from any remote store regardless of whether such a data flow, or
combination of flows, is feasible, while others lead to missed bugs
because they under-approximate thread interferences, i.e., they do
not allow any non-SC data flow. Consider Figure 3: the load of
x may read 0 or 5, and the load of y may read 0 or 10, but the
combination of x reading 0 and y reading 10 is infeasible. Realizing
this, our method checks the feasibility of interference combinations
under weak-memory semantics before propagating them.
Toward this end, we propose two new techniques. The first is
the flow-sensitive propagation of thread interferences. Instead of
eagerly joining all interfering stores, we handle each combination
separately. The second is a declarative modeling of the memory
consistency semantics general enough to capture SC, TSO, PSO,
and RMO [4, 58, 65]. Together, these techniques prune infeasible
combinations of thread interferences such as x and y reading 0 and
10, respectively, in Figure 3.
Our new method analyzes thread 2 in Figure 3 by considering
four different interference combinations, ρ 1 –ρ 4 , separately.
•
•
•
•
ρ1
ρ2
ρ3
ρ4
= y 7→ [0, 0] and x 7→ [0, 0],
= y 7→ [10, 10] and x 7→ [5, 5],
= y 7→ [0, 0] and x 7→ [5, 5],
= y 7→ [10, 10] and x 7→ [0, 0].
We gain accuracy in two ways. First, we remove spurious values
caused by an eager join (e.g., we no longer have y = [0, 10]). Second, we query a lightweight constraint system to quickly deduce
infeasibility of an interference combination on demand. ρ 1 , ρ 2 , and
ρ 3 are all feasible but they do not cause assertion failures.
Our check for infeasibility of an interference combination is
implemented using Datalog (Horn clauses within finite domains),
solvable in polynomial time. We will provides details of this constraint system in Section 4. For now, consider ρ 4 in Figure 3: it is
infeasible (unless we assume the program runs under PSO or RMO
with the fence removed). We deduce infeasibility as follows:
• y = 10 has executed (it is being read from),
• thus x = 5 has executed (due to the program-order requirement on SC and TSO, and the fence on PSO and RMO),
• so the load of x must not read from its initial value [0, 0].
This deduction leads to a formal proof that ρ 4 can not exist in any
concrete execution. Since the combinations ρ 1−3 do not violate the
assertion, and ρ 4 is proved to be infeasible, the property is verified.
3
PRELIMINARIES
In this section, we review weak memory models at the processor
level (as opposed to the programming language level) and static
program analysis based on abstract interpretation.
3.1
Concurrent Programs
We are concerned with a program consisting of a finite set of threads.
Each thread assesses a set {a, b, c, . . .} of local variables. All threads
access a set {x, y, z, . . .} of global variables via load and store instructions. A thread creates a child thread with ThreadCreate, and
waits it to terminate with ThreadJoin.
We represent a program using a set G = {G 1 , . . . , G k } of flow
graphs. Each flow graph G ∈ G, where G = ⟨N , n 0 , δ ⟩, is a thread:
N ⊆ N is the set of program locations of the thread, n 0 ∈ N is the
entry point, and δ is the transition relation. That is, (n ′, n) ∈ δ iff
there exists an edge from n ′ to n.
Each program location n ∈ N is associated with an atomic instruction that may be a load, store, or fence. Non-atomic statements
such as y = x+1, where both x and y are global variables, can be
transformed to a sequence of atomic instructions, e.g., the load a =
x followed by the store y = a+1, where a is a local variable in both
cases. When accessing variables on the global memory, threads
may use a special fence instruction to impose a strict program order
between memory operations issued before and after the fence.
3.2
Memory Consistency Models
The simplest memory model is sequential consistency (SC) [43]. SC
corresponds to a system running on a single coherent memory timeshared by operations executed from different threads. There are two
important characteristics of SC: the program-order requirement and
the write-atomicity requirement. The program-order requirement
says that the processor must ensure that instructions within a
thread take effect in the order they appear in the program. The
write-atomicity requirement says that the processor must maintain
the illusion of a single sequential order among operations from all
Memory Model
SC [43]
TSO [55, 65]
PSO [65]
RMO [58, 65]
R(v 1 )→R(v 1 )
R(v 1 )→W(v 1 )
no
no
no
no
no
no
no
no
Which Program-Order Relaxation Is Allowed?
W(v 1 )→R(v 1 ) W(v 1 )→W(v 1 ) R(v 1 )→R(v 2 ) R(v 1 )→W(v 2 )
no
no*
no*
no*
no
no
no
no
no
no
no
yes
no
no
no
yes
W(v 1 )→R(v 2 )
W(v 1 )→W(v 2 )
no
yes
yes
yes
no
no
yes
yes
Write-Atomicity
read own
write early
no
yes
yes
yes
Figure 5: Allowed relaxations of various processor-level memory models (cf. [4]). v 1 and v 2 are distinct variables, and * indicates
rule needs to be relaxed to allow read-own-write-early behaviors (see Section 4.6 for explanation).
threads. That is, the effect of any store operation must take effect
and become visible either to all threads or to none of the threads.
SC is an ideal memory model: In real CPUs, the hardware-level
memory models are often weaker than SC, and can be characterized
by their corresponding relaxations of the program-order and writeatomicity requirements as shown in Figure 5. Here, R(v 1 ) → W (v 2 )
is a read of v 1 followed by a write of v 2 in the same thread.
Specifically, TSO allows x=1;a=y to be reordered as a=y;x=1,
according to W(v 1 )→R(v 2 ) in Column 8, where v 1 is x and v 2
is y. PSO further allows x=1;y=2 reordered to y=2;x=1, according to W(v 1 )→W(v 2 ) in Column 9. As shown in Section 2, these
program-order relaxations, conceptually, are the effect of store
buffering, which delay the stores past subsequent stores/loads
within a thread. Neither TSO nor PSO permits the delay of a load.
Weaker still is RMO, which permits the relaxations of R(v 1 )→R(v 2 )
and R(v 1 )→W(v 2 ), as shown in Columns 6 and 7 of the table in
Figure 5.
By relaxing the write-atomicity requirement, all three weaker
memory models allow a thread to read its own write early. That is,
the thread can read a value it has written before the value reaches
the global memory and hence becomes visible to other threads.
3.3
Abstract Interpretation
Abstract interpretation is a popular technique for conducting static
program analysis [13]. In this context, a numerical abstract domain
defines, for every n ∈ N of the program, a memory environment
s. It is a map from each program variable to its abstract value1 .
Consider intervals, which map each variable to a region defined
by the lower and upper bounds. For a program with two integer
variables x and y where both may have any value initially, the
memory environment associated with the entry point n 0 ∈ N is
s 0 = {x 7→ ⊤, y 7→ ⊤}, where ⊤ = (−∞, +∞). After executing x =
1, the memory environment becomes s 1 = {x 7→ [1, 1], y 7→ ⊤}.
The process of computing s 1 based on s 0 is represented by the
transfer function of x = 1. Additionally, the join is defined as
[l 1 , u 1 ] ⊔ [l 2 , u 2 ] = [min(l 1 , l 2 ), max(u 1 , u 2 )]. The partial-order relation is defined as [l 1 , u 1 ] ⊑ [l 2 , u 2 ] if and only if l 1 ≥ l 2 and u 1 ≤ u 2 .
For example [1, 3] ⊔ [7, 10] = [1, 10] and [4, 6] ⊑ [1, 10].
We use S to denote the set of all memory environments. S is
a lattice with properly defined top (⊤) and bottom (⊥) elements,
join (⊔), partial-order (⊑), and a widening operator [13]. Each node
n ∈ N has a transfer function t ∈ S → S, taking an environment
s ′ ∈ S as input (before executing the atomic operation in n) and
returns a new environment s ∈ S as output.
Let TFunc ∈ N → (S → S) be a map from each node to its
transfer function. For example, given a node n ∈ N whose operation
1 For
ease of presentation we assume a variable maps to a single value. Our analysis
can trivially use relational domains.
is x = a+1, if s ′ = {x 7→ [1, 3], a 7→ [2, 5]}, the new environment
is s = (TFunc(n))(s ′ ) = {x 7→ [3, 6], a 7→ [2, 5]}.
The goal of an abstract interpreter is to compute an environment
map M ∈ (N → S) over-approximating the memory state at every
program location. M, typically, initially maps all variables in the
entry node to ⊤, and all variables in other nodes to ⊥. Then, it
iteratively applies the transfer function TFunc(n) and joins the
resulting environments for all n, until they reach a fixed point.
Without getting into more details (refer to the literature [13]),
we define the sequential analyzer as a fixed-point computation with
respect to the function AnalyzeSeq ∈ (N → S) → (N → S):
Ä
AnalyzeSeq(M) = n 7→ (TFunc(n))(
M(n ′ ))
(n ′,n)∈δ
Here, M(n ′ ) is the
à environment produced by a predecessor node
n ′ of n, and s ′ = (n ′,n)∈δ M(n ′ ) is the join of these environments.
(TFunc(n))(s ′ ) is the new memory environment produced by executing the operation in n. Applying this function to all nodes of a sequential program until a fixed point leads to an over-approximated
memory state for each program location.
However, directly applying the sequential analyzer to each execution of a multithreaded program is not practical because it
leads to an exponential complexity. Instead, thread-modular techniques [40, 47–49] iteratively apply AnalyzeSeq to each thread, as if
it were a sequential program, and then merge/propagate the global
memory effects across threads. The iterative process continues until
memory environments in all threads stabilize.
Since each thread is analyzed in isolation, this approach is more
scalable than non-thread modular techniques. However, it may
result in accuracy loss because the analyzer for each thread relies
on a coarse-grained abstraction of interferences from other threads.
When analyzing a thread t in the presence of a set of threads T , for
example, the interferences are the effects of global memory stores
from all t ′ ∈ T . The interferences are a map (V → 2S ) from each
variable v ∈ V read by thread t to the set of memory environments
produced by interfering stores, where V is the set of all program
variables, and 2S is the power set of S.
Prior thread-modular techniques [47–49] eagerly join all interfering memory states from the other threads in T before propagating
them to the current thread t. As such, they often introduce bogus
store-to-load data flows into the static analysis or miss valid storeto-load data flows. In the remainder of this paper, we present our
method for mitigating this problem.
4
DECIDING INTERFERENCE FEASIBILITY
In this section, we describe our new method for quickly deciding the
feasibility of a combination of store-to-load data-flows under a given
memory model. An interference combination is a set ic = {(l, s), . . .}
where each (l, s) ∈ ic is a load l and an interfering store s.
Checking the feasibility of ic is formulated as a deductive analysis with inputs: (1) the flow graph of the current thread, (2) the
flow graphs of all interfering threads, and (3) the existing set of
store-to-load data flows represented by {(l, s)|(l, s) ∈ ReadsFrom}.
The output of this deductive analysis is the relation MustNotReadFrom. (l, s) ∈ MustNotReadFrom means the load l must not read
from the store s since our analysis proved the data flow from s to l
is infeasible given the input ReadsFrom relation in ic.
Consider the program in Figure 3 as an example. One thread
interference combination we want to check is the load of y from
y=10 and the load of x from the initial value 0. Let these load
and store instructions be denoted ly , sy10 , l x , and s x0 , respectively.
Then, the feasibility problem is stated as follows: given (ly , sy10 ) ∈
ReadsFrom, check if (l x , s x0 ) ∈ MustNotReadFrom.
4.1
Notations
Before presenting the details of our feasibility checking procedure,
we define a set of unary and binary relations over instructions and
program variables. Specifically, (s 1 , v 1 ) ∈ IsLoad denotes s 1 is a load
of variable v 1 , and (s 2 , v 2 ) ∈ IsStore denotes s 2 is a store to variable
v 2 . We use (s 1 , _) ∈ IsLoad if we do not care about the variable.
Similarly, we use f ∈ IsFence to denote that f is a fence. We
also use IsLLMembar, IsLSMembar, IsSLMembar, IsSSMembar to
denote load–load, load–store, store–load, and store–store memory
barriers as defined in the SPARC architecture [65]; for example,
a load–store membar prevents loads before the barrier from being
reordered with subsequent stores.
We define binary relations over instructions s 1 and s 2 : the first
four relations (Dominates, NotReachableFrom, ThreadCreates,
ThreadJoins) are determined by the program’s flow graphs. Based
on them, we deduce the MHB relation, which must be satisfied by
all program executions. The ReadsFrom relation comes from the
given ic, from which we deduce the MustNotReadFrom relation.
(s 1, s 2 ) ∈
(s 1, s 2 ) ∈
(s 1, s 2 ) ∈
(s 1, s 2 ) ∈
(s 1, s 2 ) ∈
(s 1, s 2 ) ∈
(s 1, s 2 ) ∈
Dominates means that s 1 dominates s 2 in the control flow
graph of a thread.
NotReachableFrom means that s 1 cannot be reached from s 2
in the control flow graph of a thread.
ThreadCreates means s 1 is the thread creation and s 2 is the
first operation of the child thread.
ThreadJoins means s 1 is the thread join and s 2 is the last
operation of the child thread.
MHB means that s 1 must happen before s 2 in all executions of
the program.
ReadsFrom means that s 1 is a load that reads the value written
by the store s 2 .
MustNotReadFrom means that s 1 must not read from the
value written by s 2 .
Consider Figure 3 again, where we want to check if the load
of y in the second thread reads from y=10, then is it possible for
the load of x to read from the initial value 0? In this case, we
encode the assumption as (ly , sy10 ) ∈ ReadsFrom. Next, we deduce
the MustNotReadFrom relation. Finally, we check if (l x , s x0 ) ∈
MustNotReadFrom.
4.2
Relaxing the Program-Order Requirement
To model the program order imposed by different memory models,
we define a new relation NoReorder such that (s 1 , s 2 ) ∈ NoReorder
if the reordering of s 1 and s 2 within the same thread is not allowed.
We define the rules for NoReorder based on the allowed programorder relaxations for different memory models (Figure 5).
For SC, NoReorder is defined as:
⊤
(s 1, s 2 ) ∈ NoReorder
(under SC)
That is, no reordering is ever allowed under SC (row SC Figure 5).
For TSO, NoReorder is defined as:
(s 1, _) ∈ IsLoad
(s 1, s 2 ) ∈ NoReorder
(s 2, _) ∈ IsStore
(s 1, s 2 ) ∈ NoReorder
(under TSO)
(under TSO)
Under TSO, two operations (s 1 , s 2 ) can not reorder in six of the
eight cases. The first rule above disallows Columns 2, 3, 6, and 7
(Figure 5), while the second disallows Columns 3, 5, 7, and 9. Thus,
reordering is permitted in two cases: Columns 4 and 8.
Although this is counter-intuitive, note that W (v 1 ) → R(v 1 )
(Column 4) may be reordered in our analysis under TSO (and PSO
and RMO) for soundness: it permits read-own-write-early behaviors.
We detail this shortly in Section 4.6.
For PSO, NoReorder is defined as:
(s 1, _) ∈ IsLoad
(s 1, s 2 ) ∈ NoReorder
(under PSO)
(s 1, v 1 ) ∈ IsStore ∧ (s 2, v 1 ) ∈ IsStore
(s 1, s 2 ) ∈ NoReorder
(under PSO)
Under PSO, two operations (s 1 , s 2 ) can not reorder in five of the
eight cases. The first rule above disallows Columns 2, 3, 6, and 7,
while the second disallows Column 5. Thus, reordering is permitted
only in the remaining three cases (Columns 4, 8, and 9).
For RMO, the inference rules are defined as:
(s 1, v 1 ) ∈ IsLoad ∧ (s 2, v 1 ) ∈ IsLoad
(s 1, s 2 ) ∈ NoReorder
(s 1, v 1 ) ∈ IsLoad ∧ (s 2, v 1 ) ∈ IsStore
(s 1, s 2 ) ∈ NoReorder
(s 1, v 1 ) ∈ IsStore ∧ (s 2, v 1 ) ∈ IsStore
(s 1, s 2 ) ∈ NoReorder
(under RMO)
(under RMO)
(under RMO)
Similarly, the above inference rules can be directly translated from
Columns 2, 3, and 6 of the table in Figure 5.
4.3
Handling Fences and Memory Barriers
Next, we present the ordering constraints imposed by fences and
memory barriers. We consider four variants of the membar instruction, which prevents loads and/or stores before the membar from
being reordered with subsequent loads and/or stores [65].
m ∈ IsLLMembar ∧ (s 1, _) ∈ IsLoad ∧ (s 2, _) ∈ IsLoad
∧(s 1, m) ∈ Dominates ∧ (m, s 2 ) ∈ Dominates
(s 1, s 2 ) ∈ NoReorder
m ∈ IsLSMembar ∧ (s 1, _) ∈ IsLoad ∧ (s 2, _) ∈ IsStore
∧(s 1, m) ∈ Dominates ∧ (m, s 2 ) ∈ Dominates
(s 1, s 2 ) ∈ NoReorder
m ∈ IsSLMembar ∧ (s 1, _) ∈ IsStore ∧ (s 2, _) ∈ IsLoad
∧(s 1, m) ∈ Dominates ∧ (m, s 2 ) ∈ Dominates
(s 1, s 2 ) ∈ NoReorder
m ∈ IsSSMembar ∧ (s 1, _) ∈ IsStore ∧ (s 2, _) ∈ IsStore
∧(s 1, m) ∈ Dominates ∧ (m, s 2 ) ∈ Dominates
(s 1, s 2 ) ∈ NoReorder
We also model fences in terms of membars since they prevent
loads and stores from being reordered with subsequent loads and
stores as well.
(s, s sta ) ∈ ThreadCreates
(s, s end ) ∈ ThreadJoins
(s, s sta ) ∈ MHB
(s end , s) ∈ MHB
(s 1, s 2 ) ∈ Dominates ∧ (s 2, s 1 ) ∈ NotReachableFrom
∧ (s 1, s 2 ) ∈ NoReorder
(s 1, s 2 ) ∈ MHB
(s 1, s 2 ) ∈ MHB ∧ (s 2, s 3 ) ∈ MHB
(s 1, s 3 ) ∈ MHB
(l, s 1 ) ∈ ReadsFrom ∧ (s 1, s 2 ) ∈ MHB
∧ (l, v) ∈ IsLoad ∧ (s 1, v) ∈ IsStore ∧ (s 2, v) ∈ IsStore
s1
(1)
s1
DOMINATES
DOMINATES
(2)
s2
s2
(3)
(4)
Figure 8: Example illustrating Rule (2)
(l, s 2 ) ∈ MHB
Store(v)
s1
Figure 6: Deduction rules for MHB (must-happen-before).
(l, s) ∈ MHB
(l, s) ∈ MustNotReadFrom
(l 1, s 1 ) ∈ ReadsFrom ∧ (l 1, s 2 ) ∈ MHB ∧ (s 2, l 2 ) ∈ MHB
∧(l 1, v) ∈ IsLoad ∧ (l 2, v) ∈ IsLoad ∧ (s 2, v) ∈ IsStore
READSFROM
(5)
MHB
l
(6)
(l 2, s 1 ) ∈ MustNotReadFrom
Store(v)
MHB
Load(v)
s2
Figure 7: Deduction rules for the MustNotReadFrom.
Figure 9: Example illustrating Rule (4)
f ∈ IsFence
f ∈ IsFence
f ∈ IsLLMembar
f ∈ IsFence
f ∈ IsLSMembar
f ∈ IsFence
f ∈ IsSLMembar
f ∈ IsSSMembar
Store(v)
Rules for Deducing MustNotReadFrom
We divide our inference rules into two groups. The first (Figure 6)
use the relations ThreadCreates, ThreadJoins, Dominates, and
NoReorder to generate the must-happen-before (MHB) relation.
Rule (1) states that if the instruction s creates a thread with
entry instruction s sta , then s must happen before s sta . Similarly,
if instruction s joins a thread with exit instruction s end , then s end
must happen before s.
Rule (2) states that if s 1 dominates s 2 within a thread’s CFG,
and s 1 is not reachable from s 2 , (i.e., no loop encompasses both s 1
and s 2 ), then, if permitted by the memory model, s 1 must happen
before s 2 . Figure 8 exemplifies this rule: the loop in the left CFG is
outside the Dominates edge, thus (s 1 , s 2 ) ∈ NotReachableFrom.
The loop in the right CFG encompasses the Dominates edge, thus
(s 1 , s 2 ) < NotReachableFrom.
Rule (3) states that the MHB relation is transitive: if s 1 must
happen before s 2 , and s 2 must happen before s 3 , then s 1 must happen
before s 3 . Correctness follows from the definition of MHB.
Rule (4) states that if a load l reads from the value written by the
store s 1 , then l must happen before some second store to the same
variable s 2 takes effect. This is intuitive because, if s 2 takes effect
READSFROM
l1
In addition to fences explicitly added to the program, there are
fences implicitly added to thread routines such as lock/unlock and
signal/wait. For example, in the code snippet x = 1; lock(lk);
a = y; unlock(lk), there is a fence inside lock(lk), to ensure x = 1 always takes effect before a = y. This is how most
modern programming systems guarantee data-race-freedom [3]
to application-level code (i.e., programs without data races have
only SC behaviors). Thus, we model every call sc to a POSIX thread
routine using sc ∈ IsFence.
4.4
s1
Load(v)
MHB
MustNotReadFrom
s2
Store(v)
MHB
Load(v)
l2
Figure 10: Example illustrating Rule (6).
before l (but after the first store s 1 ), then l can no longer read from
s 1 . Figure 9 exemplifies this rule. Its correctness is obvious.
The second group of inference rules (Figure 7) takes the relations
MHB and ReadsFrom and generates the MustNotReadFrom relation. Recall that if a load-store pair (l, s) ∈ MustNotReadFrom,
the value stored by s can never flow to l. Thus, MustNotReadFrom
may be used to eliminate infeasible data flows.
Rule (5) states that if a load l must happen before a store s, then l
cannot read from s. This follows from the definition of MHB. Note
that a store s “happens” when it propagates to main memory.
Rule (6) states that if a load l 1 reads from a store s 1 , and l 1 must
happen before some other store s 2 , and s 2 must happen before a
second load l 2 , then l 2 cannot read from s 1 . Figure 10 exemplifies
this rule. This is correct because l 2 reading from s 1 would mean s 1
takes effect after s 2 thus preventing l 1 from reading s 1 .
4.5
Soundness and Incompleteness
When deciding the feasibility of an interference combination our
analysis is designed to be sound but incomplete. By sound we mean
it permits all possible program behaviors allowed by a memory
model. Therefore, if it says a certain interference combination is
infeasible it must be infeasible. However, there is no guarantee
every infeasible interference combination will be found.
Incompleteness is expected: the intent is a quick pruning of infeasible combinations before the computationally expensive threadlevel analysis. The overhead of insisting on completeness would
outweigh its benefit: the feasibility checking problem, in the worst
case, is as hard as program verification itself, which is undecidable.
Now, we formally state the soundness of our deductive procedure. First, our deduction of the NoReorder relation relaxing the
program order requirement, from Figure 5, is sound.
this trace, we must allow the following interference combination:
s 2 reads from s 1 , s 3 reads from the initial value 0, and s 6 reads from
the initial value 0. This combination is feasible only when we avoid
enforcing the program order between s 1 and s 2 . Specifically, the
statements in thread 2 follow program order (s 4 , s 5 , s 6 ) from the
fence. In thread 1, s 2 and s 3 are ordered since they are added to
NoReorder under TSO. But, statements s 1 and s 2 are not added to
NoReorder, thus preventing the assertion from being (incorrectly)
verified.
Theorem 4.1. Let s 1 and s 2 be two instructions in the same thread.
If our rules deduce (s 1 , s 2 ) ∈ NoReorder, then the reordering of s 1
and s 2 is not allowed by the corresponding memory model.
5
The proof of this theorem is straightforward, since our inference
rules for deducing NoReorder directly follow the memory model
semantics provided by Adve and Gharachorloo [4] in Figure 5.
Next, we note that, given the ReadsFrom relation, the deduction
of the MustNotReadFrom relation is also sound.
Theorem 4.2. Let l and s be two instructions. If our rules deduce
to (l, s) ∈ MustNotReadFrom, then l cannot read from s.
The proof of this theorem is straightforward: it amounts to proofs
of Rules (1)–(6). During the previous presentation, we have argued
why each rule is correct. More formal proofs can be obtained via
proof-by-contradiction, which is straightforward. We omit the details
for brevity.
4.6
Relaxing the Write-Atomicity Requirement
Our method soundly models buffer forwarding, which corresponds
to the write-atomicity requirement (Column 10 Figure 5). This
allows a thread to read its own write before the written value is
flushed to the memory, thus becoming visible to other threads. This
is modeled in both the thread-level analyzer (AnalyzeSeq) and the
deduction rules.
AnalyzeSeq captures the relaxation for free. During this analysis
each thread is treated as a sequential program: all loads read their
values from the preceding writes within the same thread.
The deduction rules for NoReorder (Section 4.2) always permit the reordering of a store with a subsequent load of the same
variable (Column 4, Figure 5). That is, if (s 1 , v 1 ) ∈ IsStore and
(s 2 , v 1 ) ∈ IsLoad, we do not deduce (s 1 , s 2 ) ∈ NoReorder due to
buffer forwarding (even though it is counter-intuitive). Within a
thread t, it may appear to be the case that the store and load are
reordered from the perspective of all threads t ′ , t. Forbidding
this reordering would be equivalent to forcing a full flush of the
store-buffers before every load, thus prohibiting any thread from
reading its own store earlier than other threads.
void thread1 () {
x = 1; // s1
a = x; // s2
b = y; // s3
}
void thread2 () {
y = 1; // s4
fence ; // s5
c = x ; // s6
}
assert( !(a ==1 && b == 0 && c == 0) );
Figure 11: Write atomicity example under TSO.
Figure 11 exemplifies the requirement of this relaxation. First,
the assertion may be violated under TSO. An error trace is: x = 1;
a = 1; b = 0; y = 1; flush y; c = 0; flush x. To permit
THE THREAD-MODULAR ANALYSIS
Next, we present the integration of our interference analysis (Section 4) with a thread-modular analyzer. The thread-modular analyzer itself is standard, whose full details may be found in several
prior works including [48, 49] and [40]. Thus, our presentation
of the analyzer itself will be terse. Instead, we shall focus on our
main contribution, which is adding the capability of deducing infeasible interference combinations for weak-memory models: our
method is sound for not only SC but also TSO, PSO, and RMO. Prior
techniques were either MM-oblivious, or sound only for SC.
Given a load l of v, the interferences on l, within the threadmodular analysis, are the environments after all stores to v from
other threads. The function n(G) takes a graph as input and returns
the nodes of the graph. The interferences on the loads in a thread
G is the least fixed point of the function Interfs ′ .
Interfs ′ (G, M, I ) = l 7→ {e} ∪ I (l)
where e is the environment after a remote store s < n(G)
to the same variable as loaded by load l ∈ n(G)
Interfs(G, M) = lfp(Interfs ′ (G, M), I ⊥ )
We use Interfs ′ (G, M, I ) as shorthand for Interfs ′ (G, M)(I ), where
Interfs ′ (G, M) is a partially-applied function, and use I ⊥ as the initial map from loads to interfering-environments, i.e., one mapping
all nodes to {⊥}. lfp computes the least fixed point. Interfs ′ depends
on the existence of M, a map from each program location, in all
threads, to an environment. We show shortly that the computation
of M and the interferences is done in a nested fixed point.
We refer to an interference combination, ic ∈ (N 7→ S), as a map
from a load l to the memory environment after a store instruction from which l reads. This differs slightly from the definition
of Section 4 where it is defined as a set of load-stores pairs. The
two can be easily converted as the analysis keeps track of all the
environments associated with each store. Given the set of interferences I from Interfs, the set of all interference-combinations are
all permutations of selecting a single environment from I for each
load. The iterative thread-modular analysis separately considers
each interference-combination thus increasing accuracy.
The thread analyzer adapts the sequential analyzer (AnalyzeSeq,
Section 3) to use interference-combinations. AnalyzeTM ′ takes a
thread G and an interference combination ic and computes the input
environment e for some node n in G by joining the environment
after the predecessors of n with n’s environment in ic, denoted ic(n).
Then, e is passed to n’s transfer function to update M(n).
AnalyzeTM ′ (G, ic, M) = n 7→ TFunc(n)(e)
Ä
where e =
M(n ′ ) ⊔ ic(n)
(n ′,n)∈t(G)
AnalyzeTM(G, ic) = lfp(AnalyzeTM ′ (G, ic), M ⊥ )
AnalyzeTM is the least fixed point of AnalyzeTM ′ . t(G) returns
the transition-relation of a graph. M ⊥ is the initial memory map
mapping the entry nodes of each thread to ⊤ and all others to ⊥.
Given a set of threads Gs and a set of interference-combinations I ,
applying AnalyzeTM to each G ∈ Gs and each ic ∈ I computes the
analysis over all threads.
What remains is to show how the thread analyzer and the calculation of interferences can be done simultaneously since they are
dependent: the interference computation depends on the analysis
result, M, and the analysis result depends on the set of interferences, I . The solution is a nested fixed point: the outer computation
produces M, and the inner computation produces I . The process
iterates until M (and thus I ) reach a fixed point.
Analyze(G, M) = M ′
where I = Interfs(G, M)
I ′ = FilterFeasible(I )
M ′ = JoinMM(map(AnalyzeTM(G), I ′ ))
AnalyzeAll ′ (Gs, M) = JoinMM(map(Analyze(M), Gs))
AnalyzeAll(Gs) = lfp(AnalyzeAll ′ (Gs), M ⊥ )
Analyze operates as follows: first, it takes M, the current analysis
results over all threads, and computes the interferences, I , wrt
the thread under test, G. The function FilterFeasible integrates the
thread-level analyzer with the feasibility analysis of Section 4. It
expands the interferences I into a set of interference combinations
I ′ , and filters any infeasible combination.
Specifically, given the interferences on a thread, I = {(l 1 7→
{e 1 , e 2 , . . .}), (l 2 7→ {e 3 , e 4 , . . .}) . . .}, FilterFeasible creates all combinations of pairing each load to a single interfering environment,
e.g., Ie = {{⟨l 1 , e 1 ⟩, ⟨l 2 , e 3 ⟩, . . .}, {⟨l 1 , e 2 ⟩, ⟨l 2 , e 3 ⟩, . . .}, . . .}. Then, it
maps each environment in Ie to the associated store generating the
environment, e.g., Is = {{⟨l 1 , s 1 ⟩, ⟨l 2 , s 3 ⟩}, . . .}. Each set of pairs
of load and store statements in Is is then passed to the deduction
analysis of Section 4. If it is infeasible, it is discarded, otherwise it
is added to the set I ′ returned by FilterFeasible.
map(AnalyzeTM(G), I ′ ) ∈ 2(N7→S) is the set of the results of
applying AnalyzeTM(G, i) for each i ∈ I ′ . Specifically, map ∈ (A →
B) → 2A → 2B takes a function f and a set S, and returns a set
containing the application of f on each element of S.
JoinMM ∈ (2(N7→S) → (N 7→ S)) takes the join of memory
environments on matching nodes across a set of maps to join them
into a single map. Similarly, AnalyzeAll ′ joins the results of applying
Analyze to the set Gs of threads. AnalyzeAll computes the fixed
point of AnalyzeAll ′ starting with the initial map M ⊥ .
The following is a high-level example. Initially, each thread G is
analyzed in the presence of M ⊥ resulting in the set of interferences,
I , being empty (all stores map to ⊥). The results of analyzing each
thread are merged into a new map M. Each thread is then analyzed
using M, resulting in the sets I and I ′ to be (potentially) non-empty,
causing AnalyzeTM to be called once per-combination. Within a
thread, the results of AnalyzeTM are joined, then, across threads, the
results of Analyze are joined, creating M ′ . The procedure repeats,
thus growing the size of M, I , and I ′ until M = M ′ .
We handle loops the same way as in prior techniques (e.g., [40]).
Given a load l within a loop the previously described analysis can
generate an infinite number of interference combinations for l,
e.g., when l is within an infinite loop. Loops are unrolled when
possible, and, when not, we join all the feasible interfering memory
environments into a single value. An interfering environment e is
infeasible to interfere on l if the store generating e must-happen
after l; otherwise, it is feasible. This is sound for verifying assertions
embedded in a concurrent program [40].
6
EXPERIMENTS
We implemented our weak-memory-aware abstract interpreter in a
tool named FruitTree, building upon open-source platforms such
as LLVM [5], Apron [37], and µZ [30]. Specifically, we use LLVM
to translate C programs into LLVM bit-code, based on which we
perform static analysis. We use the Apron library to manipulate
abstract domains in the thread analyzer. We use the µZ fixed-point
engine in Z3 [15] to solve Datalog constraints that encode the
feasibility of interference combinations.
We implemented the state-of-the-art MM-oblivious abstract interpretation method of Miné [49], and the SC-specific method,
Watts [40], on the same platform to facilitate experimental evaluation. We also compared against a previously implemented version
of Duet [17, 18]. While Duet may be unsound, and Watts is unsound, we include their results because they are closely related to
our new technique.
All methods implemented in FruitTree use the clustering and
property-directed optimizations [40], where clustering considers
interferences only within sets of loads, similar to the packing of
relational domains, and property-direction filters interference combinations unrelated to properties under test. These optimizations
reduce the number of interference combinations, which is crucial
since it grows exponentially with respect to program’s size.
We evaluated FruitTree on a large set of programs written
using the POSIX threads. These benchmarks fall into two categories. The first are 209 litmus tests exposing non-SC behaviors
under various processor-level memory models [8]. The second are
52 larger applications [17, 60, 61], including several Linux device
drivers. The benchmarks total 61,981 lines of code. The properties
under verification are assertions embedded in the program’s source
code: a property is valid if and only if the assertion holds over all
executions under a given memory model.
Our experiments were designed to answer the following research
questions: (1) Is our new method more effective than prior techniques in obtaining correctness proofs on relaxed memory? (2) Is
our new method more accurate than prior techniques in detecting
potential violations on relaxed memory? (3) Is our new method
reasonably efficient when used as a static program analysis technique? We conducted all experiments on a Linux computer with 8
GB RAM, and a 2.60 GHz CPU.
6.1
Litmus Test Results
First, we present the litmus test results. Since these programs are
small in terms of code size, all methods under evaluation (Miné,
Watts, Duet, and FruitTree) finished quickly. Thus, our focus
is not on comparing the runtime performance but comparing the
accuracy of their results. Specifically, we compare our method to
these state-of-the-art techniques in terms of the number of true
proofs, bogus proofs, true alarms, and bogus alarms.
Here, a bogus alarm is a valid property which cannot be proved.
A bogus proof is a property which may be violated yet is unsoundly
and incorrectly proved. The litmus tests are particularly useful not
only because they cover corner cases, but also because we know a
priori if a property holds or not.
Table 1: Results on the litmus test programs under TSO.
Method
Miné [49]
Duet [17]
Watts [40]
FruitTree
True Alarm
Bogus Alarm
True Proof
Bogus Proof
77
77
63
77
207
181
13
72
8
34*
0
143
0
0
216⋆
0
Time (s)
12.9
473.1
71.0
89.2
Table 1 summarizes the litmus test results under TSO. The first
column shows the name of each method, and the next four show the
number of true alarms, bogus alarms, true proofs, and bogus proofs
generated by each method, respectively. Since Watts [40] was
designed to be SC-specific, it ignores non-SC behaviors, meaning
its proofs are unsound under weaker memory (marked by ⋆ ). The
last column is the total analysis time over all tests.
Overall, the results show the prior thread-modular technique of
Miné admits many infeasible executions thus leading to 207 bogus
alarms. Duet reported 181 bogus alarms. In contrast, our method
(FruitTree) reported only 72 bogus alarms, together with 143 true
proofs. Therefore, it is more accurate than these prior techniques.
Although Watts reported only 13 bogus alarms, it is unsound
for TSO: it only considers SC behaviors and cannot be trusted.
Furthermore, the soundness of Duet under TSO or any other nonSC memory model was not clear (since Duet was only designed
for SC). Thus, in the result table, its 34 proofs are marked with *.
Table 2: Results on the litmus test programs under PSO.
Method
Miné [49]
Duet [17]
Watts [40]
FruitTree
True Alarm
Bogus Alarm
True Proof
Bogus Proof
81
81
64
81
203
177
12
68
8
34*
0
143
0
0
216⋆
0
Time (s)
12.9
473.1
71.0
281.4
Table 2 summarizes the results under PSO. Again, Watts may be
unsound for weak memory. The same litmus programs were used
under PSO as in TSO but the properties changed, i.e., whether an
alarm is true or bogus. Note that Miné only verified 8 properties,
Duet verified 34, whereas our method verified 143.
abstracting all other threads into a set of interferences—it cannot
capture ordering constraints involving more than two threads. In
principle, this limitation can be lifted by extending our interference
feasibility analysis: we leave this as future work.
6.2
Results on Larger Applications
Next, we present our results on the larger benchmark programs.
Since execution time is no longer negligible, we compare, across
methods, both the run time and accuracy. However, since the programs are larger (60K lines of code) and there are far too many
properties to manually inspecting each case, we do not report the
number of bogus alarms and bogus proofs due to lack of the ground
truth. Instead, we compare the total number of proofs reported by
each method, to show our method is more accurate even though
all methods are approximate.
Table 4 shows our results under TSO, where ⋆ and * mark the
unsoundly verified properties. Since the results for PSO and RMO
are similar to Table 4, we omit them for brevity. Column 1 of this
table shows the name of the benchmark program. Columns 2–3,
4–5, 6–7, and 8–9 show the run time and number of properties
verified by Miné, Duet, Watts, and FruitTree, respectively.
Again, while the proofs reported by FruitTree and Miné’s
method are sound, the proofs reported by Watts are not, and the
soundness of Duet on weak memory is unclear.
Overall, FruitTree proved 4,577 properties compared to only
1,712 proved by Miné, an increase of 2.7x more properties relative to
prior state-of-the-art. Additionally, though Duet may be unsound,
it proved only 2,432 properties. The definitely-unsound Watts
“proved” 4,583 properties, possibly including bogus proofs.
In terms of the run time, FruitTree took 5,387 seconds, which
is similar to Watts, and slower than Duet and Miné. However,
the additional time is well justified due to the significant increase
in the number of proofs. Furthermore, the runtime performance
– proving 1 property per second – remains competitive as a static
analysis technique.
To summarize, our new method has modest runtime overhead
compared to prior techniques, but vastly improved accuracy in
terms of the analysis results, and is provably sound in handling not
only SC but also three other processor-level memory models.
Table 3: Results on the litmus test programs under RMO.
7
Method
Miné [49]
Duet [17]
Watts [40]
FruitTree
True Alarm
Bogus Alarm
True Proof
Bogus Proof
28
11
0
28
67
58
0⋆
13
8
34
75
62
0
0
28⋆
0
Time (s)
4.9
187.8
33.9
46.9
Table 3 summarizes the results under RMO. Under RMO, a different set of litmus programs were used since the instruction set
for processors using RMO differs from TSO and PSO. Nevertheless,
we observed similar results: FruitTree obtained significantly more
true proofs and fewer bogus alarms than the other methods.
In general, our method was more accurate than prior techniques.
However, since the analysis is over-approximated, it does not eliminate all bogus alarms. Currently, most bogus alarms reported by
FruitTree require reasoning across more than two threads, e.g.,
the correctness of a property may require reasoning that thread T1
reading x = 1 from thread T2 implies y = 1 in thread T3 . Since our
method is thread-modular—threads are analyzed individually by
RELATED WORK
We reviewed prior work on thread-modular abstract interpretation,
which are either MM-oblivious [47–49] or SC-specific [40] in processor memory-models. There are also techniques [17, 18, 35, 53]
that are not thread-modular.
There are code-transformation techniques [14, 39, 45] that transform a non-SC program into an SC program and then apply abstract
interpretation. They generally follow the sequentialization approach
pioneered by Lal and Reps [41], with a focus on code transformation as opposed to abstract interpretation. To ensure termination,
they make various assumptions to bound the program’s behavior.
Furthermore, they are not thread-modular, and often do not directly
handle C code. Instead, they admit only models of concurrent programs written in artificial languages; because of this, we were not
able to perform a direct experimental comparison.
In the context of bounded model checking, Alglave et al. proposed several methods for concurrent software on relaxed memory.
They are based on either sequentializing concurrent programs [8]
or encoding weak memory semantics using SAT/SMT solvers [7, 9].
Table 4: Results on larger applications (total of 61,981 LOC).
Minè [49]
Duet [17]
Watts [40]
FruitTree
Name
Time
Verif
Time
Verif
Time
Verif
Time
Verif
thread00
threadcreate01
threadcreate02
sync_01_true
sync_02_true
intra01
dekker1
fk2012_v2
keybISR
ib700wdt_01
ib700wdt_02
ib700wdt_03
i8xx_tco_01
i8xx_tco_02
i8xx_tco_03
machzwd_01
machzwd_02
machzwd_03
mixcomwd_01
mixcomwd_02
mixcomwd_03
pcwd_01
pcwd_02
pcwd_03
pcwd_04
sbc60xxwdt_01
sbc60xxwdt_02
sbc60xxwdt_03
sc1200wdt_01
sc1200wdt_02
sc1200wdt_03
smsc37b787wdt_01
smsc37b787wdt_02
smsc37b787wdt_03
sc520wdt_01
sc520wdt_02
sc520wdt_03
w83877fwdt_01
w83877fwdt_02
w83877fwdt_03
wdt01
wdt02
wdt03
wdt977_01
wdt977_02
wdt977_03
wdt_pci01
wdt_pci02
wdt_pci03
pcwd_pci_01
pcwd_pci_02
pcwd_pci_03
0.01
0.02
0.02
0.03
0.03
0.02
0.10
0.04
0.04
1.7
13.2
23.1
1.0
8.5
10.7
0.6
1.6
4.1
0.8
2.2
3.5
0.7
4.4
10.2
25.4
1.1
3.3
7.0
1.0
6.9
26.2
1.0
9.2
26.4
1.5
12.6
27.8
12.5
29.0
54.2
0.2
0.3
0.5
1.3
2.4
8.2
1.2
8.9
23.9
4.7
9.8
20.3
0
1
1
1
1
1
3
3
4
23
63
81
14
34
37
14
24
39
12
32
64
10
27
40
60
21
40
60
22
58
102
22
76
130
15
41
58
34
50
66
3
5
6
9
13
25
11
31
51
56
70
88
1.1
0.8
0.7
1.3
1.2
1.2
1.3
1.4
1.2
1.8
2.7
2.8
2.8
4.6
4.7
1.3
1.4
1.8
1.9
4.4
2.9
0.9
1.3
1.7
2.1
2.0
2.3
3.2
1.3
2.2
3.3
1.2
2.3
3.4
1.1
1.7
2.2
1.8
2.3
2.7
1.4
1.5
1.5
1.9
2.3
2.9
1.1
1.8
3.0
1.3
1.4
2.0
0
1
2
1
1
0
2
3
4
35
95
122
28
68
74
14
24
39
21
41
65
22
56
82
122
0
0
0
10
28
50
23
77
131
16
42
59
34
50
66
13
21
25
35
51
99
31
91
151
89
132
186
0.03
0.05
0.03
0.06
0.07
0.04
6.1
0.3
2.1
14.5
108.4
178.4
97.4
1288.3
1677.0
107.5
240.5
488.7
169.3
768.0
88.3
1.8
8.5
18.5
46.1
4.9
13.7
33.4
15.1
64.5
197.0
16.7
91.4
286.1
15.6
74.1
155.6
83.9
189.6
357.9
65.9
600.2
1479.1
83.0
115.6
264.9
5.9
33.2
93.5
27.2
52.6
97.7
0
2
2
1
1
2
4
4
6
46
126
162
39
99
108
35
65
110
34
64
100
31
82
121
181
43
81
121
33
87
153
46
154
262
45
123
174
137
201
265
14
22
26
43
63
123
52
152
252
116
158
212
0.03
0.04
0.03
0.06
0.07
0.04
6.6
0.2
2.3
11.4
89.4
156.3
53.3
757.3
952.3
42.1
75.3
128.9
15.3
61.7
84.0
1.4
6.8
15.4
39.8
3.0
8.0
17.9
10.6
47.6
146.7
12.0
67.3
197.5
11.0
56.0
116.9
71.0
159.6
301.9
27.6
306.5
766.2
49.7
76.0
193.9
4.6
26.3
72.7
21.1
40.6
72.7
0
2
2
1
1
2
4
4
5
46
126
162
39
99
108
34
64
109
33
63
100
31
82
121
181
43
81
121
33
87
153
46
154
262
45
123
174
137
201
265
14
22
26
43
63
123
52
152
252
116
158
212
Total
415 s
1752
106 s
2432*
9830 s
4583⋆
5387 s
4577
interpretation, which covers all possible program behaviors and
therefore is geared toward obtaining correctness proofs.
Thread-modular analysis was also used in model checking [23,
24], where it was combined with predicate abstraction [29] to help
mitigate state explosion and thus increase the scalability. However,
model checking is significantly different from abstract interpretation in that each thread must be first abstracted into a finite-state
model. Thread-modular analysis was also used to conduct shape
analysis [26] and prove thread termination [12]. Hoenicke et al. [31]
introduced a hierarchy of proof systems that leverage thread modularity in compositional verification on SC memory.
Similar to the interference analysis in Watts [40], we check
the feasibility of thread interactions using Datalog. Datalog-based
declarative program analysis was a framework introduced by Whaley and Lam [66]. Previously, it has been used to implement pointsto [11, 42], dependency [28, 59] and change-impact analyses [27],
uncover security bugs [44] and detect data races [50].
In abstract interpretation of sequential programs, Miné [46] proposed a technique for abstracting the global memory into a set
of byte-level cells to support a variety of casts and union types.
Ferrara et al. [20, 21] integrated heap abstraction and numerical
abstraction during static analysis, where the heap is represented
as disjunctions of points-to constraints based on values. Jeannet
and Serwe [38] also proposed a method for abstracting the data and
control portions of a call-stack for analyzing sequential programs
with potentially infinite recursion. Subsequently, Jeannet [36] extended the work to handle concurrent programs as well. However,
none of these methods was designed specifically for handling weak
memory models.
8
CONCLUSIONS
We have presented a thread-modular static analysis method for
concurrent programs under weak memory models, building upon a
lightweight constraint system for quickly identifying the infeasibility of thread interference combinations, so they are skipped during
the expensive abstract-interpretation based analysis. The constraint
system is also general enough to handle a range of processor-level
memory models. We have implemented the method and conducted
experiments on a large number of benchmark programs. We showed
the new method significantly outperformed three state-of-the-art
techniques in terms of accuracy while maintaining only a moderate
runtime overhead.
ACKNOWLEDGMENTS
Alglave et al. also developed techniques for modeling and testing
weak-memory semantics of real processors [10], and characterized
the memory models of some GPUs [6]. However, these techniques
are primarily for detecting buggy behaviors as opposed to proving
that such behaviors do not exist.
In the context of systematic testing, often based on stateless
model checking [22, 25, 64] or predictive analysis [33, 54, 56, 57, 62,
63], a number of methods have been proposed to handle weak memory such as TSO/PSO [1, 16, 34, 67], PowerPC [2], and C++11 [51,
52]. However, since they rely on concretely executing the program,
and require the user to provide test inputs, they can only be used
to detect bugs. That is, since testing does not cover all program
behaviors, if no bug is detected, these methods cannot obtain a
correctness proof. In contrast, our method is based on abstract
This material is based upon research supported in part by the U.S.
National Science Foundation under grants CNS-1405697 and CCF1722710 and the U.S. Office of Naval Research under award number
N00014-13-1-0527.
REFERENCES
[1] Parosh Aziz Abdulla, Stavros Aronis, Mohamed Faouzi Atig, Bengt Jonsson,
Carl Leonardsson, and Konstantinos F. Sagonas. Stateless model checking for
TSO and PSO. In International Conference on Tools and Algorithms for
Construction and Analysis of Systems, pages 353–367, 2015.
[2] Parosh Aziz Abdulla, Mohamed Faouzi Atig, Bengt Jonsson, and Carl
Leonardsson. Stateless model checking for POWER. In International Conference
on Computer Aided Verification, pages 134–156, 2016.
[3] Sarita V. Adve and Hans-Juergen Boehm. Memory models: a case for rethinking
parallel languages and hardware. Commun. ACM, 53(8):90–101, 2010.
[4] Sarita V. Adve and Kourosh Gharachorloo. Shared memory consistency models:
A tutorial. Computer, 29(12):66–76, 1996.
[5] Vikram Adve, Chris Lattner, Michael Brukman, Anand Shukla, and Brian Gaeke.
LLVM: A low-level virtual instruction set architecture. In ACM/IEEE
international symposium on Microarchitecture, Dec 2003.
[6] Jade Alglave, Mark Batty, Alastair F. Donaldson, Ganesh Gopalakrishnan, Jeroen
Ketema, Daniel Poetzl, Tyler Sorensen, and John Wickerson. GPU concurrency:
Weak behaviours and programming assumptions. In International Conference on
Architectural Support for Programming Languages and Operating Systems, pages
577–591, 2015.
[7] Jade Alglave, Daniel Kroening, Vincent Nimal, and Daniel Poetzl. Don’t sit on
the fence. In International Conference on Computer Aided Verification, pages
508–524, 2014.
[8] Jade Alglave, Daniel Kroening, Vincent Nimal, and Michael Tautschnig.
Software verification for weak memory via program transformation. In
European Symposium on Programming, pages 512–532, 2013.
[9] Jade Alglave, Daniel Kroening, and Michael Tautschnig. Partial orders for
efficient bounded model checking ofÂăconcurrentÂăsoftware. In International
Conference on Computer Aided Verification, pages 141–157, 2013.
[10] Jade Alglave, Luc Maranget, and Michael Tautschnig. Herding cats: modelling,
simulation, testing, and data-mining for weak memory. In ACM SIGPLAN
Conference on Programming Language Design and Implementation, page 7, 2014.
[11] Martin Bravenboer and Yannis Smaragdakis. Strictly declarative specification of
sophisticated points-to analyses. In ACM SIGPLAN Conference on Object
Oriented Programming, Systems, Languages, and Applications, pages 243–262,
2009.
[12] Byron Cook, Andreas Podelski, and Andrey Rybalchenko. Proving thread
termination. ACM SIGPLAN Conference on Programming Language Design and
Implementation, pages 320–330, 2007.
[13] P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for
static analysis of programs by construction or approximation of fixpoints. In
ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages,
pages 238–252, 1977.
[14] Andrei Dan, Yuri Meshman, Martin Vechev, and Eran Yahav. Effective
abstractions for verification under relaxed memory models. In International
Conference on Verification, Model Checking, and Abstract Interpretation, pages
449–466, 2015.
[15] Leonardo De Moura and Nikolaj Bjørner. Z3: An efficient SMT solver. In
International Conference on Tools and Algorithms for the Construction and
Analysis of Systems, pages 337–340, 2008.
[16] Brian Demsky and Patrick Lam. SATCheck: SAT-directed stateless model
checking for SC and TSO. In ACM SIGPLAN Conference on Object Oriented
Programming, Systems, Languages, and Applications, pages 20–36, 2015.
[17] Azadeh Farzan and Zachary Kincaid. Verification of parameterized concurrent
programs by modular reasoning about data and control. In ACM
SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pages
297–308, 2012.
[18] Azadeh Farzan and Zachary Kincaid. Duet: Static analysis for unbounded
parallelism. In International Conference on Computer Aided Verification, pages
191–196, 2013.
[19] Pietro Ferrara. Static analysis via abstract interpretation of the happens-before
memory model. In International Conference on Tests and Proofs, pages 116–133.
2008.
[20] Pietro Ferrara. Generic combination of heap and value analyses in abstract
interpretation. In International Conference on Verification, Model Checking, and
Abstract Interpretation, pages 302–321, 2014.
[21] Pietro Ferrara, Peter Müller, and Milos Novacek. Automatic inference of heap
properties exploiting value domains. In International Conference on Verification,
Model Checking, and Abstract Interpretation, pages 393–411, 2015.
[22] C. Flanagan and P. Godefroid. Dynamic partial-order reduction for model
checking software. In ACM SIGACT-SIGPLAN Symposium on Principles of
Programming Languages, pages 110–121, 2005.
[23] Cormac Flanagan, Stephen N. Freund, and Shaz Qadeer. Thread-modular
verification for shared-memory programs. In European Symposium on
Programming, pages 262–277, 2002.
[24] Cormac Flanagan and Shaz Qadeer. Thread-modular model checking. In
International SPIN Workshop on Model Checking Software, pages 213–224, 2003.
[25] Patrice Godefroid. VeriSoft: A tool for the automatic analysis of concurrent
reactive software. In International Conference on Computer Aided Verification,
pages 476–479, 1997.
[26] Alexey Gotsman, Josh Berdine, Byron Cook, and Mooly Sagiv. Thread-modular
shape analysis. ACM SIGPLAN Conference on Programming Language Design
and Implementation, pages 266–277, 2007.
[27] Shengjian Guo, Markus Kusano, and Chao Wang. Conc-iSE: Incremental
symbolic execution of concurrent software. In IEEE/ACM International
Conference On Automated Software Engineering, 2016.
[28] Shengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, and Aarti Gupta.
Assertion guided symbolic execution of multithreaded programs. In ACM
SIGSOFT Symposium on Foundations of Software Engineering, pages 854–865,
2015.
[29] Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Shaz Qadeer.
Thread-modular abstraction refinement. In International Conference on
Computer Aided Verification, pages 262–274, 2003.
[30] Krystof Hoder, Nikolaj Bjørner, and Leonardo de Moura. muZ - an efficient
engine for fixed points with constraints. In International Conference on
Computer Aided Verification, pages 457–462, 2011.
[31] Jochen Hoenicke, Rupak Majumdar, and Andreas Podelski. Thread modularity
at many levels: A pearl in compositional verification. In ACM SIGACT-SIGPLAN
Symposium on Principles of Programming Languages, pages 473–485, 2017.
[32] Alan Huang. Maximally stateless model checking for concurrent bugs under
relaxed memory models. In International Conference on Software Engineering,
pages 686–688, 2016.
[33] Jeff Huang, Patrick O’Neil Meredith, and Grigore Rosu. Maximal sound
predictive race detection with control flow abstraction. In ACM SIGPLAN
Conference on Programming Language Design and Implementation, pages
337–348, 2014.
[34] Shiyou Huang and Jeff Huang. Maximal causality reduction for TSO and PSO.
In ACM SIGPLAN Conference on Object Oriented Programming, Systems,
Languages, and Applications, pages 447–461, 2016.
[35] Thuan Quang Huynh and Abhik Roychoudhury. A memory model sensitive
checker for c#. In International Symposium on Formal Methods, pages 476–491,
2006.
[36] Bertrand Jeannet. Relational interprocedural verification of concurrent
programs. Software & Systems Modeling, 12(2):285–306, 2012.
[37] Bertrand Jeannet and Antoine Miné. Apron: A library of numerical abstract
domains for static analysis. In Ahmed Bouajjani and Oded Maler, editors,
International Conference on Computer Aided Verification, pages 661–667. 2009.
[38] Bertrand Jeannet and Wendelin Serwe. Abstracting call-stacks for
interprocedural verification of imperative programs. In International Conference
on Algebraic Methodology and Software Technology, pages 258–273, 2004.
[39] Michael Kuperstein, Martin T. Vechev, and Eran Yahav. Partial-coherence
abstractions for relaxed memory models. In ACM SIGPLAN Conference on
Programming Language Design and Implementation, pages 187–198, 2011.
[40] Markus Kusano and Chao Wang. Flow-sensitive composition of thread-modular
abstract interpretation. In ACM SIGSOFT Symposium on Foundations of Software
Engineering, 2016.
[41] Akash Lal and Thomas W. Reps. Reducing concurrent analysis under a context
bound to sequential analysis. Formal Methods in System Design, 35(1):73–97,
2009.
[42] Monica S. Lam, John Whaley, V. Benjamin Livshits, Michael C. Martin, Dzintars
Avots, Michael Carbin, and Christopher Unkel. Context-sensitive program
analysis as database queries. In ACM SIGACT-SIGMOD-SIGART Symposium on
Principles of Database Systems, pages 1–12, 2005.
[43] Leslie Lamport. How to make a multiprocessor computer that correctly
executes multiprocess programs. IEEE Transactions on Computers, 28(9), 1979.
[44] V. Benjamin Livshits and Monica S. Lam. Finding security vulnerabilities in Java
applications with static analysis. In USENIX Security Symposium, 2005.
[45] Yuri Meshman, Andrei Dan, Martin Vechev, and Eran Yahav. Synthesis of
memory fences via refinement propagation. In International Symposium on
Static Analysis, pages 237–252, 2014.
[46] Antoine Miné. Field-sensitive value analysis of embedded C programs with
union types and pointer arithmetics. In ACM SIGPLAN/SIGBED Conference on
Language, Compilers, and Tool Support for Embedded Systems, pages 54–63, 2006.
[47] Antoine Miné. Static analysis of run-time errors in embedded critical parallel C
programs. In Programming Languages and Systems, pages 398–418. 2011.
[48] Antoine Miné. Static analysis by abstract interpretation of sequential and
multi-thread programs. In Proc. of the 10th School of Modelling and Verifying
Parallel Processes, pages 35–48, 2012.
[49] Antoine Miné. Relational thread-modular static value analysis by abstract
interpretation. In International Conference on Verification, Model Checking, and
Abstract Interpretation, pages 39–58, 2014.
[50] Mayur Naik, Alex Aiken, and John Whaley. Effective static race detection for
Java. In ACM SIGPLAN Conference on Programming Language Design and
Implementation, pages 308–319, 2006.
[51] Brian Norris and Brian Demsky. CDSchecker: checking concurrent data
structures written with C/C++ atomics. In ACM SIGPLAN Conference on Object
Oriented Programming, Systems, Languages, and Applications, pages 131–150,
2013.
[52] Peizhao Ou and Brian Demsky. Checking concurrent data structures under the
C/C++11 memory model. In ACM SIGPLAN Symposium on Principles and
Practice of Parallel Programming, pages 45–59, 2017.
[53] Abhik Roychoudhury and Tulika Mitra. Specifying multithreaded java
semantics for program verification. In International Conference on Software
Engineering, pages 489–499, 2002.
[54] Mahmoud Said, Chao Wang, Zijiang Yang, and Karem Sakallah. Generating data
race witnesses by an SMT-based analysis. In NASA Formal Methods, pages
313–327, 2011.
[55] Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa Nardelli, and
Magnus O. Myreen. X86-TSO: A rigorous and usable programmer’s model for
x86 multiprocessors. Commun. ACM, 53(7):89–97, July 2010.
[56] Arnab Sinha, Sharad Malik, Chao Wang, and Aarti Gupta. Predicting
serializability violations: SMT-based search vs. DPOR-based search. In Haifa
Verification Conference, pages 95–114, 2011.
[57] Arnab Sinha, Sharad Malik, Chao Wang, and Aarti Gupta. Predictive analysis for
detecting serializability violations through trace segmentation. In International
Conference on Formal Methods and Models for Co-Design, pages 99–108, 2011.
[58] Richard Sites. Alpha Architecture Reference Manual. Digital Press, 1992.
[59] Chungha Sung, Markus Kusano, Nishant Sinha, and Chao Wang. Static DOM
event dependency analysis for testing web applications. In ACM SIGSOFT
Symposium on Foundations of Software Engineering, 2016.
[60] SVCOMP. International competition on software verification.
http://sv-comp.sosy-lab.org/2015/benchmarks.php, Accessed: 2015-05-06.
[61] TLDP. Interrupt handlers: Linux kernel module programming guide.
http://www.tldp.org/LDP/lkmpg/2.6/html/x1256.html, Accessed: 2015-05-06.
[62] Chao Wang and Malay Ganai. Predicting concurrency failures in generalized
traces of x86 executables. In International Conference on Runtime Verification,
pages 4–18, September 2011.
[63] Chao Wang, Sudipta Kundu, Malay Ganai, and Aarti Gupta. Symbolic predictive
analysis for concurrent programs. In International Symposium on Formal
Methods, pages 256–272, 2009.
[64] Chao Wang, Mahmoud Said, and Aarti Gupta. Coverage guided systematic
concurrency testing. In International Conference on Software Engineering, pages
221–230, 2011.
[65] David L Weaver and Tom Gremond. The SPARC architecture manual. PTR
Prentice Hall Englewood Cliffs, NJ 07632, 1994.
[66] John Whaley and Monica S. Lam. Cloning-based context-sensitive pointer alias
analysis using binary decision diagrams. In ACM SIGPLAN Conference on
Programming Language Design and Implementation, pages 131–144, 2004.
[67] Naling Zhang, Markus Kusano, and Chao Wang. Dynamic partial order
reduction for relaxed memory models. In ACM SIGPLAN Conference on
Programming Language Design and Implementation, pages 250–259, 2015.
| 6cs.PL
|
LQG Control and Sensing Co-design
arXiv:1802.08376v2 [math.OC] 21 Mar 2018
Vasileios Tzoumas,1,2 Luca Carlone,2 George J. Pappas,1 Ali Jadbabaie2
Abstract—Linear-Quadratic-Gaussian (LQG) control is concerned with the design of an optimal controller and estimator
for linear Gaussian systems with imperfect state information.
Standard LQG control assumes the set of sensor measurements
to be fed to the estimator to be given. However, in many
problems arising in networked systems and robotics, one may be
interested in designing a suitable set of sensors for LQG control.
In this paper, we introduce the LQG control and sensing co-design
problem, where one has to jointly design a suitable sensing,
estimation, and control policy. In particular, we consider two
dual instances of the co-design problem: the sensing-constrained
LQG control problem, where the design maximizes the control
performance subject to sensing constraints, and the minimumsensing LQG control, where the design minimizes the amount
of sensing subject to performance constraints. We focus on the
realistic case in which the sensing design has to be selected
among a finite set of possible sensing modalities, where each
modality is associated with a (possibly) different cost. While we
observe that the computation of the optimal sensing design is
intractable in general, we present the first scalable LQG codesign algorithms to compute near-optimal policies with provable
sub-optimality guarantees. To this end, (i) we show that a
separation principle holds, which partially decouples the design
of sensing, estimation, and control; (ii) we frame LQG codesign as the optimization of (approximately) supermodular
set functions; (iii) we develop novel algorithms to solve the
resulting optimization problems; (iv) we prove original results
on the performance of these algorithms and establish connections
between their suboptimality gap and control-theoretic quantities.
We conclude the paper by discussing two practical applications
of the co-design problem, namely, sensing-constrained formation
control and resource-constrained robot navigation.
I. I NTRODUCTION
Traditional approaches to the control of dynamical systems
with partially observable state assume the choice of sensors
used to observe the system to be given [1]. The choice of
sensors usually results from a preliminary design phase in
which an expert designer selects a suitable sensor suite that
accommodates estimation requirements (e.g., observability,
desired estimation error) and system constraints (e.g., size,
cost). However, modern control applications, from large networked systems to miniaturized robotics systems, pose serious
limitations to the applicability of this traditional paradigm: in
particular, in large-scale networked systems (e.g., smart grids,
or robot swarms), in which new nodes are continuously added
1 The authors are with the Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104, USA (email:
{pappagsg, vtzoumas}@seas.upenn.edu).
2 The authors are with the Institute for Data, Systems and Society, and
the Laboratory for Information & Decision Systems, Massachusetts Institute of Technology, Cambridge, MA 02139, USA (email: {lcarlone,
jadbabai, vtzoumas}@mit.edu).
This work was partially supported by the AFOSR Complex Networks
Program, and by the Army Research Laboratory’s DCIST program.
and removed from the network, a manual re-design of the
sensors becomes cumbersome and expensive, and it is not scalable; in miniaturized robot systems, while the set of onboard
sensors is fixed, it may be desirable to selectively activate only
a subset of the sensors during different phases of operation, to
minimize power consumption. Overall, in both applications,
although a designer has access to a (possibly large) list of
potential sensors, due to resource constraints (size, weight,
power, cost) the designer can utilize only a subset of them.
Thus, the need for online and large-scale sensor selection
demands for automated approaches that efficiently select a
subset of sensors to maximize system performance.
Motivated by the aforementioned need, in this paper we
consider the problem of jointly designing control, estimation,
and sensing for systems with partially observable state.
Related work in control theory. Related work in control
theory focuses on either the co-design of estimation and
control in presence of communication constraints [1]–[7], or
on the design of the system’s sensing and actuation [8]–[19]
(sensor and actuator selection). In more detail:
a) LQG control design: The line of work [1]–[7] assumes the set of sensors and actuators to be given, and
either focuses on the co-design of estimation and control
over band-limited communication channels, or investigates the
trade-offs between communication constraints (e.g., data rate,
quantization, delays) and control performance (e.g., stability)
in networked control systems. These works provide results on
the impact of quantization [2], finite data rates [3], [4], as
well as, separation principles for LQG design with communication constraints [5]. More recent work focuses on privacy
constraints [6]. In addition, [7] studies rationally inattentive
control laws for LQG control and discusses their effectiveness
in stabilizing the system. We refer the reader to the surveys [1],
[20]–[22] for a comprehensive review on LQG control.
b) Sensor and actuator selection: The line of work [8]–
[19] focuses on selecting the system’s active sensors and actuators, independently of the control task at hand. In particular, [8]
proposes a sensor placement algorithm to maximize the accuracy of maximum likelihood estimation over static parameters,
whereas [9]–[13] focus on maximizing the estimation accuracy
for non-static parameters; [9]–[12] present sensor scheduling
algorithms for optimal Kalman filtering, while [13] presents
sensor scheduling algorithms for optimal batch state estimation
(smoothing); [14] considers fixed-lag smoothing and investigates sensor scheduling and feature selection for vision-based
agile navigation of autonomous robots. Finally, [15]–[19]
present sensor and actuator selection algorithms to optimize
the average observability and controllability of systems.
Extending the focus of the aforementioned works, more
recent work focuses on the co-design of control and estimation,
as well as, of sensing [23], [24], by augmenting the standard
LQG cost with an information-theoretic regularizer, and by
optimizing the sensing capabilities of each of the system’s
sensors using semi-definite programming. The main difference
between [23], [24], and our proposal in this paper is that
in [23], [24] the choice of sensors is arbitrary, rather than
being restricted to a finite set of available sensors.
Related work on set function optimization. The algorithms for sensor and actuator selection discussed above
employ either convex relaxation techniques [8]–[10], [12], [17]
or combinatorial optimization techniques [11], [13]–[16], [18].
The advantage of the combinatorial optimization techniques
is that they lead to algorithms with provable suboptimality
guarantees and low running time. The literature on combinatorial optimization, which is more relevant for the discussion in
this paper, includes investigation into (i) submodular optimization subject to cardinality constraints [25]; (ii) submodular
optimization subject to heterogeneous-cost constraints [26]–
[28]; and (iii) approximately submodular optimization subject
to cardinality constraints [29]. We note that the related literature does not cover the case of approximately submodular
optimization subject to heterogeneous-cost constraints, which
is indeed the setup of interest for our LQG control and
sensing co-design problems, hence requiring us to develop
novel algorithms and results for this case.
Contributions to control theory. We introduce the LQG
control and sensing co-design problem, that involves the
joint design of sensing, control, and estimation, by extending
Linear-Quadratic-Gaussian (LQG) control to the case where,
besides designing an optimal controller and estimator, one
has to choose a set of sensors to observe the system state.
We consider the realistic case in which the choice of sensors,
rather than being arbitrary (see, e.g., [23]), is restricted to a
finite selection from a set of available sensors. In particular,
in our formulation each available sensor is associated with a
cost that quantifies the penalty incurred when using that sensor
(trivially, if there is no cost associated to using a sensor, one
would always prefer to select and use all available sensors).
In more detail, we consider the general case in which each
sensor has a potentially different cost, hence capturing the
practical scenarios where each sensor may have a different
monetary cost, power consumption, or bandwidth utilization.
We formulate two dual instances of the LQG co-design
problem. The first instance, named sensing-constrained LQG
control, involves the joint design of the controller, estimator,
and sensing policies that minimize the LQG objective (quantifying tracking performance and control effort) while satisfying
a given constraint on the maximum cost of the selected
sensors. The second instance, named minimum-sensing LQG
control, involves the joint design of the controller, estimator,
and sensing that minimizes the cost of the selected sensors
while satisfying a given bound on the LQG performance.
We then leverage a separation principle1 to partially decouple the design of control, estimation, and sensing, and
we frame the sensor design subproblem as the optimization
of (approximately) supermodular set functions. While the
computation of the optimal sensing strategies is combinatorial
in nature, we provide the first scalable co-design algorithms,
which retrieve a near-optimal choice of sensors, as well as
the corresponding control and estimation policies. We show
that the suboptimality gaps of these algorithms depend on the
supermodularity ratio γf of the set function f appearing in
our problem, and we establish connections between the supermodularity ratio γf and control-theoretic quantities, providing
also a computable lower bound for γf .
Contributions to set function optimization. In proving the
aforementioned results, we extend the literature on supermodular optimization. In particular, (i) we provide the first efficient algorithms for the optimization of approximately supermodular functions subject to heterogeneous-cost constraints;
and (ii) we improve known suboptimality bounds that also
apply to the optimization of (exactly) supermodular functions:
specifically, the proposed algorithm for approximate supermodular optimization with heterogeneous-cost constraints can
achieve in the exactly supermodular case the approximation
bound (1−1/e), which is superior to the previously established
bound 1/2(1 − 1/e) in the literature [28].
Application examples. We motivate the importance of the
LQG control and sensing co-design problem, and demonstrate the effectiveness of the proposed algorithms in numerical experiments, by considering two application scenarios,
namely, a sensing-constrained formation control scenario and
a resource-constrained robot navigation scenario. In particular, we present a Monte Carlo analysis for both scenarios,
which demonstrates that (i) the proposed sensor selection
strategy is near-optimal, and in particular, the resulting LQGcost (tracking performance) matches the optimal selection in
all tested instances for which the optimal selection could
be computed via a brute-force approach; (ii) a more naive
selection which attempts to minimize the state estimation
covariance [11] (rather than the LQG cost) has degraded LQG
tracking performance, often comparable to a random selection;
and (iii) the selection of a small subset of sensors using the
proposed algorithms ensures an LQG cost that is close to the
one obtained by using all available sensors, hence providing an
effective alternative for control under sensing constraints [14].
Comparison with the preliminary results in [30]. This paper extends our preliminary results [30], and provides a more
comprehensive presentation of the LQG co-design problem,
including both sensing-constrained LQG control (introduced
in [30]) and the minimum-sensing LQG control problem (not
previously published). Moreover, we generalize the original
setup in [30] to account for heterogeneous sensor costs (in [30]
each sensor has unit cost) and extend the numerical analysis
accordingly. Most of the technical results, including Theo1 The separation principle leverages standard results in LQG control and
follows the line of [23], hence we do not claim it to be an original contribution.
rems 1–3, Proposition 1, as well as Algorithms 2–4 are novel,
and have not been previously published.
Organization of the rest of the paper. Section II formulates the LQG control and sensing co-design problems
considered in this paper. Section III presents a separation
principle and provides scalable, near-optimal algorithms for
the co-design problems. Section IV characterizes the running
time and approximation performance of the proposed algorithms, and establishes connections between their suboptimality bounds and control-theoretic quantities. Section V presents
two practical examples of co-design problems and provides
a numerical analysis of the proposed algorithms. Section VI
concludes the paper. All proofs are given in the Appendix.
Notation. Lowercase letters denote vectors and scalars (e.g.,
v), and uppercase letters denote matrices (e.g., M ). We use
calligraphic fonts to denote sets (e.g., S). The identity matrix
of size n is denoted with In (the dimension index is omitted
when it is clear from the context). For a matrix M and a vector
v of appropriate dimension, we define kvk2M , v T M v. For matrices M1 , M2 , . . . , Mk , we let diag (M1 , M2 , . . . , Mk ) be the
block diagonal matrix with diagonal blocks M1 , M2 , . . . , Mk .
II. LQG C ONTROL AND S ENSING C O - DESIGN :
P ROBLEM S TATEMENT
In this section we formalize the LQG control and sensing
co-design problem considered in this paper. In particular, we
present two “dual” statements of the co-design problem: the
sensing-constrained LQG control, where the design maximizes
the control performance subject to sensing constraints, and the
minimum-sensing LQG control, where the design minimizes
sensing subject to performance constraints.
A. System, sensors, and control policies
We start by introducing the notions of system, sensors, and
control policies. These notions are standard, except that only a
subset of sensors is actually used to observe the system’s state
(these are referred to as “active” sensors in Definition 1), and
that we associate a cost to each sensor (Definition 2).
a) System: We consider a standard discrete-time (possibly time-varying) linear system with additive Gaussian noise:
xt+1 = At xt + Bt ut + wt ,
t = 1, 2, . . . , T,
(1)
where xt ∈ Rn represents the state of the system at time t,
ut ∈ Rmt represents the control action, wt represents the
process noise, At and Bt are matrices of suitable dimensions,
and T is a finite horizon. In addition, we consider the system’s
initial condition x1 to be a Gaussian random variable with
covariance Σ1|0 , and wt to be a Gaussian random variable with
mean zero and covariance Wt , such that wt is independent of
x1 and wt′ for all t′ = 1, 2, . . . , T , t′ 6= t.
b) Sensors: We consider the case in which we have a
(potentially large) set of available sensors, which can take
noisy linear observations of the system’s state. In particular,
let V be a set of indices such that each index i ∈ V uniquely
identifies a sensor that can be used to observe the state of the
system. We consider sensors of the form
yi,t = Ci,t xt + vi,t ,
i ∈ V,
(2)
where yi,t ∈ Rpi,t represents the measurement of sensor i at
time t, Ci,t is a sensing matrix of suitable dimension, and
vi,t represents the measurement noise of sensor i. We assume
vi,t to be a Gaussian random variable with mean zero and
positive definite covariance Vi,t , such that vi,t is independent
of x1 , and of wt′ for any t′ 6= t, and independent of vi′ ,t′ for
all t′ 6= t, and any i′ ∈ V, i′ 6= i.
In this paper we are interested in the case in which we
cannot use all the available sensors and, as a result, we need
to select a convenient subset of sensors in the set V to meet
given specifications on the control performance (formalized in
Problem 1 and Problem 2 below).
Definition 1 (Active sensor set and measurement model).
Given a set of available sensors V, we say that S ⊆ V is an
active sensor set if we can observe the measurements from each
sensor i ∈ S for all t = 1, 2, . . . , T . Given an active sensor
set S = {i1 , i2 . . . , i|S| }, we define the following quantities
yt (S)
Ct (S)
Vt (S)
,
,
,
[yiT1 ,t , yiT2 ,t , . . . , yiT|S| ,t ]T,
[CiT1 ,t , CiT2 ,t , . . . , CiT|S| ,t ]T,
diag Vi1 ,t , Vi2 ,t , . . . , Vi|S| ,t ,
(3)
which lead to the definition of the measurement model:
yt (S) = Ct (S)xt + vt (S),
(4)
where vt (S) is a zero-mean Gaussian noise with covariance Vt (S). Despite the availability of a possibly large set
of sensors V, our observer will only have access to the
measurements produced by the active sensors.
In this paper we focus on the case where each sensor in the
set of available sensors V is associated with a (possibly different) cost, which captures, for instance, the sensor’s monetary
cost, its power consumption, or its bandwidth utilization.
Definition 2 (Cost of sensor and cost of active sensor set).
Given a set of available sensors V, we denote the cost of
sensor i ∈ V by c(i)≥ 0. Moreover, we denote the cost of an
active sensor set S ⊆ V by c(S) and set it equal to the sum
of the sensor costs c(i) for all active sensors i ∈ S:
X
c(S),
c(i).
(5)
i∈S
The following paragraph formalizes how the choice of the
active sensors affects the control policies.
c) Control policies: We consider control policies ut for
all t = 1, 2, . . . , T that are only informed by the measurements
collected by the active sensors:
ut = ut (S) = ut (y1 (S), y2 (S), . . . , yt (S)),
Such policies are called admissible.
t = 1, 2, . . . , T.
B. LQG co-design problems
The LQG co-design problem considered in this paper consists in the joint design of sensing, estimation, and control
strategies to meet given design specifications. We consider
two different types of specifications that lead to two codesign problems, named sensing-constrained LQG control
(Problem 1) and minimum-sensing LQG control (Problem 2).
Problem 1 (Sensing-constrained LQG control). Given a
system, a set of available sensors V, and a sensor budget b ≥
0, find a sensor set S ⊆ V to be active across all times
t = 1, 2, . . . , T , with cost c(S) at most b, and an admissible
control policy u1:T (S) , {u1 (S), u2 (S), . . . , uT (S)} to
minimize the LQG cost function, that is:
min
S ⊆ V,
u1:T (S)
T
X
t=1
E kxt+1 (S)k2Qt +kut (S)k2Rt , s.t. c(S) ≤ b,
(6)
where the state-cost matrices Q1 , Q2 , . . . , QT are positive
semi-definite, the control-cost matrices R1 , R2 , . . . , RT are
positive definite, and the expectation is taken with respect to
the initial condition x1 , the process noises w1 , w2 , . . . , wT ,
and the measurement noises v1 (S), v2 (S), . . . , vT (S).
The sensing-constrained LQG control Problem 1 models
the practical case in which one cannot use all the available
sensors due to power, cost, or bandwidth constraints, and needs
to compute a suitable set of active sensors and controls that
maximize LQG performance. Note that if the budget constraint
is relaxed, all sensors are active (no penalty is incurred in using
all sensors) and Problem 1 reduces to standard LQG control.
While Problem 1 imposes constraints on the maximum
amount of sensing, the following “dual” problem formulation
imposes a constraint on the desired LQG performance.
Problem 2 (Minimum-sensing LQG control). Given a system, a set of available sensors V, and an upper bound κ > 0
for the LQG cost, find a minimum-cost sensor set S ⊆ V to
be active across all times t = 1, 2, . . . , T and an admissible
control policy u1:T (S) , {u1 (S), u2 (S), . . . , uT (S)} such
that the LQG cost is at most κ:
min
S ⊆ V,
u1:T (S)
c(S), s.t.
T
X
t=1
E kxt+1 (S)k2Qt +kut (S)k2Rt ≤ κ,
(7)
where the state-cost matrices Q1 , Q2 , . . . , QT are positive
semi-definite, the control-cost matrices R1 , R2 , . . . , RT are
positive definite, and the expectation is taken with respect to
the initial condition x1 , the process noises w1 , w2 , . . . , wT ,
and the measurement noises v1 (S), v2 (S), . . . , vT (S).
The minimum-sensing LQG control Problem 2 models the
practical case in which one wants to design a system that
guarantees a desired level of performance, while incurring in
the smallest sensing cost (again the cost can be monetary or
connected to the use of limited resources).
Remark 1 (Case of uniform-cost sensors). When all sensors
i ∈ V have the same cost , say c(i) = c̄ > 0, the sensor budget
constraint can be rewritten as a cardinality constraint, since:
X
b
c(S) ≤ b ⇔
c(i) ≤ b ⇔ |S|c̄ ≤ b ⇔ |S|≤ , (8)
c̄
i∈S
which bounds the cardinality of the set of active sensors.
Similarly, under the uniform-cost assumption, the objective of
Problem 2 becomes the minimal cardinality objective |S|.
Problem 1 and Problem 2 generalize the imperfect stateinformation LQG control problem from the case where all
sensors in the set of available sensors V are active, and only
optimal control policies are to be found [1, Chapter 5], to the
case where only a few sensors in V can be active, and both
optimal sensors and control policies are to be found, jointly.
While we noticed that admissible control policies depend
on the active sensor set S, it is worth noticing that this in turn
implies that the state evolution will also depend on S, per the
system’s dynamics eq. (1); for this reason we write xt+1 (S) in
eqs. (6) and (7). Thereby, the intertwining between control and
sensing calls for a joint design strategy and, as a result, in the
following section we focus on the design of a jointly optimal
control and sensing solution to Problem 1 and Problem 2.
III. C O - DESIGN P RINCIPLES
AND
E FFICIENT A LGORITHMS
In this section we first present a separation principle that
decouples sensing, estimation, and control, and allows designing them in cascade (Section III-A). We then present
scalable algorithms for the sensing and control design in both
Problem 1 (Section III-B) and Problem 2 (Section III-C).
Theoretical guarantees bounding the suboptimality gap of the
proposed algorithms are given in Section IV.
A. Separability of optimal sensing and control design
We characterize the jointly optimal control and sensing
solutions for Problem 1 and Problem 2, and prove they can be
found in two separate steps, where first the sensing design is
computed, and second the control design is found (Theorem 1).
Theorem 1 (Separability of optimal sensing and control design). For any active sensor set S ⊆ V, let x̂t (S)
be the Kalman estimator of the state xt , i.e., x̂t (S) ,
E[xt |y1 (S), y2 (S), . . . , yt (S)], and Σt|t (S) be x̂t (S)’s error
covariance, i.e., Σt|t (S) , E[(x̂t (S) − xt )(x̂t (S) − xt )T ] [1,
Appendix E]. In addition, let the matrices Θt and Kt be the
solution of the following backward Riccati recursion
St
Nt
Mt
Kt
Θt
= Qt + Nt+1 ,
−1
−1 T −1
= AT
At ,
t (St + Bt Rt Bt )
T
= Bt St Bt + Rt ,
= −Mt−1 BtT St At ,
= KtT Mt Kt ,
(9)
with boundary condition NT +1 = 0 (notably, all matrices in
eq. (9) are independent of the active sensor set S).
1) (Separability in Problem 1) Let the sensor set S ⋆
and the controllers u⋆1 , u⋆2 , . . . , u⋆T be a solution to the
Algorithm 1 Joint Sensing and Control design for Problem 1.
Input: Time horizon T , available sensor set V, sensor selection budget b, covariance Σ1|0 of initial condition x1 ; for
all t = 1, 2, . . . , T , system matrix At , input matrix Bt ,
process noise covariance Wt , and LQG cost matrices Qt
and Rt ; for all sensors i ∈ V, measurement matrix Ci,t ,
measurement noise covariance Vi,t , and sensor cost c(i).
b and controls û1 , û2 , . . . , ûT .
Output: Active sensors S,
1: Compute the matrices Θ1 , Θ2 , . . . , ΘT using the backward
Riccati recursion in eq. (9).
b as the sensor set returned by Al2: Return the sensor set S
gorithm 2, which finds a (possibly approximate) solution
to the optimization problem in eq. (10);
3: Compute the matrices K1 , K2 , . . . , KT using the backward Riccati recursion in eq. (9).
4: At time t = 1, 2, . . . , T , compute the Kalman estimate of
the state xt , i.e., the estimate:
5:
b y2 (S),
b . . . , yt (S)];
b
x̂t , E[xt |y1 (S),
At time t = 1, 2, . . . , T , return the control ût = Kt x̂t .
sensing-constrained LQG Problem 1. Then, S ⋆ and u⋆1 ,
u⋆2 , . . . , u⋆T can be computed in cascade as follows:
S ⋆ ∈ arg min
S⊆V
T
X
t=1
⋆
u⋆t = Kt x̂t (S ),
tr[Θt Σt|t (S)], s.t. c(S) ≤ b, (10)
t = 1, . . . , T.
(11)
2) (Separability in Problem 2) Let the sensor set S ⋆ and the
controllers u⋆1 , u⋆2 , . . . , u⋆T be a solution to the minimumsensing LQG Problem
define the constant
2.PMoreover,
T
κ̄ , κ − tr Σ1|0 N1 − t=1 tr (Wt St ). Then, S ⋆ and
u⋆1 , u⋆2 , . . . , u⋆T can be computed in cascade as follows:
S ⋆ ∈ arg min c(S), s.t.
S⊆V
u⋆t = Kt x̂t (S ⋆ ),
T
X
tr[Θt Σt|t (S)] ≤ κ̄, (12)
t=1
t = 1, . . . , T.
(13)
Remark 2 (Certainty equivalence principle). The control
gain matrices K1 , K2 , . . . , KT are the same as the ones that
make the controllers (K1 x1 , K1 x2 , . . . , KT xT ) optimal for
the perfect state-information version of Problem 1, where the
state xt is known to the controllers [1, Chapter 4].
Theorem 1 decouples the design of the sensing from the
controller design. In particular, it suggests that once an optimal
sensor set S ⋆ is found, then the optimal controllers are equal
to Kt x̂t (S ⋆ ), which correspond to the standard LQG control
policy. This should not come as a surprise, since for a given
sensing strategy, Problem 1 reduces to standard LQG control.
Moreover, for a given sensor set, Problem 2 becomes a
feasibility problem and, as a result, admits multiple controls
that satisfy the LQG cost bound; one such set of controls are
the control actions computed in eq. (13), since they minimize
the LQG cost and, hence, they also belong to Problem 2’s
feasible set whenever Problem 2 admits a solution.
Algorithm 2 Sensing design for Problem 1.
Input: Time horizon T , available sensor set V, sensor selection budget b, covariance Σ1|0 of initial condition x1 , and
for all t = 1, 2, . . . , T and any sensor i ∈ V, matrix Θt ,
process noise covariance Wt , measurement matrix Ci,t ,
measurement noise covariance Vi,t , and sensor cost c(i).
b
Output: Sensor set S.
PT
b
1: S1 ← arg mini∈V,c(i)≤b
t=1 tr[Θt Σt|t ({i})];
b2 ← ∅; V ′ ← V;
2: S
b2 ) ≤ b do
3: while V ′ 6= ∅ and c(S
′
4:
for all a ∈ V do
5:
Sb2,α ← Sb2 ∪ {a}; Σ1|0 (Sb2,α ) ← Σ1|0 ;
6:
for all t = 1, . . . , T do
7:
Σt|t (Sb2,α ) ←
8:
[Σt|t−1 (Sb2,α )−1 +Ct (Sb2,α )T Vt (Sb2,α )−1 Ct (Sb2,α )]−1 ;
9:
Σt+1|t (Sb2,α ) ← At Σt|t (Sb2,α )AT
t + Wt ;
10:
end for P
T
11:
gaina ← t=1 tr{Θt [Σt|t (Sb2 ) − Σt|t (Sb2,α )]};
12:
end for
13:
s ← arg maxa∈V ′ [gaina /c(a)];
14:
Sb2 ← Sb2 ∪ {s};
15:
V ′ ← V ′ \ {s};
16: end while
b2 ) > b then
17: if c(S
b
18:
S2 ← Sb2 \ {s};
19: end if
PT
b ← arg min
20: S
t=1 tr[Θt Σt|t (S)].
S∈{Sb1 ,Sb2 }
We conclude the section with a remark providing an intuitive interpretation of the sensor design steps in eqs. (10)
and (12) for Problem 1 and Problem 2, respectively.
Remark 3 (Control-aware P
sensor design). In order to proT
vide insight on the function t=1 tr[Θt Σt|t (S)] appearing in
in eqs. (10) and (12), we rewrite it as:
T
X
tr[Θt Σt|t (S)] =
t=1
T
X
E tr{[xt − x̂t (S)]T Θt [xt − x̂t (S)]}
t=1
=
T
X
t=1
E kKt xt − Kt x̂t (S)k2Mt ,
(14)
where
in the first line we used
the fact that Σt|t (S) =
E (xt − x̂t (S))(xt − x̂t (S))T , and in the second line we
substituted the definition of Θt = KtT Mt Kt from eq. (9).
From eq. (14), it is clear that each term tr[Θt Σt|t (S)]
captures the expected mismatch between the imperfect stateinformation controller ut (S) = Kt x̂t (S) (which is only
aware of the measurements from the active sensors) and the
perfect state-information controller Kt xt . This is an important
distinction from the existing sensor selection literature. In particular, while standard sensor selection attempts to minimize
the estimation covariance, for instance by minimizing
T
X
t=1
tr[Σt|t (S)] ,
T
X
t=1
E kxt − x̂t (S)k22 ,
(15)
the proposed LQG cost formulation selectively minimizes the
estimation error focusing on the states that are most informative for control purposes. For instance, the contribution to the
total control mismatch in eq. (14) of all xt − x̂t (S) in the null
space of Kt is zero; accordingly, the proposed sensor design
approach has no incentive in activating sensors to observe
states which are irrelevant for control purposes. Overall, the
importance of a state for control purposes is indeed captured
by the weighting matrix Θt . Hence, in contrast to minimizing
the cost function in eq. (15), minimizing the cost function in
eq. (14) results in a control-aware sensing design.
B. Scalable near-optimal co-design algorithms
for sensing-constrained LQG control (Problem 1)
This section proposes a practical algorithm for the sensingconstrained LQG control Problem 1. The pseudo-code of the
algorithm is presented in Algorithm 1. Algorithm 1 follows the
result of Theorem 1 and jointly designs sensing and control by
first computing an active sensor set (Algorithm 1’s lines 1-2)
and then computing a control policy (Algorithm 1’s lines 3-5).
We discuss each step of the design below.
Near-optimal sensing design for Problem 1. Theorem 1
implies that an optimal sensor design for Problem 1 can be
computed by solving the optimization problem in eq. (10).
To this end, Algorithm 1 (line 1) first computes the matrices
Θ1 , Θ2 , . . . , ΘT , which appear in the objective function of
the optimization problem in eq. (10) and, as result, they
are necessary for its evaluation. Next, since the optimization
problem in eq. (10) is combinatorial in nature, because it
requires to select a subset of sensors out of all the available
sensors in V that has sensor cost at most b and induces the
smallest LQG cost, Algorithm 1’s line 2 proposes a greedy
algorithm, whose pseudo-code is given in Algorithm 2, to
compute a (possibly approximate) solution to the problem in
eq. (10). Our interest towards Algorithm 2 is motivated by that
it is scalable and provably close to the solution of the problem
in eq. (10) (in Section IV we quantify its running time and
provide sub-optimality bounds for its performance).
The steps that Algorithm 2 follows to compute a (possibly
approximate) solution to the problem in eq. (10) are as follows:
first, Algorithm 2 creates two candidate active sensor sets Sb1
and Sb2 (lines 1-2), of which only one will be selected as the
(possibly approximate) solution to the problem in eq. (10)
(line 20). In more detail, Algorithm 2’s line 1 lets the set Sb1
be composed of a single sensor, namely the sensor i ∈ V
that achieves the smallest value of the objective function in
eq. (10) and having cost not exceeding the sensor selection
budget (c(i) ≤ b). Then, Algorithm 2’s line 2 initializes the
candidate active sensor set Sb2 with the empty set, and after the
construction of the set Sb2 in Algorithm 2’s lines 3–19 (which
are explained below), Algorithm 2’s line 20 computes which of
Algorithm 3 Joint Sensing and Control design for Problem 2.
Input: Time horizon T , available sensor set V, LQG-cost
bound κ, covariance Σ1|0 of initial condition x1 ; for all
t = 1, 2, . . . , T , system matrix At , input matrix Bt , LQG
cost matrices Qt and Rt , process noise covariance Wt ;
and for all sensors i ∈ V, measurement matrix Ci,t ,
measurement noise covariance Vi,t , and sensor cost c(i).
b and controls û1 , û2 , . . . , ûT .
Output: Active sensors S,
1: Compute the matrices Θ1 , Θ2 , . . . , ΘT using the backward
Riccati recursion in eq. (9).
b as the sensor set returned by Al2: Return the sensor set S
gorithm 4, which finds a (possibly approximate) solution
to the optimization problem in eq. (7) ;
3: Compute the matrices K1 , K2 , . . . , KT using the backward Riccati recursion in eq. (9).
4: At time t = 1, 2, . . . , T , compute the Kalman estimate of
the state xt , i.e., the estimate:
5:
b y2 (S),
b . . . , yt (S)];
b
x̂t , E[xt |y1 (S),
At time t = 1, 2, . . . , T , return the control ût = Kt x̂t .
the two sets Sb1 and Sb2 achieves the smallest value for the objective function in eq. (10), and returns this set as the (possibly
approximate) solution to the optimization problem in eq. (10).
Lines 3–19 in Algorithm 2 populate the set Sb2 as follows:
at each iteration of the “while loop” (lines 3-16) a sensor
is greedily added to the set Sb2 , as long as Sb2 ’s sensor cost
does not exceed the sensor selection budget b. In particular,
for each available sensor (the set V ′ contains the available
sensors, excluding the ones already included in Sb2 ), the “for
loop” (lines 4-12) computes first the estimation covariance
resulting by adding the sensor to Sb2 , and second the corresponding marginal gain in the objective function in eq. (10)
(line 11). Then, the sensor that induces the largest sensorcost-normalized marginal gain is selected (line 13), and it is
added to the current set Sb2 (line 14). Finally, the “if” statement
(lines 17-19) ensures that the constructed set Sb2 has sensor
cost at most b, by possibly removing the sensor that was added
in Sb2 during the last iteration of the “while” loop in lines 3-16.
Control design for Problem 1. Theorem 1 implies that
given an active sensor set, the controls for Problem 1 can be
computed according to the eq. (11). To this end, Algorithm 1
first computes the matrices K1 , K2 , . . . , KT (line 3), and then,
at each time t = 1, 2, . . . , T , the Kalman estimate of the
current state xt (line 4), and the corresponding control (line 5).
C. Scalable near-optimal co-design algorithms
for minimum-sensing LQG control (Problem 2)
This section proposes a practical algorithm for the
minimum-sensing LQG control Problem 2. The pseudo-code
of the algorithm is presented in Algorithm 3. Algorithm 3
follows the result of Theorem 1 and jointly designs sensing and
control by first computing an active sensor set (Algorithm 3’s
lines 1-2) and then computing a control policy (Algorithm 3’s
lines 2-5). We discuss the first step (sensor design) in the rest
of this section, while the second step (control design) is as in
Algorithm 1’s line 2, and is explained in Section III-B.
Near-optimal sensing design for Problem 2. Theorem 1
implies that an optimal sensor design for Problem 2 can be
computed by solving the optimization problem in eq. (12).
To this end, similarly to Algorithm 1’s line 1, Algorithm 3’s
line 1 computes the matrices Θ1 , Θ2 , . . . , ΘT , which are
necessary for the evaluation of the cost function appearing in
eq. (12). Next, Algorithm 3’s line 2 calls Algorithm 4 to find a
(possibly approximate) solution to the optimization problem in
eq. (12). Analogously to the previous section, Algorithm 4 is
a greedy algorithm that returns a near-optimal solution for the
problem in eq. (12). The running time and the sub-optimality
bounds of the algorithm are analyzed in Section IV.
Algorithm 4 finds a (possibly approximate) solution to the
optimization problem in eq. (12) as follows: first, Algorithm 4
defines the constant κ̄ (line 1), appearing in the definition
of the optimization problem in eq. (12), and then initializes
the sensor set Sb with the empty set (line 2). Afterwards,
Algorithm 4 populates Sb in lines 3–16 using the following
steps: at each iteration of the “while loop” (lines 3-16) a sensor
b as long as Problem 2’s LQGis greedily added to the set S,
cost bound κ has not been met, which eq. (12) guarantees
to be equivalent to checking whether the second condition
in Algorithm 4’s line 3 holds. In particular, for each sensor
in V ′ (set of available sensors, excluding the ones already
b the “for loop” (lines 4-12) computes first the
included in S)
b and
estimation covariance resulting by adding the sensor to S,
then the corresponding marginal gain in the objective function
in eq. (10) (line 11). Then, the sensor that induces the largest
sensor-cost-normalized marginal gain is selected (line 13), and
added to the current candidate active set Sb (line 14). Finally,
the added sensor s is removed from V ′ (line 15).
In the following section we characterize the approximation
and running-time performance of Algorithm 1 and Algorithm 3
for Problem 1 and Problem 2, respectively.
IV. P ERFORMANCE
GUARANTEES FOR
LQG
CO - DESIGN
We prove that Algorithm 1 and Algorithm 3 are the first
scalable algorithms for the joint sensing and control design
Problem 1 and Problem 2, respectively, and that they achieve
an objective value that is close to the optimal. We start by
introducing the notion of supermodularity ratio (Section IV-A),
which will enable to bound the sub-optimality gap of Algorithm 1 (Section IV-B) and Algorithm 3 (Section III-C).
We then establish connections between the supermodularity
ratio and control-theoretic quantities (Section IV-D).
A. Supermodularity ratio of monotone functions
This section introduces the notion of supermodularity ratio
of a monotone set function (Definition 5). We start by defining
the notions of monotonicity (Definition 3) and of supermodularity (Definition 4).
Definition 3 (Monotonicity). Consider any finite set V. The
set function f : 2V 7→ R is non-increasing if and only if for
any sets A ⊆ B ⊆ V, it holds f (A) ≥ f (B).
Algorithm 4 Sensing design for Problem 2.
Input: Time horizon T , available sensor set V, LQG performance bound κ, covariance Σ1|0 of initial condition x1 ,
and for all t = 1, 2, . . . , T and any sensor i ∈ V, matrix
Θt , process noise covariance Wt , measurement matrix
Ci,t , measurement noise covariance Vi,t , and sensor cost
c(i).
b
Output: Sensor set S.
PT
1: κ̄ ← κ − tr Σ1|0 N1 −
t=1 tr (Wt St )
′
b
2: S ← ∅;
V ← V;P
T
b
3: while V ′ 6= ∅ and
t=1 tr[Θt Σt|t (S)] > κ̄ do
′
4:
for all a ∈ V do
5:
Sbα ← Sb ∪ {a}; Σ1|0 (Sbα ) ← Σ1|0 ;
6:
for all t = 1, . . . , T do
7:
Σt|t (Sbα ) ←
8:
[Σt|t−1 (Sbα )−1 + Ct (Sbα )T Vt (Sbα )−1 Ct (Sbα )]−1 ;
9:
Σt+1|t (Sbα ) ← At Σt|t (Sbα )AT
t + Wt ;
10:
end for P
b − Σt|t (Sbα )]};
11:
gaina ← Tt=1 tr{Θt [Σt|t (S)
12:
end for
13:
s ← arg maxa∈V ′ [gaina /c(a)];
14:
Sb ← Sb ∪ {s};
15:
V ′ ← V ′ \ {s};
16: end while
Definition 4 (Supermodularity [31, Proposition 2.1]). Consider any finite set V. The set function f : 2V 7→ R is
supermodular if and only if for any sets A ⊆ B ⊆ V, and any
element v ∈ V, it holds f (A)−f (A∪{v}) ≥ f (B)−f (B∪{v}).
In words, a set function f is supermodular if and only
if it satisfies the following diminishing returns property: for
any element v ∈ V, the marginal drop f (A) − f (A ∪ {v})
diminishes as the set A grows; equivalently, for any A ⊆ V
and v ∈ V, the drop f (A) − f (A ∪ {v}) is non-increasing.
Definition 5 (Supermodularity ratio). Consider any finite
set V, and a non-increasing set function f : 2V 7→ R. We
define the supermodularity ratio of f as
γf ,
min
A⊆B⊆V,v∈V\B
f (A) − f (A ∪ {v})
.
f (B) − f (B ∪ {v})
In words, the supermodularity ratio of a monotone set
function f measures how far f is from being supermodular.
In particular, as per Definition 5 of the supermodularity ratio,
the supermodularity ratio γf takes values in [0, 1], and
• γf = 1 if and only if f is supermodular, since if γf = 1,
then Definition 5 implies f (A) − f (A ∪ {v}) ≥ f (B) −
f (B ∪ {v}), i.e., the drop f (A) − f (A ∪ {v}) is nonincreasing as new elements are added in the set A.
• 0 <γf < 1 if and only if f is approximately supermodular, in the sense that if γf < 1, then Definition 5 implies
f (A) − f (A ∪ {v}) ≥ γf [f (B) − f (B ∪ {v})], i.e., the
drop f (A) − f (A ∪ {v}) is approximately non-increasing
as new elements are added in A; specifically, the ratio
B. Performance analysis for Algorithm 1
In this section we quantify Algorithm 1’s running time
and approximation performance (Theorem 2 below), using the
notion of supermodularity ratio introduced in Section IV-A.
Theorem 2 (Performance of Algorithm 1). For any active
sensor set S ⊆ V, and any admissible control policies
u1:T (S) , {u1 (S), u2 (S), . . . , uT (S)}, let h[S, u1:T (S)] be
Problem 1’s cost function, i.e.,
PT
h[S, u1:T (S)] , t=1 E(kxt+1 (S)k2Qt +kut (S)k2Rt ).
Further define the following set-valued function and scalar:
g(S) , minu1:T (S) h[S, u1:T (S)],
(16)
g ⋆ , minS⊆V,u1:T (S) h[S, u1:T (S)], s.t. c(S) ≤ b;
that is, given a sensor set S ⊆ V, g(S) is the optimal value of
h[S, u1:T (S)] across all admissible control policies u1:T (S),
and g ⋆ is the optimal objective value of Problem 1.
The following results hold true:
1) (Approximation quality) Algorithm 1 returns an active
b at most b, and the
sensor set Sb ⊆ V having cost c(S)
b The
corresponding admissible control policies u1:T (S).
b
b
active sensors S and controls u1:T (S) are such that:
b u1:T (S)]
b
h[∅, u1:T (∅)] − h[S,
≥
⋆
h[∅, u1:T (∅)] − g
i (17)
hγ
b
g
1 − e−γg , 1 − e−γg c(S)/b ,
max
2
where γg is the supermodularity ratio of g(S) in eq. (16).
2) (Running time) Algorithm 1 runs in O(|V|2 T n2.4 ) time,
where n is the system size in eq. (1).
b u1:T (S)]
b quantifies
Note that the term h[∅, u1:T (∅)] − h[S,
b
the marginal gain of selecting the set S, and ineq. (17)
guarantees that the marginal gain is sufficiently large compared
to the optimal marginal gain h[∅, u1:T (∅)] − g ⋆, in the sense
that their ratio is lower bounded by the maximum between
b
γg
−γg
) and 1 − e−γg c(S)/b. We further comment on the
2 (1 − e
bound in ineq. (17) in the following proposition and remarks.
Proposition 1 (Extension of the bound in ineq. (17) to
sensor sets of any cost). Consider the modified version of
Algorithm 1 where Algorithm 2’s “if” statement (lines 17-19)
is removed. Then, Algorithm 1’s approximation performance
bound remains as in ineq. (17), even when Algorithm 1 returns
b that exceeds Problem 1’s budget b.
a set Sb of cost c(S)
Remark 4 (Comparison of bounds in ineq. (17)). In Fig. 1
we plot Algorithm 1’s approximation performance bounds in
ineq. (17), namely the bound γg /2 (1 − e−γg ) (function f1 (γg )
b
in Fig. 1) and the bound 1 − e−γg c(S)/b (functions f2 (γg ),
1
0.8
fi (γg ), i = 1, 2, 3, 4
γf captures how much ones needs to discount the drop
f (B) − f (B ∪ {v}), such that f (A) − f (A ∪ {v}) remains
greater then, or equal to, f (B) − f (B ∪ {v}).
We next use the above supermodularity ratio notion to quantify the sub-optimality gap of Algorithm 1 and Algorithm 3.
f1 (γg ) = γg /2 (1 − e−γg )
f2 (γg ) = 1 − e−2γg /5
f3 (γg ) = 1 − e−γg
f4 (γg ) = 1 − e−2γg
0.6
0.4
0.2
0
0.2
0.4
0.6
0.8
1
γg
Fig. 1. Plot of fi (γg ) (i = 1, 2, 3, 4) versus supermodularity ratio γg of
a monotone supermodular function g. By Definition 5 of supermodularity
ratio, γg takes values between 0 and 1. As γg increases from 0 to 1 then:
f1 (γg ) increases from 0 to 1/2(1 − e−1 ) ≃ 0.32; f3 (γg ) increases from 0
to 1 − e−2/5 ≃ 0.32; f2 (γg ) increases from 0 to 1 − e−1 ≃ 0.64; f4 (γg )
increases from 0 to 1 − e−2 ≃ 0.87.
b
f3 (γg ), and f4 (γg ) in Fig. 1, which correspond to c(S)/b
equal to 2/5, 1, and 2, respectively; we note that for the latter
b
case where c(S)/b
is equal to 2, we consider that Algorithm 1
has been modified per Proposition 1 to allow for active sensor
sets with costs that exceed the selection budget b). We make
two observations from Fig. 1: first, we observe that for ratio
b
b
values c(S)/b
> 2/5, the bound 1 − e−γg c(S)/b in ineq. (17)
dominates (i.e., is always larger —for all values of γg — than)
the bound γg /2 (1 − e−γg ) (compare plot of f2 (γg ) against
that of f1 (γg )). Also, we observe from Fig. 1 that as the cost
b
ratio c(S)/b
and the supermodularity ratio γg increase, the
b
bound 1 − e−γg c(S)/b tends to 1 (see plot of f4 (γg )).
Remark 5 (Novelty of Algorithm 2 and of bound in
ineq. (17)). Algorithm 2 (used as a subroutine in Algorithm 1)
is the first scalable algorithm with provable suboptimality
guarantees for the minimization of a (possibly) approximately
supermodular set function g, that is, a function g with supermodularity ratio γg (possibly) less than 1, subject to a
heterogeneous-cost constraint. This generalizes existing algorithms for optimization with heterogeneous-cost constraints,
which only focus on the special case of (exactly) supermodular
functions (see, e.g., [28]), that is, functions g with supermodularity ratio γg (exactly) equal to 1.
In addition, Algorithm 2 offers a tighter approximation performance bound for the optimization of (exactly) supermodular
functions. Specifically, although the previous algorithms for
the optimization of supermodular functions (see, e.g., [28])
have the same running time as Algorithm 2 and
achieve the
approximation performance bound 1/2 1 − e−1 , which is the
same as Algorithm 2’s performance bound γg /2 (1 − e−γg )
for γg = 1 (that is, for supermodular functions), Algorithm 2
b
also achieves the cost-dependent bound 1 − e−γg c(S)/b, which
for γg = 1 is superior to 1/2 1 − e−1 when the cost ratio
b
c(S)/b
is more than 2/5 (Remark 4).
Theorem 2 guarantees that Algorithm 1 achieves an objective value for Problem 1 that is finitely close to optimal,
whenever the supermodularity ratio γg is non-zero. In more
detail, the extreme values of the bound in ineq. (17), as
well as their interpretation with respect to Algorithm 1’s
approximation performance are as follows: the maximum
value of the bounds in ineq. (17) is 1, which is achieved for
b
supermodularity ratio γg = 1 and ratio c(S)/b
−→ +∞;
as discussed in Proposition 1, the latter is possible when
Algorithm 1 is modified to return an active sensor set with
cost larger than b. On the other hand, when Algorithm 1 is not
modified to return an active sensor set with cost larger than the
budget b, and it always returns a sensor set with cost at most
b, then the maximum value the bound in ineq. (17) can take
b = b); notably, this is the best
is 1 − 1/e (for γg = 1 and c(S)
bound one can achieve in the worst-case in polynomial time
even for supermodular objective functions [32]. The minimum
value the bound in ineq. (17) is 0, which occurs for γg = 0.
The interpretation of the extreme values 0 and 1 of the
bound in ineq. (17) is as follows: when the bound in ineq. (17)
takes the value 1, then ineq. (17) implies that the approximate
b u1:T (S)]
b to Problem 1 is equal to the (optimal)
value h[S,
value g ⋆ of Problem 1, that is, Algorithm 1 is exact. Finally,
when the bound in ineq. (17) is 0, ineq. (17) implies that
b u1:T (S)]
b ≤ h[∅, u1:T (∅)], which is trivially satisfied2
h[S,
and, as a result, it is uninformative on the approximation
performance of Algorithm 1. In Section IV-D we present
conditions under which the supermodularity ratio in ineq. (17)
is guaranteed to be non-zero, in which case Algorithm 1
achieves near-optimal approximation performance.
Theorem 2 also ensures that Algorithm 1 is the first scalable
algorithm for Problem 1. In particular, Algorithm 1’s running
time O(|V|2 T n2.4 ) is in the worst-case quadratic in the
number of the available sensors |V| (in the case where all the
sensors in V are chosen as active) and linear in the Kalman
filter’s running time across the time horizon {1, 2, . . . , T };
specifically, the contribution n2.4 T in Algorithm 1’s running
time comes from the computational complexity of using the
Kalman filter to compute the state estimation error covariances
Σt|t for each t = 1, 2, . . . , T [1, Appendix E].
C. Performance analysis for Algorithm 3
We quantify Algorithm 3’s running time and approximation
performance (Theorem 3 below), using the notion of supermodularity ratio introduced in Section IV-A.
Theorem 3 (Performance of Algorithm 3). Consider the
notation introduced in the statement of Theorem 2 (Section IV-B): for any active sensor set S ⊆ V, and any admisb u1:T (S)]
b ≤ h[∅, u1:T (∅)] simply states that a control
inequality h[S,
policy that is informed by the active sensor set Sb has better performance than
a policy that does not use any sensor; for a more formal proof we refer the
reader to Appendix B.
2 The
sible control policies u1:T (S) , {u1 (S), u2 (S), . . . , uT (S)},
let h[S, u1:T (S)] be the LQG cost function in Problem 2’s
constraint, i.e.,
P
h[S, u1:T (S)] , Tt=1 E(kxt+1 (S)k2Qt +kut(S)k2Rt );
Further define the following set-valued function:
g(S) , minu1:T (S) h[S, u1:T (S)];
(18)
that is, given a sensor set S ⊆ V, g(S) is the optimal value of
h[S, u1:T (S)] across all admissible control policies u1:T (S).
Finally, let b⋆ be the optimal value of Problem 2, namely:
b⋆ ,
min
S⊆V,u1:T (S)
c(S), s.t. h[S, u1:T (S)] ≤ κ.
The following results hold true:
1) (Approximation quality) Algorithm 3 returns an active
sensor set Sb ⊂ V and admissible control policies
b Let sl denote the last sensor added to Sb by
u1:T (S).
b
Algorithm 3: the active sensors Sb and controls u1:T (S)
are such that:
b u1:T (S)]
b ≤ κ;
h[S,
b ≤ c(sl ) +
c(S)
1
log
γg
h[∅, u1:T (∅)] − κ
h[Sbl−1 , u1:T (Sbl−1 )] − κ
!
(19)
b⋆,
(20)
where Sbl−1 is the subset of Sb that results by removing
from Sb the last sensor added to it by Algorithm 3, i.e.,
Sbl−1 , Sb \ {sl }; γg is the supermodularity ratio of g(S).
2) (Running time) Algorithm 3 runs in O(|V|2 T n2.4 ) time,
where n is the maximum system size in eq. (1).
Remark 6 (Novelty of Algorithm 4 and of bound in
ineq. (20)). Algorithm 4 (used as a subroutine in Algorithm 3)
is the first scalable algorithm with provable suboptimality
guarantees for the minimum heterogeneous-cost set selection
subject to a constraint on a (possibly) approximately supermodular function g, that is, a function g with supermodularity
ratio γg less than 1. In particular, it generalizes previous
algorithms that only focus on the special case of (exactly)
supermodular functions (see, e.g., [25]), that is, functions g
with supermodularity ratio γg equal to 1. Notably, for the case
where the supermodularity ratio γg is equal to 1 (that is, the
set function g is supermodular), and the sensor cost of the last
sensor added to the returned set Sb by Algorithm 3 is equal to 1
(c(sl ) = 1), then the bound in ineq. (20) becomes the same as
the known bound in the supermodular function optimization
literature for minimum cost set-selection [25, Theorem 1].
Theorem 3, with ineq. (19), implies that Algorithm 3 returns
a (possibly approximate) solution to Problem 2 that guarantees
that the LQG-cost constraint in Problem 2 is satisfied.
Ineq. (20) also guarantees that for non-zero supermodularity
ratio γg Algorithm 3 achieves an objective value for Problem 2
that is finitely close to the optimal, since for non-zero γg the
sensor cost of the set returned by Algorithm 3 is up to a finite
multiplicative factor away from the optimal sensor set cost b⋆.
In addition, ineq. (20) suggests that the approximation bound
increases as the LQG-cost performance bound parameter κ decreases, that is, as we require from Algorithm 3 to find a sensor
set that achieves a better (lower) LQG-cost performance.
Theorem 3 also ensures that Algorithm 3 is the first scalable
algorithm for Problem 2. Notably, Algorithm 3’s running time
is equal in the worst-case to the running time of Algorithm 1
(which we discussed in Section IV-B).
In the following section we present control-theoretic conditions under which the supermodularity ratio γg in both
Algorithm 1’s and Algorithm 3’s approximation bound in
ineqs. (17) and (19) is non-zero, in which case Algorithm 1 and
Algorithm 3 achieve near-optimal approximation performance.
D. Conditions for non-zero supermodularity ratio
In this section we provide conditions such that the supermodularity ratio γg in ineqs. (17) and (19) is non-zero, in
which case both Algorithm 1 and Algorithm 3 guarantee a
close to optimal approximate performance (per Theorem 2
and Theorem 3, respectively).
PT In particular, we first prove
that if the strict inequality t=1 Θt ≻ 0 holds, where each
Θt is defined as in eq. (9), then the supermodularity ratio γg
is
PTnon-zero (Theorem 4). Then, we prove that the condition
t=1 Θt ≻ 0 holds true in all LQG control problem instances
where a zero controller would result in
PaT suboptimal behavior
for the system; that is, we prove that t=1 Θt ≻ 0 holds true
in all system instances where LQG control design is necessary
to achieve a desired system performance (Theorem 5).
The next theorem provides a non-zero computable bound for
the supermodularity ratio γg in Theorem 2 and in Theorem 3.
in ineq. (21) increases when on average all the directions in
the state space become equally important for control purposes.
Indeed, in the extreme case where λmax (Θt ) = λmin (Θt ) = λ,
the cost function in eq. (10) that Algorithm 1 minimizes to
select the active sensor set becomes
T
X
t=1
tr[Θt Σt|t (S)] = λ
T
X
tr[Σt|t (S)],
t=1
which matches the cost function in the classical sensor selection where all states are equally important (per eq. (15)).
b) Case 2 where the bound of γg in ineq. (21) increases:
When either the numerators of the last two fractions in the
right-hand-side of ineq. (21) increase or the denominators of
the last two fractions in the right-hand-side of ineq. (21) decrease, then the right-hand-side in ineq. (21) increases. In particular, the numerators of the last two fractions in the righthand-side of ineq. (21) capture the (best) estimation quality
when all available sensors in V are used, via the terms of the
T
form λmin [Σt|t (V)] and λmin [C̄i,t Σt|t (V)C̄i,t
]. Interestingly,
this suggests that the right-hand-side of ineq. (21) increases
when the available sensors in V are inefficient in achieving
low estimation error, that is, when the terms of the form
T
λmin [Σt|t (V)] and λmin [C̄i,t Σt|t (V)C̄i,t
] increase. Similarly,
the denominators of the last two fractions in the right-handside of ineq. (21) capture the (worst) estimation quality when
no sensor is active, via the terms of the form λmax [Σt|t (∅)] and
T
λmax [C̄i,t Σt|t (∅)C̄i,t
]. This suggests that the right-hand-side of
ineq. (21) increases when the measurement noise increases.
Theorem 4 states that the supermodularity ratio γg is nonPT
zero whenever t=1 Θt ≻ 0. To provide insight on the type of
control problems for which this result holds, inP
the following
T
theorem we translate the technical condition t=1 Θt ≻ 0
into an equivalent control-theoretic condition.
Theorem 4 (Non-zero computable bound for the supermodularity ratio γg ). Let the matrices Θt for all t = 1, 2, . . . , T
be defined as in eq. (9), the set function g(S) be defined
as in eq. (16), and for any sensor i ∈ V, the matrix
−1/2
Theorem 5 (Control-theoretic condition for near-optimal
C̄i,t , Vi,t Ci,t be the whitened measurement matrix.
PT
co-design). Consider the (noiseless, perfect state-information)
If the strict inequality
t=1 Θt ≻ 0 holds, then the
LQG problem where at any time t = 1, 2, . . . , T , the state xt
supermodularity ratio γg is non-zero. In addition, if we assume
is known to each controller ut and the process noise wt is
(for simplicity in presentation) that the Frobenius norm of
zero, i.e., the optimal control problem
T
= 1, and that tr[Σt|t (∅)] ≤
each C̄i,t is 1, i.e., tr C̄i,t C̄i,t
P
λ2max [Σt|t (∅)], then γg ’s lower bound is
minu1:T Tt=1 [kxt+1 k2Qt +kut (xt )k2Rt ] Σ =W =0 .
(22)
t
t|t
PT
λmin ( t=1 Θt ) mint∈{1,2,...,T } λ2min [Σt|t (V)]
Let At be
γg ≥
PT
PTinvertible for all t = 1, 2, . . . , T ; the strict
λmax ( t=1 Θt ) maxt∈{1,2,...,T } λ2max [Σt|t (∅)]
inequality
t=1 Θt ≻ 0 holds if and only if for all non(21)
T
zero
initial
conditions
x1 , the all-zeroes control policy u◦1:T ,
1 + mini∈V,t∈{1,2...,T } λmin [C̄i Σt|t (V)C̄i ]
.
(0, 0, . . . , 0) is not an optimal solution to the optimal control
2 + maxi∈V,t∈{1,2...,T } λmax [C̄i Σt|t (∅)C̄iT ]
problem in eq. (22):
Ineq. (21) suggests two cases under which γg can increase,
PT
◦
/ arg minu1:T t=1 [kxt+1 k2Qt +kut (xt )k2Rt ] Σ =W =0 .
and, correspondingly, the approximation performance bounds u1:T ∈
t
t|t
of Algorithm 1 and of Algorithm 3 in ineqs. (17) and (19),
PT
respectively, can improve; in more detail:
Theorem 5 suggests that the condition
t=1 Θt ≻ 0
a) Case 1 where the bound of γg in ineq. (21) increases: (which ensures a non-zero supermodularity ratio γg per ThePT
PT
When the fraction λmin ( t=1 Θt )/λmax ( t=1 Θt ) increases orem 4) holds if and only if for any non-zero initial conto 1, then the right-hand-side in ineq. (21) increases. Therefore, dition x1 the all-zeroes control policy u◦1:T = (0, 0, . . . , 0)
since the matrices Θt weight the states depending on their is suboptimal for the noiseless, perfect state-information
relevance for control purposes (Remark 3), the right-hand-side LQG problem in eq. (22); intuitively, this encompasses
9
8
7
6
5
4
3
y [meters]
2
1
0
-1
-2
-3
-4
-5
-6
-7
-8
-9
-9
-8
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
x [meters]
(a) formation control
(b) unmanned aerial robot
Fig. 2. Examples of applications of the proposed sensing-constrained LQG
control framework: (a) sensing-constrained formation control and (b) resourceconstrained robot navigation.
most practical control design problems where a zero controller would result in a suboptimal behavior of the system
(LQG control design itself would be unnecessary in the
case where a zero controller, i.e., no control action, can
already attain the desired system performance).
Overall, Algorithm 1 and Algorithm 3 are the first scalable
algorithms for Problem 1 and for Problem 2, respectively, and
(for the LQG control problem instances where a zero controller
would result in a suboptimal behavior for the system and, as
a result, for the system instances where LQG control design
is necessary to achieve a desired system performance) they
achieve close to optimal approximate performance.
V. N UMERICAL E XPERIMENTS
We consider two application scenarios for the proposed sensing-constrained LQG control framework: sensingconstrained formation control and resource-constrained robot
navigation. We present a Monte Carlo analysis for both scenarios, which demonstrates that (i) the proposed sensor selection
strategy is near-optimal, and in particular, the resulting LQGcost (tracking performance) matches the optimal selection in
all tested instances for which the optimal selection could
be computed via a brute-force approach, (ii) a more naive
selection which attempts to minimize the state estimation
covariance [11] (rather than the LQG cost) has degraded LQG
tracking performance, often comparable to a random selection,
(iii) in the considered instances, a clever selection of a small
subset of sensors can ensure an LQG cost that is close to the
one obtained by using all available sensors, hence providing an
effective alternative for control under sensing constraints [14].
A. Sensing-constrained formation control
Simulation setup. The first application scenario is illustrated in Fig. 2(a). A team of n agents (blue triangles) moves
in a 2D scenario. At time t = 1, the agents are randomly
deployed in a 10m × 10m square and their objective is to
reach a target formation shape (red stars); in the example of
Fig. 2(a) the desired formation has an hexagonal shape, while
in general for a formation of n, the desired formation is an
equilateral polygon with n vertices. Each robot is modeled as
a double-integrator, with state xi = [pi vi ]T ∈ R4 (pi is the 2D
position of agent i, while vi is its velocity), and can control
its own acceleration ui ∈ R2 ; the process noise is chosen
as a diagonal matrix W = diag [1e−2 , 1e−2 , 1e−4 , 1e−4 ] .
Each robot i is equipped with a GPS receiver, which can
measure the agent position pi with a covariance Vgps,i = 2·I2 .
Moreover, the agents are equipped with lidar sensors allowing
each agent i to measure the relative position of another agent j
with covariance Vlidar,ij = 0.1 · I2 . The agents have very
limited on-board resources, hence they can only activate a
subset of k sensors. Hence, the goal is to select the subset of
k sensors, as well as to compute the control policy that ensure
best tracking performance, as measured by the LQG objective.
For our tests, we consider two problem setups. In the first
setup, named homogeneous formation control, the LQG weigh
matrix Q is a block diagonal matrix with 4 × 4 blocks, with
each block i chosen as Qi = 0.1 · I4 ; since each 4 × 4 block
of Q weights the tracking error of a robot, in the homogeneous
case the tracking error of all agents is equally important.
In the second setup, named heterogeneous formation control,
the matrix Q is chose as above, except for one of the agents,
say robot 1, for which we choose Q1 = 10 · I4 ; this setup
models the case in which each agent has a different role or
importance, hence one weights differently the tracking error
of the agents. In both cases the matrix R is chosen to be the
identity matrix. The simulation is carried on over T time steps,
and T is also chosen as LQG horizon. Results are averaged
over 100 Monte Carlo runs: at each run we randomize the
initial estimation covariance Σ1|0 .
Compared techniques. We compare five techniques. All
techniques use an LQG-based estimator and controller, and
they only differ by the selections of the sensors used.
The first approach is the optimal sensor selection, denoted as
optimal, which attains the minimum of the cost function in
eq. (10), and that we compute by enumerating all possible
subsets; this brute-force approach is only viable when the
number of available sensors is small. The second approach
is a pseudo-random sensor selection, denoted as random∗ ,
which selects all the GPS measurements and a random subset
of the lidar measurements; note that we do not consider a
fully random selection since in practice this often leads to an
unobservable system, hence causing divergence of the LQG
cost. The third approach, denoted as logdet, selects sensors
so to minimize the average log det of the estimation covariance
over the horizon; this approach resembles [11] and is agnostic
to the control task. The fourth approach is the proposed sensor
selection strategy, described in Algorithm 2, and is denoted as
s-LQG. Finally, we also report the LQG performance when all
sensors are selected; this is clearly infeasible in practice, due to
the sensing constraints, and it is only reported for comparison
purposes. This approach is denoted as allSensors.
Results. The results of our numerical analysis are reported
in Fig. 3. When not specified otherwise, we consider a
formation of n = 4 agents, which can only use a total of
k = 6 sensors, and a control horizon T = 20. Fig. 3(a)
shows the LQG cost attained by the compared techniques for
increasing control horizon and for the homogeneous case. We
B. Resource-constrained robot navigation
Simulation setup. The second application scenario is illustrated in Fig. 2(b). An unmanned aerial robot (UAV) moves
in a 3D scenario, starting from a randomly selected initial
12
250
random*
optimal
logdet
s-LQG
allSensors
8
random*
optimal
logdet
s-LQG
allSensors
200
LQG cost
LQG cost
10
6
150
100
4
2
50
10
15
20
25
30
10
15
20
30
(b) heterogeneous
(a) homogeneous
16
300
12
10
random*
optimal
logdet
s-LQG
allSensors
250
LQG cost
random*
optimal
logdet
s-LQG
allSensors
14
LQG cost
25
horizon
horizon
200
150
8
100
6
4
50
4
5
6
7
8
9
10
4
5
6
7
8
9
10
maxNrUsedSensors
maxNrUsedSensors
(d) heterogeneous
(c) homogeneous
25
180
random*
optimal
logdet
s-LQG
allSensors
15
random*
optimal
logdet
s-LQG
allSensors
160
140
LQG cost
20
LQG cost
note that, in all tested instance, the proposed approach s-LQG
matches the optimal selection optimal, and both approaches
are relatively close to allSensors, which selects all the
2
available sensors ( n+n
2 ). On the other hand logdet leads
to worse tracking performance, and it is often close to the
pseudo-random selection random∗ . These considerations are
confirmed by the heterogeneous setup, shown in Fig. 3(b).
In this case the separation between the proposed approach
and logdet becomes even larger; the intuition here is that
the heterogeneous case rewards differently the tracking errors
at different agents, hence while logdet attempts to equally
reduce the estimation error across the formation, the proposed
approach s-LQG selects sensors in a task-oriented fashion,
since the matrices Θt for all t = 1, 2, . . . , T in the cost
function in eq. (10) incorporate the LQG weight matrices.
Fig. 3(c) shows the LQG cost attained by the compared
techniques for increasing number of selected sensors k and for
the homogeneous case. We note that for increasing number of
sensors all techniques converge to allSensors (the entire
ground set is selected). As in the previous case, the proposed
approach s-LQG matches the optimal selection optimal.
Interestingly, while the performance of logdet is in general
inferior with respect to s-LQG, when the number of selected
sensors k decreases (for k < n the problem becomes unobservable) the approach logdet performs similarly to s-LQG.
Fig. 3(d) shows the same statistics for the heterogeneous case.
We note that in this case logdet is inferior to s-LQG even
in the case with small k. Moreover, an interesting fact is that
s-LQG matches allSensors already for k = 7, meaning
that the LQG performance of the sensing-constraint setup is
indistinguishable from the one using all sensors; intuitively,
in the heterogeneous case, adding more sensors may have
marginal impact on the LQG cost (e.g., if the cost rewards
a small tracking error for robot 1, it may be of little value
to take a lidar measurement between robot 3 and 4). This
further stresses the importance of the proposed framework as a
parsimonious way to control a system with minimal resources.
Fig. 3(e) and Fig. 3(f) show the LQG cost attained by the
compared techniques for increasing number of agents, in the
homogeneous and heterogeneous case, respectively. To ensure
observability, we consider k = round (1.5n), i.e., we select a
number of sensors 50% larger than the smallest set of sensors
that can make the system observable. We note that optimal
quickly becomes intractable to compute, hence we omit values
beyond n = 4. In both figures, the main observation is that
the separation among the techniques increases with the number
of agents, since the set of available sensors quickly increases
with n. Interestingly, in the heterogeneous case s-LQG remains relatively close to allSensors, implying that for the
purpose of LQG control, using a cleverly selected small subset
of sensors still ensures excellent tracking performance.
10
120
100
80
5
0
60
40
3
5
7
nrRobots
(e) homogeneous
9
11
3
5
7
9
11
nrRobots
(f) heterogeneous
Fig. 3. LQG cost for increasing (a)-(b) control horizon T , (c)-(d) number of
selected sensors k, and (e)-(f) number of agents n. Statistics are reported for
the homogeneous formation control setup (left column), and the heterogeneous
setup (right column). Results are averaged over 100 Monte Carlo runs.
location. The objective of the UAV is to land, and more
specifically, it has to reach the position [0, 0, 0] with zero
velocity. The UAV is modeled as a double-integrator, with
state xi = [pi vi ]T ∈ R6 (pi is the 3D position of agent i,
while vi is its velocity), and can control its own acceleration
ui ∈ R3 ; the process noise is chosen as W = I6 . The UAV
is equipped with multiple sensors. It has an on-board GPS
receiver, measuring the UAV position pi with a covariance
2 · I3 , and an altimeter, measuring only the last component
of pi (altitude) with standard deviation 0.5m. Moreover, the
UAV can use a stereo camera to measure the relative position
of ℓ landmarks on the ground; for the sake of the numerical
example, we assume the location of each landmark to be
known only approximately, and we associate to each landmark
an uncertainty covariance (red ellipsoids in Fig. 2(b)), which is
randomly generated at the beginning of each run. The UAV has
limited on-board resources, hence it can only activate a subset
of k sensors. For instance, the resource-constraints may be due
to the power consumption of the GPS and the altimeter, or
may be due to computational constraints that prevent to run
multiple object-detection algorithms to detect all landmarks
2500
120
LQG cost
LQG cost / T
2450
random*
optimal
logdet
s-LQG
allSensors
110
100
2400
2350
2300
90
10
20
30
40
horizon
(a) heterogeneous
50
2250
intractable in general, we provide the first scalable algorithms
that can compute a design that is provably close to the optimal
one. While developing these algorithms, we also extend the
literature on supermodular optimization, by providing the
first efficient algorithms for the optimization of (approximately) supermodular functions subject to heterogeneous-cost
constraints, and by improving existing performance bounds.
12 Notably, our performance bounds have a clear connection to
control-theoretic quantities and are proven to be non-vanishing
under very general conditions (we prove that the suboptimality
gap is non-vanishing whenever the open loop behavior of the
system deviates from the desired closed-loop behavior, hence
encompassing most real-world control problems). Finally, we
provided illustrative examples and a numerical analysis considering problems in robotics and networked control.
This paper opens a number of avenues for future research.
First, while this paper provides an introduction to LQG sensing
and control co-design, other interesting co-design problems
exist; for instance, one may consider actuation-and-control codesign problems, or even sensing-actuation-control co-design.
Second, one may extend the LQG co-design problem to account for potential sensor failures, where some of the selected
sensors do not work as expected; to this end, one could leverage recent results on resilient submodular optimization [33].
Finally, while we currently provide bounds between our sensor
design and the optimal sensor design, we find interesting to
provide bounds that compare the LQG performance attained
when an optimal subset of sensors is used with the LQG
performance attained when all available sensors is used.
random*
optimal
logdet
s-LQG
allSensors
130
4
6
8
10
maxNrUsedSensors
(b) heterogeneous
Fig. 4. LQG cost for increasing (a) control horizon T , and (b) number of
selected sensors k. Statistics are reported for the heterogeneous setup. Results
are averaged over 100 Monte Carlo runs.
on the ground. Similarly to the previous case, we phrase the
problem as a sensing-constraint LQG problem,
and we use
Q = diag [1e−3 , 1e−3 , 10, 1e−3 , 1e−3 , 10] and R = I3 .
Note that the structure of Q reflects the fact that during
landing we are particularly interested in controlling the vertical
direction and the vertical velocity (entries with larger weight
in Q), while we are less interested in controlling accurately the
horizontal position and velocity (assuming a sufficiently large
landing site). In the following, we present results averaged
over 100 Monte Carlo runs: in each run, we randomize the
covariances describing the landmark position uncertainty.
Compared techniques. We consider the five techniques
discussed in the previous section. As in the formation control
case, the pseudo-random selection random∗ always includes
the GPS measurement (which alone ensures observability) and
a random selection of the other available sensors.
Results. The results of our numerical analysis are reported
in Fig. 4. When not specified otherwise, we consider a total of
k = 3 sensors to be selected, and a control horizon T = 20.
Fig. 4(a) shows the LQG cost attained by the compared
techniques for increasing control horizon. For visualization
purposes we plot the cost normalized by the horizon, which
makes more visible the differences among the techniques. Similarly to the formation control example, s-LQG matches the
optimal selection optimal, while logdet and random∗
have suboptimal performance.
Fig. 4(b) shows the LQG cost attained by the compared
techniques for increasing number of selected sensors k.
Clearly, all techniques converge to allSensors for increasing k, but in the regime in which few sensors are used s-LQG
still outperforms alternative sensor selection schemes, and
matches in all cases the optimal selection optimal.
VI. C ONCLUDING R EMARKS
In this paper, we introduced the LQG control and sensing co-design problem, where one has to jointly design a
suitable sensing, estimation, and control policy to steer the
behavior of a linear Gaussian systems under resource constraints. We discussed two variants of the problem, named
sensing-constrained LQG control and minimum-sensing LQG
control, which are central in modern control applications
ranging from large-scale networked systems to miniaturized
robotics networks. While the resulting co-design problems are
R EFERENCES
[1] D. P. Bertsekas, Dynamic programming and optimal control, Vol. I.
Athena Scientific, 2005.
[2] N. Elia and S. Mitter, “Stabilization of linear systems with limited
information,” IEEE Trans. on Automatic Control, vol. 46, no. 9, pp.
1384–1400, 2001.
[3] G. Nair and R. Evans, “Stabilizability of stochastic linear systems with
finite feedback data rates,” SIAM Journal on Control and Optimization,
vol. 43, no. 2, pp. 413–436, 2004.
[4] S. Tatikonda and S. Mitter, “Control under communication constraints,”
IEEE Trans. on Automatic Control, vol. 49, no. 7, pp. 1056–1068, 2004.
[5] V. Borkar and S. Mitter, “LQG control with communication constraints,”
Comm., Comp., Control, and Signal Processing, pp. 365–373, 1997.
[6] J. L. Ny and G. Pappas, “Differentially private filtering,” IEEE Trans.
on Automatic Control, vol. 59, no. 2, pp. 341–354, 2014.
[7] E. Shafieepoorfard and M. Raginsky, “Rational inattention in scalar LQG
control,” in Proceedings of the 52th IEEE Conference in Decision and
Control, 2013, pp. 5733–5739.
[8] S. Joshi and S. Boyd, “Sensor selection via convex optimization,” IEEE
Transactions on Signal Processing, vol. 57, no. 2, pp. 451–462, 2009.
[9] V. Gupta, T. H. Chung, B. Hassibi, and R. M. Murray, “On a stochastic
sensor selection algorithm with applications in sensor scheduling and
sensor coverage,” Automatica, vol. 42, no. 2, pp. 251–260, 2006.
[10] J. L. Ny, E. Feron, and M. A. Dahleh, “Scheduling continuous-time
kalman filters,” IEEE Trans. on Aut. Control, vol. 56, no. 6, pp. 1381–
1394, 2011.
[11] S. T. Jawaid and S. L. Smith, “Submodularity and greedy algorithms in
sensor scheduling for linear dynamical systems,” Automatica, vol. 61,
pp. 282–288, 2015.
[12] Y. Zhao, F. Pasqualetti, and J. Cortés, “Scheduling of control nodes
for improved network controllability,” in Proceedings of the 55th IEEE
Conference on Decision and Control, 2016, pp. 1859–1864.
[13] V. Tzoumas, A. Jadbabaie, and G. J. Pappas, “Sensor placement for
optimal Kalman filtering,” in Amer. Contr. Conf., 2016, pp. 191–196.
[14] L. Carlone and S. Karaman, “Attention and anticipation in fast visualinertial navigation,” in Proceeding of the IEEE International Conference
on Robotics and Automation, 2017, pp. 3886–3893.
[15] T. H. Summers, F. L. Cortesi, and J. Lygeros, “On submodularity and
controllability in complex dynamical networks,” IEEE Transactions on
Control of Network Systems, vol. 3, no. 1, pp. 91–101, 2016.
[16] E. Nozari, F. Pasqualetti, and J. Cortés, “Time-invariant versus timevarying actuator scheduling in complex networks,” in American Control
Conference, 2017, pp. 4995–5000.
[17] T. Summers and J. Ruths, “Performance bounds for optimal feedback
control in networks,” arXiv e-prints:1707.04528, 2017.
[18] T. Summers and M. Kamgarpour, “Performance guarantees for greedy
maximization of non-submodular set functions in systems and control,”
arXiv e-prints:1712.04122, 2017.
[19] A. F. Taha, N. Gatsis, T. Summers, and S. Nugroho, “Time-varying
sensor and actuator selection for uncertain cyber-physical systems,”
ArXiv e-prints:1708.07912, 2017.
[20] G. Nair, F. Fagnani, S. Zampieri, and R. Evans, “Feedback control under
data rate constraints: An overview,” Proceedings of the IEEE, vol. 95,
no. 1, pp. 108–137, 2007.
[21] J. Hespanha, P. Naghshtabrizi, and Y.Xu, “A survey of results in networked control systems,” Pr. of the IEEE, vol. 95, no. 1, p. 138, 2007.
[22] J. Baillieul and P. Antsaklis, “Control and communication challenges in
networked real-time systems,” Proceedings of the IEEE, vol. 95, no. 1,
pp. 9–28, 2007.
[23] T. Tanaka and H. Sandberg, “SDP-based joint sensor and controller
design for information-regularized optimal LQG control,” in IEEE 54th
Annual Conference on Decision and Control, 2015, pp. 4486–4491.
[24] T. Tanaka, P. M. Esfahani, and S. K. Mitter, “LQG control with
minimum directed information: Semidefinite programming approach,”
IEEE Trans. on Automatic Control, vol. 63, no. 1, pp. 37–52, 2018.
[25] L. A. Wolsey, “An analysis of the greedy algorithm for the submodular
set covering problem,” Combinatorica, vol. 2, no. 4, pp. 385–393, 1982.
[26] S. Khuller, A. Moss, and J. S. Naor, “The budgeted maximum coverage
problem,” Info. Processing Letters, vol. 70, no. 1, pp. 39–45, 1999.
[27] M. Sviridenko, “A note on maximizing a submodular set function subject
to a knapsack constraint,” Operations Research Letters, vol. 32, no. 1,
pp. 41–43, 2004.
[28] A. Krause and C. Guestrin, “A note on the budgeted maximization of
submodular functions,” 2005.
[29] A. A. Bian, J. M. Buhmann, A. Krause, and S. Tschiatschek, “Guarantees for greedy maximization of non-submodular functions,” in Proceedings of the 34th International Confer. on Machine Learning, 2017.
[30] V. Tzoumas, L. Carlone, G. J. Pappas, and A. Jadbabaie, “SensingConstrained LQG Control,” arXiv e-prints: 1709.08826, 2017.
[31] G. Nemhauser, L. Wolsey, and M. Fisher, “An analysis of approximations
for maximizing submodular set functions – I,” Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978.
[32] U. Feige, “A threshold of ln(n) for approximating set cover,” Journal
of the ACM, vol. 45, no. 4, pp. 634–652, 1998.
[33] V. Tzoumas, K. Gatsis, A. Jadbabaie, and G. J. Pappas, “Resilient
monotone submodular maximization,” in Proceedings of the 56th IEEE
Conference on Decision and Control, 2017.
[34] D. S. Bernstein, Matrix mathematics. Princeton University Press, 2005.
[35] D. Coppersmith and S. Winograd, “Matrix multiplication via arithmetic
progressions,” J. of Symbolic Comp., vol. 9, no. 3, pp. 251–280, 1990.
A PPENDIX A
P RELIMINARY FACTS
This appendix contains a set of lemmata that will be used
to support the proofs in this paper (Appendices B–F).
Lemma 1 ([34, Proposition 8.5.5]). Consider two positive
definite matrices A1 and A2 . If A1 A2 then A2−1 A−1
1 .
Lemma 2 (Trace inequality [34, Proposition 8.4.13]). Consider a symmetric matrix A, and a positive semi-definite matrix
B of appropriate dimension. Then,
λmin (A)tr (B) ≤ tr (AB) ≤ λmax (A)tr (B) .
Lemma 3 (Woodbury identity [34, Corollary 2.8.8]). Consider matrices A, C, U and V of appropriate dimensions, such
that A, C, and A + U CV are invertible. Then,
(A + U CV )−1 = A−1 − A−1 U (C −1 + V A−1 U )−1 V A−1.
Lemma 4 ([34, Proposition 8.5.12]). Consider two symmetric
matrices A1 and A2 , and a positive semi-definite matrix B.
If A1 A2 , then tr (A1 B) ≤ tr (A2 B).
Lemma 5 ([1, Appendix E]). For any sensor set S ⊆ V, and
for all t = 1, 2, . . . , T , let x̂t (S) be the Kalman estimator
of the state xt , i.e., x̂t (S) , E[xt |y1 (S), y2 (S), . . . , yt (S)],
and Σt|t (S) be x̂t (S)’s error covariance, i.e., Σt|t (S) ,
E[(x̂t (S) − xt )(x̂t (S) − xt )T ]. Then, Σt|t (S) is the solution
of the Kalman filtering recursion
Σt|t (S) = [Σt|t−1 (S)−1 + Ct (S)T Vt (S)−1 Ct (S)]−1,
Σt+1|t (S) = At Σt|t (S)AT
t + Wt ,
(23)
with boundary condition Σ1|0 (S) = Σ1|0 .
Lemma 6. For any sensor set S ⊆ V, let Σ1|1 (S) be defined as
in eq. (23), and consider two sensor sets S1 , S2 ⊆ V. If S1 ⊆
S2 , then Σ1|1 (S1 ) Σ1|1 (S2 ).
Proof of Lemma 6: Let D = S2 \ S1 , and observe that
for all t = 1, 2, . . . , T , the notation in Definition 1 implies
X
T
Ct (S2 )T Vt (S2 )−1 Ct (S2 ) =
Ci,t
Vi,t Ci,t
i∈S2
=
X
T
Ci,t
Vi,t Ci,t +
i∈S1
X
X
T
Ci,t
Vi,t Ci,t
i∈D
T
Ci,t
Vi,t Ci,t
i∈S1
= Ct (S1 )T Vt (S1 )−1 Ct (S1 ).
(24)
Therefore, Lemma 1 and ineq. (24) imply
T
−1
Ct (S2 )]−1
Σ1|1 (S2 ) = [Σ−1
1|0 + C1 (S2 ) Vt (S2 )
T
−1
[Σ−1
Ct (S1 )]−1 = Σ1|1 (S1 ).
1|0 + C1 (S1 ) Vt (S1 )
Lemma 7. Let Σt|t be defined as in eq. (23) with boundary
condition Σ1|0 ; similarly, let Σ̄t|t be defined as in eq. (23) with
boundary condition Σ̄1|0 . If Σt|t Σ̄t|t , then Σt+1|t Σ̄t+1|t .
Proof of Lemma 7: We complete the proof in two steps:
T
first, from Σt|t Σ̄t|t , it follows At Σt|t AT
t At Σ̄t|t At .
T
Then, from eq. (23), it its Σt+1|t = At Σt|t At + Wt
At Σ̄t|t AT
t + Wt = Σ̄t+1|t .
Lemma 8. Let Σt|t−1 be defined as in eq. (23) with boundary
condition Σ1|0 ; and, let Σ̄t|t−1 be defined as in eq. (23) with
boundary condition Σ̄1|0 . If Σt|t−1 Σ̄t|t−1 , then Σt|t Σ̄t|t .
Proof of Lemma 8: From eq. (23), it is Σt|t =
T −1
−1
T −1
−1
(Σ−1
(Σ̄−1
= Σ̄t|t ,
t|t−1 + Ct Vt Ct )
t|t−1 + Ct Vt Ct )
since Lemma 1 and the condition Σt|t−1 Σ̄t|t−1 imply
−1
T −1
T −1
Σ−1
t|t−1 + Ct Vt Ct Σ̄t|t−1 + Ct Vt Ct , which in turn
−1
T −1
−1
T −1
−1
implies (Σt|t−1 + Ct Vt Ct )
(Σ̄−1
t|t−1 + Ct Vt Ct ) .
Corollary 1. Let Σt|t be defined as in eq. (23) with boundary
condition Σ1|0 ; similarly, let Σ̄t|t be defined as in eq. (23)
with boundary condition Σ̄1|0 . If Σt|t Σ̄t|t , then Σt+i|t+i
Σ̄t+i|t+i for any positive integer i.
Proof of Corollary 1: If Σt|t Σ̄t|t , from Lemma 7
we get Σt+1|t Σ̄t+1|t , which, from Lemma 8, implies
Σt+1|t+1 Σ̄t+1|t+1 . By repeating the previous argument
another (i − 1) times, the proof is complete.
Corollary 2. Let Σt|t be defined as in eq. (23) with boundary
condition Σ1|0 ; similarly, let Σ̄t|t be defined as in eq. (23) with
boundary condition Σ̄1|0 . If Σt|t Σ̄t|t , then Σt+i|t+i−1
Σ̄t+i|t+i−1 for any positive integer i.
Proof of Corollary 2: If Σt|t Σ̄t|t , from Corollary 1,
we get Σt+i−1|t+i−1 Σ̄t+i−1|t+i−1 , which, from Lemma 7,
implies Σt+i|t+i−1 Σ̄t+i|t+i−1 .
Lemma 9. Consider positive
real numbers a, b, γ,
Pn
a1 , a2 , . . . , an such that i=1 ai = a. The function
f (a1 , a2 , . . . , an ) = 1 −
n
Y
i=1
ai
1−γ
b
achieves its minimum at a1 = a2 = . . . = an = a/n.
In particular,
aγ n
f (a/n, a/n, . . . , a/n) = 1 − 1 −
≥ 1 − e−aγ/b.
bn
Proof of Lemma 9: To find f ’s minimum we use
the method of Lagrange multipliers. In particular, the partialPderivative of φ(a1 , a2 , . . . , an ) , f (a1 , a2 , . . . , an ) +
n
λ ( i=1 ai − a), where λ is the Lagrangian multiplier, with
respect to aj is as follows:
γ Y
ai
∂φ
+ λ.
(25)
=
1−γ
∂aj
b
b
i6=j
At an f ’s minimum, the partial derivative in eq. (25) is zero
for all j, which implies that for all j:
γ Y
ai
λ=−
;
(26)
1−γ
b
b
i6=j
Since λ is constant, eq. (26) implies for any j1 and j2 that
γ Y
ai γ Y
ai
=
,
1−γ
1−γ
b
b
b
b
i6=j1
i6=j2
which in turn implies that
aj
aj
1−γ 1 =1−γ 2,
b
b
from where we conclude aj1 = aj2 (for any j1 and j2 ).
The lower bound for the minimum value of f follows from
the fact that 1 − x ≤ e−x for all real x.
Proposition 2 (Monotonicity of cost function in eq. (10)).
Consider the cost function in eq. P
(10), namely, for any
sensor
T
set S ⊆ V the set function
tr
Θ
Σ
(S)
. Then,
t
t|t
t=1
for
any
sensor
sets
such
that
S
⊆
S
⊆
V,
it
holds
1
2
PT
PT
tr
Θ
Σ
(S
)
≥
tr
Θ
Σ
(S
)
.
t
1
t
2
t|t
t|t
t=1
t=1
Proof: Lemma 6 implies Σ1|1 (S1 ) Σ1|1 (S2 ), and
then, Corollary 1 implies Σt|t (S1 ) Σt|t (S2 ). Finally, for
any t = 1, 2,. . . , T , Lemma 4 implies tr Θt Σt|t (S1 ) ≥
tr Θt Σt|t (S2 ) , since each Θt is symmetric.
A PPENDIX B
P ROOF OF T HEOREM 1
We first prove part (1) of Theorem 1 (Appendix B.1), and
then we prove part (2) of Theorem 1 (Appendix B.2).
B.1. Proof of part (1) of Theorem 1
We use the following lemma to prove Theorem 1’s part (1).
Lemma 10. For any active sensor set S ⊆ V, and any admissible control policy u1:T (S) , {u1 (S), u2 (S), . . . , uT (S)},
let h[S, u1:T (S)] be Problem 1’s cost function, i.e.,
PT
h[S, u1:T (S)] , t=1 E(kxt+1 (S)k2Qt +kut(S)k2Rt ).
Further define the following set-valued function:
g(S) , minu1:T (S) h[S, u1:T (S)].
Consider any sensor set S ⊆ V, and let u⋆1:T (S) be the vector of control policies (K1 x̂1 (S), K2 x̂2 (S), . . . , KT x̂T (S)).
Then u⋆1:T (S) is an optimal control policy:
u⋆1:T (S) ∈ arg min h[S, u1:T (S)],
(27)
u1:T (S)
i.e., g(S) = h[S, u⋆1:T (S)], and in particular, u⋆1:T (S) attains
a (sensor-dependent) LQG cost equal to:
g(S) = E(kx1 kN1 )+
T
X
tr[Θt Σt|t (S)] + tr (Wt St ) . (28)
t=1
Proof of Lemma 10: Let ht [S, ut:T (S)] be the LQG cost
in Problem 1 from time t up to time T , i.e.,
ht [S, ut:T (S)] ,
T
X
E(kxk+1 (S)k2Qt +kuk (S)k2Rt ).
k=t
and define gt (S) , minut:T (S) ht [S, ut:T (S)]. Clearly, g1 (S)
matches the LQG cost in eq. (28).
We complete the proof inductively. In particular, we first
prove Lemma 10 for t = T , and then for any other t ∈
{1, 2, . . . , T − 1}. To this end, we use the following observation: given any sensor set S, and any time t ∈ {1, 2, . . . , T },
gt (S) = min E(kxt+1 (S)k2Qt +kut (S)k2Rt ) + gt+1 (S) ,
ut (S)
(29)
with boundary condition gT +1 (S) = 0. In particular, eq. (29)
holds since
gt (S) = min E kxt+1 (S)k2Qt +kut (S)k2Rt )+
ut (S)
min
ut+1:T (S)
ht+1 [S, ut+1:T (S)]} ,
where one can easily recognize the second summand to match
the definition of gt+1 (S).
We prove Lemma 10 for t = T . From eq. (29), for t = T ,
gT (S) = minuT (S) E(kxT +1 (S)k2QT +kuT (S)k2RT )
2
= minuT (S) E(kA
T xT + BT uT (S) + wT kQT +
kuT (S)k2RT ) ,
(30)
since xT +1 (S) = AT xT + BT uT (S) + wT , as per eq. (1);
we note that for notational simplicity we drop henceforth the
dependency of xT on S since xT is independent of uT (S),
which is the variable under optimization in the optimization
problem (30). Developing eq. (30) we get:
gT (S)
= minuT (S) E(uT (S)T BTT QT BT uT (S) + wTT QT wT +
T T
T
xT
T AT QT AT xT + 2xT AT QT BT uT (S)+
T T
T
Q
w
+
2u
(S)
BT QT wT + kuT (S)k2RT )
A
2xT
T
T T T T
= minuT (S) E(uT (S)T BTT QT BT uT (S) + kwT k2QT +
T
T T
2
xT
T AT QT AT xT + 2xT AT QT BT uT (S) + kuT kRT ) ,
(31)
where the latter equality holds since wT has zero mean
and wT , xT , and uT (S) are independent. From eq. (31),
rearranging the terms, and using the notation in eq. (9),
=
=
=
=
(i)
=
=
=
(ii)
We now prove that if Lemma 10 holds for t = l + 1, it
also holds for t = l. To this end, assume eq. (29) holds for
t = l + 1. Using the notation in eq. (9),
gl (S) = minul (S) E(kxl+1 (S)k2Ql +kul (S)k2Rl ) + gl+1 (S)
= minul (S) E(kxl+1 (S)k2Ql +kul (S)k2Rl )+
PT
E(kxl+1 (S)k2Nl+1 ) + k=l+1 tr Θk Σk|k (S) +
tr (Wk Sk )]}
= minul (S) E(kxl+1 (S)k2Sl +kul (S)k2Rl )+
o
PT
k=l+1 [tr Θk Σk|k (S) + tr (Wk Sk )]
PT
= k=l+1 [tr Θk Σk|k (S) + tr (Wk Sk )]+
minul (S) E(kxl+1 (S)k2Sl +kul (S)k2Rl ).
(34)
In eq. (34), the minimization in the last summand can
be solved by following the same steps as for the proof of
Lemma 10 for t = T , leading to:
2
minul (S) E(kxl+1 (S)k2Sl +ku
l (S)kRl ) =
2
E(kxl kNl ) + tr Θl Σl|l (S) + tr (Wl Ql ) ,
(35)
and ul (S) = Kl x̂l (S). Therefore, by substituting eq. (35) back
into eq. (34), we get:
P
gT (S)
gl (S) = E(kxl k2Nl ) + Tk=l [tr Θk Σk|k (S) + tr (Wk Sk )].
T
T
minuT (S) E(uT (S) (BT QT BT + RT )uT (S)+
(36)
T
T T
kwT k2QT +xT
T AT QT AT xT + 2xT AT QT BT uT (S)
which proves that if Lemma 10 holds for t = l + 1, it also
T
minuT (S) E(kuT (S)k2MT +kwT k2QT +xT
T AT QT AT xT + holds for t = l. By induction, this also proves that Lemma 10
T T
2xT AT QT BT uT (S)
holds for l = 1, and we already observed that g1 (S) matches
T
Q
A
x
−
A
minuT (S) E(kuT (S)k2MT +kwT k2QT +xT
T
T
T
the
original LQG cost in eq. (28), hence concluding the proof.
T T
−1
T
Q
B
M
)M
u
(S)
(−A
2xT
T T
T
T T T T 2
2
T T
minuT (S) E(kuT (S)k
Proof of Theorem 1’s part (1): The proof follows
MT +kwT kQT +xT AT QT AT xT −
T
from
Lemma 10. In particular, eq. (10) is a direct conseK
M
u
(S)
2xT
T T
T T
quence
of eq. (28), since the value of Problem 1 is equal
minuT (S) E(kuT (S) − KT xT k2MT +kwT k2QT +
to
min
g(S), and both E(kx1 kN1 ) = tr Σ1|0 N1
T
T
xT
PTS⊆V,c(S)≤b
T (AT QT AT − KT MT KT )xT
and t=1 tr (Wt St ) in eq. (28) are independent of the choice
minuT (S) E(kuT (S) − KT xT k2MT +kwT k2QT +
of
the sensor set S. Finally, eq. (11) directly follows from
T
T
xT (AT QT AT − ΘT )xT
eq. (27).
2
2
2
min
E(ku (S) − K x k +kw k +kx k
T
uT (S)
= minuT (S) E(kuT (S) −
E(kxT k2NT ),
T
T MT
KT xT k2MT )
T QT
T NT
+ tr (WT QT ) +
B.1. Proof of part (2) of Theorem 1
(32)
where equality (i) follows from completion
of
squares,
and
2
T
=
equality (ii) holds
since
E(kw
k
)
=
E
tr
w
Q
w
T
T
T
Q
T
T
tr E(wTT wT )QT = tr (WT QT ). Now we note that
We use the following lemma to prove Theorem 1’s part (2).
Lemma 11. The sensor set S ⋆ and the controllers u⋆1:T are a
solution to Problem 2 if and only if they are a solution to the
optimization problem
min E(kuT (S) − KT xT k2MT )
min
uT (S)
= E(kKT x̂T (S) − KT xT k2MT )
= tr ΘT ΣT |T (S) ,
S⊆V,u1:T (S)
(37)
where
(33)
since x̂T (S) is the Kalman estimator of the state xT , i.e.,
the minimum mean square estimator of xT , which implies
that KT x̂T (S) is the minimum mean square estimator of
KT xT (S) [1, Appendix E]. Substituting (33) back into
eq. (32), we get:
gT (S) = E(kxT k2NT ) + tr ΘT ΣT |T (S) + tr (WT QT ) ,
which proves that Lemma 10 holds for t = T .
c(S), s.t. g(S) ≤ κ,
g(S) , min h [S, u1:T (S)] .
u1:T (S)
Proof of Lemma 11: We prove the lemma by contradiction. In particular, first we prove that if the sensor set S ⋆ and
the controllers u⋆1:T are a solution to Problem 2, then they are
also a solution to the problem in eq. (37); and second, we
prove that if S ⋆ and u⋆1:T are a solution to the problem in
eq. (37), then they are also a solution to Problem 2.
We prove that if the sensor set S ⋆ and the controllers u⋆1:T
are a solution to Problem 2, then they are also a solution
to the problem in eq. (37). To this end, let the sensor set
S ⋆ and the controllers u⋆1:T be a solution to Problem 2, and
assume by contradiction that they are not a solution to the
problem in eq. (37), which instead has solution Sb and u
b1:T . By
optimality of Sb and u
b1:T (and suboptimality of S ⋆ and u⋆1:T )
b < c(S ⋆ ). In addition, it also holds
in eq. (37), it follows c(S)
b
b
g(S) ≤ κ, since (S, u
b1:T ) must be feasible for
the problem
bu
in eq. (37). However, the latter implies that h S,
b1:T ≤ κ.
bu
Therefore, (S,
b1:T ) is feasible for Problem 2 and has a better
objective value with respect to the optimal solution (S ⋆ , u⋆1:T )
b < c(S ⋆ )), leading to contradiction.
(we already observed c(S)
Hence, if the sensor set S ⋆ and the controllers u⋆1:T are a
solution to Problem 2, then they are also a solution to (37).
We now prove that if the sensor set S ⋆ and the controllers
u⋆1:T are a solution to the problem in eq. (37), then they are also
a solution to Problem 2. To this end, let the sensor set S ⋆ and
the controllers u⋆1:T be a solution to the problem in eq. (37),
and assume that they are not a solution to Problem 2, which
bu
bu
instead has solution (S,
b1:T ). By optimality of (S,
b1:T ) (and
suboptimality of S ⋆ and u⋆1:T ) in Problem
2
,
it follows
⋆
b
b
c(S) < c(S ). In addition, it is h S, u
b1:T ≤ κ, since
b
(S, u
b1:T ) must be feasible for Problem 2, and, as a result,
b ≤ κ. Therefore, (S,
bu
it also holds g(S)
b1:T ) is feasible for
the problem in eq. (37) and has a better objective value with
respect to the optimal solution (S ⋆ , u⋆1:T ) (we already observed
b < c(S ⋆ )), leading to contradiction. Hence, if the sensor
c(S)
set S ⋆ and the controllers u⋆1:T are a solution to the problem
in eq. (37), then they are also a solution to Problem 2.
Proof of Theorem 1’s part (2): The proof follows from
Lemma 10 and Lemma 11. In particular, similarly to the proof
of Theorem 1’s part (1), Lemma 10, along
with eq. (28) and
the fact that E(kx1 kN1 ) = tr Σ1|0 N1 , implies that if the
sensor set S ⋆ and the controllers u⋆1:T are a solution to the
optimization problem in eq. (37), then S ⋆ and the controllers
u⋆1:T can be computed in cascade as follows:
S ⋆ ∈ arg min c(S), s.t. tr[Θt Σt|t (S)] ≤
S⊆V
T
X
tr (Wt St ) , (38)
κ − tr Σ1|0 N1 −
t=1
u⋆t = Kt x̂t (S ⋆ ),
t = 1, . . . , T.
(39)
In addition, Lemma 11 implies that (S ⋆ , u⋆1:T ) is a solution to
Problem 2. As a result, eqs. (12)-(13) hold true.
P ROOF
OF
A PPENDIX C
T HEOREM 2 AND P ROPOSITION 1
We first prove Theorem 2 (Appendix C.1), and then prove
Proposition 1 (Appendix C.2).
C.1. Proof of Theorem 2
We consider theP
following notation: for any sensor set S ⊆
V, we let f (S) , Tt=1 tr[Θt Σt|t (S)] be the cost function in
eq. (10), S ⋆ be a solution in eq. (10), and b⋆ , c(S ⋆ ), that
is, b⋆ is the cost of the sensor set S ⋆. In addition, consider
the computation of the set Sb2 in Algorithm 2 (lines 3-19),
where Sb2 refers to the set that Algorithm 2 has constructed
by the end of the line 19; we let G , Sb2 . We also let si
be the i-th element added in G during the i-th iteration of
Algorithm 2’s “while loop” (lines 3-16). Moreover, we let
Gi , {s1 , s2 , . . . , si }, that is, Gi is the subset of G constructed
during the first i iterations of Algorithm 2’s “while loop”
(lines 3-16). Finally, we consider that Algorithm 2’s “while
loop” (lines 3-16) terminates after l + 1 iterations.
There are two scenarios under which Algorithm 2’s “while
loop” (lines 3-16) terminates: (i) the trivial scenario where
V ′ = ∅, that is, where all available sensors in V can
been chosen by Algorithm 2 as active while satisfying the
budget constraint b; and (ii) the non-trivial scenario where
Algorithm 2’s “while” loop (lines 3–16) terminates because
c(Gl+1 ) > b, that is, where the addition of the sensor sl+1 in Gl
makes the sensor cost of Gl+1 violate the budget constraint b.
Henceforth, we focus on the second, non-trivial scenario,
which implies that sl+1 will be removed by the “if” statement
in Algorithm 2’s lines 17–19 and, as a result, Gl = Sb2 .
We prove Theorem 2 using the following two lemmas.
Lemma 12 (Generalization of [28, Lemma 2]). For i =
1, 2, . . . , l + 1, it holds
γf c(si )
(f (Gi−1 ) − f (S ⋆ )).
b⋆
Proof of Lemma 12: Due to the monotonicity of the cost
function f in eq. (10) (Proposition 2), it holds
f (Gi−1 ) − f (Gi ) ≥
f (Gi−1 ) − f (S ⋆ ) ≤ f (Gi−1 ) − f (S ⋆ ∪ Gi−1 )
= f (Gi−1 ) − f [(S ⋆ \ Gi−1 ) ∪ Gi−1 ].
Let {z1 , z2 , . . . , zm } , S ⋆ \ Gi−1 , and also let
dj , f (Gi−1 ∪{z1 , z2 , . . . , zj−1 })−f (Gi−1 ∪{z1 , z2 , . . . , zj }),
Pm
for j = 1, 2, . . . , m. Then, f (Gi−1 ) − f (S ⋆ ) ≤ j=1 dj .
Notice that
dj
f (Gi−1 ) − f (Gi−1 ∪ {zj })
f (Gi−1 ) − f (Gi )
≤
≤
,
c(zj )
γf c(zj )
γf c(si )
where the first inequality holds due to the Definition 5 of the
supermodularity ratio γf , and the second inequality holds due
to the greedy rule (Algorithm
2’s line 13) and the definitions
Pm
of Gi , and si . Since j=1 c(zj ) ≤ b⋆ , it holds that
f (Gi−1 ) − f (S ⋆ ) ≤
m
X
j=1
dj ≤ b⋆
f (Gi−1 ) − f (Gi )
.
γf c(si )
Lemma 13 (Adapation of [28, Lemma 3]). For i =
1, 2, . . . , l + 1, it holds
i
Y
γ
c(s
)
f
j
[f (∅) − f (S ⋆ )].
f (∅) − f (Gi ) ≥ 1 −
1−
⋆
b
j=1
Proof of Lemma 13: We complete the proof inductively.
In particular, for i = 1, we need to prove f (∅) − f (G1 ) ≥
γf c(s1 )/b⋆ [f (∅) − f (S ⋆ )], which follows from Lemma 12 for
i = 1. Then, we have for i > 1:
f (∅) − f (Gi ) = f (∅) − f (Gi−1 ) + [f (Gi−1 ) − f (Gi )]
≥ f (∅) − f (Gi−1 )+
γf c(si )
(f (Gi−1 ) − f (S ⋆ ))
⋆
b
γf c(si )
= 1−
[f (∅) − f (Gi−1 ])+
b⋆
γf c(si )
[f (∅) − f (S ⋆ )]
b⋆
i−1
Y
γf c(si )
γf c(sj )
≥ 1−
1−
1−
b⋆
b⋆
j=1
γf c(si )
[f (∅) − f (S ⋆ )] +
[f (∅) − f (S ⋆ )]
b⋆
i
Y
γf c(sj )
[f (∅) − f (S ⋆ )],
1−
= 1 −
⋆
b
j=1
where we used Lemma 12 for the first inequality and the
induction hypothesis for the second inequality.
Proof of Theorem 2’s part (1) (Algorithm 1’s approximation quality): We first prove the approximation bound
b
γg
−γg
) in ineq. (17) and, then, the bound 1−e−γg c(S)/b.
2 (1 − e
γg
−γg
)
To prove Algorithm 1’s approximation bound 2 (1 − e
Pl+1
in ineq. (17), we let b′ , j=1 c(sj ). It holds
γf c(sj )
1−
f (∅) − f (Gl+1 ) ≥ 1 −
[f (∅) − f (S ⋆ )]
⋆
b
j=1
′
⋆
≥ 1 − e−γf b /b [f (∅) − f (S ⋆ )],
≥ 1 − e−γf [f (∅) − f (S ⋆ )],
(40)
l+1
Y
where the first inequality follows from Lemma 13, the second
inequality from Lemma 9, and ineq. (40) from the fact that
′
⋆
b′ /b⋆ ≥ 1 and, as a result, e−γf b /b ≤ e−γf, that is, 1 −
′
⋆
e−γf b /b ≥ 1 − e−γf.
In addition, it is f (∅)− f (Sb1 ) ≥ γf [f (Gl )− f (Gl+1 )] due to
the Definition 5 of the supermodularity ratio and, as a result,
f (∅) − f (Sb1 ) ≥ γf [f (Gl ) − f (∅) + f (∅) − f (Gl+1 )], which
after rearranging its terms gives
γf [f (∅) − f (Gl+1 )]
≤ f (∅) − f (Sb1 ) + γf [f (∅) − f (Gl )]
n
o
≤ 2 max f (∅) − f (Sb1 ), γf [f (∅) − f (Gl )] .
(41)
By substituting ineq. (40) in ineq. (41) and rearranging the
terms we have
n
o
max f (∅) − f (Sb1 ), γf [f (∅) − f (Gl )]
γf
1 − e−γf [f (∅) − f (S ⋆ )],
≥
2
which implies the inequality
h
i
max f (∅) − f (Sb1 ), f (∅) − f (Gl )
γf
≥
1 − e−γf [f (∅) − f (S ⋆ )],
2
(42)
since γf takes values in [0, 1] by the Definition 5 of the
supermodularity ratio.
γ
Algorithm 1’s approximation bound 2g (1 − e−γg ) in
ineq. (17) follows from ineq. (42) as the combination of the
following three observations:
b2 , due to the definition of Gl , and, as a result,
• it is Gl = S
f (∅) − f (Gl ) = f (∅) − f (Sb2 ).
b such at Sb ∈
• Algorithm 2 returns the set S
arg maxS∈{Sb1 ,Sb2 } [f (∅) − f (S)] (per Algorithm 2’s
line 20) and, as a result, the previous observation, along
with ineq. (42), gives:
b ≥ γf 1 − e−γf [f (∅) − f (S ⋆ )]. (43)
f (∅) − f (S)
2
•
Finally, Lemma 10 implies that for
sets S, S ′ ⊆ V it
Pany
T
is g(S) = f (S) + E(kx1 kN1 ) + t=1 tr (Wt St ), where
PT
E(kx1 kN1 ) + t=1 tr (Wt St ) is independent of S. As a
result, for any sets S, S ′ ⊆ V it is f (S)−f (S ′ ) = g(S)−
g(S ′ ), which implies γf = γg due to the Definition 5 of
the supermodularity ratio. In addition, Lemma 10 implies
that for any S ⊆ V it is g(S) = h[S, u1:T (S)] and g ⋆ =
g(S ⋆ ). Thereby, for any S ⊆ V it is f (∅)−f (S) = g(∅)−
g(S) = h[∅, u1:T (∅)]−h[S, u1:T (S)] and f (∅)−f (S ⋆ ) =
g(∅) − g(S ⋆ ) = h[∅, u1:T (∅)] − g ⋆. Overall, ineq. (43) is
written as
b u1:T (S)]
b ≥
h[∅, u1:T (∅)] − h[S,
γf
1 − e−γf {h[∅, u1:T (∅)] − g ⋆ } ,
2
which implies the bound
γg
2
(1 − e−γg ) in ineq. (17).
b
It remains to prove the bound 1 − e−γg c(S)/b in ineq. (17).
To this end, we first have:
l
Y
γf c(sj )
[f (∅) − f (Gl )]
1−
f (∅) − f (Gl ) ≥ 1 −
b⋆
j=1
⋆
≥ 1 − e−γf c(Gl )/b [f (∅) − f (S ⋆ )],
(44)
≥ 1 − e−γf c(Gl )/b [f (∅) − f (S ⋆ )],
where the first inequality follows from Lemma 13, the second
inequality from Lemma 9, and ineq. (44) from the fact
that c(Gl )/b⋆ ≥ c(Gl )/b, since b⋆ ≤ b, which implies
⋆
′
⋆
e−γf c(Gl )/b ≤ e−γf c(Gl )/b, i.e., 1−e−γf b /b ≥ 1−e−γf c(Gl )/b.
The rest of the proof is completed using the combination of
the three observations in the previous paragraph, that we used
γ
to prove Algorithm 1’s approximation bound 2g (1 − e−γg ) in
ineq. (17).
Proof of Theorem 2’s part (2) (Algorithm 1’s running
time): We compute Algorithm 1’s running time by adding
the running times of Algorithm 1’s lines 1-5:
a) Running time of Algorithm 1’s line 1: Algorithm 1’s
line 1 needs O(T n2.4 ) time, using the Coppersmith algorithm
for both matrix inversion and multiplication [35].
b) Running time of Algorithm 1’s line 2: Algorithm 1’s
line 2 running time is the running time of Algorithm 2, whose
running time we show next to be O(|V|2 T n2.4 ). To this end,
we first compute the running time of Algorithm 2’s line 1,
and finally the running time of Algorithm 2’s lines 3–16.
Algorithm 2’s lines 3–16 are repeated at most |V|2 times, since
before the end of each iteration of the “while loop” in line 3
the added element in Sb2 (line 14) is removed from V ′ (line 15).
We now need to find the running time of Algorithm 2’s lines 4–
16; to this end, we first find the running time of Algorithm 2’s
lines 4–12, and then the running time of Algorithm 2’s line 13.
In more detail, the running time of Algorithm 2’s lines 4–12
is O(|V|T n2.4 ), since Algorithm 2’s lines 4–12 are repeated
at most |V| times and Algorithm 2’s lines 5–10, as well as,
line 11 need O(T n2.4 ) time, using the Coppersmith-Winograd
algorithm for both matrix inversion and multiplication [35].
Moreover, Algorithm 2’s line 13 needs O[|V|log(|V|)] time,
since it asks for the maximum among at most |V| values of
the gain(·) , which takes O[|V|log(|V|)] time to be found, using,
e.g., the merge sort algorithm. In sum, Algorithm 2’s running
time is upper bounded by O[|V|2 T n2.4 + |V|2 log(|V|)], which
is equal to O(|V|2 T n2.4 ).
c) Running time of Algorithm 1’s lines 3-5: Algorithm 1’s lines 3-5 need O(T n2.4 ) time, using the Coppersmith
algorithm for both matrix inversion and multiplication [35].
In sum, Algorithm 1’s running time is upper bounded by
O(|V|2 T n2.4 + 2T n2.4 ) which is equal to O(|V|2 T n2.4 ).
C.2. Proof of Proposition 1
The proof of Proposition 1 follows the same steps as the
proof of Theorem 2 and for this reason we omit it.
A PPENDIX D
P ROOF OF T HEOREM 3
We consider the following
notation: for any sensor set S ⊆
PT
V, we let f (S) ,
tr[Θ
t Σt|t (S)] be the cost function
t=1
in eq. (12), the sensor set S ⋆ be a solution to Problem 2,
and b⋆ be equal to c(S ⋆ ), that is, b⋆ is the optimal value of
Problem 2. In addition, consider the computation of the set
b We also let
Sb in Algorithm 4 (lines 3-16): we let G , S.
si be the i-th element added in G during the i-th iteration
of Algorithm 4’s “while loop” (lines 3-16). Finally, we let
Gi , {s1 , s2 , . . . , si }, that is, Gi is the subset of Sb constructed
during the first i iterations of Algorithm 4’s “while loop”
(lines 3-16).
We prove Theorem 3 using the following two lemmas.
Lemma 14 (Adaptation of Lemma 12). For i = 1, 2, . . . , |G|,
it holds
f (Gi−1 ) − f (Gi ) ≥
γf c(si )
(f (Gi−1 ) − f (S ⋆ )).
b⋆
Proof of Lemma 14: Due to the monotonicity of the cost
function f in eq. (10) (Proposition 2), it holds
f (Gi−1 ) − f (S ⋆ ) ≤ f (Gi−1 ) − f (S ⋆ ∪ Gi−1 )
= f (Gi−1 ) − f [(S ⋆ \ Gi−1 ) ∪ Gi−1 ].
Let {z1 , z2 , . . . , zm } , S ⋆ \ Gi−1 , and also let
dj , f (Gi−1 ∪{z1 , z2 , . . . , zj−1 })−f (Gi−1 ∪{z1 , z2 , . . . , zj }),
Pm
for j = 1, 2, . . . , m. Then, f (Gi−1 ) − f (S ⋆ ) ≤ j=1 dj .
Notice that
f (Gi−1 ) − f (Gi−1 ∪ {zj })
f (Gi−1 ) − f (Gi )
dj
≤
≤
,
c(zj )
γf c(zj )
γf c(si )
where the first inequality holds due to the Definition 5 of the
supermodularity ratio γf , and the second inequality holds due
to the greedy rule (Algorithm
4’s line 13) and the definitions
Pm
of Gi and si . Since j=1 c(zj ) ≤ b⋆ , it holds that
f (Gi−1 ) − f (S ⋆ ) ≤
m
X
j=1
dj ≤ b⋆
f (Gi−1 ) − f (Gi )
.
γf c(si )
Lemma 15 (Adaptation of Lemma 13). For i = 1, 2, . . . , |G|,
it holds
i
Y
γ
c(s
)
f
j
[f (∅) − f (S ⋆ )].
1−
f (∅) − f (Gi ) ≥ 1 −
⋆
b
j=1
Proof of Lemma 15: We complete the proof inductively.
In particular, for i = 1, we need to prove f (∅) − f (G1 ) ≥
γf c(s1 )/b⋆ [f (∅) − f (S ⋆ )], which follows from Lemma 14 for
i = 1. Then, we have for i > 1:
f (∅) − f (Gi ) = f (∅) − f (Gi−1 ) + [f (Gi−1 ) − f (Gi )]
≥ f (∅) − f (Gi−1 )+
γf c(si )
(f (Gi−1 ) − f (S ⋆ ))
⋆
b
γf c(si )
= 1−
[f (∅) − f (Gi−1 ])+
b⋆
γf c(si )
[f (∅) − f (S ⋆ )]
b⋆
i−1
Y
γf c(si )
γf c(sj )
≥ 1−
1−
1−
b⋆
b⋆
j=1
γf c(si )
[f (∅) − f (S ⋆ )]
[f (∅) − f (S ⋆ )] +
b⋆
i
Y
γf c(sj )
1−
= 1 −
[f (∅) − f (S ⋆ )],
⋆
b
j=1
using Lemma 14 for the first inequality and the induction
hypothesis for the second inequality.
Proof of Theorem 3’s part (1) (Algorithm 3’s approximation quality): We first observe that ineq. (19) holds since Algob u1:T (S)]
b ≤κ
rithm 3 returns the set Sb once the condition h[S,
is satisfied (Algorithm 4’s line 3).
It remains to prove ineq. (20). Let l , |G|; then, Gl = G,
by the definition of Gi , and from Lemma 13 for i = l − 1 it
holds
l−1
Y
γ
c(s
)
f
j
[f (∅) − f (S ⋆ )]
1−
f (∅) − f (Gl−1 ) ≥ 1 −
⋆
b
j=1
⋆
≥ 1 − e−γf c(Gl−1 )/b [f (∅) − f (S ⋆ )],
(45)
where ineq. (45) follows from Lemma 9. Moreover, Lemma 10
implies that forPany sensor sets S, S ′ ⊆ V it is g(S) = f (S)+
T
E(kx k ) + t=1 tr (Wt St ), where the term E(kx1 kN1 ) +
PT 1 N1
t=1 tr (Wt St ) is independent of S, and, as a result, it is
f (S) − f (S ′ ) = g(S) − g(S ′ ), which implies γf = γg .
Moreover, Lemma 10 implies for any S ⊆ V that g(S) =
h[S, u1:T (S)] and, as a result, it is f (∅) − f (Gl−1 ) =
h[∅, u1:T (∅)] − h[Gl−1 , u1:T (Gl−1 )] and f (∅) − f (S ⋆ ) =
h[∅, u1:T (∅)] − h[S ⋆, u1:T (S ⋆ )]. In sum, ineq. (45) is the same
as the inequality
h[∅, u1:T (∅)] − h[Gl−1 , u1:T (Gl−1 )] ≥
⋆
1 − e−γg c(Gl−1 )/b {h[∅, u1:T (∅)] − h[S ⋆, u1:T (S ⋆ )]} ,
⋆
which, by letting β , 1 − e−γg c(Gl−1 )/b and rearranging its
terms, is simplified to the inequality
(Algorithm 1’s running time) and for this reason we omit it.
A PPENDIX E
P ROOF OF T HEOREM 4
Proof of Theorem 4: We complete the proof by first
deriving a lower bound for the numerator of the supermodularity ratio γg , and then, by deriving an upper bound for the
denominator of the supermodularity ratio γg .
use the following notation: c , E(xT
1 N1 x1 ) +
PWe
T
tr
(W
S
),
and
for
any
sensor
set
S
⊆
V,
and time
t
t
t=1
t = 1, 2, . . . , T , ft (S) , tr Θt Σt|t (S) . Then, the cost
P
function g(S) in eq. (16) is written as g(S) = c+ Tt=1 ft (S),
due to eq. (28) in Lemma 10.
a) Lower bound for the numerator of the supermodularity ratio γg : Per the supermodularity ratio Definition 5, the
numerator of the submodularity ratio γg is of the form
T
X
[ft (S) − ft (S ∪ {v})],
(47)
t=1
for some sensor set S ⊆ V, and sensor v ∈ V; to lower bound
the sum in (47), we lower bound each ft (S) − ft (S ∪ {v}).
To this end, from eq. (23) in Lemma 5, observe
X
T
C̄i,t
C̄i,t ]−1.
Σt|t (S ∪ {v}) = [Σ−1
(S
∪
{v})
+
t|t−1
i∈S∪{v}
h[Gl−1 , u1:T (Gl−1 )] ≤ (1 − β)h[∅, u1:T (∅)] + βh[S ⋆, u1:T (S ⋆ )] Define Ω = Σ−1 (S) + PT C̄ T C̄ , and Ω̄ =
t
t
i∈S i,t i,t
t|t−1
≤ (1 − β)h[∅, u1:T (∅)] + βκ,
(46) Σ−1 (S ∪{v})+ PT C̄ T C̄ ; using the Woodbury identity
i∈S i,t i,t
t|t−1
where the second inequality holds because S ⋆ is a solution to in Lemma 3,
Problem 2 and, as result, h[S ⋆, u1:T (S ⋆ )] ≤ κ. To complete the
−
ft (S ∪ {v}) = tr Θt Ω̄−1
t
proof, we recall that Algorithm 4 returns the set G = Gl when
−1 T
T −1
.
C̄v,t Ω̄−1
tr Θt Ω̄t C̄v,t (I + C̄v,t Ω̄−1
t
t C̄v,t )
for i = l it is the first time that h[Gi , u1:T (Gi )] ≤ κ. Therefore,
h[Gl−1 , u1:T (Gl−1 )] > κ and, as a result, there exists a real Therefore, for any time t ∈ {1, 2 . . . , T },
number ǫ > 0 such that h[Gl−1 , u1:T (Gl−1 )] = (1 + ǫ)κ, and
ft (S) − ft (S ∪ {v}) =
ineq. (46) gives
+
− tr Θt Ω̄−1
tr Θt Ω−1
t
t
(1 + ǫ)κ ≤ (1 − β)h[∅, u1:T (∅)] + βκ ⇒
−1 T −1
−1 T
≥
tr Θt Ω̄t C̄v,t (I + C̄v,t Ω̄t C̄v,t ) C̄v,t Ω̄−1
t
ǫκ ≤ (1 − β)h[∅, u1:T (∅)] − (1 − β)κ ⇒
−1
−1 T −1
−1 T
(48)
tr Θt Ω̄t C̄v,t (I + C̄v,t Ω̄t C̄v,t ) C̄v,t Ω̄t ,
ǫκ ≤ (1 − β){h[∅, u1:T (∅)] − κ} ⇒
⋆
where ineq. (48) holds because tr Θt Ω−1
≥ tr Θt Ω̄−1
ǫκ ≤ e−γg c(Gl−1 )/b {h[∅, u1:T (∅)] − κ} ⇒
t
t .
In particular, the inequality tr Θt Ω−1
≥ tr Θt Ω̄−1
t
t
ǫκ
log
≤ −γg c(Gl−1 )/b⋆ ⇒
is implied as follows: Lemma 6 implies Σ1|1 (S)
h[∅, u1:T (∅)] − κ
Σ1|1 (S ∪ {v}). Then, Corollary 2 implies Σt|t−1 (S)
1
h[∅, u1:T (∅)] − κ ⋆
Σt|t−1 (S ∪ {v}), and as a result, Lemma 1 implies
c(Gl−1 ) ≤
b ⇒
log
γg
ǫκ
Σt|t−1 (S)−1 Σt|t−1 (S ∪ {v})−1. Now, Σt|t−1 (S)−1
1
h[∅, u1:T (∅)] − κ ⋆
Σt|t−1 (S ∪ {v})−1 and the definition of Ωt and of Ω̄t
c(G) ≤ c(sl ) +
b,
log
γg
ǫκ
imply Ωt Ω̄t . Next, Lemma 1 implies Ω−1
Ω̄t−1.
t
As a result, since also Θt is a symmetric
matrix, Lem
where the latter holds since G = Gl−1 ∪ {sl }, due to
ma 4 gives the desired inequality tr Θt Ω−1
≥ tr Θt Ω̄−1
.
t
t
the definitions of G, Gl−1 , and sl , and since c(G) =
Continuing from the ineq. (48),
c(Gl−1 ) + c(sl ). Finally, since the definition of ǫ implies
b
ǫκ = h[Gl−1 , u1:T (Gl−1 )]−κ, and the definition of G is G = S,
ft (S) − ft (S ∪ {v}) ≥
the proof of ineq. (19) is complete.
−1 T −1
−1 T
≥
tr C̄v,t Ω̄−1
t Θt Ω̄t C̄v,t (I + C̄v,t Ω̄t C̄v,t )
Proof of Theorem 3’s part (2) (Algorithm 3’s running
−1 T
−1
−1 T −1
λmin ((I + C̄v,t Ω̄t C̄v,t ) )tr C̄v,t Ω̄t Θt Ω̄t C̄v,t , (49)
time): The proof is similar to the proof of Theorem 2’s part (2)
where ineq. (49) holds due to Lemma 2. From ineq. (49),
ft (S) − ft (S ∪ {v}) ≥
−1 T
−1
−1 T
= λ−1
max (I + C̄v,t Ω̄t C̄v,t )tr C̄v,t Ω̄t Θt Ω̄t C̄v,t
≥
=
λ−1
max (I
−1
λmax (I
+
+
T
C̄v,t Σt|t (∅)C̄v,t
)tr
T
C̄v,t Σt|t (∅)C̄v,t )tr
T
C̄v,t Ω̄t−1 Θt Ω̄t−1 C̄v,t
T
C̄v,t Ω̄t−1 ,
Θt Ω̄t−1 C̄v,t
(50)
where we used Ω̄−1
Σt|t (∅), which holds because of the
t
−1
following: the definition of Ω̄t implies Ω̄t Σt|t−1
(S ∪ {v}),
−1
and as a result, from Lemma 1 we get Ω̄t Σt|t−1 (S ∪{v}).
In addition, Corollary 2 and the fact that Σ1|1 (S ∪ {v})
Σ1|1 (∅), which holds due to Lemma 6, imply Σt|t−1 (S ∪
{v}) Σt|t−1 (∅). Finally, from eq. (23) in Lemma 5 it is
Σt|t−1 (∅) = Σt|t (∅). Overall, the desired inequality Ω̄−1
t
Σt|t (∅) holds.
Consider a time t′ ∈ {1, 2 . . . , T } such that for any time
−1
−1
−1 T
T
t ∈ {1, 2, . . . , T } it is Ω̄−1
t′ C̄v,t′ C̄v,t′ Ω̄t′ Ω̄t C̄v,t C̄v,t Ω̄t ,
−1 T
−1
and let Φ be the matrix Ω̄t′ C̄v,t′ C̄v,t′ Ω̄t′ ; similarly, let l be
T
the mint∈{1,2...,T },v∈V λ−1
max (I + C̄v,t Σt|t (∅)C̄v,t ). Summing
ineq. (50) across all times t ∈ {1, 2 . . . , T }, and using
Lemmata 4 and 2,
g(S) − g(S ∪ {v}) ≥ l
T
X
−1
T
tr Θt Ω̄−1
t C̄v,t C̄v,t Ω̄t
t=1
≥l
T
X
= ltr Φ
≥ lλmin
T
X
Θt
t=1
T
X
Θt
tr (Φ)
PT
which is non-zero because t=1 Θt ≻ 0 and Φ is a non-zero
positive semi-definite matrix.
Finally, we lower bound tr (Φ), using Lemma 2:
−1
T
tr (Φ) = tr Ω̄−1
t′ C̄v,t′ C̄v,t′ Ω̄t′
T
= tr Ω̄−2
t′ C̄v,t′ C̄v,t′
≥
=
≥
t=1
for some sensor set S ′ ⊆ V, and sensor v ∈ V; to upper bound
it, from eq. (23) in Lemma 5 of Appendix A, observe
X
T
′
C̄i,t
C̄i,t ]−1,
Σt|t (S ′ ∪ {v}) = [Σ−1
(S
∪
{v})
+
t|t−1
i∈S ′ ∪{v}
PT
′
T
and let Ht = Σ−1
i∈S ′ C̄i,t C̄i,t , and H̄t =
t|t−1 (S ) +
P
T
−1
T
C̄i,t ; using the Woodbury idenΣt|t−1 (S ′ ∪ {v}) + i∈S ′ C̄i,t
tity in Lemma 3,
ft (S ′ ∪ {v}) = tr Θt H̄t−1 −
T −1
T
) C̄v,t H̄t−1 .
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
Therefore,
T
X
T
λmin (Ω̄−2
t′ )tr C̄v,t′ C̄v,t′
T
λ2min (Ω̄−1
t′ )tr C̄v,t′ C̄v,t′
T
λ2min (Σt′ |t′ (V))tr C̄v,t
′ C̄v,t′ ,
[ft (S ′ ) − ft (S ′ ∪ {v})] =
t=1
T
X
T
X
!
[ft (S ′ ) − ft (S ′ ∪ {v})],
[tr Θt Ht−1 − tr Θt H̄t−1 +
T −1
T
) C̄v,t H̄t−1 ] ≤
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
!
t=1
T
X
t=1
tr (Θt Φ)
t=1
> 0,
b) Upper bound for the denominator of the supermodularity ratio γg : The denominator of the submodularity ratio γg
is of the form
(51)
where ineq. (51) holds because Ω̄−1
t′ Σt′ |t′ (V). In particular,
the inequality Ω̄−1
t′ Σt′ |t′ (S ∪ {v}) is derived by applying
T
T
C̄v,t
= Σt−1
Lemma 1 to the inequality Ω̄t′ Ω̄t′ + C̄v,t
′ |t′ (S ∪
{v}), where the equality holds by the definition of Ω̄t′ . In addition, due to Lemma 6 it is Σ1|1 (S ∪ {v}) Σ1|1 (V), and as
a result, from Corollary 1 it also is Σt′ |t′ (S ∪{v}) Σt′ |t′ (V).
Overall, the desired inequality Ω̄t−1
Σt′ |t′ (V) holds.
′
[tr Θt Ht−1 +
t=1
T −1
T
(52)
) C̄v,t H̄t−1 ],
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
where ineq. (52) holds since tr Θt H̄t−1 is non-negative. In
eq. (52), the second term in the sum is upper bounded as
follows, using Lemma 2:
T −1
T
) C̄v,t H̄t−1 =
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
T −1
T
≤
)
(I + C̄v,t H̄t−1 C̄v,t
tr C̄v,t H̄t−1 Θt H̄t−1 C̄v,t
−1 T −1
−1 T
−1
tr C̄v,t H̄t Θt H̄t C̄v,t λmax [(I + C̄v,t H̄t C̄v,t ) ] =
−1
T
T
)≤
λmin (I + C̄v,t H̄t−1 C̄v,t
tr C̄v,t H̄t−1 Θt H̄t−1 C̄v,t
−1
−1 T
−1
T
), (53)
tr C̄v,t H̄t Θt H̄t C̄v,t λmin (I + C̄v,t Σt|t (V)C̄v,t
T
T
) ≥ λmin (I + C̄v,t Σt|t (V)C̄v,t
),
since λmin (I + C̄v,t H̄t−1 C̄v,t
−1
−1
because H̄t Σt|t (V). In particular, the inequality H̄t
T
Σt|t (V) is derived as follows: first, it is H̄t H̄t + C̄v,t
C̄v,t =
′
−1
Σt|t (S ∪ {v}) , where the equality holds by the definition of
H̄t , and now Lemma 1 implies H̄t−1 Σt|t (S ′ ∪ {v}). In addition, Σt|t (S ′ ∪ {v}) Σt|t (V) is implied from Corollary 1,
since Lemma 6 implies Σ1|1 (S ′ ∪ {v}) Σ1|1 (V). Overall,
the desired inequality H̄t−1 Σt|t (V) holds.
T
Let l′ = maxt∈{1,2...,T },v∈V λ−1
min (I + C̄v,t Σt|t (V)C̄v,t ).
From ineqs. (52) and (53),
PT
[ft (S ′ ) − ft (S ′ ∪ {v})] ≤
Pt=1
(54)
T
−1
T
C̄v,t H̄t−1 ].
+ l′ tr Θt H̄t−1 C̄v,t
t=1 [tr Θt Ht
Consider times t′ ∈ {1, 2 . . . , T } and t′′ ∈ {1, 2 . . . , T } such
that for any time t ∈ {1, 2, . . . , T }, it is Ht−1
Ht−1 and
′
−1 T
−1
−1
−1 T
H̄t′′ C̄v,t′′ C̄v,t′′ H̄t′′ H̄t C̄v,t C̄v,t H̄t , and let Ξ = Ht−1
′
−1
T
and Φ′ = H̄t−1
′ C̄v,t′ C̄v,t′ H̄t′ . From ineq. (54), and Lemma 4,
T
X
t=1
T
X
[ft (S ′ ) − ft (S ′ ∪ {v})] ≤
since xt+1 = At xt = At At−1 xt−1 = . . . = At At−1 · · · A1 x1
when all u1 , u2 , . . . , uT are zero.
From eqs. (59) and (60), the inequality
[tr (Θt Ξ) + l′ tr (Θt Φ′ )] ≤
t=1
tr Ξ
T
X
Θt
t=1
!
′
+ l tr Φ
′
T
X
Θt
t=1
T
X
(tr (Ξ) + l′ tr (Φ′ ))λmax (
!
≤
T
xT
1 N1 x1 < x1
(55)
Finally, we upper bound tr (Ξ)+l tr (Φ′ ) in ineq. (55), using
Lemma 2:
T
≤
l′ λ2max (H̄t−1
′′ )tr C̄v,t′′ C̄v,t′′
T
tr Σt′ |t′ (∅) + l′ λ2max (Σt′′ |t′′ (∅))tr C̄v,t
′′ C̄v,t′′ ,
holds for any non-zero x1 if and only if
N1 ≺
(57)
A PPENDIX F
P ROOF OF T HEOREM 5
For the proof of Theorem 5, we use Lemmata 16-19 below.
Lemma 16 (System-level condition for near-optimal co-design). Let N1 be defined as in eq. (9). The control policy
u◦1:T , (0, 0, . . . , 0) is suboptimal for the LQG problem in
eq. (22) for all non-zero initial conditions x1 if and only if
PT
T
T
(58)
t=1 A1 · · · At Qt At · · · A1 ≻ N1 .
Proof of Lemma 16: For any initial condition x1 , eq. (28)
in Lemma 10 implies for the noiseless perfect state information
LQG problem in eq. (22):
t=1
T
AT
1 · · · At Qt At At−1 · · · A1 .
Θt = AT
t St At + Qt−1 − St−1 .
(56)
where ineq. (57) holds because
Σt′ |t′ (∅), and similarly, H̄t−1
Σt′′ |t′′ (∅). In particular, the inequality Ht−1
′′
′
Σt′ |t′ (∅) is implied as follows: first, by the definition of Ht′ ,
it is Ht−1
= Σt′ |t′ (S ′ ); and finally, Corollary 1 and the fact
′
that Σ1|1 (S ′ ) Σ1|1 (∅), which holds due to Lemma 6, imply
Σt′ |t′ (S ′ ) Σt′ |t′ (∅). In addition, the inequality H̄t−1
′′
Σt′′ |t′′ (∅) is implied as follows: first, by the definition of H̄t′′ ,
′
it is H̄t′′ Σ−1
t′′ |t′′ −1 (S ∪ {v}), and as a result, Lemma 1
−1
implies H̄t′′ Σt′′ |t′′ −1 (S ′ ∪ {v}). Moreover, Corollary 2
and the fact that Σ1|1 (S ∪ {v}) Σ1|1 (∅), which holds due to
Lemma 6, imply Σt′′ |t′′ −1 (S ′ ∪ {v}) Σt′′ |t′′ −1 (∅). Finally,
from eq. (23) in Lemma 5 it is Σt′′ |t′′ −1 (∅) = Σt′′ |t′′ (∅).
Overall, the desired inequality H̄t−1
′′ Σt′′ |t′′ (∅) holds.
u1:T
T
X
t=1
Proof of Lemma 17: Using the Woobury identity in
Lemma 3, and the notation in eq. (9),
−1
Nt = AT
+ Bt Rt−1 BtT )−1 At
t (St
Ht−1
′
T
X
T
T
AT
1 A2 · · · At Qt At At−1 · · · A1 x1
Lemma 17. For any t = 1, 2, . . . , T ,
tr (Ξ) + l′ tr (Φ′ ) ≤
tr Ht−1
+
′
min
T
X
t=1
Θt ).
t=1
′
since E(kx1 k2N1 ) = xT
1 N1 x1 , because x1 is known (Σ1|1 = 0),
and Σt|t and Wt are zero. In addition, for u1:T = (0, 0, . . . , 0),
the objective function in the noiseless perfect state information
LQG problem in eq. (22) is
PT
2
2
t=1 [kxt+1 kQt +kut (xt )kRt ] Σt|t =Wt =0
PT
(60)
= t=1 xT
Qx
PT t+1 T t Tt+1 T
= xT
Q
A
A
·
·
·
A
x
,
·
·
·
A
A
A
t t t−1
1 1
t
1
t=1 1 2
[kxt+1 k2Qt +kut (xt )k2Rt ]
Σt|t =Wt =0
= xT
1 N1 x1 ,
(59)
−1 T
= AT
t (St − St Bt Mt Bt St )At
= AT
t St At − Θt .
The latter, gives Θt = AT
t St At −Nt . In addition, from eq. (9),
−Nt = Qt−1 − St−1 , since St = Qt + Nt+1 .
P
T
T
Lemma 18. Tt=1 AT
1 A2 · · · At Qt At At−1 · · · A1 ≻ N1 if
and only if
T
X
T
T
AT
1 A2 · · · At−1 Θt At−1 At−2 · · · A1 ≻ 0.
t=1
Proof of Lemma 18: For i = t − 1, t − 2, . . . , 1, we preand post-multiply the identity in Lemma 17 with AT
i and Ai ,
respectively:
Θt = AT
t St At + Qt−1 − St−1 ⇒
T
T
T
AT
t−1 Θt At−1 = At−1 At St At At−1 + At−1 Qt−1 At−1 −
T
At−1 St−1 At−1 ⇒
T
T
T
AT
t−1 Θt At−1 = At−1 At St At At−1 + At−1 Qt−1 At−1 −
Θt−1 + Qt−2 − St−2 ⇒
T
T
Θt−1 + AT
t−1 Θt At−1 = At−1 At St At At−1 +
T
At−1 Qt−1 At−1 + Qt−2 − St−2 ⇒
... ⇒
T
T
Θ2 + AT
2 Θ3 A2 + . . . + A2 · · · At−1 Θt At−1 · · · A2 =
T
T
T
A2 · · · At St At · · · A2 + A2 · · · AT
t−1 Qt−1 At−1 · · · A2 +
. . . + AT
2 Q2 A2 + Q1 − S1 ⇒
T
T
Θ1 + AT
1 Θ2 A1 + . . . + A1 · · · At−1 Θt At−1 · · · A1 =
T
T
T
A1 · · · At St At · · · A1 + A1 · · · AT
t−1 Qt−1 At−1 · · · A1 +
. . . + AT
Q1 A1 − N1 ⇒
1
PT
AT · · · AT
t−1 Θt At−1 · · · A1 =
t=1
PT1
T
T
A
·
t=1 1 · · At Qt At · · · A1 − N1 .
(61)
The last equality in eq. (61) implies Lemma 18.
Lemma 19.
for any t = 1, 2, . . . , T that At is
PConsider
T
T T
T
A
A
invertible.
t=1 1 2 · · · At−1 Θt At−1 At−2 · · · A1 ≻ 0 if
and only if
T
X
Θt ≻ 0.
t=1
Proof of Lemma 19: Let Ut = At−1 At−2 · · · A1 .
We Pfirst prove that for any non-zero vector z, if
T
T T
T
it is
t=1 A1 A2 · · · At−1 Θt At−1 At−2 · · · A1 ≻ 0, then
PT
T
t=1 z Θt z > 0. In particular, since Ut is invertible, —
because for any t ∈ {1, 2, . . . , T }, At is,—
PT
PT
T
T −⊤ T
Ut Θt Ut Ut−1 z
t=1 z Θt z = Pt=1 z Ut
(62)
T
T T
= t=1 tr φt φt Ut Θt Ut ,
where we let φt = Ut−1 z. Consider a time t′ such that for any
T
time t ∈ {1, 2 . . . , T }, φt′ φT
t′ φt φt . From eq. (62), using
Lemmata 4 and 2,
T
X
z T Θt z ≥
t=1
T
X
T
tr φt′ φT
t′ Ut Θt Ut
t=1
≥ tr
φt′ φT
t′
T
X
UtT Θt Ut
t=1
!
T
X
λ
(
UtT Θt Ut )
≥ tr φt′ φT
′
min
t
t=1
T
X
UtT Θt Ut )
= kφt′ k22 λmin (
t=1
> 0.
finally provePthat for any non-zero vector z, if
PWe
T
T
T
T
Θ
t=1 zA1 · · · At−1 Θt At−1 · · · A1 z ≻ 0.
t=1 t ≻ 0, then
In particular,
T
X
t=1
z T UtT Θt Ut z =
T
X
t=1
tr ξtT Θt ξt ,
(63)
where we let ξt = Ut z. Consider time t′ such that for any
time t ∈ {1, 2 . . . , T }, ξt′ ξtT′ ξt ξtT . From eq. (62), using
Lemmata 4 and 2,
!
T
T
X
X
T
T
Θt
tr ξt Θt ξt ≥ tr ξt′ ξt′
t=1
t=1
T
X
Θt )
≥ tr ξt′ ξtT′ λmin (
t=1
T
X
Θt )
= kξt′ k22 λmin (
t=1
> 0.
Proof of Theorem 5: Theorem 5 follows from the
sequential application of Lemmata 16, 18, and 19.
| 3cs.SY
|
arXiv:1711.10761v1 [cs.NE] 29 Nov 2017
Transfer Learning with Binary Neural Networks
Sam Leroux • Steven Bohez • Tim Verbelen • Bert Vankeirsbilck
Pieter Simoens • Bart Dhoedt
Ghent University - imec, IDLab, Department of Information Technology
Ghent University
Ghent, Belgium
[email protected]
Abstract
Previous work has shown that it is possible to train deep neural networks with
low precision weights and activations. In the extreme case it is even possible to
constrain the network to binary values. The costly floating point multiplications are
then reduced to fast logical operations. High end smart phones such as Google’s
Pixel 2 and Apple’s iPhone X are already equipped with specialised hardware for
image processing and it is very likely that other future consumer hardware will also
have dedicated accelerators for deep neural networks. Binary neural networks are
attractive in this case because the logical operations are very fast and efficient when
implemented in hardware. We propose a transfer learning based architecture where
we first train a binary network on Imagenet and then retrain part of the network
for different tasks while keeping most of the network fixed. The fixed binary part
could be implemented in a hardware accelerator while the last layers of the network
are evaluated in software. We show that a single binary neural network trained on
the Imagenet dataset can indeed be used as a feature extractor for other datasets.
1
Introduction
Deep learning really took off in 2012 when Krizhevsky et al. showed record breaking results on the
Imagenet dataset [1]. They demonstrated that deep convolutional neural networks trained end to
end on large labelled datasets can beat most other techniques for image recognition. Deep learning
quickly became the default algorithm for image classification and now even achieves super-human
level performance [2]. Deep learning has also revolutionized other fields like speech recognition and
natural language processing [3].
The two key ingredients needed to successfully apply deep neural networks are large amounts of
labelled training data and powerful computing systems such as GPUs. Mobile devices including
smartphones, Internet-of-Things (IoT) devices or smart home assistants have very limited processing
power because of their intrinsic limitations on size and energy consumption. One possible solution is
to offload all computations to the cloud but this introduces a latency and potentially even a privacy
risk when sensitive data is processed remotely.
There is a considerable amount of active research on techniques to reduce the computational cost of deep learning models. One approach is to prune the network by removing redundant
weights. The idea of pruning already goes back to the eighties when LeCun et al. used second order
derivatives to calculate the impact of each weight on the loss of the network [4]. Weights with a small
impact are then removed from the network. More recently pruning was used on modern deep neural
networks. Song et al. proposed a pruning pipeline where first weights with a small magnitude where
removed after which the network was fine-tuned to recover the lost accuracy [5]. Network pruning is
31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. Machine
Learning on the Phone and other Consumer Devices workshop
especially effective when a network is used for transfer learning. In transfer learning the model is first
trained on a large dataset such as Imagenet and is then fine-tuned on a small domain specific dataset.
Because the network was pretrained on a general dataset it will contain convolutional kernels that
are not useful for the domain specific dataset. Molchanov et al. introduced a criterion based on a
first-order Taylor expansion to decide which feature maps to remove and demonstrated impressive
results when used together with transfer learning [6].
Instead of compressing a trained model it is also possible to train efficient models from
scratch. The recently introduced MobileNets [7] use depthwise separable convolutions to reduce
the computational cost. Depthwise separable convolutions factorize a standard convolution into a
depthwise convolution and a 1x1 pointwise convolution. The depthwise convolution applies a single
convolution to each input channel while the pointwise convolution combines the information in the
different channels. Factorizing a traditional convolution into these two convolutions dramatically
reduces the computational cost and size of the network with only a minimal reduction in accuracy.
Most implementations of deep neural networks use 32 bit floating point numbers for weights and
activations. Various works have shown that this is not necessary and that it is possible to use 16 bit
[8] or 8 bit [9] numbers. In the extreme case it is even possible to use binary weights and activations.
Courbariaux et al. successfully trained convolutional neural networks for image recognition with
binary weights and activations [10]. This works surprisingly well for small scale datasets such as
CIFAR10 but there is still a large drop in accuracy for larger datasets such as Imagenet. Neural
networks with binary weights and activations are attractive because they replace the costly floating
point multiplications and additions with bitwise XNORs and left and right bit shifts. These operations
are very efficient to implement in hardware.
Another problem with deep learning is the need for large labelled datasets. Training a new
model from scratch requires a large amount of training data. A well known technique is to use
transfer learning where a model is first trained on a large dataset like Imagenet and afterwards the last
layer is removed and retrained using a small amount of new domain specific training data. Transfer
learning works because the first layers in the network learn to detect features such as color transitions
and basic shapes that are present in images from different domains [11].
2
A hybrid hardware-software architecture
We propose a hybrid hardware-software architecture based on this idea of transfer learning. We train
a neural network with binary weights and activations on the Imagenet dataset and use this network as
a fixed feature extractor that could be optimised on hardware level. The last layer is implemented
in software and is evaluated on the CPU (or GPU) of the device. Most of the computations are
offloaded to the custom circuit. Since we only need to retrain the last layer of the network it even
becomes feasible to train on the device itself instead of offloading the training to the cloud. This is
very attractive from a privacy point of view because the training data never leaves the mobile device.
Our architecture also allows app developers to embed custom neural networks into their apps. Right
now this is often impossible because a typical neural network quickly requires hundreds of megabytes
of storage just for the weights. If the device however is equipped with the fixed feature extractor we
only need to ship the last (domain specific) layer of the network with the app. A schematic overview
of our architecture is shown in Figure 1.
0
0.5
1
0
1
-0.1
0
Software
0.2
1
1
Hardware
0.9
1
Figure 1: Schematic overview of our proposed architecture. Most layers of a binary neural network
trained on Imagenet are embedded in a specialised circuit in hardware. This circuit is used as a fixed
feature extractor. The last layer is implemented in software and retrained for different applications.
2
3
Experiments
In this section we show that it is possible to use a binary neural network trained on Imagenet as a
feature extractor for other datasets. We trained a binary version of the Alexnet architecture [1] on
the ILSVRC2012 training set following the binarization technique of Courbariaux et al. [10]. Our
binary network obtains a top 5 accuracy of 67% (42% top 1) while the floating point Alexnet obtains
a top 5 accuracy of 80% (57% top 1). We then retrained the last layer on the domain specific datasets
without changing the weights of the other layers. We report results for the three fine-grained image
datasets summarized in Table 1. For all our models we resized the input images such that the longest
side was of length 256. During training we took random 224 by 224 pixel crops. For the test set we
used center crops. The floating point networks where trained with stochastic gradient descent with
momentum. For the binary networks we found that Adam [12] gives better results which is consistent
with Courbariaux et al. [10].
Table 1: The different datasets used in our experiments. We pretrained our network on the Imagenet
dataset and then retrained the last layer on the three smaller domain specific datasets.
Dataset
Number of classes
Training images
Testing images
ILSVRC2012
1000
1,200,000
50,000
Flowers [13]
UCSD Birds [14]
MIT Indoor scenes [15]
102
200
67
6,149
5,994
5.360
1,020
5,794
1,340
The results are summarized in Table 2. The first part of the table shows the accuracies for the baseline
floating point networks, either trained from scratch on the domain specific datasets or fine-tuned from
the Imagenet model. As expected the fine-tuned models consistently outperform the models trained
from scratch. The second part of the table shows the results for our binary models. The fine-tuned
models again outperform the models trained from scratch which shows that transfer learning also
works when the network uses binary weights and activations. For the last layer we can use binary
weights and activations (a) but because this layer is evaluated in software in our proposed architecture
we also experimented with floating point weights and activations (b). This consistently increases the
accuracy on all datasets and pushes the accuracy closer to the accuracy of the floating point models.
Table 2: The top 1 and top 5 accuracies for each domain specific dataset. We report results for the
binary network trained from scratch and for the fine-tuned networks, both with binary weights in the
last layer (a) and floating point weights (b). We compare to a floating point baseline.
4
Flowers
Top 1
Top 5
Birds
Top 1
Top 5
Indoor scenes
Top 1
Top 5
FP
trained from scratch
fine-tuned
71.7%
85.4%
90.5%
97.2%
32.4%
50.4%
57.2%
79.6%
29.7%
57.4%
56.4%
86.8%
Binary
trained from scratch
(a) fine-tuned binary last layer
(b) fine-tuned FP last layer
63.2%
80.6%
84.0%
85.1%
94.5%
95.5%
13.8%
33.9%
36.7%
32.4%
62.9%
63.4%
29.0%
46.7%
48.3%
54.9%
77.4%
78.6%
Conclusion and future work
We introduced a hybrid hardware-software architecture where a binary neural network trained on
Imagenet can be embedded in a dedicated circuit. The last layer is implemented in software and is
retrained for each specific task. We showed that transfer learning works very well for binary neural
networks and experimented with a hybrid binary-floating point network where only the last layer uses
floating point operations. This is a good trade-off between accuracy and computational cost since
most of the computations can be offloaded to the fixed hardware accelerator. In future work we will
explore other hybrid architectures. We now only considered finetuning the last layer of the network
but we can also retrain more than one layer which should give a higher accuracy but will also incur a
higher computational cost since a larger part of the network is evaluated in software.
3
Acknowledgments
We gratefully acknowledge the support of NVIDIA Corporation with the donation of GPU hardware
used for this research. Steven Bohez is funded by a Ph.D. grant of the Agency for Innovation by
Science and Technology in Flanders (IWT).
References
[1] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep
convolutional neural networks. In Advances in neural information processing systems, pages
1097–1105, 2012.
[2] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers:
Surpassing human-level performance on imagenet classification. CoRR, abs/1502.01852, 2015.
[3] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–444,
2015.
[4] Yann LeCun, John S. Denker, and Sara A. Solla. Optimal brain damage. In D. S. Touretzky, editor, Advances in Neural Information Processing Systems 2, pages 598–605. Morgan-Kaufmann,
1990.
[5] Song Han, Jeff Pool, John Tran, and William Dally. Learning both weights and connections
for efficient neural network. In Advances in Neural Information Processing Systems, pages
1135–1143, 2015.
[6] Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. Pruning convolutional
neural networks for resource efficient transfer learning. arXiv preprint arXiv:1611.06440, 2016.
[7] Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias
Weyand, Marco Andreetto, and Hartwig Adam. Mobilenets: Efficient convolutional neural
networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017.
[8] Paulius Micikevicius, Sharan Narang, Jonah Alben, Gregory Diamos, Erich Elsen, David Garcia,
Boris Ginsburg, Michael Houston, Oleksii Kuchaev, Ganesh Venkatesh, et al. Mixed precision
training. arXiv preprint arXiv:1710.03740, 2017.
[9] Vincent Vanhoucke, Andrew Senior, and Mark Z Mao. Improving the speed of neural networks
on cpus. In Proc. Deep Learning and Unsupervised Feature Learning NIPS Workshop, volume 1,
page 4, 2011.
[10] Matthieu Courbariaux, Itay Hubara, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. Binarized
neural networks: Training deep neural networks with weights and activations constrained to+ 1
or-1. arXiv preprint arXiv:1602.02830, 2016.
[11] Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. How transferable are features in
deep neural networks? In Advances in neural information processing systems, pages 3320–3328,
2014.
[12] Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint
arXiv:1412.6980, 2014.
[13] M-E. Nilsback and A. Zisserman. Automated flower classification over a large number of
classes. In Proceedings of the Indian Conference on Computer Vision, Graphics and Image
Processing, Dec 2008.
[14] P. Welinder, S. Branson, T. Mita, C. Wah, F. Schroff, S. Belongie, and P. Perona. Caltech-UCSD
Birds 200. Technical Report CNS-TR-2010-001, California Institute of Technology, 2010.
[15] Ariadna Quattoni and Antonio Torralba. Recognizing indoor scenes. In Computer Vision and
Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages 413–420. IEEE, 2009.
4
| 1cs.CV
|
QUANTILE GRAPHICAL MODELS: PREDICTION AND CONDITIONAL
INDEPENDENCE WITH APPLICATIONS TO SYSTEMIC RISK
arXiv:1607.00286v2 [math.ST] 5 Dec 2017
ALEXANDRE BELLONI∗ , MINGLI CHEN‡ , AND VICTOR CHERNOZHUKOV†
Abstract. The understanding of co-movements, dependence, and influence between variables of interest is
key in many applications. Broadly speaking such understanding can lead to better predictions and decision
making in many settings. We propose Quantile Graphical Models (QGMs) to characterize prediction and
conditional independence relationships within a set of random variables of interest. Although those models
are of interest in a variety of applications, we draw our motivation and contribute to the financial risk
management literature. Importantly, the proposed framework is intended to be applied to non-Gaussian
settings, which are ubiquitous in many real applications, and to handle a large number of variables and
conditioning events.
We propose two distinct QGMs. First, Condition Independence Quantile Graphical Models (CIQGMs)
characterize conditional independence at each quantile index revealing the distributional dependence structure. Second, Prediction Quantile Graphical Models (PQGMs) characterize the best linear predictor under
asymmetric loss functions. A key difference between those models is the (non-vanishing) misspecification
between the best linear predictor and the conditional quantile functions.
We also propose estimators for those QGMs. Due to high-dimensionality, the two distinct QGMs require
different estimators. The estimators are based on high-dimensional techniques including (a continuum of)
`1 -penalized quantile regressions (and low biased equations), which allow us to handle the potential large
number of variables. We build upon a recent literature to obtain new results for valid choice of the penalty
parameters, rates of convergence, and confidence regions that are simultaneously valid.
We illustrate how to use QGMs to quantify tail interdependence (instead of mean dependence) between
a large set of variables which is relevant in applications concerning with extreme events. We show that
the associated tail risk network can be used for measuring systemic risk contributions. We also apply the
framework to study international financial contagion and the impact of market downside movement on the
dependence structure of assets’ returns.
Key words: High-dimensional approximately sparse model, tail risk network, conditional independence,
nonlinear correlation, penalized quantile regression, systemic risk, financial contagion, downside movement
Date: First version: November 2012, this version December 6, 2017.
We would like to thank Don Andrews, Debopam Bhattacharya, Peter Bickel, Marianne Bitler, Peter Bühlmann, Colin
Cameron, Xu Cheng, Valentina Corradi, Alan Crawford, Francis Diebold, Iván Fernández-Val, Bulat Gafarov, Kenji Fukumizu,
Dalia Ghanem, Bryan Graham, Jiaying Gu, Ran Gu, Jungbin Hwang, Cheng Hsiao, Hidehiko Ichimura, Michael Jansson,
Oscar Jorda, Chihwa Kao, Kengo Kato, Shakeeb Khan, Roger Koenker, Chenlei Leng, Arthur Lewbel, Michael Leung, Song Liu,
Whitney Newey, Dong Hwan Oh, David Pacini, Andrew Patton, Aureo de Paula, Victor de la Pena, Elisabeth Perlman, Stephen
Portnoy, Demian Pouzo, James Powell, Geert Ridder, Stephen Ross, Shu Shen, Senay Sokullu, Sami Stouli, Aleksey Tetenov,
Takuya Ura, Tiemen Woutersen, Zhijie Xiao, Wenkai Xu, and Yanos Zylberberg for comments and discussions. We would
also like to thank the seminar and workshop participants from Boston College, 2015 Warwick Summer Workshop, 11th World
Congress of the Econometric Society, 2017 UCL Workshop on the Theory of Big Data, 2017 California Econometrics Conference,
University of Bristol, University of Connecticut, Humboldt University Berlin, the Institute of Statistical Mathematics, USC,
UC Berkeley, UC Davis, Warwick Statistics Department and University of Tokyo.
∗ Duke University, e-mail:[email protected].
‡ University of Warwick, e-mail:[email protected].
† Massachusetts Institute of Technology, e-mail:[email protected].
1
2
1. Introduction
The understanding of co-movements, dependence and influence between variables of interest is key in
many applications. Such understanding can lead to better predictions and decision making in many settings.
This is clearly of interest in financial management settings where quantifying risk is crucial. For example,
the dependence between stock returns plays a key role in hedging strategies. Those hedging decisions are
typically focused on the tail of the distribution of returns rather than the mean. Moreover, such strategies
aiming to reduce risk are critical precisely during market downside movement. Therefore, it is also instructive
to understand how the dependence (and policies) would change as the downside movement of the market
becomes more extreme. Moreover, recent empirical evidence [7, 6, 66] points to non-Gaussianity of the
distribution of stock returns, especially during market downturns. These issues require models that allow for
non-Gaussian settings and can also accommodate various conditioning events (e.g., downside movements).
Motivated by those features, this work proposes Quantile Graphical Models (QGMs) to characterize (and
visualize) the dependence structure of a set of random variables. The proposed framework allows us to
understand prediction and conditional independence between those variables. Moreover, it also enables us
to focus on specific parts of the distributions of those variables such as tail events. Such understanding
plays an important role in applications like financial contagion and measuring systemic risk contributions
where extreme events are the main interests for regulators. Our techniques are intended to be applicable to
high-dimensional settings where the total number of variables (or additional conditioning variables) is large
– possibly larger than the sample size.
QGMs provide an alternative route to learn conditional independence and prediction under asymmetric
loss functions which is appealing in non-Gaussian settings. In the Gaussian setting, those notions essentially
coincide; however, in non-Gaussian settings different estimation approaches are needed. Conditional independence hinges on the equivalence between conditional probabilities and conditional quantiles. Prediction
under asymmetric loss function hinges on the solution of a quantile regression with non-vanishing misspecification (M -estimation problem). Although we build upon the quantile regression literature ([50, 18]), we
derive new results for penalized quantile regression in high dimensional settings to handle misspecification,
many controls and a continuum of additional conditioning events.
Conditional independence has a long history in statistical models with consequences towards parameter
identification, causal inference, prediction sufficiency, and many others, see [32]. Conditional Independence
Quantile Graphical Models (CIQGMs) aim to characterize conditional independence via the conditional
quantile functions. In such models we consider a flexible specification that can approximate well the conditional quantile functions (up to a vanishing approximation error). In turn, this allows to detect which
variables have a strong or near zero impact on others which can then be used to provide guidance on
conditional independence.
Prediction Quantile Graphical Models (PQGMs) focus on prediction of a variable based on the other
variables (a reduced form relation). An important motivation for proposing PQGMs is to allow for misspecification as the conditional quantile function is typically non-linear in non-Gaussian settings but a linear
specification is widely used in practice. Misspecification in quantile regression models was first properly
justified by [8] in which it was shown that we can recover a suitable “best approximation” for the conditional
quantile function. We directly characterize the good prediction properties under asymmetric loss functions
QUANTILE GRAPHICAL MODELS
3
which is appealing in empirical applications. Other papers investigated the impact of misspecification on
the specification of the quantile function are [8], [49], [55] and [1]. Nonetheless, this work seems to be the
first to accommodate non-vanishing misspecification for high-dimensional quantile regression.
Broadly speaking QGMs enhance our understanding of statistical dependence among the components of a
d-dimensional random vector XV , where the set V contains the labels of the components. QGMs will provide
a way to visualize such dependence via graphs where nodes represent components of XV and edges represent
conditional relationships (as in Gaussian Graphical Models, see below). Given that for each specific quantile
index τ we will obtain one such graph, we could have a graph process indexed by τ ∈ (0, 1). The structure
represented by the τ -quantile graph represents a local relation and can be valuable in applications where
the tail interdependence (corresponding to high or low quantile index) might be of special interest. This is
akin to the contrast between quantile regression and linear regression, where the latter provides information
only on the conditional mean, while the former can provide a more complete description of the distribution
of the outcome.
The graph process induced by QGMs has several important features. First, a τ -quantile graph enables
different values of edge strength in different directions. This is important because for undirected networks,
the distinction between exposure and contribution is unclear. Second, QGMs are able to capture the tail interdependence through estimating at a high or low quantile index. Third, QGMs can capture the asymmetric
dependence structure at different quantiles, which can be particularly useful in empirical applications (e.g.,
stock market dependence, exchange rate dependence). By considering all the quantiles at once we can characterize conditional independence structure for a set of variables which are not jointly Gaussian distributed,
i.e. the case where the covariance matrix cannot characterize conditional independence completely.
A key feature of our work is it provides estimation procedures to learn QGMs from the data observed. The
estimators are geared to cover high-dimensional settings where the size of the model is large relative to the
sample size. Those estimators are based on `1 -penalized quantile regression and low biased equations. For
CIQGMs, under mild regularity conditions, we provide rates of convergence and edge properties of the estimated graph that hold uniformly over a large class of data generating processes. We provide simultaneously
valid confidence regions (post-selection) for the coefficients of the CIQGM that are uniformly valid, despite of
possible model selection mistakes. Furthermore, based on proper thresholding, recovery of the QGMs pattern
is possible when coefficients are well separated from zero which parallel the results for graph recovery in the
Gaussian case based on the estimation of the precision matrix. 1 For PQGMs, we provide an estimator that
achieves an adaptive rate of convergence which might differ under different conditioning events. Therefore
we contribute to the recent literature on simultaneous valid confidence regions post-model selection that has
been an active research area in econometrics [10, 17, 16, 41, 23, 28] and statistics [71, 80, 19, 18, 45, 64, 74];
in particular, the penalty choices and theoretical results are uniformly valid and adaptive to the relevant
conditioning events.
QGMs can play important roles in applications where tail events are relevant. For example, with certain
rescaling of the edge weights, we are able to capture the importance of each node or measure its systemic risk
contribution. In parallel with [5], many approaches for measuring systemic risk fit naturally into QGMs. For
1Similar to graph recovery in the Gaussian case such exact recovery is subject to the lack of uniformity validity critiques of
Leeb and Pötscher [56].
4
BELLONI, CHEN, AND CHERNOZHUKOV
b|a
example, one can view ∆CoV aRτ , a measure of the impact of institution a on institution b, as the weight
of an edge of a τ -quantile graph. Then, the systemic risk contribution of institution a, equals to the sum
P
sys|a
b|a
of coefficients over b ∈ V , i.e. ∆CoV aRτ
= b∈V ∆CoV aRτ . Similarly, the summation over a ∈ V
measures exposures of individual institution to systemic shocks from the network. QGMs can also be used
to study contagion and network spillover effects since it is useful for characterizing tail risk spillovers. We
apply QGM to the study of international financial contagion in volatilities, specializing in learning the risk
transmission channels, see [30] for an overview of international financial contagions. After learning the risk
transmission channels, we can use our new network-cooperated ∆CoV aR to measure the contribution and
exposure of each country to the whole market.
Our work is complementary to a large body of works that study a set of jointly Gaussian distributed
random variables. Gaussian Graphical Model (GGM) provides a graphical model representation of those
variables. It is well known that conditional independence structure is completely characterized by the support
of the precision matrix (i.e. the inverse of the covariance matrix) of the random variables of interest, hence
recovering the structure of an undirected Gaussian graph is equivalent to recovering the support of the
precision matrix, [33, 53, 31, 38]. Methods work with the precision matrix (or covariance matrix) using
hypothesis testing can be find in [38, 35, 36, 37]. Recently, due to the advance of regularization techniques,
high-dimensional GGMs have been extensively studied in the statistical and machine learning literature:
[62] propose neighborhood selection, i.e. using LASSO for each node in the graph and combine the results
column-by-column; [79, 9, 43] penalize the log-likelihood function hence work with the precision matrix
directly; other refined estimators including [78, 22, 60, 69, 59, 29]. [58] extended the result to a more
general class of models called nonparanormal models or semiparametric Gaussian copula models, i.e., the
variables have a multivariate Gaussian distribution after a set of unknown monotone transformations (see
also [57, 76, 77]). However, those methods assume the (transformed) random vectors follows a joint Gaussian
distribution. In addition, they characterize the conditional mean predictability by linear combinations of the
other variables.
Our work also contributes to a growing literature that rely on quantile based models to characterize
the data generating process. [81] considers a globally adaptive quantile regression model, establishes oracle
properties and improved rates of convergence for the high-dimensional case. Screening procedures based
on moment conditions motivated by the quantile models have been proposed and analyzed in [44] and [75]
in the high-dimensional case. [46] considers tail dependence defined via conditional probabilities in a low
dimensional setting. Several other quantile based models have been proposed, see e.g. [50]. Among the
contributions of this work is to consider a high-dimensional setting and propose techniques that can be
robust to small coefficients (i.e. allowing for model selection mistakes), non-vanishing misspecification in the
conditional quantile function, and uniformly valid over additional conditioning events.
The rest of the paper is organized as follows. Section 2 lays out the foundation of QGMs. Section 3
contains estimators for QGMs while Section 4 contains the theoretical guarantees of the estimators. Section
5 provides empirical applications of QGMs to measure systemic risk contribution and to hedging conditional
on the downside movements of the US stock market. Finally, the appendix contains proofs, simulations and
implementation details of the estimators.
QUANTILE GRAPHICAL MODELS
5
Notation. For an integer k, we let [k] := {1, . . . , k} denote the set of integers from 1 to k. For a random
variable X we denote by X its support. We use the notation a ∨ b = max{a, b} and a ∧ b = min{a, b}. We
use kvkp to denote the p-norm of a vector v. We denote the `0 -“norm” by k · k0 (i.e., the number of nonzero
components). Given a vector δ ∈ Rp , and a set of indices T ⊂ {1, ..., d}, we denote by δT the vector in
Pn
which δT j = δj if j ∈ T , δT j = 0 if j ∈
/ T . We use En to abbreviate the notation n−1 i=1 ; for example,
Pn
En [f ] := En [f (ωi )] := n−1 i=1 f (ωi ).
2. Quantile Graphical Models
In this section we describe quantile graphical models associated with a d-dimensional random vector XV
where the set V = [d] = {1, . . . , d} denotes the labels of the components. These models aim to provide
a description of the dependence between the random variables in XV . In particular, these models induce
graphs that allow for visualizing dependence structures. Nonetheless, because of the non-Gaussianity, we
consider two fundamentally distinct models (one geared towards conditional independence and one geared
towards prediction).
2.1. Conditional Independence Quantile Graphical Models. Conditional independence graphs have
been used to provide visualization and insight on the dependence structure between random variables. Each
node of the graph is associated with a component of XV . We denote the conditional independence graph as
GI = (V, E I ) where GI is an undirected graph with vertex set V and edge set E I which is represented by an
I
I
adjacency matrix (Ea,b
= 1 if the edge (a, b) ∈ GI , and Ea,b
= 0 otherwise). An edge (a, b) is not contained
in the graph if and only if
Xa ⊥ Xb | XV \{a,b} ,
(2.1)
namely Xb and Xa are independent conditional on all remaining variables XV \{a,b} = {Xk ; k ∈ V \{a, b}}.
Comment 2.1 (Conditional Independence Under Gaussianity). In the case that XV is jointly Gaussian
distributed, XV ∼ N (0, Σ) with Σ as the covariance matrix of XV , the conditional independence structure
between two components is determined by the inverse of the covariance matrix, i.e. the precision matrix
Θ = Σ−1 . It follows that the nonzero elements in the precision matrix corresponds to the nonzero coefficients
of the associated (high dimensional) mean regression. The family of Gaussian distributions with this property
is known as a Gauss-Markov random field with respect to the graph G. This observation has motivated a
large literature [53] and interesting extensions that allow for transformations of Gaussian variables [58, 57].
In order to achieve a tractable concept for non-Gaussian settings, we use that (2.1) occurs if and only if
FXa (·|XV \{a} ) = FXa (·|XV \{a,b} ) for all XV \{a} ∈ XV \{a} .
(2.2)
In turn, by the equivalence between conditional probabilities and conditional quantiles to characterize a
random variable, we have that (2.1) occurs if and only if
QXa (τ |XV \{a} ) = QXa (τ |XV \{a,b} )
for all τ ∈ (0, 1), and XV \{a} ∈ XV \{a} .
(2.3)
For a quantile index τ ∈ (0, 1), the τ -quantile conditional independence graph is a directed graph GI (τ ) =
(V, E I (τ )) with vertex set V and edge set E I (τ ). An edge (a, b) is not contained in the edge set E I (τ ) if
6
BELLONI, CHEN, AND CHERNOZHUKOV
and only if
QXa (τ |XV \{a} ) = QXa (τ |XV \{a,b} ) for all XV \{a} ∈ XV \{a} .
(2.4)
By the equivalence between (2.2) and (2.3), the union of τ -quantile graphs over τ ∈ (0, 1) represents the
conditional independence structure of X, namely E I = ∪τ ∈(0,1) E I (τ ). We also consider a relaxation of (2.1).
For a set of quantile indices T ⊂ (0, 1), we say that
Xa ⊥T Xb | XV \{a,b} ,
(2.5)
Xa and Xb are T -conditionally independent given XV \{a,b} , if (2.4) holds for all τ ∈ T . Thus, we have that
(2.1) implies (2.5).We define the T -quantile graph as GI (T ) = (V, E I (T )) where
E I (T ) = ∪τ ∈T E I (τ ).
Although the conditional independence concept relates to all quantile indices, the quantile characterization
described above also lends itself to quantile specific impacts which can be of independent interest.2
Comment 2.2 (Simulation and Conditional Independence). Although not pursued in this work, the tools
developed here can also be used to develop simulation tools for high-dimensional random vectors. Specifically,
we can simulate a random vector X as follows
X1 ∼ QX1 (U1 ), X2 ∼ QX2 (U2 | X1 ), X3 ∼ QX3 (U3 | X1 , X2 ), . . . , Xd ∼ QXd (Ud | X1 , . . . , Xd−1 )
where Uj ∼ Uniform(0, 1), for all j ∈ [d] and estimates of the conditional quantiles can be obtained based on
a sample (Xi ∈ Rd )ni=1 and the tools discussed here. It is clear that the order of the procedure can impact
the estimation. In particular, if most variables are independent of (say) Xd , skipping them from the process
are likely to increase the accuracy of the simulation procedure.
2.2. Prediction Quantile Graphical Models. Prediction Quantile Graphical Models (PQGMs) are motivated by prediction accuracy under an asymmetric loss function (instead of conditional independence as in
Section 2.1). More precisely, for each a ∈ V , we are interested in predicting Xa based on linear combinations
of the remaining variables, XV \{a} , where accuracy is measured with respect to an asymmetric loss function.
Formally, PQGMs measure accuracy as
0
La (τ | V \{a}) = min E[ρτ (Xa − X−a
β)]
(2.6)
β
where X−a = (1, XV0 \{a} )0 , and the asymmetric loss function ρτ (t) = (τ − 1{t 6 0})t is the check function
used in [51].
Importantly, PQGMs are concerned with the best linear predictor under the asymmetric loss function
ρτ which is a specification that is widely used in practice. This is a fundamental distinction with respect
to CIQGMs discussed in Section 2.1 where the specification of the conditional quantile was approximately
a linear function of transformations of XV \{a} .3 Indeed, we note that under suitable conditions the linear
predictor that solves the minimization problem in (2.6) approximates the conditional quantile regression as
shown in [15]. (In fact, the conditional quantile function would be linear if XV was jointly Gaussian distributed.) However, PQGMs do not assume that the conditional quantile function of Xa is well approximated
by a linear function and instead it focuses on the best linear predictor.
2For example, we might be interested in some extreme events which typically correspond to crises in financial systems.
3In Section 2.1 the vector Z a in equation (3.10) collects the functions of the vector X
.
V \{a}
QUANTILE GRAPHICAL MODELS
7
We define that Xb is predictively uninformative for Xa given XV \{a,b} if
La (τ | V \{a}) = La (τ | V \{a, b})
for all τ ∈ (0, 1),
i.e., considering a linear function of Xb will not improve our performance of predicting Xa with respect to
the asymmetric loss function ρτ .
Again we can visualize the predictive relationship through a graph process indexed by τ ∈ (0, 1). That is,
for each τ ∈ (0, 1) we have a directed graph GP (τ ) = (V, E P (τ )), where an edge (a, b) ∈ GP (τ ) only if Xb is
predictively informative for Xa given XV \{a,b} at the quantile τ . Finally, it is also convenient to define the
PQGM associated with a subset T ⊂ (0, 1) as GP (T ) = (V, E P (T )) where
E P (T ) = ∪τ ∈T E P (τ ).
2.3. W-Conditional Quantile Graphical Models. In what follows, we discuss an extension of the QGMs
discussed in Sections 2.1 and 2.2 to allows for conditioning on a (possible infinity) family of events $ ∈ W.4
Such extension is motivated by several applications in which the interdependence between the random
variables in XV maybe substantially impacted by additional observable events (e.g. downside movements of
the market). This general framework allows different forms of conditioning. The main implication of this
extension is that QGMs are now graph processes indexed by τ ∈ T ⊂ (0, 1) and $ ∈ W.
We define Xa and Xb are (T , $)-conditionally independent,
Xa ⊥T Xb | XV \{a,b} , $
(2.7)
QXa (τ |XV \{a} , $) = QXa (τ |XV \{a,b} , $).
(2.8)
if for all τ ∈ T we have
The conditional independence edge set associated with (τ, $) is defined analogously as before. We denote
them by E I (τ, $) and E I (T , $) = ∪τ ∈T E I (τ, $) for each $ ∈ W.
The extension of PQGMs proceeds by defining the accuracy under the asymmetric loss function conditionally on $. More precisely, we define
0
La (τ |V \{a}, $) = min E[ρτ (Xa − X−a
β) | $].
β
(2.9)
The prediction edge set associated with (τ, $) is also defined analogously as before. We denote them by
E P (τ, $) and E P (T , $) = ∪τ ∈T E P (τ, $), for each $ ∈ W.
Example 1 (PQGMs for Stock Returns Under Market Downside Movements). Hedging decisions rely on the
dependence of various stocks returns. Moreover, hedging is even more relevant during market downside movements, which motivates us to understand interdependence conditional on those events. We can parameterize
the downside movements by using a random variable M , which could be the market index, and conditional
on the event Ω$ = {M 6 $}. This allows us to define a $-conditional-CIQGM as GI (τ, $) = (V, E I (τ, $))
and a $-conditional-PQGM as GP (τ, $) = (V, E P (τ, $)), for each $ ∈ W.
4With a slight abuse of notation, we let $ to denote the event and also the index of such event. For example, we write P($)
as a shorthand for P(W ∈ Ω$ ).
8
BELLONI, CHEN, AND CHERNOZHUKOV
3. Estimators for High-Dimensional Quantile Graphical Models
In this section, we propose and discuss estimators for QGMs introduced in Section 2. Throughout it is
assumed that we observe a d-dimensional i.i.d. random vector XV , namely {XiV : i = 1, . . . , n}. Based on
the data observed, unless additional assumptions are imposed we cannot estimate the quantities of interest
for all τ ∈ (0, 1). Instead, in what follows we will consider a (compact) set of quantile index T ⊂ (0, 1). The
estimators are intended to handle high dimensional models and a continuum of conditioning events in W.
3.1. Estimators for CIQGMs. We discuss the specification and propose an estimator for CIQGMs. Although in general it is potentially hard to correctly specify coherent models, the following are simple examples.
Example 2 (Gaussian). Consider the Gaussian case, XV ∼ N (µ, Σ). It follows that for each a ∈ V , the
conditional distribution Xa | XV \{a} satisfies
X (Σ−1 )aj
1
Xa | XV \{a} ∼ N µa −
(Xj − µj ), −1 .
(Σ−1 )aa
(Σ )aa
j∈V \{a}
Therefore the conditional quantile function of Xa is linear in XV \{a} and is given by
QXa (τ |XV \{a} ) =
Φ−1 (τ )
1/2
(Σ−1 )aa
X
+ µa −
j∈V \{a}
(Σ−1 )aj
(Xj − µj ).
(Σ−1 )aa
Example 3 (Mixture of Gaussians). Similar to the prior example, consider the case XV | $ ∼ N (µ$ , Σ$ )
for each $ ∈ W. It follows that for a ∈ V , the conditional distribution satisfies
X (Σ−1 )$aj
1
.
Xa | XV \{a} , $ ∼ N µ$a −
(Xj − µ$j ), −1
(Σ−1 )$aa
(Σ )$aa
j∈V \{a}
Again the conditional quantile function of Xa is linear in XV \{a} and is given by
QXa (τ |XV \{a} , $) =
Φ−1 (τ )
1/2
(Σ−1 )$aa
X
+ µ$a −
j∈V \{a}
(Σ−1 )$aj
(Xj − µ$j ).
(Σ−1 )$aa
Example 4 (Monotone Transformations). Consider the Gaussian case, for each a ∈ V , Xa = ha (Ya ) and
YV ∼ N (µ, Σ). It follows that for each a ∈ V , the conditional quantile function satisfies
−1
X (Σ−1 )aj
Φ
(τ
)
QXa (τ |XV \{a} ) = ha
+ µa −
(h−1 (Xj ) − µj ) .
1/2
(Σ−1 )aa j
(Σ−1 )aa
j∈V \{a}
In particular, if (ha : a ∈ V ) are monotone polynomials, the expression above is a sum of monomials with
fractional and integer exponents.
Example 5 (Multiplicative Error Model). Consider d = 2 so that V = {1, 2}. Assume that X2 and ε are
independent positive random variables. Assume further that they relate to X1 as
X1 = α + εX2 .
In this case, we have that the conditional quantile functions are linear and given by
QX1 (τ |X2 ) = α + Fε−1 (τ )X2
and QX2 (τ |X1 ) = (X1 − α)/Fε−1 (1 − τ ).
QUANTILE GRAPHICAL MODELS
9
Example 6 (Additive Error Model). Consider d = 2 so that V = {1, 2}. Let X2 ∼ U (0, 1) and ε ∼ U (0, 1)
be independent random variables. Also define the random variable X1 as
X1 = α + βX2 + ε.
It follows that QX1 (τ |X2 ) = α + βX2 + τ . However, if β = 0, we have QX2 (τ |X1 ) = τ , and for β > 0, direct
calculations yield that
(
τ
β (X1 − α), if X1 6 α + β
QX2 (τ |X1 ) =
τ + (1 − τ )(X1 − α − β), if X1 > α + β
where we note that X1 ∈ [α, 1 + α + β].
Although a linear specification is correct for Examples 2 and 5, Example 6 illustrates that we need
to consider a more general transformation of the covariates XV in the specification for each conditional
quantile function. Nonetheless, specifications with additional non-linear terms can approximate non-drastic
departures from normality.
We will consider a conditional quantile representation for each a ∈ V . It is based on transformations of
the original covariates XV \{a} that create a p-dimensional random vector Z a = Z a (XV \{a} ) such that
QXa (τ |XV \{a} ) = Z a βaτ + raτ , βaτ ∈ Rp , for all τ ∈ T ,
(3.10)
where raτ denotes a small approximation error. For b ∈ V \{a} we let Ia (b) := {j : Zja depends on Xb }.
That is, Ia (b) contains the components of Z a that are functions of Xb . Under correct specification, if Xa
and Xb are conditionally independent, we have βaτ j = 0 for all j ∈ Ia (b), τ ∈ (0, 1).
This allows us to connect the conditional independence quantile graph estimation problem with model
selection with quantile regression. Indeed, the representation (3.10) has been used in several quantile regression models, see [50]. Under mild conditions this model allows us to identify the process (βaτ )τ ∈T as the
solution of the following moment equation
E[(τ − 1{Xa 6 Z a βaτ + raτ })Z a ] = 0.
(3.11)
In order to allow for a flexible specification, so that the approximation errors are negligible, it is attractive
to consider a high-dimensional Z a where its dimension p is possibly larger than the sample size n. In turn,
having a large number of technical controls creates an estimation challenge if the number of coefficients p
is not negligible with respect to the sample size n. In such a high dimensional setting, a widely applicable
condition that makes estimation possible is approximate sparsity [40, 10, 17]. Formally we require
p
2
max sup kβaτ k0 6 s, max sup {E[raτ
]}1/2 . s/n, and max sup |E[faτ raτ Z a ]| = o(n−1/2 ), (3.12)
a∈V τ ∈T
a∈V τ ∈T
a∈V τ ∈T
where the sparsity parameter s of the model is allowed to grow (at a slower rate) as n grows, and faτ =
fXa |XV \{a} (QXa (τ |XV \{a} )|XV \{a} ) denotes the conditional density function evaluated at the corresponding
conditional quantile value. This sparsity also has implications on the maximum degree of the associated
quantile graph.
Algorithm 3.1 below contains our proposal to estimate βaτ , a ∈ V , τ ∈ T . It is based on three procedures
in order to overcome high-dimensionality. In the first step, we apply a (post-)`1 -penalized quantile regression.
The second step applies (post-)Lasso where the data is weighted by the conditional density function at the
10
BELLONI, CHEN, AND CHERNOZHUKOV
conditional quantile.5 Finally, the third step relies on constructing (orthogonal) score function that provides
immunity to (unavoidable) model selection mistakes.
There are several parameters that need to be specified for Algorithm 3.1. The penalty parameter λV T is
chosen to be larger than the `∞ -norm of the (rescaled) score at the true quantile function. The work in [11]
exploits the fact that this quantity is pivotal in their setting. Here, additional correlation structure would
have an impact and the distribution is pivotal only for each a ∈ V . The penalty is based on the maximum
of the quantiles of the following random variables (each with pivotal distribution), for a ∈ V
ΛaT = sup max
τ ∈T j∈[p]
|En [(1{U 6 τ } − τ )Zja ]|
p
Z
τ (1 − τ )b
σaj
(3.13)
Z
where {Ui : i = 1, . . . , n} are i.i.d. uniform (0, 1) random variables, and σ
baj
= {En [(Zja )2 ]}1/2 for j ∈ [p].
The penalty parameter λV T is defined as
λV T := max ΛaT (1 − ξ/|V | | Z a ),
a∈V
that is, the maximum of the 1−ξ/|V | conditional quantile of ΛaT given in (3.13). Regarding the penalty term
for the weighted Lasso in Step 2, we recommend a (theoretically valid) iterative choice. We refer to Appendix
P Z
A for the implementation details of the algorithm. We denote kβk1,bσZ := j σ
baj |βj | the standardized version
of the `1 -norm.
Algorithm 3.1. (CIQGM Estimator.) For each a ∈ V , τ ∈ T , and j ∈ [p]
p
Step 1. Compute βbaτ from k · k1,bσZ -penalized τ -quantile regression of Xa on Z a with penalty λV T τ (1 − τ ).
p
Z
σak
}.
Compute βeaτ from τ -quantile regression of Xa on {Zka : |βbaτ k | > λV T τ (1 − τ )/b
j
a
Step 2. Compute γ
eaτ
from the post-Lasso estimator of faτ Zja on faτ Z−j
.
a
a
a
a
j
) and for
Step 3. Construct the score function ψbi (α) = (τ − 1{Xia 6 Zij
α + Zi,−j
βeaτ,−j })fiaτ (Zij
− Zi,−j
γ
eaτ
2
2
b
b
Laτ j (α) = |En [ψi (α)]| /En [ψi (α)], set β̌aτ j ∈ arg minα∈Aaτ j Laτ j (α).
Algorithm 3.1 above has been studied in [18] where it is applied to a single triple (a, τ, j), and we have used
Z
the following parameter space for α, Aaτ j = {α ∈ R : |α − βeaτ j | 6 10/{b
σaj
log n}}. Under similar conditions,
results that hold uniformly over (a, τ, j) ∈ V × T × [p] are achievable (as shown in the next sections) building
upon the tools developed in [11] and [25]. Algorithm 3.1 is tailored to achieve good rates of convergence in
the `∞ -norm. In particular, under standard regularity conditions, with probability approaching to 1 we have
r
log(p|V |n)
sup kβaτ − β̌aτ k∞ .
.
n
τ ∈T
In order to create an estimate of E I (τ ) = {(a, b) ∈ V × V : maxj∈Ia (b) |βaτ j | > 0}, we define
b I (τ ) = (a, b) ∈ V × V : max |β̌aτ j | > cv
E
j∈Ia (b) se(β̌aτ j )
2
−1 1/2
a
a
j
where se(β̌aτ j ) = {τ (1 − τ )En [e
viaτ
}
with ṽiaτ j = fbiaτ {Zij
− Zi,−j
γ̃aτ
}, is an estimate of the standard
j]
deviation of the estimator, and the critical value cv is set to account for the uniformity over a ∈ V , τ ∈ T ,
and j ∈ [p]. We discuss in the following sections a data driven procedure based on multiplier bootstrap that
is theoretically valid in this high dimensional setting.
5We note that an estimate for f
aτ is available from `1 -penalized quantile regression estimators for τ + h and τ − h where h
is a bandwidth parameter, see [50, 18] and Comment 3.2.
QUANTILE GRAPHICAL MODELS
11
Comment 3.1 (Stepdown Procedure for cv). Setting a critical value cv that accounts for the multiple
b I (τ ). Further improvements can be
hypotheses being tested plays an important role to estimate the graph E
obtained by considering the stepdown procedure of [68] for multiple hypothesis testing that was studied for
the high-dimensional case in [24]. The procedure iteratively creates a suitable sequence of decreasing critical
values. In each step only null hypotheses that were not rejected are considered to determine the critical
value. Thus, as long as any hypothesis is rejected at a step, the critical value decreases and we continue to
the next iteration. The procedure stops when no hypothesis in the current active set is rejected.
Comment 3.2 (Estimation of Conditional Density Function). The algorithm above requires the conditional
density function faτ which typically needs to be estimated in practice. It turns out that estimation of
conditional quantiles yields a natural estimator for the conditional density function as
faτ =
1
.
∂QXa (τ |Z a )/∂τ
Therefore, based on `1 -penalized quantile regression estimates at the τ + hn and τ − hn quantile, where
h = hn → 0 denotes a bandwidth parameter, we have
fbaτ =
2h
a
b
b X (τ − h|Z a )
QXa (τ + h|Z ) − Q
a
(3.14)
as an estimator of faτ . Under smoothness conditions, it has an bias of order h2 . See [18] and the references
therein for additional comments and estimators.
3.2. Estimators for PQGMs. In this section we propose an estimator for PQGMs in which case we are
interested in the prediction of Xa , a ∈ V , using a linear combination of XV \{a} under the asymmetric
loss discussed in (2.6). We will add an intercept as one of the variables for the sake of notation so that
X−a = (1, XV0 \{a} )0 . Given the loss function ρτ , the target d-dimensional vector of parameters βaτ is defined
as (part of) the solution of the following optimization problem
0
βaτ ∈ arg min E[ρτ (Xa − X−a
β)].
β
(3.15)
As we are interested in the case that d is large, the use of high-dimensional tools to achieve consistent
estimators is needed. The estimation procedure we proposed is based on `1 -penalized quantile regression but
additional issues need to be considered to cope with the (non-vanishing) difference between the best linear
predictor and the conditional quantile function. Again we consider models that satisfy an approximately
sparse condition. Formally, we require the existence of sparse coefficients {β̄aτ : a ∈ V, τ ∈ T } such that
p
0
max sup kβ̄aτ k0 6 s and max sup {E[{X−a
(βaτ − β̄aτ )}2 ]}1/2 . s/n,
(3.16)
a∈V τ ∈T
a∈V τ ∈T
where (again) the sparsity parameter s of the model is allowed to grow as n grows. The high-dimensionality
prevents us from using (standard) quantile regression methods and regularization methods are needed to
achieve good prediction properties.
A key issue is to set the penalty parameter properly so that it bounds from above
0
max sup max |En [(1{Xa 6 X−a
βaτ } − τ )X−a,j ]|.
a∈V τ ∈T j∈[d]
(3.17)
However, it is important to note that we do not assume that the conditional quantile of Xa is a linear
function of X−a . Under correct linear specification of the conditional quantile function, `1 -penalized quantile
12
BELLONI, CHEN, AND CHERNOZHUKOV
regression estimator has been studied in [11]. The case that the conditional quantile function differs from
a linear specification by vanishing approximation errors has been considered in [47] and [18]. The analysis
proposed here aims to allow for non-vanishing misspecification of the quantile function relative to a linear
specification while still guarantees good rates of convergence in the `2 -norm to the best linear specification.
Thus the penalty parameter in the penalized quantile regression needs to account for such misspecification
and is no longer pivotal as in [11].
In order to handle this issue we propose a two step estimation procedure. In the first step, the penalty
parameter λ0 is conservative and is set via bounds constructed based on symmetrization arguments, similar
p
in spirit to [70, 12]. This leads to λ0 = 2(1 + 1/16) 2 log(8|V |2 /ξ)/n. Although this is conservative, under
mild conditions this would lead to estimates that can be leverage to fine tune the penalty choice. The second
step uses the preliminary estimator to bootstrap (3.17) based on the tools in [24] as follows. Specifically, for
0
estimates εbiaτ of the “noise” εiaτ = 1{Xia 6 Xi,−a
βaτ } − τ for i ∈ [n], for a ∈ V define
Λ̄aT := 1.1 sup max
τ ∈T j∈[d]
|En [gi εbiaτ Xi,−aj ]|
2
{En [b
ε2iaτ Xi,−aj
]}1/2
(3.18)
where (gi )ni=1 is a sequence of i.i.d. standard Gaussian random variables. The new penalty parameter λ̄V T
is defined as
λ̄V T := max Λ̄aT (1 − ξ|X−a )
a∈V
(3.19)
that is, the maximum of the (1 − ξ) conditional quantile of Λ̄aT . The penalty choice above adapts to
the unknown correlation structure across components and quantile indices. The following algorithm states
P X
X
the procedure where we denote weighted `1 -norms by kβk1,bσX := j σ
baj |βj | with σ
baj
= {En [Xj2 ]}1/2 the
P εX
2
εX
standardized version of the `1 -norm and kβk1,bε := j σ
]}1/2 a norm based
baτ j |βj | with σ
baτ
ε2aτ X−a,j
j = {En [b
on the estimated residuals.
Algorithm 3.2. (PQGM Estimator.) For each a ∈ V , and τ ∈ T
Step 1. Compute βbaτ from k · k1,bσX -penalized τ -quantile regression of Xa on X−a with penalty λ0 .
X
Compute βeaτ from τ -quantile regression of Xa on {Xk : |βbaτ k | > λ0 /b
σak
}.
0
e
Step 2. For εbiaτ = 1{Xia 6 Xi,−a βaτ } − τ for i ∈ [n], and ξ = 1/n, compute λ̄V T via (3.19).
Step 3. Recompute βbaτ from k · k1,bε -penalized τ -quantile regression of Xa on X−a with penalty λ̄V T .
εX
Compute β̌aτ from τ -quantile regression of Xa on {Xk : |βbaτ k | > λ̄V T /b
σaτ
k }.
Under regularity conditions stated in Section 4, with probability approaching 1, we have
r
s log(|V |n)
max sup kβaτ − β̌aτ k .
.
a∈V τ ∈T
n
The estimate of the prediction quantile graph is given by the support of (β̌aτ )a∈V,τ ∈T , namely
n
o
εX
b P (τ ) = (a, b) ∈ V × V : |βbaτ b | > λ̄V T /b
E
σaτ
b .
That is, it is induced by covariates selected by the `1 -penalized estimator. Those thresholded estimators not
only have the same rates of convergence as of the original penalized estimators but also possess additional
sparsity guarantees.
QUANTILE GRAPHICAL MODELS
13
3.3. Estimators for W-Conditional Quantile Graphical Models. In order to handle the additional
conditioning events Ω$ , $ ∈ W, we propose to modify Algorithms 3.1 and 3.2 based on kernel smoothing.
To that extent, we assume the observed data is of the form {(XiV , Wi ) : i = 1, . . . , n}, where Wi might be
defined through additional variables. Furthermore, we assume for each conditioning event $ ∈ W we have
access to a kernel function K$ that is applied to W , to represent the relevant observations associated with
$ (recall that we denote P(W ∈ Ω$ ) as P($)). We assume that K$ (W ) = 1{W ∈ Ω$ }.
Example 7 (PQGMs for Stock Returns Under Market Downside Movements, continued). In Example 1,
we have W as the market return and the conditioning event as Ω$ = {W 6 $} which is parameterized by
$ ∈ W, a closed interval in R. We might be interest in a fixed $ or on a family of values $ ∈ (−$̄, 0]. The
latter induces W = {Ω$ = {W 6 $} : $ ∈ (−$̄, 0]}. The kernel function is simply K$ (t) = 1{t 6 $}.
This framework encompasses the previous framework by having K$ (W ) = 1 for all W . Moreover, it
allows for a richer class of estimands which require estimators whose properties should hold uniformly over
$ ∈ W as well. Next we propose estimators for this setting, i.e. we generalize the previous methods
to account for the additional conditioning on $ ∈ W. In what follows, with a slight abuse of notation
we use $ to denote not only the index but also the event Ω$ . For further notational convenience, we
denote u = (a, τ, $) ∈ U := V × T × W so that the set U collects all the three relevant indices. With
P
Z
Z
σ
ba$j
= {En [K$ (W )(Zja )2 ]}1/2 , we define the following weighted `1 -norm kβk1,$ = j∈[p] σ
ba$j
|βj |. This
norm is $ dependent and provides the proper adjustments as we condition on different events associated
with different $’s.
We first consider estimators of CIGMs conditional on the events in W. In this setting, the model is
correctly specified up to small approximation errors. The definition of the penalty parameter will be based
on the random variable
ΛaT W =
sup
max
τ ∈T ,$∈W j∈[p]
En [K$ (W )(1{U 6 τ } − τ )Zja ]
p
Z
τ (1 − τ )b
σa$j
where Ui are independent uniform (0, 1) random variables, and set the penalty
λV T W = max ΛaT W (1 − ξ/{|V |n1+2dW }|Z a , W ),
a∈V
that is, the maximum of the (1 − ξ/{|V |n1+2dW }) conditional quantile of ΛaT W . Algorithm 3.3 provides
Z
the definition of the estimator. Here Auj = {α ∈ R : |α − βeuj | 6 10/{b
σa$j
log n}}, and denote λu :=
p
λV T W τ (1 − τ ).
Algorithm 3.3. (W-Conditional CIQGM Estimator.) For (a, τ, $) ∈ V × T × W and j ∈ [p]
Step 1. Compute βbu from k · k1,$ -penalized τ -quantile regression of K$ (W )(Xa ; Z a ) with penalty λu .
Z
Compute βeu from τ -quantile regression of K$ (W )(Xa ; {Zka : |βbuk | > λu /b
σa$j
}).
j
a
a
Step 2. Compute γ
eu from the post-Lasso estimator of K$ (W )fu Zj on K$ (W )fu Z−j .
a
a
a
a
Step 3. Construct the score function ψbi (α) = K$ (Wi )(τ − 1{Xia 6 Zij
α + Zi,−j
βeu,−j })fiu (Zij
− Zi,−j
γ
euj )
and for Luj (α) = |En [ψbi (α)]|2 /En [ψbi2 (α)], set β̌uj ∈ arg minα∈Auj Luj (α) .
Next we consider estimators of PQGMs conditional on the events in W. Similar to the previous case, for
a ∈ V define
|En [K$ (W )gb
εaτ $ X−a,j ]|
(3.20)
Λ̄aT W := 1.1 sup max
2
2
εaτ $ X−a,j
]}1/2
τ ∈T ,$∈W j∈[d] {En [K$ (W )b
14
BELLONI, CHEN, AND CHERNOZHUKOV
where (gi )ni=1 is a sequence of i.i.d. standard Gaussian random variables. The new penalty parameter λ̄V T
is defined as
λ̄V T W := max Λ̄aT W (1 − ξ|X−a )
a∈V
(3.21)
that is, the maximum of the (1 − ξ) conditional quantile of Λ̄aT W . It will also be useful to define another
P εX
εX
2
weighted `1 -norm, kβk1,$bε :=
baτ $j |βj | with σ
baτ
ε2aτ $ X−a,j
]}1/2 . We also denote
$j = {En [K$ (W )b
jσ
X
2
1/2
σ
ba$j = {En [K$ (W )X−a,j ]} . The penalty choice and weighted `1 -norm adapt to the unknown correlation
structure across components and quantile indices. The following algorithm states the procedure, with λ0W =
p
2(1 + 1/16) 2 log(8|V |2 {ne/dW }2dW /ξ)/n.
Algorithm 3.4. (W-Conditional PQGM Estimator.) For (a, τ, $) ∈ V × T × W
Step 1. Compute βbu from k · k1,$ -penalized τ -quantile regression of Xa on X−a with penalty λ0W .
X
Compute βeu from τ -quantile regression of K$ (W )(Xa ; {X−a,k : |βbuk | > λ0W /b
σa$k
}).
0
Step 2. For εbiu = 1{Xia 6 Xi,−a
βeu } − τ for i ∈ [n], and ξ = 1/n, compute λ̄V T W via (3.21).
Step 3. Recompute βbu from k·k1,$bε -penalized τ -quantile regression of K$ (W )(Xa ; X−a ) with penalty λ̄V T W .
εX
Compute β̌u from τ -quantile regression of K$ (W )(Xa ; {X−a,k : |βbuk | > λ̄V T W /b
σuk
}).
Comment 3.3 (Computation of Penalty Parameter over W). The penalty choices require one to maximize
over a ∈ V , τ ∈ T and $ ∈ W. The set V is discrete and does not pose a significant challenge. However
both other sets are continuous and additional care is needed. In most applications we are concerned with
the case that W is a low dimensional VC class of sets and it impacts the calculation only through indicator
functions, which is precisely the case of T . It follows that only a polynomial number (in n) of different values
of τ and $ would need to be considered.
4. Main Theoretical Results
This section is devoted to theoretical guarantees associated with the proposed estimators. We will establish
rates of convergence results for the proposed estimators as well as the (uniform) validity of confidence regions.
These results build upon and contribute to an increasing literature on the estimation of many processes of
interest with (high-dimensional) nuisance parameters.
Throughout, we will provide results for the estimators of the W-conditional quantile graphical models
as those can be generalized the other models by setting K$ (W ) = 1. Although some of the tools are
similar, CIQGMs and PQGMs require different estimators and are subject to different assumptions. Thus,
substantial different analyses are required.
4.1. W-Conditional CIQGM. For u = (a, τ, $) ∈ U, define the τ -conditional quantile function of Xa
given XV \{a} and $ as
QXa (τ |XV \{a} , $) = Z a βu + ru ,
(4.22)
a
where Z is a p-dimensional vector of (known) transformations of XV \{a} , and ru is an approximation error.
The event $ ∈ W will be used for further conditioning through the function K$ (W ) = 1{W ∈ $}.
We let fXa |XV \{a} ,$ (·|XV \{a} , $) denote the conditional density function of Xa given XV \{a} and $ ∈ W.
We define fu := fXa |XV \{a} ,$ (QXa (τ |XV \{a} , $)|XV \{a} , $) as the value of the conditional density function
QUANTILE GRAPHICAL MODELS
15
evaluated at the τ -conditional quantile. In our analysis we will consider for u ∈ U
E[fu {Z a δ}2 |$]
and f U = min f u .
u∈U
kδk=1 E[{Z a δ}2 |$]
f u = inf
(4.23)
Moreover, for each u ∈ U and j ∈ [p] we define
a
γuj = arg min E[fu2 K$ (W )(Zja − Z−j
γ)2 ].
(4.24)
γ
This provides a weighted projection to construct the residuals
a
vuj = fu (Zja − Z−j
γuj )
a
that satisfy E[fu Z−j
vuj |$] = 0 for each (u, j) ∈ U × [p].
The estimands of interest are βu ∈ Rp , u ∈ U, and can be written as the solution of (a continuum of)
moment equations. Letting βuj denote the jth component of βu so that βuj ∈ R solves
E[ψuj (X, W, β, ηuj )] = 0,
where the function ψuj is given by
(1)
(3)
(2)
a
a
ψuj (X, W, β, ηuj ) = K$ (W )(τ − 1{Xa 6 Zja β + Z−j
ηuj + ηuj })fu (Zja − Z−j
ηuj ),
(1)
(2)
(3)
(1)
(2)
and the true value of the nuisance parameter is given by ηuj = (ηuj , ηuj , ηuj ) with ηuj = βu,−j , ηuj = γuj ,
(3)
and ηuj = ru . In what follows c, C denote some fixed constant, δn and ∆n denote sequences go to zero with
δn = n−µ for some sufficiently small µ. Denote µW = inf $∈W P($).
Condition CI. Let u = (a, τ, $) ∈ U := V × T × W and (Xi , Wi )ni=1 denote a sequence of independent
and identically distributed random vectors generated accordingly to models (4.22) and (4.24):
(i) Suppose supu∈U ,j∈[p] {kβu k + kγuj k} 6 C and T is a fixed compact set: (a) there exists s = sn such
that supu∈U ,j∈[p] {kβu k0 + kγ̄uj k0 } 6 s, supu∈U ,j∈[p] kγ̄uj − γuj k + s−1/2 kγ̄uj − γuj k1 6 C{n−1 s log(|V |pn)}1/2 ,
where γ̄uj is approximately sparse; (b) the conditional distribution function of Xa given XV \{a} and $ is
absolutely continuous with continuously differentiable density fXa |XV \{a} ,$ (t|XV \{a} , $) bounded by f¯ and
its derivative bounded by f¯0 uniformly over u ∈ U; (c) |fu − fu0 | 6 Lf ku − u0 k, kβu − βu0 k 6 Lβ ku − u0 kκ with
κ ∈ [1/2, 1], and E[|K$ (W ) − K$0 (W )|] 6 LK k$ − $0 k; (d) the VC dimension dW of the set W is fixed,
{QXa (τ |XV \{a} , $) : (τ, $) ∈ T × W} is a VC-subgraph with VC-dimension 1 + CdW for every a ∈ V ;
(ii) The following moment conditions hold uniformly over u ∈ U and j ∈ [p]: E[|fu vuj Zka |2 |$]1/2 6
Cf u , mina∈V inf kδk=1 E[{(Xa , Z a )δ}2 |$] > c, maxa∈V supkδk=1 E[{(Xa , Z a )δ}4 |$] 6 C, E[fu2 (Z a δ)2 |$] 6
Cf 2u E[(Z a δ)2 |$], maxj,k
E[|fu vuj Zka |3 |$]1/3
E[|fu vuj Zka |2 |$]1/2
log1/2 (pn|V |) 6 δn {nP($)}1/6 ;
(iii) Furthermore, for some fixed q > 4∨(1+2dW ), supu∈ U ,kδk=1 E[|(Xa , Z a )δ|2 ru2 |$] 6 CE[ru2 |$] 6 Cs/n,
maxu∈U ,j∈[p] |E[fu ru vuj |$]| 6 δn n−1/2 , E[maxi6n supu∈U |K$ (W )riu |q ] 6 C, and with probability 1 − ∆n ,
2
uniformly over u ∈ U, j ∈ [p]: En [ru2 vuj
|$] + En [ru2 |$] . n−1 s log(p|V |n), En [K$ (W ){|ru | + ru2 }(Z a δ)2 ] 6
δn En [K$ (W )fu (Z a δ)2 ];
(iv) For a fixed q > 4 ∨ (1 + dW ), diam(W) 6 n1/2q , E[maxi6n kXiV kq∞ ∨ maxa∈V kZia kq∞ ]1/q /µW 6
Mn , E[maxi6n supu∈U ,j∈[p] |viuj |q ]1/q 6 Ln , (Lf + LK )2 Mn2 log2 (p|V |n) 6 δn nµ3W f 6U , Mn4 log(p|V |n) log n 6
δn2 nµ2W f 2U , s2 log2 (p|V |n) 6 δn2 nf 4U µ6W , s3 log3 (p|V |n) 6 δn4 nf 2U µ3W , L2n s log3/2 (p|V |n) 6 δn f U (nµW )1/2 ,
p
Mn s log(p|V |n) 6 δn n1/2 µW f U .
16
BELLONI, CHEN, AND CHERNOZHUKOV
Condition CI assumes various conditional moment conditions to allow for the estimation to be conditional
on $ ∈ W. Those are analogous to the (unconditional) conditions in the high-dimensional literature in
quantile regression models, [18]. In particular, condition CI(i) assumes smoothness of the density function,
and of coefficients. Condition CI(ii) assumes conditions on the (conditional) population design matrices such
as the ratio between eigenvalues. Condition CI(iii) pertains to the approximations errors and assumes mild
moment conditions. Finally Condition CI(iv) provides sufficient conditions on the allowed growth of the
model via p and |V | relative to the available sample size n. Based on Condition CI, we derive our main
results regarding the proposed estimator. Moreover, we also establish new results for `1 -penalized quantile
regression methods that hold uniformly over the indices u ∈ U. The following theorems summarize these
results. Note, Condition CI(iii) also assume dW is bounded by fixed q, and the proof can easily be extended
to other cases.
Theorem 1 (Uniform Rates of Convergence for W-Conditional Penalized Quantile Regression). Under
Condition CI, we have that with probability at least 1 − o(1)
s
s(1 + dW ) log(p|V |n)
b
, uniformly over u = (a, τ, $) ∈ U
k βu − βu k .
nf u P($)
p
λ̄
Moreover, the thresholded estimator βbλ̄ , with λ̄ = (1 + dW ) log(p|V |n)/n and βbuj
= βbuj 1{|βbuj | >
Z
λ̄b
σa$j
}, satisfies the same rate and kβbλ̄ k0 . s.
Theorem 1 builds upon ideas in [11] however the proof strategy is designed to derive rates that are adaptive
to each u ∈ U. Indeed the rates of convergence are u-dependent and they show a slower rate for rare events
$ ∈ W.
Theorem 2 (Uniform Rates of Convergence for W-Conditional Weighted Lasso). Under Condition CI, we
have that with probability at least 1 − o(1)
s
1
s(1 + dW ) log(p|V |n)
kb
γuj − γuj k .
and kb
γuj k0 . s, uniformly over u = (a, τ, $) ∈ U, j ∈ [p].
fu
nP($)
The following result establishes a uniform Bahadur representation for the final estimators.
Theorem 3 (Uniform Bahadur Representation for W-Conditional CIQGM). Under Condition CI, the estimator (β̌uj )u∈U ,j∈[p] satisfies
−1 √
σuj
n(β̌uj − βuj ) = Un (u, j) + OP (δn ) in `∞ (U × [p]),
2
2 −1
where σuj
= τ (1 − τ )E[K$ (W )vuj
] and
Un (u, j) :=
n
2
{τ (1 − τ )E[K$ (W )vuj
]}−1/2 X
√
(τ − 1{Ui (a, $) 6 τ })K$ (Wi )vi,uj ,
n
i=1
where U1 (a, $), . . . , Un (a, $) are i.i.d. uniform (0, 1) random variables, independent of v1,uj , . . . , vn,uj .
Theorem 3 plays a key role. However, it is important to note that the marginal distribution of Un (u, j)
is pivotal. Nonetheless, there is a non-trivial correlation structure between U (a, $) and U (ã, $̃). In order to construct confidence regions with non-conservative guarantees, we rely on a multiplier bootstrap
method. We will approximate the process N = (Nuj )u∈U ,j∈[p] by the Gaussian multiplier bootstrap
QUANTILE GRAPHICAL MODELS
17
2
based on estimates ψbuj := {τ (1 − τ )En [K$ (W )b
vuj
]}−1/2 (τ − 1{Xa 6 Z a βbu })K$ (Wi )b
vuj of ψ̄uj (U, W ) =
2
−1/2
{τ (1 − τ )En [K$ (W )vuj ]}
(τ − 1{U (a, $) 6 τ })K$ (W )vuj , namely
(
)
n
X
1
Gb = (Gbuj )u∈U ,j∈[p] = √
gi ψbuj (Xi , Wi )
n i=1
u∈U ,j∈[p]
(gi )ni=1
are independent standard normal random variables which are independent from the data
where
n
(Wi )i=1 . Based on Theorem 5.2 of [24], the following result shows that the multiplier bootstrap provides a
√
valid approximation to the large sample probability law of n(β̌uj − βuj )u∈U ,j∈[p] which is suitable for the
construction of uniform confidence bands over the set of indices associated with Ia (b) for all a, b ∈ V .
Corollary 1 (Gaussian Multiplier Bootstrap for W-Conditional CIQGM). Under Condition CI with δn =
o({(1 + dW ) log(p|V |n)}−1/2 ), and (1 + dW ) log(p|V |n) = o({(n/L2n )1/7 ∧ (n1−2/q /L2n )1/3 }), we have that
|β̌uj − βuj |
0
0
n
b
PP max
sup
sup
∈ [t, t ] − PP max |Guj | ∈ [t, t ] | (Xi , Wi )i=1 = o(1)
j∈Ia (b) n−1/2 σuj
j∈Ia (b)
P ∈Pn t,t0 ∈R,u∈U ,b∈V
Corollary 1 allows the construction of simultaneous confidence regions for the coefficients that are uniformly valid over the set of data generating processes induced by Condition CI. Based on the coefficients whose intervals do not overlap zero, we can construct a conditional independence graph process
b I (τ, $), τ ∈ T , $ ∈ W that contains the true conditional independence quantile graph with a specified
E
probability.
4.2. W-Conditional PQGM. In this section, we derive theoretical guarantees for the W-conditional predictive quantile estimators uniformly over u = (a, τ, $) ∈ U. For each u ∈ U the estimand of interest is
βu ∈ Rp that corresponds to the best linear predictor under asymmetric loss function, namely
0
βu ∈ arg min E[ρτ (Xa − X−a
β) | $]
β
(4.25)
where the event $ ∈ W is used for further conditioning. In the analysis below, the conditioning is implemented through the function K$ (W ) = 1{W ∈ $}.
In the analysis of this case, the main issue is to handle the inherent misspecification of the linear form
0
X−a
βu with respect to the true conditional quantile. The first consequence is to handle the identification con0
dition. Given X−a and $ ∈ W, we let fu := fXa |X−a ,$ (X−a
βu |X−a , $) denote the value of the conditional
0
density function evaluated at X−a βu . In our analysis, we will consider
0
E[fu {X−a
δ}2 | $]
and f U = min f u .
0
u∈U
kδk=1 E[(X−a δ)2 | $]
f u = inf
(4.26)
We remark that f u defined in (4.26) differs from (4.23) which is the standard conditional density at the
true quantile value. It turns out that Knight’s identity can be used by exploiting the first order condition
associated with the optimization problem (4.25) which yields zero mean condition similar to the conditional
quantile condition.
A second consequence of the misspecification is the lack of pivotality of the score. Such pivotal property
was convenient in the previous section to define penalty parameters and to conduct inference. We will exploit
bounds on the VC-dimension of the relevant classes of sets formally stated below.
18
BELLONI, CHEN, AND CHERNOZHUKOV
Condition P. Let U = V × T × W and (Xi , Wi )ni=1 denote a sequence of independent and identically
distributed random vectors generated accordingly to models (4.25):
(i) Suppose that supu∈U kβu k 6 C and T is a fixed compact set: (a) there exists s = sn and β̄u such that
p
supu∈U kβ̄u k0 6 s, supu∈U kβ̄u − βu k + s−1/2 kβ̄u − βu k1 6 s/n; (b) the conditional distribution function of
Xa given X−a and $ is absolutely continuous with continuously differentiable density fXa |X−a ,$ (t | X−a , $)
such that its values are bounded by f¯ and its derivative is bounded by f¯0 uniformly over u ∈ U; (c) |fu −fu0 | 6
Lf ku − u0 k, kβu − βu0 k 6 Lβ ku − u0 kκ with κ ∈ [1/2, 1], and E[|K$ (W ) − K$0 (W )|] 6 LK k$ − $0 k; (d)
0
the VC dimension dW of the set W is fixed, {1{Xa 6 X−a
βu } : (τ, $) ∈ T × W} is a VC-class with
VC-dimension 1 + dW for every a ∈ V ;
0
(ii) The following moment conditions hold uniformly over u ∈ U: mina∈V inf kδk=1 E[{X−a
δ}2 |$] > c,
0
maxa∈V supkδk=1 E[{X−a
δ}4 |$] 6 C;
0
0
((iii) With probability 1 − ∆n , uniformly over u ∈ U and a ∈ V : En [K$ (W ){|X−a
(β̄u − βu )| + |X−a
(β̄u −
2
2
a 2
0
βu )| }(Z δ) ] 6 δn En [K$ (W )fu (X−a δ) ];
(iv) For a fixed q > 4 ∨ (1 + dW ), we have that: diam(W) 6 n1/2q , E[maxi6n kXiV kq∞ ]1/q /µW 6
Mn , Mn2 log7 (n|V |) 6 δn nf 2U µ2W , Mn4 log(n|V |) log n 6 δn nµW , (Lf + LK )2 Mn2 log2 (|V |n) 6 δn nµ3W f 6U ,
p
Mn2 s log3/2 (n|V |) 6 δn f U (nµW )1/2 , Mn s log(n|V |) 6 δn (nµW )1/2 , and s3 log5 (n|V |) 6 δn nf 2U µ2W .
Condition P is a high-level condition. It allows to cover conditioning events $ ∈ W whose probability
can decrease to zero (although slower than n−1/4 ).
Next we derive our main results regarding the proposed estimator for the best linear predictor. These
results are also new `1 -penalized quantile regression methods as it holds under possible misspecification of the
conditional quantile function and hold uniformly over the indices u ∈ U. The following theorem summarizes
the result.
Theorem 4 (Uniform Rates of Convergence for W-Conditional Penalized Quantile Regression under Misspecification). Under Condition P, we have that with probability at least 1 − o(1), uniformly over u =
(a, τ, $) ∈ U,
s
s(1 + dW ) log(|V |n)
kβbu − βu k .
.
nf u P($)
The data-driven choice of penalty parameter helps diminish the regularization bias and also allow to
obtain sparse estimators with provably rates of convergence (through thresholding). Moreover, the u specific
penalty parameter combined with the new analysis yields an adaptive rate of convergence to each u ∈ U
unlike previous works.
Comment 4.1 (Simultaneous Confidence Bands for Coefficients in PQGMs). We note that in some applications we might be interested in constructing (simultaneous) confidence bands for the coefficients in PQGMs.
In particular, this would include the cases practitioners are using a misspecified linear specification in a
0
quantile regression model. Provided the conditional density function at X−a
βu can be estimated, a version
of Algorithm 3.3 using the penalty parameters in Algorithm 3.4 for the initial step can deliver such confidence
regions via a multiplier bootstrap.
QUANTILE GRAPHICAL MODELS
19
5. Empirical Applications of QGMs
5.1. CoVaR, Network Spillover Effects, and Systemic Risk. Traditional risk measures, such as Value
of Risk (VaR), focus on the loss of an individual institution only. CoVaR proposed by [4] is to measure the
VaR of the whole financial system or a particular financial institution by conditioning on another institution
being in distress.
[4] define institution b’s CoVaR at level τ conditional on a particular outcome of institution a, as the value
b|a
of CoV aRτ that solves
P(Xb 6 CoV aRτb|a |C(Xa )) = τ.
(5.27)
A special case is C(Xa ) = {Xa = V aRτa } which, as interpreted by [4], means with probability τ institution
b is in trouble given that institution a is in trouble. The estimation procedure is defined as: firstly, quantile
regression Xb on Xa gives the value at risk of institution b conditional on institution a,
V aRτb |Xa = β0b (τ ) + βab (τ )Xa ,
(5.28)
then replacing variable Xa by its τ -th quantile, i.e. V aRτa , yields
b|Xa =V aRτa
CoV aRτ
= β0b (τ ) + βab (τ )V aRτa ,
(5.29)
and
a
∆CoV aRτb|a = βab (τ )(V aRτa − V aR50%
).
(5.30)
Below, we show with QGM we can incorporate (tail) network spillover effects into risk measuring. (Note
the identified risk connections between all financial institutions constitute a systemic risk network.) Define
P(Xb 6 CoV aRτb|a,V \{a,b} |C(Xa , XV \{a,b} )) = τ,
(5.31)
we then have
b|Xa =V aRτa ,XV \{a,b} =V aRτV \{a,b}
CoV aRτ
= β̌0b (τ ) + β̌ab (τ )V aRτa + β̌Vb \{a,b} (τ )V aRτV \{a,b} ,
(5.32)
and
a
∆CoV aRτb|a,V \{a,b} = β̌ab (τ )(V aRτa − V aR50%
),
(5.33)
where β̌ b (τ ) = {β̌0b (τ ), β̌Vb \{b} (τ )} is estimated via Algorithm 3.1 or 3.2.
b|a,V \{a,b}
We stack ∆CoV aRτ
as the (a, b)-th element of an d×d matrix E β (τ ) which represents a weighted
and directed network of institutions. Following [5], the systemic risk contribution of institution a is called
P
k|a,V \{a,k}
the network to-degree, defined as δato = ∆CoV aRsys|a =
. To-degrees measure
k ∆CoV aR
contributions of individual institutions to the overall risk of systemic network events. Similarly, from-degree of
P
a|k,V \{a,k}
institution a is defined as δaf rom = ∆CoV aRa|sys = k ∆CoV aRτ
. From-degrees measure exposure
P
of individual institutions to systemic shocks from the network. The total degree δ := a ∆CoV aRsys|a ,
aggregates institution-specific systemic risk across institutions hence provides a measure of total systemic risk
in the whole financial system. Finally, for institution a, we define its net contribution as net-∆CoV aRa =
f rom
δ to
. For more about network analysis, see [52].
a − δa
20
BELLONI, CHEN, AND CHERNOZHUKOV
5.2. International Financial Contagion. In this section we apply PQGMs to the study of international
financial contagion and then with the estimated network structure we can measure the systemic risk contributions of each country, as mentioned in Section 5.1. We focus on examining financial contagion through
the volatility spillovers perspective. [39] reported that international stock markets are related through their
volatilities instead of returns. [34] studied the return and volatility spillovers of 19 countries and found
differences in return and volatility spillovers. For a survey of financial contagion see [30]. We also illustrate
how PQGMs can highlight asymmetric dependence between the random variables.
We use daily equity index returns, September 2009 to September 2013 (1044 observations), from Morgan
Stanley Capital International (MSCI). The returns are all translated into dollar-equivalents as of September
6th 2013. We use absolute returns as a proxy for volatility. We have a total of 45 countries in our sample, there
are 21 developed markets (Australia, Austria, Belgium, Canada, Denmark, France, Germany, Hong Kong,
Ireland, Italy, Japan, Netherlands, New Zealand, Norway, Portugal, Singapore, Spain, Sweden, Switzerland,
the United Kingdom, the United States), 21 emerging markets (Brazil, Chile, Mexico, Greece, Israel, China,
Colombia, Czech Republic, Egypt, Hungary, India, Indonesia, Korea, Malaysia, Peru, Philippines, Poland,
Russia, Taiwan, Thailand, Turkey), and 3 frontier markets (Argentina, Morocco, Jordan).
Below in Figure 1 we provide a full-sample analysis of global volatility spillovers at different tails. We
denote 20% quantile as Low Tail, 50% quantile as Median, 80% quantile as Up Tail. Both PQGMs and GGM
are presented. Our purpose is to show the usefulness of PQGM in representing nonlinear tail interdependence
allowing for heteroscedasticity and to show that PQGM can measure correlation asymmetry through looking
at the tails of the distribution (not specific to any model).
There are significant differences in the network structure in terms of volatility spillovers when using
PQGM and GGM. PQGM permits asymmetries in correlation dynamics, suited to investigate the presence
of asymmetric responses. We find significant increase interdependence at the up tail between the volatility
series, i.e. we find downside correlations (high volatility) are much larger than upside correlations (low
volatility). This confirms findings in the finance literature that financial markets become more interdependent
during high volatility periods.
We also find if two countries locate in the same geographic region, with many similarities in terms of
market structure and history, they tend to be more closely connected (homophily effect as stated in network
terminology); while two economies locate in separate geographic regions are less likely directly connected.
In addition, we find among European Union member countries, Germany appears to play a major role in the
transmission of shocks to others; while in Asia, Hong Kong, Thailand, and Singapore appear to play major
roles; and among all the north and south American countries, Canada and US play major roles.
In addition, we present net-∆CoV aR discussed in Section 5.1 with τ = 0.8, i.e. the Up Tail, in Figure 2
which shows that: globally, total volatility spillovers from Germany and France to the others are much larger
than total volatility spillovers from the others to them, and their net-∆CoV aR are positive. Both Greece and
Spain have negative net-∆CoV aR. The estimated network structure is important here as it demonstrates
that shocks originated in some markets may be amplified during their transmission throughout the system,
posing greater risks to the whole market than other shocks’ origination.
QUANTILE GRAPHICAL MODELS
21
Gaussian Graph
Median
TWN
TWN
HKG
HKG
MYS
MYS
CHN
EGY
SGP
KOR
CHN
EGY
SGP
PHL
JPN
KOR
IDN
IDN
NZL
NZL
IND
IND
JOR
ARG
PHL
JPN
JOR
THA
ISR
GRC
AUS
ARG
THA
ISR
ESP
GRC
AUS
COL
IRL
CAN
GBR
AUT
CAN
ITA
BEL
USA
NLD
SWE
NLD
FRA
DEU
PRT
CZE
SWE
FRA
DEU
MAR
ITA
BEL
TUR
PRT
CZE
AUT
CHE
MEX
TUR
USA
POL
GBR
CHE
DNK
NOR
RUS
POL
MEX
IRL
HUN
BRA
DNK
NOR
RUS
COL
PER
HUN
BRA
MAR
Up Tail
Low Tail
TWN
TWN
HKG
HKG
MYS
MYS
CHN
EGY
SGP
KOR
CHN
EGY
SGP
PHL
JPN
KOR
IDN
ARG
PHL
JPN
IDN
NZL
NZL
IND
JOR
ESP
CHL
CHL
PER
IND
JOR
THA
ISR
GRC
AUS
ARG
THA
ISR
ESP
GRC
AUS
CHL
ESP
CHL
COL
PER
IRL
HUN
BRA
CAN
GBR
POL
AUT
BEL
ITA
GBR
POL
MAR
USA
FRA
SWE
NLD
DEU
FRA
MAR
Figure 1. International Financial Contagion. Note: we show the volatility transmission channel
is asymmetric (at different tails).
ITA
PRT
CZE
NLD
DEU
BEL
TUR
PRT
CZE
SWE
AUT
CHE
MEX
TUR
USA
CAN
DNK
NOR
RUS
CHE
MEX
IRL
HUN
BRA
DNK
NOR
RUS
COL
PER
BELLONI, CHEN, AND CHERNOZHUKOV
2.0
22
1.5
DEU
FRA
1.0
CHE
HKG
0.5
ITA
BRA
SWE
GBR
NLD
MYS
JOR
PRTSGP
ISR
MAR
NOR
CHN
USA
CZE
0.0
BEL
COL
JPN
IDN
NZL
MEX
CHL
KOR
PHL
THA
TWN
AUS
PER
DNK
−0.5
EGY
ESP
IND
RUS
IRL
ARG
HUN
TUR
POL
AUT
−1.0
Net ∆CoVaR
CAN
GRC
Countries
Figure 2. Volatility Spillovers Net Contribution of Each Country
QUANTILE GRAPHICAL MODELS
23
5.3. Stock Returns Under Market Downside Movements. Stock returns are in general non-Gaussian.
[6] find correlation asymmetries in the data and reject the null hypothesis of multivariate Gaussian distributions at daily, weekly, and monthly frequencies, conditional on market “downside” movements. See also
[61, 67], among other studies, in the empirical finance literature for evidence of the non-Gaussian feature of
financial markets. Hence, generally, in the financial market context, linear correlation measures only convey
partial and often misleading information on the actual underlying conditional dependencies.
In fact, when we are particularly interested in the conditional dependencies of stocks returns conditioning on market “downside” movements, this can be modeled by the W-Conditional CIQGM
with W = {Market return 6 $}, $ as the τm -th quantile of the market index returns, and τm =
{0.15, 0.5, 0.75, 0.9, 1}. In the following example, we obtain daily stock returns from CRSP and use S&P
500 as the market index. The full sample consists of 2769 observations for 86 stocks from Jan 2, 2003 to
December 31, 2013. The total number of stocks is 86 due to data availability at CRSP. In this case, we
define market downside movement as when the market index returns are below a pre-specified level (e.g.
τm -th quantile), hence conditioning on a particular $ simply corresponds to consider the subsample based
on whether the corresponding date’s market return is less equal to the τm -th quantile of the market index
returns. We reported the number of edges (there is no linkage between two stocks if they are conditional
independent), under different market conditions in Table 1 below.
Table 1. Edges Produced by Different Graph Estimators
τm
$
obs
PQGM
CIQGM
CIQGM(0.1)
CIQGM(0.3)
0.15
416
82
7302
4086
388
0.5
1385
196
7254
1308
74
0.75
2077
238
7226
908
50
0.9
2492
272
7202
740
46
1
2769
304
7274
784
54
>0
1246
186
7262
1516
80
<0
1522
180
7254
1308
64
Note: The results are computed by Algorithm 3.3 and 3.4. CIQGM(0.1)
means additional thresholding at 0.1, i.e. we keep the edges that have
correlation stronger than 0.1. Similarly, CIQGM(0.3) means additional
thresholding at 0.3.
As shown in Table 1, there are significant differences between PQGM and CIQGMs, hence assuming
Gaussianity for the distribution of stock returns could result in false correlation conclusions (e.g., estimation
bias due to asymmetry in correlations conditional on market upside or downside moves). When using PQGM,
the number of edges increases with τm . The number of edges in CIQGM is significantly higher when no
thresholding is applied. The results also show stronger correlation (and more connections) under market
downside moments. All those empirical findings support evidence from the empirical finance literature.
24
BELLONI, CHEN, AND CHERNOZHUKOV
References
[1] Alberto Abadie, Guido Imbens, and Fanyin Zheng. Inference for misspecified models with fixed regressors. Journal of the
American Statistical Association, 109(508):1601–1614, 2014.
[2] Daron Acemoglu, Asuman Ozdaglar, and Alireza Tahbaz-Salehi. Cascades in networks and aggregate volatility. Technical
report, National Bureau of Economic Research, 2010.
[3] Daron Acemoglu, Asuman Ozdaglar, and Alireza Tahbaz-Salehi. Systemic risk and stability in financial networks. The
American Economic Review, 105(2):564–608, 2015.
[4] Tobias Adrian and Markus Brunnermeier. Covar. The American Economic Review, 106(7):1705–1741, 2016.
[5] Torben Andersen, Tim Bollerslev, Peter Christoffersen, and Francis Diebold. Financial risk measurement for financial risk
management. Handbook of the Economics of Finance, 2:1127–1220, 2013.
[6] Andrew Ang and Joseph Chen. Asymmetric correlations of equity portfolios. Journal of Financial Economics, 63(3):443–
494, 2002.
[7] Andrew Ang, Joseph Chen, and Yuhang Xing. Downside risk. Review of Financial Studies, 19(4):1191–1239, 2006.
[8] Joshua Angrist, Victor Chernozhukov, and Iván Fernández-Val. Quantile regression under misspecification, with an application to the us wage structure. Econometrica, 74(2):539–563, 2006.
[9] Onureena Banerjee, Laurent El Ghaoui, and Alexandre d’Aspremont. Model selection through sparse maximum likelihood
estimation for multivariate gaussian or binary data. The Journal of Machine Learning Research, 9:485–516, 2008.
[10] Alexandre Belloni, Daniel Chen, Victor Chernozhukov, and Christian Hansen. Sparse models and methods for optimal
instruments with an application to eminent domain. Econometrica, 80(6):2369–2429, 2012.
[11] Alexandre Belloni and Victor Chernozhukov. `1 -penalized quantile regression for high dimensional sparse models. Annals
of Statistics, 39(1):82–130, 2011.
[12] Alexandre Belloni and Victor Chernozhukov. Inference methods for high-dimensional sparse econometric models. Advances
in Economics and Econometrics, 10th World Congress of Econometric Society, III:245–295, 2013.
[13] Alexandre Belloni and Victor Chernozhukov. Least squares after model selection in high-dimensional sparse models.
Bernoulli, 19(2):521–547, 2013. ArXiv, 2009.
[14] Alexandre Belloni, Victor Chernozhukov, Denis Chetverikov, and Ying Wei. Uniformly valid post-regularization confidence
regions for many functional parameters in z-estimation framework. arXiv:1512.07619, 2015.
[15] Alexandre Belloni, Victor Chernozhukov, and Iván Fernández-Val. Conditional quantile processes based on series or many
regressors. arXiv, 2011.
[16] Alexandre Belloni, Victor Chernozhukov, Ivan Fernández-Val, and Christian Hansen. Program evaluation and causal
inference with high-dimensional data. Econometrica, 85(1):233–298, 2017.
[17] Alexandre Belloni, Victor Chernozhukov, and Christian Hansen. Inference on treatment effects after selection among highdimensional controls. The Review of Economic Studies, 81(2):608–650, 2014.
[18] Alexandre Belloni, Victor Chernozhukov, and Kengo Kato. Robust inference in high-dimensional approximately sparse
quantile regression models. arXiv preprint arXiv:1312.7186, 2013.
[19] Alexandre Belloni, Victor Chernozhukov, and Kengo Kato. Uniform post-selection inference for least absolute deviation
regression and other z-estimation problems. Biometrika, 102(1):77–94, 2015.
[20] Alexandre Belloni, Victor Chernozhukov, and Lie Wang. Square-root-lasso: Pivotal recovery of sparse signals via conic
programming. Biometrika, 98(4):791–806, 2011. Arxiv, 2010.
[21] Peter Bickel, Yaacov Ritov, and Alexandre Tsybakov. Simultaneous analysis of Lasso and Dantzig selector. Annals of
Statistics, 37(4):1705–1732, 2009.
[22] Tony Cai, Weidong Liu, and Xi Luo. A constrained `1 minimization approach to sparse precision matrix estimation. Journal
of the American Statistical Association, 106(494), 2011.
[23] Mehmet Caner and Anders Kock. Asymptotically honest confidence regions for high dimensional parameters by the desparsified conservative lasso. Journal of Econometrics, forthcoming.
[24] Victor Chernozhukov, Denis Chetverikov, and Kengo Kato. Gaussian approximations and multiplier bootstrap for maxima
of sums of high-dimensional random vectors. The Annals of Statistics, 41(6):2786–2819, 2013.
[25] Victor Chernozhukov, Denis Chetverikov, and Kengo Kato. Gaussian approximation of suprema of empirical processes.
The Annals of Statistics, 42(4):1564–1597, 2014.
QUANTILE GRAPHICAL MODELS
25
[26] Victor Chernozhukov, Denis Chetverikov, and Kengo Kato. Comparison and anti-concentration bounds for maxima of
gaussian random vectors. Probability Theory and Related Fields, 162:47–70, 2015.
[27] Victor Chernozhukov, Denis Chetverikov, and Kengo Kato. Empirical and multiplier bootstraps for supreme of empirical processes of increasing complexity, and related gaussian couplings. Stochastic Processes and their Applications,
126(12):3632–3651, 2016.
[28] Victor Chernozhukov, Christian Hansen, and Martin Spindler. Post-selection and post-regularization inference in linear
models with very many controls and instruments. American Economic Review: Papers and Proceedings, 105(5):486–490,
2015.
[29] Khai Chiong and Roger Moon. Estimation of graphical lasso using the l1, 2 norm. The Econometrics Journal, forthcoming.
[30] Stijn Claessens and Kristin Forbes. International Financial Contagion. Springer, 2001.
[31] David Cox and Nanny Wermuth. Multivariate dependencies: Models, analysis and interpretation, volume 67. CRC Press,
1996.
[32] Philip Dawid. Conditional independence in statistical theory. Journal of the Royal Statistical Society. Series B (Methodological), pages 1–31, 1979.
[33] Arthur Dempster. Covariance selection. Biometrics, pages 157–175, 1972.
[34] Francis Diebold and Kamil Yilmaz. Measuring financial asset return and volatility spillovers, with application to global
equity markets. The Economic Journal, 119(534):158–171, 2009.
[35] Mathias Drton and Michael Perlman. Model selection for gaussian concentration graphs. Biometrika, 91(3):591–602, 2004.
[36] Mathias Drton and Michael Perlman. Multiple testing and error control in gaussian graphical model selection. Statistical
Science, 22(3):430–449, 2007.
[37] Mathias Drton and Michael Perlman. A sinful approach to gaussian graphical model selection. Journal of Statistical
Planning and Inference, 138(4):1179–1200, 2008.
[38] David Edwards. Introduction to graphical modelling. Springer, 2000.
[39] Robert Engle and Raul Susmel. Common volatility in international equity markets. Journal of Business & Economic
Statistics, 11(2):167–176, 1993.
[40] Jianqing Fan, Jinchi Lv, and Lei Qi. Sparse high dimensional models in economics. Annual review of economics, 3:291,
2011.
[41] Max Farrell. Robust inference on average treatment effects with possibly more covariates than observations. Journal of
Econometrics, 174(2):1–23, 2015.
[42] Rina Foygel and Mathias Drton. Extended bayesian information criteria for gaussian graphical models. In Advances in
Neural Information Processing Systems, pages 604–612, 2010.
[43] Jerome Friedman, Trevor Hastie, and Robert Tibshirani. Sparse inverse covariance estimation with the graphical lasso.
Biostatistics, 9(3):432–441, 2008.
[44] Xuming He, Lan Wang, and Hyokyoung Grace Hong. Quantile-adaptive model-free variable screening for high-dimensional
heterogeneous data. The Annals of Statistics, 41(1):342–369, 2013.
[45] Jana Jankova and Sara van de Geer. Confidence intervals for high-dimensional inverse covariance estimation. Electronic
Journal of Statistics, 9(1):1205–1229, 2015.
[46] Harry Joe. Multivariate models and multivariate dependence concepts. CRC Press, 1997.
[47] Kengo Kato. Group lasso for high dimensional sparse quantile regression models. Preprint, ArXiv, 2011.
[48] Keith Knight. Limiting distributions for L1 regression estimators under general conditions. The Annals of Statistics,
26:755–770, 1998.
[49] Keith Knight. Asymptotics of the regression quantile basic solution under misspecification. Applications of Mathematics,
[50]
[51]
[52]
[53]
[54]
53(3):223–234, 2008.
Roger Koenker. Quantile regression. Cambridge University Press, New York, 2005.
Roger Koenker and Gilbert Bassett. Regression quantiles. Econometrica, 46(1):33–50, 1978.
Eric Kolaczyk. Statistical analysis of network data. Springer, 2009.
Steffen Lauritzen. Graphical models. Oxford University Press, 1996.
Michel Ledoux and Michel Talagrand. Probability in Banach Spaces (Isoperimetry and processes). Ergebnisse der Mathematik undihrer Grenzgebiete, Springer-Verlag, 1991.
[55] Ying-Ying Lee. Efficiency bounds for semiparametric estimation of quantile regression under misspecification. University
of Wisconsin-Madison, 2009.
26
BELLONI, CHEN, AND CHERNOZHUKOV
[56] Hannes Leeb and Benedikt Pötscher. Can one estimate the unconditional distribution of post-model-selection estimators?
Econometric Theory, 24(02):338–376, 2008.
[57] Han Liu, Fang Han, Ming Yuan, John Lafferty, and Larry Wasserman. High-dimensional semiparametric gaussian copula
graphical models. The Annals of Statistics, 40(4):2293–2326, 2012.
[58] Han Liu, John Lafferty, and Larry Wasserman. The nonparanormal: Semiparametric estimation of high dimensional
undirected graphs. The Journal of Machine Learning Research, 10:2295–2328, 2009.
[59] Han Liu and Lie Wang. Tiger: A tuning-insensitive approach for optimally estimating gaussian graphical models. Electronic
Journal of Statistics, 11(1):241–294, 2017.
[60] Weidong Liu and Xi Luo. High-dimensional sparse precision matrix estimation via sparse column inverse operator. arXiv
preprint arXiv:1203.3896, 2012.
[61] Francois Longin and Bruno Solnik. Extreme correlation of international equity markets. The Journal of Finance, 56(2):649–
676, 2001.
[62] Nicolai Meinshausen and Peter Bühlmann. High-dimensional graphs and variable selection with the lasso. The Annals of
Statistics, pages 1436–1462, 2006.
[63] Sahand Negahban, Pradeep Ravikumar, Martin Wainwright, and Bin Yu. A unified framework for high-dimensional analysis
of m-estimators with decomposable regularizers. Statistical Science, 27(4):538–557, 2012.
[64] Yang Ning and Han Liu. A general theory of hypothesis tests and confidence regions for sparse high dimensional models.
The Annals of Statistics, 45(1):158–195, 2017.
[65] Roberto Imbuzeiro Oliveira. The lower tail of random quadratic forms, with applications to ordinary least squares and
restricted eigenvalue properties. Probability Theory and Related Fields, 166(3-4):1175–1194, 2016.
[66] Andrew Patton. On the out-of-sample importance of skewness and asymmetric dependence for asset allocation. Journal of
Financial Econometrics, 2(1):130–168, 2004.
[67] Andrew Patton. Modelling asymmetric exchange rate dependence. International economic review, 47(2):527–556, 2006.
[68] Joseph Romano and Michael Wolf. Exact and approximate stepdown methods for multiple hypothesis testing. Journal of
the American Statistical Association, 100(469):94–108, 2005.
[69] Tingni Sun and Cun-Hui Zhang. Sparse matrix inversion with scaled lasso. The Journal of Machine Learning Research,
14(1):3385–3418, 2013.
[70] Sara van de Geer. High-dimensional generalized linear models and the lasso. Annals of Statistics, 36(2):614–645, 2008.
[71] Sara Van de Geer, Peter Bühlmann, Yaacov Ritov, and Ruben Dezeure. On asymptotically optimal confidence regions and
tests for high-dimensional models. The Annals of Statistics, 42(3):1166–1202, 2014.
[72] Aad van der Vaart and Jon Wellner. Weak Convergence and Empirical Processes. Springer Series in Statistics, 1996.
[73] Aad van der Vaart and Jon Wellner. Empirical process indexed by estimated functions. IMS Lecture Notes-Monograph
Series, 55:234–252, 2007.
[74] Jialei Wang and Mladen Kolar. Inference for high-dimensional exponential family graphical models. In Proc. of AISTATS,
volume 51, pages 751–760, 2016.
[75] Yuanshan Wu and Guosheng Yin. Conditional quantile screening in ultrahigh-dimensional heterogeneous data. Biometrika,
102(1):65–76, 2015.
[76] Lingzhou Xue and Hui Zou. Regularized rank-based estimation of high-dimensional nonparanormal graphical models. The
Annals of Statistics, 40(5):2541–2571, 2012.
[77] Lingzhou Xue, Hui Zou, and Tianxi Cai. Nonconcave penalized composite conditional likelihood estimation of sparse ising
models. The Annals of Statistics, 40(3):1403–1429, 2012.
[78] Ming Yuan. High dimensional inverse covariance matrix estimation via linear programming. The Journal of Machine
Learning Research, 99:2261–2286, 2010.
[79] Ming Yuan and Yi Lin. Model selection and estimation in the gaussian graphical model. Biometrika, 94(1):19–35, 2007.
[80] Cun-Hui Zhang and Stephanie Zhang. Confidence intervals for low dimensional parameters in high dimensional linear
models. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 76(1):217–242, 2014.
[81] Qi Zheng, Limin Peng, and Xuming He. Globally adaptive quantile regression with ultra-high dimensional data. Annals of
statistics, 43(5):2225, 2015.
QUANTILE GRAPHICAL MODELS
27
Appendix A. Implementation Details of Algorithms
This section provides details of the algorithms mentioned in Section 3. Note, for the weighted-Lasso
b τ = diag[Γ
b τ kk , k ∈
estimator, the choice of penalty level λ := 1.1n−1/2 2Φ−1 (1 − ξ/Nn ) and penalty loading Γ
[p]\{j}] is a diagonal matrix defined by the following procedure: (1) Compute the post-Lasso estimator
j
b τ kk = maxkfiaτ Z a k∞ {En [|faτ Z a |2 ]}1/2 . (2) Compute the residuals
γ
eaτ
based on λ and initial values Γ
i
k
i6n
a
a
j
vbiaτ j = fiaτ (Zij
− Zi,−j
γ
eaτ
) and update the loadings
b τ kk =
Γ
q
2 |Z a v
2
En [faτ
k baτ j | ], k ∈ [p]\{j}
(A.34)
j
and use them to recompute the post-Lasso estimator γ
eaτ
. In the case of Algorithm 3.1 we can take Nn =
3 3
Z
|V |p n , in the case of Algorithm 3.3 we take Nn = |V |p2 {pn3 }1+dW . Denote σ
baj
= {En [(Zja )2 ]}1/2 ,
X
2
Z
X
2
σ
baj
= {En [X−a,j
]}1/2 , σ
ba$j
= {En [K$ (W )(Zja )2 ]}1/2 , and σ
ba$j
= {En [K$ (W )X−a,j
]}1/2 .
Detailed version of Algorithm 3.1 (CIQGM)
For each a ∈ V , τ ∈ T , and j ∈ [p], perform the following:
a e
(1) Run Post-`1 -quantile regression of Xa on Z a ; keep fitted value Z−j
βaτ,−j ,
p
P
p
Z
βbaτ ∈ arg minβ En [ρτ (Xa − Z a β)] + λV T τ (1 − τ ) j=1 σ
baj
|β |
pj
Z
a
e
b
σaj
.
βaτ ∈ arg minβ En [ρτ (Xa − Z β)] : βj = 0 if |βaτ j | 6 λV T τ (1 − τ )/b
a
a
a
j
},
(2) Run Post-Lasso of faτ Zja on faτ Z−j
; keep the residual vei := fiaτ {Zij
− Zi,−j
γ
eaτ
a
2
j
b τ γk1
(Zja − Z−j
γ)2 ] + λkΓ
∈ arg minγ En [faτ
γ
baτ
a
a
2
j
2
j
).
γaτ
γ
eaτ ∈ arg minγ En [faτ (Zj − Z−j γ) ] : support(γ) ⊆ support(b
a e
(3) Run Instrumental Quantile Regression of Xa − Z−j
βaτ,−j on Zja using ve as the instrument for Zja ,
β̌aτ,j ∈ arg min
α∈Aaτ j
with Aaτ j
a e
{En [(1{Xa 6 Zja α + Z−j
βaτ,−j } − τ )e
v ]}2
,
En [(1{Xa 6 Z a α + Z a βeaτ,−j } − τ )2 ve2 ]
j
−j
Z
= {α ∈ R : |α − βeaτ j | 6 10/{b
σaj
log n}}.
Detailed version of Algorithm 3.2 (PQGM)
For each a ∈ V , and τ ∈ T , perform the following:
(1) Run Post-`1 -quantile regression of Xa on X−a ,
P
0
X
βbaτ ∈ arg minβ En [ρτ (Xa − X−a
β)] + λ0 j∈[d] σ
baj
|βj |
0
X
e
b
βaτ ∈ arg minβ En [ρτ (Xa − X−a β)] : βj = 0 if |βaτ j | 6 λ0 /b
σaj
.
0
β̃aτ } − τ for i ∈ [n]. Compute the penalty level λ̄V T via (3.19).
(2) Set εbiaτ = 1{Xia 6 Xi,−a
(3) Run Post-`1 -quantile regression of Xa on X−a ,
P
0
2
βbaτ ∈ arg minβ En [ρτ (Xa − X−a
β)] + λ̄V T j∈[d] {En [b
ε2aτ X−a,j
]}1/2 |βj |
0
2
β̌aτ ∈ arg minβ En [ρτ (Xa − X−a β)] : βj = 0 if |βbaτ j | 6 λ̄V T /{En [b
ε2aτ X−a,j
]}1/2 .
28
BELLONI, CHEN, AND CHERNOZHUKOV
Detailed version of Algorithm 3.3 (W-Conditional CIQGM)
For each u = (a, τ, $) ∈ U = V × T × W, and j ∈ [p], perform the following:
a e
(1) Run Post-`1 -quantile regression of Xa on Z a ; keep fitted value Z−j
βu,−j ,
P
p
Z
|βj |
βbu ∈ arg minβ En [K$ (W )ρτ (Xa − Z a β)] + λu j=1 σ
ba$j
Z
βeu ∈ arg minβ En [K$ (W )ρτ (Xa − Z a β)] : βj = 0 if |βbuj | 6 λu /b
σa$j
.
a
a
(2) Run Post-Lasso of fu Zja on fu Z−j
; keep the residual ve := fu (Zja − Z−j
γ
euj ),
a
b u γk1
γ
buj ∈ arg minθ En [K$ (W )fu2 (Zja − Z−j
γ)2 ] + λkΓ
a
γ
euj ∈ arg minγ En [K$ (W )fu2 (Zja − Z−j
γ)2 ] : support(γ) ⊆ support(b
γuj ).
a e
(3) Run Instrumental Quantile Regression of Xa − Z−j
βu,−j on Zja using ve as the instrument,
β̌uj ∈ arg min
α∈Auj
a e
{En [K$ (W )(1{Xa 6 Zja α + Z−j
βu,−j } − τ )e
v ]}2
En [K$ (W )(1{Xa 6 Z a α + Z a βeu,−j } − τ )2 ve2 ]
j
−j
Z
where Auj := {α ∈ R : |α − βeuj | 6 10/{b
σa$j
log n}}.
Detailed version of Algorithm 3.4 (W-Conditional PQGM)
For each u = (a, τ, $) ∈ U = V × T × W perform the following:
(1) Run Post-`1 -quantile regression of Xa on X−a ,
P
0
X
β)] + λ0W j∈[d] σ
βbu ∈ arg minβ En [K$ (W )ρτ (Xa − X−a
ba$j
|βj |
X
0
b
e
σa$j
.
βu ∈ arg minβ En [K$ (W )ρτ (Xa − X−a β)] : βj = 0 if |βuj | 6 λ0W /b
0
(2) Set εbiu = 1{Xia 6 Xi,−a
βeu } − τ for i ∈ [n], compute λ̄V T W via (3.21).
(3) Run Post-`1 -quantile regression of Xa on X−a ,
P
2
0
β)] + λ̄V T W j∈[d] {En [K$ (W )b
]}1/2 |βj |.
βbu ∈ arg minβ En [K$ (W )ρτ (Xa − X−a
ε2u X−a,j
0
2
β̌u ∈ arg minβ En [K$ (W )ρτ (Xa − X−a
β)] : βj = 0 if |βbuj | 6 λ̄V T W /{En [K$ (W )b
ε2u X−a,j
]}1/2 .
Appendix B. Simulations of Quantile Graphical Models
In this section, we perform numerical examples to illustrate the performance of the estimators proposed
for QGMs. We will consider several different designs. In order to compare with other proposals we will
consider both Gaussian and non-Gaussian examples.
B.1. Isotropic Non-Gaussian Example. In general, the equivalence between a zero in the inverse covariance matrix and a pair of conditional independent variables will break down for non-gaussian distributions.
The nonparanormal graphical models extends Gaussian Graphical Models to Semiparametric Gaussian Copula models by transforming the variables with smooth functions. We illustrate the applicability of CIQGM
in representing the conditional independence structure of a set of variables when the random variables are
not even jointly nonparanormal.
Consider i.i.d. copies of an d-dimensional random vector X̃V = (X̃1 , . . . , X̃d−1 , X̃d ) from the following
multivariate normal distribution, X̃V ∼ N (0, Id×d ), where Id×d is the identity matrix. Further, we generate
q
q
2
2
π
Xd = − 3π−2
+ 3π−2
X̃d−1
|X̃d |.
(B.35)
QUANTILE GRAPHICAL MODELS
It follows that E[Xd ] =
q
π
3π−2 (E[|X̃d |]
−
p
2/π) = 0 and Var(Xd ) =
29
π
2
3π−2 (E[X̃d
4
· X̃d−1
]−
2
π)
= 1. In
addition, equation (B.35) is a location-scale-shift model in which the conditional median of the response is
zero while quantile functions other than the median are nonzero. We define vector XV as
XV = (Xd , X̃1 , ..., X̃d−1 )0 .
In this new set of variables, only Xd and X̃d−1 (i.e., node 1 and 15, when d = 15) are not conditionally
independent. Nonetheless, the covariance matrix of XV is still Id×d .
Next we consider an example with n = 300 and d = 15. We show graphs, in Figure 3 and 4, estimated by
both CIQGM(s) and GGMs in this non-Gaussian setting.
(b) CIQGM(0.5)
(a) CIQGM(0.2)
11
(c) CIQGM(0.8)
11
11
13
13
9
13
9
9
12
12
5
12
5
15
7
5
15
7
15
7
2
2
14
2
14
3
14
3
4
3
4
8
10
8
10
10
1
6
4
8
1
6
(d) CIQGM-Union
(e) Gaussian
11
(f) Nonparanormal
11
11
13
13
9
13
9
9
12
12
5
12
5
15
7
5
15
7
15
7
2
2
14
2
14
3
14
3
4
3
4
8
10
1
4
8
10
6
1
6
8
10
6
1
6
1
Figure 3. QGM and GGM
In Figure 3, Gaussian means the graph is estimated by using graphical lasso without any transformation
of XV , and the final graph is chosen by Extended Bayesian Information Criterion (ebic), see [42]. Nonparanormal means the graph is estimated using graphical lasso (likelihood based approach) with nonparanormal
30
BELLONI, CHEN, AND CHERNOZHUKOV
transformation of XV , see [58], and again the final graph is chosen by ebic. Both graphs are estimated using
R-package huge.
In Figure 4, as a robustness check, we also compare results produced by CIQGM with those produced by
neighborhood selection methods (pseudo-likelihood approach),
e.g. TIGER of [59] in R-package flare the
q
left graph is when choosing the turning parameter to be logn d while the right graph is when choosing the
q
q
tuning parameter to be 2 logn d . Throughout, we use Tiger2 represent TIGER with penalty level 2 logn d . As
expected, GGM cannot detect the correct dependence structure when the joint distribution is non-Gaussian
while CIQGM can still represent the right conditional independence structure.
(b) Tiger2
(a) Tiger1
11
11
13
13
9
9
12
12
5
5
15
7
15
7
2
2
14
14
3
3
4
4
8
8
10
10
6
1
6
1
Figure 4. TIGER
B.2. Gaussian Examples.
B.2.1. Graph Recovery. In this subsection, we start with comparing the numerical performance of QGM and
other methods, e.g. TIGER of [59] and graphical lasso algorithm (Glasso) of [43], in graph recovery using
simulated datasets with different pairs of (n, d). We start with one simulation for illustration purpose (the
results are summarized in Figure 5), and then we show the performance of QGM through estimated degree
distribution with 100 simulations (the results are summarized in Figure 6).
We mainly consider the Hub graph, as mentioned in [59], which also corresponds to the star network
mentioned in [2, 3]. In line with [59], we generate a d-dimensional sparse graph GI = (V, E I ) represents
the conditional independence structure between the variables. In our simulations, we consider 12 settings
to compare these methods: (A) n = 200, d = 10; (B) n = 200, d = 20; (C) n = 200, d = 40; (D) n = 400,
d = 10; (E) n = 400, d = 20; (F) n = 400, d = 40; (G) n = 200, d = 100; (H) n = 200, d = 200; (I) n = 200,
d = 400; (J) n = 400, d = 100; (K) n = 400, d = 200; (L) n = 400, d = 400. We adopt the following model
for generating undirected graphs and precision matrices.
QUANTILE GRAPHICAL MODELS
31
Hub graph. The d nodes are evenly partitioned into d/20 (or d/10 when d < 20) disjoint groups with
each group contains 20 (or 10) nodes. Within each group, one node is selected as the hub and we add edges
between the hub and the other 19 (or 9) nodes in that group. For example, the resulting graph has 190 edges
when d = 200 and 380 edges when d = 400. Once the graph is obtained, we generate an adjacency matrix
E I by setting the nonzero off-diagonal elements to be 0.3 and the diagonal elements to be 0. We calculate
its smallest eigenvalue Λmin (E I ). The precision matrix is constructed as
Θ = D[E I + (|Λmin (E I )| + 0.2) · Id×d ]D
(B.36)
where D ∈ Rd×d is a diagonal matrix with Djj = 1 for j = 1, ..., d/2 and Djj = 1.5 for j = d/2 + 1, ..., d.
The covariance matrix Σ := Θ−1 is then computed to generate the multivariate normal data: X1 , ...., Xd ∼
N (0, Σ). Below we provide simulation results using different estimators: PQGM6, TIGER and Glasso. We
start with one simualtion as an illustration:
(a) n = 200, d = 10
(b) n = 200, d = 20
(c) n = 200, d = 40
QR−Union
TIGER
QR−Union
TIGER
QR−Union
TIGER
Glasso
True
Glasso
True
Glasso
True
(d) n = 400, d = 10
(e) n = 400, d = 20
(f) n = 400, d = 40
QR−Union
TIGER
QR−Union
TIGER
QR−Union
TIGER
Glasso
True
Glasso
True
Glasso
True
Figure 5. One simulation
6Given the graphs are generated from multivariate Gaussian distribution we can use PQGM to simplify the computation.
32
BELLONI, CHEN, AND CHERNOZHUKOV
(g) n = 200, d = 100
(h) n = 200, d = 200
(i) n = 200, d = 400
QR−Union
TIGER
QR−Union
TIGER
QR−Union
TIGER
Glasso
True
Glasso
True
Glasso
True
(j) n = 400, d = 100
(k) n = 400, d = 200
(l) n = 400, d = 400
QR−Union
TIGER
QR−Union
TIGER
QR−Union
TIGER
Glasso
True
Glasso
True
Glasso
True
Figure 5. One simulation (Cont.)
Figure 5 shows that: for the low dimensional cases, d = 10, 20, 40, n is large compared to d, CIQGM is
comparable to TIGER and both are better than Glasso in terms of false positives; for the high dimensional
cases, d = {100, 200, 300}, we can compare the performance of different graph estimators through looking at
the denseness of the estimated graph (e.g., whether it is even or not), and again, both CIQGM and TIGER
perform well in terms of graph recovery as compared to Glasso, and their performance are getting better
when n is increasing.
In what follows, Figure 6 shows the degree distribution of true graph, the estimated ones, and the standard
deviations of the degree difference (between the true graph and the estimated ones). It is based on simulations
of Hub graph with n = 500 and d = 40. Simulated 100 times.
QUANTILE GRAPHICAL MODELS
33
40
20
0
Number of vertices
True Degree Sequence
5
10
15
Degree
40
20
0
Number of vertices
Estimated Degree of Sequence
5
10
15
Degree
40
20
0
Number of vertices
Standard Deviations of Degree Differences
0.5
1.0
1.5
SD
Figure 6. Upper panel shows the degree distribution of the true graphs. Middle panel
shows the degree distribution of the estimated graphs. Bottom panel shows the standard
deviations of the degree difference (between the true graph and the estimated ones). Hub
graph with n = 500 and d = 40. Simulated 100 times.
B.2.2. Inference. In this subsection Table 2 shows the numerical performance of CIQGM, based on Algorithm
3.1, on estimating Erdős-Rényi random graphs. More precisely, we construct approximate 90% confidence
intervals for βab with τ = 0.5, and we report the coverage probabilities. Note, in the jointly Gaussian
distributed case, we have closed form solution of βab as shown in Example 2.
p
Erdős-Rényi random graph. We add an edge between each pair of nodes with probability log d/n/d
independently. Once the graph is obtained, we construct the adjacency matrix E I and generate the precision
matrix Θ using (B.36) but setting Djj = 1 for j = 1, ..., d/2 and Djj = 1.5 for j = d/2 + 1, ..., d. We then
invert Θ to get the covariance matrices Σ := Θ−1 and generate the multivariate Gaussian data: X1 , ...., Xd ∼
N (0, Σ).
34
BELLONI, CHEN, AND CHERNOZHUKOV
Table 2. Erdős-Rényi Random Graph
d =20
d=50
d=100
(a, b)
n = 200
n = 500
n = 1000
(1,20)
84.0
87.5
91.5
(10,11)
84.0
88.0
92.5
(19, 20)
86.5
86.0
90.0
ACP
86.3
89.4
89.8
(1,50)
86.5
93.0
90.5
(25,26)
88.0
87.0
91.0
(49, 50)
87.5
90.5
87.5
ACP
86.7
89.4
90.1
(1,100)
82.5
81
89.0
(50,51)
85.0
86
92.0
(99, 100)
78.5
84
87.0
ACP
86.5
86.8
90
(a, b), coverage probability for βab ; ACP, average coverage
probability for βab , with a ∈ V , b ∈ V \{a}. Simulated 200
times.
Appendix C. Proofs of Section 4
Proof of Theorem 1. By Lemma 6, under Condition CI, for any θ such that kθk0 6 Cs`n , `n → ∞ slowly,
we have that
p
k fu Z a θkn,$ /{E[K$ (W )fu (Z a θ)2 ]}1/2 = 1 + oP (1).
Moreover, E[K$ (W )fu (Z a θ)2 ] > f u E[K$ (W )(Z a θ)2 ], E[K$ (W )(Z a θ)2 ] = E[(Z a θ)2 |$]P($), and
E[(Z a θ)2 | $] > ckθk2 by Condition CI. Lemma 6 further implies that the ratio of the minimal and maximal
eigenvalues of order s`n are bounded away from zero and from above uniformly over $ ∈ W and a ∈ V
with probability 1 − o(1). Therefore, since c{P($)}1/2 kδk1 6 kδk1,$ 6 C{P($)}1/2 kδk1 , we have κu,2c > c
uniformly over u ∈ U with the same probability for n large enough, see for instance [21].
To establish rates of convergence of the estimator obtained in Step 1 we will apply Lemma 1. Consider
the events Ω1 , Ω2 , and Ω3 as defined in (D.49), (D.50) and (D.51). By the choice of λu we have P(Ω1 ) >
1 − o(1). By Condition CI with R̄uξ 6 Cs log(p|V |n)/n and Lemma 2 we have P(Ω2 ) > 1 − o(1). Moreover,
p
P(Ω3 ) > 1 − o(1) by Lemma 3 with t3 6 Cn−1/2 (1 + dW ) log(p|V |nLf ).
QUANTILE GRAPHICAL MODELS
35
Using the same argument (with Z a replacing X−a ) as in (C.46), (C.47), and (C.48), for
p
p
δ ∈ Au := ∆$,2c ∪ {v : kvk1,$ 6 2cR̄uξ /λu , k fu Z a vkn,$ > C s(1 + dW ) log(p|V |n)/n/κu,2c },
with the restricted set defined as ∆u,2c̃ = {δ : kδTuc k1 6 2c̃kδTu k1 } for u ∈ U. we have q̄Au >
1/2 √
c(f 3/2
/f¯0 )µW /{ s maxa∈V,i6n kZia k∞ } where maxa∈V,i6n kZia k∞ .P Mn . Thus the conditions on q̄Au
U
are satisfied since Condition CI assumes Mn2 s2 log(p|V |n) 6 nµW f 3U . The conditions on the approximation
error are assumed in Condition CI.
Therefore, setting ξ = 1/ log n, by Lemma 1 we have uniformly over u = (a, τ, $) ∈ U
q
p
√
√
W ) log(p|V |n)
k fu Z a (βbu − βu )kn,$ . (1 + (t3 /λu )R̄uξ + (λu + t3 ) s . s(1+dnτ
(1−τ )
q
(1+dW ) log(p|V |n)
b
kβu − βu k1,$ . s
n
q
(1+dW ) log(p|V |n)
. Indeed by Lemma
n
Λaτ $ (1 − ξ/{|V |n1+2dW }|X−a , W ) under
here we used that λu 6 C
1/2
(C.37)
a
15 with x̃ij = K$ (Wi )Zij
and σ
bj >
cP($) , we can bound
Mn2 log(p|V |n/{τ (1 − τ )}) = o(nτ (1 −
τ )µW ) for all τ ∈ T and $ ∈ W, and the bound on λu follows from the union bound.
Let δu = βbu − βu . By triangle inequality it follows that
p
{E[K$ (W )fu (Z a δu )2 ]}1/2 6 k fu Z a δu kn,$ + kδu k1 {|(En − E)[K$ (W )fu (Z a δu )2 ]/kδu k21 ]|}1/2
(C.38)
and the last term can be bounded by
sup |(En − E)[K$ (W )fu (Z a δ)2 /kδk21 ]|
kδk1 61
6 maxk,j |(En − E)[K$ (W )fu Zka Zja ]|
q
|n)
. (1+dW ) log(p|V
n
with probability 1 − o(1) by Lemma 19 under our conditions.
Combining the relations above with (C.38), under (1 + dW )s2 log(p|V |n) = o(n) we have uniformly over
u∈U
kδu k . {E[(Z a δu )2 | $]}1/2 . {P($)}−1/2 {E[K$ (W )(Z a δu )2 ]}1/2
. {P($)f u }−1/2 {E[K$ (W )fu (Z a δu )2 ]}1/2
q
√
|n)
6 {P($)f u }−1/2 k fu Z a δu kn,$ + {P($)f u }−1/2 4 (1+dW ) log(p|V
kδu k1
n
r
s(1+dW ) log(p|V |n)
6C
.
nf P($)
u
given kδu k1 6 kδu k1,$ /P($)1/2 , (C.37), and s2 (1 + dW ) log(p|V |n) = o(nµ4W f 2U ) assumed in Condition CI.
p
Finally, let βbuλ̄ obtained by thresholding the estimator βbu with λ̄ := (1 + dW ) log(p|V |n)/n (note that
each component is weighted by En [K$ (W )(Zja )2 ]1/2 ). By Lemma 17, we have with probability 1 − o(1)
p
kZ a (βbuλ̄ − βu )kn,$ . s(1 + dW ) log(p|V |n)/n
p
kβbuλ̄ − βu k1,$ . s (1 + dW ) log(p|V |n)/n
|support(βbuλ̄ )| . s
by the choice of λ̄ and the rates in (C.37)
36
BELLONI, CHEN, AND CHERNOZHUKOV
Proof of Theorem 2. We verify Assumption C4 and Condition WL for the weighted Lasso model with index
a
a
set U × [p] where Yu = K$ (W )Zja , Xu = K$ (W )Z−j
, θu = γ̄uj , au = (fu , r̄uj ), r̄uj = K$ (W )Z−j
(γuj −
a
a
a
γ̄uj ), Suj = K$ (W )fu2 (Zja − Z−j
γuj )Z−j
= K$ (W )fu vuj Z−j
, and wu = K$ (W )fu2 . We will take Nn =
2
3 1+dW
|V |p {pn }
in the definition of λ.
2
a
a
We first verify Condition WL. We have E[Sujk
] 6 f¯2 E[|vuj Z−j,k
|2 ] 6 f¯2 {E[|vuj |4 |Z−j,k
|4 ]}1/2 6 C by the
bounded fourth moment condition. We have that
a
E[|fu vuj Z−jk
|3 | $]1/3
E[|Sujk |3 | $]1/3
E[|Sujk |3 ]1/3
−1/6
=
{P($)}
=
{P($)}−1/6 =: Muk
a |2 | $]1/2
E[|Sujk |2 ]1/2
E[|Sujk |2 | $]1/2
E[|fu vuj Z−jk
p
By the choice of Nn and Φ−1 (1 − t) 6 C log(1/t), we have Muk Φ−1 (1 − ξ/{2pNn }) 6 Muk C(1 +
dW ) log1/2 (pn|V |) 6 Cδn n1/6 where the last inequality holds by Condition CI so Condition WL(i) holds.
To verify Condition WL(ii) we will establish the validity of the choice of Nn . We will consider u =
(a, τ, $) ∈ U and u0 = (a, τ 0 , $0 ) ∈ U. By Condition CI we have that
|fu − fu0 | 6 Lf ku − u0 k and E[|K$ (W ) − K$0 (W )|] 6 LK k$ − $0 k.
(C.39)
Further, by Lemma 5 we have
kγuj − γuj 0 k 6 Lγ {ku − u0 k + k$ − $0 k1/2 }.
(C.40)
By definition we have
a
a
Sujk − Su0 jk = {K$ (W )fu2 − K$0 (W )fu20 }{Zja − Z−j
γuj }Zka − K$0 (W )fu20 {Z−j
(γuj − γuj 0 )}Zka
a
a
γuj |2 . Moreover,
and note that fu + fu0 6 2fu + Lku − u0 k, |Zj − Z−j
γuj | · |Zka | 6 |Zj |2 + 2|Zka |2 + |Z−j
|K$ (W )fu2 − K$0 (W )fu20 | 6 K$ (W )K$0 (W )|fu2 − fu20 | + (fu + fu0 )2 |K$ (W ) − K$0 (W )|
6 2f¯K$ (W )K$0 (W )|fu − fu0 | + 4f¯2 |K$ (W ) − K$0 (W )|
Using these relations we have |En [Sujk − Su0 jk ]| 6 (I) + (II) where
(I)
a
γuj }Zka |]
= En [|K$ (W )fu2 − K$0 (W )fu20 | · |{Zja − Z−j
2
6 maxi6n kZia k2∞ (1 + kγuj k1 )En [2f¯K$ (W )K$0 (W )|fu − fu0 | + 4f |K$ (W ) − K$0 (W )|]
√
6 (f¯ + f¯2 )C s maxi6n kZ a k2 {Lf ku − u0 k + En [|K$ (W ) − K$0 (W )|]}
i
(II)
∞
a
= En [K$0 (W )fu20 |Z−j
(γuj − γuj 0 )Zka |]
6 f¯2 En [kZ a k2∞ ]kγuj − γuj 0 k1
√
6 f¯2 En [kZ a k2∞ ] pLγ {ku − u0 k + k$ − $0 k1/2 }
Moreover, we have that maxi6n kZia k2∞ .P Mn2 . For dU = k · k, an uniform -cover of U satisfies
(6diam(U)/)1+dW > N (, U, k · k). We will set 1/ = (1 + f¯2 ){Lγ + Lf }2 pnMn2 log2 (p|V |n)/{µW f 2U } 6 pn3
so that with probability 1 − o(1), for any pair u, u0 ∈ U, ku − u0 k 6 , we have
√
|En [Sujk − Su0 jk ]| . (f¯ + f¯2 ) s maxi6n kZia k2∞ {Lf + En [|K$ (W ) − K$0 (W )|]}
√
+f¯2 En [kZia k2∞ ] pLγ { + 1/2 }
√
. δn n−1/2 {µW f 2U }1/2 + sMn log(n)En [|K$ (W ) − K$0 (W )|]
QUANTILE GRAPHICAL MODELS
37
by the choice of . To control the last term, note that W is a VC-class of events with VC dimension dW .
Thus by Lemma 19, with probability 1 − o(1)
En [|K$ (W ) − K$0 (W )|] 6 |(En − E)[|K$ (W ) − K$0 (W )|]| + E[|K$ (W ) − K$0 (W )|]
6
sup
|(En − E)[|K$ (W ) − K$0 (W )|]| + LK
$,$ 0 ∈W,k$−$ 0 k6
q
1/2 + dW log(n/)
+ LK
. dW log(n/)
n
n
which yields uniformly over u ∈ U and j ∈ [p]
1/2
|En [Sujk − Su0 jk ]| . δn n−1/2 µW f U
(C.41)
1/2
1/2
p
under dW log(n/)Mn log n = o(µW f U ) and dW log(n/)Mn log n = o(n1/2 µW f U ) assumed in Condition
CI. In turn this implies
|En [Sujk − Su0 jk ]|
6 δn n−1/2
sup
max
2 ]1/2
E[Sujk
|u−u0 |6 j,k∈[p],j6=k
2
since E[Sujk
] > cµW f 2U . Using the same choice of , similar arguments also imply
2
|E[Sujk
− Su20 jk ]|
6 δn
2 ]
E[Sujk
|u−u0 |6 j,k∈[p],j6=k
sup
max
(C.42)
To establish the last requirement of Condition WL(ii), note that
sup
max
u∈U j,k∈[p],j6=k
2
|(En − E)[Sujk
]| 6 sup
max
u∈U j,k∈[p],j6=k
2
|(En − E)[Sujk
]| + ∆n
(C.43)
2
where ∆n := supu,u0 ∈U ,ku−u0 k6 maxj,k∈[p],j6=k |(En − E)[Sujk
] − (En − E)[Su20 jk ]|.
To bound the first term, we will apply Corollary 2 with k = 1, Ub := U × [p] and the vector {(X̄)uj =
b In this case note that
Suj , (u, j) ∈ U}.
K 2 = E[max sup
max
i6n u∈U j,k∈[p],j6=k
2
Sujk
] 6 E[max
sup
i6n u∈U ,j∈[p]
|viuj |2 kfiu Zia k2∞ ] 6 f¯2 Mn2 L2n .
Therefore, by Corollary 2 and Markov inequality, we have with probability 1 − o(1) that
sup
max
u∈U j,k∈[p],j6=k
2
|(En − E)[Sujk
]| 6 Cn−1/2 Mn Ln log1/2 (p|V |n) 6 Cδn µW f U + ∆n
under Mn2 L2n log(p|V |n) 6 δn nµ2W f 2U .
To control ∆n , note that
2
2
2
|(En − E)[Sujk
] − (En − E)[Su20 jk ]| 6 |En [Sujk
− Su20 jk ]| + |E[Sujk
− Su20 jk ]|
2
6 En [|Sujk − Su0 jk |] supu∈U maxi6n |2Siu0 jk | + |E[Sujk
− Su20 jk ]|
−1/2 1/2
a
. δn n
µW f U f¯ supu∈U maxi6n |viuj |kZi k∞ + δn µW f 2U
1/2
. δn n−1/2 µW f U Mn Ln log n + δn µW f 2U
with probability 1−o(1) where we used (C.41) and (C.42). Therefore ∆n . δn µW f 2U with probability 1−o(1)
as required.
a
To verify Assumption C4(a), note that [∂θ Mu (Yu , X, θu ) − ∂θ Mu (Yu , X, θu , au )]0 δ = −fu2 K$ (W )r̄uj Z−j
δ,
so that by Cauchy-Schwartz, we have
En [∂θ Mu (Yu , X, θu ) − ∂θ Mu (Yu , X, θu , au )]0 δ
a
a
6 kfu r̄uj kn,$ kfu Z−j
δkn,$ 6 Cun kfu Z−j
δkn,$
38
BELLONI, CHEN, AND CHERNOZHUKOV
where we choose Cun so that {Cun > maxj∈[p] kfu r̄uj kn,$ : u ∈ U} with probability 1 − o(1). To bound Cun ,
by Lemma 4, uniformly over u ∈ U, j ∈ [p] we have with probability 1 − o(1)
a
kfu r̄uj kn,$ = kfu Z−j
(γuj − γ̄uj )kn,$ . f u {P($)}1/2 {n−1 s log(p|V |n)}1/2
so that setting Cun = f u {P($)}1/2 {n−1 s log(p|V |n)}1/2 suffices.
Next we show that Assumption C4(b) holds. First, by (C.43) and the corresponding bounds, note the
uniform convergence of the loadings
sup
u∈U ,j,k∈[p],j6=k
2
2
a
(|En [Sujk
] − E[Sujk
]| + |(En − E)[K$ (W )fu2 |Zja Z−jk
|2 ]|) 6 δn µW f 2U
2
2
En [Sujk
]/E[Sujk
]
so that
= 1 + oP (1). It follows that c̃ is bounded above by a constant for n large enough.
Indeed, uniformly over u ∈ U, j ∈ [p], since cf u 6 E[|fu vuj Zka |2 | $]1/2 6 Cf u , with probability 1 − o(1) we
b u0jj 6 Cf P($)1/2 so that c/C 6 kΨ
b u0 k∞ kΨ
b −1 k∞ 6 C/c.
have cf P($)1/2 6 Ψ
u
u
u0
a
θ)2 with
Assumption C4(c) follows directly from the choice of Mu (Yu , Xu , θ) = K$ (W )fu2 (Zja − Z−j
q̄Au = ∞.
The result for the rate of convergence then follows from Lemma 22, namely
r
r
b u0 k∞ s log(p|V |n)
f u P($)1/2 s log(p|V |n)
kΨ
0
j
j
+ Cun .
kfu Xu (b
γu − γu )kn,$ .
κ̄u,2c
n
κ̄u,2c
n
(C.44)
By Lemma 6 we have that for sparse vectors, kθk0 6 `n s satisfies
a
a
kfu Z−j
θk2n,$ /E[K$ (W )fu2 (Z−j
θ)2 ] = 1 + oP (1)
so that φmax (`n s, uj) 6 Cf 2u P($) and sbuj 6 minm∈Mu φmax (m, uj)L2u 6 Cs provided L2u . s{f 2u P($)}−1 .
b −1 k∞ 6 Cf −1 P($)−1/2 , so that Lu . f −1 P($)−1/2 n {Cun +
Indeed, with probability 1 − o(1), we have kΨ
u0
λ
u
u
Lun }. Moreover, we can take Cun . f u {P($)n−1 s log(p|V |n)}1/2 , and Lun . {n−1 s log(p|V |n)}1/2 in
Assumption C4 because
|{En [∂γ Mu (Yu , Xu , γ
buj ) − ∂γ Mu (Yu , Xu , γuj )]}0 δ|
γuj − γuj )}Xu0 δ]|
= 2|En [K$ (W )fu2 {Xu0 (b
0
j
j
6 2kfu Xu (b
γu − γu )kn,$ kfu Xu0 δkn,$ =: Lun kfu Xu0 δkn,$ ,
where the last inequality hold by (C.44) since κ̄u,2c > cf u {P($)}1/2 . The bound on the restricted eigenvalue
√
κ̄u,2c holds7 by arguments similar to (C.46) and using that kδk1 6 C skδk for any δ ∈ ∆u,2c , and since for
any kδk = 1, we have
cf u P($) 6 E[K$ (W )fu (Z a δ)2 ]
6 {E[K$ (W )fu2 (Z a δ)2 ]}1/2 {E[K$ (W )(Z a δ)2 ]}1/2
6 {E[K$ (W )fu2 (Z a δ)2 ]}1/2 C{P($)}1/2
where the first inequality follows from the definition of f u , kδk = 1, and Condition CI, so that we have
{E[K$ (W )fu2 (Z a δ)2 ]}1/2 > c0 f u {P($)}1/2 .
7Note that there are two restricted eigenvalues definitions, one used for the quantile regression (κ
u,2c ), and another used
here for the weighted lasso (κ̄u,2c ). It is a consequence of the use of different norms.
QUANTILE GRAPHICAL MODELS
Return to the rate of convergence we have by (C.44) and κ̄u,2c > cf u {P($)}1/2 that
r
r
f u P($)1/2 s log(p|V |n)
s log(p|V |n)
0
j
j
.
kfu Xu (b
γu − γu )kn,$ .
κ̄u,2c
n
n
39
(C.45)
and the result follows by noting that kfu Xu0 (b
γuj − γuj )kn,$ > cf u P($)1/2 kb
γuj − γuj k with probability 1 − o(1)
by arguments similar to (C.46) under Condition CI.
The sparsity result follows from Lemma 21. The result for Post Lasso follows from Lemma 20 under the
growth requirements in Condition CI.
Proof of Theorem 3. We will verify Assumptions C1 and C2, and the result follows from Theorem 5. The
estimate of the nuisance parameter is constructed from the estimators in Steps 1 and 2 of the Algorithm.
a
For each u = (a, τ, $) ∈ U and j ∈ [p], let Wuj = (W, Xa , Z a , vuj , ru ), where vuj = fu (Zja − Z−j
γuj ) and
let θuj ∈ Θuj = {θ ∈ R : |θ − βuj | 6 c/ log n} (Assumption C1(i) holds). The score function is
a
a
ψuj (Wuj , θ, ηuj ) = K$ (W ){τ − 1{Xa 6 Zja θ + Z−j
βu,−j + ru }}fu (Zja − Z−j
γuj )
where the nuisance parameter is ηuj = (βu,−j , γuj , ru ) and the last component is a function ru = ru (X).
Recall that K$ (W ) ∈ {0, 1} and let an = max(n, p, |V |). Define the nuisance parameter set Huj = {η =
(3)
(2)
(1)
(1) (2) (3)
(η (1) , η (2) , η (3) ) : kη − ηuj ke 6 τn } where kη − ηuj ke = k(δη , δη , δη )ke = max{kδη k, kδη k, E[|δη |2 ]1/2 },
and
s
τn := C sup
u∈U
1
1 ∧ fU
s log an
nµW
The differentiability of the mapping (θ, η) ∈ Θuj ×Huj 7→ Eψuj (Wuj , θ, η) follows from the differentiability
of the conditional probability distribution of Xa given XV \{a} and $. Let η = (η (1) , η (2) , η (3) ), δη =
(1)
(2)
(3)
(δη , δη , δη ), and θr̄ = θ + r̄δθ , ηr̄ = η + r̄δη .
To verify Assumption C1(v)(a) with α = 2, for any (θ, η), (θ̄, η̄) ∈ Θuj × Huj note that fXa |X−a ,$ is
uniformly bounded from above by f¯, therefore
6
a
f¯E[|Z−j
(η (2)
(2)
E[{ψuj (Wuj , θ, η) − ψuj (Wuj , θ̄, η̄)}2 ]1/2
a
a
(2) 2
(3)
(3)
a
+ f E[(Zj − Z−j η̄ ) {|η − η̄ | + |Z−j
(η (1) − η̄ (1) )| + |Zja (θ − θ̄)|}]1/2
a
+ f¯E[(Zja − Z−j
η̄ (2) )4 ]1/4 {E[|η (3) − η̄ (3) |2 ]1/4 + Ckη (1) − η̄ (1) k + |θ − θ̄|}1/2
1/2
6 C 0 |θ − θ̄|1/2 ∨ kη − η̄ke
2 1/2
− η̄ )| ]
6 Ckη (2) − η̄ (2) k
¯2
¯ 2 ]1/2 6 Ckξk
¯ for all vectors ξ,
¯ and the
for some constance C 0 < ∞ since by Condition CI we have E[|Z a ξ|
p
√
j
conditions supu∈U ,j∈[p] kγu k 6 C, supθ∈Θuj |θ| 6 C, and s log(an ) 6 δn n. This implies that kη (2) −
(2)
(2)
η̄ (2) k 6 kη (2) − ηuj k + kηuj − η̄ (2) k 6 1 so that kη (2) − η̄ (2) k 6 kη (2) − η̄ (2) k1/2 .
(1)
(3)
a
To verify Assumption C1(v)(b), let tr̄ = Zja θr̄ + Z−j
ηr̄ + ηr̄ . We have
∂r E(ψuj (Wuj , θ + rδθ , η + rδη ))|r=r̄ =
(2)
(3)
a
a (1)
−E[K$ (W )fXa |X−a ,$ (tr̄ )(Zja − Z−j
ηr̄ ){Zja δθ + Z−j
δη + δη }]
a (2)
−E[K$ (W ){τ − FXa |X−a ,$ (tr̄ )}Z−j
δη ]
40
BELLONI, CHEN, AND CHERNOZHUKOV
Applying Cauchy-Schwartz we have that
∂r E(ψuj (Wuj , θ + rδθ , η + rδη ))|r=r̄
(2)
(3)
a
a (1) 2 1/2
a (2) 2 1/2
6 f¯E[(Zja − Z−j
ηr̄ )2 ]1/2 {E[(Zja )2 ]1/2 |δθ | + E[(Z−j
δη ) ] + E[|δη |2 ]1/2 } + f¯E[(Z−j
δη ) ]
6 B̄1n (|δθ | ∨ kη − ηuj ke )
where B̄1n 6 C by the same arguments of bounded (second) moments of linear combinations.
Assumption C1(v)(c) follows similarly as
∂r2 E(ψuj (Wuj , θ + rδθ , η + rδη )) r=r̄ =
(2)
(3)
0
a
a (1)
−E[K$ (W )fX
(tr̄ )(Zja − Z−j
ηr̄ ){Zja δθ + Z−j
δη + δη }2 ]
a |X−a ,$
(2)
(1)
(3)
a
a
+2E[K$ (W )fXa |X−a ,$ (tr̄ )(Z−j
δη ){Zja δθ + Z−j
δη + δη }]
0
and under |fX
| 6 f¯0 , from Cauchy-Schwartz inequality we have
a |X−a ,$
∂r2 E(ψuj (Wuj , θ + rδθ , η + rδη )) r=r̄
(3)
(2)
a
a (1) 4 1/2
ηr̄ )2 ]1/2 {E[(Zja )4 ]|δθ |2 + E[(Z−j
δη ) ] } + CE[{δη }2 ]
6 |f¯n0 E[(Zja − Z−j
(3)
a (1) 2 1/2
a (2) 2 1/2
δη ) ] + E[{δη }2 ]1/2 }
+2f¯E[(Z−j
δη ) ] {E[(Zja )2 ]1/2 |δθ | + E[(Z−j
6 B̄2n (δθ2 ∨ kη − ηuj k2e )
where B̄2n 6 C(1 + f¯n0 ) by the same arguments of bounded (fourth) moments as before and using that
(3)
(3)
(2)
(3)
(2)
(3)
a
a
ηr̄ )2 (δη )2 ]}1/2 E[(δη )2 ]1/2 6 CE[(δη )2 ].
|E[(Zja − Z−j
ηr̄ )(δη )2 ]| 6 {E[(Zja − Z−j
To verify the near orthogonality condition, note that for all u ∈ U and j ∈ [p], since by definition
fu = fXa |X−a ,$ (Z a βu + ru ) we have
(2)
a
|Du,j,0 [η̃uj − ηuj ]| = | − E[K$ (W )fu {Z−j
(η̃ (2) − ηuj ) + ru }vuj ]| 6 δn n−1/2
a
a
by the relations E[K$ (W )(τ − FXa |X−a ,$ (Z a βu + ru ))Z−j
] = 0 and E[K$ (W )fu Z−j
vuj ] = 0 implied by the
−1/2
model, and |E[K$ (W )fu ru vuj ]| 6 δn n
by Condition CI. Thus, condition (H.79) holds.
Furthermore, since Θuj ⊂ θuj ± C/ log n, for Juj = ∂θ E[ψuj (Wuj , θuj , ηuj )] = E[K$ (W )fu Zja vuj ] =
2
2
a
E[K$ (W )vuj
] = E[vuj
|$]P($) as E[K$ (W )fu Z−j
vuj ] = 0, we have that for all θ ∈ Θuj
1
E[ψuj (Wuj , θ, ηuj )] = Juj (θ − θuj ) + ∂θ2 E[ψuj (Wuj , θ̄, ηuj )](θ − θuj )2
2
2
0
a 2
¯
where |∂θ E[ψuj (Wuj , θ̄, ηuj )]| 6 f E[|Zj | |vuj | | $]P($) 6 f¯0 E[|Zja |4 |$]1/2 E[|vuj |2 |$]1/2 P($) 6 C f¯0 P($)
so that for all θ ∈ Θuj
2
|E[ψuj (Wuj , θ, ηuj )]| > {|E[vuj
| $]| − (C 2 f¯0 )/ log n}P($)|θ − θuj |
and we can take jn > c inf $∈W P($) = cµW .
Next we verify Assumption C2 with Hujn = {η = (β, γ, 0) : kβk0 6 Cs, kγk0 6 Cs, kβ − βu,−j k 6
√
Cτn , kγ − γuj k 6 Cτn , kγ − γuj k1 6 C sτn }. We will show that ηbuj = (βeu,−j , γ
euj , 0) ∈ Hujn with probability
1 − o(1), uniformly over u ∈ U and j ∈ [p].
Under Condition CI and the choice of penalty parameters, by Theorems 1 and 2, with probability 1−o(1),
uniformly over u ∈ U we have
kβeu − βu k 6 Cτn , max sup ke
γuj − γuj k 6 Cτn , and max sup ke
γuj k0 6 C̄s,
j∈[p] u∈U
j∈[p] u∈U
QUANTILE GRAPHICAL MODELS
41
further by thresholding we can achieve supu∈U kβeu k0 6 C̄s using Lemma 17.
Next we establish the entropy bounds. For η ∈ Hujn we have that
a
a
ψuj (Wuj , θ, η) = K$ (W )(τ − 1{Xa 6 Zja θ + Z−j
β−j })fu {Zja − Z−j
γ}
It follows that F1 ⊂ WG1 G2 G3 ∪ F¯0 where F¯0 = {ψuj (Wuj , θ, ηuj ) : u ∈ U, j ∈ [p], θ ∈ Θuj }, G1 = {τ −1{Xa 6
Z a β} : kβk0 6 Cs, τ ∈ T , a ∈ V }, G2 = {Z a → Z a (1, −γ), kγk0 6 Cs, kγk 6 C, a ∈ V }, G3 = {fu : u ∈ U }.
Under Condition CI, W is a VC class of sets with VC index dW (fixed). It follows that G1 and G2 are p
choose O(s) VC-subgraph classes with VC indices at most O(s). Therefore, ent(G1 ) ∨ ent(G2 ) ∨ ent(W) 6
Cs log(an /) + CdW log(e/) by Theorem 2.6.7 in [72] and by standard arguments. Also, since fu is Lipschitz
in u by Condition CI, we have ent(G3 ) 6 (1 + dW ) log(an Lf /). Moreover, an envelope FG for F1 satisfies
E[FGq ]
a
(γ − γuj )|q ]
= E[supu∈U ,j∈[p],kγ−γuj k1 6C √sτn |vuj − fu Z−j
√
6 2q−1 E[supu∈U ,j∈[p] |vuj |q ] + 2q−1 f¯E[maxa∈V kZ a kq∞ ]{C sτn }q
√
6 2q−1 Lq + 2q−1 f¯{Mn C sτn }q 6 2q Lq
n
n
√
since Mn C sτn 6 δn Ln /f¯ and δn 6 1 for n large.
Next we bound the entropy in F¯0 . Note that for any ψuj (Wuj , θ, ηuj ) ∈ F¯0 , there is some δ ∈ [−C, C]
such that
ψuj (Wuj , θ, ηuj ) = K$ (W ){τ − 1{Xa 6 Zja δ + QXa (τ | X−a , $)}}vuj
and therefore F¯0 ⊂ W{T − φ(V)}L where φ(t) = 1{t 6 0}, V = ∪a∈V,j∈[p] Vaj with
Vaj := {Xa − Zja δ − QXa (τ | X−a , $) : τ ∈ T , $ ∈ W, |δ| 6 C},
a
and L = ∪a∈V,j∈[p] (Laj + {vūj }) where Laj = {(X, W ) 7→ vuj − vūj = fu Z−j
(γuj − γūj ) : u ∈ U }. Note that
each Vaj is a VC subgraph class of functions with index 1 + CdW as {QXa (τ |X−a , $) : (τ, $) ∈ W × T } is
a VC-subgraph with VC-dimension CdW for every a ∈ V . Since φ is monotone, φ(V) is also the union of
VC-dimension of order 1 + CdW .
Letting F1 = 1 be an envelope for W and T −φ(V). By Lemma 5, it follows that kγuj −γuj 0 k 6 Lγ {ku−u0 k+
k$ − $0 k1/2 } for some Lγ satisfying log(Lγ ) 6 C log(p|V |n) under Condition CI. Therefore, |vuj − vūj | =
√
a
|Z−j
(γuj − γūj )| 6 kZ a k∞ pkγuj − γūj k. For a choice of envelope Fa = Mn−1 kZ a k∞ + 2 supu∈U |vuj | which
satisfies kFa kP,q . Ln , we have
log N (kFa kQ,2 , Laj , k · kQ,2 ) 6 log N ( Mn k kZ a k∞ kQ,2 , Laj , k · kQ,2 )
√
6 log N (/{Mn pLγ }, U, | · |) 6 Cdu log(Mn pLγ /)
Since L = ∪a∈V,j∈[p] (Laj + {vūj }), taking FL = maxa∈V Fa , we have that
log N (kFL F1 kQ,2 , F̄0 , k · kQ,2 ) 6 log N ( 4 kF1 kQ,2 , W, k · kQ,2 ) + log N ( 4 kF1 kQ,2 , T − φ(V), k · kQ,2 )
P
+ log a∈V,j∈[p] N ( 2 kFa kQ,2 , Laj , k · kQ,2 )
6 log(p|V |) + 1 + C 0 {dW + du } log(4eMn |V |pLγ /)
where the last line follows from the previous bounds.
Next we verify the growth conditions in Assumption C2 with the proposed F1 and Kn . CLn . We
take sn(U ,p) = (1 + dW )s and an = max{n, p, |V |}. Recall that B̄1n 6 C, B̄2n 6 C, jn > cµW .
√
√ s log(p|V |n)
Thus, we have n(τn /jn )2 . n n(1∧f
6 δn under s2 log2 (p|V |n) 6 n(1 ∧ f 4U )µ6W . Moreover,
2 )µ3
U
W
42
BELLONI, CHEN, AND CHERNOZHUKOV
α/2
(τn /jn )
p
sn(U ,p) log(an ) .
r
4
(1+dW )3 s3 log3 (p|V |n)
n(1∧f 2 )µ3W
U
. δn under dW fixed and s3 log3 (p|V |n) 6 δn4 n(1 ∧
1
1
1
f 2U )µ3W and sn(U ,p) n− 2 Kn log(an ) log n . (1 + dW )sn q − 2 Mn log(p|V |n) log n 6 δn under our conditions.
Finally, the conditions of Corollary 4 hold with ρn = (1 + dW ) since the score is the product of VC-subgraph
classes of function with VC index bounded by C(1 + dW ).
0
Proof of Theorem 4. We will invoke Lemma 7 with β̄u as the estimand and riu = Xi,−a
(βu − β̄u ), therefore
0
E[K$ (W )(τ − 1{Xa 6 X−a β̄u + ru })X−a ] = 0. To invoke the lemma we verify that the events Ω1 , Ω2 , Ω3
and Ω4 hold with probability 1 − o(1)
Ω1
Ω2
Ω3
Ω4
X
:= {λu > c|Suj |/b
σa$j
, for all u ∈ U, j ∈ V },
bu (β̄u ) 6 R̄uξ : u ∈ U}
:= {
R
n
:= supu∈U ,1/√n6kδk1,$ 6√n |En [gu (δ, X, W ) − E[gu (δ, X, W ) | X−a , W ]]|/kδk1,$ 6 t3
o
X
:= {Ku σ
ba$j
> |En [huj (X−a , W )]|, for all u ∈ U, j ∈ V \{a}}
0
0
(β̄u + δ)) − ρτ (Xa − X−a
β̄u )}, huj (X−a , W ) = E[K$ (W ){τ −
where gu (δ, X, W ) = K$ (W ){ρτ (Xa − X−a
0
FXa |X−a ,W (X−a β̄u + ru )}Xj | X−a , W ].
p
By Lemma 8 with ξ = 1/n, by setting λu = λ0 = c2(1 + 1/16) 2 log(8|V |2 {ne/dW }2dW n)/n, we have
P(Ω1 ) = 1 − o(1). By Lemma 9, setting R̄uξ = Cs(1 + dW ) log(|V |n)/n we have P(Ω2 ) = 1 − o(1) for some
p
ξ = o(1). By Lemma 10 weqhave P(Ω3 ) = 1 − o(1) by setting t3 := C (1 + dW ) log (|V |nMn /ξ). Finally,
(1+dW ) log(|V |n)
n
we have P(Ω4 ) = 1 − o(1).
√
√
√
√
1
R̄uξ = o( n) for all u ∈ U.
Moreover, we have that kβ̄u k1,$ 6 skβ̄u k2,$ 6 C s = o( n) and λu (1−1/c)
Finally, we verify condition (F.64) holds for all
p
p
0
vkn,$ > C s(1 + dW ) log(n|V |)/n/κu,2c },
δ ∈ Au := ∆u,2c ∪ {v : kvk1,$ 6 2cR̄uξ /λu , k fu X−a
√
p
u
q̄Au /4 > ( f¯ + 1)kru kn,$ + [λu + t3 + Ku ] κ3cu,2cs and q̄Au > {2c 1 + t3 +K
R̄uγ }1/2 .
λu
by Lemma 11 with Ku = C
0
0
]. By Lemma 6, with probability
] and E[K$ (W )fu X−a X−a
Consider the matrices En [K$ (W )fu X−a X−a
p
√
1 − o(1), it follows that we can take η = ηn = CMn s(1 + dW ) log(|V |n) log(1 + s){log n}/ n and Dkk = 2η
√
in Lemma 16. (Note that we increase δn by a factor of log n.) Therefore, with at least the same probability
we have (taking s > 2)
0
0
δ 0 En [K$ (W )fu X−a X−a
]δ > δ 0 E[K$ (W )fu X−a X−a
]δ − 4ηkδk21 /s
(C.46)
and by definition of f u we have
0
0
En [K$ (W )fu |X−a
δ|2 ] > f u E[K$ (W )|X−a
δ|2 ] − 4ηkδk21 /s > cf u P($)kδk2 − 4ηkδk21 /s.
√
For δ ∈ ∆u,2c we have kδk1 6 Ckδk1,$ /{P($)}1/2 6 C 0 kδTu k1,$ /{P($)}1/2 6 C 0 skδTu k2 . Note that we
p
can assume kδk > c s(1 + dW ) log(n|V |)/n otherwise we are done. So that for δ ∈ Au \∆u,2c we have that
p
p
√
kδk1 /kδk2 6 Cs log(|V |n)/n/ s(1 + dW ) log(n|V |)/n 6 C 0 s.
Similarly we have
0
0
En [K$ (W )|X−a
δ|2 ] 6 E[K$ (W )|X−a
δ|2 ] + 4ηkδk21 /s 6 CP($)kδk2 − 4ηkδk21 /s.
(C.47)
QUANTILE GRAPHICAL MODELS
43
Under the condition that η = o(f U µW ), which holds by Condition P, for n sufficiently large we have with
probability 1 − o(1) that
0
0
En [K$ (W )fu |X−a
δ|2 ]3/2
En [K$ (W )fu |X−a
δ|2 ]3/2
c
c
> ¯0 inf
>
inf
0 δ|3 ]
0 δ|2 ] max
f δ∈Au En [K$ (W )|X−a
f¯0 δ∈Au En [K$ (W )|X−a
i6n kXi k∞ kδk1
0
2 3/2
0 3/2
{c f u P($)kδk }
c f u P($)1/2 kδk
c
c
> ¯0 inf
> ¯0 inf
f δ∈Au C 0 P($)kδk2 maxi6n kXi k∞ kδk1
f δ∈Au C 0 maxi6n kXi k∞ kδk1
3/2
1/2
f
µW
> C 00 U¯0 √
s maxi6n kXi k∞
f
q̄Au
(C.48)
where maxi6n kXi k∞ 6 `n Mn with probability 1 − o(1) for any `n → ∞. Therefore, under the condition
p
√
Mn s log(p|V |n) = o( nµW ) assumed in Condition P, the conditions on q̄Au are satisfied.
By Lemma 7, we have uniformly over all u = (a, τ, $) ∈ U := V × T × W
r
p
0
k fu X−a
(βbu − βu )kn,$ 6 C
r
√
(1 + dW ) log(n|V |)
(1 + dW ) log(n|V |) s
s
b
and kβu − βu k1,$ 6 C
n
κu,2c
n
κu,2c
where κu,2c is bounded away from zero with probability 1 − o(1) for n sufficiently large. Consider the
thresholded estimators βbuλ̄ for λ̄ = {(1 + dW ) log(n|V |)/n}1/2 . By Lemma 17 we have kβbuλ̄ k0 6 Cs and the
same rates of convergence as βbu . Therefore, by refitting over the support of βbuλ̄ we have by Lemma 14,
b u 6 λu kβbuλ̄ − βu k1,$ . Cs(1 +
the estimator βeu has the same rate of convergence where we used that Q
dW ) log(|V |n)/n (the other conditions of Lemma 14 hold as for the conditions in Lemma 7).
Next we will invoke Lemma 7 for the new penalty choice and penalty loadings. (We note that minor
modifications cover the new penalty loadings.)
Ω1
Ω2
2
:= {λu > c|Suj |/{En [Kw (W )ε2u X−a,j
]}1/2 , for all u ∈ U, j ∈ V },
bu (β̄u ) 6 R̄uξ : u ∈ U}
:= n
{R
Ω3
:= supu∈U ,1/√n6kδk1,$ 6√n |En [gu (δ, X, W ) − E[gu (δ, X, W )|X−a , W ]]|/{θu kδk1,$ } 6 t3
Ω4
Ω5
X
:= {Ku θu σ
ba$j
> |En [huj (X−a , W )]|, for all u ∈ U, j ∈ V \{a}}
X
:= {θu > maxj∈V σ
ba$j
/{En [K$ (W )ε2u Xj2 ]}1/2 }
o
where event Ω5 simply makes the relevant norms equivalent, k · k1,u 6 k · k1,$ 6 θu k · k1,u . Note that we can
always take θu 6 1/{τ (1 − τ )} 6 C since T is a fixed compact set.
Next we show that the bootstrap approximation of the score provides a valid choice of penalty parameter.
0 e
Let εbu := 1{Xa 6 X−a
βu } − τ . For notational convenience for u ∈ U, j ∈ V \{a} define
ψ̄iuj =
K$ (Wi )εiu Xij
K$ (Wi )b
εiu Xij
K$ (Wi )εiu Xij
, ψiuj =
, ψbiuj =
.
2
2
2
2
1/2
1/2
E[K$ (W )εu Xj ]
En [K$ (W )εu Xj ]
En [K$ (W )b
ε2u Xj2 ]1/2
We will consider the following processes:
n
S̄uj =
√1
n
Pn
i=1 ψ̄iuj , Suj =
√1
n
Pn
i=1 ψiuj , G uj =
√1
n
1 X b
b
gi ψiuj ,
i=1 gi ψ̄iuj , Guj = √
n i=1
Pn
and N is a tight zero-mean Gaussian process with covariance operator given by E[ψ̄uj ψ̄u0 j 0 ]. Their supremum
∗
b∗ :=
are denoted by Z̄S := supu∈U ,j∈V \{a} |S̄uj |, ZS := supu∈U ,j∈V \{a} |Suj |, Z̄G
:= supu∈U ,j∈V \{a} |G uj |, Z
G
supu∈U ,j∈V \{a} |Gbuj |, and ZN := supu∈U ,j∈V \{a} |Nuj |.
44
BELLONI, CHEN, AND CHERNOZHUKOV
b∗ . We have that
The penalty choice should majorate ZS and we simulate via Z
G
b∗ 6 t)| 6 |P(ZS 6 t) − P(Z̄S 6 t)| + |P(Z̄S 6 t) − P(ZN 6 t)|
|P(ZS 6 t) − P(Z
G
∗
∗
b∗ 6 t)|
+|P(ZN 6 t) − P(Z̄G
6 t)| + |P(Z̄G
6 t) − P(Z
G
We proceed to bound each term. We have that
|ZS − Z̄S | 6 Z̄S
sup
u∈U ,j∈V \{a}
6 Z̄S
sup
u∈U ,j∈V \{a}
E[K$ (W )ε2u Xj2 ]1/2
−1
En [K$ (W )ε2u Xj2 ]1/2
(En − E)[K$ (W )ε2u Xj2 ]
En [K$ (W )ε2u Xj2 ]1/2 {En [K$ (W )ε2u Xj2 ]1/2 + E[K$ (W )ε2u Xj2 ]1/2 }
0
Therefore, since {1{Xa 6 X−a
βu } : u ∈ U} is a VC-subgraph of VC dimension 1 + dW , and W is a VC class
of sets of dimension dW , we apply Lemma 19 with envelope F = kXk2∞ and σ 2 6 maxj∈V E[Xj4 ] 6 C to
obtain with probability 1 − o(1)
r
(1 + dW ) log(|V |n) Mn2 (1 + dW ) log(|V |n)
2 2
0
+
sup
|(En − E)[K$ (W )εu Xj ]| . δ1n :=
n
n
u∈U ,j∈V \{a}
where δ1n = o(µ2W ) under Condition P. Note that this implies that the denominator above is bounded away
from zero by cµW . Therefore,
0
|ZS − Z̄S | .P δ1n := Z̄S δ1n
/µW .
4
where Z̄S .P {(1 + dW ) log(n|V |)}1/2 . By Theorem 2.1 in [27], since E[ψ̄uj
] 6 C, there is a version of ZN
such that
!
1/3
Mn (1 + dW ) log(n|V |) Mn ((1 + dW ) log(n|V |))2/3
|Z̄S − ZN | .P δ2n :=
+
n1/2
n1/6
and by Theorem 2.2 in [27], there is also a version of
1/2
|ZN −
∗
Z̄G
|
.P
Mn (1 + dW ) log(n|V |) Mn ((1 + dW ) log(n|V |))3/4
+
n1/2
n1/4
!
Finally, we have that
n
X
∗
b∗ | 6 sup √1
|Z̄G
−Z
gi (ψbiuj − ψ̄iuj )
G
n i=1
u∈U ,j
Pn
where conditional on (Xi , Wi ), i = 1, . . . , n, √1n i=1 gi (ψbiuj − ψ̄iuj ) is a zero-mean Gaussian with variance
En [(ψbiuj − ψ̄iuj )2 ] 6 δ̄ 2 . Next we bound δ̄n . We have
n
δ̄n
6 En [(ψbuj − ψuj )2 ]1/2 + En [(ψuj − ψ̄uj )2 ]1/2 6 En [(ψbuj − ψuj )2 ]1/2 + δ1n /µW ,
and
En [(ψbuj − ψuj )2 ]1/2
En [(K$ (W )Xij |b
εu −εu |)2 ]1/2
2 ε
En [K$ (W )Xij
b2u ]1/2
2 2 1/2
En [K$ (W )Xij
εu ]
2 2 1/2
+
|En [K$ (W )Xij
εbu ]
cP($)
6
6
2
En [K$ (W )Xij
|b
εu
2 1/2
− εu | ]
2 2 1/2
− En [K$ (W )Xij
εu ] |
1
2 ε
En [K$ (W )Xij
b2u ]1/2
+
2 2 1/2
εu ]
En [K$ (W )Xij
cP($)
,
note that the term in the curly brackets is bounded by C/P($)1/2 with probability 1 − o(1). To bound the
0 e
0
0 e
other term note that |b
εu − εu |2 = |1{Xa 6 X−a
βu } − 1{Xa 6 X−a
βu }|. Note that εbu = 1{Xa 6 X−a
βu } − τ
QUANTILE GRAPHICAL MODELS
45
0 e
0
where kβeu k0 6 Cs. Therefore, we have {1{Xa 6 X−a
βu } : u ∈ U} ⊂ {1{Xa 6 X−a
β} : kβk0 6 Cs} which
|V |
0
is the union of Cs VC subgraph classes of functions with VC dimension C s. Moreover, we have
2
E[K$ (W )Xij
|b
εu − εu |2 ]
2
0 e
0
= E[K$ (W )Xij
|1{Xa 6 X−a
βu } − 1{Xa 6 X−a
βu }|]
0
2
e
¯
6 f E[K$ (W )Xij |X−a (βu − βu )|]
0
4 1/2
] E[K$ (W )|X−a
(βeu − βu )|2 ]1/2
6 f¯E[K$ (W )Xij
p
6 C(f¯/f 1/2
)P($)1/2 s(1 + dW ) log(n|V |)/n
U
Therefore, by Lemma 19, with probability 1 − o(1) we have
r
p
s(1 + dW ) log(n|V |)
2
2
(En − E)[K$ (W )Xij |b
εu − εu | ] .
C(f¯/f 1/2
) s(1 + dW ) log(n|V |)/n
U
n
p
Under s(1 + dW ) log(n|V |)/n = o(f U µW ) we have that with probability 1 − o(1) that
δ̄n 6 C{s(1 + dW ) log(n|V |)/n}1/4 .
Therefore, using again the sparsity of βeu in the definition of ψbiuj
n
sup
u∈U ,j∈V \{a}
1 X
√
gi (ψbiuj − ψ̄iuj )
n i=1
.P δ̄n
p
s(1 + dW ) log(|V |n)
.P δ3n := {s log(|V |n)/n}1/4
p
s(1 + dW ) log(|V |n)
The rest of the proof follows similarly to Corollary 2.2 in [14] since under Condition P (and the bounds
above) we have that rn := δ1n + δ2n + δ3n = o({E[ZN ]}−1 )) where E[ZN ] . {(1 + dW ) log(|V |n)}1/2 . Then
b∗ 6 t)| = oP (1) which in turn implies that
we have supt |P(ZS 6 t) − P(Z
G
P(Ω1 )
= P(ZS 6 b
c∗G (ξ))
∗
b∗ 6 b
> P(ZbG
6b
c∗G (ξ)) − |P(ZS 6 b
c∗G (ξ)) − P(Z
c∗G (ξ))|
G
> 1 − ξ + oP (1)
Note that the occurrence of the events Ω2 , Ω3 and Ω4 follows by similar arguments. The result follows by
Lemma 7, thresholding and applying Lemma 17 and Lemma 14 similarly to before.
Appendix D. Technical Lemmas for Conditional Independence Quantile Graphical Model
Let u = (a, τ, $) ∈ U := V × T × W, and Tu = support(βu ) where |Tu | 6 s for all u ∈ U.
Define the pseudo-norms
n
kvk2n,$
1X
:=
K$ (Wi )(vi )2 ,
n i=1
kδk2,$
1/2
p
X
Z
:=
{b
σa$j
}2 |δj |2
,
j=1
and kδk1,$ :=
p
X
Z
σ
ba$j
|δj |,
j=1
Z
where σ
ba$j
= {En [{K$ (W )Zja }2 ]}1/2 . These pseudo-norms induce the following restricted eigenvalue as
√
k fu Z a δkn,$
√ .
κu,c =
min
kδTuc k1,$ 6ckδTu k1,$ kδk1,$ / s
The restricted eigenvalue κu,c is an counterpart of the restricted eigenvalue proposed in [21] for our setting.
We note that κu,c typically will vary with the events $ ∈ W.
46
BELLONI, CHEN, AND CHERNOZHUKOV
We will consider three key events in our analysis. Let
Z
Ω1 := {λu > c|Suj |/b
σa$j
, for all u ∈ U, j ∈ [p]}
(D.49)
which occurs with probability at least 1−ξ by the choice of λu . For CIQGMs, we have Suj := En [K$ (W )(τ −
p
1{Xa 6 Z a βu +ru })Zja ], and λu = λV T W τ (1 − τ ). (In the case of PQGMs, we have Suj := En [K$ (W )(τ −
0
X
2
1{Xa 6 X−a
βu })X−a ], σ
ba$j
= {En [K$ (W )X−a,j
]}1/2 and λu = λ0 .)
To define the next event, for each u ∈ U, consider the function defined as
bu (βu ) = En [K$ (W ){ρu (Xa − Z a β) − ρu (Xa − Z a βu − ru ) − (τ − 1{Xa 6 Z a βu + ru })(Z a β − Z a βu − ru )}]
R
bu (βu ) > 0.
in the case of CIQGMs. (In the case of PQGMs, we replace Z a with X−a .) By convexity we have R
The event
bu (βu ) 6 R̄uξ : u ∈ U}
Ω2 := {R
(D.50)
where R̄uξ are chosen so that Ω2 occurs with probability at least 1 − ξ. Note that by Lemma 2,
bu (βu ) 6 R̄uξ :=
bu (βu )|X−a , W ]] 6 f¯kru k2n,$ /2 and with probability at least 1 − ξ, R
we have En [E[R
p
4 max{f¯kru k2n,$ , kru kn,$ C log(n1+dW p/ξ)/n} 6 C 0 s log(n1+dW p/ξ)/n.
Define gu (δ, X, W ) = K$ (W ){ρτ (Xa − Z a (βu + δ)) − ρτ (Xa − Z a βu )} so that event Ω3 is defined as
)
(
|En [gu (δ, X, W ) − E[gu (δ, X, W )|X−a , W ]]|
6 t3
(D.51)
Ω3 :=
sup
√
√
kδk1,$
u∈U ,1/ n6kδk1,$ 6 n
where t3 is given in Lemma 3 so that Ω3 holds with probability at least 1 − ξ.
√
1+1/c
1
kβu k1,$ + λu (1−1/c)
R̄uξ 6 n for all
Lemma 1. Suppose that Ω1 , Ω2 and Ω3 holds. Further assume 2 1−1/c
p
¯
u ∈ U, and (F.64) holds for all
δ ∈ Au := ∆u,2c ∪ {v : kvk1,$ 6 2cR̄uξ /λu }, q̄Au /4 > ( f + 1)kru kn,$ +
√
[λu + t3 ] κ3cu,2cs and q̄Au > {2c 1 + λt3u R̄uξ }1/2 . Then uniformly over all u ∈ U we have
√
k fu Z a (βbu − βu )kn,$
kβbu − βu k1,$
r
6 8c 1 + λt3u R̄uξ + (f¯1/2 + 1)kru kn,$ +
√ √
6 (1 + 2c) sk fu Z a δu kn,$ /κu,2c + λ2cu R̄uξ
√
3cλu s
κu,2c
√
s
+ t3 (1+c)
κu,2c
Proof of Lemma 1. Let u = (a, τ, $) ∈ U and δu = βbu − βu . By convexity and definition of βbu we have
bu (βbu ) − R
bu (βu ) + Su0 δu
R
= En [K$ (W )ρu (Xa − Z a βbu )] − En [K$ (W )ρu (Xa − Z a βu )]
6 λu kβu k1,$ − λu kβbu k1,$
(D.52)
Z
where Su is defined as in (D.49) so that under Ω1 we have λu > c|Suj |/b
σa$j
.
bu (βbu ) > 0, we have
Under Ω1 ∩ Ω2 , and since R
bu (βu ) −
−R
λu
c kδu k1,$
bu (βu + δu ) − R
bu (βu ) + En [K$ (W )(τ − 1{Xa 6 Z a βu + ru })Z a δu ]
6R
= En [K$ (W )ρu (Xa − Z a (δu + βu ))] − En [K$ (W )ρu (Xa − Z a βu )]
6 λu kβu k1,$ − λu kδu + βu k1,$
so that for c = (c + 1)/(c − 1)
kδTuc k1,$ 6 ckδTu k1,$ +
c
bu (βu ).
R
λu (c − 1)
(D.53)
QUANTILE GRAPHICAL MODELS
47
To establish that δu ∈ Au := ∆u,2c ∪ {v : kvk1,$ 6 2cR̄uξ /λu } we consider two cases. If kδTuc k1,$ >
2ckδTu k1,$ we have
1
c
bu (βu )
kδTuc k1,$ 6
R
2
λu (c − 1)
and consequentially
2c b
Ru (βu ).
kδu k1,$ 6 {1 + 1/(2c)}kδTuc k1,$ 6
λu
Otherwise, we have kδTuc k1,$ 6 2ckδTu k1,$ which implies
√ p
kδu k1,$ 6 (1 + 2c)kδTu k1,$ 6 (1 + 2c) sk fu Z a δu kn,$ /κu,2c
by definition of κu,2c . Thus we have δu ∈ Au under Ω1 ∩ Ω2 .
Furthermore, (D.53) also implies that
kδu + βu k1,$
bu (βu )/λu
6 kβu k1,$ + 1c kδu k1,$ + R
bu (βu )/λu .
6 (1 + 1/c)kβu k1,$ + (1/c)kδu + βu k1,$ + R
which in turn establishes
1
1
1 + 1/c
bu (βu ) 6 2 1 + 1/c kβu k1,$ +
kβu k1,$ +
R
R̄uξ
kδu k1,$ 6 2
1 − 1/c
λu (1 − 1/c)
1 − 1/c
λu (1 − 1/c)
√
where the last inequality holds under Ω2 . Thus, kδu k1,$ 6 n under our condition. In turn, δu is considered
in the supremum that defines Ω3 .
Under Ω1 ∩ Ω2 ∩ Ω3 we have
En [E[K$ (W ){ρu (Xa − Z a (βu + δu )) − ρu (Xa − Z a βu )} | X−a , W ]
6 En [K$ (W ){ρu (Xa − Z a (βu + δu )) − ρu (Xa − Z a βu )}] + t3 kδu k1,$
6 λu kδ
u k1,$ + t3 kδu k1,$√
√
6 2c 1 + λ1u t3 R̄uξ + k fu Z a δu kn,$ [λu + t3 ] κ3cu,2cs
√ √
here we used the bound kδu k1,$ 6 (1 + 2c) sk fu Z a δu kn,$ /κu,2c +
2c
λu R̄uξ
(D.54)
under Ω1 ∩ Ω2 .
Using Lemma 12, since (F.64) holds, we have for each u ∈ U
En [E[K$ (W ){ρu (Xa − Z a (βu + δu )) − ρu (Xa − Z a βu )} | X−a , W ]
p
√
Z
> −( f¯ + 1)kru kn,$ k fu Z a δu kn,$ − supu∈U ,j∈[p] |En [E[Suj |X−a , W ]/b
σa$j
]| kδu k1,$
√
a
2
√
k fu Z δu kn,$
+
∧ {q̄Au k fu Z a δu kn,$ }
4
here we have E[Siuj |Xi,−a , Wi ] = 0 since τ = P(Xa 6 Z a βu + ru |X−a , W ) by the definition of conditional
quantile.
Note that for positive numbers (t2 /4) ∧ qt 6 A + Bt implies t2 /4 6 A + Bt provided q/2 > B and 2q 2 > A.
2
2
(Indeed, otherwise (t2 /4) > qt so that
in turn implies that
h t > 4q which
2q + qt/2 6 (t /4) ∧ qt 6 A + Bt.)
√ i
p
Since q̄A /4 > ( f¯ + 1)kru kn,$ + {λu + t3 } 3c s and q̄A > {2c 1 + t3 R̄uξ }1/2 , the minimum on the
κu,2c
u
u
λu
right hand side is achieved by the quadratic part for all u ∈ U. Therefore we have uniformly over u ∈ U
√
q
√
p
k fu Z a δu k2n,$
t3
3c s
6 2c 1 +
R̄uξ + k fu Z a δu kn,$ ( f¯ + 1)kru kn,$ + {λu + t3 }
4
λu
κu,2c
which implies that
√
k fu Z a δu kn,$
6
r
8c 1 +
t3
λu
hp
√ i
R̄uξ + ( f¯ + 1)kru kn,$ + {λu + t3 } κ3cu,2cs .
48
BELLONI, CHEN, AND CHERNOZHUKOV
bu (βu )|X−a , $]] 6 f¯kru k2 /2,
Lemma 2 (CIQGM, Event Ω2 ). Under Condition CI we have En [E[R
n,$
b
Ru (βu ) > 0 and
−1
¯
b
P sup Ru (βu ) 6 C{1 + f }{n s(1 + dW ) log(p|V |n)} = 1 − o(1).
u∈U
bu (βu ) > 0 by convexity of ρτ . Let εiu = Xia −Z a βu −riu where kβu k0 6 s
Proof of Lemma 2. We have that R
i
a
and riu = QXa (τ |X−a , $) − Z βu .
R
bu (βu ) = −En [K$ (W )ru 1 1{εu 6 −tru } − 1{εu 6 0} dt] > 0.
By Knight’s identity (F.65), R
0
R1
bu (βu )|X−a , $] = En [K$ (W )ru FX |X ,$ (Z a βu + (1 − t)ru ) − FX |X ,$ (Z a βu + ru ) dt]
En [E[R
a
−a
a
−a
R01
6 En [K$ (W )ru 0 f¯tru dt] 6 f¯kru k2n,$ /2 6 C f¯s/n.
bu (βu ) 6 C f¯s/n) >
Since Condition CI assumes E[kru k2n,$ ] 6 P($)s/n, by Markov’s inequality we have P(R
R1
b
1/2. Define ziu := − 0 1{εiu 6 −triu } − 1{εiu 6 0} dt, so that Ru (βu ) = En [K$ (W )ru zu ] where |ziu | 6 1.
By Lemma 2.3.7 in [73] (note that the Lemma does not require zero mean stochastic processes), for t >
2C f¯s/n we have
1
P sup |En [K$ (W )ru zu ]| > t 6 2P sup |En [εK$ (W )ru zu ]| > t/4
2
u∈U
u∈U
where εi , i = 1, . . . , n are Rademacher random variables independent of the data.
Next consider the class of functions F = {−K$ (W )ru (1{εiu 6 −Bi riu } − 1{εiu 6 0}) : u ∈ U} where
Bi ∼ Uniform(0, 1) independent of (Xi , Wi )ni=1 . It follows that K$ (W )ru zu = E[−K$ (W )ru (1{εiu 6
−Bi riu } − 1{εiu 6 0})|Xi , Wi ] where the expectation is taken over Bi only. Thus we will bound the entropy
of F = {E[f |X, W ] : f ∈ F} via Lemma 25. Note that R := {ru = QXa (τ |X−a , $) − Z a βu : u ∈ U}
where G := {Z a βu : u ∈ U} is contained in the union of at most |V | ps VC-classes of dimension Cs and
H := {QXa (τ |X−a , $) : u ∈ U}} is the union of |V | VC-class of functions of dimension (1+dW ) by Condition
CI. Finally note that E := {εiu : u ∈ U} ⊂ {Xia : a ∈ V } − G − R.
Therefore, we have
supQ log N (kF̄ kQ,2 , F, k · kQ,2 ) 6 supQ log N ((/4)2 kF kQ,2 , F, k · kQ,2 )
6 supQ log N ( 18 (2 /16), W, k · kQ,2 )
+ supQ log N ( 81 (2 /16)kF kQ,2 , R, k · kQ,2 )
+ supQ log N ( 81 (2 /16), 1{E + {B}R 6 0} − 1{E 6 0}, k · kQ,2 )
We will apply Lemma 19 with envelope F̄ = supu∈U |K$ (W )ru |, so that E[maxi6n F̄i2 ] 6 C, and
supu∈U E[K$ (W )ru2 ] 6 Cs/n =: σ 2 by Condition CI. Thus, we have that with probability 1 − o(1)
r
r
s(1 + dW ) log(p|V |n) s
s(1 + dW ) log(p|V |n)
s(1 + dW ) log(p|V |n)
sup |En [εK$ (W )ru zu ]| .
+
.
n
n
n
n
u∈U
p
under Mn s2 /n 6 C.
Lemma 3 (CIQGM, Event Ω3 ). For u = (a, τ, $) ∈ U := V × T × W, define the function gu (δ, X, W ) =
K$ (W ){ρτ (Xa − Z a (βu + δ)) − ρτ (Xa − Z a βu )}, and the event
(
)
|En [gu (δ, X, W ) − E[gu (δ, X, W ) | X−a , W ]]|
Ω3 :=
sup
< t3 .
√
√
kδk1,$
u∈U ,1/ n6kδk1,$ 6 n
QUANTILE GRAPHICAL MODELS
49
Then, under Condition CI we have P (Ω3 ) > 1 − ξ for any t3 satisfying
q
√
1+d /κ
t3 n > 12 + 16 2 log(64|V |p2 n3+2dW log(n)Lβ W Mn /ξ)
√
Proof. We have that Ωc3 := {maxa∈V Aa > t3 n} for
Aa :=
√
sup
n
(τ,$)∈T ×W,N 6kδk1,$ 6N̄
En [gu (δ, X, W ) − E[gu (δ, X, W ) | X−a , W ]]
.
kδk1,$
√
√
Therefore, for N = 1/ n and N̄ = n we have by Lemma 13 with ρ = κ, Lη = Lβ , x̃ = Z a
√
P(Ωc3 ) = P(maxa∈V Aa > t3 n)
√
6 |V | maxa∈V P(Aa > t3 n)
√
= |V | maxa∈V EX−a ,W {P(A
a > t3 n | X−a , W )}
n
o
b | · |W|
c · |Tb | exp(−(t3 √n/4 − 3)2 /32)
6 |V | maxa∈V EX−a ,W 8p|N
1+d
/κ
√
maxi6n kZia k∞ W
2
1+dW
6 exp(−(t3 n/4 − 3) /32)|V |64pn
log(n)Lβ EX−a
N 1+dW
6ξ
(1+dW /κ)/q
by the choice of t3 and noting that Mn
1+dW /κ
> EX−a [maxi6n kZia k∞
], 1 + dW /κ 6 q and Mn > 1.
Lemma 4 (CIQGM, Uniform Control of Approximation Error in Auxiliary Equation). Under Condition
CI, with probability 1 − o(1) uniformly over u ∈ U and j ∈ [p] we have
a
En [K$ (W )fu2 {Z−j
(γuj − γ̄uj )}2 ] . f 2u P($){n−1 s log(p|V |n)}1/2 .
a
Proof. Define the class of functions G = ∪a∈V,j∈[p] Gaj with Gaj := {Z−j
(γuj − γ̄uj ) : τ ∈ T , $ ∈ W}. Under
Condition CI we have supu∈U kγ̄uj k0 6 Cs, supu∈U ,j∈[p] kγ̄uj −γuj k∨
j
γ̄uk
j
kγ̄u
−γ j k
√ u 1
s
6 {n−1 s log(p|V |n)}1/2 . Without
j
a
loss of generality we can set
) : τ ∈ T , $ ∈ W}
=
(γuj −γuT
for k ∈ support(γ̄uj ). Letting Gaj,T := {Z−j
for T ⊂ {1, . . . , p}, it follows that G ⊂ ∪a∈V,j∈[p] ∪|T |6Cs Gaj,T .
j
γuk
By Lemma 5, we have kγuj − γuj 0 k 6 Lγ (ku − u0 k + ku − u0 k1/2 ) for each a ∈ V , j ∈ [p]. (Note that although
j
γ̄uj might not be Lipschitz in u, however, for each T , γuT
satisfies the same Lipschitz relation as γuj , in fact
j
kγ̄uT
− γuj 0 T k 6 kγuj − γuj 0 k by construction.) Therefore, for each T we have
j
a
a
k{Z−j
(γ̄uT
− γuj )}2 − {Z−j
(γ̄uj 0 T − γuj 0 )}2 kQ,2
j
j
a
a
6 kZ−j
(γ̄uT
− γ̄uj 0 T + γuj 0 − γuj )Z−j
(γ̄uT
− γuj + γ̄uj 0 T − γuj 0 )kQ,2
j
j
a 2
6 kkZ−j
k∞ kQ,2 kγ̄uT
− γ̄uj 0 T + γuj 0 − γuj k1 kγ̄uT
− γuj + γ̄uj 0 T − γuj 0 k1
√
j
a 2
6 4kkZ−j
k∞ kQ,2 supu∈U kγ̄uT − γuj k1 2pkγuj − γuj 0 k
a 2
6 kkZ−j
k∞ kQ,2 L0γ (ku − u0 k + ku − u0 k1/2 ).
√
where L0γ = 4{n−1 s2 log(p|V |n)}1/2 2pLγ . Thus, for the envelope G = maxa∈V kZ a k2∞ supu∈U kγ̄uj − γuj k21
that
sup
kγ̄ j −γ j k2
log N (kGkQ,2 , G, k · kQ,2 ) 6 Cs log(|V |p) + log N u∈U L0 u u 1 , U, dU 6 Cs(1 + dW )2 log(L0γ n/).
γ
Next define the functions W0 =
: u ∈ U}, W1 = {P($)−1 : $ ∈ W} and W2 = {K$ (W ) : $ ∈
W}. We have that W2 is VC class with VC index CdW and W1 is bounded by µ−1
W and covering number
1+dW
2
2
bounded by (CdW /{µW })
. Finally, since |K$ (W )fu − K$0 (W )fu0 | 6 K$ (W )K$0 (W )|fu2 − fu20 | +
{K$ (W )fu2
50
BELLONI, CHEN, AND CHERNOZHUKOV
f¯2 |K$ (W ) − K$0 (W )| 6 2f¯Lf ku − u0 k + f¯2 |K$ (W ) − K$0 (W )|, we have N (, U, | · |) 6 (C(1 + dW )/)1+dW .
Therefore, using standard bounds we have
2
0
¯
log N (kµ−1
W Gf kQ,2 , W0 W1 W2 G, k · kQ,2 ) . s(1 + dW ) log(Lγ Lf n/)
By Lemma 19 we have that with probability 1 − o(1) that
a
supu∈U ,j∈[p] |(En − E)[fu2 {Z−j
(γuj − γ̄uj )}2 /P($)]|
q
a (γ j −γ̄ j )}4 ]/P($)2
2 −1
j
j 2
s(1+dW )2 log(p|V |n) supu∈U E[K$ (W )fu4 {Z−j
s(1+dW )2 Mn
µW supu∈U kγ̄u
−γu
k1 log(p|V |n)
u
u
+
.
n
n
q
2
2 2
2
(1+dW ) Mn s log(p|V |n) s log(p|V |n)
|n) s log(p|V |n)
+
. s(1+dW µ) Wlog(p|V
n
n
nµW
n
r
2 2
(1+dW )2 Mn
s log(p|V |n)
s log(p|V |n)
s(1+dW )2 log(p|V |n)
.
µ
f
+
W U
n
µ3 f 2 n
nµ2 f
W
.
1/2
s log(p|V |n)
µW f U {δn
n
W
U
U
+ δn2 }
here we used that E[fu4 {Z a δ}4 |$] 6 f¯4 E[{Z a δ}4 |$] 6 Ckδk4 , kγ̄uj − γuj k + s−1/2 kγ̄uj − γuj k1 6
{n−1 s log(p|V |n)}1/2 , s(1 + dW )2 log(p|V |n) 6 δn nf 2U µ3W and (1 + dW )Mn s log1/2 (p|V |n) 6 δn n1/2 µW f U
a
by Condition CI. Furthermore, by Condition CI, the result follows from E[fu2 {Z−j
(γ̄uj − γuj )}2 |$] 6
Cf 2u kγ̄uj − γuj k2 6 Cf 2u n−1 s log(p|V |n).
Lemma 5. Under Condition CI, for u = (a, τ, $) ∈ U and u0 = (a, τ 0 , $0 ) ∈ U we have that
kγuj − γuj 0 k 6
C0
¯2 E[{K$0 (W ) − K$ (W )}2 ]1/2 + E[K$ (W )K$0 (W ){f 20 − f 2 }2 ]1/2 }.
u
u
{f
f 2u0 P($0 )
In particular, we have kγuj − γuj 0 k 6 Lγ {k$ − $0 k1/2 + ku − u0 k} for Lγ = C{Lf + LK }/{f 2U µW } under
E[|K$ (W ) − K$0 (W )|] 6 LK k$ − $0 k, K$ (W )K$0 (W )|fu0 − fu | 6 Lf ku0 − uk, and fu 6 f¯ 6 C.
Proof. Let u = (a, τ, $) and u0 = (a, τ 0 , $0 ). By Condition CI we have
kγuj − γuj 0 k2
a
a
(γuj − γuj 0 )}2 ]
6 CE[{Z−j
(γuj − γuj 0 )}2 |$0 ] 6 {C/P($0 )}E[K$0 (W ){Z−j
To bound the last term of the right hand side above, by the definition of f u0 and Cauchy-Schwarz’s inequality
we have
a
a
f u0 E[K$0 (W ){Z−j
(γuj − γuj 0 )}2 ] 6 E[K$0 (W )fu0 {Z−j
(γuj − γuj 0 )}2 ]
a
a
6 {E[K$0 (W )fu20 {Z−j
(γuj − γuj 0 )}2 ] E[K$0 (W ){Z−j
(γuj − γuj 0 )}2 ]}1/2
a
a
so that E[K$0 (W ){Z−j
(γuj − γuj 0 )}2 ]1/2 6 {E[K$0 (W )fu20 {Z−j
(γuj − γuj 0 )}2 ]}1/2 /f u0 . Therefore
a
kγuj − γuj 0 k2 6 {1/f u0 }2 {C/P($)}E[K$0 (W )fu20 {Z−j
(γuj − γuj 0 )}2 ].
(D.55)
We proceed to bound the last term. The optimality of γuj and γuj 0 yields
a
a
E[K$ (W )fu2 Z−j
(Zja − Z−j
γuj )] = 0
and
a
a
E[K$0 (W )fu20 Z−j
(Zja − Z−j
γuj 0 )] = 0
Therefore, we have
a
a
E[K$0 (W )fu20 {Z−j
(γuj − γuj 0 )}Z−j
]
a
a
= −E[K$0 (W )fu20 {Zja − Z−j
γuj }Z−j
]
2
2
a
a
= −E[{K$0 (W )fu0 − K$ (W )fu }{Zja − Z−j
γuj }Z−j
]
(D.56)
QUANTILE GRAPHICAL MODELS
51
Multiplying by (γuj − γuj 0 ) both sides of (D.56), we have
a
E[K$0 (W )fu20 {Z−j
(γuj − γuj 0 )}2 ]
a
a
6 E[{K$0 (W )fu20 − K$ (W )fu2 }2 ]1/2 {E[{Zja − Z−j
γuj }2 {Z−j
(γuj − γuj 0 )}2 ]}1/2
j
6 E[{K$0 (W )fu20 − K$ (W )fu2 }2 ]1/2 Ckγuj − γu0 k
by the fourth moment assumption in Condition CI. By Condition CI, fu , fu0 6 f¯, and it follows that
|K$ (W )fu2 − K$0 (W )fu20 | 6 K$ (W )K$0 (W )|fu2 − fu20 | + f¯2 |K$ (W ) − K$0 (W )|
(D.57)
From (D.55) we obtain
kγuj − γuj 0 k 6
C0
¯2 E[{K$0 (W ) − K$ (W )}2 ]1/2 + E[K$ (W )K$0 (W ){f 20 − f 2 }2 ]1/2 }.
u
u
{f
f 2u0 P($0 )
Lemma 6. Let U = V × T × W. Under Condition CI, for m = 1, 2, we have
"
#
E
sup
|(En − E)[K$ (W )fum (Z a θ)2 ]| . Cδn
where δn = Mn
u∈U ,kθk0 6k,kθk=1
p
p
k(1 + dW )C log(p|V |n) log(1 + k) log n/n. Moreover, under Condition CI, δn = o(µW ).
Proof. By symmetrization we have
"
E
{E[K$ (W )fum (Z a θ)2 ]}1/2
sup
u∈U ,kθk0 6k,kθk=1
sup
#
"
#
|(En − E)[K$ (W )fum (Z a θ)2 ]| 6 2E
u∈U ,kθk0 6k,kθk=1
|En [εK$ (W )fum (Z a θ)2 ]|
sup
u∈U ,kθk0 6k,kθk=1
where εi are i.i.d.
Rademacher random variables.
We have that |K$ (W )fum − K$0 (W )fum0 | 6
K$ (W )K$0 (W )|fu − fu0 |(1 + 2f¯) + f¯m |K$ (W ) − K$0 (W )| for m = 1, 2 where u and u0 have the same
a ∈ V . However, conditional on {(Wi , Xi ), i = 1, . . . , n}, {K$ (Wi ) : i = 1, . . . , n, $ ∈ W} induces at most
ndW different sequences by Corollary 2.6.3 in [72]. This induces (at most) ndW partitions of W such that
K$ (W ) = K$0 (W ) for any $, $0 in the same partition given the conditioning. Thus, for such suitable $0 we
have |K$ (W )fum − K$0 (W )fum0 | 6 K$ (W )|fu − fu0 |(1 + 2f¯) for m = 1, 2. (Thus it suffices to create a net for
each partition.) We can take a cover Ub of V × T × W such that ku − u0 k 6 {Lf (1 + 2f¯)nk maxi6n kZia k2∞ }−1
so that |fu − fu0 |(Z a θ)2 6 |fu − fu0 |kZ a k2∞ kθk21 6 |fu − fu0 |kZ a k2∞ kkθk2 which implies
sup
|En [εK$ (W )fum (Z a θ)2 ]| −
u∈U ,kθk0 6k,kθk=1
Consequentially
"
E
sup
u∈U ,kθk0 6k,kθk=1
|En [εK$ (W )fum (Z a θ)2 ]| 6 n−1
sup
b,kθk0 6k,kθk=1
u∈U
#
|En [εK$ (W )fum (Z a θ)2 ]|
"
#
6E
sup
|En [εK$ (W )fum (Z a θ)2 ]|
b,kθk0 6k,kθk=1
u∈U
b 6 |V |ndW {Lf (1 + 2f¯)nk maxi6n kZ a k2∞ }(1+dW ) .
where |U|
i
By Lemma 18 with K = K(W, X) = (1 + f¯2 ) supa∈V maxi6n kZia k∞ and
p
√ q
√
√
b + 1 + log p + log k log(p ∨ n) log n /√n
δn (W, X) := C̄K(W, X) k
log |U|
p
√
√
. K(W, X) k(1 + dW )C log(p|V |nK(W, X)) log(1 + k) log n/ n
+
1
n
52
BELLONI, CHEN, AND CHERNOZHUKOV
so that conditional on (W, X) we have
"
E
#
|En [εK$ (W )fum (Z a θ)2 ]|
sup
. δn (W, X)
b,kθk0 6k,kθk=1
u∈U
p
sup
En [K$ (W )fum (Z a θ)2 ]
b,kθk0 6k,kθk=1
u∈U
Therefore,
"
E
#
|En [εK$ (W )fum (Z a θ)2 ]|
sup
"
u∈U ,kθk0 6k,kθk=1
#
6 EW,X δn (W, X)
sup
p
En [K$ (W )fum (Z a θ)2 ]
b,kθk0 6k,kθk=1
u∈U
+
1
n
1
n
b,kθk0 6k,kθk=1
u∈U
p
p
p
Note that for a random variable A > 1, we have that E[A2 log(CA)] 6 E[A2 ] log(C) + E[A2 log(A)] 6
p
E[A2 ] log(C) + E[A2+1/4 ]. Therefore, under Condition CI, since q > 2 + 1/4 in the definition of Mn , we
have
p
p
√
EW,X [δn2 (W, X)]1/2 . Mn k(1 + dW )C log(p|V |n) log(1 + k) log n/ n.
6
EW,X [δn2 (W, X)]
+ EW,X [δn2 (W, X)]1/2
sup
E[K$ (W )fum (Z a θ)2 ]1/2 +
The results follows by setting δn = EW,X [δn2 (W, X)]1/2 .
Appendix E. Results for Prediction Quantile Graphical Models
In the analysis of PQGM we also use the following event for some sequence (Ku )u∈U
X
0
βu + ru })X−a |Xj , W ]], u ∈ U, j ∈ V \{a}}.
Ω4 = {Ku σ
ba$j
> En [E[K$ (W )(τ − 1{Xa 6 X−a
(E.58)
1+1/c
Lemma 7 (Rate for PQGM). Suppose that Ω1 , Ω2 , Ω3 and Ω4 hold. Further assume 2 1−1/c
kβu k1,$ +
√
1
R̄
6
n
for
all
u
∈
U,
and
(F.64)
holds
for
all
δ
∈
A
:=
∆
∪
{v
:
kvk
6
2c
R̄uξ /λu },
u
$,2c
1,$
λu (1−1/c) uξ
√
p
u
R̄uξ }1/2 . Then uniformly over
q̄Au /4 > ( f¯ + 1)kru kn,$ + [λu + t3 + Ku ] κ3cu,2cs and q̄Au > {2c 1 + t3 +K
λu
all u = (a, τ, $) ∈ U := V × T × W, the k · k1,$ -penalized estimator βbu satisfies
√
0
k fu X−a
(βbu − βu )kn,$
kβbu − βu k1,$
r
√
8c 1 + λt3u R̄uξ + (f¯1/2 + 1)kru kn,$ + [λu + t3 + Ku ] κ3cu,2cs
√ √
0
6 (1 + 2c) sk fu X−a
δu kn,$ /κu,2c + λ2cu R̄uξ
6
Proof of Lemma 7. The proof proceeds similarly to the proof of Lemma 1 by defining
bu (β)
R
0
0
= En [K$ (W ){ρu (Xa − X−a
β) − ρu (Xa − X−a
βu − ru )}]
0
0
0
−En [K$ (W ){(τ − 1{Xa 6 X−a βu + ru })(X−a β − X−a
βu − ru )}].
The same argument yields δu = βbu − βu ∈ Au := ∆$,2c ∪ {v : kvk1,$ 6 2cR̄uξ /λu } under Ω1 ∩ Ω2 . (Similarly
√
we also have kδu k1,$ 6 n.) Furthermore, under Ω1 ∩ Ω2 ∩ Ω3 we have that (D.54) also holds which implies
0
0
En [E[K$ (W ){ρu (Xa − X−a
(βu + δu )) − ρu (Xa − X−a
βu )}|X−a , W ] 6 (λu + t3 )kδu k1,$
Since the conditions of Lemma 12 hold we have
0
0
En [E[K$ (W ){ρτ (Xa − X−a
(βu + δu )) − ρτ (Xa − X−a
βu )}|X−a , W ]
p
√
0
¯
> −( f + 1)kru kn,$ k fu X−a δkn,$ − Ku kδu k1,$
√
0
√
k fu X−a
δu k2n,$
0
+
∧ q̄Au k fu X−a
δu kn,$
4
QUANTILE GRAPHICAL MODELS
53
where Ku is given in Ω4 which accounts for the misspecification the conditional quantile condition. Therefore,
we have
√
0
√
√
δu k2n,$
k fu X−a
0
0
∧ q̄Au k fu X−a
δu kn,$ 6 (f¯1/2 + 1)kru kn,$ k fu X
δu kn,$ + (λu + t3 + Ku )kδu k1,$
4
√−a
√
3c s
1/2
0
¯
6 {(f
+ 1)kru kn,$ + κu,2c (λu + t3 + Ku )}k fu X−a
δu kn,$
+(λu + t3 + Ku ) λ2cu R̄uξ
The result then follows with the same argument under the current assumptions that account for Ku .
Lemma 8 (PQGM, Event Ω1 ). Under Condition P, we have
!
2 !
0
|En [K$ (W )(τ − 1{Xa 6 X−a
βu + ru })X−a,j ]|
ne 2dW
t/(1 + δ̄n )
> t 6 8|V |(
P
sup
)
exp −
X
dW
2(1 + 1/16)
σ
ba$j
u∈U ,j∈[d]
0
2
where t > 4 supu∈U {E[K$ (W )(τ − 1{Xa 6 X−a
βu + ru })2 X−a,j
]}1/2 and δ̄n = o(1). In particular, the RHS
p
is less than ξ if t > 2(1 + δ̄n )(1 + 1/16) log(8|V |{ne/dW }2dW /ξ).
X
2
Proof. Set σa$j
:= E[K$ (W )X−a,j
]1/2 . We have that for any δ̄n → 0
P(λ0 6
sup
0
X
|En [K$ (W )(τ − 1{Xa 6 X−a
βu })X−a,j ]|/b
σa$j
)
u∈U ,j∈[d]
6 P(λ0 6 (1 + δ̄n )
sup
0
X
|En [K$ (W )(τ − 1{Xa 6 X−a
βu })X−a,j ]|/σa$j
)
u∈U ,j∈[d]
+P(
sup
X
X
σa$j
/b
σa$j
(E.59)
> (1 + δ̄n ))
u∈U ,j∈[d]
X
To bound the last term in (E.59), note that under Condition P, cµW 6 (σa$j
)2 6 C and W is a VC class
of set with VC dimension dW . Therefore, by Lemma 19 we have that with probability 1 − o(1)
r
(1 + dW ) log(|V |Mn /σ1 ) (1 + dW )Mn2 log(|V |Mn /σ1 )
2
sup (En − E)[K$ (W )X−a,j ] .
+
(E.60)
n
n
u∈U ,j∈[d]
2
2
for σ12 = maxu∈U ,j∈[d] E[K$ (W )X−a,j
] 6 maxj∈V E[X−a,j
] 6 C and envelope F = kXk2∞ so that kF kP,2 6
2
k maxi6n Fi kP,2 6 Mn . Thus for δ̄n → 0, provided (1 + dW )Mn2 log(|V |n) = o(n1/2 ) and (1 + dW ) log(|V |n) =
o(nδ̄n2 µ2W ), so that the RHS of (E.60) is o(δ̄n µW ), we have
!
X
σa$j
1
P
(E.61)
6 X 6 (1 + δ̄n ), for all u ∈ U, j ∈ [d] = 1 − o(1).
σ
ba$j
1 + δ̄n
Now we bound the first term of the RHS of (E.59). and let σ22 = supu∈U ,j∈[d] Var(K$ (W )(τ − 1{Xa 6
0
X
X−a
βu })X−a,j /σa$j
) 6 1. By symmetrization (adapting Lemma 2.3.7 in [73] to replace the “arbitrary”
factor 2 with 1 + δ̄n ), for δ := 1/(2(1 + nσ22 /t2 )) < 1/2 we have
Pn
0
X
(∗) := P(supu∈U ,j∈[d] | i=1 K$ (Wi )(τ − 1{Xia 6 Xi,−a
βu })Xi,−aj /σa$j
| > t)
Pn
0
X
6 2P(supu∈U ,j∈[d] | i=1 εi K$ (Wi )(τ − 1{Xia 6 Xi,−a βu })Xi,−aj /σa$j
! | > tδ)
6 2P
sup
u∈U ,j∈[d]
|
Pn
i=1
0
εi K$ (Wi )(τ −1{Xia 6Xi,−a
βu })Xi,−aj |
X
σ
ba$j
> tδ/(1 + δ̄n )
+ o(1)
where εi , i = 1, . . . , n, are Rademacher random variables independent of the data, and the last inequality
follows from (E.61).
54
BELLONI, CHEN, AND CHERNOZHUKOV
Therefore, by the union bound and symmetry, and iterated expectations we have
!#
"
Pn
0
i=1 εi K$ (Wi )(τ − 1{Xia 6 Xi,−a βu })Xi,−aj
> tδ/(1 + δ̄n ) | W, X
(∗) 6 4|V | max EW,X Pε sup
X
j∈[d]
σ
ba$j
u∈U
Next we use that {$ ∈ W} is a VC class of sets with VC dimension bounded by dW and {1{Xa 6
0
X−a
βu } : (τ, $) ∈ T × W} is a VC class of sets with VC dimension bounded by 1 + dW . By Corollary 2.6.3
in [72], we have that conditionally on (Wi , Xi )ni=1 , the set of (binary) sequences {(K$ (Wi ))i=1,...,n : $ ∈ W}
PdW −1 n
0
has at most j=0
j different values. Similarly, {(1{Xia 6 Xi,−a βu })i=1,...,n : u ∈ U} assumes at most
PdW n
Pk
n
k
j=0 j different values. Assuming that n > dW , we have
j=0 j 6 {ne/k} and
P
0
βu })Xi,−aj |
| ni=1 εi K$ (Wi )(τ −1{Xia 6Xi,−a
> tδ/(1 + δ̄n ) | W, X
Pε supu∈U
X
σ
ba$j
Pn
0
βu })Xi,−aj |
| i=1 εi K$ (Wi )(τ̃ −1{Xia 6Xi,−a
ne
dW −1 ne dW
6 { dW −1 }
{ dW } supu∈U Pε supτ̃ ∈T
> tδ/(1 + δ̄n ) | W, X
X
σ
ba$j
Pn
0
| i=1 εi K$ (Wi )(τ̃ −1{Xia 6Xi,−a βu })Xi,−aj |
2dW
6 {ne/dW }
supu∈U ,τ̃ ∈[τ ,τ̄ ] Pε
> tδ/(1 + δ̄n ) | W, X
σ
bX
a$j
2dW
6 2{ne/dW }
2
exp(−{tδ/[1 + δ̄n ]} )
here we used that the expression is linear in τ and so it is maximized at the extremes. Combining the bounds
in the last two displayed equations we have
(∗) 6 8|V |{ne/dW }2dW exp(−{tδ/[1 + δ̄n ]}2 ).
p
√
Therefore, setting λ0 = ct/n where t > 4 nσ2 and t > 2(1 + δ̄n )(1 + 1/16) 2 log(8p|V |{ne/dW }2dW /ξ).
√
(Note that t > 4 nσ2 implies that δ > 1/{2(1 + 1/16)}.)
Lemma 9 (PQGM, Event Ω2 ). Under Condition P we have
−1
¯
b
P sup Ru (β̄u ) 6 C{1 + f }{n s(1 + dW ) log(|V |n)} = 1 − o(1).
u∈U
bu (β̄u ) > 0 by convexity of ρτ . Let εiu = Xia − Xi,−a β̄u − riu where
Proof of Lemma 9. We have that R
R
0
bu (β̄u ) = −En [K$ (W )ru 1 1{εu 6
kβ̄u k0 6 s and riu = X−a (βu − β̄u ). By Knight’s identity (F.65), R
0
−tru } − 1{εu 6 0} dt] > 0.
R
bu (β̄u )] = En [K$ (W )ru 1 FX |X ,$ (X 0 β̄u + (1 − t)ru ) − FX |X ,$ (X 0 β̄u + ru ) dt]
En [E[R
−a
−a
a
−a
a
−a
R01
6 En [K$ (W )ru 0 f¯tru dt] 6 f¯[kru k2n,$ ]/2 6 C f¯s/n.
bu (β̄u ) 6 C f¯s/n) > 1/2.
Thus, by Markov’s inequality we have inf u∈U P(R
R1
bu (β̄u ) = En [K$ (W )ru zu ] with |ziu | 6 1. By
Define ziu := − 0 1{εiu 6 −triu } − 1{εiu 6 0} dt, so that R
Lemma 2.3.7 in [73] (note that the Lemma does not require zero mean stochastic processes), for t > 2C f¯s/n
we have
1
P sup |En [K$ (W )ru zu ]| > t 6 2P sup |En [εK$ (W )ru zu ]| > t/4
2
u∈U
u∈U
where εi , i = 1, . . . , n, are Rademacher random variables independent of the data.
Consider the class of functions F = {−K$ (W )ru (1{εiu 6 −Bi riu } − 1{εiu 6 0}) : u ∈ U } where
Bi ∼ Uniform(0, 1) independent of (Xi , Wi )ni=1 . It follows that K$ (W )ru zu = E[−K$ (W )ru (1{εiu 6
−Bi riu } − 1{εiu 6 0})|Xi , Wi ] where the expectation is taken over Bi only. Thus we will bound the
QUANTILE GRAPHICAL MODELS
55
0
0
βu − X−a
β̄u : u ∈ U }
entropy of F = {E[f |X, W ] : f ∈ F } via Lemma 25. Note that R := {ru = X−a
p
0
where G := {X−a β̄u : u ∈ U } is contained in the union of at most |V | s VC-classes of dimension Cs and
0
H := {X−a
βu : u ∈ U}} is a VC-class of functions of dimension (1 + dW ) by Condition P. Finally note that
E := {εiu : u ∈ U} ⊂ {Xia : a ∈ V } − G − R.
Therefore, we have
supQ log N (kF̄ kQ,2 , F, k · kQ,2 ) 6 supQ log N ((/4)2 kF kQ,2 , F, k · kQ,2 )
6 supQ log N ( 18 (2 /16), W, k · kQ,2 )
+ supQ log N ( 81 (2 /16)kF kQ,2 , R, k · kQ,2 )
+ supQ log N ( 81 (2 /16), 1{E + {B}R 6 0} − 1{E 6 0}, k · kQ,2 )
r
By Lemma 19 with envelope F̄ = kXk∞ supu∈U kβu − β̄u k1 , and (σmax
)2 = supu∈U E[K$ (W )ru2 ] . s/n by
Condition P, we have that with probability 1 − o(1)
r
p
r
Mn s2 /n log(|V |n)
s(1 + dW ) log(|V |n) s
s(1 + dW ) log(|V |n)
+
.
sup |En [εK$ (W )ru zu ]| .
n
n
n
n
u∈U
p
under Mn s2 /n 6 C.
Lemma 10 (PQGM, Event Ω3 ). Under Condition P, for u = (a, τ, $) ∈ V × T × W, define gu (δ, X, W ) =
0
0
K$ (W ){ρτ (Xa − X−a
(βu + δ)) − ρτ (Xa − X−a
βu )}, and
)
(
|En [gu (δ, X, W ) − E[gu (δ, X, W )|X−a , W ]]|
< t3 .
Ω3 :=
sup
√
√
kδk1,$
u∈U ,1/ n6kδk1,$ 6 n
Then, under Condition CI we have P(Ω3 ) > 1 − ξ for any
q
√
√
t3 n > 12 + 16 2 log 64|V |2 n1+dW log(n)(Lβ Mn n)1+dW /κ /ξ
√
Proof. We have that Ωc3 := {maxa∈V Aa > t3 n} for
Aa :=
sup
√
(τ,$)∈T ×W,N 6kδk1,$ 6N̄
n
En [gu (δ, X, W ) − E[gu (δ, X, W )|X−a , W ]]
.
kδk1,$
√
√
We will apply Lemma 13 with ρ = κ, Lη = Lβ , x̃ = X−a (so we take p = |V |), N = 1/ n and N̄ = n.
Therefore, we have by Lemma 13 and the union bound
√
P(Ωc3 ) = P(maxa∈V Aa > t3 n)
√
6 |V | maxa∈V P(Aa > t3 n)
√
= |V | maxa∈V EX−a ,W n
{P(Aa > t3 n | X−a , W )}
o
b | · |W|
c · |Tb | exp(−(t3 √n/4 − 3)2 /32)
6 |V | maxa∈V EX−a ,W 8|V | |N
1+d
/κ
√
maxi6n kXi,−a k∞ W
1+d /κ
6 C|V |2 n1+dW log(n)Lβ W EX−a
exp(−(t3 n/4 − 3)2 /32)
N 1+dW /κ
6ξ
where the last step follows by the choice of t3 .
Lemma 11 (PQGM, Event Ω4 ). Under Condition P, and setting Ku = C
P(Ω4 ) = 1 − o(1).
q
(1+dW ) log(|V |n)
,
n
we have that
56
BELLONI, CHEN, AND CHERNOZHUKOV
Proof. First note that by Lemma 19 we have that with probability 1 − o(1)
r
(1 + dW ) log(|V |Mn /σ) (1 + dW )Mn2 log(|V |Mn /σ)
2
+
sup (En − E)[K$ (W )X−a,j ] .
n
n
$∈W,j∈V
X
and σa$j
> cP($). Under (1 + dW ) log(|V |Mn /σ) 6 δn2 µ2W and (1 + dW )Mn2 log(|V |Mn /σ) 6 δn nµW , we
X
2
) for all u ∈ U. Therefore, we have
]| = o(σa$j
have that |(En − E)[K$ (W )X−a,j
X
P(supu∈U |En [huj (X−a , W )]|/{Ku σ
ba$j
} > 1)
X
6 P(supu∈U |En [huj (X−a , W )]|/{Ku σa$j } > 1 + O(δn )) + o(1)
X
Applying Lemma 19 to F = {huj (X−a , W )/σa$j
: u ∈ U}. For convenience define H̄j = {huj (X−a , W ) : u ∈
2
U} and K̄j := {E[K$ (W )Xj ] : $ ∈ W}. Note that K̄j has covering numbers bounded by the covering number
of Kj := {K$ (W )Xj2 : $ ∈ W} hence supQ log N (kK̄j kQ,2 , K̄j , k · kQ,2 ) 6 log supQ̃ N ((/4)2 kF kQ̃,2 , Kj , k ·
kQ̃,2 ) by Lemma 25. Similarly, Lemma 25 also allows us to bound covering numbers of H̄j via covering
0
βu })Xj : u ∈ U}.
numbers of Hj = {K$ (W )(τ − 1{Xa 6 X−a
supQ log N (kF kQ,2 , F, k · kQ,2 ) 6 p maxj∈[p] supQ log N (kFj kQ,2 , Fj , k · kQ,2 )
1/2
1/2
6 p maxj∈[p] supQ {log N ((1/2)kH̄j kQ,2 , H̄j , k · kQ,2 ) + supQ log N ((1/2)cµW , 1/K̄j , k · kQ,2 )}
3/2
1/2
6 p maxj∈[p] supQ {log N ((1/2)kH̄j kQ,2 , H̄j , k · kQ,2 ) + supQ log N ((1/2)cµW , K̄j , k · kQ,2 )}
3/2
6 p maxj∈[p] supQ {log N ((1/2)kH̄j kQ,2 , H̄j , k · kQ,2 ) + supQ log N (C(1/2)cµW , K̄j , k · kQ,2 )}
3/2
6 p maxj∈[p] supQ {log N ((1/2)kH̄j kQ,2 , H̄j , k · kQ,2 ) + supQ log N (1/(2C)cµW , K̄j , k · kQ,2 )}
6 p maxj∈[p] supQ̃ log N ((1/4)2 kHj kQ,2 , Hj , k · kQ,2 )
+p maxj∈[p] supQ̃ log N ((1/(4C 2 )2 c2 µ3W , Kj , k · kQ̃,2 )
1/2
where Fj = ckXk∞ /µW , Hj = kXk∞ . Since Kj is the product of a VC subgraph of dimension dW with a
single function, and Hj is the product of two VC subgraph of dimension 1 + dW and a single function, by
Lemma 19 with σ 2 = 1, we have with probability 1 − o(1)
r
(En − E)[huj (X−a , W )]
(1 + dW ) log(|V |n)
Mn (1 + dW ) log(|V |n)
sup
6C
+C
.
2
1/2
1/2
n
E[K$ (W )Xj ]
u∈U
nµW
q
1/2
Thus, under Mn (1 + dW ) log(|V |n) 6 n1/2 µW we have that we can take Ku = C (1+dW ) nlog(|V |n) .
Appendix F. Technical Results for High-Dimensional Quantile Regression
In this section we provide technical results for high-dimensional quantile regression. It is based on a
sample (ỹi , x̃i , Wi )ni=1 , independent across i, ρτ (t) = (τ − 1{t 6 0})t, τ ∈ T ⊂ (0, 1) a compact interval,
and a family of indicator functions Kw (W ) = 1 if W ∈ Ω$ , Kw (W ) = 0 otherwise, here Ω$ ∈ W. For
convenience we index the sets Ω$ by $ ∈ BW ⊂ RdW where we normalize the diameter of BW to be less or
0
equal than 1/6. Let fỹ|x̃,ru ,$ (·) denote the conditional density function, fỹ|x̃,ru ,$ (·) 6 f¯, |fỹ|x̃,r
(·)| 6 f¯0
u ,$
and fu := fỹ|x̃,ru ,$ (x̃0 ηu ). Moreover, we assume that
kηu − ηũ k1 6 Lη {|τ − τ̃ | + k$ − $̃kρ }.
(F.62)
Although the results can be applied more generally, these results will be used for (ηu , ru ), u = (ỹ, τ, $) ∈
U := {ỹ} × T × W satisfying
E[K$ (W )(τ − 1{ỹ 6 x̃0 ηu + ru })x̃] = 0.
QUANTILE GRAPHICAL MODELS
57
Note that this generality is flexible enough to allow us to cover the case that the τ -conditional quantile
function Qỹ (τ |x̃, $) = x̃0 η̃u +r̃u by setting ηu = η̃u and ru = r̃u in which case E[(τ −1{ỹ 6 x̃0 ηu +ru })|x̃, $] =
0. It also covers the case that
η̃u ∈ arg min E[K$ (W )ρτ (ỹ − x̃0 β)]
β
0
so that E[K$ (W )(τ − 1{ỹ 6 x̃ η̃u })x̃] = 0 holds by the first order condition by setting ηu = η̃u and ru = 0.
Moreover, it also covers the case that we work with a sparse approximation η̄u of η̃u by setting ηu = η̄u and
ru = x̃0 (η̃u − η̄u ).
Lemma 12 (Identification Lemma). For u = (a, τ, $) ∈ U, and a subset Au ⊂ Rp let
3/2
q̄Au = 1/(2f¯0 ) · inf En K$ (W )fu |x̃0 δ|2
/En K$ (W )|x̃0 δ|3
(F.63)
and assume that for all δ ∈ Au
En K$ (W )|ru | · |x̃0 δ|2 + En K$ (W )ru2 · |x̃0 δ|2 6 1/(4f¯0 )En [K$ (W )fu |x̃0 δ|2 ].
(F.64)
δ∈Au
Then we have
En [E[K$ (W )ρτ (ỹ − x̃0 (ηu + δ)) | x̃, ru , W ]] − En [E[K$ (W )ρτ (ỹ − x̃0 ηu ) | x̃, ru , W ]]
√
√
√
k fu x̃0 δk2n,$
∧ q̄Au k fu x̃0 δkn,$ − Kn2 k fu x̃0 δkn,$ − Kn1 kδk1,$ .
>
4
where Kn2 := (f¯1/2 + 1)kru kn,$ and Kn1 := supu∈U ,j∈[p]
|En [E[K$ (W )(τ −1{ỹ6x̃0 ηu +ru })x̃j |x̃,W ]]|
.
{En [K$ (W )x̃2j ]}1/2
Proof of Lemma 12. Let Tu = support(ηu ), and Qu (η) := En E[K$ (W )ρτ (ỹ − x̃0 η) | x̃, ru , W ]. The proof
proceeds in steps.
Step 1. (Minoration) Define the maximal radius over which the criterion function can be minorated by a
quadratic function
)
(
√
√
r : Qu (ηu + δ) − Qu (ηu ) + Kn2 k fu x̃0 δkn,$ + Kn1 kδk1,$ > 41 k fu x̃0 δk2n,$ ,
.
rAu = sup
√
∀δ ∈ Au , k fu x̃0 δkn,$ 6 r
r
Step 2 below shows that rAu > q̄Au . By construction of rAu and the convexity of Qu (·), k · k1,$ and k · kn,$ ,
√
Qu (ηu + δ) − Qu(
(ηu ) + Kn2 k fu x̃0 δkn,$ + Kn1 kδk1,$ >
)
√
√
√
inf δ̃ Qu (ηu + δ̃) − Qu (ηu ) + Kn2 k fu x̃0 δ̃kn,$ + Kn1 kδ̃k1,$
k fu x̃0 δk2n,$
k fu x̃0 δkn,$
>
∧
·
√
4
rA
δ̃ ∈ Au , k fu x̃0 δ̃ku > rAu
√
n
o
√
2
k fu x̃0 δk2n,$
k fu x̃0 δkn,$ rAu
>
∧
4
rAu
4
√
√
k fu x̃0 δk2n,$
0
>
∧ q̄Au k fu x̃ δkn,$ .
4
Step 2. (rAu > q̄Au ) Let Fỹ|x̃,ru ,$ denote the conditional distribution of ỹ given x̃, ru , $. From [48], for
any two scalars w and v the Knight’s identity is
Z v
ρτ (w − v) − ρτ (w) = −v(τ − 1{w 6 0}) +
(1{w 6 z} − 1{w 6 0})dz.
(F.65)
0
Using (F.65) with w = ỹi − x̃0i ηu and v = x̃0i δ and taking expectations with respect to ỹ, we have
Qu (ηu + δ) − Qu (ηu ) = −En [E
− 1{ỹ 6 x̃0 ηu })x̃0i δ | x̃, ru , W ]]
hR[K$ (W )(τ
i
K$ (W )x̃0 δ
+En 0
Fỹ|x̃,ru ,$ (x̃0 ηu + t) − Fỹ|x̃,ru ,$ (x̃0 ηu )dt .
58
BELLONI, CHEN, AND CHERNOZHUKOV
Using the law of iterated expectations and mean value expansion, the relation
|En [E [K$ (W )(τ − 1{ỹ 6 x̃0 ηu })x̃0 δ | x̃, ru , W ]]|
= |En K$ (W ){Fỹ|x̃,ru ,$ (x̃0 ηu + ru ) − Fỹ|x̃,ru ,$ (x̃0 ηu )}x̃0 δ
+En K$ (W ){τ − Fỹ|x̃,ru ,$ (x̃0 ηu + ru )}x̃0 δ | x̃, ru , W |
6 En [K$ (W )fu |ru | |x̃0 δ|] + f¯0 En [K$ (W )|ru |2 |x̃0 δ|] + Kn1 kδk1,$
√
√
6 k fu ru kn,$ k fu x̃0 δkn,$ + f¯0 kru kn,$ kru x̃0 δkn,$ + Kn1 kδk1,$
√
6 (f¯1/2 + 1)kru kn,$ k fu x̃0 δkn,$ + Kn1 kδk1,$
where we used our assumption on the approximation error and we have Kn2 = (f¯1/2 + 1)kru kn,$ . With that
and similar arguments we obtain for t̃x̃i ,t ∈ [0, t]
√
Qu (ηu + δ) − Qu (ηu ) + Kn2 k fu x̃0 δkn,$ + Kn1 kδk1,$ >
Qu (ηuh + δ) − Qu (ηu ) + En [E [K$ (W )(τ − 1{ỹ 6 x̃0 ηu })x̃i0 δ | x̃, ru , W ]] =
R K (W )x̃0 δ
= En 0 $
Fỹ|x̃,ru ,$ (x̃0 ηu + t) − Fỹ|x̃,ru ,$ (x̃0 ηu )dt
i
hR
0
2
K (W )x̃ δ
0
0
(x̃
η
+
t̃
)dt
= En 0 $
tfỹ|x̃,ru ,$ (x̃0 ηu ) + t2 fỹ|x̃,r
u
x̃,t
u ,$
hR
i
√
K (W )x̃0i δ
> 12 k fu x̃0 δk2n,$ − 16 f¯0 En [K$ (W )|x̃0 δ|3 ] − En 0 $
t[fỹ|x̃,ru ,$ (x̃0 ηu ) − fỹ|x̃,ru ,$ (x̃0 ηu + ru )]dt
√
√
> 1 k fu x̃0 δk2 + 1 k fu x̃0 δk2 − 1 f¯0 En [K$ (W )|x̃0 δ|3 ] − (f¯0 /2)En K$ (W )|r̃u | · |x̃0 δ|2 .
4
n,$
n,$
4
6
(F.66)
Moreover, by assumption we have
En K$ (W )|ru | · |x̃0 δ|2 6
1
E [K$ (W )fu |x̃0 δ|2 ]
4f¯0 n
(F.67)
√
Note that for any δ such that k fu x̃0 δkn,$ 6 q̄Au we have
p
3/2
k fu x̃0 δkn,$ 6 q̄Au 6 1/(2f¯0 ) · En K$ (W )fu |x̃0 δ|2
/En K$ (W )|x̃0 δ|3 .
It follows that (1/6)f¯0 En [K$ (W )|x̃0 δ|3 ] 6 (1/8)En [K$ (W )fu |x̃0 δ|2 ]. Combining this with (F.67) we have
f¯0
f¯0
1
En [K$ (W )fu |x̃0 δ|2 ] − En [K$ (W )|x̃0 δ|3 ] − En K$ (W )|ru | · |x̃0 δ|2 > 0.
4
6
2
Combining (F.66) and (F.68) we have rAu > q̄Au .
(F.68)
Lemma 13. Let W be a VC-class of sets with VC-index dW . Conditional on {(Wi , x̃i ), i = 1, . . . , n} we
have
Pỹ
sup
τ ∈ T , $ ∈ W,
N 6 kδk1,$ 6 N̄
Gn
K$ (W )
ρτ (ỹ − x̃0 (ηu + δ)) − ρτ (ỹ − x̃0 ηu )
kδk1,$
!
n
2
> M | (Wi , x̃i )i=1 6 Sn exp(−(M/4 − 3) /32)
b | · |W|
c · |Tb |, with
where Sn 6 8p|N
dW /ρ
√
√
√
c 6 ndW + 2 n maxi6n kx̃i k∞ Lη
b | 6 1 + 3 n log(N̄ /N ) , |Tb | 6 2 n maxi6n kx̃i k∞ Lη , |W|
|N
.
N
N
Proof of Lemma 13. Let giτ $ (b) = K$ (Wi ){ρτ (ỹi − x̃0i ητ $ + b) − ρτ (ỹi − x̃0i ητ $ )} 6 K$ (Wi )|b| since
K$ (Wi ) ∈ {0, 1}. Note that |giτ $ (b) − giτ $ (a)| 6 K$ (Wi )|b − a|. To easy the notation we omit the
conditioning on (x̃i , Wi ) from the probabilities.
QUANTILE GRAPHICAL MODELS
59
For any δ ∈ Rp , since ρτ is 1-Lipschitz, we have
0
2
0 2
0
τ $ (x̃ δ)} ]
$ (W )x̃ δ| ]
τ $ (x̃ δ)
6 En [{g
6 En [|K
=1
Var Gn gkδk
kx̃0 δk2n,$
kx̃0 δk2n,$
1,$
P
P
since by definition kδk1,$ = j kδj k1,$ = j kx̃0j δj kn,$ > kx̃0 δkn,$ .
Since we are conditioning on (Wi , x̃i )ni=1 the process is independent across i. Then, by Lemma 2.3.7 in
[72] (Symmetrization for Probabilities) we have for any M > 1
!
gτ $ (x̃0 δ)
P
sup
Gn
>M
kδk1,$
τ ∈T ,$∈W,N 6kδk1,$ 6N̄
!
gτ $ (x̃0 δ)
2
o
6
> M/4
P
sup
Gn
1 − M −2
kδk1,$
τ ∈T ,$∈W,N 6kδk1,$ 6N̄
where Gon is the symmetrized process.
Consider Ft,τ,$ = {δ : kδk1,$ = t}. We will consider the families of Ft,τ,$ for t ∈ [N , N̄ ], τ ∈ T and
$ ∈ W.
c×N
b of T × W × [N , N̄ ] such that
We will construct a finite net Tb × W
gτ $ (x̃0 δ)
gτ $ (x̃0 δ)
o
o
Gn
=: 3 + Ao .
63+
sup
sup Gn
sup
kδk1,$
t
δ∈F
b
c
b
τ ∈T ,$∈W,t∈[N ,N̄ ],δ∈Ft,τ,$
t,τ,$
τ ∈T ,$∈W,t∈N
By triangle inequality we have
0
δ)
gτ̃ $̃ (x̃0 δ̃)
Gon gτ $ (x̃
−
t
t̃
gτ $ (x̃0 δ)
t
0
δ)
Gon gτ̃ $̃ (x̃
t
6 Gon
+
The first term in (F.69) is such that
0
0
δ)
δ)
Gon gτ $ (x̃
− gτ̃ $ (x̃
t
t
6
6
6
−
−
gτ̃ $ (x̃0 δ)
t
gτ̃ $̃ (x̃0 δ̃)
t̃
+ Gon
gτ̃ $ (x̃0 δ)
t
−
gτ̃ $̃ (x̃0 δ)
t
√
2 n
0
t En [K$ (W )|x̃ (ητ $ − ητ̃ $ )|]
√
2 n
N maxi6n kx̃i k∞ En [K$ (W )]kητ $ − ητ̃ $ k1
√
2 n
0
N maxi6n kx̃i k∞ En [K$ (W )]Lη |τ − τ |.
(F.69)
(F.70)
Define a net Tb = {τ1 , . . . , τT } such that
|τk+1 − τk | 6
√ maxi6n kx̃i k∞
Lη
2 n
N
−1
.
To bound the second term in (F.69), note that W is a VC-class. Therefore, by Corollary 2.6.3 in [72]
we have that conditional on (Wi )ni=1 , there are at most ndW different sets $ ∈ W that induce a different
c with at most ndW
sequence {K$ (W1 ), . . . , K$ (Wn )}. Thus we can choose a (data-dependent) cover W
values of $. Further, similarly to (F.71) we have kητ̃ $ − ητ̃ $̃ k1 6 Lη k$ − $̃kρ and
√
√
0
0
δ)
δ)
Gon gτ̃ $ (x̃
− gτ̃ $̃ (x̃
6 2 t n En [K$ (W )|x̃0 (ητ̃ $ − ητ̃ $̃ )|] + 2 t n En [|K$ (W ) − K$̃ (W )||x̃0 δ|]
t
t
6
6
√
2 n
N
√
2 n
N
maxi6n kx̃i k∞ En [K$ (W )]kητ̃ $ − ητ̃ $̃ k1
maxi6n kx̃i k∞ En [K$ (W )]Lη k$ − $̃kρ .
(F.71)
c such that |W|
c 6n
We define a net W
dW
n √
odW /ρ
maxi6n kx̃i k∞
+ 2 n
Lη
N
60
BELLONI, CHEN, AND CHERNOZHUKOV
To bound the third term in (F.69), note that for any δ ∈ Ft,τ,$ , t 6 t̃, by considering δ̃ := δ(t̃/t) ∈ Ft̃,τ,$
we have
0
0
0
0
0
0
δ)
δ)
Gon gτ $ (x̃
− gτ $ (x̃ t̃δ(t̃/t))
6 Gon gτ $ (x̃
− gτ $ (x̃ tδ(t̃/t)) + Gon gτ $ (x̃ tδ(t̃/t)) − gτ $ (x̃ t̃δ(t̃/t))
t
t
gτ $ (x̃0 δ[t̃/t]) + Gon gτ $ (x̃0 δ(t̃/t)) · 1t − 1t̃
= 1t Gon gτ $ (x̃0 δ) −
√
√
)x̃0 δ| |t−t̃|
nEn (|K$ (W )x̃0 δ|) tt̃ 1t − 1t̃
6 nEn |K$ (W
t
t +
0
√
√
)x̃ δ|
t−t̃
6 2 n t−t t̃ .
= 2 nEn |K$ (W
t
t
b be a ε-net {N =: t1 , t2 , . . . , tK := N̄ } of [N , N̄ ] such that |tk − tk+1 |/tk 6 1/(2√n). Note that we
We let N
b | 6 1 + 3√n log(N̄ /N ) .
can achieve that with |N
By Markov bound, we have
P(Ao > K) 6 minψ>0 exp(−ψK)E[exp(ψAo )]
c · |N
b | minψ>0 exp(−ψK) exp 8ψ 2
6 8p|Tb | · |W|
c · |N
b | exp(−K 2 /32)
6 8p|Tb | · |W|
here we set ψ = K/16 and bound E[exp(ψAo )] as follows
"
o
E [exp (ψA )]
6(1)
6(2)
6(3)
=(4)
6(5)
6(6)
!#
gτ $ (x̃0 δ)
sup
E exp ψ sup
t
b ×W×
c N
c
kδk1,$ =t
(τ,$,t)∈T
"
!#
K$ (W )x̃0 δ
o
b
c
b
2|T | · |W| · |N |
sup
E exp 2ψ sup Gn
t
b ×W×
c N
c
kδk1,$ =t
(τ,$,t)∈T
#!#
"
"
|Gon (K$ (W )x̃j )|
kδk1,$
c · |N
b|
max
2|Tb | · |W|
sup
E exp 2ψ
sup
1/2
j6p {En [K$ (W )x̃2
t
b ×W×
c N
c
j ]}
(τ,$,t)∈T
kδk1,$ =t o
|Gn (K$ (W )x̃j )|
c · |N
b|
2|Tb | · |W|
sup
E exp 2ψ max
2 1/2
j6p
{E
n [K$ (W )x̃j ]}
b ×W×
c N
(τ,$,t)∈T
c
o
c · |N
b | max sup E exp 4ψ Gn (K$ (W )x̃j )
4p|Tb | · |W|
j6p
{En [K$ (W )x̃2j ]}1/2
c
$∈W
2
b
c
b
8p|T | · |W| · |N | exp 8ψ
Gon
c · |N
b|
2|Tb | · |W|
here (1) follows by exp(maxi∈I |zi |) 6 2|I| maxi∈I exp(zi ), (2) by contraction principle (apply Theorem 4.12
[54] with ti = K$ (Wi )x̃0i δ, and φi (ti ) = ρτ (K$ (Wi )ỹi − K$ (Wi )x̃0i ητ + ti ) − ρτ (K$ (Wi )ỹi − K$ (Wi )x̃0i ητ )
so that |φi (s) − φi (t)| 6 |s − t| and φi (0) = 0, (3) follows by
|Gon (K$ (W )x̃0 δ)| 6 kδk1,$ max |Gon (K$ (W )x̃j )/{En [K$ (W )x̃2j ]}1/2 |,
j6p
(4) by the definition of suprema, (5) we again use exp(maxi∈I |zi |) 6 2|I| maxi∈I exp(zi ), and (6) exp(z) +
exp(−z) 6 2 exp(z 2 /2).
Lemma 14 (Estimation Error of Refitted Quantile Regression). Consider an arbitrary vector ηbu and suppose
b u for
kηu k0 6 s. Let kriu 6 r̄u kn,$ , |support(b
ηu )| 6 sbu and En [K$ (W ){ρτ (ỹi − x̃0i ηbu ) − ρτ (ỹi − x̃0i ηu )}] 6 Q
all u ∈ U hold. Furthermore, suppose that
sup
u=(τ,$)∈U
ρτ (ỹ − x̃0 ηeu ) − ρτ (ỹ − x̃0 ηu )
ρτ (ỹ − x̃0 ηeu ) − ρτ (ỹ − x̃0 ηu )
t3
En K$ (W )
− E K$ (W )
| W, x̃
6 √ .
ke
ηu − ηu k1,$
ke
ηu − ηu k1,$
n
Under these events, we have for n large enough,
s
p
√
(b
su + s)
0
e
b 1/2
k fu x̃i (e
ηu − ηu )kn,$ . Nu :=
(Kn1 + t3 / n) + Kn2 + f¯r̄u + Q
u
φmin (u, sbu + s)
QUANTILE GRAPHICAL MODELS
61
√
where φmin (u, k) = inf kδk0 =k k fu x̃0 δk2n,$ /kδk2 , provided that
f¯0 En [K$ (W )(|ru | + |ru |2 )|x̃0 δ̄|2 ]
eu /q̄A → 0.
+N
u
En [K$ (W )fu |x̃0 δ̄|2 ]
u∈U ,kδ̄k0 6b
su +s
sup
(F.72)
where Au = {δ ∈ Rp : kδk0 6 sbu + s}.
Proof of Lemma 14. Let δbu = ηbu − ηu which satisfies kδbu k0 6 sbu + s. By optimality of ηeu in the refitted
quantile regression we have
En [K$ (W )ρτ (ỹi − x̃0i ηeu )] − En [K$ (W )ρτ (ỹi − x̃0i ηu )]
bu
6 En [K$ (W )ρτ (ỹi − x̃0i ηbu )] − En [K$ (W )ρτ (ỹi − x̃0i ηu )] 6 Q
(F.73)
where the second inequality holds by assumption.
Moreover, by assumption, uniformly over u ∈ U, we have conditional on (Wi , x̃i , riu )ni=1 that
!
ρτ (ỹ − x̃0 (ηu + δeu )) − ρτ (ỹ − x̃0 ηu )
Gn K$ (W )
6 t3 .
kδeu k1,$
(F.74)
Thus combining relations (F.73) and (F.74), we have
√
bu .
En [E[K$ (W ){ρu (ỹ − x̃0 (ηu + δeu )) − ρu (ỹ − x̃0 ηu )}|x̃, r̃, $]] 6 kδeu k1,$ t3 / n + Q
Invoking the sparse identifiability relation of Lemma 12, since the required condition on the approximation
errors ru ’s holds by assumption (F.72), for n large enough
√
o
p
p
k fu x̃0 δeu k2n,$ n
√
bu ,
∧ q̄Au k fu x̃0 δeu kn,$ 6 Kn2 k fu x̃0 δeu kn,$ + kδeu k1,$ (Kn1 + t3 / n) + Q
4
where q̄Au is defined with Au := {δ : kδk0 6 sbu + s}. Moreover, by the sparsity of δ̃u we have kδeu k1,$ 6
p
√
√
(b
su + s)/φmin (u, sbu + s)k fu x̃0 δeu kn,$ so that we have for t = k fu x̃0 δeu kn,$ ,
t2
∧ {q̄Au t}
4
6 t(Kn2 +
p
√
bu .
(b
su + s)/φmin (u, sbu + s){Kn1 + t3 / n}) + Q
Note that for positive numbers (t2 /4) ∧ (q̄Au t) 6 A + Bt implies t2 /4 6 A + Bt provided q̄Au /2 > B and
2
2
2q̄A
> A. (Indeed, otherwise (t2 /4) > qt so that t > 4q, which in turn implies that 2q̄A
+ q̄Au t/2 6
u
u
2
2
(t /4) ∧ q̄Au t 6 A + Bt.) Note that q̄Au /2 > B and 2q̄Au > A is implied by condition (F.72) when we set
p
√
b u and B = (Kn2 + (b
su + s)/φmin (u, sbu + su ){K1n + t3 / n}). Thus the minimum is achieved in the
A=Q
quadratic part. Therefore, for n sufficiently large, we have
p
√ p
b 1/2
k fu x̃0 δeu kn,$ 6 Q
su + s)/φmin (u, sbu + su ).
u + Kn2 + (Kn1 + t3 / n) (b
Under the condition maxi6n kx̃i k2∞ log(n∨p) = o(n minτ ∈T τ (1−τ )), the next result provides new bounds
for the data driven penalty choice parameter when the quantile indices in T can approach the extremes.
Lemma 15 (Pivotal Penalty Parameter Bound). Let τ = minτ ∈T τ (1 − τ ) and Kn = maxi6n,j∈[p] |x̃ij /b
σj |,
σ
bj = En [x̃2j ]1/2 . Under Kn2 log(p/τ ) = o(nτ ), for n large enough we have that for some constant C̄
r
log(16p/(τ ξ))
Λ(1 − ξ|x̃1 , . . . , x̃n ) 6 C̄
n
62
BELLONI, CHEN, AND CHERNOZHUKOV
where Λ(1 − ξ|x̃1 , . . . , x̃n ) is the 1 − ξ quantile of maxj∈[p] supτ ∈T
Pn
i=1
x̃ij (τ −1{Ui 6τ })
σ
bj
√
τ (1−τ )
conditional on
x̃1 , . . . , x̃n , and Ui are independent uniform(0, 1) random variables.
Proof. Conditional on x̃1 , . . . , x̃n , letting σ
bj2 = En [x2j ], we have that
Pn
i=1 x̃j (τ − 1{U 6 τ })
p
nΛ = max sup
.
j∈[p] τ ∈T
σ
bj τ (1 − τ )
Step 1. (Entropy Calculation) Let F = {x̃ij (τ − 1{Ui 6 τ })/b
σj : τ ∈ T , j ∈ [p]}, hτ =
G = {fτ /hτ : τ ∈ T }. We have that
p
τ (1 − τ ), and
d(fτ /hτ , fτ̄ /hτ̄ ) 6 d(fτ , fτ̄ )/hτ + d(fτ̄ /hτ , fτ̄ /hτ̄ )
6 d(fτ , fτ̄ )/hτ + d(0, fτ̄ /hτ̄ )|hτ − hτ̄ |/hτ
Therefore, since kF kQ 6 kGkQ by hτ 6 1, and d(0, fτ̄ /hτ̄ ) 6 1/hτ̄ we have
N (kGkQ , G, Q) 6 N (kF kQ /{2 min hτ }, F, Q)N (/{2 min h2τ }, T , | · |).
τ ∈T
τ ∈T
Thus we have for some constants K and v that
N (kGkQ , G, Q) 6 p(K/{ min h2τ })v .
τ ∈T
Step 2.(Symmetrization) Since we have E[g 2 ] = 1 for all g ∈ G, by Lemma 2.3.7 in [72] we have
√
P(Λ > t n) 6 4P(max sup |Gon (g)| > t/4)
j6p τ ∈T
Gon
: G → R is the symmetrized process generated by Rademacher variables. Conditional on
here
(x1 , u1 ), . . . , (xn , un ), we have that {Gon (g) : g ∈ G} is sub-Gaussian with respect to the L2 (Pn )-norm
by the Hoeffding inequality. Thus, by Lemma 16 in [11], for δn2 = supg∈G En [g 2 ] and δ̄n = δn /kGkPn , we
have
Z δ̄n /2
p
2
P(sup |Gon (g)| > CKδn log(pK/τ ) | {x̃i , Ui }ni=1 ) 6
−1 {p(K/{ min h2τ })v }−C +1 d
g∈G
τ ∈T
0
for some universal constant K.
δn2
In order to control δn , note that δn2 = supg∈G
maxi6n G2i , we have
P(sup |Gon (g 2 )| > C K̄δn max Gi
i6n
g∈G
Thus with probability 1 −
R 1/2
0
√1 Gn (g 2 )
n
+ E[g 2 ]. In turn, since supg∈G En [g 4 ] 6
Z
p
log(pK/τ ) | {x̃i , Ui }ni=1 ) 6
δ̄n /2
−1 {p(K/{τ })v }−C
2
+1
d.
0
√
d, since E[g 2 ] = 1 and maxi6n Gi 6 Kn / τ , we have
p
C 0 Kn log(pK/τ )
√ √
δn 6 1 +
.
n τ
−1 {p(K/τ )v }−C
2
+1
p
√ √
Therefore, under Kn log(pK/τ ) = o( n τ ), conditionally on {x̃i }ni=1 and n sufficiently large, with
R 1/2 −1
2
probability 1 − 2 0 {p(K/{τ })v }−C +1 d we have that
p
sup |Gon (g)| 6 2CK log(pK/τ )
g∈G
QUANTILE GRAPHICAL MODELS
The stated bound follows since for C > 2
Z 1/2
Z
2
2
2
−1 {p(K/{τ })v }−C +1 d 6 {p/τ }−C +1 2
0
1/2
63
2
−2+C d 6 {p/τ }−C
2
+1
.
0
Appendix G. Inequalities
b and Σ be p × p matrices with non-negative diagonal entries,
Lemma 16 (Transfer principle, [65]). Let Σ
and assume that for some η ∈ (0, 1) and s 6 p we have
b > (1 − η)v 0 Σv
∀v ∈ Rp , kvk0 6 s, v 0 Σv
b kk − (1 − η)Σkk . Then for all δ ∈ Rp we have
Let D be a diagonal matrix such that Dkk > Σ
b > (1 − η)δ 0 Σδ − kD1/2 δk21 /(s − 1).
δ 0 Σδ
λ
Z
= βbuj 1{b
σa$j
|βbuj | > λ}
Lemma 17. Consider βbu and βu with kβu k0 6 s. Denote by βbuλ the vector with βbuj
Z
where σ
ba$j
= {En [K$ (W )(Zja )2 ]}1/2 . We have that
kβbuλ − βu k1,$ 6 kβbu − βu k1,$ + λs
|support(βbuλ )| 6 s + kβbu − βu k1,$ /λ
q
√
√
kZ a (βbuλ − βu )kn,$ 6 kZ a (βbu − βu )kn,$ + φ̃max (s, $){2 sλ + kβbu − βu k1,$ / s}
a
a
here φ̃max (m, $) = sup16kθk0 6m kZ̃ a θkn,$ /kθk and Z̃ij
= Zij
/{En [K$ (W )(Zja )2 ]}1/2 .
Proof. Let Tu = support(βu ). The first relation follows from the triangle inequality
kβbuλ − βu k1,$
= k(βbuλ − βu )Tu k1,$ + k(βbuλ )Tuc k1,$
6 k(βbuλ − βbu )Tu k1,$ + k(βbu − βu )Tu k1,$ + k(βbuλ )Tuc k1,$
6 λs + k(βbu − βu )Tu k1,$ + k(βbu )Tuc k1,$
= λs + kβbu − βu k1,$
To show the second result note that kβbu − βu k1,$ > {|support(βbuλ )| − s}λ. Therefore,
|support(βbuλ )| 6 s + kβbu − βu k1,$ /λ
which yields the result.
To show the third bound, we start using the triangle inequality
kZ a (βbuλ − βu )kn,$ 6 kZ a (βbuλ − βbu )kn,$ + kZ a (βbu − βu )kn,$ .
Without loss of generality, assume that the components are ordered so that |(βbuλ − βbu )j |b
σuj is decreasing.
Let T1 be the set of s indices corresponding to the largest values of |(βbuλ − βbu )j |b
σuj . Similarly define Tk
as the set of s indices corresponding to the largest values of |(βbuλ − βbu )j |b
σuj outside ∪k−1
m=1 Tm . Therefore,
64
BELLONI, CHEN, AND CHERNOZHUKOV
Pdp/se
βbuλ − βbu = k=1 (βbuλ − βbu )Tk . Moreover, given the monotonicity of the components, k(βbuλ − βbu )Tk k2,$ 6
√
k(βbuλ − βbu )Tk−1 k1 / s. Then, we have
Pdp/se
kZ a (βbuλ − βbu )kn,$ = kZ a k=1 (βbuλ − βbu )Tk kn,$
P
6 kZ a (βbuλ − βbu )T1 kn,$ + k>2 kZ a (βbuλ − βbu )Tk kn,$
q
q
P
6 φ̃max (s, $)k(βbuλ − βbu )T1 k2,$ + φ̃max (s, $) k>2 k(βbuλ − βbu )Tk k2,$
q
q
P
√
√
6 φ̃max (s, $)λ s + φ̃max (s, $) k>1 k(βbuλ − βbu )Tk k1,$ / s
q
q
√
√
= φ̃max (s, $)λ s + φ̃max (s, $)kβbuλ − βbu k1,$ / s
q
√
√
6 φ̃max (s, $){2λ s + kβbu − βu k1,$ / s}
here the last inequality follows from the first result and the triangle inequality.
Lemma 18 (Supremum of Sparse Vectors on Symmetrized Random Matrices). Let Ub denote a finite set
and (Xiu )u∈Ub , i = 1, . . . , n, be fixed vectors such that Xiu ∈ Rp and max16i6n maxu∈Ub kXiu k∞ 6 K.
Furthermore define
p
p
p
√ q
√
b
log |U| + 1 + log p + log k log(p ∨ n) log n / n,
δn := C̄K k
where C̄ is a universal constant. Then,
"
E
#
0
2
max En [ε(θ Xu ) ]
sup
b
kθk0 6k,kθk=1 u∈U
6 δn
p
sup
En [(θ0 Xu )2 ].
b
kθk0 6k,kθk=1,u∈U
Proof. See [14] for the proof.
Corollary 2 (Supremum of Sparse Vectors on Many Random Matrices). Let Ub denote a finite set and
(Xiu )u∈Ub , i = 1, . . . , n, be independent (across i) random vectors such that Xiu ∈ Rp and
r
E[ max max kXiu k2∞ ] 6 K.
16i6n u∈U
b
Furthermore define
p
p
p
√ q
√
b + 1 + log p + log k log(p ∨ n) log n / n,
δn := C̄K k
log |U|
here C̄ is a universal constant. Then,
"
#
0
2
0
2
E
sup
max En (θ Xu ) − E[(θ Xu ) ]
6 δn2 + δn
b
kθk0 6k,kθk=1 u∈U
sup
p
En [E[(θ0 Xu )2 ]].
b
kθk0 6k,kθk=1,u∈U
We will also use the following result of [25].
Lemma 19 (Maximal Inequality). Work with the setup above. Suppose that F > supf ∈F |f | is a measurable
envelope for F with kF kP,q < ∞ for some q > 2. Let M = maxi6n F (Wi ) and σ 2 > 0 be any positive
constant such that supf ∈F kf k2P,2 6 σ 2 6 kF k2P,2 . Suppose that there exist constants a > e and v > 1 such
that
log sup N (kF kQ,2 , F, k · kQ,2 ) 6 v log(a/), 0 < 6 1.
Q
QUANTILE GRAPHICAL MODELS
65
Then
s
EP [sup |Gn (f )|] 6 K
vσ 2
log
f ∈F
akF kP,2
σ
vkM kP,2
√
+
log
n
akF kP,2
σ
!
,
here K is an absolute constant. Moreover, for every t > 1, with probability > 1 − t−q/2 ,
h
i
√
sup |Gn (f )| 6 (1 + α)EP [sup |Gn (f )|] + K(q) (σ + n−1/2 kM kP,q ) t + α−1 n−1/2 kM kP,2 t ,
f ∈F
f ∈F
∀α > 0 where K(q) > 0 is a constant depends only on q. In particular, setting a > n and t = log n, with
probability > 1 − c(log n)−1 ,
s
!
akF kP,2
vkM kP,q
akF kP,2
√
sup |Gn (f )| 6 K(q, c) σ v log
+
log
,
(G.75)
σ
σ
n
f ∈F
here kM kP,q 6 n1/q kF kP,q and K(q, c) > 0 is a constant depending only on q and c.
Appendix H. Confidence Regions for Function-Valued Parameters Based on Moment
Conditions
For completeness, in this section we collect an adaptation of the results of [14] that are invoked in our
proofs. The main difference is the weakening of the identification condition (which is allowed to decrease to
zero, see the parameter jn in Condition C1 below). We are interested in function-valued target parameters
indexed by u ∈ U ⊂ Rdu . The true value of the target parameter is denoted by
θ0 = (θuj )u∈U ,j∈[p̃] , where θuj ∈ Θuj for each u ∈ U and j ∈ [p̃].
For each u ∈ U and j ∈ [p̃], the parameter θuj is characterized as the solution to the following moment
condition:
E[ψuj (Wuj , θuj , ηuj )] = 0,
(H.76)
where Wuj is a random vector that takes values in a Borel set Wuj ⊂ Rdw , η 0 = (ηuj )u∈U ,j∈[p̃] is a nuisance
parameter where ηuj ∈ Tuj a convex set, and the moment function
ψuj : Wuj × Θuj × Tujn 7→ R, (w, θ, t) 7→ ψuj (w, θ, t)
(H.77)
is a Borel measurable map.
We assume that the (continuum) nuisance parameter η 0 can be modelled and estimated by ηb =
(b
ηuj )u∈U ,j∈[p̃] . We will discuss examples where the corresponding η 0 can be estimated using modern regularization and post-selection methods such as Lasso and Post-Lasso (although other procedures can be applied).
The estimator θ̌uj of θuj is constructed as any approximate n -solution in Θuj to a sample analog of the
moment condition (H.76), i.e.,
max sup |En [ψuj (Wuj , θ̌uj , ηbuj )]| − inf |En [ψuj (Wuj , θ, ηbuj )]| 6 n = oP (n−1/2 δn ).
(H.78)
j∈[p̃] u∈U
θj ∈Θuj
As discussed before, we rely on an orthogonality condition for regular estimation of θuj , which we will
state next.
66
BELLONI, CHEN, AND CHERNOZHUKOV
Definition 1 (Near Orthogonality Condition). For each u ∈ U and j ∈ [p̃], we say that ψuj obeys a
general form of orthogonality with respect to Huj uniformly in u ∈ U, if the following conditions hold: the
Gâteaux derivative map
!
n
h
io
Du,j,r̄ [η̃uj − ηuj ] := ∂r E ψuj Wuj , θuj , ηuj + r η̃uj − ηuj
r=r̄
exists for all r ∈ [0, 1), η̃ ∈ Huj , j ∈ p̃, and u ∈ U and vanishes at r = 0, namely,
|Du,j,0 [η̃uj − ηuj ]| 6 δn n−1/2
for all η̃uj ∈ Huj .
(H.79)
In what follows, we shall denote by c0 , c, and C some positive constants.
Assumption C1 (Moment Condition). Consider a random element W , taking values in a measure space
(W, AW ), with law determined by a probability measure P ∈ Pn . The observed data ((Wiu )u∈U )ni=1 consist of
n i.i.d. copies of a random element (Wu )u∈U which is generated as a suitably measurable transformation with
respect to W and u. Uniformly for all n > n0 and P ∈ Pn , the following conditions hold: (i) The true parameter value θuj obeys (H.76) and is interior relative to Θuj , namely there is a ball of radius Cn−1/2 un log n
√
centered at θuj contained in Θuj for all u ∈ U, j ∈ [p̃] with un := E[supu∈U ,j∈[p̃] | nEn [ψuj (Wuj , θuj , ηuj )]|];
(ii) For each u ∈ U and j ∈ [p̃], the map (θ, η) ∈ Θuj × Huj 7→ E[ψuj (Wuj , θ, η)]| is twice continuously differentiable; (iii) For all u ∈ U and j ∈ [p̃], the moment function ψuj obeys the orthogonality condition given in
Definition 1 for the set Huj = Hujn specified in Assumption C2; (iv) The following identifiability condition
holds: |E[ψuj (Wuj , θ, ηuj )]| > 21 |Juj (θ − θuj )| ∧ c0 for all θ ∈ Θuj , with Juj := ∂θ E[ψuj (Wuj , θ, ηuj )]|θ=θuj
satisfies 0 < jn < |Juj | < C < ∞ for all u ∈ U and j ∈ [p̃]; (v) The following smoothness conditions holds
E[{ψ
(W
,θ,η)−ψ
(W
,θ̄,η̄)}2 ]
uj
uj
uj
uj
6 C,
(a) supu∈U ,j∈[p̃],(θ,θ̄)∈Θ2uj ,(η,η̄)∈H2ujn
{|θ−θ̄|∨kη−η̄ke }α
(b) supu∈U ,(θ,η)∈Θuj ×Hujn ,r∈[0,1)
|∂r E [ψuj (Wuj , θ, ηuj + r{η − ηuj })] |/kη − ηuj ke 6 B̄1n ,
(c) supu∈U ,j∈[p̃],(θ,η)∈Θuj ×Hujn ,r∈[0,1)
|∂r2 E[ψuj (Wuj ,θuj +r{θ−θuj },ηuj +r{η−ηuj })]|
{|θ−θuj |2 ∨kη−ηuj k2e }
6 B̄2n .
Next we state assumptions on the nuisance functions. In what follows, let ∆n & 0, δn & 0, and τn & 0
be sequences of constants approaching zero from above at a speed at most polynomial in n (for example,
δn > 1/nc for some c > 0).
Assumption C2 (Estimation of Nuisance Functions). The following conditions hold for each n > n0 and all
P ∈ Pn . The estimated functions ηbuj ∈ Hujn with probability at least 1 − ∆n , Hujn is the set of measurable
maps η̃uj such that
sup max kη̃uj − ηuj ke 6 τn ,
u∈U j∈[p̃]
here the e-norm is the same as in Assumption C1, and whose complexity does not grow too quickly in the
sense that F1 = {ψuj (Wuj , θ, η) : u ∈ U, j ∈ [p̃], θ ∈ Θuj , η ∈ Hujn ∪ {ηuj }} is suitably measurable and its
uniform covering entropy obeys:
sup log N (kF1 kQ,2 , F1 , k · kQ,2 ) 6 sn(U ,p̃) (log(an /)) ∨ 0,
Q
where F1 (W ) is an envelope for F1 which is measurable with respect to W and satisfies F1 (W ) >
supu∈U ,j∈[p̃],θ∈Θuj ,η∈Hujn |ψuj (Wuj , θ, η)| and kF1 kP,q 6 Kn for q > 2. The complexity characteristics
QUANTILE GRAPHICAL MODELS
67
an > max(n, Kn , e) and sn(U ,p̃) > 1 obey the growth conditions:
p
1
n−1/2 sn(U ,p̃) log(an ) + n−1 sn(U ,p̃) n q Kn log(an ) 6 τn
p
1
1
{(1 ∨ B̄1n )(τn /jn )}α/2 sn(U ,p̃) log(an ) + sn(U ,p̃) n q − 2 Kn log(an ) log n 6 δn ,
√
nB̄2n (1 ∨ B̄1n )(τn /jn )2 6 δn
and
here B̄1n , B̄2n , jn , q and α are defined in Assumption C1.
Theorem 5 (Uniform Bahadur representation for a Continuum of Target Parameters). Under Assumptions
C1 and C2, for an estimator (θ̌uj )u∈U ,j∈[p̃] that obeys equation (H.78),
√ −1
nσuj (θ̌uj − θuj ) = Gn ψ̄uj + OP (δn ) in `∞ (U × [p̃]), uniformly in P ∈ Pn ,
−1 −1
−2 2
2
here ψ̄uj (W ) := −σuj
Juj ψuj (Wuj , θuj , ηuj ) and σuj
= E[Juj
ψuj (Wuj , θuj , ηuj )].
The uniform Bahadur representation derived in Theorem 5 is useful in the construction of simultaneous
confidence bands for (θuj )u∈U ,j∈[p̃] . This is achieved by new high-dimensional central limit theorems that
have recently been developed in [24] and [25]. We will make use of the following regularity condition. In what
−1 b−1
Juj ψuj (Wuj , θ̌uj , ηbuj )
follows δ̄n and ∆n are fixed sequences going to zero, and we denote ψbuj (W ) := −b
σuj
b
be the estimators of ψ̄uj (W ), with Juj and σ
buj being suitable estimators of Juj and σuj . In what follows,
k · kPn ,2 denotes the empirical L2 (Pn )-norm with Pn as the empirical measure of the data.
Assumption C3 (Score Regularity). The following conditions hold for each n > n0 and all P ∈ Pn . (i)
The class of function induced by the score F0 = {ψ̄uj (W ) : u ∈ U, j ∈ [p̃]} is suitably measurable and its
uniform covering entropy obeys:
sup log N (kF0 kQ,2 , F0 , k · kQ,2 ) 6 %n (log(An /)) ∨ 0,
Q
here F0 (W ) is an envelope for F0 which is measurable with respect to W and satisfies F0 (W ) >
supu∈U ,j∈[p̃] |ψ̄uj (W )| and kF0 kP,q 6 Ln for q > 4. Furthermore, c 6 supu∈U ,j∈[p̃] E[|ψ̄uj (W )|k ] 6 CLk−2
n
for k = 2, 3, 4. (ii) The set Fb0 = {ψ̄uj (W ) − ψbuj (W ) : u ∈ U, j ∈ [p̃]} satisfies the conditions log N (, Fb0 , k ·
kP ,2 ) 6 %̄n (log(Ān /)) ∨ 0, and sup
En [{ψ̄uj (W ) − ψbuj (W )}2 ] 6 δ̄n {ρn ρ̄n log(An ∨ n) log(Ān ∨ n)}−1
u∈U ,j∈[p̃]
n
with probability 1 − ∆n .
Assumption C3 imposes condition on the class of functions induced by ψ̄uj and on its estimators ψbuj .
Typically the bound Ln on the moment of the envelope is smaller than Kn , and in many settings ρ̄n = ρn . dU
the dimension of U.
Next let N denote a mean zero Gaussian process indexed by U × [p̃] with covariance operator given by
E[ψ̄uj (W )ψ̄u0 j 0 (W )] for j, j 0 ∈ [p̃] and u, u0 ∈ U. Because of the high-dimensionality, indeed p̃ can be larger
than the sample size n, the central limit theorem will be uniformly valid over “rectangles”. This class of
sets are rich enough to construct many confidence regions of interest in applications accounting for multiple
testing. Let R denote the set of rectangles R = {z ∈ Rp̃ : maxj∈A zj 6 t, maxj∈B (−zj ) 6 t} for all A, B ⊂ [p̃]
and t ∈ R. The following result is a consequence of Theorem 5 above and Corollary 2.2 of [26].
Corollary 3. Under Assumptions C1, C2 and Assumption C3(i), with δn = o({ρn log(An ∨ n)}−1/2 ), and
ρn log(An ∨ n) = o({(n/L2n )1/7 ∧ (n1−2/q /L2n )1/3 }), we have that
−1
sup sup PP {sup n1/2 σuj
(θ̌uj − θuj )}p̃j=1 ∈ R − PP (N ∈ R) = o(1).
P ∈Pn R∈R
u∈U
68
BELLONI, CHEN, AND CHERNOZHUKOV
In order to derive a method to build confidence regions we approximate the process N by the Gaussian
multiplier bootstrap based on estimates ψbuj of ψ̄uj , namely
)
(
n
X
1
gi ψbuj (Wi )
Gb = (Gbuj )u∈U ,j∈[p̃] = √
n i=1
u∈U ,j∈[p̃]
are independent standard normal random variables which are independent from the data (Wi )ni=1 .
here
Based on Theorem 5.2 of [24], the following result shows that the multiplier bootstrap provides a valid
√
approximation to the large sample probability law of n(θ̌uj − θuj )u∈U ,j∈[p̃] over rectangles.
(gi )ni=1
Corollary 4 (Uniform Validity of Gaussian Multiplier Bootstrap). Under Assumptions C1, C2
and Assumption C3, with δn = o({(1 + dW )ρn log(An ∨ n)}−1/2 ) and ρn log(An ∨ n) = o({(n/L2n )1/7 ∧
(n1−2/q /L2n )1/3 }), we have that
p̃
1/2 −1
sup sup PP {sup n σuj (θ̌uj − θuj )}j=1 ∈ R − PP (Gb ∈ R | (Wi )ni=1 ) = o(1)
P ∈Pn R∈R
u∈U
Appendix I. Continuum of `1 -Penalized M-Estimators
For the reader’s convenience, this section collects results on the estimation of a continuum of estimation
of high-dimensional models via `1 -penalized estimators. We refer to [14] for the proofs.
Consider a data generating process with a response variable (Yu )u∈U and observable covariates (Xu )u∈U
satisfies for each u ∈ U,
θu ∈ arg minp E[Mu (Yu , Xu , θ, au )],
θ∈R
(I.80)
here θu is a p-dimensional vector, au is a nuisance function that capture the misspecification of the model,
Mu is a pre-specified function, and the pu -dimensional (pu 6 p) covariate Xu could have been constructed
based on transformations of other variables. This implies that
∂θ E[Mu (Yu , Xu , θu , au )] = 0 for all u ∈ U.
The solution θu is assumed to be sparse in the sense that for some process (θu )u∈U satisfies
kθu k0 6 s for all u ∈ U.
Because of the nuisance function, such sparsity assumption is very mild and formulation (I.80) encompasses
several cases of interest including approximate sparse models. We focus on the estimation of (θu )u∈U and
we assume that an estimate b
au of the nuisance function au is available and the criterion Mu (Yu , Xu , θu ) :=
Mu (Yu , Xu , θu , b
au ) is used as a proxy for Mu (Yu , X, θu , au ).
In the case of linear regression we have Mu (y, x, θ) = 21 (y − x0 θ)2 . In the logistic regression case, we
have Mu (y, x, θ) = −{1(y = 1) log G(x0 θ) + 1(y = 0) log(1 − G(x0 θ))} with G is the logistic link function
G(t) = exp(t)/{1 + exp(t)}. Additional examples include quantile regression models for u ∈ (0, 1).
0
Example 8 (Quantile Regression Model). Consider a data generating process Y = FY−1
|X (U ) = X θU +
rU (X), with U ∼ Unif(0, 1), and X is a p-dimensional vector of covariates. The criterion Mu (y, x, θ) =
(u − 1{y 6 x0 θ})(y − x0 θ) with the (trivial) estimate b
au = 0 for the nuisance parameter au = ru .
QUANTILE GRAPHICAL MODELS
69
Example 9 (Lasso with Estimated Weights). We consider a linear model defined as fu Y = fu X 0 θu +
r̄u + ζu , E[fu Xζu ] = 0, here X are p̄-dimensional covariates, θu is a s-sparse vector, and r̄u is an approximation error satisfies supu∈U En [r̄u2 ] .P s log p̄/n. In this setting, (Y, X) are observed and only an
estimator fbu of fu is available. This corresponds to nuisance parameter au = (fu , r̄u ) and b
au = (fbu , 0) so
2
0
2
2
0 2
b
that En [Mu (Y, X, θ, au )] = En [fu (Y − X θ − r̄u ) ] and En [Mu (Y, X, θ)] = En [fu (Y − X θ) ].
We assume that n i.i.d. observations from dgps with (I.80) holds, {(Yiu , Xiu )u∈U }ni=1 , are observed to
b u , we define
estimate (θu )u∈U . For each u ∈ U, a penalty level λ, and a diagonal matrix of penalty loadings Ψ
the `1 -penalized Mu -estimator (Weighed-Lasso) as
λ b
θbu ∈ arg min En [Mu (Yu , Xu , θ)] + kΨ
u θk1 .
θ
n
(I.81)
Furthermore, for each u ∈ U, the post-penalized estimator (Post-Lasso) based on a set of covariates Teu is
then defined as
θeu ∈ arg min En [Mu (Yu , Xu , θ)] : support(θ) ⊆ Teu .
(I.82)
θ
Potentially, the set Teu contains support(θbu ) and possibly additional variables deemed as important (although
in that case the total number of additional variables should also obey the same growth conditions that s
obeys). We will set Teu = support(θbu ) unless otherwise noted.
bu =
In order to handle the functional response data, the penalty level λ and penalty loading Ψ
diag({b
luk , k = 1, . . . , p}) need to be set to control selection errors uniformly over u ∈ U. The choice of
b u0 = diag({luk , k =
loading matrix is problem specific and we suggest to mimic the following “ideal” choice Ψ
1, . . . , p}) with
luk = {En {∂θk Mu (Yu , Xu , θu , au )}2 }1/2
(I.83)
which is motivated by the use of self-normalized moderate deviation theory. In that case, it is suitable to
set λ so that with high probability
λ
b −1 En [∂θ Mu (Yu , Xu , θu , au )]
> c sup Ψ
u0
n
u∈U
∞
,
(I.84)
here c > 1 is a fixed constant. Indeed, in the case that U is a singleton the choice above is similar to [21],
[13], and [20]. This approach was first employed for a continuum of indices U in the context of `1 -penalized
quantile regression processes by [11].
To implement (I.84), we propose setting the penalty level as
√
λ = c nΦ−1 (1 − ξ/{2pNn }),
(I.85)
here Nn is a measure of the class of functions indexed by U, 1 − ξ (with ξ = o(1)) is a confidence level
associated with the probability of event (I.84), and c > 1 is a slack constant. In many settings we can take
Nn = ndU . If the set U is a singleton, Nn = 1 suffices which corresponds to what is used in [17].
I.1. Generic Finite Sample Bounds. In this subsection we derive finite sample bounds based on Assumption C4 below. This assumption provides sufficient conditions that are implied by a variety of settings
including generalized linear models.
70
BELLONI, CHEN, AND CHERNOZHUKOV
Assumption C4 (M-Estimation Conditions). Let {(Yiu , Xiu , u ∈ U), i = 1, . . . , n} be n i.i.d. observations
of the model (I.80) and let Tu = support(θu ), here kTu k0 6 s, u ∈ U. With probability 1 − ∆n we have that
for all u ∈ U there are weights wu = wu (Yu , Xu ) and Cun such that:
√
(a) |En [∂θ Mu (Yu , Xu , θu ) − ∂θ Mu (Yu , Xu , θu , au )]0 δ| 6 Cun k wu Xu0 δkPn ,2 ;
b u0 6 Ψ
b u 6 LΨ
b u0 for ` > 1/c, and let c̃ = Lc+1 supu∈U kΨ
b u0 k∞ kΨ
b −1 k∞ ;
(b) `Ψ
u0
`c−1
(c) for all δ ∈ Au there is q̄Au > 0 such that
√
En [Mu (Yu , Xu , θu + δ)] − En [Mu (Yu , Xu , θu )] − En [∂θ Mu (Yu , Xu , θu )]0 δ + 2Cun k wu Xu0 δkPn ,2
√
√
> k wu Xu0 δk2Pn ,2 ∧ q̄Au k wu Xu0 δkPn ,2 .
In many applications we take the weights to be wu = wu (Xu ) = 1 but we allow for more general weights.
Assumption C4(a) bounds the impact of estimating the nuisance functions uniformly over u ∈ U. In the
b u are assumed
setting with s-sparse estimands, we typically have Cun . {n−1 s log(pn)}1/2 . The loadings Ψ
b
larger (but not too much larger) than the ideal choice Ψu0 defined in (I.83). This is formalized in Assumption
C4(b). Assumption C4(c) is an identification condition that will be imposed for specific choices of Au and
qAu . It relates to conditions in the literature derived for the case of a singleton U and no nuisance functions,
see the restricted strong convexity8 used in [63] and the non-linear impact coefficients used in [11] and [18].
The following results establish rates of convergence for the `1 -penalized solution with estimated nuisance
functions (I.81), sparsity bounds and rates of convergence for the post-selection refitted estimator (I.82).
They are based on restricted eigenvalue type conditions and sparse eigenvalue conditions. With the restricted
√
eigenvalue is defined as κ̄u,2c̃ = inf δ∈∆u,2c̃ k wu Xu0 δkPn ,2 /kδTu k In the results for sparsity and post-selection
refitted models, the minimum and maximum sparse eigenvalues,
√
√
k wu Xu0 δk2Pn ,2
k wu Xu0 δk2Pn ,2
φmin (m, u) = min
and φmax (m, u) = max
,
kδk2
kδk2
16kδk0 6m
16kδk0 6m
are also relevant quantities to characterize the behavior of the estimators.
Lemma 20. Suppose that Assumption C4 holds with δ ∈ Au = {δ : kδTuc k1 6 2c̃kδTu k1 } ∪ {δ : kδk1 6
n
o
√
b −1 k∞ n
√
6ckΨ
λ s
1
0
u0
b
w
X
δk
}
and
q̄
>
3
(L
+
C
k
)k
Ψ
k
+
9c̃C
. Suppose that λ satisfies conP
,2
A
u
un
u0
∞
un
u
n
u
`c−1
λ
c
nκ̄u,2c̃
dition (I.84) with probability 1 − ∆n . Then, with probability 1 − 2∆n we have uniformly over u ∈ U
n
o
√
√
b u0 k∞ λ s + 9c̃Cun
k wu Xu0 (θbu − θu )kPn ,2 6 3 (L + 1c )kΨ
nκ̄u,2c̃
n
on
o
√
√
b −1 k∞ n
6ckΨ
s
1
u0
b u0 k∞ λ s + 9c̃Cun
kθbu − θu k1 6 3 (1+2c̃)
+
C
(L
+
)k
Ψ
un
κ̄u,2c̃
`c−1
λ
c
nκ̄u,2c̃
Lemma 21 (M-Estimation Sparsity). In addition to conditions of Lemma 20, assume that with probability
1 − ∆n for all u ∈ U and δ ∈ Rp we have
√
|{En [∂θ Mu (Yu , Xu , θbu ) − ∂θ Mu (Yu , Xu , θu )]}0 δ| 6 Lun k wu Xu0 δkPn ,2 .
Let Mu = {m ∈ N : m > 2φmax (m, u)L2u } with Lu =
we have that
b −1 k∞ n
ckΨ
u0
c`−1
λ
sbu 6 min φmax (m, u)L2u
m∈Mu
{Cun + Lun }, then with probability 1 − 3∆n
for all u ∈ U.
8Assumption C4 (a) and (c) could have been stated with {C /√s}kδk instead of C k√w X 0 δk
un
un
u u Pn ,2 .
1
QUANTILE GRAPHICAL MODELS
71
Lemma 22. Let Teu , u ∈ U, be the support used for post penalized estimator (I.82) and s̃u = kTeu k0
its cardinality. In addition to conditions of Lemma 20, supposethat Assumption C4(c)
holds also for
√
Au = {δ : kδk0 6 s̃u + s} with probability 1 − ∆n , q̄Au > 2
2{En [Mu (Yu , Xu , θ̃u )] −
s̃u +su kEn [Su ]k∞
√
+ 3Cun
φmin (s̃u +su ,u)
and q̄Au >
1/2
En [Mu (Yu , Xu , θu )]}+ .
√
k wu Xu0 (θ̃u − θu )kPn ,2
Then, we have uniformly over u ∈ U
√
s̃u + su kEn [Su ]k∞
1/2
6 {En [Mu (Yu , Xu , θ̃u )] − En [Mu (Yu , Xu , θu )]}+ + p
+ 3Cun .
φmin (s̃u + su , u)
In Lemma 22, if Teu = support(θbu ), we have that
En [Mu (Yu , Xu , θ̃u )] − En [Mu (Yu , Xu , θu )] 6 En [Mu (Yu , Xu , θbu )] − En [Mu (Yu , Xu , θu )] 6 λC 0 kθbu − θu k1
b u0 k∞ .
and supu∈U kEn [Su ]k∞ 6 C 0 λ with high probability, C 0 6 L supu∈U kΨ
These results generalize important results of the `1 -penalized estimators to the case of functional response
data and estimated of nuisance functions. A key assumption in Lemmas 20-22 is that the choice of λ satisfies
(I.84). We next provide a set of simple generic conditions that will imply the validity of the proposed choice.
These generic conditions can be verified in many applications of interest.
Condition WL. For each u ∈ U, let Su = ∂θ Mu (Yu , Xu , θu , au ), suppose that:
(i) sup max{E[|Suk |3 ]}1/3 /{E[|Suk |2 ]}1/2 Φ−1 (1 − ξ/{2pNn }) 6 δn n1/6 , for all u ∈ U, k ∈ [p];
u∈U k6p
(ii) Nn > N (, U, dU ), here is such that with probability 1 − ∆n :
sup
n [Su −Su0 ]k∞
max kEE[|S
6 δn n− 2 , and
2 1/2
uk | ]
1
dU (u,u0 )6 k6p
2
2
2
|E[Suk
−Su
0 k ]|+|(En −E)[Suk ]|
2]
E[|S
|
uk
dU (u,u0 )6 k6p
sup
max
6 δn .
The following technical lemma justifies the choice of penalty level λ. It is based on self-normalized
moderate deviation theory.
Lemma 23 (Choice of λ). Suppose Condition WL holds, let c0 > c > 1 be constants, ξ ∈ [1/n, 1/ log n], and
√
λ = c0 nΦ−1 (1 − ξ/{2pNn }). Then for n > n0 large enough depends only on Condition WL,
−1
b
P λ/n > c sup kΨu0 En [∂θ Mu (Yu , Xu , θu , au )]k∞ > 1 − ξ − o(ξ) − ∆n .
u∈U
We note that Condition WL(ii) contains high level conditions. See [16] for examples that satisfy these
conditions. The following corollary summarizes these results for many applications of interest in well behaved
designs.
Corollary 5 (Rates under Simple Conditions). Suppose that with probability 1 − o(1) we have that Cun ∨
Lun 6 C{n−1 s log(pn)}1/2 , (Lc+1)/(`c−1) 6 C, wu = 1, and Condition WL holds with log Nn 6 C log(pn).
Further suppose that with probability 1 − o(1) the sparse minimal and maximal eigenvalues are well behaved,
c 6 φmin (s`n , u) 6 φmax (s`n , u) 6 C for some `n → ∞ uniformly over u ∈ U. Then with probability 1 − o(1)
we have
r
r
s log(pn)
s2 log(pn)
0 b
b
, sup kθu − θu k1 .
, and sup kθbu k0 . s.
sup kXu (θu − θu )kPn ,2 .
n
n
u∈U
u∈U
u∈U
Moreover, if Teu = support(θbu ), we have that
r
sup kXu0 (θ̃u
u∈U
− θu )kPn ,2 .
s log(pn)
n
72
BELLONI, CHEN, AND CHERNOZHUKOV
Appendix J. Bounds on Covering entropy
Let (Wi )ni=1 be a sequence of independent copies of a random element W taking values in a measurable
space (W, AW ) according to a probability law P . Let F be a set of suitably measurable functions f : W → R,
equipped with a measurable envelope F : W → R. The proofs for the following lemmas can be found in [16].
Lemma 24 (Algebra for Covering Entropies). Work with the setup above.
(1) Let F be a VC subgraph class with a finite VC index k or any other class whose entropy is bounded above
by that of such a VC subgraph class, then the uniform entropy numbers of F obey
sup log N (kF kQ,2 , F, k · kQ,2 ) . {1 + k log(1/)} ∨ 0
Q
(2) For any measurable classes of functions F and F 0 mapping W to R,
log N (kF + F 0 kQ,2 , F + F 0 , k · kQ,2 ) 6 log N 2 kF kQ,2 , F, k · kQ,2 + log N 2 kF 0 kQ,2 , F 0 , k · kQ,2 ,
log N (kF · F 0 kQ,2 , F · F 0 , k · kQ,2 ) 6 log N 2 kF kQ,2 , F, k · kQ,2 + log N 2 kF 0 kQ,2 , F 0 , k · kQ,2 ,
N (kF ∨ F 0 kQ,2 , F ∪ F 0 , k · kQ,2 ) 6 N (kF kQ,2 , F, k · kQ,2 ) + N (kF 0 kQ,2 , F 0 , k · kQ,2 ) .
(3) For any measurable class of functions F and a fixed function f mapping W to R,
log sup N (k|f | · F kQ,2 , f · F, k · kQ,2 ) 6 log sup N (/2kF kQ,2 , F, k · kQ,2 )
Q
Q
(4) Given measurable classes Fj and envelopes Fj , j = 1, . . . , k, mapping W to R, a function φ : Rk → R
Pk
such that for fj , gj ∈ Fj , |φ(f1 , . . . , fk ) − φ(g1 , . . . , gk )| 6 j=1 Lj (x)|fj (x) − gj (x)|, Lj (x) > 0, and fixed
functions f¯j ∈ Fj , the class of functions L = {φ(f1 , . . . , fk ) − φ(f¯1 , . . . , f¯k ) : fj ∈ Fj , j = 1, . . . , k} satisfies
k
k
X
X
log sup N
L j Fj
, L, k · kQ,2 6
log sup N k kFj kQ,2 , Fj , k · kQ,2 .
Q
Q,2
j=1
j=1
Q
Proof. See Lemma L.1 in [16].
Lemma 25 (Covering Entropy for Classes obtained as Conditional Expectations). Let F denote a class of
measurable functions f : W × Y → R with a measurable envelope F . For a given f ∈ F, let f¯: W → R be
R
the function f¯(w) := f (w, y)dµw (y) here µw is a regular conditional probability distribution over y ∈ Y
R
conditional on w ∈ W. Set F̄ = {f¯: f ∈ F} and let F̄ (w) := F (w, y)dµw (y) be an envelope for F̄. Then,
for r, s > 1,
log sup N (kF̄ kQ,r , F̄, k · kQ,r ) 6 log sup N ((/4)r kF kQ,s
e , F, k · kQ,s
e ),
Q
e
Q
here Q belongs to the set of finitely-discrete probability measures over W such that 0 < kF̄ kQ,r < ∞, and
e belongs to the set of finitely-discrete probability measures over W × Y such that 0 < kF k e < ∞. In
Q
Q,s
particular, for every > 0 and any k > 1,
log sup N (, F̄, k · kQ,k ) 6 log sup N (/2, F, k · kQ,k
e ).
Q
Proof. See Lemma L.2 in [16].
e
Q
| 10math.ST
|
A FAST ALGORITHM FOR THE GAS STATION PROBLEM
arXiv:1706.00195v1 [math.CO] 1 Jun 2017
KLEITOS PAPADOPOULOS AND DEMETRES CHRISTOFIDES
Abstract. In the gas station problem we want to find the cheapest path between two vertices of an n-vertex graph. Our
car has a specific fuel capacity and at each vertex we can fill our car with gas, with the fuel cost depending on the vertex.
Furthermore, we are allowed at most ∆ stops for refuelling.
In this short paper we provide an algorithm solving the problem in O(∆n2 + n2 log n) steps improving an earlier result
by Khuller, Malekian and Mestre.
c : V → R+ . Finally we are also given positive numbers U
and ∆.
1. Introduction
There are numerous problems in the literature in which the
task is to optimise the travel from one location to another
or to optimise a tour visiting a specific set of locations. The
problems usually differ in the restrictions that we may put
into the way we can travel as well as in the notion of what
an ‘optimal’ route means. Of course one could theoretically
check all possible ways to travel and pick out the optimal
one. However we care about finding the optimal route in
a much quicker way as usually checking all possibilities is
impractical.
Each vertex v of G corresponds to a gas station and the
number c(v) corresponds to the cost of the fuel at this station. Given an edge e = uv of G, the number d(e) = d(u, v)
corresponds to the distance between the vertices u and
v, or what is essentially equivalent, to the amount of gas
needed to travel between u and v. Finally, the number U
corresponds to the maximum gas capacity of our car.
Our task is to find the cheapest way possible to move from
vertex s to vertex t if we are allowed to make at most ∆
refill stops.
One of the most widely known abstractions of travel optimisation problems is that of the shortest paths which
although very general in their definition, fail to take into
consideration most of the aspects that arise in real world.
Perhaps one of their more practical generalisations is the
‘gas station problem’, introduced by Khuller, Malekian and
Mestre in [2]. Out of the infinitude of possible of possible parameters it includes one more central aspect of the
travelling agent, that of its limited fuel capacity and fuel
consumption during the travelling. As it is the case for
the shortest paths problem its also with the gas station
problem that it can be used in a variety of problems that
are not directly related with travelling optimisation
We make two further assumptions:
Our first assumption concerns the function d : E → R+ .
We will follow the natural assumption that it satisfies the
triangle inequalities. I.e.
d(u, v) + d(v, w) > d(u, w)
for every u, v, w ∈ V .
Our second assumption concerns the amount of fuel that
we have initially in our car. We will make the assumption
that we start with an empty fuel tank. We also consider
the filling in our tank at this vertex as one of the refill
stops. This does not make much difference. Indeed suppose that initially we have an amount g of gas. Instead of
solving the gas station problem for the graph G, we modify
this graph by adding a new vertex s0 . We define the new
distances by d(s0 , v) = U − g + d(s, v) for every v ∈ V (G).
I.e. the vertex s0 has distance U −g from s and furthermore
The setting of the gas station problem is as follows:
We are given a complete graph G = (V, E), two specific vertices s, t of G and functions d : E → R+ and
Date: June 2, 2017.
2010 Mathematics Subject Classification. 90B06,90C35,68Q25.
Key words and phrases. gas station problem, transportation, algorithm complexity.
Kleitos Papadopoulos, InSPIRE, Agamemnonos 20, Nicosia, 1041, Cyprus, [email protected].
Demetres Christofides, School of Sciences, UCLan, 7080 Pyla, Larnaka, Cyprus, [email protected].
1
2
KLEITOS PAPADOPOULOS AND DEMETRES CHRISTOFIDES
the shortest path from s0 to any other vertex v of G is via
s. We also define c(s0 ) = 0. It is then obvious that if we
start from s0 , we should completely fill our tank and then
move to vertex s. The only difference is that we are now
allowed one fewer refill stop than before. So solving the
gas station problem for G starting from s with g units of
gas is equivalent to solving the gas station problem for G0
starting from s0 with no gas.
An algorithm solving the gas station problem that runs
in O(∆n2 log n) was introduced by Khuller, Malekian and
Mestre in [2]. The main result of our article is the following:
Theorem 1. Given an n vertex graph G, there is an algorithm which solves the gas station problem with ∆ stops
in at most O(∆n2 + n2 log n) steps.
We should point out that the algorithm in [2] makes similar
assumptions to ours. It explicitly mentions the assumption
that the car starts with an empty fuel tank. It does not
mention explicitly the assumption that the distances in the
graph need to satisfy the triangle inequalities. However it
does use it implicitly in its Lemma 1. (See the proof of our
Lemma 3 which makes explicit why we do indeed need the
distances to satisfy the triangle inequalities.)
We will prove Theorem 1 in the next section. In a couple of
instances our algorithm will call some familiar algorithms
with known running time. The interested reader can find
more details about those algorithms in many algorithms
or combinatorial optimisation books, for example in [1].
2. Proof of Theorem 1
We start by ordering all edge distances. Since there are
O(n2 ) edges, this can be done in O(n2 log n) steps, using
e.g. heapsort. In fact we will not use the full ordering of
the edge distances. What we will need are the following
local orderings:
For each v ∈ V we create an ordering v1 , . . . , vn−1 of the
vertices of V \ {v} such that d(v, vi ) 6 d(v, vj ) for i 6 j.
We will call this the local edge ordering at v. (Note
that this definition might be a bit misleading as the local
edge ordering at v is an ordering of the vertices of V \ {v}.
Of course, this gives an ordering of the edges incident to v
and this is where it gets its name from.)
Of course all of these local orderings can also be computed
in O(n2 log n) steps.
So it is enough to show how to solve the gas station problem in O(∆n2 ) time assuming that the edges are already
ordered by distance.
The fact that the edge distances satisfy the triangle inequalities is needed to prove the following simple lemma:
Lemma 2. There is an optimal route during which we
fill our car with a positive amount of gas at every station
(apart from the last one).
Proof. Amongst all optimal routes, pick one passing
through the smallest number of vertices. Suppose that
it passes through vertices v1 , v2 , . . . , vk in that order. We
definitely need to fill our car with gas at v1 as we start
with an empty tank. Suppose now for contradiction that
in this optimal path we do not fill our car at station vi for
some 1 < i < k. Then, instead of moving from vi−1 to
vi+1 through vi , we could have moved to it directly. This
is indeed possible as
d(vi−1 , vi+1 ) 6 d(vi−1 , vi ) + d(vi , vi+1 )
and it is a contradiction as we assumed that our optimal
path is both optimal and minimal.
Lemma 2 is needed to prove the following slightly modified lemma from [2]. Even though it looks completely
obvious, we nevertheless provide a detailed proof in order
to make explicit the need for using Lemma 2 and thus to
require that the distances in the graph satisfy the triangle
inequalities. Lin [3] also makes explicit this requirement.
Essentially the same lemma also appears in [4].
Lemma 3. There is an optimal route, say passing through
vertices v1 , v2 , . . . , vk in that order, where v1 = s and
vk = t, for which an optimal way to refill the tank is as
follows:
(i) For 1 6 i 6 k − 2, if c(vi ) < c(vi+1 ), then at
station vi we completely fill our tank.
(ii) For i = k − 1, if c(vi ) < c(vi+1 ), then at station
vi we fill the tank with just enough gas in order to
reach vertex vi+1 with an empty tank.
(iii) For 1 6 i 6 k −1, if c(vi ) > c(vi+1 ) then at station
vi we fill the tank with just enough gas in order to
reach vertex vi+1 with an empty tank.
Proof. Pick an optimal route as given by Lemma 2.
Suppose that at some point during travelling through this
optimal route we reach vertex vi , with 1 6 i 6 k − 2 and
suppose that c(vi ) < c(vi+1 ). By Lemma 2 we have filled
some gas at station vi+1 . If we did not fully filled our gas
A FAST ALGORITHM FOR THE GAS STATION PROBLEM
at station vi then we could have reduced our cost by filling
more gas at vi and less at vi+1 , a contradiction. So at vi
we definitely must completely fill our tank.
If we reach vk−1 then of course we fill the car with just
enough gas in order to reach vk with our tank completely
empty.
Finally suppose that at some point during travelling
through this optimal route we reach vertex vi , with 1 6
i 6 k − 1 and c(vi ) > c(vi+1 ). Suppose we fill the car at
vi with a units of gas and that when reaching vi+1 we still
have b > 0 units of gas left. Suppose that at vi+1 we fill
our tank with c > 0 units of gas. Of course we could still
reach vi+1 with the same amount of gas but spend at most
as much as before if we filled our car with a − b units of
gas at vi and b + c units of gas at vi+1 .
So indeed the process described in the Lemma is an optimal refilling process.
An immediate and important Corollary of Lemma 3 is the
following:
Corollary 4. There is an optimal route such that for every vertex u that we reach, either at the previous step we
had an empty tank, or two steps before we completely filled
our tank.
Given a vertex u ∈ V and an integer r ∈ {0, 1, . . . , ∆} we
write C0 [u, r] for the minimal cost of starting from s with
an empty tank, and finishing at u with an empty tank going through exactly r edges. We also write CU [u, r] for
the minimal cost of starting from s with an empty tank,
and finishing at u with a full tank going through exactly r
edges.
3
∞. At the end of the algorithm the minimal cost computed
will be less than ∞, guaranteeing that the optimal route
produced does not travel through such edges. (Unless of
course it is impossible to make such a travel, whatever the
cost.)
Note that the ordering of the edges we have already computed using the function d is also an ordering of the edges
using the function d0 . On the other hand d0 does not satisfy the triangle inequalities but we need not worry about
this as we have already used them for Corollary 4. Of
course changing d to d0 does not alter the conclusion of
the Corollary even though d0 does not satisfy the triangle
inequalities.
Our task is to calculate all C0 [t, r] for 0 6 r 6 ∆. The
required quantity will then be the minimum of these. This
minimum can be calculated in ∆ steps.
We will proceed inductively as follows:
Step 2r + 1: We calculate all C0 [u, r] with u ∈ U in O(n2 )
time.
Step 2r + 2: We calculate all CU [u, r] with u ∈ U in O(n2 )
time.
We can stop at Step 2∆ + 1 and so the total running time
will be O(∆n2 ) as required.
The first two steps are easy to perform and can even be
calculated in O(n) time as we have
(
0 u=s
C0 [u, 0] =
∞ u 6= s
and
CU [u, 0] = C0 [u, 0] + U c(u).
If it is impossible to be on the vertex u going through
exactly r edges then we define C0 [u, r] = CU [u, r] = ∞.
The use of the symbol ∞ is purely for convenience of the
proof. We could have just said that C0 [u, r] and CU [u, r]
are undefined. We will in fact make further use of this symbol. Note that given two vertices u, v with d(u, v) > U we
can never travel between u and v. Rather than separating
the cases in which d(u, v) > U or not it will be simpler to
make all these distances equal to ∞. To be more explicit,
we define a new function d0 : E → R+ ∪ {∞} by
(
d(e) if d(e) 6 U
0
d (e) =
∞
otherwise.
In what follows, we might often travel through edges e with
d0 (e) = ∞. The total cost of such a travel will be equal to
So now we assume that r > 1. For ease of exposition only,
we will first explain how to perform Step 2r + 2 as is is
easier to explain. To perform Step 2r + 2 we will assume
that we already performed Step 2r + 1. Of course there is
no problem with this as long as when we explain how to
perform Step 2r + 1 we do not make any use of the Step
2r + 2.
For Step 2r + 2 fix a specific u ∈ U . As there are n such
u’s, it is enough to show how to compute CU [u, r] in O(n)
time.
Note that from Corollary 4, if u is the r-th vertex that we
reach, either we reach it with an empty tank, or we leave
the (r − 1)-th vertex with a full tank.
4
KLEITOS PAPADOPOULOS AND DEMETRES CHRISTOFIDES
If the first case happens then
CU [u, r] = C0 [u, r] + U c(u).
If the second case happens and v is the (r − 1)-th vertex,
then
CU [u, r] = CU [v, r − 1] + d0 (v, u)c(u).
For each fixed v we will compute C000 [u, r; v] for all u 6= v in
O(n) time. This will be enough for our purposes. Indeed
this means that we can compute C000 [u, r; v] for all u, v ∈ V
in O(n2 ) time. But then for each fixed u we can compute
C000 [u, r] in an additional O(n) time and thus for all u in
an additional O(n2 ) time.
So CU [u, r] is the minimum of n quantities and can therefore be calculated in O(n) time as required. [Note that
in the second case we should have considered only those
v for which d(v, u) 6 U . Recall however that for all the
other vertices we defined d0 (v, u) = ∞ and so the total
cost through such vertices is ∞. The optimal cost is finite
and therefore the optimal route does not pass through such
vertices unless of course there is no possible way to reach
vertex u through r edges.]
To do this observe that
We now explain how to perform Step 2r + 1. We will in
fact consider many vertices at once, but for the moment
fix a specific u ∈ U and suppose that it is the r-th vertex
that we reach and we reach it with an empty tank. From
Corollary 4 there are two possible ways this could happen:
The two main observations that will allow us to compute
all C000 [u, r; v] fast enough are the following:
Type I: We reach the (r − 1)-st vertex with an empty tank.
Type II: We leave the (r − 2)-nd vertex with a full tank.
The main difficulty is to treat the ‘Type II’ possibilities as
a naive way to do it needs Θ(n2 ) time for each u ∈ V and
thus Θ(n3 ) time for all u ∈ V .
C000 [u, r; v] =
min
w∈S(u,v)
[CU [w, r − 2] + (d0 (w, v) + d0 (v, u) − U )c(v)]
where S(u, v) is the set of all vertices w for which such
‘Type II’ ways are possible. I.e. all w ∈ V \ {v} such that
d0 (w, v) + d0 (v, u) > U or equivalently all w ∈ V \ {v} such
that d(w, v) + d(v, u) > U
Firstly, we can rewrite
C000 [u, r; v] = d0 (v, u)c(v) +
min
w∈S(u,v)
[CU [w, r − 2] − (U − d0 (w, v))c(v)]
(∗)
To see the importance of this observation, suppose for a
moment that S(u, v) = V \ {v} for each u, v ∈ V . (We will
deal with the general situation in our second observation.)
Then we could compute all
min
w∈S(u,v)
[CU [w, r − 2] − (U − d0 (w, v))c(v)]
We write C00 [u, r] for the minimum cost over all ‘Type I’
ways in which we can reach u with an empty tank, and
C000 [u, r] for the minimum over all ‘Type II’ ways.
in O(n2 ) time by taking O(n) time for each v. But then
we could compute all C000 [u, r; v] in O(n2 ) time as required.
Note that if we reach u with a ‘Type I’ way through a
vertex v then
In principle however, the sets S(u, v) can be a lot different. However, for u, u0 with d(u, v) 6 d(u0 , v) we have
S(u, v) ⊆ S(u0 , v). Indeed if w ∈ S(u, v), then
C0 [u, r] = C0 [v, r − 1] + d0 (u, v)c(v)
So we can compute C00 [u, r] in O(n) time. Thus we can
compute C00 [u, r] for all u ∈ V in O(n2 ) time.
It remains to compute C000 [u, r]. If we can compute it for
all u ∈ V in O(n2 ) time then we will be done. Indeed, then
for each u ∈ V we have
C0 [u, r] =
min{C00 [u, r], C000 [u, r]}
and we can compute this in O(n) time for all u ∈ V .
To compute C000 [u, r] we introduce yet another piece of notation and define C000 [u, r; v] as the minimum over all ‘Type
II’ ways such that the (r − 1)-st vertex is v. Evidently,
C000 [u, r] =
min C000 [u, r; v]
v∈V \{u}
d(w, v) + d(v, u0 ) > d(w, v) + d(v, u) > U
so we also have w ∈ S(u0 , v).
This second observation says that there is some structure
to the sets S(u, v). We will use it in order to still manage
to compute all
min
w∈S(u,v)
[CU [w, r − 2] − (U − d0 (w, v))c(v)]
in O(n2 ) time by taking O(n) time for each v.
To prepare for its use we need the following lemma:
Lemma 5. For each fixed v ∈ V and let v1 , v2 , . . . , vn−1
be the local edge ordering at v. Define T (v1 , v) = S(v1 , v)
and T (vi , v) = S(vi , v) \ S(vi−1 , v) for 2 6 i 6 n − 1. Then
we can determine all T (vi , v) in O(n) time.
A FAST ALGORITHM FOR THE GAS STATION PROBLEM
Proof. Starting from the last vertex, we go backwards
through all the vertices of the local edge ordering at v
until we find one which does not belong to S(v1 , v). Suppose vk1 is this vertex. From our second observation we
have that
T (v1 , v) = S(v1 , v) = {vk1 +1 , . . . , vn }.
In the case that vk1 = vn , the understanding is that
T (v1 , v) = ∅.
Now we start from vk1 and we again go backwards through
all the vertices of the local edge ordering until we find one
which does not belong to S(v2 , v). Suppose vk2 is this
vertex. So from our second observation we have that
S(v2 , v) = {vk2 +1 , . . . , vn }
and
T (v2 , v) = {vk2 +1 , . . . , vk1 }.
Continuing inductively we can find k1 , k2 , . . . , kn−1 where
ki is the first vertex in the local edge ordering, starting
from ki−1 and going backwards, which does not belong to
S(vi , v). Then
5
We will prove our claim by induction on m. This is immediate for m = 1 since from (∗) we just need to compute
the minimum over all elements of T (v1 , v) = S(v1 , v). Suppose now that it is true for m = k. Then it is also true for
m = k + 1. Indeed again from our second observation we
have S(vk+1 , v) = S(vk , v) ∪ T (vk+1 , v). Thus to compute
the minimum of
CU [w, r − 2] − (U − d0 (w, v))c(v)
over all w ∈ S(vk+1 , v) we can start with the minimum over
all w ∈ S(vk , v) which is already computed and additionally consider the minimum over all elements of T (vk+1 , v).
This can be done in another O(|T (vk+1 , v)|) steps and since
the sets S(vk , v) and T (vk+1 , v) are disjoint, the total time
taken so far is O(|S(vk+1 , v)|). So the claim is also true
for m = k + 1 and this completes the proof of the claim.
3. Generalisations
We finally conclude with a list of comments mostly concerned with possible generalisations of the algorithm.
S(vi , v) = {vki +1 , . . . , vn }
and
T (vi , v) = {vki +1 , . . . , vki−1 }.
Note that at each step of the process we ask a question of
the form ‘Does vertex vi belong to the set S(vj , v)?’. This
question is answered in O(1) time by checking whether a
specific inequality holds. If needed, we then add vi to the
set T (vj , v) in O(1) time.
Furthermore, we have at most n questions from which we
obtain a ‘Yes’ answer, as each time we obtain a ‘Yes’ we
move on to the next vertex in the local edge ordering. We
also have at most n questions from which we obtain a ‘No’,
as each time we obtain a ‘No’, we move on to examining
inclusion in the next set of the form S(vj , v). So all these
checks and additions to lists can be done in O(n) time as
required.
Now we can proceed calculating C000 [u, r; v] for all u ∈ V
as follows:
Consider the local edge ordering v1 , v2 , . . . , vn−1 at v. We
will show that for each 1 6 m 6 n we can compute
C000 [v1 , r; v], . . . , C000 [vm , r; v]
in O(|S(vm , v)|) time.
Note that this completes the proof of Theorem 1. Indeed
by taking m = n − 1 we get that we can for fixed v ∈ V
compute all C000 [u, r; v] in O(n) time for all u ∈ V as required.
(1) The algorithm can also treat non-complete graphs
as well. For every edge uv that does not belong to
G we define d(u, v) = U + 1. Thus we will never
pass through that edge and so this is the same as
when the edge does not exist. In that case though,
the edge distances might not satisfy the triangle
inequalities and so we would have to compute all
shortest paths as in the previous generalisation. (If
for each edge uv we replace its edge length by the
lengths of the shortest path between u and v then
the new graph satisfies the triangle inequalities.)
(2) Given a graph with n vertices and m edges, by using Johnson’s algorithm the shortest paths can be
computed in O(n2 log n + mn) time. So in particular the total running time becomes O(n2 log n +
∆n2 + mn).
(3) It would be interesting to solve to gas station problem for particular classes of graphs. For example [4] gives a linear time algorithm in the case
that the graph is a path.
(4) The algorithm also treats directed graphs as well.
Here, given two vertices u and v we allow d(u, v) 6=
d(v, u). This is relevant in various situations. For
example going up the mountains needs more fuel
consumption than returning back from the mountains via the same road.
(5) If ∆ = n our algorithm solves the gas station problem in O(n3 ) time. The same time is also achieved
in [2] and in [3]. (In fact in [3] this is even achieved
for all pairs of vertices at once.)
6
KLEITOS PAPADOPOULOS AND DEMETRES CHRISTOFIDES
(6) We have actually solved the gas station problem
not only for the travel from the fixed starting vertex s to the fixed terminal vertex t, but actually
for the travel from the fixed starting vertex s to
every other vertex u of V .
(7) By applying the algorithm separately for each possible starting vertex (note that the local edge orderings are only computed once) we get a O(∆n3 )
algorithm for the all-pairs version of the gas station problem. This is better than the O(∆2 n3 ) algorithm in [2] but not as good as the O(n3 log ∆)
algorithm by Lin in [3].
(8) In practice, we do not only care about the minimum cost, but also on the minimum time needed
for the travel. This was actually the logic behind
the restriction of having at most ∆ stops. This
can still be treated by our algorithm if we have
a ‘cost function’ for the travel between each pair
of vertices and the ‘total cost’ is the sum of the
individual costs.
(9) The space complexity of the algorithm is O(n2 ).
Indeed note that in performing Steps 2r + 1 and
2r +2 we only need the knowledge of the following:
The n local edge orderings, with each local edge
ordering having space complexity O(n), the n2
edge distances, O(n) values of the form C0 [u, r −
1], CU [u, r − 1], C0 [u, r] and CU [u, r], where some
of those values are known from before and some of
those are calculated during the algorithm. Finally
we also need O(n2 ) values of the form C000 [u, r; v].
Note in particular than once we are done with
Steps 2r+1 and 2r+2 we do not use the C000 [u, r; v]
anymore.
References
[1] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to algorithms, third edition, MIT Press, Cambridge,
MA, 2009.
[2] S. Khuller, A. Malekian and J. Mestre, To fill or not to fill: the
gas station problem, ACM Trans. Algorithms 7 (2011), Art. 36,
16 pp.
[3] S. H. Lin, Finding optimal refueling policies in transportation networks, in Algorithmic Aspects in Information and Management,
Lecture Notes in Computer Sciences 5034 (2008), 280–291.
[4] S. H. Lin, N. Gertsch and J. R. Russell, A linear-time algorithm
for finding optimal vehicle refueling policies, Oper. Res. Lett. 35
(2007), 290–296.
| 8cs.DS
|
Graph-Theoretic Framework for Unified Analysis of Observability and Data
Injection Attacks in the Smart Grid
Anibal Sanjab1 , Walid Saad1 , and Tamer Başar2
1
arXiv:1801.08951v1 [cs.SY] 26 Jan 2018
2
Wireless@VT, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA,
Emails: {anibals,walids}@vt.edu
Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, IL, USA, Email: [email protected]
Abstract—State estimation is a fundamental process needed for
the effective operation of the smart grid. As such, cyber-physical
attacks such as denial-of-service and data injection attacks, which
often target the availability and the integrity of the collected state
estimation measurements, can have detrimental consequences on
the operation of the system. In this paper, a novel graph-theoretic
framework is proposed to generalize the analysis of a broad set of
security attacks, including observability and data injection attacks,
that target the state estimator of a smart grid. First, the notion of
observability attacks – denial–of–service attacks on measurement
units which render the system unobservable – is defined based on
a proposed graph-theoretic construct. In this respect, an algorithm
is proposed to characterize the critical set of measurements which
must be removed along with a certain measurement to make the
system unobservable. It is then shown that, for the system to
be observable, these critical sets must be part of a maximum
matching over a proposed bipartite graph. In addition, it is shown
that stealthy data injection attacks are a special case of these
observability attacks. Then, various attack strategies and defense
policies, for observability and data injection attacks, are shown
to be amenable to analysis using variations of the formulated
maximum-matching problem over a bipartite graph. The proposed
framework is then shown to provide a unified basis for exact
analysis of four key security problems (among others), pertaining
to the characterization of: 1) The sparsest stealthy attack, 2) The
sparsest stealthy attack including a certain specific measurement,
3) A set of measurements which must be defended to thwart all
potential stealthy attacks, and 4) The set of measurements, which
when protected, can thwart any attack whose cardinality is below
a certain threshold. A case study using the IEEE 14-bus system
containing a set of 17 distributed measurement units is used to
corroborate the theoretical findings. In this case analysis, stealthy
attacks of lowest cardinality are characterized and shown to have
a cardinality equal to 2. In addition, it is shown, for example, that
defending only 3 out of the 17 measurements is enough to thwart
any stealthy attack with cardinality lower than 3, while defending
a minimum of 13 measurements is needed to thwart all possible
stealthy attacks.
Such attacks can become more pronounced when they target
critical power system functions such as state estimation. In this
regard, the power system state estimation is an integral smart grid
process in which system-wide measurements are collected and
processed to estimate the global state of operation of a power system [15]. State estimation is the basis for various grid operational
decisions such as congestion management, economic dispatch,
contingency analysis, and electricity pricing [16]. As a result,
the critical importance of state estimation to the sustainable
operation of the grid makes it a primary target of possible cyberphysical attacks [1], [2]. Such attacks may target the availability
of the collected measurements as well as their integrity.
In this respect, intercepting a subset of the collected measurement data using availability attacks (such as denial-of-service
attacks) can render the power system unobservable (i.e. not fully
observable), a state in which the collected measurements do not
provide enough independent equations to estimate the states.
Such cyber-physical attacks, to which we refer as observability
attacks hereinafter, will make the operator partially oblivious
to the real state of operation of the system, leading to uninformed operational decisions. Beyond observability attacks, data
injection attacks (DIAs) have emerged as a malicious type of
integrity attacks which aim at manipulating the collected state
estimation data, leading to inaccurate state estimation outcomes
that result in misinformed operational decisions with potentially
detrimental consequences [1], [4], [6]. As shown in [4], such
DIAs can stealthily target the power system state estimation
process – manipulating the collected measurements and altering
the state estimation outcome – while being undetectable by the
system operator using traditional bad data detection mechanisms.
Hence, due to their potential danger to system operation, such
stealthy data injection attacks (SDIAs) and observability attacks
have been the focus of various recent research efforts [17]–[23].
I. I NTRODUCTION
A. Related Works
With the integration of information and communication technologies in power systems, new security concerns have emerged
due to the potential exploitation of this cyber layer to infiltrate
and compromise the underlying physical system [1], [2]. Indeed,
in recent years, various studies have focused on analyzing the
security of emerging cyber-physical power systems [1]–[14] and
the effect of potential cyber attacks on the various operational
components of the grid, ranging from power system state estimation [4], [5], to electricity markets [6]–[8], power system
protection [9], [10], and power system dynamics and control [9],
[11]–[14].
This research was supported by the U.S. National Science Foundation under
Grants ECCS-1549894 and CNS-1446621.
In this regard, the works in [17] and [18] focused on computing a security set which comprises the minimum set of
measurements which must be attacked in addition to a certain
specific measurement in order to make the system unobservable.
Moreover, the work in [19] focused on computing the cardinality
of the smallest set of meters which when attacked render the
system unobservable. The authors in [20]–[22] extended such
observability problems to studying SDIAs. In this regard, these
works focused on characterizing the sparsest stealthy attack
containing a certain specific measurement. In addition, the work
in [23] focused on characterizing a set of measurements to
defend so that no attack which concurrently manipulates a set
of meters whose cardinality is below a certain threshold can be
stealthy. Hence, this latter analysis focuses on the defense against
resource-limited attackers. As such, these works have focused on
formulating and studying mathematical problems whose solutions enable anticipating potential sophisticated attacks – which
constitutes a first step towards deriving corresponding defense
mechanisms – and designing optimal defense strategies to thwart
such attacks and mitigate their potential effect.
The computational complexity of these problems [17]–[23]
has led to limiting the analysis of their solutions to special,
often approximated, cases or required the use of heuristics and
relaxation techniques which led to suboptimal solutions. For
example, for characterizing the sparsest observability attacks
containing a specific measurement, the work in [17] focused
on the special case of measurement sets of low cardinality
while the work in [18] derived an approximate solution that
is based on the solution of a min-cut problem. In addition,
with regard to the analysis of the sparsest SDIAs containing
a certain measurement [20]–[22], the work in [20] focused on
deriving an upper-bound on this stealthy attack set while the
work in [21] used min-cut relaxation techniques to approximate
the sought solution. Moreover, the work in [22] proposed a
heuristic algorithm which can approximate the solution of the
studied problem while an exact solution was found for the special
case in which power flows over all the transmission lines and
power injections into and out of every bus are assumed to be
measured. To defend against a resource-limited data injection
attacker, the authors in [23] used an l1 relaxation method for
characterizing the set of meters to defend to thwart SDIAs
launched by attackers whose attack space is limited by a certain
cardinality threshold. Other related security works are also found
in [24]–[29].
Therefore, this rich body of literature [17]–[29] employs
heuristics and approximation techniques to numerically approximate the solutions to these fundamental observability attacks
and SDIA problems rather than analytically characterizing their
solutions. As such, there is a need for an analytical framework
which allows modeling and studying such data availability and
integrity attacks and enables an analytical characterization of
mathematical solutions to such widely-studied security problems.
In addition, the fact that these works [17]–[23] studied correlated
problems but from different perspectives highlights the need for
a unified framework using which solutions to such correlated
observability attacks and SDIA problems can be studied and
derived.
B. Contributions
The main contribution of this paper is a novel unified graphtheoretic framework that enables a global detailed modeling
and understanding of observability attacks and SDIAs. As a
result, this framework provides a unified tool for analyzing
various widely-studied observability attacks and SDIA problems
such as those studied in [17]–[23], among others. In addition,
the proposed framework enables the characterization of exact
analytical solutions to such security problems, instead of relying
on numerical approximations or heuristics. This will enable a
fundamental analysis and modeling of potential attack strategies
and the derivation of defense strategies which can thwart and
mitigate the effect of such observability attacks and SDIAs.
In this regard, our proposed framework is based on a shift
in the modeling of observability attacks and SDIAs from a
linear algebra frame of reference to a graph-theoretic perspective.
As a result, based on this proposed framework, such attacks
can be modeled and analyzed by requiring only power system
topological data, namely, the power system 1-line diagram and
the location of deployed measurement units without the need for
neither line parameters data nor the exact knowledge of power
flow levels throughout the system.
To build the proposed framework, we first begin by introducing a graph-theoretic basis of observability attacks and, then, we
prove that SDIAs are a special case of such observability attacks.
In this respect, we introduce an algorithm providing a step-bystep approach for building critical sets, a set of measurements
– containing a certain specific measurement – which, when
removed, render the system unobservable. We then prove that for
a DIA to be stealthy, the attacked measurements should strictly
result in leaving critical sets unmatched as part of a maximum
matching over an introduced bipartite graph. As such, a graphtheoretic model of SDIAs is then introduced based on which
the solutions to various well-studied SDIA problems are analytically characterized. In particular, we show that our developed
framework can be readily applied to derive analytical solutions
to various SDIA problems such as, but not limited to: 1) Finding
the stealthy attack of lowest cardinality, 2) Finding the stealthy
attack of lowest cardinality, including a specific measurement,
3) Finding a set of measurements which when defended can
thwart all possible stealthy attacks, and 4) Finding a set of
measurements to defend against a resource-limited attacker,
among others. A case study using the IEEE 14-bus system, with
17 distributed measurement units, is considered throughout the
paper to showcase the developed analytical concepts. In this case
study, we characterize the sparsest SDIAs which can successfully
target the system and show that the cardinality of such attacks
is equal to 2. In addition, the performed case analysis on the
IEEE 14-bus system shows that defending a characterized set
of 13 (out of 17) measurements is necessary to prevent any
successful SDIAs, while defending only 3 measurements is
enough to thwart any stealthy attack of cardinality lower than
3. This, hence, enables the defender to build on some acquired
knowledge regarding the resources of the adversaries to derive
a corresponding defense strategy.
In this respect, the derived analytical results and presented
case study showcase the importance of the proposed framework
for studying various correlated observability attacks and SDIA
problems and pave the way for further analyzing additional
emerging problems in that field.
The rest of the paper is organized as follows. Section II
introduces state estimation and power system observability. Section III introduces our proposed graph-theoretic foundation of
observability attacks and shows its impact on modeling and
analyzing such data availability attacks. Section IV introduces
the proposed graph-theoretic framework for modeling SDIAs, as
well as studies and solves various well-studied SDIA problems.
Section V concludes the paper and provides an outlook detail-
ing the impact of the proposed framework on studying future
observability and data injection attacks.
II. S TATE E STIMATION AND O BSERVABILITY
We next provide an overview of state estimation and of the
algebraic and topological concepts of observability in power
systems. This overview provides background material which is
useful for the analysis that follows.
A. State Estimation Process
Consider a power system state estimation process which
uses various measurements collected from across the system to
estimate the voltage magnitudes and phase angles at every bus
in the system, known as the system states [15]. Let z ∈ Rm (m
being the number of measurements) be the vector of collected
measurements, which includes power flow levels (real and reactive) over transmission lines, power (real and reactive) injected
in or withdrawn from certain buses, as well as bus voltage
magnitudes. In addition, let x ∈ Rn be the vector of system
states. The relationship between the measurements and the states
directly follows from the linearized power flow equations [15]:
z = Hx + e,
(1)
where H ∈ Rm×n is the measurement Jacobian matrix and
e ∈ Rm is the vector of random errors that typically follows
a Gaussian distribution, N (0, R), where R is positive definite.
Here m ≥ n, that is the dimension of x cannot be larger than the
dimension of the measurement vector, z. Further, we assume that
H is a full-rank matrix. Using a maximum-likelihood estimator
– a weighted least squares estimator (WLS) for a Gaussian error
vector e – an estimate of the states, x̂, will be:
x̂ = (H T R−1 H)−1 H T R−1 z.
(2)
This estimate of all the states provides visibility of the steadystate operating conditions of the system, based on which various
operational decisions are performed [15].
B. Power System Observability
The observability of the power system consists of the ability
to uniquely determine its states based on the collected set of
measurements [15]. Observability, hence, requires the collected
measurements to provide enough independent equations to allow
the estimation of the state vector, x. In this respect, the power
system is observable1 if and only if the measurement matrix H is
of full column rank [15], which was our initial assumption. This
is known as algebraic observability. Due to the P − θ, Q − V
decoupling2 in power systems [16], the observability analysis
can be decoupled by separately studying the observability of
voltage phase angles, using real power measurements, and the
observability of voltage magnitudes, based on reactive power
measurements. Since the two analyses are identical, we focus
here on phase angle observability. To this end, we consider z ∈
Rm to be a vector of real power measurements (bus injections
and line flows), and the state vector x ∈ [−π, π]n to be the
vector of voltage phase angles (in radians). Here, n = N − 1
1 Otherwise, when this observability condition is not met, the power system is
dubbed unobservable.
2 P denotes real power, θ denotes voltage phase angles, Q denotes reactive
power, and V denotes voltage magnitudes.
for a power system with N buses given that the phase angle of
the reference bus is fixed and is taken to be the reference with
respect to which all other phase angles are calculated [15].
An alternative measure of observability, which is equivalent
to algebraic observability, is proposed in [30] and uses graphtheoretic techniques to introduce the concept of topological
observability. In this regard, let the power system 1-line diagram
be represented as a graph G(N , L) in which the set of vertices N ,
|N | = N , represents the set of buses of the power system while
the set of branches L, |L| = L, represents the set of lines. One
key result that was shown in [30] and that will be of relevance
to our work is the following:
Remark 1: A power system is observable if and only if the
set of measurements can be assigned to the edges of the power
system graph, following a set of assignment rules, in a way to
form a spanning tree over this graph.
In this respect, let M be the set of measurements and let
f (.): M → L be an assignment function defined as follows.
Definition 1: f (.): M → L is a measurement assignment
function which assigns measurements in M to lines in L
following a set of assignment rules defined as [30]:
1) If l1 , l2 ∈ L and l1 6= l2 , then f −1 (l1 ) 6= f −1 (l2 ). In other
words, a measurement cannot be simultaneously assigned
to two different lines.
2) If m is a measurement over a transmission line l, then m
can only be assigned to l.
3) If m is an injection measurement over bus η ∈ N , then
m can only be assigned to an unmeasured line l that is
incident to η.
If such a measurement assignment that yields a spanning tree
over the power network G can be found, the power system will
be observable (and vice versa). Fig. 1 shows an example of measurement assignments over the IEEE 14-bus system. This figure
shows the tree branches (marked in solid red lines) to which
measurement where assigned as part of the measurement assignment function. The measurements that were assigned to each
one of these branches are identified using dashed arrow lines
originating from the assigned measurement and pointing to the
line to which this measurement is assigned. This tree is formed
of branches {1, 2, 4, 6, 8, 9, 10, 12, 13, 15, 16, 17, 19} and
spans the whole vertex set N of the power system graph G, and
hence, is a spanning tree. As a result, since this measurement
assignment yields a spanning tree, then the available set of
measurements renders the system observable.
Various algorithms of low complexity have been proposed to
find and build such a spanning tree [30]–[32]. In this regard, the
work in [30] proposes an algorithm to find a spanning tree over
G, which will be used in some of the derivations in the following
sections. This algorithm starts by processing flow measurements
by assigning each flow measurement to its corresponding branch
to form disjoint tree components. Then, injection measurements
are assigned to lines in a way to connect these tree components to
form one spanning tree. Here, we highlight one type of injection
measurements, namely, boundary injections, which will play a
crucial role in our derivations.
Definition 2: A boundary injection is an injection measurement over a bus incident to lines whose flow is measured and
13
19
20
12
14
17
12
11
13
16
18
9
6
10
10
14
11
15
8
9
7
1
2
5
1
3
7
4
4
6
5
2
8
3
IEEE 14-Bus System
Bus injection
measurement
Tree branch
Edge not part
of the tree
Line flow
Measurement
Line number
measurement
assignment
Fig. 1. IEEE 14-bus system with measurement assignment.
Bus number
lines whose flow is not measured [30].
Boundary injections play a major role in connecting these
tree components. Indeed, for a bus which is not incident to
a measured line to be connected to the spanning tree, it has
to be reachable from a boundary injection through a series of
measurement assignments [30]. As such, boundary injections are
considered to be sources and unmeasured buses are considered
to be sinks which must be connected to these sources following
the set of measurement assignment rules.
We next build on the foundation of topological observability to
present a graph-theoretic framework for modeling and studying
the security of the smart grid facing observability attacks and
SDIAs. This framework is based on our proposed concepts of
critical sets and observability sets, which we define and derive
in the next section.
III. O BSERVABILITY ATTACKS
The sustainable and efficient operation of the power system
requires an accurate observability of all its states [15]. Security
attacks that target this observability can cause a limited (or
partial) monitoring ability for the operator over the power system
which can lead to incorrect operational decisions. Hence, studying and modeling attacks which can target the full observability
of the system is indispensable for the sustainable operation
of the grid. In this respect, we define a cyber-physical attack,
dubbed observability attack, that consists of launching a denialof-service (DoS) attack against a set of measurements to make
the system unobservable. We next study this type of attacks by
introducing and characterizing what we define as critical sets and
observability sets and prove that the well-studied stealthy data
injection attack is a subset of our defined observability attacks.
This latter finding will provide us with a unified set of tools to
solve various widely-studied SDIA problems.
A. Critical Sets
Understanding and modeling observability attacks requires an
in-depth understanding of the effect of the loss of any bundle of
measurements on the observability of the system. In this regard,
we next introduce a structured method for identifying, for each
measurement m, the set of additional measurements including m
(denoted as the critical set of m), which when removed renders
the system unobservable. To this end, we first characterize
the set of potential measurements to be investigated, for each
measurement m, and then provide the necessary discussion and
introduce the underlying method for characterizing the critical
set of m. In this process, we prove that characterizing such a
critical set is at most as complex as solving a maximum matching
problem over a bipartite graph. Then, a detailed algorithm is
introduced to provide a step-by-step method for characterizing
such critical sets.
Let MC ⊆ M be the set of measurements which are part
of the assignment function, i.e., the measurements assigned to
form a spanning tree over the power network. We refer to
measurements not part of MC as unassigned measurements.
Such unassigned measurements are, hence, by definition redundant measurements. We consider that the system is originally
observable. Hence, such a spanning tree and its corresponding
set of assigned measurements exist. We also let T (N , B) be
the spanning tree whose set of branches are captured by the
set B ⊆ L. B, in essence, represents the set of lines to which
measurements were assigned as part of the assignment function
f (.). For example, as previously mentioned, in Fig. 1, the
branches of the spanning tree are represented in solid red lines.
Consider an assigned measurement m ∈ MC . Since m is
assigned, its removal will split the tree T into two spanning
trees T1m (N1m , B1m ) and T2m (N2m , B2m ) spanning subgraphs G1m
and G2m , respectively, such that N = N1m ∪ N2m and B =
B1m ∪ B2m ∪ {f (m)}. Fig. 2 provides an illustrative example
of the two spanning trees created by the deletion of the flow
measurement over line 2 (we denote this flow measurement by
F2 ). Fig. 2 represents the same system shown in Fig. 1 and will
be used throughout this work to provide a practical example of
the defined concepts and analytical derivations.
To investigate observability, we define a set of measurements
for each measurement m ∈ MC , which we refer as the
critical set of m and we denote by C m , as follows:
Definition 3: For a measurement m ∈ MC , the critical set
of m, denoted as C m ⊆ M, is a set of measurements which can
be used to reconnect T1m and T2m when m is deleted.
Consequently, when m is removed, any m0 ∈ C m can be
used to reconnect T1m and T2m . For convenience, we consider
m to be part of its own critical set C m . Let Lm be the set of
lines connecting a bus in T1m to a bus in T2m . In addition, let
m
m
⊆ N2m be the set of nodes in, respectively,
N1,2
⊆ N1m and N2,1
m
m
N1 and N2 which are connected to a node in, respectively, N2m
and N1m . An example of these notations is provided in Fig. 2.
Lm is, hence, formally defined as:
m
m
Lm = {l ∈ L | l = (η1 , η2 ), η1 ∈ N1,2
, η2 ∈ N2,1
}.
(3)
We next introduce the set of rules that should be followed to
build the critical set of a certain measurement, following which,
we provide a structured algorithm for building such critical sets.
Based on the measurement assignment rules described in
Section II-B, a necessary condition for a measurement m0
13
19
Redundant measurements
part of
20
12
14
17
12
11
13
Unassigned injection
measurements over
buses in
16
18
9
6
10
14
11
8
1
1
5
9
7
7
3
2
Category 1
15
10
8
4
4
Category 2
Flow measurements
over lines in
Assigned injection
measurements over
buses in
6
Category 3
2
5
3
Measurements in
IEEE 14-Bus System
Unassigned
Boundary Injection
Further investigation needed
to determine whether a
measurement in this set
is part of
Branches
Fig. 3. The three categories of measurements in Mm .
Branches
As a result, since the measurements in Mm
F and the unasm
m
signed injection measurements over buses in N1,2
∪ N2,1
(which
m
are the first two categories of measurements in M , as shown in
Fig. 3) are redundant, they are part of C m . Now, when m0 ∈ Mm
is assigned as part of the original assignment function, i.e.,
m0 ∈ Mm ∩ MC (which corresponds to the third category
of measurements in Mm , indicated in Fig. 3), then additional
investigation is needed to determine whether m0 is redundant,
and hence, whether it can be considered in C m .
In this regard, consider that m0 ∈ Mm is assigned to a
line l0 , that is f (m0 ) = l0 ∈ B. If m0 is to be reassigned to
a line l ∈ Lm , T1m and T2m will be reconnected, but since
m0 was originally assigned as part of the original tree, another
portion of the tree gets disconnected by this reassignment of
m0 to l instead of l0 . Hence, m0 can be part of C m if another
measurement can be used to reconnect the subgraph which
was disconnected by the reassignment of m0 from l0 to l. For
example, consider the injection measurement over bus 13 in
Fig. 2, which we denote by I13 . I13 has been assigned to line 12
as part of the original spanning tree. Hence, if I13 is assigned
to line 20 to reconnect T1F2 and T2F2 after measurement F2 is
removed, it cannot be assigned to line 12 anymore which will
split T1F2 into two subtrees, one formed by buses {12, 13} and
line 19 and the other subtree composed of buses {6, 10, 1, 5}
F2
and lines {13, 10, 1}. We denote these two subtrees as T1,1
F2
and T1,2 , respectively. In this respect, if another measurement
F2
F2
can replace I13 in reconnecting T1,1
and T1,2
, then I13 can
be assigned to line 20 and, hence, should be part of C F2 .
To this end, consider the injection measurement over bus 12,
denoted by I12 , which was not part of the original spanning
tree assignment. I12 can be assigned to line 11 to reconnect
F2
F2
T1,1
and T1,2
in case I13 is reassigned to line 20 instead of
line 12. Hence, I13 is indeed redundant, resulting in I13 ∈ C F2 .
To generalize the analysis in this example, we next provide a
general discussion of measurements in Mm ∩MC (i.e., the third
category of measurements in Mm , shown in Fig. 3) which allows
determining whether a measurement in this set is part of C m .
More generally, consider m0 ∈ Mm ∩ MC to be a measurement assigned to a branch l0 = f (m0 ) in T1m , and let Mm
1 be the
Fig. 2. Critical set of the flow measurement over line 2, F2 , of the IEEE 14-bus
system.
to be in C m is for it to be either a line flow measurement
over a line l ∈ Lm or an injection measurement over a bus
m
m
∪ N2,1
}. We denote this set of measurements, for a
η ∈ {N1,2
measurement m, by Mm . Here, for convenience3 , we consider
Mm not to include measurement m. The measurements in Mm
are the only measurements which can be assigned to a line in
Lm , and hence, are the only measurements with the potential
of reconnecting T1m and T2m . An example of the set Mm for
m := F2 is shown in Fig. 2.
The measurements in Mm can be split into three different
categories: 1) flow measurements over lines in Lm , which we
4
denote as Mm
F , 2) unassigned injection measurements over
m
m
buses in N1,2 ∪ N2,1
, and 3) assigned injection measurements
m
m
over buses in N1,2 ∪ N2,1
, i.e., measurements in Mm ∩ MC . A
representation of this partition is shown in Fig. 3
In this regard, not all measurements in Mm are necessarily
in C m . In fact, for m0 ∈ Mm to be in C m , it must be redundant.
Namely, m0 must be assignable to a line in Lm to reconnect
T1m and T2m , without causing any disconnections within either
T1m or T2m . In this respect, if m0 ∈ Mm is unassigned, i.e
m0 ∈
/ MC , m0 would be part of C m . For example, consider the
injection measurement over bus 4 in Fig. 2, which we denote by
I4 . Measurement I4 is in MF2 and is a redundant measurement
since it was not assigned to any line as part of the original tree
T . Hence, when F2 is removed, I4 can be assigned to line 7 to
reconnect T1F2 and T2F2 without causing any disconnection in
T2F2 , in which it is located. Hence, I4 ∈ C F2 .
3 Given that m is always considered to be part of its critical set C m , m is
always added to C m after investigating the measurements in Mm .
4 Such measurements are unassigned measurements. In fact, if m is a line
measurement, lines in Lm would form a loop with f (m) and hence cannot be
part of the original spanning tree. Moreover, if m is an injection measurement,
Mm
F would be an empty set since, otherwise, based on the spanning tree building
method described in Section II-B and originally presented in [30], one of the
m
measurements in Mm
F would have been assigned to a line in L , and m would
not have been part of MC . As a result, measurements in Mm
F are redundant.
set of measurements in G1m . Reassigning m0 to l ∈ Lm instead
of l0 , to reconnect T1m and T2m , will split T1m into two subtrees
m
m
m
T1,1
and T1,2
. These trees, respectively, span subgraphs G1,1
and
m
m
m
m
G1,2 . Let M1,1 and M1,2 be the sets of measurements in G1,1
m
0
and G1,2 . m can be reassigned to l only if some measurement
m
m
in Mm
1 can reconnect T1,1 and T1,2 . Hence, this corresponds to
finding a measurement assignment that connects the two subtrees
m
m
T1,1
and T1,2
. As discussed in Section II-B, two subtrees can
be interconnected by using a measurement assignment if the
processing of an unassigned boundary injection in one of them
reaches a node in the other. We denote such unassigned boundary
injections as backup boundary injections, which we formally
define as follows:
m
m
Definition 4: A measurement m00 ∈ Mm
1 \ {M1 ∩ M } is a
0
00
backup boundary injection for a measurement m , if m can be
m
m
used to reconnect T1,1
and T1,2
generated by the reassignment
0
m
C
of m ∈ M ∩ M to a line l ∈ Lm instead of its original line
assignment f (m0 ) = l0 . The set of all such backup boundary
injections for this measurement m0 ∈ Mm ∩ MC is referred to
as the backup boundary injection set of m0 and is denoted by
m
Ib−m
0.
Since the algorithm in [30] is based on connecting subtrees –
to build a full spanning tree – by starting from an unassigned
boundary injection in a certain subtree (as a source) to reach
a node in another subtree (as a sink), this algorithm can be
employed to locate a backup boundary injection for a measurement m0 ∈ Mm ∩ MC . To this end, to find a backup boundary
injection of m0 , we run the algorithm in [30] by starting from
m
m
an unassigned boundary injection in either T1,1
or T1,2
and
m
m
checking whether the algorithm reaches a bus in T1,2 or T1,1
,
respectively. As such, using the spanning tree building algorithm
provided in [30, Fig. 1], one can identify the backup boundary
injections for each injection measurement in m0 ∈ Mm ∩ MC .
Here, we note that a backup boundary injection cannot be an
injection measurement in Mm , since if m00 ∈ Mm and m00 is
unassigned, m00 will itself be part of C m , as previously discussed.
For example, consider the injection measurements on buses 2 and
4 of Fig. 2, denoted by I2 and I4 , respectively. I2 is an assigned
injection measurement in MF2 . I2 can be assigned to line 3
instead of line 4 to reconnect T1F2 and T2F2 . However, this will
split bus 2 from the rest of T2F2 . I4 is an unassigned boundary
injection in G2F2 and can reconnect bus 2 to T2F2 by assigning
F2
I4 to line 4. However, I4 is itself an injection at a bus in N2,1
.
F2
Hence, I4 is an unassigned injection in M , and is as a result
part of C F2 . Thus, it cannot be considered a backup boundary
injection for I2 .
Therefore, an assigned injection measurement m0 ∈ Mm ∩
MC is a redundant measurement and is, as a result, part
m
of C m if it has a nonempty boundary injection set Ib−m
0.
However, a boundary injection may be part of multiple backup
boundary injection sets. In this regard, based on the measurement
assignment rules, an injection measurement can be assigned to
only one line at a time. In relation to backup boundary injections,
an unassigned boundary injection can act as a backup boundary
injection for only one measurement in Mm ∩ MC , at a time.
Hence, if two measurements m1 and m2 in Mm ∩ MC have
only one and the same backup boundary injection, only one
Injection Backup Boundary
Measurement
Injection
General Representation
Unmatched
Matched
Fig. 4. Maximum matching over the injection measurements - backup boundary
injections bipartite graph.
of them can be in C m , concurrently. As a result, due to this
one-to-one assignment requirement between backup boundary
injections and injection measurements in Mm ∩MC , finding this
assignment can be performed by solving a maximum matching
problem over a bipartite graph5 , as the one shown in Fig. 4.
We refer to this graph as the injection measurements - backup
boundary injections bipartite graph.
In this bipartite graph, the left-side nodes denote the injection
measurements in Mm ∩ MC and right-side nodes
the
S denote
m
union of their backup boundary injections,
Ib−m
0,
m0 ∈Mm ∩MC
in which each node represents one backup boundary injection.
In this bipartite graph, an edge exists between a node m0 ∈
Mm ∩ MC , on the left-side of the graph, and a boundary
m
injection m00 , on the right-side of the graph, if m00 ∈ Ib−m
0.
Here, we note that a boundary injection can be simultaneously
part of different backup boundary injection sets. Hence, finding
the injection measurements in Mm ∩ MC which are part of
the critical set of m, C m , is equivalent to solving a maximum
matching problem over this bipartite graph, which is a problem
whose exact solution can be obtained efficiently in polynomial
time6 . As a result, the matched left-side nodes in this maximum
matching over the injection measurements - backup boundary
injections bipartite graph are the injection measurements in
Mm ∩ MC which will be part of the critical set of m, C m .
Based on these introduced rules for building critical sets, Algorithm 1 provides a structured step-by-step method for building
the critical set, C m , for each measurement m ∈ MC .
B. Example and Case Analysis
As an example of characterizing the critical sets of the various
measurements in a power system, we consider the IEEE 14bus system in Fig. 1. In this example, we refer to an injection
measurement over bus k as Ik and a flow measurement over line
k as Fk . We first consider the measurement over line 2, F2 , for
which we find the critical set C F2 using Algorithm 1.
From Fig. 2, we can see that removing F2 will result in splitting the original spanning tree into two trees, T1F2 (N1F2 , B1F2 )
5 A matching over a graph is a subset of edges sharing no vertices. A maximum
matching is a matching having the maximum possible number of edges [33].
6 The solution of a maximum matching problem over a bipartite graph can be
efficiently obtained in polynomial time by transforming the matching problem
into a max-flow problem, which can be solved in polynomial time using various
known algorithms such as Ford-Fulkerson [33].
Algorithm 1 Critical sets step-by-step procedure
Input: Power system 1-line diagram G(N , L), measurement set
M, spanning tree T (N , B), set of assigned measurements
MC , assignment function f (.): M → L
Output: Critical set C m for all measurements m ∈ MC
1: for m ∈ MC do
m
m
2:
Characterize T1m , T2m , N1,2
, N2,1
, Lm , Mm
m
3:
Initialize C
4:
Initialize Mm
test
5:
Add m to C m
6:
for m0 ∈ Mm do
7:
if m0 is a flow measurement then
8:
Add m0 to C m
9:
end if
10:
if m0 is an injection measurement then
11:
if m0 ∈
/ MC then
12:
Add m0 to C m
13:
end if
14:
if m0 ∈ MC then
15:
Characterize its backup boundary injection set
m
Ib−m
0
16:
Add m0 to Mm
test
17:
end if
18:
end if
19:
end for
20:
Solve maximum matching over the injection measurements - backup boundary injections bipartite graph
21:
for m0 ∈ Mm
test do
22:
if m0 is a matched node as part of the maximum
matching then
23:
Add m0 to C m
24:
end if
25:
end for
26: end for
27: return Critical set C m for all measurements m ∈ MC
and T2F2 (N2F2 , B2F2 ), such that N1F2 = {1, 5, 6, 10, 12, 13}
and N2F2 = {2, 3, 4, 7, 8, 9, 11, 14} are the sets of nodes of
the two trees and B1F2 = {1, 10, 13, 12, 19} and B2F2 =
{4, 6, 8, 15, 9, 16, 17} are their sets of branches. In addiF2
F2
tion, N1,2
= {1, 5, 10, 13}, N2,1
= {2, 4, 11, 14}, LF2 =
F2
{2, 3, 7, 18, 20}, and M
= {F2 , I4 , I11 , I2 , I1 , I5 , I13 }.
Now, for characterizing the critical set of F2 , we explore the
set MF2 .
The first measurement in MF2 is F2 . F2 is a flow measurement7 . Hence, F2 ∈ C F2 .
The second and third measurements in MF2 are I4 and I11 . I4
and I11 are unassigned injection measurements, i.e. I4 ∈
/ MC
C
F2
and I11 ∈
/ M . Hence, {I4 , I11 } ⊆ C . Indeed, I4 can be
assigned to line 7 to reconnect T1F2 and T2F2 , while I11 can be
assigned to line 18 for that purpose.
I2 is the fourth measurement in MF2 and the last remaining
m
injection measurement on N2,1
to be explored. I2 is an assigned
measurement, originally assigned to line 4 as part of the spanning
tree T . Since I2 ∈ MC , assigning I2 to lines 2 or 3 to reconnect
7F
2
is the only flow measurement in MF2 .
TABLE I
C RITICAL SETS OF THE MEASUREMENTS IN MC .
Measurement (m ∈ MC )
F2
F8
F9
F15
I1
I2
I3
I5
I6
I9
I13
F17
F19
Critical Set (C m )
{F2 , I4 , I11 , I13 }
{F8 , I4 , I7 , I9 }
{F9 , I4 , I7 , I11 , I13 }
{F15 , I7 }
{I1 , I4 , I11 , I13 }
{I2 , I4 , I11 , I13 }
{I3 , I2 , I4 }
{I5 , I11 , I13 }
{I6 , I11 }
{I9 , I11 }
{I6 , I12 , I13 }
{F17 , I9 , I13 }
{F19 , I6 , I12 }
T1F2 and T2F2 will disconnect bus 2 from the rest of T2F2 . Hence,
we next characterize the backup boundary injection set of I2 ,
F2
i.e. Ib−I
. The only unassigned boundary injection in G2F2 that
2
is not part of MF2 is I7 . However, using the algorithm in [30,
Fig. 1], we can observe that starting from I7 , the algorithm does
not reach bus 2. Hence, bus 2 cannot be reconnected to the rest
of T2F2 using any unassigned boundary injections over buses in
F2
G2F2 . Hence, Ib−I
= ∅, and as a result F2 ∈
/ C F2 .
2
Similarly, exploring I1 and I5 – the fifth and sixth measurements in MF2 – which are both assigned measurements,
i.e. {I1 , I5 } ⊆ MC , shows that they both have empty backup
F2
F2
boundary injection sets8 , i.e. Ib−I
= ∅ and Ib−I
= ∅. Hence,
1
5
F2
neither I1 nor I5 are part of C .
The only remaining measurement in MF2 is I13 . I13 is an
assigned measurement, I13 ∈ MC . As previously discussed in
Section III-A, when I13 is reassigned to line 20 to reconnect T1F2
and T2F2 , the subtree containing buses 12 and 13 and line 19 gets
disconnected from the rest of T1F2 . Hence, we next characterize
F2
the backup boundary injection set of I13 , i.e. Ib−I
. To this
13
end, I12 , the only unassigned boundary injection measurement
in G1F2 , can be assigned to line 11 to reconnect the two subtrees,
and is the only boundary injection which can do so. Hence,
F2
Ib−I
= {I12 }.
13
As a result, the injection measurements - backup boundary
injections bipartite graph is composed of only I13 on the leftF2
side connected to Ib−I
= {I12 } on the right-side. Hence, I13
13
is matched to the backup boundary injection I12 . As a result,
I13 ∈ C F2 .
The processing of MF2 is thus complete, resulting in C F2 =
{F2 , I4 , I11 , I13 }.
Similarly, Algorithm 1 can be carried out to characterize the
critical sets of all of the measurements in MC in the IEEE 14bus system in Fig.1. The results are listed in Table I.
We next discuss the value of critical sets with regard to understanding and analyzing observability attacks. We also introduce
the concept of observability sets, a generalization of critical sets,
which provides a holistic modeling of observability attacks.
Notation: We use the following notation in the derivations
0
that ensue. For the Jacobian matrix H, we let H (−K)+(K )
8 If I or I are to be reassigned to lines 2 or 3, respectively, to reconnect
1
5
T1F2 and T2F2 , each of these reassignments will split T1F2 into two subtrees
which cannot be reconnected using the unassigned boundary injection I12 , as
can be shown by a run of the algorithm in [30, Fig. 1]. Here, we note that I12
is the only unassigned boundary injection in G1F2 .
correspond to H but with the removal of the rows corresponding
to measurements in K and the addition of rows corresponding
to measurements in K0 .
would have been part of C m because m0 can reconnect T1m and
T2m . Hence, replacing m by m0 will not affect the connectivity
0
of the spanning tree and, hence, rank(H) = rank(H (−m)+(m ) ).
C. Observability Sets
Theorem 2: For m
∈ MC , removing its critical set, C m ,
(−C m )
results in rank(H
) = rank(H) − 1.
Proof: Since the system is originally fully observable,
m
rank(H) = N − 1. Now, let Mm
1 and M2 be the meam
m
surement
sets in subgraphs
G1 and G2 , respectively, and let
(−C m )
(−C m )
H1
and H 2
be the Jacobian matrices of G1m and G2m ,
m
m
respectively, composed of measurements in Mm
1 \ {M1 ∩ C }
m
m
m
m
and Mm
\
{M
∩
C
}.
Since
T
and
T
respectively
span
2
2
1
2
(−C m )
G1m and G2m
,
this
implies
that
rank(H
) = N1 − 1 and
1
(−C m )
m
rank(H 2
) = N2 − 1. In addition, let m0 ∈ Mm
1 \ {M1 ∩
m
m
C } be an injection measurement over a bus in N1,2 . Since
m
m
0
m0 ∈ Mm
1 \ {M1 ∩ C }, then m is assigned to a certain
0
0
m
branch b = f (m ) ∈ T1 ; otherwise, m0 would have also been
in C m . By Lemma 1, m0 can be replaced by a hypothetical line
(−C m )
flow measurement over b0 without affecting the rank of H 1
.
m 0
m
(−C )
(−C )
As such, let H 1
be the same as H 1
but replacing
m
any row corresponding to an injection measurement in N1,2
by
its corresponding hypothetical line flow measurement.
The
same
(−C m )0
(−C m )
can be done to form Jacobian matrix H 2
from H 2
.
m 0
m
(−C )
(−C )
By Lemma 1, rank(H 1
)=rank(H 1
) = N1 − 1 and
(−C m )0
(−C m )
rank(H 2
)=rank(H 2
) = N2 − 1.
(−C m )
Now, let us return to H
. By rearranging its elements
m
m
to include first the measurements in Mm
1 \ {M1 ∩ C } then
(−C m )
m
m
m
the elements"of M2 \ {M
can be written as
# 2 ∩ C }, H
(−C m )
H1
(−C m )
. In this respect,
H
=
(−C m )
H2
#
"
H (−C m )
m
1 m
rank(H (−C ) ) = rank
(−C )
H2
"
#
H (−C m )0
0
1
= rank
m 0
(−C )
0
H2
Next, in Theorem 1, we show that the derived critical sets are
indispensable for modeling observability attacks.
Theorem 1: For m ∈ MC , removing its critical set, C m ,
renders the system unobservable.
Proof: By topological observability, we know that a system
is observable if and only if a spanning tree could be formed
using an assignment function. When m is removed, the original
spanning tree T is split into two disjoint trees T1m and T2m ,
spanning subgraphs G1m and G2m , respectively. By definition
of C m , the only way to reconnect T1m and T2m is to use
measurements in C m . Hence, if all measurements in C m are
removed, then T1m and T2m cannot be connected using an
assignment function, which implies that a spanning tree cannot
be formed, implying that the system is not observable. As such,
removing a critical set renders the power system unobservable.
Based on Theorem 1, the critical measurements9 of a power
system can be characterized using critical measurement sets, as
shown in the following corollary.
Corollary 1: m is a critical measurement if and only if its
critical set is C m = {m}.
Proof: By definition, if m is a critical measurement, removing it will render the system unobservable. Hence, if the critical
set of m is such that C m ⊃ m, then removing m would not affect
the observabilty of the system since any other measurement
m0 ∈ C m \ {m} can be used to replace m and reconnect the
tree. As such, C m ⊃ {m} ⇒ m is not a critical measurement,
which proves the contrapositive: m is critical ⇒ m is the only
element in its critical set, i.e. {m} = C m . Conversely, if m
is the only element in its critical set, its removal constitutes
removing a complete critical set, which by Theorem 1 renders the
system unobservable. As a result, C m = {m} ⇒ m is a critical
measurement. Thus, m is critical if and only if C m = {m}.
In addition, removing a full critical set decreases the rank of
the Jacobian matrix by 1. This is shown in Theorem 2, which
will be proven next. However, we first present the following preliminary lemma, which is essential for the proof of Theorem 2.
Lemma 1: Let m ∈ M be an injection measurement over a
bus η that is assigned to a line l, f (m) = l. Then, replacing
m by a hypothetical line flow measurement m0 over line l
will not affect
the rank of matrix H. In other words, let
0
H (−m)+(m ) be the the Jacobian matrix with the removal of
the row corresponding to measurement m and the addition of
the row corresponding to the 0hypothetical measurement m0 , then
rank(H) = rank(H (−m)+(m ) ).
Proof: Since m is assigned, i.e. is part of the original
spanning tree measurement assignment, removing it will split
the original spanning tree into two subtrees T1m and T2m . By
the definition of the critical set C m , any measurement in C m
could replace m to reconnect T1m and T2m . If m0 existed, it
9 In power systems, a critical measurement is a single measurement which
when removed renders the system unobservable [15].
= (N1 − 1) + (N2 − 1)
= N − 2 = rank(H) − 1.
Therefore, Theorem 2 shows the effect of the removal of a
single critical set on the rank of the Jacobian matrix. Theorem 1
and Theorem 2 provide a necessary condition for observability
of the power system under observability attacks. In fact, the
contrapositive of Theorem 1 states that if a power system is
fully observable, then the investigated observability attack (i.e.
the removal of measurements) did not result in removing a full
critical set. Next, we extend this concept to account for the
interconnection between multiple critical sets.
In fact, for a measurement m0 to be in the critical set of a
0
measurement m, i.e. m0 ∈ C m , the critical set of m0 , C m ,
0
must contain measurements other than m0 , i.e. C m ⊃ {m0 }.
Otherwise, m0 would not be redundant. For example, consider
injection measurements I6 and I9 . Removing I6 and I9 will
render the system unobservable – even though I6 and I9 do not
form a critical set – since C I6 = {I6 , I11 } and C I9 = {I9 , I11 }.
As such, if I6 is removed, I11 can be used to replace I6
since I11 ∈ C I6 . However, if I9 is also removed, even though
I11 ∈ C I9 , I11 cannot be used to replace I9 since I11 has
already been used as a replacement to I6 . Therefore, removing I9 and I6 does render the system unobservable. Indeed,
rank(H −(I6 )−(I9 ) ) = 12 < N − 1 = 13.
This concept can be extended to the interconnection between
multiple critical sets. For example, consider F2 , I1 , I2 , and I5
and their critical sets shown in Table I. We can see that F2 ,
I1 , and I2 have critical sets sharing measurements I4 , I11 , and
I13 . Hence, if F2 , I1 , and I2 are removed, I4 , I11 , and I13 are
assigned, one to each of these measurements, to preserve system
observability and, hence, cannot be used as part of further critical
sets in case further measurements are removed. Hence, since
C I5 = {I5 , I11 , I13 }, removing F2 , I1 , I2 and I5 will render
the system unobservable, even though {F2 , I1 , I2 , I5 } is not a
critical set.
In this respect, the concept of critical sets must be further
developed to yield a general graph-theoretic concept of observability attacks. This development is provided as follows. We
build a bipartite graph in which each left-side node represents
one of the critical sets of the power system, and each right-side
node represents one measurement of the system. An example
of this bipartite graph is shown in Fig. 5. In this respect, an
edge is drawn between a critical set C i and a measurement j
if j ∈ C i . We refer to this bipartite graph as the critical sets system measurements bipartite graph. Based on this formulation,
a general concept of observability is established in Theorem 3.
Theorem 3: If the system is observable, then the maximum
matching over the critical sets - system measurements bipartite
graph includes all critical sets.
Proof: We prove this theorem by proving its contrapositive
which is the following: if the maximum matching does not
include all critical sets, then the system is not observable.
The contrapositive can be proven as follows. If one critical set
is not matched to any measurements, then this critical set cannot
be used to connect two subgraphs of the system. Since these
two subgraphs can only be connected by this critical set, then
there is no measurement assignment which will connect these
two subgraphs. As a result, a spanning tree cannot be formed,
implying that the system is not observable.
This proves the contrapositive of this theorem and, hence,
proves the theorem.
Theorem 3 can be used to fully characterize observability
attacks as follows. An observability attack is one in which
measurements are removed (i.e. nodes from the right-side of
the critical sets - system measurements bipartite graph) such
that the maximum matching over the bipartite graph does not
include all critical sets (i.e. nodes on the left-side of the critical
sets - system measurements bipartite graph), which renders
the system unobservable. This, as a result, provides a general
analytical characterization of observability attacks and enables
an analytical prediction of the effect of the removal of a subset
of measurements on the observability of the system. For example,
such characterization allows analytical derivation of various
security indices related to observability attacks such as finding
the observability attack of lowest cardinality, or finding the
minimal set of measurements to remove in addition to a certain
measurement to make the system unobservable. This, as a result,
provides analytical tools which are necessary to further assess
the vulnerability of a system against observability attacks as
well as derive defense strategies to thwart such attacks. Indeed,
in what follows, we focus on stealthy data injection attacks –
proving that they are a subset of observability attacks – and show
how our provided analytical characterization of observability
attacks enables solutions of various widely-studied stealthy data
injection attack problems. To this end, we introduce sets of
measurements, dubbed observability sets, as follows, which are
valuable for the analysis of data injection attacks which ensues.
Definition 5: An observability set S ∈ M, is a set of
measurements such that strictly removing S leads the maximum
matching over the critical sets - system measurements bipartite
graph not to include a certain critical set.
The term “strictly” in this definition reflects that adding any
measurement s ∈ S, which was removed, back to the right-side
of the bipartite graph will result in reincluding the previously
unmatched critical set in the maximum matching. A union of
observability sets is, then, defined to be a set of measurements
composed of a number of observability sets such that, when each
of these sets is successively removed, each such removal leads
to excluding one additional critical set from being part of the
maximum matching over the critical sets - system measurements
bipartite graph. Adding back any of the removed measurements
to the right-side of the bipartite graph will result in reincluding
one of the unmatched critical sets in the maximum matching.
These observability sets play a crucial role in characterizing
stealthy data injection attacks, as will be shown next.
We next introduce stealthy data injection attacks and prove that
they are a variant of our introduced observability attacks. This
enables further studying and solving various problems related to
SDIAs using our developed analytical tools.
IV. S TEALTHY DATA I NJECTION ATTACKS
A. Stealthy Data Injection Attacks
Recalling the measurement-state equation in (1), data injection attacks aim at replacing the measurement vector, z by a
manipulated measurement vector z a = z + a, where a ∈ Rm is
the attack vector, resulting in a new state estimate x̂a . However,
typically, the state estimation process is run in conjunction with
what is known as a bad data detector and identifier (BDD).
The BDD aims at detecting and identifying the presence of
outliers in the collected data set, so that such outliers can be
removed preventing them from affecting the estimation outcome.
Such BDDs rely on the statistical analysis of what is known as
measurement residuals, r, defined as [15]:
ẑ = H x̂ = Sz, r = z − ẑ = (I n − S)z = W z,
(4)
where S = H(H T R−1 H)−1 H T R−1 and W = I n − S.
A statistical analysis on the residuals enables analysis of the
magnitudes of the errors associated with each measurement, and
hence, allows the identification of outliers [15]. Regarding data
injection attacks, when data is added to certain measurements,
the adversary aims at keeping the residuals unchanged, so that the
attack cannot be detected by the BDD. Indeed, as shown in [5],
an attack vector that falls in the column-space of the Jacobian
matrix H, i.e. a = Hc, cannot be detected by residual statistical
analysis. Indeed, for a = Hc,
r a = W (z + a) = r + W a
= r + [I n − H(H T R−1 H)−1 H T R−1 ]Hc
= r + Hc − Hc = r.
(5)
As such, given the weighted least squares state estimation
equation in (2), the attack vector a = Hc generates an arbitrary
new state estimate x̂a = x̂ + c by choosing the constant vector
c without inducing any changes to the residual vector, as shown
in (5). Such DIAs are, hence, stealthy and are referred to as
stealthy DIAs. The ability of SDIAs to stealthily manipulate
the state estimates poses various challenges to the operation
of the grid. Hence, understanding and modeling such attacks is
indispensable to the secure and sustainable operation of power
systems.
To this end, we next introduce a holistic graph-theoretic
modeling of SDIAs that is based on the graph-theoretic modeling
of observability attacks introduced in Section III.
B. Graph-Theoretic Modeling of SDIAs
The observability attacks and observability sets introduced in
Section III provide the basis for a graph-theoretic interpretation
of SDIAs as will be shown in Theorem 4. However, before
introducing and proving Theorem 4, we introduce a preliminary
lemma which will be used in the proof of Theorem 4.
Lemma 2: If a DIA is stealthy (i.e. a = Hc), then removing
the attacked measurements renders the system unobservable.
Proof: Since the attack vector a is stealthy, then a = Hc.
Since H is of full rank, then the only solution to Hc = 0 is
c = 0. Hence, a = Hc has zero and nonzero elements for
c 6= 0. Now, if all of the rows of H corresponding to nonzero
elements of a are removed to form matrix H new , then, this results
in anew = H new c = 0 for c 6= 0. Hence, H new is not of full rank
and the power system whose Jacobian matrix is given by H new
is unobservable. Therefore, when the attack is stealthy, removing
the attacked measurements renders the system unobservable.
Here we note, that the result of Lemma 2, provides a one
directional relation stating that if a = Hc, i.e. the attack is
stealthy, then the removal of the nonzero elements of a, i.e. the
attacked measurements, causes the system to be unobservable.
However, the reverse direction does not always hold true. Indeed,
the reverse statement of Lemma 2 states that, if removing a
set of measurements renders the system unobservable, then this
guarantees that a stealthy DIA can be constructed which targets
all of these measurements, and only these measurements. We
next provide a counter example which proves that this reverse
statement does not hold true. In this regard, we consider
the
H0
Jacobian matrix H to be represented as follows: H =
.
H1
We let M0 and M1 represent the subset of measurements
corresponding to the rows of H 0 and H 1 , respectively. Consider
M0 to contain one critical measurement, i.e., one row of H 0 is
independent of all of the other rows of H. As such, removing the
subset of measurements M0 renders the system unobservable. In
addition, consider two measurements m0 ∈ M0 and m1 ∈ M1
such as m0 measures the power flow from bus i to bus j and m1
measures the power flow from bus j to bus i (i.e., m0 and m1 are
installed on the same transmission line but measure the flow in
two opposite directions). In this regard, let h0 and h1 correspond
to the rows of m0 and m1 in, respectively, H 0 and H 1 . Then, we
have10 h0 =−h1 .As aresult,one cannot find a stealthy attack
a0
H0
vector a =
=
c, in which all the elements of
a1
H1
a0 are nonzero and all the elements of a1 are zero, since if
h0 c 6= 0, then h1 c 6= 0, due to the fact that h0 = −h1 . This
implies that for the attack to target all the measurements in M0
and be stealthy, this attack must also target measurements in M1 .
Otherwise, this attack must be limited to a strict subset of M0
and may not target all the measurements in M0 . As a result, even
though removing the measurements in M0 renders the system
unobservable, one cannot necessarily construct a stealthy attack
vector that only targets all the measurements in M0 . Hence, this
provides a counter example of the reverse statement of Lemma 2
proving that this reverse statement does not always hold true.
Theorem 4: A DIA is stealthy if and only if the attacked
measurements constitute a union of observability sets.
Proof: We begin by proving that when the attacked measurements (i.e. nonzero elements of the attack vector a) constitute
a union of observability sets, then a is stealthy (i.e. a can be
represented as a = Hc). As shown in Theorem 3, when an
observability set (equivalently, a union of observability sets)
is removed, the system is unobservable. Hence, consider an
observability set S which has been removed. Let H (−S) be the
system’s Jacobian matrix without the measurements in S and let
C be the critical set which cannot be part of a maximum matching
over the critical sets - system measurements bipartite graph
when S is removed. Since the system is unobservable when
removing S, H (−S) y = 0 for a y 6= 0. However, the addition
of any measurement s ∈ S will reinclude C in the maximum
matching over the critical sets - system measurements bipartite
graph, and hence, reconnect the tree. As such, let H (−S)+(k)
correspond to H (−S) with the addition of a row corresponding to
a measurement k ∈ S. In this regard, since the system is rendered
observable, H (−S)+(k) is of full rank and H (−S)+(k) y will have
one nonzero element corresponding to the row of H (−S)+(k)
pertaining to the added measurement k. This procedure can be
repeated for all k ∈ S. As such, adding the rows corresponding
to S back to the Jacobian matrix results in b = Hy in which
only the elements of b corresponding to measurements in S are
nonzero. As a result, a = b is an attack vector in which only
the observability set S is attacked and is proven to be stealthy.
Now, we prove that, when an attack is stealthy, i.e. a = Hc,
then the nonzero elements of a correspond to a union of
observability sets. In this regard, from Lemma 2, we know that
removing the nonzero elements of a = Hc will render the
system unobservable, which implies that the nonzero elements
of a contain at least one observability set. Let S denote this
observability set, and let H (−S) be the system’s Jacobian matrix
without the measurements in S. Removing S will lead to two
subsystems each of which is fully observable (i.e. it will split the
10 Since P = −P , where P
ij
ji
ij and Pji are the real power flow from bus i
to bus j and from bus j to bus i, respectively, over the same transmission line.
spanning tree, T , into two subtrees each of which spans its own
subgraph). Let H 1 and H 2 be the Jacobian matrices of each of
these two subsystems (we denote these subsystems as subsystem
1 and subsystem 2) and let a1 and a2 correspond to the portions
of a (excluding the measurements of the previously removed
observability set) corresponding to the measurements in H 1 and
H 2 , respectively. In addition, let c1 and c2 correspond to the
portions of c pertaining to nodes in subsystem 1 and subsystem
2, respectively. Now, if ai for i ∈ {1, 2} has nonzero elements,
this implies that removing these elements will make subsystem
i unobservable, which implies that the nonzero elements of ai
contain an observability set. Following this same logic, removing
this observability set will subsequently split subsystem i into two
subsystems, each of which is observable. This process can be
continued recursively until no measurement m corresponding to
a nonzero element of a remains. Hence, this shows that when
a = Hc, then the nonzero elements of a correspond to a union
of observability sets.
This proves both directions of the theorem, and hence, concludes the proof.
Theorem 4 provides an analytical graph-theoretic modeling
of SDIAs using the fundamentals of observability attacks introduced in Section III. This enables a fundamental understanding
of SDIAs since it allows the characterization of the subset of
measurements which would be compromised as part of an SDIA
and hence enables defense against such attacks. In addition, this
analytical characterization of SDIAs enables a more in-depth
analysis of such integrity attacks and allows a unified derivation
of analytical solutions to a wide-range of well-studied problems
in this field, as will be explored in Section IV-C.
Example 1: As an illustrative example of the result11 in
Theorem 4, we consider the IEEE 14-bus system, shown in
Fig. 1, whose line transmission data can be found in [34]. We
consider the stealthy attack a = Hc with c = [1, 0, ..., 0]T ,
which corresponds to having the attack vector equal to the
first column of the Jacobian matrix H given by H(:, 1) =
[−16.9, 0, 0, 0, −16.9, 33.37, −5.05, −5.67, −5.75, zeros(1, 8)]T .
This attack consists of attacking measurement indices
{1, 5, 6, 7, 8, 9} which correspond to {F2 , I1 , I2 , I3 , I4 , I5 }.
In this respect, we next verify whether this attack is stealthy,
following Theorem 4. To this end, Fig. 5 shows a portion of
the critical sets - system measurements bipartite graph that is
relevant to the attacked measurements. The post-attack portion
of Fig. 5 marks the nodes corresponding to measurements
{F2 , I1 , I2 , I3 , I4 , I5 }, on the right-side of the bipartite graph,
as attacked (following the attack vector a). As a result, all
the edges connecting these nodes to the critical sets on the
left-side of the bipartite graph are removed. Then, building a
maximum matching over the post-attack bipartite graph shows
that, indeed, not all the critical sets are matched. Hence, the
removed measurements lead to a maximum matching that
does not include all critical sets. Furthermore, the addition of
a node corresponding to any of the attacked measurements,
i.e. {F2 , I1 , I2 , I3 , I4 , I5 }, would lead to reincluding one of
11 In this example, we index the measurements in Fig. 1 from
1 to 17 in an incremental manner based on the following order
(F2 , F8 , F9 , F15 , I1 , I2 , I3 , I4 , I5 , I6 , I7 , I9 , I11 , I12 , I13 , F17 , F19 ).
Pre-attack
Critical Set Measurements
C F2
F2
C I1
I1
I2
C I2
I3
C I3
I4
C F8
I11
C F9
I13
C I5
F8
I7
I9
F9
I5
Post-attack
Critical Set Measurements
C F2
F2
C I1
I1
C I2
I2
I3
C I3
I4
C F8
I11
C F9
I13
C I5
F8
Unmatched
I7
Matched
I9
Attacked
F
9
Uncompromised
I5
Maximum matching
Fig. 5. Critical sets – system measurements maximum matching and SDIAs.
the unmatched critical sets {C F2 , C I3 , C I5 } in the maximum
matching. This implies that the attack consists of a union of
observability sets which implies that the attack is, indeed,
stealthy.
C. Unified Solution to Diverse SDIA Problems
Theorem 4 provides a basis for studying various SDIA problems from a graph-theoretic perspective. Indeed, this representation provides a unified approach for characterizing analytical
solutions to various widely-studied SDIA problems. In this regard, we next present a set of such SDIA problems and show that
the derivations leading to Theorem 4 enable the understanding
and characterization of analytical solutions to these problems.
SDIA analyses can be categorized based on whether the focus
is on modeling the attack or the defense strategies. As such, we
first present two problems focusing on modeling attack strategies
followed by two problems focusing on the derivation of defense
strategies to thwart SDIAs.
1) Modeling SDIA Attack Strategies: Modeling SDIA attack
strategies enables a vulnerability assessment of the system and
allows anticipating sophisticated attack strategies which can
target the system. This, in turn, allows the derivation of adequate
defense strategies to thwart such attacks. As such, solving SDIA
problems focusing on modeling the attack strategies is indispensable to understanding such attacks and, as a result, defending the
system against them. We next focus on two problems which aim
at modeling potential attack strategies.
Problem 1: If measurement k ∈ M is attacked, what is the
minimal set of measurements which must be attacked along with
k for the attack to be stealthy? In other words, Problem 1 seeks
the solution to the following optimization problem:
min||Hc||0 ,
c
subject to: H(k, :)c = 1.
(6)
Problem 1 has been proposed in [20] and studied in [21]
and [22]. However, the derived solution in [21] is based on an
approximate relaxation method while the solution in [22] focuses
on the special case assuming that the measurement set consists
of all injection measurements at all buses and all line flow measurements at all transmission lines, which limits its generality.
Instead, here, we provide a general analytical characterization of
the solution to this problem using our developped graph-theoretic
framework.
The solution to this problem enables a vulnerability assessment of each measurement against SDIAs since it shows, for
each measurement, what is the minimum number of measurements which must be additionally compromised to potentially
launch an SDIA against the system. This can represent a security
index of that measurement following which, a measurement with
a lower (higher) security index is more (less) vulnerable to
SDIAs. In other words, a measurement which has a low security
index is more easily targeted by SDIAs since the adversary would
not need to comprise a large number of additional measurements
to lunch the stealthy attack. Such knowledge can be used to
improve the security of the system – by adding redundancy or
adding security defense mechanisms (such a encryption techniques or advanced meetering uints) – at the meters which are
deemed the most vulnerable to SDIAs.
The analytical graph-theoretic solution to Problem 1 is characterized in Theorem 5.
Theorem 5: The stealthy attack of smallest cardinality containing measurement k corresponds to attacking the measurements of the critical set of lowest cardinality which contains k.
Proof: First, we show that the attack containing the critical
set of lowest cardinality containing k is, indeed, stealthy. Then,
we prove that this attack corresponds to the stealthy attack
containing k that has a minimum cardinality.
By Theorem 4, for the attack to be stealthy, the removal of
the attacked measurements must lead the maximum matching
over the critical sets - system measurements bipartite graph not
to include all the critical sets (i.e. all the left-side nodes of the
bipartite graph). In other words, the attack must be composed
of a union of obseravbility sets. In this respect, removing the
critical set containing k that is of smallest cardinality is, indeed,
stealthy since removing a whole critical set will disconnect the
node corresponding to this critical set (on the left-hand side of
the critical sets - system measurements bipartite graph) from
the right-side of the bipartite graph which prevents this critical
measurement from being part of a maximum matching.
Next, we prove that there are no stealthy attacks containing
k that have a smaller cardinality. In this regard, for an attack
containing k to be stealthy, it must prevent a critical set, in
which k exists, from being part of the maximum matching
over the critical sets - system measurements bipartite graph. To
this end, a critical set would be excluded from the maximum
matching in two cases: 1) if all the measurements corresponding
to this critical set are attacked, or 2) if all the measurements
corresponding to this critical set are part of a different matching,
which assigns these measurements to other critical sets.
In the first case, considering attacking all the measurements
in a critical set, then attacking the critical set that has the
fewest number of measurements – as stated in this theorem –
corresponds to the minimum cardinality attack.
As for the second case, if a measurement k 0 in a critical set
containing k is matched – as part of a maximum matching – to
another critical set (we denote this set by C p ), then measurement
p must be attacked since, otherwise, C p would have been matched
to p sparing k to be matched to another critical set to maximize
the cardinality of the matching. In other words, matching a
critical set C p with a measurement k 0 6= p while p is not
attacked is contradictory to the assumption that this matching
is maximum. As a result, for a critical set C, such that k ∈ C, to
be discarded from the maximum matching, every measurement
in C must be matched to another critical set. This implies that at
least one measurement of each of these critical sets is attacked.
Thus, the number of attacked measurements will be at least
equal to the number of measurements within C for the attack
to be stealthy. Consequently, the stealthy attack containing k
that has the lowest cardinality corresponds to attacking only the
measurements within the critical set containing k that has the
lowest cardinality.
Solving Problem 1 will also facilitate solving another key
SDIA problem, referred to as Problem 2, and stated as follows.
Problem 2: What is the SDIA with the lowest cardinality? In
other words, which SDIA is a solution to:
min||a||0 ,
a
subject to: a = Hc.
(7)
Similarly to Problem 1, the solution to Problem 2 also provides
a vulnerability assessment of the system against SDIAs. In
fact, Problem 1 focuses on finding the security index associated
with each measurement. On the other hand, Problem 2 focuses
on the system as a whole by focusing on finding, in general,
the sparsest data injection attack which can target the system
and be stealthy. This corresponds to a security index for the
whole system. Indeed, this security index reflects the amount of
effort that an attacker must put to potentially launch an SDIAs
against the system. A low security index shows that, even when
manipulating a small set of measurements, the attack can be
stealthy. In contrast, a high security index reflects the robustness
of the system against SDIAs since the attacker would need to
concurrently manipulate a large number of measurements to
potentially launch a successful SDIA.
The solution to Problem 2 is provided in Proposition 1.
Proposition 1: The stealthy attack with the lowest cardinality
corresponds to attacking the smallest critical set.
Proof: This proof follows directly from the proof of Theorem 5. Indeed, since the stealthy attack containing measurement
k that is of smallest cardinality corresponds to the critical set
of lowest cardinality containing k, then searching for the global
stealthy attack of lowest cardinality should be limited to only
critical sets. Based on this fact, the stealthy attack of lowest
cardinality is the one in which the measurements in the critical
set of lowest cardinality are the only measurements that are
attacked (the only measurements having nonzero corresponding
elements in the attack vector a).
Example 2: For example, by inspecting the critical sets in
Table I, we can solve Problem 1 and Problem 2 for the IEEE
14-bus system shown in Fig. 1. With regard to Problem 1,
the results of Theorem 5 can be readily applied to find the
minimum stealthy attack containing a certain measurement k. For
example, the minimum stealthy attack containing measurement
I4 corresponds to attacking C I3 = {I3 , I2 , I4 }, since that is the
critical set of smallest cardinality containing I4 . As for Problem
2, the stealthy attack of lowest cardinality is one in which either
C F15 = {F15 , I7 }, C I6 = {I6 , I11 }, or C I9 = {I9 , I11 } are
attacked. As such, the minimum possible cardinality of a stealthy
attack for this IEEE 14-bus system is 2. To find such a stealthy
attack, the basis of the null space can be found for matrices
F15
I6
I9
H −(C ) , H −(C ) , or H −(C ) . We refer to these vectors as
nF15 , nI6 , and nI9 , respectively. As a result, these stealthy attack
vectors of minimum cardinality can be obtained as αHnF15 ,
αHnI6 , or αHnI9 , where α is a scalar multiplier.
2) Modeling SDIA Defense Strategies: The knowledge acquired from our introduced graph-theoretic framework enables
the derivation of adequate defense policies which can thwart
potential SDIAs. In this regard, next, two fundamental widelystudied problems for defending the system against SDIAs are
presented and investigated in Problem 3 and Problem 4.
Problem 3: What is the minimum set of measurements that
need to be protected (i.e. made immune to SDIAs) to guarantee
no SDIAs can be successful?
The solution to this problem enables finding a minimum-cost
defense strategy to thwart all potential SDIAs. Hence, this makes
the system robust against all possible SDIAs. However, even
though the solution to this problem provides the minimum-cost
defense strategy (assuming that protecting each measurement is
equally costly), for a practically large power system with several
thousand buses, such a defense strategy is likely to exceed any
practical security budget.
The solution to Problem 3 is presented in Theorem 6.
Theorem 6: The minimum set of measurements that must
be protected to guarantee that no SDIAs can be successful
corresponds to protecting all measurements in MC , i.e. all
measurements that are part of the original assignment function
forming the spanning tree over the power system.
Proof: By Theorem 4, for an attack to be stealthy, it
must lead to a critical set not to be matched as part of a
maximum matching over the critical sets - system measurements
bipartite graph. Hence, to guarantee that no attack can be stealthy,
all critical sets must be guaranteed to be matched. Thus, the
minimum number of measurements to be protected must be at
least equal to the number of critical sets, which is equal to
the number of measurements in MC . In this regard, protecting
every measurement m ∈ MC results in protecting the minimum
possible number of measurements which guarantees that C m can
be matched to m for all m ∈ MC , hence, guaranteeing that no
stealthy attack can be successfully carried out.
This proof can also be carried out equivalently using the
techniques of linear algebra. Indeed, protecting all the measurements in MC will guarantee that these measurements will be
part of the Jacobian matrix H. Since these measurements form
a spanning tree over the power system, their rows in H are
linearly independent. As such, let H C be the Jacobian matrix
corresponding only to measurements in MC , then H C c = 0
has no solution other than c = 0. The rows of H C are a subset
of the rows of H. As such, one cannot find an attack vector
a = Hc such that all the elements of a corresponding to the
rows of H C are zero. Hence, one cannot find a stealthy attack
a = Hc which does not attack the measurements in MC . As
a result, protecting these measurements will guarantee that no
stealthy attack can be carried out.
Here, the minimum defense set, solution to Problem 3, might
not be unique. In other words, the set MC might not be the only
minimum set of measurements which, when defended, makes the
system immune to SDIAs. However, characterizing a solution
to this problem provides important information regarding the
size of investments needed to make a power system immune
to SDIAs. In this regard, regardless of how high the number of
measurements in an N -bus system is, the number of measurements that must be protected to render the system immune to
SDIAs is always equal to N − 1. As such, by assessing the costs
of reinforcing the security of each measurement unit, the solution
to Problem 3 enables the calculation of the cost needed to
make the system robust against SDIAs. However, as the solution
implies, for practical power systems, securing this number of
measurements might exceed practical budget constraints.
Example 3: Applying the results in Theorem 6 to our treated
IEEE 14-bus system case analysis, protecting the measurements
in the first column of Table I is the set of measurements of
minimal cardinality which when protected renders the IEEE 14bus system in Fig. 1 immune to SDIAs.
Theorem 4 and the solutions to Problem 1, Problem 2,
and Problem 3 can be used to solve Problem 4 which was
proposed in [23] and which is presented next. The solution to
Problem 4 in [23] was derived based on an l1 relaxation of the
corresponding optimization problem which leads to approximate,
rather than generally accurate solutions.
Problem 4: What is the minimum set of measurements to
protect as to force the attacker to manipulate at least τa measurements to stay stealthy?
As discussed in Problem 3, making the system completely
robust against SDIAs may be very costly and exceed any practical budgetary constraints. As a result, rather than considering all
theoretically possible SDIAs, the solution to Problem 4 focuses
on defending the system against a large subset of practical
SDIAs in which the attacker’s limited resources prevents its
attack vector’s cardinality from exceeding τa . In other words, an
attacker might not be able to concurrently comprise more than
τa measurement units. This, hence, enables defending the system
against a practically large subset of potential SDIAs. In addition,
the solution to this problem allows using the knowledge about
the resources of potential attackers – which can be potentially
acquired from historical data – to compute adequate defense
policies against such attacks.
The solution to Problem 4 is presented in Proposition 2.
Proposition 2: A minimum set of measurements to protect
so that no attack with cardinality ||a||0 < τa can be stealthy,
corresponds to protecting one distinct measurement from each
critical set whose cardinality is less than τa .
Proof: Solving Problem 4 entails ensuring that all critical
sets of cardinality smaller than τa are part of the maximum
matching. Hence, when one distinct measurement in each of
these sets is secured, it is ensured that these critical sets will
be part of the maximum matching over the critical sets system measurements bipartite graph. As a result, additional
measurements would need to be attacked to target critical sets
of higher cardinality, if a stealthy attack were to be found,
which would require the attacker to manipulate more than τa
measurements. Hence, the solution to Problem 4 is a direct
result of Theorem 6 but by considering critical sets that have
cardinality smaller than τa rather than all critical sets, as is the
case in Theorem 6. As such, the rest of the proof of Proposition 2
follows directly from the proof of Theorem 6.
This result is very important since it allows the defender to
build on some knowledge that it has about the capacity and
resources of the attacker, to build a corresponding defense policy.
In other words, knowing that the attacker does not have the
capacity to concurrently manipulate more than τa measurements
enables the defender to focus on defending a smaller set of measurements rather than aiming to thwart any theoretically possible
SDIA. This can lead to a significant reduction in the needed
resources for such a defense since, as shown in the solution of
Problem 3, the latter defense policy requires committing a large
volume of resources which can exceed practical constraints.
Example 4: For our studied IEEE 14-bus system, consider that
τa = 3. This indicates that a set of measurements to protect must
be found to ensure that no attacker can have a successful stealthy
attack by attacking less than 3 measurements. The critical sets
that have cardinality lower than 3 are C F15 , C I6 , and C I9 which all
have a cardinality of 2. Now, we consider a distinct measurement
in each of these three sets, such that I7 , I6 , and I9 . As a result,
{I7 , I6 , I9 } is a minimum set of measurements which, when
defended, no stealthy attack vector of cardinality less than τa = 3
can be successfully launched.
As such, showing that SDIAs are a subset of our introduced observability attacks, enables using our proposed graphtheoretic framework to model, understand, and thwart such types
of cyber-physical attacks. Indeed, the four problems that we
have discussed show the way our developed framework enables
analytical characterization of the solutions to these various wellstudied SIDA problems. Such analytical characterization allows
assessing the vulnerability of the system against SDIAs as well
as deriving adequate defense strategies.
V. C ONCLUSION AND F UTURE O UTLOOK
In this paper, we have introduced a novel graph-theoretic
framework which enables a fundamental modeling of observability attacks targeting power systems and have proven that
the widely-studied stealthy data injection attacks are a special
case of such observability attacks. Based on this proposed
framework, we have characterized the analytical solutions to
various central observability and data injection attack problems.
These solutions aim at capturing potential attack strategies as
well as suggesting defense policies to thwart such attacks. In
this respect, we have shown that our derived framework enables
characterization of the sparsest stealthy attack as well as the
sparsest stealthy attack including a certain measurement. With
respect to defense policies, we have shown that our graphtheoretic framework enables the analytical characterization of
the minimum measurement set which when defended guarantees
thwarting any potential stealthy attack as well as the minimum
set of measurements whose defense guarantees that no attack
below a certain cardinality can be stealthy.
The proposed graph-theoretic framework provides a general
analytical tool using which a wide set of key observability
attacks and data injection attacks problems can be modeled and
analyzed, and is not limited to the set of problem examples
which are studied in this paper. For example, the problem of
characterizing the sparsest stealthy attack containing a certain
measurement can be extended to studying the sparsest stealthy
attack containing a certain set of measurements. Using our
proposed framework, a solution approach can be investigated
to potentially derive analytical solutions to this critical problem.
The solution of this problem enables a risk assessment of the
power system by quantifying the risk of having a vulnerable set
of measurements and the way that such a vulnerability can be
leveraged by an intelligent malicious attacker. Along the same
lines, for security assessment, a central problem is quantifying
the sparsest stealthy attack possible when a certain set of
measurements is defended. The solution to this problem enables
assessment of the effectiveness and impact of an implemented
defense strategy. This problem has been formalized in [23].
However, the proposed solution approach in [23] relied on an
l1 relaxation of the original optimization problem formulation
which leads to approximate numerical solutions. However, our
introduced graph-theoretic framework can be used to attempt the
characterization of analytical solutions to this problem.
Beyond these one-sided attack and defense problems, the
ability to analytically characterize attack and defense policies
using the proposed framework allows studying problems that
involve interactions between attackers and defenders from a
game-theoretic perspective. Such analyses can account for the
opponent’s potential attack or defense strategies when designing,
respectively, defense policies or attack vectors. As a result,
such analyses allow the modeling and investigation of practical
competitive attack vs. defense settings. This enables studying the
effects of sophisticated observability attacks and data injection
attacks on the system as well as the impact of proposed defense
strategies within various application domains such as electricity markets, congestion management, and contingency analysis,
among others, thus taking the application of our framework
beyond the domain of power systems which motivated this study.
R EFERENCES
[1] Y. Mo, T. H. J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig,
and B. Sinopoli, “Cyber–physical security of a smart grid infrastructure,”
Proceedings of the IEEE, vol. 100, no. 1, pp. 195–209, Jan 2012.
[2] A. Sanjab and W. Saad, Power System Analysis: Competitive Markets,
Demand Management, and Security. Cham: Springer International
Publishing, 2017, pp. 1–38. [Online]. Available: https://doi.org/10.1007/
978-3-319-27335-8 28-1
[3] G. E. Rahi, A. Sanjab, W. Saad, N. B. Mandayam, and H. V. Poor, “Prospect
theory for enhanced smart grid resilience using distributed energy storage,”
in Proc. 54th Annual Allerton Conference on Communication, Control, and
Computing (Allerton), Sept 2016, pp. 248–255.
[4] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
state estimation in electric power grids,” in Proc. 16th ACM Conference on
Computer and Communications Security, Chicago, Illinois, USA, November 2009, pp. 21–32.
[5] Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state
estimation in electric power grids,” ACM Transactions on Information and
System Security (TISSEC), vol. 14, no. 1, pp. 1–33, May 2011.
[6] A. Sanjab and W. Saad, “Data injection attacks on smart grids with multiple
adversaries: A game-theoretic perspective,” IEEE Transactions on Smart
Grid, vol. 7, no. 4, pp. 2038–2049, July 2016.
[7] L. Xie, Y. Mo, and B. Sinopoli, “Integrity data attacks in power market
operations,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 659–666,
Dec 2011.
[8] A. Sanjab and W. Saad, “Smart grid data injection attacks: To defend or
not?” in Proc. IEEE International Conference on Smart Grid Communications (SmartGridComm), Nov 2015, pp. 380–385.
[9] Y. W. Law, T. Alpcan, and M. Palaniswami, “Security games for risk
minimization in automatic generation control,” IEEE Transactions on
Power Systems, vol. 30, no. 1, pp. 223–232, Jan 2015.
[10] A. Sanjab and W. Saad, “On bounded rationality in cyber-physical systems
security: Game-theoretic analysis with application to smart grid protection,”
in Proc. Joint Workshop on Cyber- Physical Security and Resilience in
Smart Grids (CPSR-SG), April 2016, pp. 1–6.
[11] F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification
in cyber-physical systems,” IEEE Transactions on Automatic Control,
vol. 58, no. 11, pp. 2715–2729, Nov 2013.
[12] Q. Zhu and T. Başar, “Robust and resilient control design for cyberphysical systems with an application to power systems,” in Proc. 50th IEEE
Conference on Decision and Control and European Control Conference
(CDC-ECC), Dec 2011, pp. 4066–4071.
[13] F. Pasqualetti, F. Dorfler, and F. Bullo, “Cyber-physical attacks in power
networks: Models, fundamental limitations and monitor design,” in Proc.
50th IEEE Conference on Decision and Control and European Control
Conference (CDC-ECC), Dec 2011, pp. 2195–2201.
[14] A. Ferdowsi, A. Sanjab, W. Saad, and N. B. Mandayam, “Game theory
for secure critical interdependent gas-power-water infrastructure,” in Proc.
Resilience Week (RWS), Sept 2017, pp. 184–190.
[15] A. Abur and A. G. Exposito, Power System State Estimation: Theory and
Implementation. New York: Marcel Dekker, 2004.
[16] A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and
Control. John Wiley & Sons, 2012.
[17] J. B. A. London, L. F. C. Alberto, and N. G. Bretas, “Network observability:
identification of the measurements redundancy level,” in Proc. International
Conference on Power System Technology (PowerCon), vol. 2, 2000, pp.
577–582.
[18] K. C. Sou, H. Sandberg, and K. H. Johansson, “Computing critical k-tuples
in power networks,” IEEE Transactions on Power Systems, vol. 27, no. 3,
pp. 1511–1520, Aug 2012.
[19] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, “Malicious data attacks on the
smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 645–658,
Dec 2011.
[20] H. Sandberg, A. Teixeira, and K. H. Johansson, “On security indices for
state estimators in power networks,” in First Workshop on Secure Control
Systems (SCS), 2010.
[21] K. C. Sou, H. Sandberg, and K. H. Johansson, “Electric power network
security analysis via minimum cut relaxation,” in Proc. 50th IEEE Conference on Decision and Control and European Control Conference, Dec
2011, pp. 4054–4059.
[22] J. M. Hendrickx, K. H. Johansson, R. M. Jungers, H. Sandberg, and K. C.
Sou, “Efficient computations of a security index for false data attacks in
power networks,” IEEE Transactions on Automatic Control, vol. 59, no. 12,
pp. 3194–3208, Dec 2014.
[23] T. Kim and H. V. Poor, “Strategic protection against data injection attacks
on power grids,” IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 326–
333, June 2011.
[24] S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, and A. Tajer, “Coordinated
data-injection attack and detection in the smart grid: A detailed look at
enriching detection solutions,” IEEE Signal Processing Magazine, vol. 29,
no. 5, pp. 106–115, Sept 2012.
[25] J. London, A. Bretas, and N. Bretas, “Algorithms to solve qualitative
problems in power system state estimation,” International Journal of
Electrical Power and Energy Systems, vol. 26, no. 8, pp. 583 – 592, 2004.
[26] E. Castillo, A. J. Conejo, R. E. Pruneda, C. Solares, and J. M. Menendez,
“m − k robust observability in state estimation,” IEEE Transactions on
Power Systems, vol. 23, no. 2, pp. 296–305, May 2008.
[27] K. C. Sou, H. Sandberg, and K. H. Johansson, “On the exact solution to a
smart grid cyber-security analysis problem,” IEEE Transactions on Smart
Grid, vol. 4, no. 2, pp. 856–865, June 2013.
[28] Y. Zhao, A. Goldsmith, and H. V. Poor, “Minimum sparsity of unobservable
power network attacks,” IEEE Transactions on Automatic Control, vol. 62,
no. 7, pp. 3354–3368, July 2017.
[29] ——, “A polynomial-time method to find the sparsest unobservable attacks
in power networks,” in Proc. American Control Conference (ACC), July
2016, pp. 276–282.
[30] G. R. Krumpholz, K. A. Clements, and P. W. Davis, “Power system observability: A practical algorithm using network topology,” IEEE Transactions
on Power Apparatus and Systems, vol. PAS-99, no. 4, pp. 1534–1542, July
1980.
[31] V. H. Quintana, A. Simoes-Costa, and A. Mandel, “Power system topological observability using a direct graph-theoretic approach,” IEEE Transac-
tions on Power Apparatus and Systems, vol. PAS-101, no. 3, pp. 617–626,
March 1982.
[32] A. Bargiela, M. R. Irving, and M. J. H. Sterling, “Observability determination in power system state estimation using a network flow technique,”
IEEE Transactions on Power Systems, vol. 1, no. 2, pp. 108–112, May
1986.
[33] D. B. West, Introduction to Graph Theory, 2nd ed. Upper Saddle River,
N.J: Prentice Hall, 2001.
[34] R. Zimmerman, C. Murillo-Sanchez, and R. Thomas, “Matpower: Steadystate operations, planning, and analysis tools for power systems research
and education,” IEEE Transactions on Power Systems, vol. 26, no. 1, pp.
12–19, Feb 2011.
| 3cs.SY
|
Ten Diverse Formal Models
for a CBTC Automatic Train Supervision System
Franco Mazzanti
Alessio Ferrari
CNR-ISTI
Pisa, Italy
[email protected]
CNR-ISTI
Pisa, Italy
[email protected]
Communications-based Train Control (CBTC) systems are metro signalling platforms, which coordinate and protect the movements of trains within the tracks of a station, and between different stations.
In CBTC platforms, a prominent role is played by the Automatic Train Supervision (ATS) system,
which automatically dispatches and routes trains within the metro network. Among the various functions, an ATS needs to avoid deadlock situations, i.e., cases in which a group of trains block each
other. In the context of a technology transfer study, we designed an algorithm for deadlock avoidance
in train scheduling. In this paper, we present a case study in which the algorithm has been applied.
The case study has been encoded using ten different formal verification environments, namely UMC,
SPIN, NuSMV/nuXmv, mCRL2, CPN Tools, FDR4, CADP, TLA+, UPPAAL and ProB. Based on
our experience, we observe commonalities and differences among the modelling languages considered, and we highlight the impact of the specific characteristics of each language on the presented
models.
1
Introduction
Communications-based Train Control (CBTC) systems are the de-facto standard for metro signalling and
control, including several interacting wayside and onboard components that ensure safety and availability
of trains within the metro network. In the context of a technology transfer project named TRACE-IT,
the authors of the current paper, together with representatives of a large railway company, designed one
of the main components of a CBTC system prototype, namely the Automatic Train Supervision (ATS)
system [10]. This is a wayside system that dispatches and monitor trains along the metro network,
according to a set of predefined missions. The ATS includes a scheduling kernel, which shall ensure
that, regardless of train delays, no deadlock situation occurs, i.e., the missions are designed in such
a way that it never happens that two or more trains block each other from completing their missions.
In the context of the project, we applied formal methods to design and verify a scheduling algorithm
that addresses the deadlock avoidance problem [25]. The application of the algorithm to the TRACEIT case study was initially modelled and verified by means of the UMC tool [30, 4, 20]. Then, the
design of the case study was replicated with other six different formal frameworks – i.e., SPIN [16, 29],
NuSMV/nuXmv [5, 18], mCRL2 [14, 9], CPN Tools [17, 31], FDR4 [13, 27] and CADP [11, 6] – to
explore the potential of formal methods diversity [24]. This is the usage of different formal tools to
validate the same design, to increase the confidence on the verification results [19]. In the current paper,
we present the models discussed in [24], focusing on the differences between the modelling languages,
rather than on formal verification diversity. Furthermore, we provide three additional models, using
TLA+ [21, 7], ProB [2, 15] and UPPAAL [8, 32]. Within the context of this paper, our goal is to
provide some feedback on the differences and traps that should be tackled when changing the reference
John P. Gallagher, Rob van Glabbeek and Wendelin Serwe (Eds):
Models for Formal Analysis of Real Systems (MARS’18)
and Verification and Program Transformation (VPT’18)
EPTCS 268, 2018, pp. 104–149, doi:10.4204/EPTCS.268.4
c F. Mazzanti & A. Ferrari
This work is licensed under the
Creative Commons Attribution License.
F. Mazzanti & A. Ferrari
105
frameworks, and the commonalities that would allow a simple translation from one framework to another.
The models are made available in Appendix A and in attachment to this paper.
The remainder of the paper is structured as follows. In Sect. 2 we provide an overview of the modelled algorithm. In Sect. 3 we present the different models, discussing commonalities and differences
with a focus on syntactic and semantics discrepancies. Sect. 4 concludes the paper. In Appendix A, we
report the different models presented.
2
A Deadlock Avoidance Algorithm for ATS
This section describes basic elements of the modelled algorithm, which was defined in our previous
works [26, 25]. Fig. 1 shows the structure of the railway layout considered in this study. Nodes in the
yard correspond to itinerary endpoints, and the connecting lines correspond to the entry/exit itineraries
to/from those endpoints. Eight trains are placed in the layout. Each train has its own mission to execute,
defined as a sequence of itinerary endpoints. For example, the mission of train0, which traverses
the layout from left to right along top side of the yard, is defined by the mission vector: T0 = [1, 9, 10,
13, 15, 20, 23] (the numbers in the vector refer to the sequence of traversed endpoints in the diagram of
Fig. 1). The mission of train7, which instead traverses the layout from right to left, is defined by
the vector: T7 = [26, 22, 17, 18, 12, 27, 8]. The progress status of each train is represented by the index,
pointing to a position in the mission vector, which allows the identification of the endpoint in which
the train is at a certain moment. We will have 8 variables P0 , . . . , P7 , one for each train, which store the
current index for the train. For example, at the beginning, we have P0 = 0, . . . , P7 = 0, since all the trains
occupy the initial endpoints of their missions – at index 0 in the vector.
Parco della Vittoria
I
III
train0
1
BCA03
2
9
train1
Piazza Dante
I
10
Via Roma
Via Marco Polo
15
1
13
16
train4
II
II
20
24
train5
3
I
II
4
train2
23
11
5
III
BCA05
6
12
18
17
Viale dei Giardini
III
22
25
train6
IV
26
train7
27
train3
7
8
Figure 1: A fragment of the yard layout and the 8 missions of the trains
If the 8 trains are allowed to move freely, i.e., if their next endpoint is free, there is the possibility of
creating deadlocks, i.e., a situation in which the 8 trains block each other in their expected progression.
To solve this problem the scheduling algorithm of the ATS must take into consideration two critical
sections A and B – i.e., zones of the layout in which a deadlock might occur – which have the form of
a ring of length 8 (see Fig. 2), and guarantee that these rings are never saturated with 8 trains – further
information on how critical sections are identified can be found in our previous work [25]. This can be
modelled by using two global counters RA and RB, which record the current number of trains inside these
critical sections, and by updating them whenever a train enters or exits these sections. For this purpose,
each train mission Ti , with i = 0 . . . MISSION LEN (in our case MISSION LEN = 7) , is associated with:
a vector of increments/decrements Ai to be applied to counter RA at each step of progression; a vector Bi
of increments/decrements to be applied to counter RB.
Ten Diverse FMs for an ATS
106
For example, given T0 = [1, 9, 10, 13, 15, 20, 23], and A0 = [0, 0, 0, 1, 0, −1, 0], when train0 moves
from endpoint 10 to endpoint 13 (P0 = 3) we must check that the +1 increment of RA does not saturate
the critical section A, i.e., RA + A0 [P0 ] ≤ LA (in our case, LA = 7); if the check passes then the train can
proceed and safely update the counter RA := RA + A0[P0 ]. The maximum number of trains allowed in
each critical section (i.e., 7), will be expressed as LA and LB in the following.
Parco della Vittoria
I
III
BCA03
9
Piazza Dante
I
10
Via Roma
Via Marco Polo
15
13
16
20
24
I
18
III
BCA05
II
II
II
11
23
12
17
Viale dei Giardini
III
22
25
A
B
IV
26
27
Figure 2: The critical section A and B which must not be saturated by 8 trains
The models presented in Appendix A, which implement the algorithm described above, are deadlockfree, since the verification is being carried on as a final validation of a correct design. The actual
possibility of having deadlocks, if the critical sections management were not supported or incorrectly
implemented, can easily be observed by raising from 7 to 8 the values of the variables LA or LB.
The case study presented here is actually a fragment of the complete TRACE-IT case study. In
the original model the railway layout is much larger and the trains continually repeat cycling round
missions. In that configuration further deadlocks situations may occur and further critical sections have
to be defined and managed. The model considered in this case study represents just one of the three
fragments in which the complete TRACE-IT layout has been decomposed to render the complexity of
the problem amenable for formal verification. This is a typical procedure in the verification of real-world
railway problems [33].
The current design, in which each system state logically corresponds to a set of train progresses and
each train movement logically corresponds to an atomic system evolution step, leads to a state-space of
1,636,535 configurations. This data is useful because it allows the user to cross-check the correctness of
the encoding of this logical design in the various frameworks.
3
Commonalities and Differences
3.1 The basic blackboard model
We want to build a model that describes all the possible evolutions of the system composed by the 8
trains, with purpose of verifying the correctness of the A0, ..., A7 and B0, ..., B7 tables that control
the non saturation of the sections A and B, and the correctness of the assumption that the A and B
sections are the only zones where a deadlock might occur. The design skeleton we have in mind is
that of a blackboard model, where a global space of common variables is read and updated by a set
of atomic transformation operations. An atomic system evolution corresponds to a one-step movement
of one train in the yard, which can occur when the next endpoint is free and when the move does not
saturate neither the A section, nor the B section. We have encoded the above simple skeleton design
F. Mazzanti & A. Ferrari
107
Table 1: Different models developed with associated frameworks.
Framework
CADP
CPN Tools
FDR4
mCRL2
ProB
NuSMV/nuXmv
SPIN
TLA+
UMC
UPPAAL
File Name
Description
cadp oneway8par.lnt
cadp oneway8seq.lnt
cpn-oneway<X>.xml
fdr4 oneway8par.txt
fdr4 oneway8seq.txt
mcrl2 oneway8par.txt
mcrl2 oneway8seq.txt
prob oneway8seq.mch
smv oneway8-SM.smv
spin oneway8.pml
tla oneway8.txt
umc oneway8seq.txt
uppaal-oneway8par.ta
uppaal-oneway8seq.ta
Parallel without shared memory
Sequential
Parallel without shared memory with X trains
Parallel without shared memory
Sequential
Parallel without shared memory
Sequential
Sequential
Sequential
Sequential
Sequential
Sequential
Parallel with shared memory
Sequential
using notations supported by 10 verification frameworks, namely UMC, Promela/SPIN, NuSMV/nuXmv,
mCRL2, CPN Tools, FDR4, CADP, TLA+, UPPAAL and ProB. Within the context of this paper, our
goal is to provide some feedback on the differences and traps that should be tackled when changing the
reference frameworks, and the commonalities that would allow a simple translation from one framework
to another. Each framework surely has its own typical set of features that might lead to the best modelling
and verification of a system, but, in this work, we are not interested in comparing the best way in which
all the 10 frameworks could model the system. Instead, we are interested in seeing if, and to which extent,
our basic design skeleton could be fitted with minimal transformations in all the frameworks taken into
consideration.
In the following subsections we summarise some of the aspects that appear to characterise the differences of the various frameworks as evidenced by our specification problem. These observations can
support the reader in making sense of the different models that are reported in Appendix A1 , and attached
to the current paper. More specifically, for each framework, we provide one or more model variants. The
variants represent different modelling styles, according to the classification provided in Sect. 3.2. In
the case of CPN Tools, the different variants are associated to models with a different number of trains.
Indeed, in our experiments, presented in [24, 23], CPN Tools was not able to verify the case with eight
trains, and models with a lower number or trains were tested. Table 1 provides a brief description of the
different variants considered, with the associated file names.
3.2 System Design Structure
The frameworks taken into account allow different kinds of model structures, which can be seen in our
variants.
Sequential With the sequential design structure the global system status is read and updated by a single
sequential, nondeterministic process. This is the case that more directly reflects our initial design
skeleton, and this structure has been modelled in all the considered frameworks2 , with the excep1 In
Appendix A we report solely the sequential cases – according to the classification in Sect. 3.2 – which are the most
representative for our design.
2 mcrl2 oneway8seq.ta, cadp oneway8seq.lnt, fdr4 oneway8seq.csp, umc oneway8seq.txt, spin oneway8.pml, prob oneway8.mch, tla oneway8.txt, smv oneway8-SM.smv
Ten Diverse FMs for an ATS
108
tion of CPN Tools. Indeed, this modelling style can be reproduced with CPN Tools, but it is not in
line with the typical use of Petri Nets.
Parallel without Shared Memory With this design structure we indicate the case in which different
parallel process interact among themselves in the absence of a common shared memory that could
be directly read and updated by the processes. This is in general the case of concurrent frameworks,
such as UMC, CPN, FDR4, CADP, mCRL2, where sets of processes (or a network layout in the
case of Petri Nets) are used to model the system, and where a single entity might model the
evolutions in time of a specific component of the system status (e.g., a variable). This is not our
main reference scenario, however in the case of mCRL2, CADP, FDR4, CPN Tools we show
alternative modelling examples that follow this design structure3 .
Parallel with Shared Memory With this design structure a set of parallel processes share a common
memory space, and, at the same time, may interact through inter-process communication. SPIN
and UPPAAL are the only frameworks that allow the user to design a system in this way. An
example of this model structure has been shown only in the case of UPPAAL4.
subsectionLanguage Style
Another evident difference among the various frameworks, is the overall style of the language used to
specify the system. For example, if we consider the way in which the transition relation (i.e., the system
evolutions) are described, we can observe that three main approaches are followed by our considered
frameworks. These three language styles can be qualified as imperative, logical and algebraic, and are
exemplified below with small fragments of code in the style of CADP-LNT [12]5 , TLA+ and FDR4,
respectively.
if P0<6 then
P0 := P0+1;
RA := RA+A0[P0];
end;
(P0 < 6) &
(P0’ = P0+1) &
(RA’ = RA+A0[P0+1])
System(P0,RA) =
(P0 <6) ->
System(P0+1,RA+A0[P0+1])
In spite of the apparent difference, if the state transformation to be carried out during a system
evolution is simple (like it happens in our case), the three styles are roughly equivalent, and translation
from one style to the other can be performed with limited effort.
3.3 Arrays and Indexing
In our example we do not have the need to use sophisticated data structures, and our design skeleton is just
based on integer values and fixed-size tables of numbers. Sometimes, e.g., in the case of UMC, SPIN,
NuSMV/nuXmv, CADP-LNT, UPPAAL, TLA+, array-like types and indexing operations are natively
supported by the specification language; other times, e.g., in the case of CPN Tools, FDR4, mCRL2,
arrays should be represented as functions, or sequences, or lists, and the indexing operations possibly
manually encoded as custom recursive functions. For example, in the case of FDR4 we have:
M0 = <1,9,10,13,15,20,23>
select_item(list,index) =
if index==0 then
3 mcrl2
-- list of endpoint for the mission of train0
-- item selection, given an index
-- (assuming index in the appropriate range)
oneway8par.ta, cadp oneway8par.lnt, fdr4 oneway8par.csp, cpn oneway8.xml, cpn oneway6-nocol.xml
4 uppal-oneway8seq.ta
5
LTN is one of the languages supported by CADP, and is the language chosen for our experiment.
F. Mazzanti & A. Ferrari
109
head(list)
else
select_item(tail(list),index-1);
3.4 System Initialisation
The different ways in which the frameworks treat system initialisation point out a difference that might
trick an inexperienced designer. Three different approaches can be recognised when a state variable in
defined by the model, but not explicitly initialised at system startup.
Default Value The uninitialised variables might get some default initial value (typically 0 for integers).
This is the approach found in UMC, SPIN, UPPAAL.
Error The situation can be statically recognised as a design error, and notified to the designer. This is
the approach followed by TLA+, ProB, CPN Tools, FDR4, mCRL2, CADP-LNT.
Nondeterministic Assignment The not explicitly initialised variable may nondeterministically get any
of the possible values allowed by its type. This approach has been encountered only in in NuSMV/nuXmv. From one side this choice provides a powerful and flexible way to specify a rich
set of possible system initial values, from the other side it might trick an inexperienced designer
wrongly thinking that a classical default value (like 0) is used instead.
3.5 The Transition Relation
In all the considered frameworks the transition relation is defined by rules that have the form: guardcondition / state-transformation-effects. A possible question is what happens to the variables that are not
explicitly modified by the state-transformation-effects. The situation is similar to the initialisation issue
previously seen. Also in this case we have three different approaches:
Previous Value The not explicitly assigned state variables preserve their previous value. This is the
approach followed by CPN, UPPAAL, FDR4, mCRL2, SPIN, UMC, ProB, CADP-LNT.
Default Value The not explicitly assigned state variables get a default null value. This is what happens
in the case of TLA+.
Nondeterministic Assignment The not explicitly assigned variable may nondeterministically get any
of the possible values allowed by its type. This is what happens in the NuSMV/nuXmv case.
The difference among the three classes is evident if we compare the fragments of state-transformationeffects as they occur in CADP-LNT, TLA+ and NuSMV/nuXmv:
P0 := P0+1;
(P0’ = P0+1) &
UNCHANGED<<P1,..P7>>
next(P0) in P0+1 &
next(P1) in P1 &
...
next(P7) in P7
While with CADP-LNT it is not needed to make explicit that P1 ... P7 do not change their value,
in TLA+ we need to use the keyword UNCHANGED, and in NuSMV/nuXmv we have to explicitly state, for
each variable, that the next value is equal to the one at the previous execution step.
Another relevant difference among the various frameworks is whether they allow the transition relation to be only partially defined, i.e., are certain inputs and certain states allowed not to trigger a system
evolution?
Ten Diverse FMs for an ATS
110
In our problem this situation actually occurs. For example, when a train cannot proceed because its
next endpoint is occupied by another train, the rule describing the train progress cannot be applied. In all
frameworks, with the exception of NuSMV/nuXmv, this does not represent a problem. It simply means
that from such a system configuration state there is no outgoing edge corresponding to the movement of
that train.
In the case of NuSMV/nuXmv instead the transition relation must be a total function. This means
that if a certain state configuration and a certain system input does not trigger an actual system evolution,
we should equally explicitly state that the next system state is unchanged. If we fail to explicitly state
that, the consequence is that the next state can become any state where all the system state variables nondeterministically get any of the values allowed by their type. Notice that in this way we are introducing
self loops in many states of the graph describing the system behaviour, and this has a certain impact on
the way in which the system properties could be stated and verified. For example, the user might be
constrained to specify fairness constraints, or avoid the use of LTL formulas, or avoid CTL formulas like
AF<statepredicate>. Indeed the verification approach of NuSMV always takes into consideration only
infinite – possibly fair, if requested – traces6 .
3.6
Verification Techniques
In our case the property we want to verify is that for all possible executions all the trains eventually
complete their missions. This property can be easily specified and verified in all the considered frameworks. However each framework provides original advanced verification features not supported by other
frameworks. The possibility to translate a specification from a formalism to another might lead to several
advantages:
• We can increase the confidence of the verification results, given that none of the analysed frameworks are qualified at the highest integrity levels usually required by safety critical standards.
• We can exploit the specific strong points of more than one framework (e.g. the friendliness of a
user interface, the ability to scale well, the possibility of generating program code or performing
model based testing).
• We can verify a wider class of properties. For example, by importing a FDR4 model into ProB we
can verify also LTL/CTL properties, by translating a model into UPPAAL we can introduce and
verify further time related aspects, and so on. Table 2 summarises the basic verification features
that the considered frameworks make available.
3.7 Some Performance Data
It is not a goal of our paper to make a comparative evaluation of the various frameworks in terms of scalability or performance. Nevertheless a summary of the experienced times when evaluating the property
that for all possible executions all the trains eventually complete their missions might still be a useful
approximate indication of the impact of a certain system design approach / formal verification technique
in terms of performance. The verification times presented in Table 3 are expressed as ranges because
they actually depend of the specific design approach adopted, on the specific formulas being evaluated,
and on the specific options used during the tool execution. We refer to [24] for additional details.
6 when
using the -bmc option the behaviour might be different
F. Mazzanti & A. Ferrari
111
Table 2: Verification features supported by the various frameworks
Framework
Supported Verification Techniques
UMC
SPIN
NuSMV/nuXMV
CADP
UPPAAL
TLA+
ProB
mCRL2
FDR4
CPN
model checking CTL-like, state-event based logics
model checking LTL, fairness requirements
LTL, CTL, PSL [1], SMT model checking, fairness requirements
MCL [22], Parametric Mu-Calculus model checking, equivalence checking
MITL [3], time-related, and probability related properties
LTL, Theorem Proving, Proof Validations
LTL, CTL model checking, constraints based checking
Parametric Mu Calculus model checking, equivalence checking
Refinement Checking, fairness requirements
CTL, custom ML properties
Table 3: Indicative Summary of Evaluation Times
Framework
UMC
SPIN
NuSMV/nuXMV
CADP
UPPAAL
TLA+
ProB
mCRL2
FDR4
CPN
4
Range of evalution times
38 - 86 seconds
13 - 47 seconds
2.9 - 43 seconds
29 seconds
16 seconds
3 minutes
32 minutes
2 minutes -19 minutes
15 seconds - 20 minutes
unable to deal with the state-space size
Conclusion
The availability of CBTC systems relies on the existence of smart ATS systems that prevent the occurrence of deadlock situations in the metro network. In this paper, we present different models of a
scheduling algorithm for an ATS, which was designed and verified to avoid deadlocks. Ten different
formal frameworks are used, and different variants of system design structure are presented, according
to the features made available by the frameworks. Differences in terms of language style, allowed data
types, and treatments of the system evolution are observed, based on the developed models. In our future
work, we plan to adapt our design to tools for model-based development such as Simulink/Stateflow, and
SCADE, to explore their potential in terms of modelling styles and verification capabilities, and compare them with the other frameworks. Furthermore, in the context of the EU ASTRail project7 we are
involved in a comparative analysis of formal and semi-formal tools in the railway domain. The experience gained with the different frameworks will be applied to provide diverse models for ERTMS/ETCS
(European Rail Traffic Management System/European Train Control System) Level 3, the next evolution
of ERTMS/ETCS. This will allow us to further stress the capability of the frameworks with a different
design, including time and probabilistic aspects. It shall be noticed that, in the current work, we did not
discuss aspects related to the usability of the various frameworks. This issue is of paramount importance,
as highlighted, among others, by Sirjani [28], and is also going to be considered in the context of the
ASTRail project.
7 http://www.astrail.eu
Ten Diverse FMs for an ATS
112
Acknowledgements This work has been partially funded by the ASTRail project. This project received
funding from the Shift2Rail Joint Undertaking under the European Unions Horizon 2020 research and
innovation programme under grant agreement No 777561. The content of this paper reflects only the
authors view and the Shift2Rail Joint Undertaking is not responsible for any use that may be made of the
included information.
References
[1] (2010): IEEE Standard for Property Specification Language (PSL). IEEE Std 1850-2010 (Revision of IEEE
Std 1850-2005), pp. 1–182, doi:10.1109/IEEESTD.2010.5446004.
[2] Jean-Raymond Abrial (2010): Modeling in Event-B: System and Software Engineering. Cambridge University Press, doi:10.1017/S0956796812000081.
[3] Rajeev Alur, Tomás Feder & Thomas A. Henzinger (1991): The Benefits of Relaxing Punctuality. In: Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec,
Canada, August 19-21, 1991, pp. 139–152, doi:10.1145/112600.112613.
[4] Maurice H ter Beek, Stefania Gnesi & Franco Mazzanti (2015): From EU projects to a family of model
checkers. In: Software, Services, and Systems, LNCS 8950, Springer, pp. 312–328, doi:10.1007/
978-3-319-15545-6_20.
[5] Roberto Cavada, Alessandro Cimatti, Michele Dorigatti, Alberto Griggio, Alessandro Mariotti, Andrea
Micheli, Sergio Mover, Marco Roveri & Stefano Tonetta (2014): The nuXmv Symbolic Model Checker.
In: CAV, pp. 334–342, doi:10.1007/978-3-319-08867-9_22.
[6] INRIA CONVECS (2018): CADP Home Page. https://cadp.inria.fr.
[7] Microsoft Corp. (2018): The TLA Toolbox Home Page. https://lamport.azurewebsites.net/tla/toolbox.html.
[8] Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikučionis & Danny Bøgsted Poulsen (2015): Uppaal
SMC tutorial. International Journal on Software Tools for Technology Transfer 17(4), pp. 397–415, doi:10.
1007/s10009-014-0361-y.
[9] Technische Universiteit Eindhoven (2018): mCRL2 Home Page. http://www.mcrl2.org/.
[10] Alessio Ferrari, Giorgio O Spagnolo, Giacomo Martelli & Simone Menabeni (2014): From commercial
documents to system requirements: an approach for the engineering of novel CBTC solutions. International Journal on Software Tools for Technology Transfer, STTT 16(6), pp. 647–667, doi:10.1007/
s10009-013-0298-6.
[11] Hubert Garavel, Frédéric Lang, Radu Mateescu & Wendelin Serwe (2013): CADP 2011: a toolbox
for the construction and analysis of distributed processes. STTT 15(2), pp. 89–107, doi:10.1007/
s10009-012-0244-z.
[12] Hubert Garavel, Frédéric Lang & Wendelin Serwe (2017): From LOTOS to LNT. In: ModelEd, TestEd,
TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday, pp. 3–26, doi:10.1007/
978-3-319-68270-9_1.
[13] Thomas Gibson-Robinson, Philip Armstrong, Alexandre Boulgakov & Andrew W Roscoe (2014): FDR3 A
modern refinement checker for CSP. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Springer, pp. 187–201, doi:10.1007/978-3-642-54862-8_13.
[14] Jan Friso Groote & Mohammad Reza Mousavi (2014): Modeling and analysis of communicating systems.
MIT Press.
[15] Heinrich-Heine-University
(2018):
The
ProB
https://www3.hhu.de/stups/prob/index.php/Main Page.
Animator
and
Model
Checker.
[16] Gerard Holzmann (2003): The Spin Model Checker: Primer and Reference Manual. Addison-Wesley Professional.
F. Mazzanti & A. Ferrari
113
[17] Kurt Jensen & Lars M Kristensen (2009): Coloured Petri nets: modelling and validation of concurrent
systems. Springer Science & Business Media, doi:10.1007/b95112.
[18] Fondazione Bruno Kessler (2018): The nuXmv model checker Home Page. https://nuxmv.fbk.eu/.
[19] Tuomas Kuismin & Keijo Heljanko (2013): Increasing confidence in liveness model checking results with
proofs. In: Haifa Verification Conference, Springer, pp. 32–43, doi:10.1007/978-3-319-03077-7_
3.
[20] ISTI-FMT Laboratory (2018): KandISTI-UMC Home Page. https://fmt.isti.cnr.it/umc.
[21] Leslie Lamport (2002): Specifying Systems. https://lamport.azurewebsites.net/tla/book-02-08-08.pdf.
[22] Radu Mateescu & Damien Thivolle (2008): A model checking language for concurrent value-passing
systems. In: International Symposium on Formal Methods, Springer, pp. 148–164, doi:10.1007/
978-3-540-68237-0_12.
[23] Franco Mazzanti, Alessio Ferrari & Giorgio Oronzo Spagnolo (2014): Experiments in Formal Modelling of a
Deadlock Avoidance Algorithm for a CBTC System. In: International Symposium on Leveraging Applications
of Formal Methods - ISoLA 2016, Volune Part II, LNCS 9953, Springer, pp. 297–314, doi:10.1007/
978-3-319-47169-3_22.
[24] Franco Mazzanti, Alessio Ferrari & Giorgio Oronzo Spagnolo (2018): Towards Formal Methods Diversity
in Railways: an Experience Report with Seven Frameworks. International Journal on Software Tools for
Technology Transfer, STTT 20(3), doi:10.1007/s10009-018-0488-3.
[25] Franco Mazzanti, Giorgio Oronzo Spagnolo, Simone Della Longa & Alessio Ferrari (2014): Deadlock
avoidance in train scheduling: a model checking approach. In: International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2014, LNCS 8718, Springer, pp. 109–123, doi:10.1007/
978-3-319-10702-8_8.
[26] Franco Mazzanti, Giorgio Oronzo Spagnolo & Alessio Ferrari (2014): Designing a deadlock-free train scheduler: A model checking approach. In: NASA Formal Methods Symposium, LNCS 8430, Springer, pp.
264–269, doi:10.1007/978-3-319-06200-6_22.
[27] University of Oxford (2018):
https://www.cs.ox.ac.uk/projects/fdr/.
FDR4
The
CSP
Refinement
Checker
Home
Page.
[28] Marjan Sirjani (2017): Power is Overrated, Go for Friendliness! Expressiveness, Faithfulness and Usability
in Modeling - The Actor Experience. In: Principles of Modeling -Essays dedicated to Edward A. Lee on the
Occasion of his 60th Birtday. Available at http://rebeca-lang.org/assets/papers/2017/
Friendliness.pdf.
[29] spinroot (2018): Verifying Multi-threaded Software with Spin. http://spinroot.com/spin/whatispin.html.
[30] Maurice H Ter Beek, Alessandro Fantechi, Stefania Gnesi & Franco Mazzanti (2011): A state/event-based
model-checking approach for the analysis of abstract system properties. Science of Computer Programming
76(2), pp. 119–135, doi:10.1016/j.scico.2010.07.002.
[31] CPN Tools (2018): CPN Tools Home Page. http://cpntools.org/.
[32] Uppsala University and Aalborg University (2015): UPPAAL Home Page. http://www.uppaal.org/.
[33] Kirsten Winter & Neil J Robinson (2003): Modelling large railway interlockings and model checking small
ones. In: Proceedings of the 26th Australasian computer science conference-Volume 16, Australian Computer
Society, Inc., pp. 309–316.
Appendix A
This appendix includes the sequential models for the different tools (when a textual representation is
available). The all these models, together with the other graphical models for CPN Tools and ProB, can
be retrieved from the MARS repository.
Ten Diverse FMs for an ATS
114
4.1 CADP-LNT
module CADP_ONEWAY8SEQ is
-----------------------------------------------------------------------------type Train_Number is
range 0 .. 7 of nat
end type
-----------------------------------------------------------------------------type Train_Mission is
array [0 .. 6] of nat
end type
-----------------------------------------------------------------------------type Train_Constraint is
array [0 .. 6] of int -- actually, of range -1 .. 1
end type
-----------------------------------------------------------------------------channel Movement is
(Train : Train_Number)
end channel
-----------------------------------------------------------------------------process MAIN [MOVE : Movement, ARRIVED : none] is
var P0, P1, P2, P3, P4, P5, P6, P7 : nat,
RA, RB : int,
LA, LB : int,
T0, T1, T2, T3, T4, T5, T6, T7 : Train_Mission,
A0, A1, A2, A3, A4, A5, A6, A7 : Train_Constraint,
B0, B1, B2, B3, B4, B5, B6, B7 : Train_Constraint
in
P0 := 0;
P1 := 0;
P2 := 0;
P3 := 0;
P4 := 0;
P5 := 0;
P6 := 0;
P7 := 0;
RA := 1;
RB := 1;
LA := 7; -- limit for region A
LB := 7; -- limit for region B
-- ------------ train missions -----------T0 := Train_Mission ( 1, 9,10,13,15,20,23);
T1 := Train_Mission ( 3, 9,10,13,15,20,24);
T2 := Train_Mission ( 5,27,11,13,16,20,25);
T3 := Train_Mission ( 7,27,11,13,16,20,26);
T4 := Train_Mission (23,22,17,18,11, 9, 2);
T5 := Train_Mission (24,22,17,18,11, 9, 4);
T6 := Train_Mission (25,22,17,18,12,27, 6);
T7 := Train_Mission (26,22,17,18,12,27, 8);
-- ------------------------------------------ ----- region A: train constraints -----A0 := Train_Constraint ( 0, 0, 0, 1, 0,-1, 0);
A1 := Train_Constraint ( 0, 0, 0, 1, 0,-1, 0);
F. Mazzanti & A. Ferrari
115
A2
A3
A4
A5
A6
A7
--
:= Train_Constraint ( 0, 0, 1,-1, 0, 1, 0);
:= Train_Constraint ( 0, 0, 1,-1, 0, 0, 0);
:= Train_Constraint ( 0, 1, 0, 0,-1, 0, 0);
:= Train_Constraint ( 0, 1, 0, 0,-1, 0, 0);
:= Train_Constraint ( 0, 0, 0,-1, 0, 0, 0);
:= Train_Constraint ( 0, 1, 0,-1, 0, 0, 0);
-----------------------------------------
-B0
B1
B2
B3
B4
B5
B6
B7
--
----- region B: train constraints -----:= Train_Constraint ( 0, 0, 0, 1, 0,-1, 0);
:= Train_Constraint ( 0, 0, 0, 1, 0,-1, 0);
:= Train_Constraint ( 0, 0, 1,-1, 0, 0, 0);
:= Train_Constraint ( 0, 0, 1,-1, 0, 1, 0);
:= Train_Constraint ( 0, 1, 0, 0,-1, 0, 0);
:= Train_Constraint ( 0, 1, 0, 0,-1, 0, 0);
:= Train_Constraint ( 0, 1, 0,-1, 0, 0, 0);
:= Train_Constraint ( 0, 0, 0,-1, 0, 0, 0);
-----------------------------------------
loop
select
only if
(P0 < 6) and
(T0 [P0+1] != T1 [P1]) and
(T0 [P0+1] != T2 [P2]) and
(T0 [P0+1] != T3 [P3]) and
(T0 [P0+1] != T4 [P4]) and
(T0 [P0+1] != T5 [P5]) and
(T0 [P0+1] != T6 [P6]) and
(T0 [P0+1] != T7 [P7]) and
(RA + A0 [P0+1] <= LA) and
(RB + B0 [P0+1] <= LB)
then
MOVE (0 of Train_Number);
P0 := P0 + 1;
RA := RA + A0 [P0];
RB := RB + B0 [P0]
end if
[]
only if
(P1 < 6) and
(T1 [P1+1] != T0 [P0]) and
(T1 [P1+1] != T2 [P2]) and
(T1 [P1+1] != T3 [P3]) and
(T1 [P1+1] != T4 [P4]) and
(T1 [P1+1] != T5 [P5]) and
(T1 [P1+1] != T6 [P6]) and
(T1 [P1+1] != T7 [P7]) and
(RA + A1 [P1+1] <= LA) and
(RB + B1 [P1+1] <= LB)
then
MOVE (1 of Train_Number);
P1 := P1 + 1;
RA := RA + A1 [P1];
RB := RB + B1 [P1]
end if
[]
only if
(P2 < 6) and
(T2 [P2+1] != T0 [P0]) and
(T2 [P2+1] != T1 [P1]) and
(T2 [P2+1] != T3 [P3]) and
(T2 [P2+1] != T4 [P4]) and
(T2 [P2+1] != T5 [P5]) and
-- next place of train0 not occupied by train1
-- next place of train0 not occupied by train2
-- next place of train0 not occupied by train7
-- progress of train0 does not saturate RA
-- progress of train0 does not saturate RD
Ten Diverse FMs for an ATS
116
(T2 [P2+1] != T6 [P6]) and
(T2 [P2+1] != T7 [P7]) and
(RA + A2 [P2+1] <= LA) and
(RB + B2 [P2+1] <= LB)
then
MOVE (2 of Train_Number);
P2 := P2 + 1;
--if ( P2 == 13 ) then P2 := 0 end if;
RA := RA + A2 [P2];
RB := RB + B2 [P2]
end if
[]
only if
(P3 < 6) and
(T3 [P3+1] != T0 [P0]) and
(T3 [P3+1] != T1 [P1]) and
(T3 [P3+1] != T2 [P2]) and
(T3 [P3+1] != T4 [P4]) and
(T3 [P3+1] != T5 [P5]) and
(T3 [P3+1] != T6 [P6]) and
(T3 [P3+1] != T7 [P7]) and
(RA + A3 [P3+1] <= LA) and
(RB + B3 [P3+1] <= LB)
then
MOVE (3 of Train_Number);
P3 := P3 + 1;
RA := RA + A3 [P3];
RB := RB + B3 [P3]
end if
[]
only if
(P4 < 6) and
(T4 [P4+1] != T0 [P0]) and
(T4 [P4+1] != T1 [P1]) and
(T4 [P4+1] != T2 [P2]) and
(T4 [P4+1] != T3 [P3]) and
(T4 [P4+1] != T5 [P5]) and
(T4 [P4+1] != T6 [P6]) and
(T4 [P4+1] != T7 [P7]) and
(RA + A4 [P4+1] <= LA) and
(RB + B4 [P4+1] <= LB)
then
MOVE (4 of Train_Number);
P4 := P4 + 1;
RA := RA + A4 [P4];
RB := RB + B4 [P4]
end if
[]
only if
(P5 < 6) and
(T5 [P5+1] != T0 [P0]) and
(T5 [P5+1] != T1 [P1]) and
(T5 [P5+1] != T2 [P2]) and
(T5 [P5+1] != T3 [P3]) and
(T5 [P5+1] != T4 [P4]) and
(T5 [P5+1] != T6 [P6]) and
(T5 [P5+1] != T7 [P7]) and
(RA + A5 [P5+1] <= LA) and
(RB + B5 [P5+1] <= LB)
then
MOVE (5 of Train_Number);
P5 := P5 + 1;
RA := RA + A5 [P5];
RB := RB + B5 [P5]
end if
F. Mazzanti & A. Ferrari
[]
only if
(P6 < 6) and
(T6 [P6+1] != T0 [P0]) and
(T6 [P6+1] != T1 [P1]) and
(T6 [P6+1] != T2 [P2]) and
(T6 [P6+1] != T3 [P3]) and
(T6 [P6+1] != T4 [P4]) and
(T6 [P6+1] != T5 [P5]) and
(T6 [P6+1] != T7 [P7]) and
(RA + A6 [P6+1] <= LA) and
(RB + B6 [P6+1] <= LB)
then
MOVE (6 of Train_Number);
P6 := P6 + 1;
RA := RA + A6 [P6];
RB := RB + B6 [P6]
end if
[]
only if
(P7 < 6) and
(T7 [P7+1] != T0 [P0]) and
(T7 [P7+1] != T1 [P1]) and
(T7 [P7+1] != T2 [P2]) and
(T7 [P7+1] != T3 [P3]) and
(T7 [P7+1] != T4 [P4]) and
(T7 [P7+1] != T5 [P5]) and
(T7 [P7+1] != T6 [P6]) and
(RA + A7 [P7+1] <= LA) and
(RB + B7 [P7+1] <= LB)
then
MOVE (7 of Train_Number);
P7 := P7 + 1;
RA := RA + A7 [P7];
RB := RB + B7 [P7]
end if
[]
-- ALL TRAINS RUNNING
only if (P0 == 6) and (P1 == 6) and (P2 == 6) and (P3 == 6) and
(P4 == 6) and (P5 == 6) and (P6 == 6) and (P7 == 6)
then
ARRIVED
end if
end select
end loop
end var
end process
end module
----------------
lnt.open cadp_oneway8.lnt generator x
bcg_info x.bcg
1_636_545 states
7_134_233 transitions
time lnt.open cadp_oneway8small.lnt evaluator4 cadpafarr.mcl
cadpafarr.mcl == mu XXX.(([not ARRIVED] XXX) and (<true> true))
cadpafarr.mcl == [ true* ] < true* . ARRIVED > true
cadpafarr.mcl == [ true* ] < true> true
> TRUE
>
> real 0m29.648s
117
Ten Diverse FMs for an ATS
118
-- > user 0m28.341s
-- > sys 0m1.078s
-- Evaluator4 Memory 78MB
--
4.2 FDR4
M0
M1
M2
M3
M4
M5
M6
M7
=
=
=
=
=
=
=
=
< 1, 9,10,13,15,20,23>
< 3, 9,10,13,15,20,24>
< 5,27,11,13,16,20,25>
< 7,27,11,13,16,20,26>
<23,22,17,18,11, 9, 2>
<24,22,17,18,11, 9, 4>
<25,22,17,18,12,27, 6>
<26,22,17,18,12,27, 8>
------ region A: train constraints -----A0 = < 0, 0, 0, 1, 0,-1, 0> -- G1
A1 = < 0, 0, 0, 1, 0,-1, 0> -- R1
A2 = < 0, 0, 1,-1, 0, 1, 0> -- Y1
A3 = < 0, 0, 1,-1, 0, 0, 0> -- B1
A4 = < 0, 1, 0, 0,-1, 0, 0> -- G2
A5 = < 0, 1, 0, 0,-1, 0, 0> -- R2
A6 = < 0, 0, 0,-1, 0, 0, 0> -- Y2
A7 = < 0, 1, 0,-1, 0, 0, 0> -- B2
------------------------------------------------ region B: train constraints -----= < 0, 0, 0, 1, 0,-1, 0> -- G1
= < 0, 0, 0, 1, 0,-1, 0> -- R1
= < 0, 0, 1,-1, 0, 0, 0> -- Y1
= < 0, 0, 1,-1, 0, 1, 0> -- B1
= < 0, 1, 0, 0,-1, 0, 0> -- G2
= < 0, 1, 0, 0,-1, 0, 0> -- R2
= < 0, 1, 0,-1, 0, 0, 0> -- Y2
= < 0, 0, 0,-1, 0, 0, 0> -- B2
-----------------------------------------LA = 7
LB = 7
B0
B1
B2
B3
B4
B5
B6
B7
el(y,x) = if x==0 then head(y) else el(tail(y),x-1)
--channel move:{1..27}.{1..27}.{ -1..1}.{ -1..1}
channel move
channel arrived
AllTrains (P0, P1, P2, P3, P4, P5, P6, P7, RA, RB) =
(P0 < 6 and
-- train0 has not yet reached all the steps of its mission
el(T0,P0+1) != el(T1,P1) and -- next place of train0 not occupied by train1
el(T0,P0+1) != el(T2,P2) and -- next place of train0 not occupied by train2
el(T0,P0+1) != el(T3,P3) and
el(T0,P0+1) != el(T4,P4) and
el(T0,P0+1) != el(T5,P5) and
el(T0,P0+1) != el(T6,P6) and
el(T0,P0+1) != el(T7,P7) and -- next place of train0 not occupied by train7
RA + el(A0,P0+1) <= LA and -- progress of train0 does not saturate RA
RB + el(B0,P0+1) <= LB
-- progress of train0 does not saturate RB
) &
move -> AllTrains(P0+1,P1,P2,P3,P4,P5,P6,P7,RA+el(A0,P0+1),RB+el(B0,P0+1))
[]
F. Mazzanti & A. Ferrari
(P1 < 6 and
el(T1,P1+1) != el(T0,P0) and
el(T1,P1+1) != el(T2,P2) and
el(T1,P1+1) != el(T3,P3) and
el(T1,P1+1) != el(T4,P4) and
el(T1,P1+1) != el(T5,P5) and
el(T1,P1+1) != el(T6,P6) and
el(T1,P1+1) != el(T7,P7) and
RA + el(A1,P1+1) <= LA and
RB + el(B1,P1+1) <= LB
) &
move -> AllTrains(P0,P1+1,P2,P3,P4,P5,P6,P7,RA+el(A1,P1+1),RB+el(B1,P1+1))
[]
(P2 < 6 and
el(T2,P2+1) != el(T0,P0) and
el(T2,P2+1) != el(T1,P1) and
el(T2,P2+1) != el(T3,P3) and
el(T2,P2+1) != el(T4,P4) and
el(T2,P2+1) != el(T5,P5) and
el(T2,P2+1) != el(T6,P6) and
el(T2,P2+1) != el(T7,P7) and
RA + el(A2,P2+1) <= LA and
RB + el(B2,P2+1) <= LB
) &
move -> AllTrains(P0,P1,P2+1,P3,P4,P5,P6,P7,RA+el(A2,P2+1),RB+el(B2,P2+1))
[]
(P3 < 6 and
el(T3,P3+1) != el(T0,P0) and
el(T3,P3+1) != el(T1,P1) and
el(T3,P3+1) != el(T2,P2) and
el(T3,P3+1) != el(T4,P4) and
el(T3,P3+1) != el(T5,P5) and
el(T3,P3+1) != el(T6,P6) and
el(T3,P3+1) != el(T7,P7) and
RA + el(A3,P3+1) <= LA and
RB + el(B3,P3+1) <= LB
) &
move -> AllTrains(P0,P1,P2,P3+1,P4,P5,P6,P7,RA+el(A3,P3+1),RB+el(B3,P3+1))
[]
(P4 < 6 and
el(T4,P4+1) != el(T0,P0) and
el(T4,P4+1) != el(T1,P1) and
el(T4,P4+1) != el(T2,P2) and
el(T4,P4+1) != el(T3,P3) and
el(T4,P4+1) != el(T5,P5) and
el(T4,P4+1) != el(T6,P6) and
el(T4,P4+1) != el(T7,P7) and
RA + el(A4,P4+1) <= LA and
RB + el(B4,P4+1) <= LB
) &
move -> AllTrains(P0,P1,P2,P3,P4+1,P5,P6,P7,RA+el(A4,P4+1),RB+el(B4,P4+1))
[]
(P5 < 6 and
el(T5,P5+1) != el(T0,P0) and
el(T5,P5+1) != el(T1,P1) and
el(T5,P5+1) != el(T2,P2) and
el(T5,P5+1) != el(T3,P3) and
el(T5,P5+1) != el(T4,P4) and
el(T5,P5+1) != el(T6,P6) and
el(T5,P5+1) != el(T7,P7) and
RA + el(A5,P5+1) <= LA and
RB + el(B5,P5+1) <= LB
) &
move -> AllTrains(P0,P1,P2,P3,P4,P5+1,P6,P7,RA+el(A5,P5+1),RB+el(B5,P5+1))
[]
119
Ten Diverse FMs for an ATS
120
(P6 < 6 and
el(T6,P6+1) != el(T0,P0) and
el(T6,P6+1) != el(T1,P1) and
el(T6,P6+1) != el(T2,P2) and
el(T6,P6+1) != el(T3,P3) and
el(T6,P6+1) != el(T4,P4) and
el(T6,P6+1) != el(T5,P5) and
el(T6,P6+1) != el(T7,P7) and
RA + el(A6,P6+1) <= LA and
RB + el(B6,P6+1) <= LB
) &
move -> AllTrains(P0,P1,P2,P3,P4,P5,P6+1,P7,RA+el(A6,P6+1),RB+el(B6,P6+1))
[]
(P7 < 6 and
el(T7,P7+1) != el(T0,P0) and
el(T7,P7+1) != el(T1,P1) and
el(T7,P7+1) != el(T2,P2) and
el(T7,P7+1) != el(T3,P3) and
el(T7,P7+1) != el(T4,P4) and
el(T7,P7+1) != el(T5,P5) and
el(T7,P7+1) != el(T6,P6) and
RA + el(A7,P7+1) <= LA and
RB + el(B7,P7+1) <= LB
) &
move -> AllTrains(P0,P1,P2,P3,P4,P5,P6,P7+1,RA+el(A7,P7+1),RB+el(B7,P7+1))
[]
((P0 == 6) and (P1 ==6) and (P2 ==6) and (P3 ==6) and
(P4 ==6) and (P5 ==6) and (P6 ==6) and (P7 ==6)
) &
arrived -> STOP
-------------------------ASYS = AllTrains(0,0,0,0,0,0,0,0, 1,1)\{move}
--------------------------- compression is helpful for two verifications/visualization
-- NSYS = normal(ASYS)
-- assert SPEC [FD= NSYS
--------------------------
-------------------------SPEC = arrived -> STOP
-------------------------assert SPEC [FD= ASYS
-- -------- verfication process : ---------------- time refines --refinement-storage-file-path swapdir fdr4_oneway8seq.txt
--
5
mCRL2
%-------------------------------------------------------------% T0 := [ 1, 9,10,13,15,20,23,22]; -- G1
% T1 := [ 3, 9,10,13,15,20,24,22]; -- R1
% T2 := [ 5,27,11,13,16,20,25,22]; -- Y1
% T3 := [ 7,27,11,13,16,20,26,22]; -- B1
% T4 := [23,22,17,18,11, 9, 2, 1]; -- G2
% T5 := [24,22,17,18,11, 9, 4, 3]; -- R2
F. Mazzanti & A. Ferrari
121
% T6 := [25,22,17,18,12,27, 6, 5]; -- Y2
% T7 := [26,22,17,18,12,27, 8, 7]; -- B2
%-------------------------------------------------------------map T0: Nat -> Nat;
eqn T0(0)= 1; T0(1)= 9; T0(2)=10; T0( 3)=13; T0( 4)=15; T0( 5)=20; T0( 6)=23;
map T1: Nat -> Nat;
eqn T1(0)= 3; T1(1)=9;
T1(2)=10; T1( 3)=13; T1( 4)=15; T1( 5)=20; T1( 6)=24;
map T2: Nat -> Nat;
eqn T2(0)= 5; T2(1)=27; T2(2)=11; T2( 3)=13; T2( 4)=16; T2( 5)=20; T2( 6)=25;
map T3: Nat -> Nat;
eqn T3(0)= 7; T3(1)=27; T3(2)=11; T3( 3)=13; T3( 4)=16; T3( 5)=20; T3( 6)=26;
map T4: Nat -> Nat;
eqn T4(0)=23; T4(1)=22; T4(2)=17; T4( 3)=18; T4( 4)=11; T4( 5)= 9; T4( 6)= 2;
map T5: Nat -> Nat;
eqn T5(0)=24; T5(1)=22; T5(2)=17; T5( 3)=18; T5( 4)=11; T5( 5)=9;
T5( 6)= 4;
map T6: Nat -> Nat;
eqn T6(0)=25; T6(1)=22; T6(2)=17; T6(3)=18; T6(4)=12; T6(5)=27; T6(6)=6;
T6(7)= 5; T6(8)=27; T6(9)=11; T6(10)=13; T6(11)=16; T6(12)=20; T6(13)=25;
map T7: Nat -> Nat;
eqn T7(0)=26; T7(1)=22; T7(2)=17; T7( 3)=18; T7( 4)=12; T7( 5)=27; T7( 6)= 8;
% ------ region A: train constraints -----%
0 1 2 3 4 5 6
% A0 := [ 0, 0, 0, 1, 0,-1, 0]; -- G1
% A1 := [ 0, 0, 0, 1, 0,-1, 0]; -- R1
% A2 := [ 0, 0, 1,-1, 0, 1, 0]; -- Y1
% A3 := [ 0, 0, 1,-1, 0, 0, 0]; -- B1
% A4 := [ 0, 1, 0, 0,-1, 0, 0]; -- G2
% A5 := [ 0, 1, 0, 0,-1, 0, 0]; -- R2
% A6 := [ 0, 0, 0,-1, 0, 0, 0]; -- Y2
% A7 := [ 0, 1, 0,-1, 0, 0, 0]; -- B2
% -----------------------------------------map LA: Nat; % limit for region A
eqn LA = 7;
map A0: Nat -> Int;
eqn A0(0)=0; A0(1)=0; A0(2)=0; A0( 3)= 1; A0( 4)=0; A0( 5)=-1; A0( 6)=0;
map A1: Nat -> Int;
eqn A1(0)=0; A1(1)=0; A1(2)=0; A1( 3)= 1; A1( 4)=0; A1( 5)=-1; A1( 6)=0;
map A2: Nat -> Int;
eqn A2(0)=0; A2(1)=0; A2(2)= 1; A2( 3)=-1; A2( 4)=0; A2( 5)= 1; A2( 6)=0;
map A3: Nat -> Int;
eqn A3(0)=0; A3(1)=0; A3(2)= 1; A3( 3)=-1; A3( 4)=0; A3( 5)= 0; A3( 6)=0;
map A4: Nat -> Int;
eqn A4(0)=0; A4(1)=1; A4(2)=0; A4( 3)=0; A4( 4)=-1; A4( 5)= 0; A4( 6)=0;
map A5: Nat -> Int;
eqn A5(0)=0; A5(1)=1; A5(2)=0; A5( 3)=0; A5( 4)=-1; A5( 5)= 0; A5( 6)=0;
map A6: Nat -> Int;
eqn A6(0)=0; A6(1)=0; A6(2)=0; A6( 3)=-1; A6( 4)=0; A6( 5)= 0; A6( 6)=0;
map A7: Nat -> Int;
Ten Diverse FMs for an ATS
122
eqn A7(0)=0; A7(1)=1; A7(2)=0; A7( 3)=-1; A7( 4)=0; A7( 5)= 0; A7( 6)=0;
% ------- region B: train constraints -----%
0 1 2 3 4 5 6
% B0 := [ 0, 0, 0, 1, 0,-1, 0]; -- G1
% B1 := [ 0, 0, 0, 1, 0,-1, 0]; -- R1
% B2 := [ 0, 0, 1,-1, 0, 0, 0]; -- Y1
% B3 := [ 0, 0, 1,-1, 0, 1, 0]; -- B1
% B4 := [ 0, 1, 0, 0,-1, 0, 0]; -- G2
% B5 := [ 0, 1, 0, 0,-1, 0, 0]; -- R2
% B6 := [ 0, 1, 0,-1, 0, 0, 0]; -- Y2
% B7 := [ 0, 0, 0,-1, 0, 0, 0]; -- B2
% -----------------------------------------map LB: Nat; % limit for region B
eqn LB = 7;
map B0: Nat -> Int;
eqn B0(0)=0; B0(1)=0; B0(2)=0; B0( 3)= 1; B0( 4)=0; B0( 5)=-1; B0( 6)=0;
map B1: Nat -> Int;
eqn B1(0)=0; B1(1)=0; B1(2)=0; B1( 3)= 1; B1( 4)=0; B1( 5)=-1; B1( 6)=0;
map B2: Nat -> Int;
eqn B2(0)=0; B2(1)=0; B2(2)= 1; B2( 3)=-1; B2( 4)=0; B2( 5)= 0; B2( 6)=0;
map B3: Nat -> Int;
eqn B3(0)=0; B3(1)=0; B3(2)= 1; B3( 3)=-1; B3( 4)=0; B3( 5)= 1; B3( 6)=0;
map B4: Nat -> Int;
eqn B4(0)=0; B4(1)=1; B4(2)=0; B4( 3)=-0; B4( 4)=-1; B4( 5)= 0; B4( 6)=0;
map B5: Nat -> Int;
eqn B5(0)=0; B5(1)=1; B5(2)=0; B5( 3)=0; B5( 4)=-1; B5( 5)= 0; B5( 6)=0;
map B6: Nat -> Int;
eqn B6(0)=0; B6(1)=1; B6(2)=0; B6( 3)=-1; B6( 4)=0; B6( 5)= 0; B6( 6)=0;
map B7: Nat -> Int;
eqn B7(0)=0; B7(1)=0; B7(2)=0; B7( 3)=-1; B7( 4)=0; B7( 5)= 0; B7( 6)=0;
act
arrived;
move: Nat;
proc AllTrains(
P0:Nat,P1:Nat,P2:Nat,P3:Nat,P4:Nat,P5:Nat,P6:Nat,P7:Nat,RA: Int,RB: Int) =
(P0 < 6 &&
% train0 has not yet reached all the steps of its mission
T0(P0+1) != T1(P1) && % next place of train0 not occupied by train1
T0(P0+1) != T2(P2) && % next place of train0 not occupied by train2
T0(P0+1) != T3(P3) &&
T0(P0+1) != T4(P4) &&
T0(P0+1) != T5(P5) &&
T0(P0+1) != T6(P6) &&
T0(P0+1) != T7(P7) && % next place of train0 not occupied by train7
RA + A0(P0+1) <= LA && % progress of train0 does not saturate RA
RB + B0(P0+1) <= LB
% progress of train0 does not saturate RB
) ->
move(0). AllTrains(P0+1,P1,P2,P3,P4,P5,P6,P7,RA+A0(P0+1),RB+B0(P0+1))
+
(P1 < 6 &&
T1(P1+1) != T0(P0) &&
T1(P1+1) != T2(P2) &&
T1(P1+1) != T3(P3) &&
T1(P1+1) != T4(P4) &&
T1(P1+1) != T5(P5) &&
T1(P1+1) != T6(P6) &&
F. Mazzanti & A. Ferrari
T1(P1+1) != T7(P7) &&
RA + A1(P1+1) <= LA &&
RB + B1(P1+1) <= LB
) ->
move(1). AllTrains(P0,P1+1,P2,P3,P4,P5,P6,P7,RA+A1(P1+1),RB+B1(P1+1))
+
(P2 < 6 &&
T2(P2+1) != T0(P0) &&
T2(P2+1) != T1(P1) &&
T2(P2+1) != T3(P3) &&
T2(P2+1) != T4(P4) &&
T2(P2+1) != T5(P5) &&
T2(P2+1) != T6(P6) &&
T2(P2+1) != T7(P7) &&
RA + A2(P2+1) <= LA &&
RB + B2(P2+1) <= LB
) ->
move(2). AllTrains(P0,P1,P2+1,P3,P4,P5,P6,P7,RA+A2(P2+1),RB+B2(P2+1))
+
(P3 < 6 &&
T3(P3+1) != T0(P0) &&
T3(P3+1) != T1(P1) &&
T3(P3+1) != T2(P2) &&
T3(P3+1) != T4(P4) &&
T3(P3+1) != T5(P5) &&
T3(P3+1) != T6(P6) &&
T3(P3+1) != T7(P7) &&
RA + A3(P3+1) <= LA &&
RB + B3(P3+1) <= LB
) ->
move(3). AllTrains(P0,P1,P2,P3+1,P4,P5,P6,P7,RA+A3(P3+1),RB+B3(P3+1))
+
(P4 < 6 &&
T4(P4+1) != T0(P0) &&
T4(P4+1) != T1(P1) &&
T4(P4+1) != T2(P2) &&
T4(P4+1) != T3(P3) &&
T4(P4+1) != T5(P5) &&
T4(P4+1) != T6(P6) &&
T4(P4+1) != T7(P7) &&
RA + A4(P4+1) <= LA &&
RB + B4(P4+1) <= LB
) ->
move(4). AllTrains(P0,P1,P2,P3,P4+1,P5,P6,P7,RA+A4(P4+1),RB+B4(P4+1))
+
(P5 < 6 &&
T5(P5+1) != T0(P0) &&
T5(P5+1) != T1(P1) &&
T5(P5+1) != T2(P2) &&
T5(P5+1) != T3(P3) &&
T5(P5+1) != T4(P4) &&
T5(P5+1) != T6(P6) &&
T5(P5+1) != T7(P7) &&
RA + A5(P5+1) <= LA &&
RB + B5(P5+1) <= LB
) ->
move(5). AllTrains(P0,P1,P2,P3,P4,P5+1,P6,P7,RA+A5(P5+1),RB+B5(P5+1))
+
(P6 < 6 &&
T6(P6+1) != T0(P0) &&
T6(P6+1) != T1(P1) &&
T6(P6+1) != T2(P2) &&
T6(P6+1) != T3(P3) &&
T6(P6+1) != T4(P4) &&
T6(P6+1) != T5(P5) &&
123
Ten Diverse FMs for an ATS
124
T6(P6+1) != T7(P7) &&
RA + A6(P6+1) <= LA &&
RB + B6(P6+1) <= LB
) ->
move(6). AllTrains(P0,P1,P2,P3,P4,P5,P6+1,P7,RA+A6(P6+1),RB+B6(P6+1))
+
(P7 < 6 &&
T7(P7+1) != T0(P0) &&
T7(P7+1) != T1(P1) &&
T7(P7+1) != T2(P2) &&
T7(P7+1) != T3(P3) &&
T7(P7+1) != T4(P4) &&
T7(P7+1) != T5(P5) &&
T7(P7+1) != T6(P6) &&
RA + A7(P7+1) <= LA &&
RB + B7(P7+1) <= LB
) ->
move(7). AllTrains(P0,P1,P2,P3,P4,P5,P6,P7+1,RA+A7(P7+1),RB+B7(P7+1))
+
((P0 ==6) && (P1 ==6) && (P2 ==6) && (P3 ==6) &&
(P4 ==6) && (P5 ==6) && (P6 ==6) && (P7 ==6)) ->
arrived . AllTrains(P0,P1,P2,P3,P4,P5,P6,P7,RA,RB);
init
AllTrains(0,0,0,0,0,0,0,0, 1,1);
%%%%%%%%%%% verfication process : %%%%%%%%%%%%%%%%%
%
% mcrl22lps mcrl2_oneway8seq.txt temp.lps
% lps2pbes -fformula.mcf temp.lps temp.pbes
%
formula.mcf= "mu X.(([!arrived]X) && (<true> true))" == AF {arrived}
% time pbes2bool -s2 -vrjittyc temp.pbes
% > real 1m53.996s
% > user 1m52.243s
% > sys
0m1.583s
% > USED VIRTUAL MEMORY 1.06 GB
%
% time pbes2bool -s2 temp.pbes
% > real 19m47.753s
%
% lps2lts -rjittyc --verbose temp.lps temp.lts
% ltsinfo temp.lts
% > state space stats: (49 levels, 1_636_545 states and 7_134_233 transitions)
% >
% >
%
% formula.mcf= "mu X.(([!arrived]X) && (<true> true))" == AF {arrived}
% formula.mcf= "[ true* ] < true* . ARRIVED > true"
== AG EF {arrived}
% pbes2bool -c print evidence on validity of formula, nedded by lpsxsim for
%
% lps2lts --verbose âĂŞrjittyc âĂŞcached -D -F temp.lps temp.lts
%
( -sdepth -sBreadth --suppress --todo=maxnum --no-info
%
% the generation of counter-examples
% pbes2bool -zb
breadth-first
% pbes2bool -zd
depth-first
% pbes2bool --todo -strategy
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
F. Mazzanti & A. Ferrari
6
125
ProB
/* https://www3.hhu.de/stups/prob/index.php/Summary_of_B_Syntax */
MACHINE Oneway
DEFINITIONS
SET_PREF_MAXINT == 1;
SET_PREF_MININT == 0
CONSTANTS
T0,T1,T2,T3,T4,T5,T6,T7,
A0,A1,A2,A3,A4,A5,A6,A7,
B0,B1,B2,B3,B4,B5,B6,B7,
LA,LB
PROPERTIES
/*
------- train missions -------------T0: int[] := [ 1, 9,10,13,15,20,23]; -T1: int[] := [ 3, 9,10,13,15,20,24]; -T2: int[] := [ 5,27,11,13,16,20,25]; -T3: int[] := [ 7,27,11,13,16,20,26]; -T4: int[] := [23,22,17,18,11, 9, 2]; -T5: int[] := [24,22,17,18,11, 9, 4]; -T6: int[] := [25,22,17,18,12,27, 6]; -T7: int[] := [26,22,17,18,12,27, 8]; --
G1
R1
Y1
B1
G2
R2
Y2
B2
------ region A: train constraints -----A0: int[] := [ 0, 0, 0, 1, 0,-1, 0]; -- G1
A1: int[] := [ 0, 0, 0, 1, 0,-1, 0]; -- R1
A2: int[] := [ 0, 0, 1,-1, 0, 1, 0]; -- Y1
A3: int[] := [ 0, 0, 1,-1, 0, 0, 0]; -- B1
A4: int[] := [ 0, 1, 0, 0,-1, 0, 0]; -- G2
A5: int[] := [ 0, 1, 0, 0,-1, 0, 0]; -- R2
A6: int[] := [ 0, 0, 0,-1, 0, 0, 0]; -- Y2
A7: int[] := [ 0, 1, 0,-1, 0, 0, 0]; -- B2
------- region B: train constraints -----B0: int[] := [ 0, 0, 0, 1, 0,-1, 0]; -- G1
B1: int[] := [ 0, 0, 0, 1, 0,-1, 0]; -- R1
B2: int[] := [ 0, 0, 1,-1, 0, 0, 0]; -- Y1
B3: int[] := [ 0, 0, 1,-1, 0, 1, 0]; -- B1
B4: int[] := [ 0, 1, 0, 0,-1, 0, 0]; -- G2
B5: int[] := [ 0, 1, 0, 0,-1, 0, 0]; -- R2
B6: int[] := [ 0, 1, 0,-1, 0, 0, 0]; -- Y2
B7: int[] := [ 0, 0, 0,-1, 0, 0, 0]; -- B2
-----------------------------------------*/
T0
T1
T2
T3
T4
T5
T6
T7
:
:
:
:
:
:
:
:
0..6
0..6
0..6
0..6
0..6
0..6
0..6
0..6
-->
-->
-->
-->
-->
-->
-->
-->
1..27
1..27
1..27
1..27
1..27
1..27
1..27
1..27
&
&
&
&
&
&
&
&
A0
A1
A2
A3
A4
A5
:
:
:
:
:
:
0..6
0..6
0..6
0..6
0..6
0..6
-->
-->
-->
-->
-->
-->
-1..1
-1..1
-1..1
-1..1
-1..1
-1..1
&
&
&
&
&
&
Ten Diverse FMs for an ATS
126
A6 : 0..6 --> -1..1 &
A7 : 0..6 --> -1..1 &
B0
B1
B2
B3
B4
B5
B6
B7
:
:
:
:
:
:
:
:
0..6
0..6
0..6
0..6
0..6
0..6
0..6
0..6
T0(0)= 1
T1(0)= 3
T2(0)= 5
T3(0)= 7
T4(0)=23
T5(0)=24
T6(0)=25
T7(0)=26
-->
-->
-->
-->
-->
-->
-->
-->
&
&
&
&
&
&
&
&
-1..1
-1..1
-1..1
-1..1
-1..1
-1..1
-1..1
-1..1
&
&
&
&
&
&
&
&
T0(1)= 9
T1(1)= 9
T2(1)=27
T3(1)=27
T4(1)=22
T5(1)=22
T6(1)=22
T7(1)=22
&
&
&
&
&
&
&
&
T0(2)=10
T1(2)=10
T2(2)=11
T3(2)=11
T4(2)=17
T5(2)=17
T6(2)=17
T7(2)=17
&
&
&
&
&
&
&
&
T0(3)=13
T1(3)=13
T2(3)=13
T3(3)=13
T4(3)=18
T5(3)=18
T6(3)=18
T7(3)=18
&
&
&
&
&
&
&
&
T0(4)=15
T1(4)=15
T2(4)=16
T3(4)=16
T4(4)=11
T5(4)=11
T6(4)=12
T7(4)=12
&
&
&
&
&
&
&
&
T0(5)=20
T1(5)=20
T2(5)=20
T3(5)=20
T4(5)= 9
T5(5)= 9
T6(5)=27
T7(5)=27
&
&
&
&
&
&
&
&
T0(6)=23 &
T1(6)=24 &
T2(6)=25 &
T3(6)=26 &
T4(6)=2 &
T5(6)=4 &
T6(6)=6 &
T7(6)=8 &
A0(0)=0
A1(0)=0
A2(0)=0
A3(0)=0
A4(0)=0
A5(0)=0
A6(0)=0
A7(0)=0
&
&
&
&
&
&
&
&
A0(1)=0
A1(1)=0
A2(1)=0
A3(1)=0
A4(1)=1
A5(1)=1
A6(1)=0
A7(1)=1
&
&
&
&
&
&
&
&
A0(2)=0
A1(2)=0
A2(2)=1
A3(2)=1
A4(2)=0
A5(2)=0
A6(2)=0
A7(2)=0
&
&
&
&
&
&
&
&
A0(3)= 1
A1(3)= 1
A2(3)=-1
A3(3)=-1
A4(3)= 0
A5(3)= 0
A6(3)=-1
A7(3)=-1
&
&
&
&
&
&
&
&
A0(4)= 0
A1(4)= 0
A2(4)= 0
A3(4)= 0
A4(4)=-1
A5(4)=-1
A6(4)= 0
A7(4)= 0
&
&
&
&
&
&
&
&
A0(5)=-1
A1(5)=-1
A2(5)= 1
A3(5)= 0
A4(5)= 0
A5(5)= 0
A6(5)= 0
A7(5)= 0
&
&
&
&
&
&
&
&
A0(
A1(
A2(
A3(
A4(
A5(
A6(
A7(
6)=0
6)=0
6)=0
6)=0
6)=0
6)=0
6)=0
6)=0
&
&
&
&
&
&
&
&
B0(0)=0
B1(0)=0
B2(0)=0
B3(0)=0
B4(0)=0
B5(0)=0
B6(0)=0
B7(0)=0
&
&
&
&
&
&
&
&
B0(1)=0
B1(1)=0
B2(1)=0
B3(1)=0
B4(1)=1
B5(1)=1
B6(1)=1
B7(1)=0
&
&
&
&
&
&
&
&
B0(2)=0
B1(2)=0
B2(2)=1
B3(2)=1
B4(2)=0
B5(2)=0
B6(2)=0
B7(2)=0
&
&
&
&
&
&
&
&
B0(3)= 1
B1(3)= 1
B2(3)=-1
B3(3)=-1
B4(3)=-0
B5(3)= 0
B6(3)=-1
B7(3)=-1
&
&
&
&
&
&
&
&
B0(4)= 0
B1(4)= 0
B2(4)= 0
B3(4)= 0
B4(4)=-1
B5(4)=-1
B6(4)= 0
B7(4)= 0
&
&
&
&
&
&
&
&
B0(5)=-1
B1(5)=-1
B2(5)= 0
B3(5)= 1
B4(5)= 0
B5(5)= 0
B6(5)= 0
B7(5)= 0
&
&
&
&
&
&
&
&
B0(
B1(
B2(
B3(
B4(
B5(
B6(
B7(
6)=0
6)=0
6)=0
6)=0
6)=0
6)=0
6)=0
6)=0
&
&
&
&
&
&
&
&
LA=7 & LB=7
VARIABLES
P0,P1,P2,P3,P4,P5,P6,P7,RA,RB
INVARIANT
P0:0..6 & P1:0..6 & P2:0..6 & P3:0..6 & P4:0..6 & P5:0..6 & P6:0..6 & P7:0..6 &
RA:0..8 & RB:0..8
INITIALISATION
P0:=0; P1:=0; P2:=0; P3:=0; P4:=0; P5:=0; P6:=0; P7:=0; RA:=1; RB:=1
OPERATIONS
move0 =
PRE P0<6 &
T0(P0+1) /= T1(P1) &
T0(P0+1) /= T2(P2 )&
T0(P0+1) /= T3(P3 )&
T0(P0+1) /= T4(P4) &
T0(P0+1) /= T5(P5) &
T0(P0+1) /= T6(P6) &
T0(P0+1) /= T7(P7) &
RA + A0(P0+1) <= LA &
RB + B0(P0+1) <= LB
THEN
P0 := P0+1;
F. Mazzanti & A. Ferrari
RA := RA + A0(P0);
RB := RB + B0(P0)
END ;
move1 =
PRE P1<6 &
T1(P1+1) /= T0(P0) &
T1(P1+1) /= T2(P2) &
T1(P1+1) /= T3(P3) &
T1(P1+1) /= T4(P4) &
T1(P1+1) /= T5(P5) &
T1(P1+1) /= T6(P6) &
T1(P1+1) /= T7(P7) &
RA + A1(P1+1) <= LA &
RB + B1(P1+1) <= LB
THEN
P1 := P1+1;
RA := RA + A1(P1);
RB := RB + B1(P1)
END ;
move2 =
PRE P2<6 &
T2(P2+1) /= T0(P0) &
T2(P2+1) /= T1(P1) &
T2(P2+1) /= T3(P3) &
T2(P2+1) /= T4(P4) &
T2(P2+1) /= T5(P5) &
T2(P2+1) /= T6(P6) &
T2(P2+1) /= T7(P7) &
RA + A2(P2+1) <= LA &
RB + B2(P2+1) <= LB
THEN
P2 := P2+1;
RA := RA + A2(P2);
RB := RB + B2(P2)
END ;
move3 =
PRE P3<6 &
T3(P3+1) /= T0(P0) &
T3(P3+1) /= T1(P1) &
T3(P3+1) /= T2(P2) &
T3(P3+1) /= T4(P4) &
T3(P3+1) /= T5(P5) &
T3(P3+1) /= T6(P6) &
T3(P3+1) /= T7(P7) &
RA + A3(P3+1) <= LA &
RB + B3(P3+1) <= LB
THEN
P3 := P3+1;
RA := RA + A3(P3);
RB := RB + B3(P3)
END ;
move4 =
PRE P4<6 &
T4(P4+1) /= T0(P0) &
T4(P4+1) /= T1(P1) &
T4(P4+1) /= T2(P2) &
T4(P4+1) /= T3(P3) &
T4(P4+1) /= T5(P5) &
T4(P4+1) /= T6(P6) &
T4(P4+1) /= T7(P7) &
RA + A4(P4+1) <= LA &
127
Ten Diverse FMs for an ATS
128
RB + B4(P4+1) <= LB
THEN
P4 := P4+1;
RA := RA + A4(P4);
RB := RB + B4(P4)
END ;
move5 =
PRE P5<6 &
T5(P5+1) /= T0(P0) &
T5(P5+1) /= T1(P1) &
T5(P5+1) /= T2(P2) &
T5(P5+1) /= T3(P3) &
T5(P5+1) /= T4(P4) &
T5(P5+1) /= T6(P6) &
T5(P5+1) /= T7(P7) &
RA + A5(P5+1) <= LA &
RB + B5(P5+1) <= LB
THEN
P5 := P5+1;
RA := RA + A5(P5);
RB := RB + B5(P5)
END ;
move6 =
PRE P6<6 &
T6(P6+1) /= T0(P0) &
T6(P6+1) /= T1(P1) &
T6(P6+1) /= T2(P2) &
T6(P6+1) /= T3(P3) &
T6(P6+1) /= T4(P4) &
T6(P6+1) /= T5(P5) &
T6(P6+1) /= T7(P7) &
RA + A6(P6+1) <= LA &
RB + B6(P6+1) <= LB
THEN
P6 := P6+1;
RA := RA + A6(P6);
RB := RB + B6(P6)
END ;
move7 =
PRE P7<6 &
T7(P7+1) /= T0(P0) &
T7(P7+1) /= T1(P1) &
T7(P7+1) /= T2(P2) &
T7(P7+1) /= T3(P3) &
T7(P7+1) /= T4(P4) &
T7(P7+1) /= T5(P5) &
T7(P7+1) /= T6(P6) &
RA + A7(P7+1) <= LA &
RB + B7(P7+1) <= LB
THEN
P7 := P7+1;
RA := RA + A7(P7);
RB := RB + B7(P7)
END ;
arrived =
PRE
P0=6 & P1=6 & P2=6 & P3=6 & P4=6 & P5=6 & P6=6 & P7=6
THEN
skip
END
END
F. Mazzanti & A. Ferrari
//-------------------// SEARCHING DEADLOCKS:
//-------------------
7
129
1_636_547 states,
7_134_235 trans.
TIME
NuSMV/nuXmv
MODULE main
------- train missions -----------------DEFINE
T0 := [ 1, 9,10,13,15,20,23]; -- G1
T1 := [ 3, 9,10,13,15,20,24]; -- R1
T2 := [ 5,27,11,13,16,20,25]; -- Y1
T3 := [ 7,27,11,13,16,20,26]; -- B1
T4 := [23,22,17,18,11, 9, 2]; -- G2
T5 := [24,22,17,18,11, 9, 4]; -- R2
T6 := [25,22,17,18,12,27, 6]; -- Y2
T7 := [26,22,17,18,12,27, 8]; -- B2
------ region A: train constraints -----A0 := [ 0, 0, 0, 1, 0,-1, 0]; -- G1
A1 := [ 0, 0, 0, 1, 0,-1, 0]; -- R1
A2 := [ 0, 0, 1,-1, 0, 1, 0]; -- Y1
A3 := [ 0, 0, 1,-1, 0, 0, 0]; -- B1
A4 := [ 0, 1, 0, 0,-1, 0, 0]; -- G2
A5 := [ 0, 1, 0, 0,-1, 0, 0]; -- R2
A6 := [ 0, 0, 0,-1, 0, 0, 0]; -- Y2
A7 := [ 0, 1, 0,-1, 0, 0, 0]; -- B2
------------------------------------------
B0
B1
B2
B3
B4
B5
B6
B7
------- region B: train constraints -----:= [ 0, 0, 0, 1, 0,-1, 0]; -- G1
:= [ 0, 0, 0, 1, 0,-1, 0]; -- R1
:= [ 0, 0, 1,-1, 0, 0, 0]; -- Y1
:= [ 0, 0, 1,-1, 0, 1, 0]; -- B1
:= [ 0, 1, 0, 0,-1, 0, 0]; -- G2
:= [ 0, 1, 0, 0,-1, 0, 0]; -- R2
:= [ 0, 1, 0,-1, 0, 0, 0]; -- Y2
:= [ 0, 0, 0,-1, 0, 0, 0]; -- B2
------------------------------------------
LA := 7;
LB := 7;
IVAR
-- (unfair) selector of the train transition
RUNNING: {0,1,2,3,4,5,6,7};
VAR
-- vector of train progesses in the execution of their missions
P0: 0..6;
P1: 0..6;
P2: 0..6;
P3: 0..6;
P4: 0..6;
P5: 0..6;
P6: 0..6;
P7: 0..6;
---- the occupation status for regions A and B
32 min
VMEM
3 GB
Ten Diverse FMs for an ATS
130
RA:
RB:
0..8;
0..8;
ASSIGN
-- the initial vector of train progesses
init(P0) := 0;
init(P1) := 0;
init(P2) := 0;
init(P3) := 0;
init(P4) := 0;
init(P5) := 0;
init(P6) := 0;
init(P7) := 0;
--- the initial occupation status for regions A and B
init(RA) := 1;
init(RB) := 1;
TRANS
-- progression rules for the evolving train 0
RUNNING =0 &
-- the current train has not yet completed its mission
P0 < 6 &
--- the next place is not occupied by other trains
T0[P0+1] != T1[P1] &
T0[P0+1] != T2[P2] &
T0[P0+1] != T3[P3] &
T0[P0+1] != T4[P4] &
T0[P0+1] != T5[P5] &
T0[P0+1] != T6[P6] &
T0[P0+1] != T7[P7] &
--- the progression step of id satisfies all contraints
RA + A0[P0+1] <= LA &
RB + B0[P0+1] <= LB
?
next(P0) in (P0+1) &
next(P1) in P1 &
next(P2) in P2 &
next(P3) in P3 &
next(P4) in P4 &
next(P5) in P5 &
next(P6) in P6 &
next(P7) in P7 &
next(RA) in (RA + A0[P0+1]) &
next(RB) in (RB + B0[P0+1])
:
RUNNING = 1 &
P1 < 6 &
T1[P1+1] != T0[P0] &
T1[P1+1] != T2[P2] &
T1[P1+1] != T3[P3] &
T1[P1+1] != T4[P4] &
T1[P1+1] != T5[P5] &
T1[P1+1] != T6[P6] &
T1[P1+1] != T7[P7] &
RA + A1[P1+1] <= LA &
RB + B1[P1+1] <= LB
?
next(P0) in P0 &
next(P1) in (P1+1) &
next(P2) in P2 &
next(P3) in P3 &
F. Mazzanti & A. Ferrari
next(P4)
next(P5)
next(P6)
next(P7)
next(RA)
next(RB)
in
in
in
in
in
in
131
P4 &
P5 &
P6 &
P7 &
(RA + A1[P1+1]) &
(RB + B1[P1+1])
:
RUNNING =2 &
P2 < 6 &
T2[P2+1] != T0[P0] &
T2[P2+1] != T1[P1] &
T2[P2+1] != T3[P3] &
T2[P2+1] != T4[P4] &
T2[P2+1] != T5[P5] &
T2[P2+1] != T6[P6] &
T2[P2+1] != T7[P7] &
RA + A2[P2+1] <= LA &
RB + B2[P2+1] <= LB
?
next(P0) in P0 &
next(P1) in P1 &
next(P2) in (P2+1) &
next(P3) in P3 &
next(P4) in P4 &
next(P5) in P5 &
next(P6) in P6 &
next(P7) in P7 &
next(RA) in (RA + A2[P2+1]) &
next(RB) in (RB + B2[P2+1])
:
RUNNING =3 &
P3 < 6 &
T3[P3+1] != T0[P0] &
T3[P3+1] != T1[P1] &
T3[P3+1] != T2[P2] &
T3[P3+1] != T3[P3] &
T3[P3+1] != T4[P4] &
T3[P3+1] != T5[P5] &
T3[P3+1] != T6[P6] &
T3[P3+1] != T7[P7] &
RA + A3[P3+1] <= LA &
RB + B3[P3+1] <= LB
?
next(P0) in P0 &
next(P1) in P1 &
next(P2) in P2 &
next(P3) in (P3+1) &
next(P4) in P4 &
next(P5) in P5 &
next(P6) in P6 &
next(P7) in P7 &
next(RA) in (RA + A3[P3+1]) &
next(RB) in (RB + B3[P3+1])
:
RUNNING =4 &
P4 < 6 &
T4[P4+1] !=
T4[P4+1] !=
T4[P4+1] !=
T4[P4+1] !=
T4[P4+1] !=
T4[P4+1] !=
T4[P4+1] !=
T4[P4+1] !=
T0[P0]
T1[P1]
T2[P2]
T3[P3]
T4[P4]
T5[P5]
T6[P6]
T7[P7]
&
&
&
&
&
&
&
&
Ten Diverse FMs for an ATS
132
RA + A4[P4+1] <= LA &
RB + B4[P4+1] <= LB
?
next(P0)
next(P1)
next(P2)
next(P3)
next(P4)
next(P5)
next(P6)
next(P7)
next(RA)
next(RB)
in
in
in
in
in
in
in
in
in
in
P0 &
P1 &
P2 &
P3 &
(P4+1) &
P5 &
P6 &
P7 &
(RA + A4[P4+1]) &
(RB + B4[P4+1])
:
RUNNING =5 &
P5 < 6 &
T5[P5+1] != T0[P0] &
T5[P5+1] != T1[P1] &
T5[P5+1] != T2[P2] &
T5[P5+1] != T3[P3] &
T5[P5+1] != T4[P4] &
T5[P5+1] != T6[P6] &
T5[P5+1] != T7[P7] &
RA + A5[P5+1] <= LA &
RB + B5[P5+1] <= LB
?
next(P0) in P0 &
next(P1) in P1 &
next(P2) in P2 &
next(P3) in P3 &
next(P4) in P4 &
next(P5) in (P5+1) &
next(P6) in P6 &
next(P7) in P7 &
next(RA) in (RA + A5[P5+1]) &
next(RB) in (RB + B5[P5+1])
:
RUNNING = 6 &
P6 < 6 &
T6[P6+1] != T0[P0] &
T6[P6+1] != T1[P1] &
T6[P6+1] != T2[P2] &
T6[P6+1] != T3[P3] &
T6[P6+1] != T4[P4] &
T6[P6+1] != T5[P5] &
T6[P6+1] != T6[P6] &
T6[P6+1] != T7[P7] &
RA + A6[P6+1] <= LA &
RB + B6[P6+1] <= LB
?
next(P0) in P0 &
next(P1) in P1 &
next(P2) in P2 &
next(P3) in P3 &
next(P4) in P4 &
next(P5) in P5 &
next(P6) in (P6+1) &
next(P7) in P7 &
next(RA) in (RA + A6[P6+1]) &
next(RB) in (RB + B6[P6+1])
:
RUNNING =7 &
-- the current train has not yet completed its mission
P7 < 6 &
--
F. Mazzanti & A. Ferrari
133
-- the next place is not occupied by other trains
T7[P7+1] != T0[P0] &
T7[P7+1] != T1[P1] &
T7[P7+1] != T2[P2] &
T7[P7+1] != T3[P3] &
T7[P7+1] != T4[P4] &
T7[P7+1] != T5[P5] &
T7[P7+1] != T6[P6] &
T7[P7+1] != T7[P7] &
--- the progression step of id satisfies all contraints
RA + A7[P7+1] <= LA &
RB + B7[P7+1] <= LB
?
next(P0)
next(P1)
next(P2)
next(P3)
next(P4)
next(P5)
next(P6)
next(P7)
next(RA)
next(RB)
in
in
in
in
in
in
in
in
in
in
P0 &
P1 &
P2 &
P3 &
P4 &
P5 &
P6 &
(P7+1) &
(RA + A7[P7+1]) &
(RB + B7[P7+1])
next(P0)
next(P1)
next(P2)
next(P3)
next(P4)
next(P5)
next(P6)
next(P7)
next(RA)
next(RB)
in
in
in
in
in
in
in
in
in
in
P0
P1
P2
P3
P4
P5
P6
P7
RA
RB
:
---------
FAIRNESS
FAIRNESS
FAIRNESS
FAIRNESS
FAIRNESS
FAIRNESS
FAIRNESS
FAIRNESS
RUNNING
RUNNING
RUNNING
RUNNING
RUNNING
RUNNING
RUNNING
RUNNING
=
=
=
=
=
=
=
=
&
&
&
&
&
&
&
&
&
0;
1;
2;
3;
4;
5;
6;
7;
-- CTLSPEC
-AF ((P0=6) & (P1=6) & (P2=6) & (P3=6) &
-- LTLSPEC
-F ((P0=6) & (P1=6) & (P2=6) & (P3=6) &
CTLSPEC
AG EF ((P0=6) & (P1=6) & (P2=6) & (P3=6) &
(P4=6) & (P5=6) & (P6=6) & (P7=6))
(P4=6) & (P5=6) & (P6=6) & (P7=6))
(P4=6) & (P5=6) & (P6=6) & (P7=6))
-------------------------------- end main ----------------------------------------------------------------------------------------------------------------------------------------------------------------------Batch Verification:
----------------------------------------- time nusmv -r -v 1 smv_oneway8-SM.smv
-FAIRNESS RUNNING = 1; ... RUNNING = 7;
-LTLSPEC
F ((0=6) & ... & P7=6))
-- >
-- > reachable states: 1.63654e+06 (2ˆ20.6422) out of 4.66949e+08 (2ˆ28.7987)
Ten Diverse FMs for an ATS
134
-- > Successful termination
-- > real 0m43.609s
-- > user 0m43.431s
----------------------------------------- time nusmv -r -v 1 smv_oneway8-SM.smv
-FAIRNESS RUNNING = 1; ... RUNNING = 7;
-CTLSPEC
AF ((0=6) & ... & P7=6))
-- >
-- > reachable states: 1.63654e+06 (2ˆ20.6422) out of 4.66949e+08 (2ˆ28.7987)
-- > Successful termination
-- > real 0m39.211s
-- > user 0m39.015s
----------------------------------------- time nusmv -r -v 1 smv_oneway8-SM.smv
-CTLSPEC
AG EF ((0=6) & ... & P7=6))
-- >
-- > reachable states: 1.63654e+06 (2ˆ20.6422) out of 4.66949e+08 (2ˆ28.7987)
-- > Successful termination
-- > real 0m2.807s
-- > user 0m2.771s
-- > USED MEMORY 74 MB
----------------------------------------- nusmv -v 2 -ctt -r -is smv_oneway8-SM.smv
--ctt checks totatlity of transition relation function
--r prints actual number of reachable states
--v 1
verbose (1..4)
--is
ignore SPEC properties
--AG
used ad hoc algorithm for AG-only properties
-- nusmv -v 1 -bmc -bmc_length 100 cyclic8-smv.txt
------------------------------------------Interactive Verification:
-- ./NuSMV -int
-- read_model -i smv_oneway8-SM.smv
-- flatten_hierarchy
-- encode_variables
-- build_model
-- check_ctlspec -p "AF (P0 = 0)"
--------------- other commands ---------check_ctlspec [-h] [-m | -o output-file] [-n number | -p
-- "ctl-expr [IN context]" | -P "name"]
--go
--pick_state -i
--simulate -i
---------------------------------------
8
SPIN
/* TRAIN MISSION DATA */
byte T0[14];
byte T1[14];
byte T2[14];
byte T3[14];
byte T4[14];
byte T5[14];
byte T6[14];
byte T7[14];
/* TRAIN PROGRESS DATA */
byte P0,P1,P2,P3,P4,P5,P6,P7;
/*
CONSTRAINTs DATA
FOR REGIONS A,B
*/
F. Mazzanti & A. Ferrari
135
byte RA; // occupancy of region
byte RB; // occupancy of region
byte LA; // limit of region A
byte LB; // limit if region B
short A0[14]; // Constraints of
short A1[14]; // Constraints of
short A2[14]; // Constraints of
short A3[14]; //
...
short A4[14];
short A5[14];
short A6[14];
short A7[14];
short B0[14]; // Constraints of
short B1[14]; // Constraints of
short B2[14]; // Constraints of
short B3[14]; //
...
short B4[14];
short B5[14];
short B6[14];
short B7[14];
A
B
Train 0 for Region A
Train 1 for Region A
Train 2 for Region A
Train 0 for Region B
Train 1 for Region B
Train 2 for Region B
/* INITIALIZATIONS */
init {
atomic {
//-------------------------------------------------------------// T0 := [ 1, 9,10,13,15,20,23,22]; -- G1
// T1 := [ 3, 9,10,13,15,20,24,22]; -- R1
// T2 := [ 5,27,11,13,16,20,25,22]; -- Y1
// T3 := [ 7,27,11,13,16,20,26,22]; -- B1
// T4 := [23,22,17,18,11, 9, 2, 1]; -- G2
// T5 := [24,22,17,18,11, 9, 4, 3]; -- R2
// T6 := [25,22,17,18,12,27, 6, 5]; -- Y2
// T7 := [26,22,17,18,12,27, 8, 7]; -- B2
//-------------------------------------------------------------T0[0]= 1; T0[1]= 9; T0[2]=10; T0[3]=13; T0[4]=15; T0[5]=20; T0[6]=23;
T1[0]= 3; T1[1]=9; T1[2]=10; T1[3]=13; T1[4]=15; T1[5]=20; T1[6]=24;
T2[0]= 5; T2[1]=27; T2[2]=11; T2[3]=13; T2[4]=16; T2[5]=20; T2[6]=25;
T3[0]= 7; T3[1]=27; T3[2]=11; T3[3]=13; T3[4]=16; T3[5]=20; T3[6]=26;
T4[0]=23; T4[1]=22; T4[2]=17; T4[3]=18; T4[4]=11; T4[5]= 9; T4[6]= 2;
T5[0]=24; T5[1]=22; T5[2]=17; T5[3]=18; T5[4]=11; T5[5]= 9; T5[6]= 4;
T6[0]=25; T6[1]=22; T6[2]=17; T6[3]=18; T6[4]=12; T6[5]=27; T6[6]= 6;
T7[0]=26; T7[1]=22; T7[2]=17; T7[3]=18; T7[4]=12; T7[5]=27; T7[6]= 8;
//
// ------ initial train positions
-------// Pi=0 as default value. no need of explicit initialization
// ------ region A: train
A0[3] = 1; A0[5] = -1;
A1[3] = 1; A1[5] = -1;
A2[2] = 1; A2[3] = -1;
A3[2] = 1; A3[3] = -1;
A4[1] = 1; A4[4] = -1;
A5[1] = 1; A5[4] = -1;
A6[3] =-1; A6[ 9] = 1;
A7[1] = 1; A7[3] = -1;
// ------- region B:
B0[3] = 1; B0[5]
B1[3] = 1; B1[5]
B2[2] = 1; B2[3]
B3[2] = 1; B3[3]
B4[1] = 1; B4[4]
B5[1] = 1; B5[4]
constraints
A0[ 7]= 1;
A1[ 7]= 1;
A2[ 5]= 1;
A3[ 7]= 1;
A4[10]= 1;
A5[10]= 1;
A6[10]= -1;
A7[ 9]= 1;
train
= -1;
= -1;
= -1;
= -1;
= -1;
= -1;
-----A0[10]
A1[10]
A2[ 9]
A3[ 9]
A4[12]
A5[12]
A6[12]
A7[10]
=
=
=
=
=
=
=
=
constraints -----B0[ 7] = 1; B0[10]
B1[ 7] = 1; B1[10]
B2[ 7] = 1; B2[ 9]
B3[ 5] = 1; B3[ 9]
B4[10] = 1; B4[12]
B5[10] = 1; B5[12]
-1;
-1;
-1;
-1;
-1;
-1;
1;
-1;
=
=
=
=
=
=
-1;
-1;
-1;
-1;
-1;
-1;
Ten Diverse FMs for an ATS
136
B6[1] = 1; B6[3] = -1; B6[ 9] = 1; B6[10] = -1;
B7[3] = -1; B7[9] = 1; B7[10] = -1; B7[12] = 1;
RA
RB
LA
LB
= 1;
= 1;
=7;
=7;
}
do
:: atomic {
(P0 < 6 &&
T0[P0+1] != T1[P1]
T0[P0+1] != T2[P2]
T0[P0+1] != T3[P3]
T0[P0+1] != T4[P4]
T0[P0+1] != T5[P5]
T0[P0+1] != T6[P6]
T0[P0+1] != T7[P7]
(RA + A0[P0+1]) <=
(RB + B0[P0+1]) <=
) ->
P0 = (P0+1);
RA = RA + A0[P0];
RB = RB + B0[P0];
};
:: atomic {
(P1 < 6 &&
T1[P1+1] != T0[P0]
T1[P1+1] != T2[P2]
T1[P1+1] != T3[P3]
T1[P1+1] != T4[P4]
T1[P1+1] != T5[P5]
T1[P1+1] != T6[P6]
T1[P1+1] != T7[P7]
(RA + A1[P1+1]) <=
(RB + B1[P1+1]) <=
) ->
P1 = (P1+1);
RA = RA + A1[P1];
RB = RB + B1[P1];
};
:: atomic {
(P2 < 6 &&
T2[P2+1] != T0[P0]
T2[P2+1] != T1[P1]
T2[P2+1] != T3[P3]
T2[P2+1] != T4[P4]
T2[P2+1] != T5[P5]
T2[P2+1] != T6[P6]
T2[P2+1] != T7[P7]
(RA + A2[P2+1]) <=
(RB + B2[P2+1]) <=
) ->
P2 = (P2+1);
RA = RA + A2[P2];
RB = RB + B2[P2];
};
:: atomic {
(P3 < 6 &&
T3[P3+1] != T0[P0]
T3[P3+1] != T1[P1]
T3[P3+1] != T2[P2]
T3[P3+1] != T4[P4]
T3[P3+1] != T5[P5]
T3[P3+1] != T6[P6]
&&
&&
&&
&&
&&
&&
&&
LA
LB
// next place of train0 not occupied by train1
// next place of train0 not occupied by train2
// next place of train0 not occupied by train7
&& // progress of train0 does not saturate RA
// progress of train0 does not saturate RB
// update occupancy of RA according to the step
// update occupancy of RB according to the step
&&
&&
&&
&&
&&
&&
&&
LA &&
LB
// progress of train0 does not saturate RD
&&
&&
&&
&&
&&
&&
&&
LA &&
LB
// update occupancy of RA according to the step
&&
&&
&&
&&
&&
&&
F. Mazzanti & A. Ferrari
::
::
::
::
T3[P3+1] != T7[P7]
(RA + A3[P3+1]) <=
(RB + B3[P3+1]) <=
) ->
P3 = (P3+1);
RA = RA + A3[P3];
RB = RB + B3[P3];
};
atomic {
(P4 < 6 &&
T4[P4+1] != T0[P0]
T4[P4+1] != T1[P1]
T4[P4+1] != T2[P2]
T4[P4+1] != T3[P3]
T4[P4+1] != T5[P5]
T4[P4+1] != T6[P6]
T4[P4+1] != T7[P7]
(RA + A4[P4+1]) <=
(RB + B4[P4+1]) <=
) ->
P4 = (P4+1);
RA = RA + A4[P4];
RB = RB + B4[P4];
};
atomic {
(P5 < 6 &&
T5[P5+1] != T0[P0]
T5[P5+1] != T1[P1]
T5[P5+1] != T2[P2]
T5[P5+1] != T3[P3]
T5[P5+1] != T4[P4]
T5[P5+1] != T6[P6]
T5[P5+1] != T7[P7]
(RA + A5[P5+1]) <=
(RB + B5[P5+1]) <=
) ->
P5 = (P5+1);
RA = RA + A5[P5];
RB = RB + B5[P5];
};
atomic {
(P6 < 6 &&
T6[P6+1] != T0[P0]
T6[P6+1] != T1[P1]
T6[P6+1] != T2[P2]
T6[P6+1] != T3[P3]
T6[P6+1] != T4[P4]
T6[P6+1] != T5[P5]
T6[P6+1] != T7[P7]
(RA + A6[P6+1]) <=
(RB + B6[P6+1]) <=
) ->
P6 = (P6+1);
RA = RA + A6[P6];
RB = RB + B6[P6];
};
atomic {
(P7 < 6 &&
T7[P7+1] != T0[P0]
T7[P7+1] != T1[P1]
T7[P7+1] != T2[P2]
T7[P7+1] != T3[P3]
T7[P7+1] != T4[P4]
T7[P7+1] != T5[P5]
T7[P7+1] != T6[P6]
137
&&
LA &&
LB
// update occupancy of RA according to the step
&&
&&
&&
&&
&&
&&
&&
LA &&
LB
// update occupancy of RA according to the step
&&
&&
&&
&&
&&
&&
&&
LA &&
LB
// update occupancy of RA according to the step
&&
&&
&&
&&
&&
&&
&&
LA &&
LB
// update occupancy of RA according to the step
&&
&&
&&
&&
&&
&&
&&
Ten Diverse FMs for an ATS
138
(RA +
(RB +
) ->
P7 =
RA =
RB =
};
:: (P0 == 6)
(P4 == 6)
od;
A7[P7+1]) <= LA &&
B7[P7+1]) <= LB
(P7+1);
RA + A7[P7];
RB + B7[P7];
// update occupancy of RA according to the step
&& (P1 == 6) && (P2 == 6) && (P3 == 6) &&
&& (P5 == 6) && (P6 == 6) && (P7 == 6) -> skip;
}
/* PROPERTIES */
ltl p1
{ <> ((P0==6) && (P1==6) && (P2==6) && (P3==6) &&
(P4==6) && (P5==6) && (P6==6) && (P7==6)) }
/*
verfication process
// DEPTH FIRST
spin -a spin_oneway8small.pml
gcc -O3 -o pan pan.c
time pan -a
>
> Full statespace search for:
>
never claim
+ (p1)
>
>
1636546 states, stored
>
7134234 transitions
>
> real 0m13.110s
> user 0m12.683s
> sys 0m0.411s
> USED VIRTUAL MEMORY (pan): 1.02 GB
// BREADTH FIRST
spin -a spin_oneway8.pml
gcc -O3 -DBFS -DBFS_DISK -DVECTORSZ=256000 -o pan pan.c
gcc -O3 -DBFS -DVECTORSZ=256000 -o pan pan.c
time pan -m500000 -v -w33
>
> Full statespace search for:
>never claim
+ (p1)
>
>
1636545 states, stored
>
7134237 transitions
>
> real 1m3.582s
> user 0m31.621s
> sys
0m29.806s
*/
/*
other commands
spin -t[N] -- follow [Nth] simulation trail, see also -k
pan -c0 -- counts all errors
pan -c
-- saves in the trail file the info for 3rd error
pan -e -c0 -- saves all errors trails each one in file specI.trail
spin -k specI.trail -c spec.pml -- displays the trail for error I
pan -r trailfilename
--read and execute trail in file
pan -rN
-read and execute N-th error trail
pan -C -- read and execute trail - columnated output (can add -v,-n)
pan -r -PN read and execute trail - restrict trail output to proc N
pan (for help on options)
pan -w32 -v -D (dot format!)
------
F. Mazzanti & A. Ferrari
139
*/
9
TLA+
------------------ MODULE oneway --------------EXTENDS Integers
VARIABLE
P0,P1,P2,P3,P4,P5,P6,P7,RA,RB
vars == <<P0,P1,P2,P3,P4,P5,P6,P7,RA,RB>>
TypesOK
== (P0 \in 0..6)
T0
T1
T2
T3
T4
T5
T6
T7
==
==
==
==
==
==
==
==
<< 1, 9,10,13,15,20,23>>
<< 3, 9,10,13,15,20,24>>
<< 5,27,11,13,16,20,25>>
<< 7,27,11,13,16,20,26>>
<<23,22,17,18,11, 9, 2>>
<<24,22,17,18,11, 9, 4>>
<<25,22,17,18,12,27, 6>>
<<26,22,17,18,12,27, 8>>
A0
A1
A2
A3
A4
A5
A6
A7
==
==
==
==
==
==
==
==
<<
<<
<<
<<
<<
<<
<<
<<
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
1,
1,
0,
1,
0, 1, 0,-1,
0, 1, 0,-1,
1,-1, 0, 1,
1,-1, 0, 0,
0, 0,-1, 0,
0, 0,-1, 0,
0,-1, 0, 0,
0,-1, 0, 0,
0>>
0>>
0>>
0>>
0>>
0>>
0>>
0>>
B0
B1
B2
B3
B4
B5
B6
B7
==
==
==
==
==
==
==
==
<<
<<
<<
<<
<<
<<
<<
<<
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
1,
1,
1,
0,
0, 1, 0,-1,
0, 1, 0,-1,
1,-1, 0, 0,
1,-1, 0, 1,
0, 0,-1, 0,
0, 0,-1, 0,
0,-1, 0, 0,
0,-1, 0, 0,
0>>
0>>
0>>
0>>
0>>
0>>
0>>
0>>
LA == 7
LB == 7
LL == 6
Init==
/\ P0=0 /\ P1=0 /\ P2=0 /\ P3=0 /\ P4=0 /\ P5=0 /\ P6=0 /\ P7=0
/\ RA=1 /\ RB=1
Move0
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P0 < LL
T0[P0+2] /= T1[P1+1]
T0[P0+2] /= T2[P2+1]
T0[P0+2] /= T3[P3+1]
T0[P0+2] /= T4[P4+1]
T0[P0+2] /= T5[P5+1]
T0[P0+2] /= T6[P6+1]
T0[P0+2] /= T7[P7+1]
RA + A0[P0+2] <= LA
RB + B0[P0+2] <= LB
P0’ = (P0+1)
Ten Diverse FMs for an ATS
140
/\ RA’ = RA + A0[P0+2]
/\ RB’ = RB + B0[P0+2]
/\ UNCHANGED <<P1,P2,P3,P4,P5,P6,P7>>
Move1
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P1 < LL
T1[P1+2] /= T0[P0+1]
T1[P1+2] /= T2[P2+1]
T1[P1+2] /= T3[P3+1]
T1[P1+2] /= T4[P4+1]
T1[P1+2] /= T5[P5+1]
T1[P1+2] /= T6[P6+1]
T1[P1+2] /= T7[P7+1]
RA + A1[P1+2] <= LA
RB + B1[P1+2] <= LB
P1’ = (P1+1)
RA’ = RA + A1[P1+2]
RB’ = RB + B1[P1+2]
UNCHANGED <<P0,P2,P3,P4,P5,P6,P7>>
Move2
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P2 < LL
T2[P2+2] /= T0[P0+1]
T2[P2+2] /= T1[P1+1]
T2[P2+2] /= T3[P3+1]
T2[P2+2] /= T4[P4+1]
T2[P2+2] /= T5[P5+1]
T2[P2+2] /= T6[P6+1]
T2[P2+2] /= T7[P7+1]
RA + A2[P2+2] <= LA
RB + B2[P2+2] <= LB
P2’ = (P2+1)
RA’ = RA + A2[P2+2]
RB’ = RB + B2[P2+2]
UNCHANGED <<P0,P1,P3,P4,P5,P6,P7>>
Move3
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P3 < LL
T3[P3+2] /= T0[P0+1]
T3[P3+2] /= T1[P1+1]
T3[P3+2] /= T2[P2+1]
T3[P3+2] /= T4[P4+1]
T3[P3+2] /= T5[P5+1]
T3[P3+2] /= T6[P6+1]
T3[P3+2] /= T7[P7+1]
RA + A3[P3+2] <= LA
RB + B3[P3+2] <= LB
P3’ = (P3+1)
RA’ = RA + A3[P3+2]
RB’ = RB + B3[P3+2]
UNCHANGED <<P0,P1,P2,P4,P5,P6,P7>>
Move4
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P4 < LL
T4[P4+2] /= T0[P0+1]
T4[P4+2] /= T1[P1+1]
T4[P4+2] /= T2[P2+1]
T4[P4+2] /= T3[P3+1]
T4[P4+2] /= T5[P5+1]
T4[P4+2] /= T6[P6+1]
T4[P4+2] /= T7[P7+1]
RA + A4[P4+2] <= LA
F. Mazzanti & A. Ferrari
141
/\
/\
/\
/\
/\
RB + B4[P4+2] <= LB
P4’ = (P4+1)
RA’ = RA + A4[P4+2]
RB’ = RB + B4[P4+2]
UNCHANGED <<P0,P1,P2,P3,P5,P6,P7>>
Move5
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P5 < LL
T5[P5+2] /= T0[P0+1]
T5[P5+2] /= T1[P1+1]
T5[P5+2] /= T2[P2+1]
T5[P5+2] /= T3[P3+1]
T5[P5+2] /= T4[P4+1]
T5[P5+2] /= T6[P6+1]
T5[P5+2] /= T7[P7+1]
RA + A5[P5+2] <= LA
RB + B5[P5+2] <= LB
P5’ = (P5+1)
RA’ = RA + A5[P5+2]
RB’ = RB + B5[P5+2]
UNCHANGED <<P0,P1,P2,P3,P4,P6,P7>>
Move6
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P6 < LL
T6[P6+2] /= T0[P0+1]
T6[P6+2] /= T1[P1+1]
T6[P6+2] /= T2[P2+1]
T6[P6+2] /= T3[P3+1]
T6[P6+2] /= T4[P4+1]
T6[P6+2] /= T5[P5+1]
T6[P6+2] /= T7[P7+1]
RA + A6[P6+2] <= LA
RB + B6[P6+2] <= LB
P6’ = (P6+1)
RA’ = RA + A6[P6+2]
RB’ = RB + B6[P6+2]
UNCHANGED <<P0,P1,P2,P3,P4,P5,P7>>
Move7
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
/\
==
P7 < LL
T7[P7+2] /= T0[P0+1]
T7[P7+2] /= T1[P1+1]
T7[P7+2] /= T2[P2+1]
T7[P7+2] /= T3[P3+1]
T7[P7+2] /= T4[P4+1]
T7[P7+2] /= T5[P5+1]
T7[P7+2] /= T6[P6+1]
RA + A7[P7+2] <= LA
RB + B7[P7+2] <= LB
P7’ = (P7+1)
RA’ = RA + A7[P7+2]
RB’ = RB + B7[P7+2]
UNCHANGED <<P0,P1,P2,P3,P4,P5,P6>>
Next==
\/ Move0 \/
\/ Move4 \/
Move1 \/
Move5 \/
Move2 \/
Move6 \/
Move3
Move7
Arrived ==
/\ (P0=LL) /\ (P1=LL) /\ (P2=LL) /\ (P3=LL)
/\ (P4=LL) /\ (P5=LL) /\ (P6=LL) /\ (P7=LL)
Property == <>Arrived
Ten Diverse FMs for an ATS
142
Spec == Init /\ [][Next]_vars
SFairSpec == Init /\ [][Next]_vars /\ SF_vars (Next)
(*for LTL verification*)
(**************************************************)
(* Property: <>Arrived, Behavior Spec: SFairSpec *)
(* States: 1636545, Result: TRUE, Time 3m17s
*)
(**************************************************)
(* Model Overview: setting Temporal formula == "Spec" *)
(* Deadlock Found: trace for P0=6 & P4=6 *)
(* PROPERTIES: <>Arrivedis FALSE, because of implicit stuttering*)
(* Model Overview: setting Temporal formula == "SFairSpec" *)
(* Deadlock Found: trace for P0=6 & P4=6 (stuttering does not avoids deadlocks)*)
(* PROPERTIES: <>Arrived
is TRUE, stuttering ignored *)
===============================================
10 UMC
Class REGION2 is
Vars:
--------------------------------------------------------------T0: int[] := [ 1, 9,10,13,15,20,23]; -- G1
T1: int[] := [ 3, 9,10,13,15,20,24]; -- R1
T2: int[] := [ 5,27,11,13,16,20,25]; -- Y1
T3: int[] := [ 7,27,11,13,16,20,26]; -- B1
T4: int[] := [23,22,17,18,11, 9, 2]; -- G2
T5: int[] := [24,22,17,18,11, 9, 4]; -- R2
T6: int[] := [25,22,17,18,12,27, 6]; -- Y2
T7: int[] := [26,22,17,18,12,27, 8]; -- B2
---------------------------------------------------------------P0: int :=0;
P1: int :=0;
P2: int :=0;
P3: int :=0;
P4: int :=0;
P5: int :=0;
P6: int :=0;
P7: int :=0;
--------------------------------------------------------------------- region A: train constraints -----A0: int[] := [ 0, 0, 0, 1, 0,-1, 0]; -- G1
A1: int[] := [ 0, 0, 0, 1, 0,-1, 0]; -- R1
A2: int[] := [ 0, 0, 1,-1, 0, 1, 0]; -- Y1
A3: int[] := [ 0, 0, 1,-1, 0, 0, 0]; -- B1
A4: int[] := [ 0, 1, 0, 0,-1, 0, 0]; -- G2
A5: int[] := [ 0, 1, 0, 0,-1, 0, 0]; -- R2
A6: int[] := [ 0, 0, 0,-1, 0, 0, 0]; -- Y2
A7: int[] := [ 0, 1, 0,-1, 0, 0, 0]; -- B2
------------------------------------------------ region
B0: int[] := [
B1: int[] := [
B2: int[] := [
B3: int[] := [
B4: int[] := [
B5: int[] := [
B6: int[] := [
B:
0,
0,
0,
0,
0,
0,
0,
train constraints -----0, 0, 1, 0,-1, 0]; -- G1
0, 0, 1, 0,-1, 0]; -- R1
0, 1,-1, 0, 0, 0]; -- Y1
0, 1,-1, 0, 1, 0]; -- B1
1, 0, 0,-1, 0, 0]; -- G2
1, 0, 0,-1, 0, 0]; -- R2
1, 0,-1, 0, 0, 0]; -- Y2
F. Mazzanti & A. Ferrari
B7: int[] := [ 0, 0, 0,-1, 0, 0, 0]; -- B2
------------------------------------------
------------------------------------------------------------RA: int :=1; -- initial value for region RA
RB: int :=1; -- initial value for region RB
LA: int :=7; -- limit value for region RA
LB: int :=7; -- limit value for region RB
------------------------------------------------------------------State Top =s1
Behavior:
------------------------- train 0 ----------------------------s1 -> s1
{- [P0 < 6 &
T0[P0+1] != T1[P1] &
T0[P0+1] != T2[P2] &
T0[P0+1] != T3[P3] &
T0[P0+1] != T4[P4] &
T0[P0+1] != T5[P5] &
T0[P0+1] != T6[P6] &
T0[P0+1] != T7[P7] &
RA + A0[P0+1] <= LA &
RB + B0[P0+1] <= LB] /
P0 := P0 +1;
RA = RA + A0[P0];
RB = RB + B0[P0];
}
------------------------- train 1 ----------------------------s1 -> s1
{- [P1 < 6 &
T1[P1+1] != T0[P0] &
T1[P1+1] != T2[P2] &
T1[P1+1] != T3[P3] &
T1[P1+1] != T4[P4] &
T1[P1+1] != T5[P5] &
T1[P1+1] != T6[P6] &
T1[P1+1] != T7[P7] &
RA + A1[P1+1] <= LA &
RB + B1[P1+1] <= LB ] /
P1 := P1 +1;
RA = RA + A1[P1];
RB = RB + B1[P1];
}
------------------------- train 2 ----------------------------s1 -> s1
{- [P2 < 6 &
T2[P2+1] != T0[P0] &
T2[P2+1] != T1[P1] &
T2[P2+1] != T3[P3] &
T2[P2+1] != T4[P4] &
T2[P2+1] != T5[P5] &
T2[P2+1] != T6[P6] &
T2[P2+1] != T7[P7] &
RA + A2[P2+1] <= LA &
RB + B2[P2+1] <= LB ] /
P2 := P2 +1;
RA = RA + A2[P2];
RB = RB + B2[P2];
}
143
144
------------------------- train 3 ----------------------------s1 -> s1
{- [P3 < 6 &
T3[P3+1] != T0[P0] &
T3[P3+1] != T1[P1] &
T3[P3+1] != T2[P2] &
T3[P3+1] != T4[P4] &
T3[P3+1] != T5[P5] &
T3[P3+1] != T6[P6] &
T3[P3+1] != T7[P7] &
RA + A3[P3+1] <= LA &
RB + B3[P3+1] <= LB ] /
P3 := P3 +1;
RA = RA + A3[P3];
RB = RB + B3[P3];
}
------------------------- train 4 ----------------------------s1 -> s1
{- [P4 < 6 &
T4[P4+1] != T0[P0] &
T4[P4+1] != T1[P1] &
T4[P4+1] != T2[P2] &
T4[P4+1] != T3[P3] &
T4[P4+1] != T5[P5] &
T4[P4+1] != T6[P6] &
T4[P4+1] != T7[P7] &
RA + A4[P4+1] <= LA &
RB + B4[P4+1] <= LB ] /
P4 := P4 +1;
RA = RA + A4[P4];
RB = RB + B4[P4];
}
------------------------- train 5 ----------------------------s1 -> s1
{- [P5 < 6 &
T5[P5+1] != T0[P0] &
T5[P5+1] != T1[P1] &
T5[P5+1] != T2[P2] &
T5[P5+1] != T3[P3] &
T5[P5+1] != T4[P4] &
T5[P5+1] != T6[P6] &
T5[P5+1] != T7[P7] &
RA + A5[P5+1] <= LA &
RB + B5[P5+1] <= LB] /
P5 := P5 +1;
RA = RA + A5[P5];
RB = RB + B5[P5];
}
------------------------- train 6 ----------------------------s1 -> s1
{- [P6 < 6 &
T6[P6+1] != T0[P0] &
T6[P6+1] != T1[P1] &
T6[P6+1] != T2[P2] &
T6[P6+1] != T3[P3] &
T6[P6+1] != T4[P4] &
T6[P6+1] != T5[P5] &
T6[P6+1] != T7[P7] &
RA + A6[P6+1] <= LA &
RB + B6[P6+1] <= LB ] /
P6 := P6 +1;
Ten Diverse FMs for an ATS
F. Mazzanti & A. Ferrari
RA = RA + A6[P6];
RB = RB + B6[P6];
}
------------------------- train 7 ----------------------------s1 -> s1
{- [P7 < 6 &
T7[P7+1] != T0[P0] &
T7[P7+1] != T1[P1] &
T7[P7+1] != T2[P2] &
T7[P7+1] != T3[P3] &
T7[P7+1] != T4[P4] &
T7[P7+1] != T5[P5] &
T7[P7+1] != T6[P6] &
RA + A7[P7+1] <= LA &
RB + B7[P7+1] <= LB ] /
P7 := P7 +1;
RA = RA + A7[P7];
RB = RB + B7[P7];
}
------------------------- termination ----------------------------s1 -> s1
{- [(P0=6) and (P1=6) and (P2=6) and (P3=6)&
(P4=6) and (P5=6) and (P6=6) and (P7=6)] / ARRIVED}
end REGION2;
Objects:
Count: Token;
SYS: REGION2;
Abstractions {
Action ARRIVED -> ARRIVED
Action Error -> Error
-- State:
-SYS.P0=0 and
-SYS.P1=0 and
-SYS.P2=0 and
-SYS.P3=0 and
-SYS.P4=0 and
-SYS.P5=0 and
-SYS.P6=0 and
-SYS.P7=0 -> Home -- abstract label on final state
}
-- time umc -m3 -100 umc_oneway8.txt AFARR.txt
--- > The Formula: "AF {ARRIVED} true"
-- > is: TRUE
-- > statspace stats: states generated= 1636545 ... evaluation time= 37.538 sec.
--- > real 0m36.980s
-- > user 1m23.800s
-- > sys 0m1.735s
-- USED VIRTUAL MEMORY: 2.98G
--- time mcstats -m3 umc_oneway8.txt
--- AFARR==
"AF {ARRIVED} true"
-------------------------------------------------------------------------------------------------------------------------------------
145
Ten Diverse FMs for an ATS
146
11 UPPAAL
//
//
//
global declarations
//------const int
const int
const int
const int
const int
const int
const int
const int
train
T0[7]
T1[7]
T2[7]
T3[7]
T4[7]
T5[7]
T6[7]
T7[7]
const int LA =7;
const int LB =7;
//------const int
const int
const int
const int
const int
const int
const int
const int
missions -----= { 1, 9,10,13,15,20,23};
= { 3, 9,10,13,15,20,24};
= { 5,27,11,13,16,20,25};
= { 7,27,11,13,16,20,26};
= {23,22,17,18,11, 9, 2};
= {24,22,17,18,11, 9, 4};
= {25,22,17,18,12,27, 6};
= {26,22,17,18,12,27, 8};
// limit value for region RA
// limit value for region RB
region A:
A0[7] = {
A1[7] = {
A2[7] = {
A3[7] = {
A4[7] = {
A5[7] = {
A6[7] = {
A7[7] = {
train
0, 0,
0, 0,
0, 0,
0, 0,
0, 1,
0, 1,
0, 0,
0, 1,
constraints
0, 1, 0,-1,
0, 1, 0,-1,
1,-1, 0, 1,
1,-1, 0, 0,
0, 0,-1, 0,
0, 0,-1, 0,
0,-1, 0, 0,
0,-1, 0, 0,
-----0}; //G1
0}; // R1
0}; // Y1
0}; // B1
0}; // G2
0}; // R2
0}; // Y2
0}; // B2
//------- region B: train constraints -----const int B0[7] = { 0, 0, 0, 1, 0,-1, 0}; //
const int B1[7] = { 0, 0, 0, 1, 0,-1, 0}; //
const int B2[7] = { 0, 0, 1,-1, 0, 0, 0}; //
const int B3[7] = { 0, 0, 1,-1, 0, 1, 0}; //
const int B4[7] = { 0, 1, 0, 0,-1, 0, 0}; //
const int B5[7] = { 0, 1, 0, 0,-1, 0, 0}; //
const int B6[7] = { 0, 1, 0,-1, 0, 0, 0}; //
const int B7[7] = { 0, 0, 0,-1, 0, 0, 0}; //
//-----------------------------------------int
int
int
int
int
int
int
int
int
int
P0
P1
P2
P3
P4
P5
P6
P7
RA
RB
G1
R1
Y1
B1
G2
R2
Y2
B2
:= 0;
:= 0;
:= 0;
:= 0;
:= 0;
:= 0;
:= 0;
:= 0;
:=1; // initial value for region RA
:=1; // initial value for region RB
broadcast chan move0,move1,move2,move3,move4,move5,move6,move7;
//------------ template defintions --------process Uppaal_Model() {
state s0;
urgent s0;
init s0;
trans
s0 -> s0 {
guard
P0 < 6 &&
T0[P0+1] != T1[P1] &&
T0[P0+1] != T2[P2] &&
T0[P0+1] != T3[P3] &&
F. Mazzanti & A. Ferrari
T0[P0+1] != T4[P4] &&
T0[P0+1] != T5[P5] &&
T0[P0+1] != T6[P6] &&
T0[P0+1] != T7[P7] &&
RA + A0[P0+1] <= LA &&
RB + B0[P0+1] <= LB;
sync move0!;
assign
P0 := P0+1,
RA := RA + A0[P0],
RB := RB + B0[P0];
},
s0 -> s0 {
guard
P1 < 6 &&
T1[P1+1] != T0[P0] &&
T1[P1+1] != T2[P2] &&
T1[P1+1] != T3[P3] &&
T1[P1+1] != T4[P4] &&
T1[P1+1] != T5[P5] &&
T1[P1+1] != T6[P6] &&
T1[P1+1] != T7[P7] &&
RA + A1[P1+1] <= LA &&
RB + B1[P1+1] <= LB;
sync move1!;
assign
P1 := P1+1,
RA := RA + A1[P1],
RB := RB + B1[P1];
},
s0 -> s0 {
guard
P2 < 6 &&
T2[P2+1] != T0[P0] &&
T2[P2+1] != T1[P1] &&
T2[P2+1] != T3[P3] &&
T2[P2+1] != T4[P4] &&
T2[P2+1] != T5[P5] &&
T2[P2+1] != T6[P6] &&
T2[P2+1] != T7[P7] &&
RA + A2[P2+1] <= LA &&
RB + B2[P2+1] <= LB;
sync move2!;
assign
P2 := P2+1,
RA := RA + A2[P2],
RB := RB + B2[P2];
},
s0 -> s0 {
guard
P3 < 6 &&
T3[P3+1] != T0[P0] &&
T3[P3+1] != T2[P2] &&
T3[P3+1] != T1[P1] &&
T3[P3+1] != T4[P4] &&
T3[P3+1] != T5[P5] &&
T3[P3+1] != T6[P6] &&
T3[P3+1] != T7[P7] &&
RA + A3[P3+1] <= LA &&
RB + B3[P3+1] <= LB;
sync move3!;
assign
147
Ten Diverse FMs for an ATS
148
P3 := P3+1,
RA := RA + A3[P3],
RB := RB + B3[P3];
},
s0 -> s0 {
guard
P4 < 6 &&
T4[P4+1] != T0[P0] &&
T4[P4+1] != T1[P1] &&
T4[P4+1] != T2[P2] &&
T4[P4+1] != T3[P3] &&
T4[P4+1] != T5[P5] &&
T4[P4+1] != T6[P6] &&
T4[P4+1] != T7[P7] &&
RA + A4[P4+1] <= LA &&
RB + B4[P4+1] <= LB;
sync move4!;
assign
P4 := P4+1,
RA := RA + A4[P4],
RB := RB + B4[P4];
},
s0 -> s0 {
guard
P5 < 6 &&
T5[P5+1] != T0[P0] &&
T5[P5+1] != T1[P1] &&
T5[P5+1] != T2[P2] &&
T5[P5+1] != T3[P3] &&
T5[P5+1] != T4[P4] &&
T5[P5+1] != T6[P6] &&
T5[P5+1] != T7[P7] &&
RA + A5[P5+1] <= LA &&
RB + B5[P5+1] <= LB;
sync move5!;
assign
P5 := P5+1,
RA := RA + A5[P5],
RB := RB + B5[P5];
},
s0 -> s0 {
guard
P6 < 6 &&
T6[P6+1] != T0[P0] &&
T6[P6+1] != T1[P1] &&
T6[P6+1] != T2[P2] &&
T6[P6+1] != T3[P3] &&
T6[P6+1] != T4[P4] &&
T6[P6+1] != T5[P5] &&
T6[P6+1] != T7[P7] &&
RA + A6[P6+1] <= LA &&
RB + B6[P6+1] <= LB;
sync move6!;
assign
P6 := P6+1,
RA := RA + A6[P6],
RB := RB + B6[P6];
},
s0 -> s0 {
guard
P7 < 6 &&
F. Mazzanti & A. Ferrari
T7[P7+1] != T0[P0] &&
T7[P7+1] != T1[P1] &&
T7[P7+1] != T2[P2] &&
T7[P7+1] != T3[P3] &&
T7[P7+1] != T4[P4] &&
T7[P7+1] != T5[P5] &&
T7[P7+1] != T6[P6] &&
RA + A7[P7+1] <= LA &&
RB + B7[P7+1] <= LB;
sync move7!;
assign
P7 := P7+1,
RA := RA + A7[P7],
RB := RB + B7[P7];
};
}
// template instantiations
// List one or more processes to be composed into a system.
system Uppaal_Model;
//
//
//
//
//
//
./verifyta -h
./verifyta uppaal_oneway8seq.ta uppaal_queries.txt
file: uppaal_queries.txt
A<>((P0==6) and (P1==6)and (P2==6)and (P3==6) and
(P4==6) and (P5==6)and (P6==6)and (P7==6))
149
| 3cs.SY
|
1
Learning Spike time codes through Morphological
Learning with Binary Synapses
arXiv:1506.05212v1 [cs.NE] 17 Jun 2015
Subhrajit Roy, Student Member, IEEE, Phyo Phyo San, Shaista Hussain, Lee Wang Wei and Arindam Basu∗ ,
Member, IEEE
Abstract—In this paper, a neuron with nonlinear dendrites
(NNLD) and binary synapses that is able to learn temporal
features of spike input patterns is considered. Since binary
synapses are considered, learning happens through formation and
elimination of connections between the inputs and the dendritic
branches to modify the structure or “morphology” of the NNLD.
A morphological learning algorithm inspired by the ‘Tempotron’,
i.e., a recently proposed temporal learning algorithm–is presented
in this work. Unlike ‘Tempotron’, the proposed learning rule uses
a technique to automatically adapt the NNLD threshold during
training. Experimental results indicate that our NNLD with 1-bit
synapses can obtain similar accuracy as a traditional Tempotron
with 4-bit synapses in classifying single spike random latency
and pair-wise synchrony patterns. Hence, the proposed method is
better suited for robust hardware implementation in the presence
of statistical variations. We also present results of applying this
rule to real life spike classification problems from the field of
tactile sensing.
Index Terms—spiking neuron, tempotron, binary synapse,
dendrites, plasticity, learning
I. I NTRODUCTION
Though the representation of stimulus by the neurons in
our brain is a topic of much ongoing research and debate,
it is widely believed that the timing of the action potentials
or spikes fired by these neurons carry important information
[1]. Spike latency codes i.e. delay in the spike time after
stimulus presentation have been suggested for tactile, olfactory and retinal systems [2]. They are also thought to offer
significant advantages in terms of reducing power needed for
communicating spikes as well as allowing rapid processing
of inputs. Hence, neuromorphic engineers, who aim to mimic
the brain’s processing capabilities in silicon, have also been
interested in spike timing based neural networks.
Several analog CMOS integrated circuits operating in the
sub-threshold regime have been designed in the past to implement somatic and synaptic functions [3]–[6]. However, with
the increase of statistical variations due to the constantly decreasing feature size of transistors, performance of silicon neural networks requiring accurate setting of a “weight” parameter
become strongly compromised. The typical solution for this
Financial Support from MOE through grant MOE2012-T2-2-054 is acknowledged.
Subhrajit Roy, Shaista Hussain and Arindam Basu are with the School
of Electrical and Electronics Engineering, Nanyang Technological University, Singapore (e-mail: [email protected]; [email protected];
[email protected]). Phyo Phyo San is with the Institute for Infocomm
Research, Singapore (e-mail: [email protected]). Lee Wang Wei is
with the SINAPSE laboratory at National University of Singapore (e-mail:
lee wang [email protected]). ∗ Arindam Basu is the corresponding author.
problem is to increase transistor size. However, this alone
might not be sufficient to guarantee good matching across the
chip. For example, [7] demonstrates that 5µmX5µm transistor
based 5-bit DACs fabricated in 0.35µm CMOS exhibit only
1.1 effective bits. Calibration techniques can be used to
improve the accuracy; however, this incurs significant area
penalty due to storage of calibration bits and is unacceptable
in large scale systems. The problem of mismatch is also
exacerbated for several nanometer scale non-CMOS devices
(e.g. memristor [8]–[10] or domain wall magnets (DWM)
[11]) that have potential for use in large scale neuromorphic
applications. For example, DWM synapses are expected to
have typical programming accuracies of 4-bits which can
reduce to 2-3 bits effective resolution due to mismatch [11].
Hence, there is a strong need to develop algorithms and
architectures that retain the performance of earlier spiking
systems but require low-resolution weights.
In this paper, a hardware friendly morphological learning
rule for neurons with nonlinear dendrites (NNLD) and binary
synapses for classifying spatiotemporal spike patterns is presented. Previous studies have shown that NNLD can be successfully applied to learn both mean rate encoded inputs [12],
[13] and spike-timing information [14], [15]. Although in [14],
[15] we proposed a spike time based learning rule for training
a NNLD architecture, however the rule was not optimized for
memory capacity. Here we propose a novel memory capacity
optimized spike timing based learning rule for training NNLD.
Our work is inspired by the Tempotron learning rule for
spiking neurons [1]. However, unlike the Tempotron learning
rule that requires weights with high resolution, the proposed
network uses low-resolution non-negative integer weights and
learns through modifying connections of inputs to dendritic
branches. Thus the ‘morphology’ or structure of the neuron (in
terms of connectivity pattern) reflects the learning. This results
in easier hardware implementation since a low-resolution
non-negative integer weight of W can be implemented by
activating a shared binary synapse W times through time
multiplexing schemes like address event representation (AER)
[16], [17]. Furthermore, the spiking threshold of the neuron
employed in Tempotron is fixed throughout the learning. On
the other hand, the proposed method is equipped with a
threshold adaptation mechanism trying to optimize the number
of false positives and false negatives. Some initial results of
this concept were presented in [19]. In this paper, we present
a novel threshold adaptation technique, more detailed set of
results, comparisons with other work and application to a real
world problem.
2
d inputs
m dendritic branches
1 2 3 45
d
1
b()
2
b()
3
b()
4
b()
m
Vthr
V(t) Vout
III. M ORPHOLOGICAL L EARNING A LGORITHM
b()
Fig. 1: The architecture of neuron with nonlinear dendrites (NNLD).
The organization of this paper is as follows: in Section II
and III, the architecture of the neuron with nonlinear dendrites
and its morphological learning algorithm are introduced. Two
spike time based binary classification tasks are discussed in
Section IVA and performance of our method in comparison
to Tempotron is shown in Section IVB, IV-C and V. Finally,
our work is compared with other classifiers in Section VI and
then a conclusion is drawn in Section VII.
II. N EURON WITH N ONLINEAR D ENDRITES
It has been shown that a neuron with lumped dendritic
nonlinearities possesses higher storage capacity than its counterparts with linear dendritic summation [12]. As presented
in Fig. 1, the structure of NNLD is characterized by m
identical dendritic branches and k excitatory synaptic contacts
per branch. For each branch, the synaptic contact is formed by
one of d dimensions of input afferents where d >> k. At the
relevant times governed by incoming spikes, the synapses are
activated and the membrane voltage is calculated by weighted
sum of postsynaptic potentials (PSPs) as follows:
m
m
d
X
X
X
X
V (t) =
b(vj (t)) =
b
wij
K t − tif (1)
j=1
j=1
threshold voltage (Vthr ). Similar to [1], this indicates that a
neuron fires at least one spike if V (t) crosses (Vthr ); otherwise
it remains quiescent. After the neuron fires a spike, it is
returned to the refractory state and the rest of the spikes in
the incoming pattern do not affect the computation.
i=1
On one hand the proposed learning rule tries to optimize the
connections between the input lines and the synapses while on
the other hand it tries to find a optimal value of the neuron
firing threshold(Vthr ). Below we describe both the processes.
a) Learning the connections: Since we have binary
synapses, a morphological learning rule that can modify the
connections between afferent lines and synapses is needed.
The inspiration of this work comes from the Tempotron
learning rule [1] that learnt the temporal feature of random
spike patterns in two classes by updating its weights so
that the neuron fires a spike for patterns in class P + and
stays silent for the other class. It was shown in [1] that the
Tempotron rule endows a neuron with larger classification
capacity than a perceptron with same number of synapses.
Hence, we also start with a cost function that measures the
deviation between the maximum membrane voltage (Vmax )
generated by misclassified patterns and Vthr defined as:
Vthr − Vmax , if pattern in P + is presented
E=
Vmax − Vthr , if pattern in P − is presented
(3)
where Vmax is the maximal value of postsynaptic potential
V (t) at the time tmax , i.e., Vmax = V (tmax ). According to
the gradient-descent method, the change in synaptic efficacy
for the first case is calculated by:
∆wij = −
∂E
∂wij
f
where wij is the weight of the ith synapse formed on the
j th branch, vj (t) is the input to the j th dendritic nonlinearity,
b (·) is the nonlinear activation function of the dendritic branch
2
which is characterized by b (vj (t)) = vj (t) xthr [13], K
denotes the post-synaptic potential kernel and tif are times
of incoming spikes on the ith afferent. Since we consider
binary synapses, wij {0, 1}. To suppress unrealistically large
values, we include a saturation level xsat at the output of
each dendrite such that for b(vj (t)) > xsat , b(vj (t)) = xsat .
Similar to our earlier work [13], we allow each input afferent
to make multiple synaptic connections on the same dendritic
branch butP
limit the total number of connections per branch by
d
enforcing i=1 wij = k for each j. In this work, we consider
normalized PSP of the form:
K (t − tf ) = V0 (exp[−(t − tf )/τ ]−exp[−(t − tf )/τs ]) (2)
where the parameters τ and τs =τ /4 denote the decay time
constants of membrane integration and synaptic current respectively [1].
For binary classification, the final output voltage Vout is
interpreted to take a value of either “1” or “0” depending on
whether the summed membrane voltage V (t) is crossing a
∂
m
P
Vthr −
j=1
=−
0
= b (vj (tmax ))
b
d
P
wij
P
i=1
f
K tmax −
tif
!!!
∂wij
X
K(tmax − tif )
f
(4)
where b0 (.) denotes the derivative of b(.). The gradient for
second case can be calculated similarly and we do not show
it here for brevity. As mentioned earlier, since we consider
binary weights, i.e., wij = 1 if a connection exists and 0
otherwise, we cannot directly modify the weights by adding
the ∆wij term derived here. Instead, the term ∆wij in Equation 4 is reinterpreted as a correlation term cij (= wij ) and is
used to guide the process of swapping connections. At every
iteration of the learning process, the synapse with the lowest
cij averaged over an entire batch of patterns from a randomly
chosen target set will be replaced (weight changed from 1 to
0) with the highest cij synapse in a candidate replacement
set similar to [13]. To keep the paper self-contained, the
mechanism of the learning process is outlined briefly below:
1) The learning process starts with random initialization
of the connection matrix between input afferents and
dendritic branches.
3
2) In each iteration of the training process, the activation
of synapses on each dendritic branch are determined
and the cell membrane output voltage (V (t)) in (1) is
calculated for all the input patterns.
3) From the calculated V (t), the maximum membrane
voltage (Vmax ) is observed and classification result is
determined, i.e., the patterns are correctly classified if
Vmax > Vthr for P + and Vmax < Vthr for P − .
4) A random set T of nT synapses having weight 1 was
targeted for possible replacement. For all misclassified
patterns, the correlation term, cij is calculated for each
synapse in T and averaged over the entire pattern set,
5) The poorest-performing synapse (minimum cij ) in T ,
Tmin is chosen for replacement.
6) To aid the replacement process, a randomly chosen set R
containing nR of the d afferent lines is forced to make
silent synapses with weight 1 on the dendritic branch
of Tmin . These synapses are “silent” since they do not
contribute PSP to the computation of V (t)–so they do
not alter the classification when the same pattern set is
re-applied. But now cij is calculated for synapses in R
and Tmin is replaced with the best-performing synapse
(maximum cij ) in R.
7) The learning from step (2) to (6) continues until all the
patterns are correctly learnt (or) the maximum number
of iteration is reached.
b) Learning the threshold: Since we do not have an
arbitrary multiplicative weight in our neural model, the range
of maximum voltages obtainable from our model in response
to a fixed temporal spike pattern is limited. This is similar
to the problem faced in [18]. Hence, improper selection of
threshold may largely degrade the classification performance
since a very large Vthr (= m × k × Kmax for example) may
never be crossed by V (t). In [19], we determined the value
of Vthr by noting the maximum value of V (t), i.e., Vmax at
time tmax for a large number of random input spike patterns
and connection matrices. The resultant probability distribution
of Vmax was used to determine the optimal threshold Vthr .
In [19], Vthr was set to be the voltage corresponding to the
peak of probability distribution function. Here, we propose
an automatic mechanism for adapting Vthr during training.
This technique involves updating the value of Vthr after each
iteration which is guided by the following formula:
∆Vthr = η(wf p F P − wf n F N )
(5)
where F P , F N , wf p , wf n and η > 0 are the number of false
positives, number of false negatives, weightage associated with
false positive error, weightage associated with false negative
error and threshold learning rate respectively. In this article, we
keep wf p = wf n = 1. Equation 5 is responsible for balancing
the number of false positives and false negatives. When F P >
F N , the number of negative patterns incorrectly classified as
positive patterns is more than the number of positive patterns
incorrectly classified as negative patterns so to balance F P
and F N Equation 5 increases the value of Vthr . On the other
hand, when F P < F N Equation 5 diminishes the value of
Vthr . The rate of threshold adaptation is controlled by the
threshold learning rate η.
IV. E XPERIMENTS AND R ESULTS
A. Problem Description
In this sub-section, we describe the two tasks used to
demonstrate the performance of our algorithm. The reason for
this choice is that both of these are standard problems shown
in [1] and facilitates comparison.
1) Task I: Classifying Random Latency Patterns: The first
task is binary classification of single spike random latency patterns [1]. To perform the task, P spike patterns were generated
and randomly assigned to one of the two classes P + (Class
1) or P − (Class 2). Each spike pattern X = (x1 , x2 , . . . , xd )
consists of d afferents, where each of them spiked only once
at a time drawn independently from a uniform distribution
between 1 and T ms.
2) Task II: Classifying pairwise Synchrony Patterns: To
examine the ability of our algorithm to learn correlations
in multiple spikes, another data set that consists of pairwise
synchrony events in each pattern is generated. In this data set,
all the d afferents are grouped into (d/2) pairs and afferents
in a given pair fire single spike patterns synchronously. Since
synchronous events occur at random, uniformly distributed
times in both pattern categories, so that class information
is embedded solely in the patterns of synchrony; neither
spike counts nor spike timing of individual neurons carry
any information relevant for the classification task. This task
mimicked spike synchrony-based sensory processing.
For both Task I and II, we have kept d as 500.
B. Results: Performance of NNLD trained by morphological
learning algorithm
Throughout the experiment, the design parameters m, k,
xthr , xsat , τ and T , were chosen as 100, 5, 1, 100, 15 ms
and 400 ms respectively. The detailed criteria for selection of
parameters xthr and xsat is described in [13]. As discussed
in Section III, the firing threshold Vthr is adapted and so it is
randomly initialized before training.
To start with Task I, the NNLD in Fig. 1 was trained
on a small number (= 100) random latency patterns as
generated in Section IV-A1. The results in Fig. 2 (a) and (b)
show that the proposed method can efficiently perform the
classification task. A clear separation between Class 1 and
Class 2 shows that the proposed method is able to respond
to the random single spike latency patterns by shifting Vmax
closer and farther to the Vthr for each pattern in classes 1 and
2 respectively.
The NNLD was also trained for larger number of input
patterns (500 and 1000 patterns) as presented in Fig. 3 (b)
and (c). It shows that the proposed method can perform
the classification task quite well by achieving accuracies of
95.58%(SD = 0.54%) and 86.57%(SD = 0.72%) respectively for these cases. Next, we performed the experiment of
Task II with our network. It was observed that the classification
performances (100%, 100% and 99.71 %(SD = 0.1%) accuracy for 100, 500 and 1000 patterns) are much better than that
of performance in random latency patterns of Task I.Hence,
our method can identify the extra information embedded in
synchrony of neural firings. It also reveals that the learning
4
50
15
10
5
0
90
30
20
10
0
8
10
12
14
16
18
20
100
40
8
10
12
14
16
18
Vmax
Vmax
Accuracy (%)
Number of occurences
Number of occurences
20
80
70
NNLD (adaptive)
NNLD (static)
Tempo. (No quant)
Tempo. (4−bit, DT)
Tempo. (4−bit, AT)
Tempo. (2−bit, DT)
Tempo. (2−bit, AT)
60
50
(a)
(b)
40
105
20
100
100
200
300
400
500
600
700
800
900
1000 1100
800
900
1000 1100
95
10
8
9
10
11
12
13
14
15
Vmax
(a)
260
# of occurences
100
50
0
0
Number of patterns (P)
30
0
# of occurences
30
10
12
Vmax
(b)
14
16
90
85
NNLD (adaptive)
80
NNLD (static)
75
Tempo. (No quant)
Tempo. (4 bit, DT)
70
130
Tempo. (4 bit, AT)
Tempo. (2 bit, DT)
65
Tempo. (2 bit, AT)
60
0
8
Accuracy (%)
# of occurences
Fig. 2: Distribution of Vmax for 100 patterns (a)before and (b) after
training for Task I. Vmax for patterns in P + and P − are shown in
dashed and solid line respectively.
8
10
12
14
16
18
20
Vmax
(c)
Fig. 3: The distribution of Vmax for a set of (a) 100, (b) 500 and (c)
1000 patterns in task I showing 100%, 94.8% and 84.9% accuracy
respectively.
rule does not depend only on a single synchronous pair but
on a huge number of synchronous pairs.
C. Results: Comparison with Tempotron learning
Next, the performance of proposed method is compared with
the Tempotron learning [1] that learns spike time patterns by
using weight updates. The number of synapses used by Tempotron is equal to the number of input afferents d. Since we
are interested in the performance of these algorithms in their
hardware implementations plagued by mismatch, we consider
the performance of the Tempotron when its weight is quantized
at different resolutions. Further, we do the quantization in two
ways: either after training (AT) or as a step during training
(DT). The first method corresponds to the case where weights
trained in software version of the algorithm is downloaded
to the hardware while the second method is analogous to
performing training on-chip. Furthermore, for comparison with
our previous threshold selection technique [19], we have also
calculated the value of Vthr by equating it to the voltage
corresponding to the peak location of Vmax distribution over
10000 random input spike patterns. We term this as Vthr,static .
Fig. 4 depicts that the performance obtained by morphological
learning with adaptive threshold is superior to that of learning
with fixed Vthr,static . Moreover, the comparison results in
Fig. 4 (a) also show that the Tempotron using floatingpoint numbers achieves better performance compared to the
0
100
200
300
400
500
600
700
Number of patterns (P)
Fig. 4: Comparison studies on classification performance, for Tempotron learning [1] and the proposed morphological learning rule
for (a) Task I of Random Latency Patterns and (b) Task II of PairWise Synchrony Patterns. The results have been averaged over 10
independent trials.
proposed method. However, when the high resolution weights
are quantized at 2-bit level, its performance is worse than the
proposed method. Also, it can be seen that the performance is
better when the quantization is performed within the learning
loop. This is to be expected since the learning algorithms can
now try to correct this quantization error as well.
Only at 4-bit quantization level, the classification performance of Tempotron (93.05%(SD = 0.55%) and
89.14%(SD = 0.7%) accuracy for 500 and 1000 patterns)
in Task I is comparable to our proposed method using 1bit or binary weights. This underlines the importance of
our proposed method in robustly implementing spike timing
based classifiers using low-resolution analog synapses available in nano-scale CMOS or non-CMOS devices. Similarly,
the classification performance of NNLD for Task II with 1bit binary weights in Fig. 4 (b) is comparable to performance
of Tempotron at 4-bit quantization which shows about 100 %
and 98.12%(SD = 0.12%) accuracy respectively for 500 and
1000 patterns.
V. A PPLICATION E XAMPLE
Till now the proposed algorithm has been applied to classify
synthetic synchrony patterns. But, to check whether the algorithm can work in real world problems, it is used to classify
Tactile information. The patterns which have been till now
presented for classification had one spike per afferent but real
world scenarios may have multiple spikes per afferent.
5
TABLE I: Performance comparison of morphological learning rule
on NNLD and Tempotron
Cases
Morph. lear. on NNLD (adaptive Vthr )
Morph. lear. on NNLD (for Vthr static )
Tempotron (no quantization) [1]
Tempotron (6-Bit quantization after training)
Tempotron (6-Bit quantization during training)
Tempotron (4-Bit quantization after training)
Tempotron (4-Bit quantization during training)
Tempotron (2-Bit quantization after training)
Tempotron (2-Bit quantization during training)
Accuracy
Mean
SD
96.54
0.6573
95.64
0.6473
97.06
0.5123
95.64
0.7614
96.26
0.6822
78.87
1.8371
85.92
1.3846
51.56
3.765
55.88
2.8731
a) Task Description: A detailed description of the task
can be found in [20]–here, we give a brief description for
completeness. The task requires a flexible, stretchable and
conformable tactile sensor array made up of conductive fabric
which is used for data collection. Two glass spheres (indenters)
of diameter 65 mm and 105 mm were indented onto this
sensor array by a suitably programmed 6-axis robotic arm.
The indentation force used was 4N, as measured using a
load cell placed below the sensor having an accuracy of
0.01N. The signal recording was started just before placing the
indenter onto the sensor array and stopped before removing the
indenter. Between consecutive indentations, a 5 second pause
was provided so that the sensors were able to recover. A total
of 100 recordings were taken per indenter. The collected data
were converted to spikes as described in the next sub-section.
For each indenter, 60 randomly chosen recorded data was used
for training both the proposed algorithm and Tempotron. The
remaining 40 recordings were used for testing.
b) Spike Train Generation: The conversion of the analog
data recorded by the sensor array to spike trains involves
the following steps. First, the analog data is converted to
digital output by applying a fixed threshold of 0.5. This digital
output is inverted to generate another set of digital data. Each
channel of the digital data and its inverted version are passed
through Leaky Integrate and Fire Neuron to generate two sets
of spike trains. These spike trains are combined to form the
spike response to be given as an input to the algorithms. The
usage of both the digital data and its inverted version for spike
generation ensures both low to high and high to low transitions
are captured by a change in firing activity. The combined spike
train patterns given as input to the algorithms consist of 130
afferents. Thus, we allot 130 synapses for both Tempotron and
NNLD.
c) Results: The performance of the proposed method
on this application is compared with Tempotron algorithm at
different quantization levels in Table I. The results, averaged
over 10 independent trials, show that the proposed algorithm
is able to achieve an accuracy of 96.54%(SD = 0.6543%).
Although Tempotron without quantization performs better
(97.06%(SD = 0.5123%)) than the proposed learning rule
on NNLD, but after quantization, at least 6 bits of weight
resolution is needed by Tempotron to match our performance
with 1 bit weights.
VI. DISCUSSION
Here, we compare our method with other reported algorithms and other possible variants of morphological learning.
A. Comparison to other supervised spiking neural classifiers
In recent years, several supervised learning algorithms have
been proposed such as Tempotron [1], ReSuMe [21], SpikeProp [22] and Chronotron [23] for training spiking neurons.
From a pattern recognition viewpoint, these algorithms can be
classified into two types. The general theme of the first type of
algorithms is that a desired output spike train is specified prior
to learning for each class of patterns. SpikeProp, ReSuMe and
Chronotron are examples of this type, among which SpikeProp
can only produce a single output spike whereas the others are
capable of producing multi-spike train. In the second type,
no such desired output spike train is specified beforehand
and the algorithms choose the best time to spike for each
pattern during training. Tempotron and the proposed algorithm
are examples of this type which chooses tmax (defined in
Sec. III) as the time to spike. We have already compared the
performance of our algorithm with Tempotron. We now choose
ReSuMe as a representative of the first type of algorithms and
compare its performance with the proposed learning rule for
the two tasks described in Sec. IV-A. For ReSuMe, the neuron
had to fire one spike at t+ = 350ms for P + patterns and at
t− = 450ms for P − patterns. The classification performance
of ReSuMe (89.58%(SD=1.24%)) and 82.65%(SD=2.22%)
accuracy for 500 and 1000 patterns) in Task I is worse
compared to the proposed method. Similarly, for Task II, the
proposed method performs much better than ReSuMe learning
rule (96.74%(SD = 0.8467%) and 92.12%(SD = 1.1654%)
accuracy for 500 and 1000 patterns).
B. Comparison to other classifiers using dendritic processing
We have already compared the proposed algorithm with
previous works employing NNLD in Section I. Here we
first compare our method with another dendritic algorithm
proposed by Wu et al. in [24]. Unlike [24] which considered
only mean rate encoded inputs, our learning rule can be
applied to arbitrary spike trains.
Second, we compare the proposed algorithm with another
recently reported structural plasticity based algorithm named
Dendritically Enhanced Readout (DER) [14], [15]. In [14],
[15], this structure has been used as the readout stage of
Liquid State Machine. The primary difference of the proposed
algorithm with DER is in the number of data points per pattern
to be memorized for a particular task. If we consider there
are P + and P − patterns of Class 1 and Class 2 respectively,
then the number of data points to be memorized by the
proposed algorithm are Pm N N LD = T × P − + 1 while
the number of data points to be memorized by DER are
Pm DER = T × (P + + P − ) where T is the number of time
points per pattern. So, DER has to memorize almost two times
more data points than the proposed algorithm for the same
number of patterns thereby reducing its memory capacity.
Third, we have also compared our performance with another
recently proposed dendritic algorithm termed as Synaptic
Kernel Inverse Method(SKIM) [25]. The difference mentioned
above in the context of DER also applies to SKIM. Apart from
that, SKIM also uses much more resources than the proposed
NNLD which we will show next. We compare the two methods
6
on Task I for 100 patterns in which case our proposed method
has 100% accuracy. The neural network architecture used
in [25] consists of N presynaptic neurons which connect to
an output spiking neuron, via synaptic connections to its M
dendritic branches. The weights of these synapses are random
and fixed. These synapses along with a subsequent nonlinearity
projects the input to a higher dimension thereby increasing
separability. The dendritic branches sum the synaptic input
currents, and the output from the dendritic branches are
summed at the soma of the output neuron. The weights of the
connection between dendritic branches and the soma are learnt
by Moore pseudo inversion method [25]. Thus, for this network N ×M synaptic resources are required for connecting the
N presynaptic neurons to M postsynaptic dendritic branches
and M synapses are required for connecting the M dendritic
branches to the single output spiking neuron. The number of
input spiking neurons are equal to the number of afferents in
the input data which in our case is 500. Since we have used
500 synapses for NNLD, so initially we keep the number of
postsynaptic dendrites in SKIM as 1 (M = 1) to match the
number of resources used by us. But for M = 1, SKIM fails
miserably and provides only 50% accuracy. When the number
of dendritic branches are increased, SKIM provides better
results and finally is able to provide 100% accuracy when
M = 360. So to provide equivalent result as the proposed
algorithm SKIM requires 361 times more resources than our
proposed NNLD.
VII. CONCLUSION
A morphological learning rule that can be used to find
the optimal morphology of neurons with nonlinear dendrites
(NNLD) and binary synapses is presented. The learning rule
includes a novel threshold adaptation technique. To see the
effectiveness of the proposed method, the NNLD trained with
morphological rule is used to solve two classification tasks
and one real world problem. The results depict that our
proposed method with 1 bit weights can achieve comparable
performance to tempotron learning rule with 4-bit to 6-bit
quantized weights.
ACKNOWLEDGEMENT
The authors acknowledge helpful discussions with Prof.
Nitish Thakor regarding tactile sensing.
R EFERENCES
[1] R. Gutig and H. Sompolinsky, “The tempotron: a neuron that learns
spike timing-based decisions”, Nature Neuroscience, vol. 9, no. 3, pp.
420-428, 2006.
[2] R. Johansson and I. Birznieks, “First spikes in ensembles of human
tactile afferents code complex spatial fingertip events”, Nature Neuroscience, vol. 7, no. 3, pp. 170-177, 2004.
[3] A. Basu and C. Petre, and P. Hasler, “Bifurcations in a Silicon Neuron”,
Proceedings of the International Symposium on Circuits and Systems,
pp. 428-431, 2013.
[4] J. Arthur and K. Boahen, “Synchrony in silicon: The gamma rhythm”,
IEEE Transactions on Neural Networks, no. 6, pp. 1815-1825, Nov.
2007.
[5] S. Millner, A. Grübl, K. Meier, J. Schemmel and M. O. Schwartz, “A
VLSI Implementation of the Adaptive Exponential Integrate-and-Fire
Neuron Model,” Advances in Neural Information Processing Systems,
Vancouver, B.C., Canada, Dec. 2010, pp. 1642-1650.
[6] F. Grassia, L. Buhry, T. Lévi, J. Tomas, A. Destexhe, and S. Saı̈ghi,
“Tunable Neuromimetic Integrated System for Emulating Cortical
Neuron Models,” Frontiers in Neuroscience, vol. 5, no. 134, 2011.
doi:10.3389/fnins.2011.00134
[7] B. Linares-Barranco, T. Serrano-Gotarredona and R. SerranoGotarredona, “Compact Low-power Calibration Mini-DACs for Neural
Arrays with Programmable Weights,” IEEE Transactions on Neural
Networks, vol. 14, no. 5, pp. 1207-15, Nov. 2003.
[8] D. Querlioz, O. Bichler, P. Dollfus and C. Gamrat,“Immunity to Device
Variations in a Spiking Neural Network with Memristive Nanodevices,”
IEEE Transactions on Nanotechnology, vol. 12, no. 3, pp. 288-95, May
2013.
[9] K. H. Kim, S. Gaba, D. Wheeler et.al., “A functional hybrid memristor crossbar-Array/CMOS system for data storage and neuromorphic
applications,” Nano Letters, vol. 12, no. 1, pp. 389-395, 2011.
[10] G. Indiveri, B. linares-Barranco, R. Legenstein, G. Deligeorgis and T.
Prodromakis, “Integration of nanoscale memristor synapses in neuromorphic computing architectures,” Nanotechnology, vol. 24, no. 38,
Sep. 2013.
[11] M. Sharad, C. Augustine, G. Panogopoulos and K. Roy, “Spin-Based
Neuron model with Domain-Wall Magnets as Synapse,” IEEE Transactions on Nanotechnology, vol. 11, pp. 843-53, Jul. 2012.
[12] P. Poirazi and B. W. Mel, “Impact of active dendrites and structural
plasticity on the memory capacity of neural tissue”, Neuron, vol. 9, no.
3, pp. 779-776, 2001.
[13] S. Hussain, R. Gopalakrishnan, A. Basu and S. C. Liu, “A Morphological Learning: Increased Memory Capacity of Neuromorphic
Systems with Binary Synapses exploiting AER based Reconfiguration”,
Proceedings of the International Joint Conference on Neural Networks,
Dallas, Texas, Aug. 2013, pp. 1-7.
[14] S. Roy, A. Basu and S. Hussain, “Hardware efficient, neuromorphic
dendritically enhanced readout for liquid state machines”, Proceedings
of the Biomedical Circuits and Systems Conference, Rotterdam, The
Netherlands, Oct. 2013, pp. 302-305.
[15] S. Roy, A. Banerjee and A. Basu, “Liquid State Machine With
Dendritically Enhanced Readout for Low-Power, Neuromorphic VLSI
Implementations,” IEEE Transactions on Biomedical Circuits and
Systems, vol.8, pp.681-695, Oct. 2014.
[16] K. Boahen, “Point-to-point connectivity between neuromorphic chips
using address events”, IEEE Transactions on Circuits and Systems II,
vol. 47, pp. 416-434, May 2000.
[17] S. Brink, S. Nease, P. Hasler, S. Ramakrishnan, R. Wunderlich, A.Basu
and B. Degnan, “A learning-enabled neuron array IC based upon transistor channel models of biological phenomenon”, IEEE Transactions
on Biomedical Circuits and Systems, vol. 7, Mar. 2013, pp. 71-81.
[18] S. Hussain, A. Basu, M. Wang and T. Hamilton, “DELTRON: Neuromorphic architectures for delay based learning”, Proceedings of the
Asia Pacific Conference on Circuits and Systems, Kaohsiung, Taiwan,
Dec. 2012, pp. 304-307.
[19] P. P. San, A. Basu and S. Hussain, “Spike-timing dependent morphological learning for a neuron with nonlinear active dendrites”, in
Proceedings of the IEEE IJCNN, Beijing, China, Jul. 2014, pp. 3192
- 3196.
[20] W. W. Lee, J. Cabibihan and N. V. Thakor , “Bio-mimetic strategies
for tactile sensing”, in Proceedings of IEEE Sensors Conference,
Baltimore, MD, Nov. 2013, pp. 1-4.
[21] F. Ponulak and A. J. Kasinski, “Supervised Learning in Spiking Neural
Networks with ReSuMe: Sequence Learning, Classification, and Spike
Shifting.’, Neural Computation, vol. 22, no. 2, pp. 467-510, 2010.
[22] S. M. Bohte, J. N. Kok, and H. La Poutre, “Error-backpropagation in
temporally encoded networks of spiking neurons”, Neurocomputing,
vol.48, no. 1, pp. 17-37, 2002.
[23] R. V. Florian, “The chronotron: a neuron that learns to fire temporally
precise spike patterns”, PLoS ONE, vol. 7, no. 8, e40233, 2013.
[24] X.E. Wu and B.W. Mel, “Capacity-enhancing learning rules in a medial
temporal lobe online learning model”, Neuron, vol. 62, no. 1, pp. 31-41,
2009.
[25] J. C. Tapson, G. K. Cohen, S. Afshar et al., “Synthesis of neural
networks for spatio-temporal spike pattern recognition and processing”, Frontiers in Neuroscience, vol. 7, no. 153, Aug. 2013. doi:
10.3389/fnins.2013.00153
| 9cs.NE
|
MAXIMUM-A-POSTERIORI SIGNAL RECOVERY WITH PRIOR INFORMATION:
APPLICATIONS TO COMPRESSIVE SENSING
Ali Bereyhi and Ralf R. Müller
arXiv:1802.05776v1 [cs.IT] 15 Feb 2018
Friedrich-Alexander Universität Erlangen-Nürnberg
[email protected] and [email protected]
ABSTRACT
This paper studies the asymptotic performance of maximuma-posteriori estimation in the presence of prior information.
The problem arises in several applications such as recovery
of signals with non-uniform sparsity pattern from underdetermined measurements. With prior information, the maximuma-posteriori estimator might have asymmetric penalty. We
consider a generic form of this estimator and study its performance via the replica method. Our analyses demonstrate
an asymmetric form of the decoupling property in the largesystem limit. Employing our results, we further investigate
the performance of weighted zero-norm minimization for recovery of a non-uniform sparse signal. Our investigations illustrate that for a given distortion, the minimum number of required measurements can be significantly reduced by choosing weighting coefficients optimally.
Index Terms— Maximum-a-posteriori estimation, compressive sensing, weighted norm minimization, decoupling
property, replica method
1. INTRODUCTION
The problem of estimating x ∈ XN , for some X ⊂ R, from
y = Ax + z,
(1)
with A ∈ RK×N and z ∼ N (0, λ0 IK ), arises in various applications. In presence of prior information, the MaximumA-Posteriori (MAP) estimation approach might deal with an
asymmetric penalty term appearing due to the non-identical
prior distributions. In this paper, we intend to investigate the
asymptotic performance of this class of estimators which encloses several reconstruction schemes in signal processing.
Particular examples of these estimators are the weighted
norm minimization schemes [1] in compressive sensing [2, 3]
which are employed for recovery of signals with non-uniform
sparsity patterns. In this problem, the signal consists of multiple sparse blocks whose sparsity factors are different. A
restricted class of such non-uniform sparse settings, in which
This work was supported by the German Research Foundation, Deutsche
Forschungsgemeinschaft (DFG), under Grant No. MU 3735/2-1.
the signal support is partially known, was addressed in [4],
and the modified-CS scheme was proposed for signal recovery. Weighted ℓ1 -norm minimization was further invoked in
[5] for non-uniform sparse recovery in which different blocks
of signal samples have different sparsity factors. More general settings were investigated in recent studies; see [6–11]
and the references therein.
Due to the nonlinear nature of the MAP estimator, basic tools fail to investigate its large-system performance. Several studies thus invoked the replica method for investigation.
This method was developed for analysis of spin glasses [12]
in the physics literature and accepted as an efficient mathematical tool in information theory; e.g., [13]. The method was
moreover employed to investigate the performance of various recovery schemes in large compressive sensing systems
[14–17]. For non-uniform sparse models, the method was
employed in [18] to study the performance of weighted ℓ1 norm minimization recovery considering noise-free measurements. In this paper, we consider a generic class of estimators
which includes formerly studied schemes such as weighted
ℓ1 -norm minimization and also encloses several other settings
whose performances have not yet been addressed in the literature. Invoking our results we derive an asymmetric version
of the MAP decoupling principle which extends the results
of [19, 20] to a larger class of estimators.
2. PROBLEM FORMULATION
Consider (1) with K/N = α < ∞ as N ↑ ∞. Let [N ] :=
{1, . . . , N } be partitioned into disjoint subsets Nj for j ∈ [J].
J is assumed to be fixed and bounded meaning that J/N ↓ 0
as N grows large. The signal xN ×1 is divided into J blocks.
The block j is denoted by Bj (x) and contains entries whose
indices are in Nj , i.e., Bj (x) := {xn : n ∈ Nj }. We use the
notation j(n) to denote the index of the block to which xn
belongs, i.e., xn ∈ Bj(n) (x). The entries of x are independent, and xn ∼ pj(n) (xn ; ρn ) where {ρn } is a deterministic
sequence over [N ]. The signal is reconstructed from y as
x̂ = argmin
v∈
Xn
1
ky − Avk2 + u(v; c)
2λ
(2)
where λ is the estimation parameter, cN ×1 contains weighting coefficients {cn }, and u(v; c) is a penalty function with
decoupling property, i.e., there exist {uj (vn ; cn )} such that
u(v; c) =
N
X
(3)
uj(n) (vn ; cn ).
n=1
T
T
A is assumed to be random, such that J = A A = UDU
with U being Haar distributed and D denoting the diagonal
matrix of eigenvalues. A trivial example is a matrix with independent and identically distributed (i.i.d.) entries. The empirical distribution of eigenvalues when N ↑ ∞ is denoted by
pJ (λ). For this
distribution, the Stieltjes transform is given by
GJ (s) = E (λ − s)−1 where λ ∼ pJ (λ), and the R-trans−1
form is defined as RJ (ω) := G−1
with G−1
J (−ω) − ω
J (·)
being the inverse with respect to (w.r.t.) composition.
The setting recovers several problems in signal processing.
An example is recovery of non-uniform sparse signals from
noisy measurements in compressive sensing: Let J = 1 and
p1 (xn ; ρn ) = ρn q(xn ) + (1 − ρn )δ(xn )
(4)
for some distribution q(xn ). Then, x models a sparse signal
with non-uniform sparsity pattern whose non-zero entries are
distributed with q(xn ). Consequently, by setting u(vn ; cn ) =
cn |vn |, the estimator reduces to the weighted ℓ1 -norm minimization recovery scheme. For λ0 = 0, the setup recovers the
formerly studied noise-free case, e.g., [5, 8, 18], when λ ↓ 0.
In order to quantify the large-system performance of this
setting, we define the weighted distortion as follows.
Definition 1 (Weighted Distortion): Let wN ×1 enclose the
coefficients {wn }. The weighted distortion w.r.t. the distortion function d(·; ·) for a given w reads
N
D(x; x̂|w) :=
1X
wn E {d(xn ; x̂n )}.
N n=1
(5)
Moreover, the asymptotic weighted distortion is given by taking the limit N ↑ ∞, i.e., Dw := limN ↑∞ D(x; x̂|w).
The weighted distortion recovers various forms of recovery distortions. For instance, setting wn = 1 and d(xn ; x̂n ) =
|xn − x̂n |2 , Dw determines the asymptotic Mean Square Error (MSE). Moreover, it evaluates the average error probability by setting d(xn ; x̂n ) = 1 {xn = x̂n } with 1 {·} being the
indicator function. The main goal of this study is to derive the
weighted distortion in its generic form when N grows large.
3. ASYMPTOTIC PERFORMANCE
Invoking the replica method, Dw is derived in a closed form.
The derivations are briefly sketched in Section 5. For the sake
of compactness, we state the basic form of the result known
as the “Replica Symmetry (RS) solution”. Our derivations
are however in a general form enclosing “Replica Symmetry
Breaking (RSB) solutions”.
3.1. Asymptotic Weighted Distortion
Dw in the large-system limit can be expressed in terms of an
equivalent scalar system. For j ∈ [J], we define the scalar
estimator gjdec (·; c) which for given c and θ reads
gjdec (y; c) = argmin
v∈
X
1
(y − v)2 + uj (v; c)
2θ
(6)
gjdec (y; c) represents a estimator which recovers a scalar from
the single measurement y using the one-dimensional form of
MAP formulation in (2) with the weighting coefficient c and
estimation parameter θ. In order to state the result, we moreover define the effective noise variance θ0 and the equivalent
estimation parameter θ for some scalars χ and p as
h
χ i−1
λ
θ = RJ (− )
λ
i
h
χ i
χ −2 ∂ h
(λ0 χ − λp)RJ (− )
θ0 = RJ (− )
λ
∂χ
λ
(7a)
(7b)
where RJ (·) denotes the R-transform of pJ (t) defined in the
previous section. One should note that θ and θ0 are controlled
by χ and p and are functions of the true estimation parameter
λ, statistics of A and the true noise variance λ0 .
Proposition 1: Let z dec ∼ N (0, θ0 ), and for each n ∈ [N ],
define the decoupled estimation gn as
dec
(xn + z dec ; cn ).
gn := gj(n)
(8)
Then, under some assumptions1 , Dw is given by
(9)
Dw = hwn E {d (xn ; gn )}i[N ]
P
where we define hf (an )iN := |N|−1 n∈N f (an ). The variables p and χ which determine θ and θ0 are moreover calculated from the fixed-point equations
(10a)
p = E (gn − xn )2 [N ] ,
θ0
χ = E (gn − xn ) z dec
θ
[N ]
.
(10b)
Proof: The proof is briefly sketched in Section 5. The details
of the proof, however, are skipped due to the page limitation.
3.2. Asymmetric Decoupling Property
Proposition 1 determines the asymptotic weighted distortion by averaging the scalar systems shown in Fig. 1 over n
w.r.t. w. In fact by setting xn = xn and x̂n = gn in this
diagram, one observes that Dw is the weighted average of
input-output distortions. These scalar systems can be further
shown to describe input-output marginal distributions. This
1 These assumptions
are mainly replica continuity and the replica symmetry which are later introduced in Section 5.
z dec
xn
+
yn
gj(n) (·; cn )
x̂n
Fig. 1: Asymmetric Decoupling Property: The decoupled systems
are dependent on the index n in general.
observation states that the estimator exhibits the decoupling
property in the large-system limit. To illustrate this property,
let us denote the marginal joint distribution of (x̂n , xn ) with
qN (x̂n , xn ) where the subscript indicates the dependency of
the distribution on N . The asymptotic decoupling property
mainly claims that as N grows, qN (x̂n , xn ) converge to a
deterministic distribution described by the input-output distribution of the scalar system in Fig. 1. The previously studied
forms of the property, e.g., [19, 20], have considered identically distributed source entries, i.e., pj(n) (·; ρn ) = p(·; ρ)
and uj(n) (·; cn ) = u(·; c) for some constants ρ and c. For
this case, the limiting distribution is shown to be independent
of n, and thus, the equivalent scalar systems are the same.
The decoupled system derived in this paper, however, can
vary from one index to another. We therefore refer to this
form of decoupling as the “asymmetric decoupling property”
which recovers the previous “symmetric” forms. The property is stated in the following. The proof follows the moment
method and takes a similar path as in [16] with some modifications. It is however omitted for the sake of compactness.
Asymmetric Decoupling: For n ∈ [N ], (x̂n , xn ) converges
in distribution to the pair (x̂n , xn ) in Fig. 1 with gjdec (·; cn )
and z dec being given in Proposition 1.
4. APPLICATIONS OF THE MAIN RESULTS
The asymptotic results presented in Section 3 can be employed to investigate various estimation problems. In the sequel, we give some examples in compressive sensing.
4.1. Recovery of Non-uniform Sparse Signals
Stochastic signals with non-uniform sparsity patterns are described by our setting when J = 1 and the signal entries xn
are distributed as in (4). Several recovery schemes, some of
which have not been addressed in the literature, can then be
investigated by choosing corresponding utility functions. A
trivial approach is to let the utility function be
u(v; c) =
N
X
n=1
cn |vn |p .
(11)
Using Proposition 1, the large-system performance of these
recovery schemes can be studied w.r.t. various forms of distortions. Moreover, the optimal choices for {cn } can be found
in terms of the priors {ρn }, such that the average distortion
is minimized. This investigation widens the scope of analyses in [18] to noisy scenarios and various recovery schemes.
Moreover, it enables us to extend the recent study in [21] to
cases with prior information on the sparsity pattern. To discuss further the application of the results in recovery of nonuniform sparse signals, we consider the following example.
Example 1: Assume that x is a sparse-Gaussian signal with
a non-uniform sparsity pattern, i.e., J = 1 and the distribution of xn for n ∈ [N ] are given by p1 (xn ; ρn ) in (4) with
q(xn ) being the zero-mean and unit-variance Gaussian distribution. To recover the signal, we employ the weighted zeronorm recovery scheme which is given by setting u(vn ; cn ) =
cn 1 {vn 6= 0} in (2). Proposition 1 enables us to investigate the recovery performance in this case and also evaluate
the optimal choice of {cn } in terms of {ρn }. For the sake
of simplicity, consider the scenario in which A is an i.i.d.
matrix whose entries are zero-mean with variance 1/K. In
this case, pJ follows the Marcenko-Pastur law [22], and thus,
RJ (ω) = α(α − ω)−1 which implies θ = λ + α−1 χ and
θ0 = λ + α−1 p. Moreover,
(
yn |yn | > tn
(12)
gdec (yn ; cn ) =
0
|yn | ≤ tn
√
where tn := 2θcn . Consequently, the asymptotic distortion w.r.t. some given distortion function and w is determined
by Proposition 1. As (12) shows, weighted zero-norm recovery decouples asymptotically into a set of hard thresholding
operators whose threshold levels depend on weights cn . By
setting cn = 1 and ρn = ρ for all n ∈ [N ], the decoupled
setups reduce to the symmetric setups reported in [19, 20].
To investigate the performance of weighted zero-norm recovery numerically, we consider the configuration in which
(
ρ0 n ∈ [N/B],
ρn =
(13)
ρ1 n ∈ [N/B + 1 : N ],
for some ρ0 , ρ1 ∈ [0, 1] and some integer B being a divisor
of N . Here, [M : N ] denotes {M, . . . , N }. Moreover, we set
(
1 n ∈ [N/B],
cn =
(14)
c n ∈ [N/B + 1 : N ],
for some c. We denote
the asymptotic average MSE by
mse := limN ↑∞ E kx − x̂k2 /N . Moreover, for a given
mse0 , we define the threshold compression rate Rt (mse0 ) to
be the maximum possible inverse load factor α−1 = N/K
which results in mse ≤ mse0 . Fig. 2 shows the threshold
compression rate as a function of c for mse0 = −25 dB. The
curves have been plotted for ρ0 = 0.1 considering various
choices of ρ1 and B. The noise power is set to be λ0 = 0.01
and λ is tuned such that the MSE is minimized at each load
8
where F (β, h) = E {log Z(β, h)} /N . As evaluating a logarithmic expectation is not a trivial task, we invoke the replica
method. The main idea comes from the Riesz equality [23]
which states E {log x} = limm↓0 log E {xm } /m. Using this
equality, Dw is determined in terms of the mth moment of
Z(β, h). Nevertheless, the moments need to be determined
for real values of m which is still challenging. This challenge
is addressed by assuming “replica continuity” which means
that E {Z m (β, h)} analytically continues from m ∈ Z+ to
m ∈ R+ . After calculating the moments, Dw is given by
X
E wn d(v; xn )pβn (v|xn ) [N ] , (17)
Dw = lim lim
B = 5, ρ1 = 0.010
B = 5, ρ1 = 0.005
B = 7, ρ1 = 0.005
Rt (mse0 = −25 dB)
7
6
5
β↑∞ m↓0
1
1.5
2
2.5
3
c
Fig. 2: Rt (mse0 ) at mse0 = −25 dB versus the norm-weight of
the more sparse block in Example 1. As the figure shows, either the
growth in the size of the block or reduction in its sparsity increases
the degradation caused by uniform recovery, i.e., c = 1.
factor. As the figure shows, the optimal choice of c can significantly increase the threshold compression rate. The curves
moreover indicate that as B grows or ρ1 reduces the gap
between the optimal Rt (mse0 ), maximized over c, and the
threshold compression rate at c = 1 increases. This observation is due to the fact that the growth in B or the reduction in
ρ1 imposes more asymmetry into the setting, and therefore,
increases the loss caused by uniform recovery, i.e., c = 1.
4.2. Non-uniform Sparsity with Multiple Prior States
The non-uniform sparsity model can be extended to signals
with multiple prior states by considering J > 1. In this case,
pj(n) (xn ; ρn ) = ρn qj(n) (xn ) + (1 − ρn )δ(xn )
(15)
represents a signal with non-uniform sparsity pattern whose
non-zero entries are taken from multiple possible prior distributions. This model describes a scenario in which multiple
uncorrelated non-uniform sparse signals are simultaneously
measured, e.g., a network of independent sensors with different prior distributions. An efficient approach for signal
recovery in this case is to set uj(n) (vn ; cn ) = fj(n) (vn ) +
cn 1 {vn 6= 0} for some fj (v). Similar to the case with single state sources, the optimal choice of {cn } as well as the
asymptotic distortion is determined using Proposition 1.
5. LARGE-SYSTEM ANALYSIS
In this section, we briefly sketch the derivations based on the
2
replica method. Consider
PE(v) = ky − Avk /2λ + u(v; c),
and define Z(β, h) = v exp{−βE(v) + hN D(x; v|w)}.
One can then employ large deviation arguments and write
Dw = lim lim
N ↑∞ β↑∞
∂
F (β, h)|h=0 .
∂h
(16)
v
for v ∈ X , where xn is an
× 1 vector with all the entries
Pm
m
being xn and d(v; xn ) := a=1 d(va ; xn ); moreover,
m
e−β [(v−xn ) R(v−xn)+uj(n) (v;cn )]
. (18)
=P
−β [(v−xn )H R(v−xn )+uj(n) (v;cn )]
ve
P
with uj (v; cn ) := m
a=1 uj (va ; cn ), and R := TRJ (−βTQ)
1
λ0
for T= (Im −β 1m ) and some Qm×m which satisfies
2λ
λ
X
β
E pn (v|xn )(v − xn )(v − xn )H [N ] . (19)
Q=
H
pβn (v|xn )
v
In (17), the general replica solution is given. The explicit determination of Dw , however, needs Q to be found such that
(19) is fulfilled. To do so, we need to suppose a structure for
Q. The basic structure is given by RS as Q = χβ −1 Im +p1m
for some χ and p. By substituting Q in (17), Proposition 1 is
concluded after some lines of derivations. The RSB solutions
are further derived by extending the RS structure to
Q=
b
X
χ
Im +
cκ I mβ ⊗ 1 µβκ + p1m ,
µκ
β
κ=1
(20)
for some integer b. The derivations under RSB follow [16,
Appendix D] and are omitted due to the page limitation.
6. CONCLUSION
In this paper, we have studied the asymptotic performance of
a class of MAP-based signal recovery schemes when prior
information is available for reconstruction. Our analysis has
demonstrated an asymmetric version of the decoupling principle for these estimators which generalizes the formerly studied forms of MAP decoupling [19, 20]. Invoking the results,
we have investigated the performance of weighted zero-norm
minimization for recovery of a signal with non-uniform sparsity pattern. The results of this paper can be further employed
to study various problems. A particular example in compressive sensing is to extend the scope of investigations in [21] to
signals with non-uniform sparsity patterns and study the impact of replacing the ℓ1 -norm with an ℓp -norm in the weighted
norm minimization scheme for 0 ≤ p ≤ 1. Currently, the
work in this direction has been started.
7. REFERENCES
[1] Emmanuel J Candes, Michael B Wakin, and Stephen P
Boyd, “Enhancing sparsity by reweighted ℓ1 minimization,” Journal of Fourier analysis and applications, vol.
14, no. 5, pp. 877–905, 2008.
[2] David L Donoho, “Compressed sensing,” IEEE Trans.
on Inf. Theory, vol. 52, no. 4, pp. 1289–1306, 2006.
[3] Emmanuel J Candes, Justin K Romberg, and Terence
Tao, “Stable signal recovery from incomplete and inaccurate measurements,” Comm. on pure and applied
mathematics, vol. 59, no. 8, pp. 1207–1223, 2006.
[4] Namrata Vaswani and Wei Lu, “Modified-CS: Modifying compressive sensing for problems with partially
known support,” IEEE Trans. on Signal Processing, vol.
58, no. 9, pp. 4595–4607, 2010.
[5] M Amin Khajehnejad, Weiyu Xu, A Salman Avestimehr, and Babak Hassibi, “Weighted ℓ1 minimization
for sparse recovery with prior information,” in Inf. Theory (ISIT), IEEE International Symposium on. 2009, pp.
483–487.
[6] Laurent Jacques, “A short note on compressed sensing
with partially known signal support,” Signal Processing,
vol. 90, no. 12, pp. 3308–3312, 2010.
[7] Hassan Mansour and Özgür Yilmaz, “Support driven
reweighted ℓ1 minimization,” in Acoustics, Speech and
Signal Processing (ICASSP), IEEE International Conference on. 2012, pp. 3309–3312.
[8] Jonathan Scarlett, Jamie S Evans, and Subhrakanti
Dey, “Compressed sensing with prior information:
Information-theoretic limits and practical decoders,”
IEEE Trans. on Signal Processing, vol. 61, no. 2, pp.
427–439, 2013.
[9] Samet Oymak, M Amin Khajehnejad, and Babak Hassibi, “Recovery threshold for optimal weight ℓ1 minimization,” in Inf. Theory (ISIT), IEEE International
Symposium on. 2012, pp. 2032–2036.
[10] Bubacarr Bah and Rachel Ward, “The sample complexity of weighted sparse approximation.,” IEEE Trans.
Signal Processing, vol. 64, no. 12, pp. 3145–3155,
2016.
[11] Holger Rauhut and Rachel Ward, “Interpolation via
weighted ℓ1 minimization,” Applied and Computational
Harmonic Analysis, vol. 40, no. 2, pp. 321–351, 2016.
[12] Samuel Frederick Edwards and Phil W Anderson, “Theory of spin glasses,” Journal of Physics F: Metal
Physics, vol. 5, no. 5, pp. 965, 1975.
[13] Toshiyuki Tanaka, “A statistical-mechanics approach
to large-system analysis of CDMA multiuser detectors,”
IEEE Trans. on Inf. Theory, vol. 48, no. 11, pp. 2888–
2910, 2002.
[14] Antonia M Tulino, Giuseppe Caire, Sergio Verdu, and
Shlomo Shamai, “Support recovery with sparsely sampled free random matrices,” IEEE Trans. on Inf. Theory,
vol. 59, no. 7, pp. 4243–4271, 2013.
[15] Mikko Vehkaperä, Yoshiyuki Kabashima, and Saikat
Chatterjee, “Analysis of regularized LS reconstruction
and random matrix ensembles in compressed sensing,”
IEEE Trans. on Inf. Theory, vol. 62, no. 4, pp. 2100–
2124, 2016.
[16] Ali Bereyhi, Ralf R Müller, and Hermann SchulzBaldes,
“Statistical mechanics of MAP estimation: General replica ansatz,”
arXiv preprint
arXiv:1612.01980, 2016.
[17] Ali Bereyhi, Ralf R Müller, and Hermann SchulzBaldes, “Replica symmetry breaking in compressive
sensing,” in IEEE Inf. Theory and Applications Workshop (ITA). 2017, pp. 1–7.
[18] Toshiyuki Tanaka and Jack Raymond, “Optimal incorporation of sparsity information by weighted ℓ1 optimization,” in Information Theory (ISIT), IEEE Int. Sym,
on. 2010, pp. 1598–1602.
[19] Sundeep Rangan, Alyson K Fletcher, and Vivek Goyal,
“Asymptotic analysis of MAP estimation via the replica
method and applications to compressed sensing,” in
IEEE Trans. on Inf. Theory, 2012, pp. 1902–1923.
[20] Ali Bereyhi, Ralf Müller, and Hermann Schulz-Baldes,
“RSB decoupling property of MAP estimators,” in IEEE
Inf. Theory Workshop (ITW). 2016, pp. 379–383.
[21] Le Zheng, Arian Maleki, Haolei Weng, Xiaodong
Wang, and Teng Long, “Does ℓp -minimization outperform ℓ1 -minimization?,” IEEE Trans. on Information
Theory, 2017.
[22] Ralf R Müller, Giusi Alfano, Benjamin M Zaidel, and
Rodrigo de Miguel, “Applications of large random matrices in communications engineering,” arXiv preprint
arXiv:1310.5479, 2013.
[23] Frédéric Riesz, “Sur les valeurs moyennes des fonctions,” Journal of the London Mathematical Society,
vol. 1, no. 2, pp. 120–121, 1930.
| 7cs.IT
|
Harmonious Attention Network for Person Re-Identification
Wei Li1
Xiatian Zhu2
Queen Mary University of London1
arXiv:1802.08122v1 [cs.CV] 22 Feb 2018
{wei.li, s.gong}@qmul.ac.uk
Shaogang Gong1
Vision Semantics Ltd.2
[email protected]
Abstract
Existing person re-identification (re-id) methods either
assume the availability of well-aligned person bounding
box images as model input or rely on constrained attention selection mechanisms to calibrate misaligned images.
They are therefore sub-optimal for re-id matching in arbitrarily aligned person images potentially with large human
pose variations and unconstrained auto-detection errors. In
this work, we show the advantages of jointly learning attention selection and feature representation in a Convolutional
Neural Network (CNN) by maximising the complementary
information of different levels of visual attention subject to
re-id discriminative learning constraints. Specifically, we
formulate a novel Harmonious Attention CNN (HA-CNN)
model for joint learning of soft pixel attention and hard
regional attention along with simultaneous optimisation of
feature representations, dedicated to optimise person re-id
in uncontrolled (misaligned) images. Extensive comparative evaluations validate the superiority of this new HACNN model for person re-id over a wide variety of state-ofthe-art methods on three large-scale benchmarks including
CUHK03, Market-1501, and DukeMTMC-ReID.
Figure 1. Examples of attention selection in auto-detected person
bounding boxes used for person re-id matching.
problem of re-id attention selection within person bounding boxes. One common strategy is local patch calibration and saliency weighting in pairwise image matching
[43, 25, 46, 36]. However, these methods rely on handcrafted features without deep learning jointly more expressive feature representations and matching metric holistically
(end-to-end). A small number of attention deep learning
models for re-id have been recently developed for reducing the negative effect from poor detection and human pose
change [17, 42, 27]. Nevertheless, these deep methods implicitly assume the availability of large labelled training
data by simply adopting existing deep architectures with
high complexity in model design. Additionally, they often consider only coarse region-level attention whilst ignoring the fine-grained pixel-level saliency. Hence, these
techniques are ineffective when only a small set of labelled
data is available for model training whilst also facing noisy
person images of arbitrary misalignment and background
clutter.
In this work, we consider the problem of jointly deep
learning attention selection and feature representation for
optimising person re-id in a more lightweight (with less parameters) network architecture. The contributions of this
work are: (I) We formulate a novel idea of jointly learning
multi-granularity attention selection and feature representation for optimising person re-id in deep learning. To our
knowledge, this is the first attempt of jointly deep learning
multiple complementary attention for solving the person reid problem. (II) We propose a Harmonious Attention Con-
1. Introduction
Person re-identification (re-id) aims to search people
across non-overlapping surveillance camera views deployed
at different locations by matching person images. In practical re-id scenarios, person images are typically automatically detected for scaling up to large visual data [44, 18].
Auto-detected person bounding boxes are typically not optimised for re-id due to misalignment with background clutter, occlusion, missing body parts (Fig. 1). Additionally,
people (uncooperative) are often captured in various poses
across open space and time. These give rise to the notorious image matching misalignment challenge in cross-view
re-id [7]. There is consequently an inevitable need for attention selection within arbitrarily-aligned bounding boxes
as an integral part of model learning for re-id.
There are a few attempts in the literature for solving the
1
volutional Neural Network (HA-CNN) to simultaneously
learn hard region-level and soft pixel-level attention within
arbitrary person bounding boxes along with re-id feature
representations for maximising the correlated complementary information between attention selection and feature
discrimination. This is achieved by devising a lightweight
Harmonious Attention module capable of efficiently and
effectively learning different types of attention from the
shared re-id feature representation in a multi-task and endto-end learning fashion. (III) We introduce a cross-attention
interaction learning scheme for further enhancing the compatibility between attention selection and feature representation given re-id discriminative constraints. Extensive
comparative evaluations demonstrate the superiority of the
proposed HA-CNN model over a wide range of state-of-theart re-id models on three large benchmarks CUHK03 [18],
Market-1501 [44], and DukeMTMC-ReID [47].
2. Related Work
Most existing person re-id methods focus on supervised
learning of identity-discriminative information, including
ranking by pairwise constraints [23, 38], discriminative distance metric learning [13, 45, 40, 20, 41, 4], and deep learning [24, 18, 3, 39, 35, 19]. These methods assume that
person images are well aligned, which is largely invalid
given imperfect detection bounding boxes of changing human poses. To overcome this limitation, attention selection techniques have been developed for improving re-id
by localised patch matching [25, 46] and saliency weighting [36, 43]. These are inherently unsuitable by design to
cope with poorly aligned person images, due to their stringent requirement of tight bounding boxes around the whole
person and high sensitivity of the hand-crafted features.
Recently, a few attention deep learning methods have
been proposed to handle the matching misalignment challenge in re-id [17, 42, 27, 16]. The common strategy of
these methods is to incorporate a regional attention selection sub-network into a deep re-id model. For example,
Su et al. [27] integrate a separately trained pose detection
model (from additional labelled pose ground-truth) into a
part-based re-id model. Li et al. [17] design an end-to-end
trainable part-aligning CNN network for locating latent discriminative regions (i.e. hard attention) and subsequently
extract and exploit these regional features for performing
re-id. Zhao et al. [42] exploit the Spatial Transformer Network [11] as the hard attention model for searching re-id
discriminative parts given a pre-defined spatial constraint.
However, these models fail to consider the noisy information within selected regions at the pixel level, i.e. no soft
attention modelling, which can be important. While soft attention modelling for re-id is considered in [22], this model
assumes tight person boxes thus less suitable for poor detections.
The proposed HA-CNN model is designed particularly
to address the weaknesses of existing deep methods as
above by formulating a joint learning scheme for modelling
both soft and hard attention in a single re-id deep model.
This is the first attempt of modelling multi-level correlated
attention in deep learning for person re-id to our knowledge. In addition, we introduce cross-attention interaction
learning for enhancing the complementary effect between
different levels of attention subject to re-id discriminative
constraints. This is impossible to do for existing methods
due to their inherent single level attention modelling. We
show the benefits of joint modelling multi-level attention in
person re-id in our experiments. Moreover, we also design
an efficient attention CNN architecture for improving the
model deployment scalability, an under-studied but practically important issue for re-id.
3. Harmonious Attention Network
Given n training bounding box images I = {Ii }ni=1
from nid distinct people captured by non-overlapping camera views together with the corresponding identity labels as
Y = {yi }ni=1 (where yi ∈ [1, · · · , nid ]), we aim to learn
a deep feature representation model optimal for person reid matching under significant viewing condition variations.
To this end, we formulate a Harmonious Attention Convolutional Neural Network (HA-CNN) that aims to concurrently
learn a set of harmonious attention, global and local feature
representations for maximising their complementary benefit
and compatibility in terms of both discrimination power and
architecture simplicity. Typically, person parts location information is not provided in person re-id image annotation
(i.e. only weakly labelled without fine-grained). Therefore, the attention model learning is weakly supervised in
the context of optimising re-id performance. Unlike most
existing works that simply adopting a standard deep CNN
network typically with a large number of model parameters (likely overfit given small size labelled data) and high
computational cost in model deployment [15, 26, 30, 8], we
design a lightweight (less parameters) yet deep (maintaining strong discriminative power) CNN architecture by devising a holistic attention mechanism for locating the most
discriminative pixels and regions in order to identify optimal visual patterns for re-id. We avoid simply stacking
many CNN layers to gain model depth.
This is particularly critical for re-id where the label data
is often sparse (large models are more likely to overfit in
training) and the deployment efficiency is very important
(slow feature extraction is not scalable to large surveillance
video data).
HA-CNN Overview We consider a multi-branch network
architecture for our purpose. The overall objective of this
multi-branch scheme and the overall architecture composi-
160 × 64 × 3
80 × 32 × 𝑑&
80 × 32 × 32
32, 3×3,2
𝑑&
24 × 28 × 32
Inception-A
40× 16 × 𝑑&
𝑑&
shared
40× 16 × 𝑑'
𝑑'
HA
12 × 14 × 𝑑&
𝑑'
20× 8 × 𝑑'
20 × 8 × 𝑑(
𝑑(
HA
6 × 7 × 𝑑'
shared
𝑑(
shared
𝑑&
𝑑'
𝑑(
𝑑&
𝑑'
𝑑(
𝑑&
𝑑'
𝑑(
Inception-B
HA
Harmonious Attention
Addition
10 × 4 × 𝑑(
𝐿𝑜𝑠𝑠$
HA
512
3 × 4 × 𝑑(
𝐿𝑜𝑠𝑠)
512
Global Average Pooling
Fully-connected
Figure 2. The Harmonious Attention Convoluntional Neural Network. The symbol dl (l ∈ {1, 2, 3}) denotes the number of convolutional
filter in the corresponding Inception unit at the l-th block.
tion is to minimise the model complexity therefore reduce
the network parameter size whilst maintaining the optimal
network depth. The overall design of our HA-CNN architecture is shown in Fig. 2. This HA-CNN model contains two branches: (1) One local branch (consisting of T
streams of an identical structure): Each stream aims to learn
the most discriminative visual features for one of T local
image regions of a person bounding box image. (2) One
global branch: This aims to learn the optimal global level
features from the entire person image. For both branches,
we select the Inception-A/B units [39, 29] as the basic building blocks1 .
In particular, we used 3 Inception-A and 3 Inception-B
blocks for building the global branch, and 3 Inception-B
blocks for each local stream. The width (channel number)
of each Inception is denoted by d1 , d2 and d3 . The global
network ends with a global average pooling layer and a
fully-connected (FC) feature layer with 512 outputs. For the
local branch, we also use a 512-D FC feature layer which
fuses the global average pooling outputs of all streams. To
reduce the model parameter size, we share the first conv
layer between global and local branches and the samelayer Inceptions among all local streams. For our HA-CNN
model training, we utilise the cross-entropy classification
loss function for both global and local branches, which optimise person identity classification.
For attention selection within each bounding box of
some unknown misalignment, we consider a harmonious
attention learning scheme that aims to jointly learn a set of
complementary attention maps including hard (regional) attention for the local branch and soft (spatial/pixel-level and
channel/scale-level) attention for the global branch.
We further introduce a cross-attention interaction learning scheme between the local and global branches for further enhancing the harmony and compatibility degree whilst
simultaneously optimising per-branch discriminative fea1 This choice is independent of our model design and others can be
readily considered such as AlexNet [15], ResNet [8] and VggNet [26].
ture representations.
We shall now describe more details of each component
of the network design as follows.
ℎ ×𝑤 ×𝑐
𝜃
Reduce
ℎ×𝑤, 1
Tanh
1, 3×3, 2
𝑐
, 1×1, 1
𝑟
2𝑇
(d)
Resize
𝑐, 1×1, 1
1, 1×1, 1
(c)
(b)
1 ×1 ×𝑐
ℎ ×𝑤 ×1
𝑐, 1×1, 1
Sigmoid
(a)
(a) whole soft attention
(b) spatial attention
(c) channel attention
(d) hard attention
ℎ × 𝑤× 𝑐
Figure 3. The structure of each Harmonious Attention module
consists of (a) Soft Attention which includes (b) Spatial Attention
(pixel-wise) and (c) Channel Attention (scale-wise), and (d) Hard
Regional Attention (part-wise). Layer type is indicated by background colour: grey for convolutional (conv), brown for global
average pooling, and blue for fully-connected layers. The three
items in the bracket of a conv layer are: filter number, filter shape,
and stride. The ReLU [15] and Batch Normalisation (BN) [10]
(applied to each conv layer) are not shown for brevity.
3.1. Harmonious Attention Learning
Conceptually, our Harmonious Attention (HA) is a principled union of hard regional attention [11], soft spatial
[34] and channel attention [9]. This simulates functionally the dorsal and ventral attention mechanism of human
brain [33] in the sense of modelling soft and hard attention simultaneously. The soft attention learning aims at
selecting the fine-grained important pixels, while the hard
attention learning is dedicated to searching the coarse latent (weakly supervised) discriminative regions. They are
thus largely complementary with high compatibility to each
other in functionality. Intuitively, their combination can relieve the modelling burden of soft attention and resulting
in more discriminative and robust model learning from the
same (particularly small) training data. We propose a novel
Harmonious Attention joint learning strategy to unite the
three distinct types of attention with only a small number of
additional parameters. We take a block-wise (module-wise)
attention design, that is, each HA module is specifically optimised to attend the input feature representations at its own
level alone. In the CNN hierarchical framework, this naturally allows for hierarchical multi-level attention learning
to progressively refine the attention maps, in the spirit of
the divide and conquer design [5]. As a result, we can significantly reduce the attention search space (i.e. the model
optimisation complexity) whilst allow multi-scale selectiveness of hierarchical features to enrich the final feature representations. Such progressive and holistic attention modelling is both intuitive and essential for person re-id due to
that (1) the surveillance person images often have cluttered
background and uncontrolled appearance variations therefore the optimal attention patterns of different images can be
highly variable, and (2) a re-id model typically needs robust
(generalisable) model learning given very limited training
data (significantly less than common image classification
tasks). Next, we describe the design of our Harmonious Attention module in details.
(I) Soft Spatial-Channel Attention The input to a Harmonious Attention module is a 3-D tensor X l ∈ Rh×w×c
where h, w, and c denote the number of pixel in the height,
width, and channel dimensions respectively; and l indicates
the level of this module in the entire network (multiple such
modules). Soft spatial-channel attention learning aims to
produce a saliency weight map Al ∈ Rh×w×c of the same
size as X. Given the largely independent nature between
spatial (inter-pixel) and channel (inter-scale) attention, we
propose to learn them in a joint but factorised way as:
Al = S l × C l
(1)
where S l ∈ Rh×w×1 and C l ∈ R1×1×c represent the spatial
and channel attention maps, respectively. We perform the
attention tensor factorisation by designing a two-branches
unit (Fig. 3(a)): One branch to model the spatial attention S l (shared across the channel dimension), and another
branch to model the channel attention C l (shared across
both height and width dimensions).
By this design, we can compute efficiently the full soft
attention Al from C l and S l with a tensor multiplication.
Our design is more efficient than common tensor factorisation algorithms [14] since heavy matrix operations are eliminated.
(1) Spatial Attention We model the spatial attention by a
tiny (10 parameters) 4-layers sub-network (Fig. 3(b)). It
consists of a global cross-channel averaging pooling layer
(0 parameter), a conv layer of 3 × 3 filter with stride 2 (9
parameters), a resizing bilinear layer (0 parameter), and a
scaling conv layer (1 parameter). In particular, the global
averaging pooling, defined as,
c
S linput =
1X l
X
c i=1 1:h,1:w,i
(2)
is designed especially to compress the input size of the
subsequent conv layer with merely 1c times of parameters
needed. This cross-channel pooling is reasonable because
in our design all channels share the identical spatial attention map. We finally add the scaling layer for automatically
learning an adaptive fusion scale in order to optimally combining the channel attention described next.
(2) Channel Attention We model the channel attention by
2
a small (2 cr parameters, see more details below) 4-layers
squeeze-and-excitation sub-network (Fig. 3(c)). Specifically, we first perform a squeeze operation via an averaging
pooling layer (0 parameters) for aggregating feature information distributed across the spatial space into a channel
signature as
C linput =
h
w
1 XX l
X
h × w i=1 j=1 i,j,1:c
(3)
This signature conveys the per-channel filter response from
the whole image, therefore providing the complete information for the inter-channel dependency modelling in the
subsequent excitation operation, formulated as
C lexcitation = ReLU( W2ca × ReLU(W1ca C linput ))
c
2
(4)
c
2
where W1ca ∈ R r ×c ( cr parameters) and W2ca ∈ Rc× r ( cr
parameters) denote the parameter matrix of 2 conv layers in
order respectively, and r (16 in our implementation) represents the bottleneck reduction rate. Again, this bottleneck
design is for reducing the model parameter number from c2
2
2
(using one conv layer) to ( cr + cr ), e.g. only need 18 times
of parameters when r = 16.
For facilitating the combination of the spatial attention
and channel attention, we further deploy a 1×1× c convolution (c2 parameters) layer to compute blended full soft
attention after tensor multiplication. This is because the
spatial and channel attention are not mutually exclusive but
with a co-occurring complementary relationship. Finally,
we use the sigmoid operation (0 parameter) to normalise
the full soft attention into the range between 0.5 and 1.
Remarks Our model is similar to the Residual Attention
(RA) [34] and Squeeze-and-Excitation (SE) [9] concepts
but with a number of essential differences: (1) The RA
requires to learn a much more complex soft attention subnetwork which is not only computationally expensive but
𝜃
𝑭𝒈
Input
𝑯
Input
𝜃
Parts
(a) STN [11]
𝑭𝒍
𝑯/𝑭𝒈
Parts
𝑭𝒍
(b) HA-CNN Hard Attention
Figure 4. Schematic comparison between (a) STN [11] and (b)
HA-CNN Hard Attention. Global feature and hard attention are
jointly learned in a multi-task design. “H”: Hard attention module; “Fg ”: Global feature module; “Fg ”: Local feature module.
also less discriminative when the training data size is small
typical in person re-id. (2) The SE considers only the channel attention and implicitly assumes non-cluttered background, therefore significantly restricting its suitability to
re-id tasks under cluttered surveillance viewing conditions.
(3) Both RA and SE consider no hard regional attention
modelling, hence lacking the ability to discover the correlated complementary benefit between soft and hard attention learning.
(II) Hard Regional Attention The hard attention learning
aims to locate latent (weakly supervised) discriminative T
regions/parts (e.g. human body parts) in each input image at
the l-th level. We model this regional attention by learning
a transformation matrix as:
s
0 tx
Al = h
(5)
0 sw ty
which allows for image cropping, translation, and isotropic
scaling operations by varying two scale factors (sh , sw ) and
the 2-D spatial position (tx , ty ). We use pre-defined region
size by fixing sh and sw for limiting the model complex.
Therefore, the effective modelling part of Al is only tx and
ty , with the output dimension as 2×T (T the region number). To perform this learning, we introduce a simple 2layers (2×T ×c parameters) sub-network (Fig. 3(d)). We
exploit the first layer output (a c-D vector) of the channel
attention (Eq. (3)) as the first FC layer (2 × T × c parameters) input for further reducing the parameter size while
sharing the available knowledge in spirit of the multi-task
learning principle [6]. The second layer (0 parameter) performs a tanh scaling (the range of [−1, 1]) to convert the
region position parameters into the percentage so as to allow for positioning individual regions outside of the input
image boundary. This specially takes into account the cases
that only partial person is detected sometimes. Note that,
unlike the soft attention maps that are applied to the input
feature representation X l , the hard regional attention is enforced on that of the corresponding network block to generate T different parts which are subsequently fed into the
corresponding streams of the local branch (see the dashed
arrow on the top of Fig 2).
Remarks The proposed hard attention modelling is conceptually similar to the Spatial Transformer Network (STN)
[11] because both are designed to learn a transformation
matrix for discriminative region identification. However,
they differ significantly in design: (1) The STN attention
is network-wise (one level of attention learning) whilst our
HA is module-wise (multiple levels of attention learning).
The latter not only eases the attention modelling complexity (divide-and-conquer design) and but also provides additional attention refinement in a sequential manner. (2)
The STN utilises a separate large sub-network for attention modelling whilst the HA-CNN exploits a much smaller
sub-network by sharing the majority model learning with
the target-task network using a multi-task learning design
(Fig. 4), therefore superior in both higher efficiency and
lower overfitting risk. (3) The STN considers only hard attention whilst HA-CNN models both soft and hard attention
in an end-to-end fashion so that additional complementary
benefits are exploited.
(III) Cross-Attention Interaction Learning Given the
joint learning of soft and hard attention above, we further
consider a cross-attention interaction mechanism for enriching their joint learning harmony by interacting the attended
local and global features across branches. Specifically, at
(l,k)
the l-th level, we utilise the global-branch feature XG
of the k-th region to enrich the corresponding local-branch
(l,k)
feature XL by tensor addition as
(l,k)
X̃L
(l,k)
= XL
(l,k)
+ XG
(6)
(l,k)
where XG is computed by applying the hard regional attention of the (l + 1)-th level’s HA attention module (see
the dashed arrow in Fig. 2). By doing so, we can simultaneously reduce the complexity of the local branch (fewer
layers) since the learning capability of the global branch
can be partially shared. During model training by backpropagation, the global branch takes gradients from both
the global and local branches as
(l)
(l)
∆WG =
∂LG ∂XG
(l)
∂XG
(l)
∂WG
+
T
X
∂LL
(l,k)
k=1 ∂ X̃L
(l,k)
∂ X̃L
(l)
∂WG
(7)
Therefore, the global LG and local LL loss quantities are
(l)
concurrently utilised in optimising the parameters WG of
the global branch. As such, the learning of the global branch
is interacted with that of the local branch at multiple levels,
whilst both are subject to the same re-id optimisation constraint.
Remarks By design, cross-attention interaction learning is
subsequent to and complementary with the harmonious attention joint reasoning above. Specifically, the latter learns
soft and hard attention from the same input feature representations to maximise their compatibility (joint attention generation), whilst the former optimises the correlated complementary information between attention refined global and
local features under the person re-id matching constraint
(joint attention application). Hence, the composition of
both forms a complete process of joint optimisation of attention selection for person re-id.
3.2. Person Re-ID by HA-CNN
Given a trained HA-CNN model, we obtain a 1,024-D
joint feature vector (deep feature representation) by concatenating the local (512-D) and the global (512-D) feature vectors. For person re-id, we deploy this 1,024-D deep
feature representation using only a generic distance metric
without any camera-pair specific distance metric learning,
e.g. the L2 distance. Specifically, given a test probe image I p from one camera view and a set of test gallery images {Iig } from other non-overlapping camera views: (1)
We first compute their corresponding 1,024-D feature vectors by forward-feeding the images to a trained HA-CNN
model, denoted as xp = [xpg ; xpl ] and {xgi = [xgg ; xgl ]}. (2)
We then compute L2 normalisation on the global and local features, respectively. (3) Lastly, we compute the crosscamera matching distances between xp and xgi by the L2
distance. We then rank all gallery images in ascendant order by their L2 distances to the probe image. The probabilities of true matches of probe person images in Rank-1 and
among the higher ranks indicate the goodness of the learned
HA-CNN deep features for person re-id tasks.
4. Experiments
(a) CUHK03
(b) Market-1501
(c) DukeMTMC
Figure 5. Example cross-view matched pairs from three datasets.
Datasets and Evaluation Protocol For evaluation, we selected three large-scale person re-id benchmarks, Market1501 [37], DukeMTMC-ReID [47] and CUHK03 [18]. Figure 5 shows several example person bounding box images.
We adopted the standard person re-id setting including the
training/test ID split and test protocol (Table 1). For performance measure, we use the cumulative matching characteristic (CMC) and mean Average Precision (mAP) metrics.
Table 1. Re-id evaluation protocol. TS: Test Setting; SS: SingleShot; MS: Multi-Shot. SQ: Single-Query; MQ: Multi-Query.
Dataset
# ID # Train # Test# Image Test Setting
CUHK03
1,467 767
Market-1501 1,501 751
DukeMCMT-ReID 1,402 702
700 14,097
750 32,668
702 36,411
SS
SQ/MQ
SQ
Implementation Details We implemented our HA-CNN
model in the Tensorflow [1] framework. All person images
are resized to 160×64. For HA-CNN architecture, we set the
width of Inception units at the 1st /2nd /3rd levels as: d1 = 128,
d2 = 256 and d3 = 384. Following [19], we use T = 4 regions for hard attention, e.g. a total of 4 local streams. In
each stream, we fix the size of three levels of hard attention
as 24×28, 12×14 and 6×7. For model optimisation, we use
the ADAM [12] algorithm at the initial learning rate 5×10−4
with the two moment terms β1 = 0.9 and β2 = 0.999.
We set the batch size to 32, epoch to 150, momentum to
0.9. Note, we do not adopt any data argumentation methods (e.g. scaling, rotation, flipping, and colour distortion),
neither model pre-training. Existing deep re-id methods
typically benefit significantly from these operations at the
price of not only much higher computational cost but also
notoriously difficult and time-consuming model tuning.
4.1. Comparisons to State-of-the-Art Methods
Evaluation on Market-1501 We evaluated HA-CNN
against 13 existing methods on Market-1501. Table 2 shows
the clear performance superiority of HA-CNN over all stateof-the-arts with significant Rank-1 and mAP advantages.
Specifically, HA-CNN outperforms the 2nd best model
JLML (pre-defined hard attention based) by 6.1% (91.285.1) (SQ) and 4.1% (93.8-89.7) (MQ) in Rank-1; 10.2%
(75.7-65.5) (SQ) and 8.3% (82.8-74.5) (MQ) in mAP. Compared to the only soft attention alternative HPN, our model
improves the Rank-1 by 14.3% (91.2-76.9) (SQ). This indicates the superiority of our factorised spatial and channel
soft attention modelling over HPN’s multi-directional attention mechanism. HA-CNN also surpasses recent hard attention re-id methods (MSCAN, DLPA and PDC), boosting the
Rank-1 by 10.9%, 10.2% and 7.1%, mAP by 18.2%, 12.3%
and 12.3% (SQ), respectively. These validate the significant advantage of our harmonious soft/hand attention joint
and interaction learning over existing methods replying on
either hard or soft attention at a single level.
Evaluation on DukeMTMC-ReID We evaluated HACNN on the recently released DukeMTMC-ReID dataset2 .
Compared to Market-1501, person images from this benchmark have more variations in resolution and background
due to wider camera views and more complex scene layout,
therefore presenting a more challenging re-id task. Table 3
shows that HA-CNN again outperforms all compared stateof-the-arts with clear accuracy advantages, surpassing the
2nd best SVDNet-ResNet50 (without attention modelling)
by 3.8% (80.5-76.7) in Rank-1 and 7.0% (63.8-56.8) in
mAP. This suggests the importance of attention modelling
in re-id and the efficacy of our attention joint learning approach in a more challenging re-id scenario. Importantly,
the performance advantage by our method is achieved at a
2 Only a small number of methods (see Table 3) have been evaluated
and reported on DukeMTMC-ReID.
Table 2. Market-1501 evaluation. 1st /2nd best in red/blue.
Query Type
Measure (%)
XQDA[20]
SCS[2]
DNS[41]
CRAFT[4]
CAN[21]
S-LSTM[32]
G-SCNN[31]
HPN [22]
SVDNet [28]
MSCAN [17]
DLPA [42]
PDC [27]
JLML [19]
HA-CNN
Single-Query
R1
mAP
43.8
22.2
51.9
26.3
61.0
35.6
68.7
42.3
60.3
35.9
65.8
39.5
76.9
82.3
62.1
80.3
57.5
81.0
63.4
84.1
63.4
85.1
65.5
91.2
75.7
Multi-Query
R1
mAP
54.1
28.4
71.5
46.0
77.0
50.3
72.1
47.9
61.6
35.3
76.0
48.4
86.8
66.7
89.7
74.5
93.8
82.8
st
nd
Table 3. DukeMTMC-ReID evaluation. 1 /2 best in red/blue.
Measure (%)
BoW+KISSME [37]
LOMO+XQDA [20]
ResNet50 [8]
ResNet50+LSRO [47]
JLML [19]
SVDNet-CaffeNet [28]
SVDNet-ResNet50 [28]
HA-CNN
R1
25.1
30.8
65.2
67.7
73.3
67.6
76.7
80.5
mAP
12.2
17.0
45.0
47.1
56.4
45.8
56.8
63.8
lower model training and test cost through an much easier
training process. For example, the performance by SVDNet relies on the heavy ResNet50 CNN model (23.5 million
parameters) with the need for model pre-training on the ImageNet data (1.2 million images), whilst HA-CNN has only
2.7 million parameters with no data augmentation.
Evaluation on CUHK03 We evaluated HA-CNN on both
manually labelled and auto-detected (more misalignment)
person bounding boxes of the CUHK03 benchmark. We
utilise the 767/700 identity split rather than 1367/100 since
the former defines a more realistic and challenging reid task. In this setting, the training set is small with
only about 7,300 images (versus 12,936/16,522 in Market1501/DukeMCMT-ReID). This generally imposes a harder
challenge to deep models, particularly when our HA-CNN
does not benefit from any auxiliary data pre-training (e.g.
ImageNet) nor data augmentation. Table 4 shows that HACNN still achieves the best re-id accuracy, outperforming
hand-crafted feature based methods significantly and deep
competitors less so. Our model achieves a small margin
(+0.2% in Rank-1 and +1.3%) over the best alternative
SVDNet-ResNet50 on the detected set. However, it is worth
pointing out that SVDNet-ResNet50 benefits additionally
from not only large ImageNet pre-training but also a much
Table 4. CUHK03 evaluation. The setting is 767/700 training/test
split. 1st /2nd best in red/blue.
Measure (%)
BoW+XQDA [37]
LOMO+XQDA [20]
IDE-C [48]
IDE-C+XQDA [48]
IDE-R [48]
IDE-R+XQDA [48]
SVDNet-CaffeNet [28]
SVDNet-ResNet50 [28]
HA-CNN
Labelled
R1 mAP
7.9
7.3
14.8 13.6
15.6 14.9
21.9 20.0
22.2 21.0
32.0 29.6
44.4 41.0
Detected
R1 mAP
6.4
6.4
12.8 11.5
15.1 14.2
21.1 19.0
21.3 19.7
31.1 28.2
27.7 24.9
41.5 37.3
41.7 38.6
Table 5. Evaluating individual types of attention in our HA model.
Setting: SQ. SSA: Soft Spatial Attention; SCA: Soft Channel Attention; HRA: Hard Regional Attention.
Dataset
Metric (%)
No Attention
SSA
SCA
SSA+SCA
HRA
All
Market-1501
R1
mAP
84.7
65.3
85.5
65.8
86.8
67.9
88.5
70.2
88.2
71.0
91.2
75.7
DukeMTMC-ReID
R1
mAP
72.4
53.4
73.9
54.8
73.7
53.5
76.1
57.2
75.3
58.4
80.5
63.8
larger network and more complex training process. In contrast, HA-CNN is much more lightweight on parameter size
with the advantage of easy training and fast deployment.
This shows that our attention joint learning can be a better replacement of existing complex networks with timeconsuming model training.
4.2. Further Analysis and Discussions
Effect of Different Types of Attention We further evaluated the effect of each individual attention component in our
HA model: Soft Spatial Attention (SSA), Soft Channel Attention (SCA), and Hard Regional Attention (HRA). Table 5
shows that: (1) Any of the three attention in isolation brings
person re-id performance gain; (2) The combination of SSA
and SCA gives further accuracy boost, which suggests the
complementary information between the two soft attention
discovered by our model; (3) When combining the hard and
soft attention, another significant performance gain is obtained. This shows that our method is effective in identifying and exploiting the complementary information between
coarse hard attention and fine-grained soft attention.
Effect of Cross-Attention Interaction Learning We also
evaluated the benefit of cross-attention interaction learning
(CAIL) between global and local branches. Table 6 shows
that CAIL has significant benefit to re-id matching, improving the Rank-1 by 4.6%(91.2-86.6) / 6.5%(80.5-74.0), mAP
by 9.5%(75.7-66.2) / 8.4%(63.8-55.4) on Market-1501 /
Table 6. Evaluating cross-attention interaction learning (CAIL).
Setting: SQ.
Dataset
Metric (%)
Market-1501
R1
mAP
DukeMTMC-ReID
R1
mAP
w/o CAIL
w/ CAIL
86.6
91.2
74.0
80.5
66.2
75.7
55.4
63.8
DukeMTMC-ReID, respectively. This validates our design
is rational that it is necessary to jointly learn the attended
feature representations across soft and hard attention subject to the same re-id label constraint.
Effect of Joint Local and Global Features We evaluated
the effect of joint local and global features by comparing their individual re-id performances against that of the
joint feature. Table 7 shows: (1) Either feature representation alone is already very discriminative for person re-id.
For instance, the global HA-CNN feature outperforms the
best alternative JLML [19] (Table 2) by 4.8%(89.9-85.1) in
Rank-1 and by 7.0%(72.5-65.5) in mAP (SQ) on Market1501. (2) A further performance gain is obtained by joining
the two representations, yielding 6.1%(91.2-85.1) in Rank1 boost and 10.2%(75.7-65.5) in mAP increase. Similar
trends are observed on the DukeMCMT-ReID (Table 3).
These validate the complementary effect of jointly learning
local and global features in harmonious attention context by
our HA-CNN model.
Table 7. Evaluating global-level and local-level features. Setting:
SQ.
Dataset
Metric (%)
Global
Local
Global+Local
Market-1501
R1
mAP
DukeMTMC-ReID
R1
mAP
89.9
88.9
91.2
78.9
77.3
80.5
72.5
71.7
75.7
60.0
59.5
63.8
Visualisation of Harmonious Attention We visualise both
learned soft attention and hard attention at three different
levels of HA-CNN. Figure 6 shows: (1) Hard attention
localises four body parts well at all three levels, approximately corresponding to head+shoulder (red), upper-body
(blue), upper-leg (green) and lower-leg (violet). (2) Soft attention focuses on the discriminative pixel-wise selections
progressively in spatial localisation, e.g. attending hierarchically from the global whole body by the 1st -level spatial
SA (c) to local salient parts (e.g. object associations) by
the 3rd -level spatial SA (g). This shows compellingly the
effectiveness of joint soft and hard attention learning.
Model Complexity We compare the proposed HA-CNN
model with four popular CNN architectures (Alexnet [15],
VGG16 [26], GoogLeNet [30], and ResNet50 [8]) in model
size and complexity. Table 8 shows that HA-CNN has the
smallest model size (2.7 million parameters) and the 2nd
smallest FLOPs (1.09 × 109 ) and yet, still retains the 2nd
deepest structure (39).
(f) (g)
(a) (b) (c) (d) (e)
Figure 6. Visualisation of our harmonious attention in person re-id.
From left to right, (a) the original image, (b) the 1st -level of HA,
(c) the 1st -level of SA, (d) the 2nd -level of HA, (e) the 2nd -level of
SA, (f) the 3rd level of HA, (g) the 3rd -level of SA.
Table 8. Comparisons of model size and complexity. FLOPs: the
number of FLoating-point OPerations; PN: Parameter Number.
Model
AlexNet [15]
VGG16 [26]
ResNet50 [8]
GoogLeNet [30]
JLML
HA-CNN
FLOPs
7.25×108
1.55×1010
3.80×109
1.57×109
1.54×109
1.09×109
PN (million)
58.3
134.2
23.5
6.0
7.2
2.7
Depth
7
16
50
22
39
39
5. Conclusion
In this work, we presented a novel Harmonious Attention
Convolutional Neural Network (HA-CNN) for joint learning of person re-identification attention selection and feature representations in an end-to-end fashion. In contrast to
most existing re-id methods that either ignore the matching
misalignment problem or exploit stringent attention learning algorithms, the proposed model is capable of extracting/exploiting multiple complementary attention and maximising their latent complementary effect for person re-id in
a unified lightweight CNN architecture. This is made possible by the Harmonious Attention module design in combination with a two-branches CNN architecture. Moreover,
we introduce a cross-attention interaction learning mechanism to further optimise joint attention selection and reid feature learning. Extensive evaluations were conducted
on three re-id benchmarks to validate the advantages of the
proposed HA-CNN model over a wide range of state-of-theart methods on both manually labelled and more challenging auto-detected person images. We also provided detailed
model component analysis and discussed HA-CNN’s model
complexity as compared to popular alternatives.
References
[1] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean,
M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. Tensorflow: A system for large-scale machine learning. 6
[2] D. Chen, Z. Yuan, B. Chen, and N. Zheng. Similarity learning with spatial constraints for person re-identification. In
CVPR, 2016. 7
[3] W. Chen, X. Chen, J. Zhang, and K. Huang. A multi-task
deep network for person re-identification. In AAAI, 2017. 2
[4] Y.-C. Chen, X. Zhu, W.-S. Zheng, and J.-H. Lai. Person reidentification by camera correlation aware feature augmentation. IEEE TPAMI, 2017. 2, 7
[5] T. H. Cormen. Introduction to algorithms. MIT press, 2009.
4
[6] T. Evgeniou and M. Pontil. Regularized multi–task learning.
In SIGKDD, 2004. 5
[7] S. Gong, M. Cristani, S. Yan, and C. C. Loy. Person reidentification. Springer, January 2014. 1
[8] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning
for image recognition. In CVPR, 2016. 2, 3, 7, 8
[9] J. Hu, L. Shen, and G. Sun. Squeeze-and-excitation networks. arXiv, 2017. 3, 4
[10] S. Ioffe and C. Szegedy. Batch normalization: Accelerating
deep network training by reducing internal covariate shift. In
ICML, pages 448–456, 2015. 3
[11] M. Jaderberg, K. Simonyan, A. Zisserman, et al. Spatial
transformer networks. In NIPS, pages 2017–2025, 2015. 2,
3, 5
[12] D. Kingma and J. Ba. Adam: A method for stochastic optimization. In ICLR, 2015. 6
[13] M. Koestinger, M. Hirzer, P. Wohlhart, P. M. Roth, and
H. Bischof. Large scale metric learning from equivalence
constraints. In CVPR, 2012. 2
[14] T. G. Kolda and B. W. Bader. Tensor decompositions and
applications. SIAM review, 51(3):455–500, 2009. 4
[15] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
NIPS, pages 1097–1105, 2012. 2, 3, 8
[16] X. Lan, H. Wang, S. Gong, and X. Zhu. Deep reinforcement
learning attention selection for person re-identification. In
BMVC, 2017. 2
[17] D. Li, X. Chen, Z. Zhang, and K. Huang. Learning deep
context-aware features over body and latent parts for person
re-identification. In CVPR, 2017. 1, 2, 7
[18] W. Li, R. Zhao, T. Xiao, and X. Wang. Deepreid: Deep filter
pairing neural network for person re-identification. In CVPR,
2014. 1, 2, 6
[19] W. Li, X. Zhu, and S. Gong. Person re-identification by deep
joint learning of multi-loss classification. In IJCAI, 2017. 2,
6, 7, 8
[20] S. Liao, Y. Hu, X. Zhu, and S. Z. Li. Person re-identification
by local maximal occurrence representation and metric
learning. In CVPR, 2015. 2, 7
[21] H. Liu, J. Feng, M. Qi, J. Jiang, and S. Yan. End-to-end
comparative attention networks for person re-identification.
IEEE TIP, 2017. 7
[22] X. Liu, H. Zhao, M. Tian, L. Sheng, J. Shao, S. Yi, J. Yan,
and X. Wang. Hydraplus-net: Attentive deep features for
pedestrian analysis. In ICCV, 2017. 2, 7
[23] S. Paisitkriangkrai, C. Shen, and A. van den Hengel. Learning to rank in person re-identification with metric ensembles.
In CVPR, 2015. 2
[24] X. Qian, Y. Fu, Y.-G. Jiang, T. Xiang, and X. Xue. Multiscale deep learning architectures for person re-identification.
In ICCV, 2017. 2
[25] Y. Shen, W. Lin, J. Yan, M. Xu, J. Wu, and J. Wang. Person
re-identification with correspondence structure learning. In
ICCV, 2015. 1, 2
[26] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. In ICLR, 2015.
2, 3, 8
[27] C. Su, J. Li, S. Zhang, J. Xing, W. Gao, and Q. Tian. Posedriven deep convolutional model for person re-identification.
In ICCV, 2017. 1, 2, 7
[28] Y. Sun, L. Zheng, W. Deng, and S. Wang. Svdnet for pedestrian retrieval. In ICCV, 2017. 7
[29] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. A. Alemi.
Inception-v4, inception-resnet and the impact of residual
connections on learning. In AAAI, 2017. 3
[30] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed,
D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich.
Going deeper with convolutions. In CVPR, 2015. 2, 8
[31] R. R. Varior, M. Haloi, and G. Wang. Gated siamese
convolutional neural network architecture for human reidentification. In ECCV, 2016. 7
[32] R. R. Varior, B. Shuai, J. Lu, D. Xu, and G. Wang. A
siamese long short-term memory architecture for human reidentification. In ECCV, 2016. 7
[33] S. Vossel, J. J. Geng, and G. R. Fink. Dorsal and ventral
attention systems: distinct neural circuits but collaborative
roles. The Neuroscientist, 20(2):150–159, 2014. 3
[34] F. Wang, M. Jiang, C. Qian, S. Yang, C. Li, H. Zhang,
X. Wang, and X. Tang. Residual attention network for image
classification. In CVPR, 2017. 3, 4
[35] F. Wang, W. Zuo, L. Lin, D. Zhang, and L. Zhang. Joint
learning of single-image and cross-image representations for
person re-identification. In CVPR, 2016. 2
[36] H. Wang, S. Gong, and T. Xiang. Unsupervised learning
of generative topic saliency for person re-identification. In
BMVC, 2014. 1, 2
[37] H. Wang, S. Gong, and T. Xiang. Highly efficient regression
for scalable person re-identification. In BMVC, 2016. 6, 7
[38] T. Wang, S. Gong, X. Zhu, and S. Wang. Person reidentification by discriminative selection in video ranking.
IEEE TPAMI, 2016. 2
[39] T. Xiao, H. Li, W. Ouyang, and X. Wang. Learning deep feature representations with domain guided dropout for person
re-identification. In CVPR, 2016. 2, 3
[40] F. Xiong, M. Gou, O. Camps, and M. Sznaier. Person reidentification using kernel-based metric learning methods. In
ECCV. 2014. 2
[41] L. Zhang, T. Xiang, and S. Gong. Learning a discriminative
null space for person re-identification. In CVPR, 2016. 2, 7
[42] L. Zhao, X. Li, J. Wang, and Y. Zhuang. Deeply-learned
part-aligned representations for person re-identification. In
ICCV, 2017. 1, 2, 7
[43] R. Zhao, W. Ouyang, and X. Wang. Unsupervised salience
learning for person re-identification. In CVPR, 2013. 1, 2
[44] L. Zheng, L. Shen, L. Tian, S. Wang, J. Wang, and Q. Tian.
Scalable person re-identification: A benchmark. In ICCV,
2015. 1, 2
[45] W.-S. Zheng, S. Gong, and T. Xiang. Re-identification by
relative distance comparison. IEEE TPAMI, pages 653–668,
March 2013. 2
[46] W.-S. Zheng, X. Li, T. Xiang, S. Liao, J. Lai, and S. Gong.
Partial person re-identification. In ICCV, pages 4678–4686,
2015. 1, 2
[47] Z. Zheng, L. Zheng, and Y. Yang. Unlabeled samples generated by gan improve the person re-identification baseline in
vitro. In ICCV, 2017. 2, 6, 7
[48] Z. Zhong, L. Zheng, D. Cao, and S. Li. Re-ranking person
re-identification with k-reciprocal encoding. In CVPR, 2017.
7
| 1cs.CV
|
1
Opinion Dynamics in Social Networks with Hostile
Camps: Consensus vs. Polarization
arXiv:1508.05034v1 [cs.SY] 20 Aug 2015
Anton V. Proskurnikov, Alexey Matveev and Ming Cao
Abstract—Most of the distributed protocols for multi-agent
consensus assume that the agents are mutually cooperative and
“trustful”, and so the couplings among the agents bring the values
of their states closer. Opinion dynamics in social groups, however,
require beyond these conventional models due to ubiquitous
competition and distrust between some pairs of agents, which
are usually characterized by repulsive couplings and may lead
to clustering of the opinions. A simple yet insightful model of
opinion dynamics with both attractive and repulsive couplings
was proposed recently by C. Altafini, who examined first-order
consensus algorithms over static signed graphs. This protocol
establishes modulus consensus, where the opinions become the
same in modulus but may differ in signs. In this paper, we extend
the modulus consensus model to the case where the network
topology is an arbitrary time-varying signed graph and prove
reaching modulus consensus under mild sufficient conditions of
uniform connectivity of the graph. For cut-balanced graphs,
not only sufficient, but also necessary conditions for modulus
consensus are given.
Index Terms—Opinion dynamics, consensus, clustering, agents
I. I NTRODUCTION
For multi-agent networks, the striking phenomenon of
global consensus caused by only local interactions has attracted long-standing interest from the research community.
The interest is motivated by numerous natural phenomena and
engineering designs related to reaching synchrony or agreement among the agents. Examples include, but not limited
to, intelligence of large biological populations and multi-robot
teams. We refer the reader to [1]–[3] for excellent surveys of
recent research on consensus protocols and their applications,
as well as historical milestones.
Starting from the DeGroot algorithm of “iterative pooling” [4] for distributed decision making, many consensus
algorithms were based on the principle of contraction: every
The work was supported in part by the European Research Council
(ERCStG- 307207), St. Petersburg State University, grant 6.38.230.2015 and
RFBR, grants 13-08-01014 and 14-08-01015. Lemma 13 was obtained by
A.S. Matveev under sole support of Russian Science Fund (RSF) grant 1421-00041 at St. Petersburg State University. Theorems 5 and 6 were obtained
by A.V. Proskurnikov under sole support of RSF grant 14-29-00142 at IPME
RAS. The results were partly reported on IEEE Multiconference on Systems
and Control MSC 2014 (Antibes, France) and IEEE Conference on Decision
and Control CDC 2014 (Los Angeles, CA, USA).
A.V. Proskurnikov is with ENTEG, Faculty of Mathematics and Natural
Sciences, University of Groningen, Groningen, the Netherlands and also with
St. Petersburg State University, ITMO University and Institute for Problems
of Mechanical Engineering of Russian Academy of Sciences (IPME RAS),
St.Petersburg, Russia; [email protected]
A. Matveev is with St. Petersburg State University, St. Petersburg, Russia; [email protected]
M. Cao is with ENTEG, Faculty of Mathematics and Natural Sciences,
University of Groningen, Groningen, The Netherlands; [email protected]
agent’s state constantly evolves to the relative interior of
the convex hull spanned by its own and neighbors’ states.
Hence, the convex hull spanned by the states of the agents,
driven by such a protocol, is shrinking over time. Based on
the Lyapunov-like properties of this convex hull [5], [6] or
relevant results on convergence of infinite products of stochastic matrices [1], [2], [7], stability properties of contracting
iterations were examined intensively with special attention on
the effect of time-varying interaction topologies. Necessary
and sufficient conditions for consensus under bidirectional [5],
[8], [9] and cut-balanced graphs [10] boil down to repeated
joint connectivity of the network. For general directed graphs
the sufficient condition of uniform quasi-strong connectivity
(UQSC) [6], is considered to be “the weakest assumption
on the graph connectivity such that consensus is guaranteed
for arbitrary initial conditions” [11]. This common belief has
recently been confirmed by results in [12], [13] stating that
the UQSC is necessary and sufficient for robust consensus
and consensus with exponential convergence. Many high-order
consensus algorithms either extend their first-order counterparts [1], [3] or are squarely based on them [14].
Unlike teams of agents that achieve a common goal due to
cooperation, networks where agents can both cooperate and
compete (sometimes referred to as coopetitive networks [15],
[16]) still demand more thorough mathematically rigorous
analysis. In social networks, competition, antagonism and
distrust between social actors and their groups are ubiquitous
[17], [18], which are usually modeled by repulsive couplings
or negative ties [19] among the agents. A specific example of
such couplings observed in dyadic interactions, is reactance
[20] which leads to boomerang effects, first described in [21]:
in the process of persuasion, opinions (even close to each
other initially) can become opposite. Analogous phenomenon,
referred to as the group polarization [22], has long been
studied in social psychology: the community divides into two
groups, each reaching consensus; the consensus opinions are
not only opposite, but often further away from each other
than the two initial average opinions of the corresponding
groups. Analysis of real-world social networks (e.g. users of
social web-sites [17]) shows the strong correlation between
polarization and structural balance [17], [18] of positive and
negative ties. The latter property implies that community splits
into two hostile camps (e.g. votaries of two political parties),
where the relations inside each faction are cooperative.
It is known that agents’ repulsion can lead to the clustering
behavior in a complex network [23]. The possibility of clustering in social groups due to negative ties was demonstrated in
[19] (see also references therein); these effects are still waiting
2
for mathematically rigorous analysis. Most of the existing
works on opinion dynamics focus on the persistent disagreement and clustering of opinions caused by bounded confidence
[24], [25] or, more generally, biased assimilation [26]: agents
readily adopt opinions of like-minded neighbors, accepting the
“deviating” opinions with discretion. In [27], [28] Altafini
proposed a simple yet instructive mathematical model of
opinion polarization over structurally balanced graphs, extending conventional first-order consensus algorithms to the case
with antagonistic interactions. These protocols were examined
under the assumption that the interaction graph is static and
strongly connected and shown to establish modulus consensus
[29], where the opinions agree in modulus but may differ in
signs. If the graph is structurally balanced, the modulus of
the final opinion is generally non-zero and opinions either
reach consensus or polarize (“bipartite consensus” [28] is
established); otherwise, opinions converge to zero.
Mathematical examination of polarization behavior due
to antagonism is among the first important steps towards
understanding the dynamics of networks consisting of both
cooperative and competitive agents. Such networks are not
confined to social systems; repulsive interactions play an
important role in e.g. motion control of swarms and other
multi-agent formations, where agents may avoid collision [30],
[31] and distribute evenly on circular or other closed curves
[32]–[34]. So a number of papers have been published recently
studying this class of networks [15], [35]–[39].
The aforementioned papers, however, mainly focus on the
case where the interaction topology is static. In the present
paper, we consider Altafini’s model on opinion dynamics over
general directed time-varying graphs. Removing the restrictions of static topologies not only allows one to analyze
dynamics of real social networks, where the agents may
change their relationships from friendship to hostility and
vice versa, but also enables one to extend the result to nonlinear protocols. In fact we will examine nonlinear algorithms
in the common framework as linear ones, getting rid of the
restrictions such as monotonicity [27], [28], [40].
Our main result states that modulus consensus is established if the topology is uniformly strongly connected. Unlike cooperative networks, the uniform strong connectivity
cannot be relaxed to the uniform quasi-strong connectivity,
which is a commonly adopted condition for consensus over
directed time-varying graph [11], [41]. At the same time, the
condition of uniform strong connectivity is in general not
necessary, and filling the gap between necessary and sufficient
conditions remains a tough problem even in the cooperative
case. However, we fill this gap in the special case of cutbalanced graphs, extending necessary and sufficient consensus
criterion from [10] to modulus consensus over signed graphs.
It should be noticed that results from [10] are not directly
applicable to signed graphs; in the special case of bidirectional
or “reciprocal interactions” they were extended to the signed
case by the lifting technique [37]. We will make further
remarks on this in the corresponding sections. The results were
partly reported in our conference papers [42], [43].
The paper is organized as follows. Section II introduces
some preliminary concepts and notations. Section III gives
the setup of the problem in question. Section IV presents the
main results. Section VI offers the proof of the main results.
II. P RELIMINARIES
Throughout the paper m : n, where m, n are integers and
m ≤ n, stands for the sequence {m, m + 1, . . . , n}. The sign
of a number x ∈ R is denoted by sgn x ∈ {−1, 0, 1}. The
abbreviation “a.a.” stands for “almost all” (except for the set
of zero Lebesgue measure). Given a matrix L = (ljk ), let
∆
∆
abs L P
= (|ljk |). We also introduce the matrix norm |L|∞ =
maxj k |Ljk |. As usual, for a column vector x ∈ RN , one
has |x|∞ = maxj |xj | and it is easily shown that |L|∞ =
∞
sup |Lx|
|x|∞ , where the supremum is over all column vectors
∆
x 6= 0 of appropriate dimensions. Let 1̄N = (1, 1, . . . , 1)T ∈
RN . Given x ∈ R, let x+ = max(x, 0) and x− = (−x)+ ,
hence x = x+ − x− and |x| = x+ + x− .
A. Signed graphs and their properties
A (weighted directed) signed graph is a triple G =
(V, E, A), where V = {v1 , . . . , vN } stands for the set of
nodes, E ⊂ V × V is a set of arcs and A = (ajk ) ∈ RN ×N
is a signed adjacency matrix, i.e. ajk 6= 0 if and only if
(vk , vj ) ∈ E. Throughout the paper, we confine ourselves
to graphs that have no self-loops (ajj = 0 ∀j) and are
digon sign-symmetric [28], i.e. any pair of opposite arcs (if
exists) is identically signed: ajk akj ≥ 0 ∀j, k. Identifying
the set of nodes V with 1 : N , there is a one-to-one
correspondence between signed graphs and their adjacency
matrices A ∈ RN ×N 7→ G[A] = (1 : N, E[A], A), where
E[A] = {(j, k) : akj 6= 0}.
Given ε > 0, let Aε = (aεjk ) stand for the “truncated”
adjacency matrix: aεij = aij when |aij | ≥ ε and aεij = 0
∆
otherwise. The corresponding graph Gε = G[Aε ] is obtained
from G = G[A] by removing arcs of absolute weight less than
ε and we call it ε-skeleton of the graph G.
A path connecting nodes v and v 0 is a sequence of
nodes vi0 := v, vi1 , . . . , vin−1 , vin := v 0 (n ≥ 1) such
that (vik−1 , vik ) ∈ E for k ∈ 1 : n. A path where
vi0 = vin is referred to as a cycle. The cycle is positive if
ai0 i1 ai1 i2 . . . ain−1 in > 0 and negative otherwise. The digonsymmetric strongly connected graph is structurally balanced
if and only if all its oriented cycles are positive [17], [28]. A
node is called root if it can be connected with a route to any
other node of the graph. A graph is strongly connected (SC)
if a path between any two different nodes exists. The graph
is quasi-strongly connected (QSC) if it has at least one root.
Any SC graph is also QSC, each node being a root. A graph
whose ε-skeleton is SC (respectively, QSC) is called strongly
ε-connected (respectively, quasi-strongly ε-connected).
Given a graph G = (V, E, A), its subgraph is a graph G0 =
(V 0 , E 0 , A0 ), where V 0 ⊆ V , E 0 ⊆ (V 0 × V 0 ) ∩ E and A0 =
(aij )i,j∈V 0 stands for the corresponding submatrix of A. We
call a subgraph in-isolated if no arc comes from V \ V 0 to V 0 ,
i.e. aji = 0 ∀i ∈ V 0 , j 6∈ V 0 .
We call two disjoint non-empty sets V1 , V2 ⊆ V hostile
camps in the graph G if ajk ≥ 0 when j, k ∈ V1 or j, k ∈ V2
3
and ajk ≤ 0 whenever j ∈ V1 , k ∈ V2 or j ∈ V2 , k ∈ V1 . The
graph is structurally balanced (SB) [17], [28] if the set of its
nodes can be divided into two hostile camps V = V1 ∪ V2 .
The digon-symmetric SC graph is structurally balanced if and
only if any cycle in it is positive [17], [28].
Following [28], we define the Laplacian matrix L = L[A]
of the signed graph G[A] as follows
(
−ajk , j 6= k
∆
(1)
L[A] = (Ljk )N
Ljk := PN
j,k=1 ,
m=1 |ajm |, j = k.
Equation (1) is a straightforward extension of the conventional definition of the Laplacian matrix of a weighted
graph [44] to the case of signed weights. As implied by the
Gershgorin disk theorem [28], L[A] has no eigenvalues in the
closed left half-plane C̄− = {λ ∈ C : Re λ ≤ 0} except for
possibly λ = 0. Unlike the unsigned case, in general L[A] may
have no zero eigenvalue and hence −L[A] may be a Hurwitz
matrix. For a SC graph G = G[A] this is the case if and only
if G is not structurally balanced [28, Lemma 2].
B. Some important types of time-varying signed graphs
Throughout the paper, the term time-varying (signed) graph
means the graph G[A(t)], where a time-dependent matrix
A(t) ∈ RN ×N is Lebesgue measurable and locally bounded.
Given such a graph G(t) = G[A(t)],
R ∞we say a node j is
essentially connected to a node k if t0 |ajk (s)|ds = ∞ for
some t0 ≥ 0 (the latter inequality then holds for any t0 ≥ 0
since ajk is locally bounded). Let E = E[A(·)] stand for the
set of all such pairs (j, k). Following [9], we call the graph
G[A(·)] = (1 : N, E) the graph of essential interactions and
say that the graph G(·) is essentially strongly connected (ESC)
if G[A(·)] is strongly connected. Likewise, G(·) is essentially
quasi-strongly connected (EQSC) if G[A(·)] is QSC.
The graph G[A(·)] is said to be uniformly strongly connected (USC) if there
R t+Texist constants T > 0 and ε > 0 such
that the graph G[ t
abs A(s) ds] is strongly ε-connected
for any t ≥ 0. By replacing the word “strongly” in the
latter definition with “quasi-strongly”, one defines uniformly
quasi-strongly connected (UQSC) time-varying graph. It may
be easily shown that the USC (respectively UQSC) graph is
always ESC (respectively, EQSC), while the inverse is not
valid.
The graph G[A(·)] is cut-balanced [10] if a constant K ≥ 1
exists such that for any partition of the nodes V 0 ∪V 00 = 1 : N ,
V 0 ∩ V 00 = ∅, the following inequalities hold
X X
X X
X X
K −1
|akj | ≤
|ajk | ≤ K
|akj |.
j∈V 0 k∈V 00
j∈V 0 k∈V 00
j∈V 0 k∈V 00
(2)
A typical example of a cut-balanced graph is the typesymmetric graph [10], which means the existence of K ≥ 1
such that
K −1 |akj (t)| ≤ |ajk (t)| ≤ K|akj (t)| ∀t ≥ 0∀j 6= k.
(3)
Other examples include weight-balanced graphs, see [10] for
details. As implied by [10, Lemma 1], for cut-balanced graphs,
the EQSC property implies ESC; precisely, any quasi-strongly
∆
connected component of the digraph G = G[A(·)] is strongly
connected, and a path between j and k exists if and only if
the path from k to j exists.
III. P ROBLEM S ETUP
Consider a group of N ≥ 2 agents indexed 1 through N ,
the opinion of the ith agent is denoted by xi ∈ R and we
define x := (x1 , . . . , xN )T ∈ RN . The agents update their
opinions in accordance with a distributed protocol as follows:
ẋ(t) = −L[A(t)]x(t), t ≥ 0,
(4)
which can be written componentwise as
ẋj (t) =
N
X
|ajk (t)|(xk (t) sgn ajk (t) − xj (t)) ∀j.
(5)
k=1
Here A(t) = (ajk (t)) is a locally bounded matrix-valued function which describes the interaction topology of the network
and ajj (t) ≡ 0. At time t ≥ 0, the opinion of the jth agent
is influenced by agents for which ajk 6= 0 (“neighbors”).
Unlike conventional consensus protocols [44] this influence
may be either cooperative (when ajk > 0) or competitive
(when ajk < 0). The coupling term |ajk |(xk sgn ajk − xj )
in (5) drives the opinion of the jth agent, respectively, either
towards the opinion of the kth one or against it.
In [28] protocol (4) has been carefully examined, assuming
the interaction graph is constant (A(t) ≡ A) and strongly
connected. It was shown that the steady-state opinions always
agree in modulus, but generally differ in signs; in other words,
the modulus consensus of opinions [29] is established.
Definition 1: The protocol (4) establishes modulus consensus, if for any x(0) a number x∗ ≥ 0 exists such that
lim |xi (t)| = x∗ .
t→+∞
(6)
The following lemma shows that there are two essentially
different types of modulus consensus: “trivial” with x∗ = 0
for all x(0) (the system (4) is asymptotically stable) and “nontrivial”, where x∗ 6= 0 for a.a. x(0).
Lemma 1: Suppose that protocol (4) establishes modulus consensus. Then there exist vectors v, ρ ∈ RN with
ρ1 , . . . , ρN = ±1 such that for any solution of (4) one has
lim x(t) = ρv T x(0) ⇔ lim xj (t) = ρj v T x(0).
t→+∞
t→+∞
(7)
Lemma 1 shows that in the “non-trivial” case v 6= 0, opinions
either reach consensus (ρ1 = . . . = ρN ) or polarize (ρi have
different signs) whenever v T x(0) 6= 0. For both situations we
say that the protocol establishes bipartite consensus.
Definition 2: We call the protocol (4) stabilizing, if
lim xj (t) = 0 ∀j∀x(0). The protocol establishes bipartite
t→∞
consensus if (7) holds with some v 6= 0; it establishes
consensus if additionally ρ = 1̄N or ρ = −1̄N .
It was proved in [28] if A(t) ≡ A, then the protocol is
stabilizing (that is, −L[A] is a Hurwitz matrix) unless the
graph G[A] is structurally balanced (SB). The latter property
implies that a community is divided into two hostile camps
(such as votaries of two political parties), where each agent
cooperates with its camp-mates, competing with agents from
4
the opposite camp. A special case of SB graphs is the graph
with non-negative weights ajk ≥ 0 where one of the camps is
empty. In this case strong connectivity (SC) and even quasistrong connectivity (QSC) imply consensus [1]. The case of
general SB and SC graph is reducible to this case by means
of the gauge transformation [28], which allows to prove (6),
where x∗ depends on the initial conditions. If both hostile
camps are not empty, the opinions polarize. In other words,
structural balance implies bipartite consensus. A generalization
of the gauge transformation from [28] is the lifting approach
from [37], splitting each agent into a pair of virtual agents with
opposite opinions, after which the original dynamics can be
considered as a projection of some larger network with purely
cooperative interactions. This approach can be applied also to
some time-varying networks.
In Section IV-A we further refine Altafini’s results on
modulus consensus over static graphs by discarding the strong
connectivity assumption. We show that for structurally balanced graphs modulus consensus is established if and only if
the graph is QSC; in fact, in this case bipartite consensus is
established. Conversely, bipartite consensus is reached only
when the graph is structurally balanced and QSC. If the
graph has no structurally balanced in-isolated subgraphs, the
protocol is stabilizing. Thus we offer necessary and sufficient
conditions for modulus consensus for general static graph.
The main concern of this paper is modulus consensus
over time-varying signed graphs. In [28] this problem was
considered only for the very special case where the graph
is constantly strongly connected, has time-invariant signs of
the arcs and also weight-balanced (this assumption was not
explicitly mentioned, but in fact was used in the proof which
appeals to [44, Theorem 9]). Below we relax these restrictions.
Dealing with real-world social networks, the time-invariance
of such relationships between individuals as friendship and
hostility is evidently a non-realistic assumption. What is more
important, the opinion dynamics in social networks are usually
considered to be nonlinear [19], [24]. Such models are often
reducible to the linear case by introducing time-varying gains,
depending on the solution; however, the corresponding graphs
can hardly be weight-balanced. Our techniques allow us to
examine both linear and nonlinear consensus protocols from
[27], [28] in the common framework. Although it is a hard
problem to find explicitly the ultimate opinion vector in the
case of time-varying topologies, Lemma 1 shows that there
are similarities with the static case.
A common techniques used to prove consensus in the case
of cooperative agents is the shrinking property of the convex
hull, spanned by agent’s opinions. Under the UQSC property
of the graph, the diameter of this convex hull may serve
as a Lyapunov function [5], [6], [11]. The UQSC condition
is not necessary in general [5], considered as “the weakest
assumption on the graph connectivity such that consensus is
guaranteed for arbitrary initial conditions” [11], and becomes
necessary under additional restriction of uniform convergence
[6]. On the other hand, the EQSC condition is always necessary for consensus yet insufficient in the case of directed
topologies [5]. This gap between necessary and sufficient
conditions has been filled recently for type-symmetric and
other cut-balanced graphs [9], [10] where EQSC is not only
necessary but also sufficient for consensus.
Under antagonistic interactions between the agents, the
convex hull spanned by opinions is not shrinking, and the only
available Lyapunov function is the maximal modulus, which
will be shown to be non-increasing and thus converging to a
limit. However, the UQSC property in general does not guarantee that the minimal modulus also converges to the same limit
(as will be shown by a counter example). To provide this, one
requires stronger USC conditions. Whereas EQSC property
is necessary for bipartite consensus, it is not necessary for
stability, as illustrated by the following trivial example. Let
A = diag(A1 , A2 ), where both graphs G[A1 ] and G[A2 ] are
strongly connected and structurally unbalanced. As follows
from [28], the matrices (−L[A1 ]) and (−L[A2 ]) are Hurwitz,
which also holds for (−L[A]) = − diag(L1 [A], L2 [A]) and
thus the protocol is stabilizing. The static graph G[A] is
not QSC and thus not EQSC. Filling this gap between the
necessary and sufficient conditions for modulus consensus that
is even “wider” than in the cooperative case, is a tough open
problem. However, adopting the techniques from [9], we fill
this gap for cut-balanced graphs by offering necessary and
sufficient conditions of modulus consensus (Subsection IV-C).
IV. M AIN R ESULTS
This section is organized as follows. We start with modulus
consensus criteria for static graphs which extend results from
[28] by discarding the assumption of strong connectivity in
them (Subsection IV-A). We show that the necessary and
sufficient condition for bipartite consensus is structural balance
and QSC, and give also necessary and sufficient conditions
for stability. The next Subsection IV-B deals with the case
of general time-varying graphs. We show sufficiency of the
USC condition for modulus consensus and demonstrate that,
unlike the cooperative case, this condition cannot be relaxed
to UQSC. In the last Subsection IV-C we focus on modulus
consensus over cut-balanced graphs. In this case it is possible
to give necessary and sufficient conditions for both types of
modulus consensus, whereas filling the gap between necessary
and sufficient conditions for modulus consensus under general
directed graphs remains a tough open question.
A. Time-invariant protocols
Throughout this section A(t) ≡ A is a constant matrix. We
start with the case of structurally balanced graph. In this case,
a gauge transformation [28] exists which reduces the protocol
to a cooperative one, whose properties are well established.
Lemma 2: Let G[A] be structurally balanced. Then L[A]
has eigenvalue at 0 and the following claims are equivalent:
1) the graph G[A] is QSC;
2) the linear subspace ker L[A] ⊂ Rn has dimension 1;
3) the protocol (4) establishes modulus consensus.
If these claims hold, then ρ, v from Lemma 1 are respectively the right and the left eigenvectors of L[A] at 0, hence
v T L[A] = L[A]ρ = 0 and v 6= 0, so protocol establishes
bipartite consensus. If A is a non-negative matrix (one of the
5
Fig. 1.
Static QSC graph: modulus consensus is impossible if a31 a32 > 0
hostile camps is empty), the protocol establishes consensus,
and otherwise, opinions polarize.
In the case where G[A] is structurally balanced yet not QSC
(so modulus consensus is not reached), the structure of steadystate opinions may be described in terms of the maximum
out-forest matrix as done in [45] for cooperative agents.
As follows from Lemma 2, a protocol with structurally
balanced graph cannot be stabilizing. Therefore, stability is
also impossible when the graph contains an in-isolated structurally balanced (ISB) subgraph, in other words, the group
involves hostile camps whose members ignore the opinions of
the remaining agents. The nodes of such a subgraph, if existed,
would reach bipartite consensus of opinions independently of
the remaining agents. The following theorem gives a criterion for modulus consensus over static graphs, showing that
existence of ISB subgraphs is the only obstacle for stability.
Theorem 1: Let A(t) = const. The protocol (4) is stabilizing if and only if the graph is neither SB itself nor contains an
ISB subgraph. Bipartite consensus is established if and only if
G[A] is structurally balanced and QSC: if ajk ≥ 0 ∀j, k, then
consensus is established; otherwise, opinions polarize.
Example 1. Consider a team of N = 3 agents with states
x1 (t), x2 (t), x3 (t). Assume that a12 = a21 = −1 (see Fig. 1)
and a31 a32 > 0. Thus the equations are
ẋ1 = (−x2 − x1 ), ẋ2 = (−x1 − x2 ),
ẋ3 = a31 x1 + a32 x2 − (|a31 | + |a32 |)x3 ,
and the graph is not structurally balanced (agents 1 and 2
are constantly antagonistic, so the structural balance requires
agent 3 to cooperate with only one of them, competing with
the other, whereas in reality it cooperates with both agents
1 and 2). According to Theorem 1, modulus consensus is
impossible (since the ISB subgraph with the set of nodes
{1, 2} exists). This can also be shown in a straightforward
∆
way: the system has equilibria (ξ, −ξ, ρξ), with ρ = (a31 −
a32 )/(|a31 | + |a32 |) ∈ (−1; 1), ξ ∈ R.
This simple example illustrates that, unlike the cooperative
case (ajk ≥ 0), the protocol with static QSC graphs in general
does not establish modulus consensus. To guarantee modulus
consensus, one typically requires strong connectivity (assumed
in [28]) or some other property, excluding ISB subgraphs.
B. Protocols over dynamic signed graphs
We start with the following useful lemma, which does not
rely on any connectivity assumptions and shows, in particular,
that solutions to (4) are always bounded.
Lemma 3: For any solution of system (4), the function
|x(t)|∞ = maxi |xi (t)| is monotonically non-increasing:
|x(t)|∞ ≤ |x(t0 )|∞ whenever t ≥ t0 ≥ 0. Equivalently, the
Cauchy evolutionary matrix Φ(t; t0 ) of system (4) satisfies the
inequality |Φ(t; t0 )|∞ ≤ 1 for t ≥ t0 .
Lemma 3 implies, in particular, the existence of the limit
lim |x(t)|∞ . The following theorem shows that under the
t→+∞
uniform strong connectivity property and bounded coupling
gains the modules of all opinions converge to the same limit.
Theorem 2: If ajk (t) are bounded and the graph G[A(·)] is
USC, then the protocol (4) establishes modulus consensus.
As a corollary, we immediately obtain the well-known
criterion for consensus under cooperative protocols.
Corollary 1: If ajk (t) ≥ 0 ∀j, k for a.a. t ≥ 0 and G[A(·)]
is USC, then the protocol (4) establishes consensus.
It is well known that assumptions of Corollary 1 can be
relaxed: in the case where ajk ≥ 0 the UQSC condition is
sufficient for consensus [6], [11], [46]. Moreover, using the
gauge transformation approach from [28], sufficiency of the
UQSC property may be proved for a dynamic structurally
balanced graph, provided that the subdivision into two “hostile
camps” remains unchanged.
Lemma 4: Suppose that V = 1 : N = V1 ∪ V2 , where
ajk (t) ≥ 0 for any t ≥ 0 if j, k ∈ V1 or j, k ∈ V2 ; otherwise,
ajk (t) ≤ 0 for any t ≥ 0. If the graph G[A(·)] is UQSC, the
protocol establishes bipartite consensus (if V1 = ∅ or V2 = ∅)
or bipartite consensus (when V1 , V2 6= ∅).
Remark 1: Lemma 4 obviously remains valid if two hostile
camps V1 , V2 exist only for t ≥ t0 , where t0 ≥ 0. This
observation makes the result of Lemma 4 applicable to topologies that evolve in order to achieve the structural balance in
finite time (after which the signs of arcs remain unchanged);
graph dynamics leading to structural balance in finite time
were proposed in [47], [48].
However, in general the USC condition in Theorem 2 is not
relaxable to UQSC. Example 1 in Subsection IV-A shows that
even for static graphs the QSC property (equivalent to UQSC)
does not guarantee modulus consensus unless the graph is
structurally balanced. Our next example shows that the UQSC
property is not sufficient neither when the graph remains structurally balanced but the relations of friendship and hostility
between the agents evolve over time. We construct a protocol
(4) with periodic piecewise-constant matrix A(t), such that
the graph G[A(t)] is structurally balanced for any t ≥ 0 and
UQSC, and nevertheless modulus consensus is not established.
Example 2. Consider the more general system
ẋ1 (t) = (−x2 (t) − x1 (t)), ẋ2 (t) = (−x1 (t) − x2 (t)),
ẋ3 (t) = a31 (t)(x1 (t) − x3 (t)) + a32 (t)(x2 (t) − x3 (t)).
(8)
The functions a31 , a32 are constructed as follows. Consider
first system (8) with a31 (t) ≡ 1, a32 (t) ≡ 0 and the solution
to (8) launched at the initial state x1 (0) = 1, x2 (0) =
−1, x3 (0) = −1/2. It is evident that x1 (t) = 1 = −x2 (t) for
any t ≥ 0 and x3 (t) ↑ 1 as t → +∞. Therefore, there exists
the first time instant T0 > 0 such that x3 (T0 ) = 1/2. Notice
that in the symmetric situation where a31 (t) ≡ 0, a32 (t) ≡ 1
and x(t) is a solution to (8) starting at x1 (0) = 1, x2 (0) =
−1, x3 (0) = 1/2, one has x3 (t) ↓ −1 and T0 is the first instant
6
where x3 (T0 ) = −1/2. Taking
(
1, t ∈ [0; T0 ) ∪ [2T0 ; 3T0 ) ∪ . . .
a31 (t) = 1−a32 (t) =
0, t ∈ [T0 ; 2T0 ) ∪ [3T0 ; 4T0 ) ∪ . . .
∆
,
one finally gets a 2T0 -periodic matrix A(t), corresponding
to the UQSC graph G[A(·)]. Moreover, this graph is also
quasi-strongly connected and structurally balanced at any time.
Even so the solution to (8) starting at x1 (0) = 1, x2 (0) =
−1, x3 (0) = −1/2 does not achieve modulus consensus. It
can be easily shown that x1 (t) = −x2 (t) = 1 for any
t ≥ 0. Since a31 (t) = 1 and a32 (t) = 0 when t < T0 ,
one has x3 (T0 ) = 1/2 by definition of T0 . On the next
interval t ∈ [T0 ; 2T0 ) one has a31 (t) = 0 and a32 (t) = 1
and hence x3 (2T0 ) = −1/2, so the solution x(t) is periodic
and x3 (t) ∈ [−1/2; 1/2] whereas |x1 (t)| = |x2 (t)| = 1.
Dealing with purely cooperative protocols, UQSC is considered to be not only sufficient for consensus but also “nearly”
necessary. It may also be relaxed to EQSC for some types of
graphs (e.g. cut-balanced ones). On the other hand, the EQSC
condition is always necessary for consensus among cooperating agents, being in general not sufficient. As discussed in
Section IV-A, stability of (4) is possible without the EQSC
property even for static graphs. However, EQSC is required
for bipartite modulus consensus.
Lemma 5: If the protocol (4) establishes bipartite consensus, the graph G[A(·)] is EQSC.
Remark 2: In the general situation, where the graph is USC
but the assumptions of Lemma 4 do not hold, it is difficult
to distinguish between stability and bipartite consensus. A
sufficient condition for stability was proved in [37]: the
protocol
R t+T is stabilizing, if for some ε > 0, T > 0 all the graphs
G[ t
abs A(s) ds] (where t ≥ 0) have strongly connected
and structurally unbalanced ε-skeletons [37]. This is the only
case where the “lifted” network is proved to inherit the USC
property [37]. Generally, this is not the case, so the approach
[37] does not allow to derive Theorem 2.
C. Modulus consensus over cut-balanced graphs
In the previous subsection, we get a sufficient condition
for modulus consensus (the USC condition). In general, this
property is not necessary for modulus consensus. Moreover,
even the weaker EQSC condition is necessary for bipartite
consensus but not for stability. Filling this gap between necessary and sufficient conditions is a hard open problem even
for cooperative protocols. However, this gap has been recently
filled for cooperative protocols with type-symmetric [9] and
more general cut-balanced graphs [10]. The proofs from [10]
are not applicable for signed graphs. However, adopting the
approach from [9], we extend the result from [10] to the case
of modulus consensus over signed graph, giving necessary and
sufficient conditions for each type of modulus consensus.
Throughout this section the graph G[A(·)] is cut-balanced,
i.e. the inequalities (2) hold for some K ≥ 1.RRecall the jth
∞
agent essentially interacts
the kth one if R 0 ajk (t)dt =
R ∞ with
∞ −
+
∞ and hence either 0 ajk (t)dt = ∞ or 0 ajk (t)dt =
∞. We say agents essentially cooperate in the first case and
essentially compete in the second situation (in general, both
relations may hold). Let E = E[A(·)] and E + ⊆ E, E − ⊆ E
be the sets of those pairs of agents (j, k) that respectively
essentially cooperate and essentially compete.
If E + ∩ E − = ∅, we assign the weights +1 and −1 to the
∆
arcs from E + and E − respectively, transforming G = G[A(·)]
±
to a signed graph G = (1 : N, E, (sjk )), sjk = +1 for
(j, k) ∈ E + and sjk = −1 for (j, k) ∈ E − .
As implied by [10, Lemma 1], for cut-balanced graphs
the EQSC property implies ESC, precisely, any quasi-strongly
∆
connected component of the digraph G = G[A(·)] is strongly
connected, and a path between j and k exists if and only if a
path from k to j exists. From Lemma 5, the ESC condition is
necessary for bipartite consensus. In the case of cooperative
agents, this property is also sufficient for consensus [10].
However, in the case of signed graph, ESC is not sufficient
without the “essential” structural balance.
Theorem 3: Assume the graph G[A(·)] is cut-balanced. The
protocol (4) establishes bipartite modulus consensus if and
only if G ± is well-defined (E + ∩ E − = ∅), strongly connected
and structurally balanced; opinions polarize if and only if
E − 6= ∅, and otherwise consensus is established. If G is
strongly connected but E + ∩ E − 6= ∅ or G ± is structurally
unbalanced, the protocol (4) is stabilizing.
In the case of purely cooperative protocol (ajk (t) ≥ 0),
Theorem 3 transforms into the result obtained in [9], [10].
Corollary 2: Cooperative protocol establishes consensus if
and only if the graph G[A(·)] is essentially connected.
Our next result addresses the case where G is not necessarily
connected and thus may be decomposed into several disjoint
strongly connected components G = G1 ∪ G2 ∪ . . . ∪ Gd , Gr =
(Vr , Er ), d ≥ 1. In this case in any component Gr , modulus
consensus is established, and the type of which depends only
on the structure of Gr . Let Er+ := Er ∩ E + and Er− := Er ∩ E − .
If Er+ ∩ Er− = ∅, define a signed graph Gr± by assigning arcs
from Er+ , Er− with weights +1 and −1 respectively.
Theorem 4: For any solution of (5) there exists limits
x†i = lim xi (t) and |x†i | = |x†j | whenever i and j are
t→∞
in the same strongly connected component: i, j ∈ Vr . If
Er+ ∩ Er− = ∅ and Gr± is structurally balanced, the bipartite
consensus is achieved, which comes to consensus if Er− = ∅,
and otherwise the opinions polarize (Vr = Vr1 ∩ Vr2 and
x†i = −x†j ∀i ∈ Vr1 , j ∈ Vr2 ). If Er+ ∩ Er− 6= ∅ or the graph Gr±
is structurally unbalanced, x†i = 0 ∀i ∈ Vr that is, dynamics
of opinions from Vr are stable.
The following criterion of stability is immediate.
Corollary 3: The protocol (4) is stable if and only if for any
strongly connected component Gr , one has either Er+ ∩Er− 6= ∅
or Gr± being structurally unbalanced.
Remark 3: Theorems 3 and 4 were proved in [37] in the
special case of “type-symmetric” graphs, such that (3) holds
for some K ≥ 1. The main idea of the proof is to show that the
latter property remains valid for the “lifted” network, which is
purely cooperative and hence can be examined by techniques
from [10]. We extend the result from [37] to cut-balanced
graphs. Although this extension seems to be provable by
techniques from [37], our proof based on [9] is of independent
interest; we elaborate mathematical techniques to cope with
7
both general and cut-balanced cases in similar ways.
B. Nonlinear Laplacian Flow
V. A PPLICATIONS : N ONLINEAR P ROTOCOLS
In this section we apply our results to some types of
nonlinear consensus protocols, similar to those from [27], [28].
In this subsection we examine the nonlinear consensus
protocol similar to that addressed in [28, Section IV-B]:
ẋi (t) =
A. Additive Laplacian protocols
Our first example concerns nonlinear consensus algorithms
that are referred in [28] as the “additive Laplacian feedback
schemes”. The first of them is
N
X
ẋi (t) =
|aij (t)|(hij (xj (t) sgn aij (t)) − hij (xi (t))), (9)
N
X
|Fij (t, x)|(xj (t) sgn Fij (t, x) − xi (t)),
here i ∈ 1 : N and Fij : [0; ∞) × RN → R are Caratheodory
maps, i.e. Fij (t, ·) are continuous for a.a. t and Fij (·, x) are
measurable for any x. We assume also that for any compact
set K ⊂ [0; ∞) × RN one has
sup{Fij (t, x) : x ∈ K, t ≥ 0} < ∞
j=1
(12)
j=1
∀i, j.
(13)
and the second protocol has the form
ẋi (t) =
N
X
|aij (t)|hij (xj (t) sgn aij (t) − xi (t))) ∀i.
(10)
j=1
We adopt the following assumption about the nonlinearities.
Assumption 1: For any i, j ∈ 1 : N the map hij ∈ C 1 (R)
is strictly increasing (and hence h0ij > 0) with hij (0) = 0.
Defining the functions Hij [y, z] as follows: Hij [y, z] :=
(hij (y)−hij (z))/(y −z) for y 6= z and Hij [z, z] := h0ij (z) so
that Hij [y, z] > 0 for any y, z. Since hij ∈ C 1 , Hij is easily
shown to be a continuous function and hij (y) − hij (z) =
Hij [y, z](y − z) ∀y, z. Under Assumption 1, Theorems 2 and
3 appears to be applicable to the protocols (9), (10) after
the standard trick, replacing nonlinearities with the solutiondependent gains, as shown by the following lemma.
Lemma 6: Let x(t) be a solution to system (9), which is
defined for t ≥ 0. Define the matrix A(t) = (aij (t)) by
aij (t) := aij (t)Hij [xj (t) sgn aij (t), xi (t)]. Then
ẋ(t) = −L[A(t)]x(t).
(11)
If the graph G[A(·)] is EQSC, ESC, UQSC, USC, or cutbalanced, then the same is valid for the graph G[A(·)]. If
the matrix A(·) is globally bounded, the same is valid for
the matrix A(·). These claims also hold for the protocol (10),
taking aij (t) := aij (t)Hij [xj (t) sgn aij (t) − xi (t), 0].
Application of Theorems 2, 3 to (11) yields the following.
Theorem 5: Under Assumption 1, the solutions to systems
(9), (10) exist, are unique and infinitely prolongable for any
initial condition. If the graph G[A(·)] is USC and A(·) is
bounded, or the graph G[A(·)] is ESC and cut-balanced, the
protocols (9), (10) establish modulus consensus.
Comparing the result of Theorem 5 with that of [28,
Theorem 3,4], one notices that our assumption about the nonlinearities hij differs from [28], where they are not assumed to
be smooth, but only monotonic with some integral constraint.
However, unlike [28], functions hij may be heterogeneous and
not necessarily odd; the graph may be time-varying.
Note that Theorem 5 gives only sufficient conditions for
modulus consensus. Necessary conditions such as Lemma 5
are not directly applicable since they assume the matrix A(t)
to be common for all solutions. Extending the concept of
essentially equivalent protocols (see Subsection VI-C) to the
nonlinear case, it is possible to get some necessary conditions
which are, however, beyond the scope of this paper.
Theorem 6: For any initial condition x(0) a solution of (12)
∆
exists for t ≥ 0 and the matrix A(t) = Fij (t, x(t)) is bounded.
If the graph G[A(·)] is USC or ESC and cut-balanced, the
protocol (12) establishes modulus consensus.
Although in general it is hard to verify the uniform or essential strong connectivity of G[A(·)], where A(t) = Fij (t, x(t))
depends on the concrete solution, in special cases such a
property may be proved. For instance, it is implied by the
global strong ε-connectivity [28, Section IV-B]: the graph
G(F̂ij (t, x)) is strongly ε-connected for any t, x. The result
of Theorem 6 extends the result from [28, Section IV-B] in
several ways. First of all, it deals with time-variant gains
Fij (t, x) and does not require them to have a constant sign.
In particular, system (12) does not necessarily generate orderpreserving flow [27]. Moreover, we do not assume that the
graph G[A(t)] is weight-balanced which can hardly be provided for nonlinear functions Fij . In the case of USC graphs,
the balance is not needed at all; in the case of ESC graphs
it is replaced by the much weaker cut-balance condition. At
last, we relax the connectivity assumption.
VI. P ROOFS
We start with the proof of Lemma 1 and then prove
results, concerned with static graphs (Subsection VI-A). To
proceed with the case of dynamic graph, we elaborate some
useful techniques in Subsections VI-B and VI-C, entailing also
Lemmas 3 and 5. The case of cut-balanced graph is considered
in Subsection VI-D. In Subsections VI-E and VI-F we prove
the modulus consensus criterion for directed dynamic graphs
and its implications, dealing with nonlinear protocols.
Throughout the section, Φ(t|t0 ) (where t, t0 ≥ 0) stands
for the Cauchy evolutionary matrix of the system (4), that is,
the solution of the Cauchy problem for (4) with initial data
x(t0 ) = x0 is given by x(t) = x(t|t0 , x0 ) = Φ(t|t0 )x(0).
Proof of Lemma 1: Assume the protocol (4) establishes
modulus consensus. Note that since functions xi (t) are continuous, existence of the limits lim |xi (t)| = x∗ implies
t→+∞
that the limits
lim xi (t) also exist (and equal to ±x∗ ).
t→+∞
Therefore Φ(t) −→ Φ∗ := [φ1 , . . . , φN ] as t → ∞, where
t→∞
each column φj have entries with equal modules. The same
PN
applies for any linear combination j=1 αj φj . If Φ∗ = 0, the
statement of Lemma 1 is evident, taking v = 0. Assume that
8
one of φj , say, φ1 is nonzero, thus φ1 = v1 ρ where v1 6= 0
and ρ is a vector with entries ±1. Notice that for any real
numbers α, β 6= 0 we have |α − β| =
6 |α + β|. Therefore,
if φj 6= 0 for some j 6= 1, all entries of φj − φ1 have the
same module if and only if φj = vj ρ, vj 6= 0. If φj = 0, we
put by definition vj = 0. Therefore, φj = vj ρ for any j and
lim xj (t) = Φ∗ = ρv T x(0), where v := (v1 , . . . , vN )T .
t→∞
A. Proofs of Lemmas 2, 4 and Theorem 1
Proof of Lemma 2: We use a gauge transformation [28].
Suppose that the graph is structurally balanced; let V1 and V2
be hostile camps covering all the nodes. Introducing a diagonal
matrix D = diag(d1 , . . . , dN ) by di = 1 for i ∈ V1 and di =
−1 for i ∈ V2 , one easily shows that the gauge transformation
x 7→ z := Dx transforms the system (4) into
ż(t) = −L[abs A]z(t).
(14)
The properties of cooperative protocols (14) are widely known
[1], [2], [49]. Since the matrix B = abs A is non-negative,
L[B] has zero eigenvalue with eigenvector 1N . The algebraic and geometric multiplicities of this eigenvalue coincide
[49], and it is simple if and only the graph G[B] is QSC
(has oriented spanning tree). If this holds, the protocol (14)
establishes consensus and exp(−L[B]t) −→ 1̄N v. Since
t→+∞
L[B] = DL[A]D and G[A] is QSC if and only if G[B] is
QSC, one immediately obtains the claims of Lemma 2.
Proof of Lemma 4: The proof employs the same idea of
the gauge transformation, retracing the arguments from [28,
Section III-B-2)]. Suppose the graph G[A(t)] is structurally
balanced for any t with static hostile camps V1 and V2 .
The gauge transformation x 7→ z := Dx, introduced in
the foregoing, transforms the system (4) into (14). Since
G[abs A(t)] is UQSC, the protocol (14) establishes consensus
[1], [46] and thus opinions in network (4) polarize.
To proceed with the proof of Theorem 1, note that stability
is equivalent to the asymptotic stability of the system (4),
which means that (−L[A]) is a Hurwitz matrix. By using
the Gershgorin disk theorem, it was shown in [28] that all
eigenvalues of L[A], except for possibly zero, have positive
real parts. Hence protocol is stable if and only if 0 is not an
eigenvalue of L[A], i.e. L[A]ρ = 0 is impossible when ρ 6= 0.
We need the following simple lemma.
Lemma 7: Let L[A]ρ = 0 and |ρ|∞ = 1. Then V1 = {j :
∆
ρj = 1}, V2 = {j : ρj = −1} are hostile camps and V∗ =
V1 ∪ V2 6= ∅. If j ∈ V∗ , k 6∈ V∗ , then ajk = 0.
Proof: By assumption, |xk | ≤ 1 for any k and |xj | =
1 for some j, hence V∗ 6= ∅. For any such j one has
P
P
P
ρj
|ajk | =
ρk ajk . We note that
ρk ajk ≤
k6=j
k6=j
Pk6=j
|ajk |. The equality implies, firstly, that |ρk ajk | = |ajk |
k6=j
(i.e. k ∈ V∗ or ajk = 0) and secondly, all non-zero terms
ρk ajk have the same sign (coinciding with sgn ρj ). In other
words, if j ∈ V∗ , then ajk ρj ρk ≥ 0 ∀k ∈ V∗ , and ajk = 0
when k 6∈ V∗ , from where the statement is straightforward.
Proof of Theorem 1: Sufficiency in the first statement is
immediate from Lemma 7: if no “in-isolated” structurally balanced subgraph exists, then 0 is not an eigenvalue of (−L[A]),
which therefore is a Hurwitz matrix. Necessity follows from
Lemma 4: nodes of the subgraph are independent of the
remaining agents and reach bipartite consensus, and hence
stability of the whole community is impossible. Lemma 4
implies sufficiency in the second statement. To prove necessity,
suppose that bipartite consensus is established. Then 0 is an
eigenvalue of L[A] and there exists an eigenvector ρ, such that
L[A]ρ = 0, and |ρ|∞ = 1. Bipartite consensus implies that for
this vector one has |ρ1 | = . . . = |ρN | = 1. Applying Lemma 7,
we obtain the structural balance of G[A] since V∗ = 1 : N .
B. Ordering permutations
In this Subsection, we elaborate some useful techniques to
be used in the subsequent proofs.
Given a family of scalar functions f1 (t), . . . , fN (t) (where
t ≥ 0), let [k 1 (t), . . . , k N (t)] be the ordering permutation,
sorting the set {f1 (t), . . . , fN (t)} in the ascending order:
fk1 (t) (t) ≤ fk2 (t) (t) ≤ . . . ≤ fkN (t) (t). If fj (t) = fk (t)
for some j,k and t, the permutation is not uniquely defined.
The following technical Lemma shows the permutation may
always be taken in some regular way.
Lemma 8: Assume that fj are locally Lipschitz. Then there
exists such an ordering permutation k 1 (t), . . . , k N (t) that
∆
k j (·) are measurable, functions Fj (t) = fkj (t) (t) are locally
Lipschitz and Ḟj (t) = f˙kj (t) (t) for any j and a.a. t ≥ 0.
To prove Lemma 8, we need the following proposition.
Lemma 9: Let f∗ (t) := maxi∈[1:N ] fi (t) and j(t) be the
index such that f∗ (t) = yj(t) (t) for a.a. t. In the case of nonuniqueness, one always may choose j(·) in a way that it is
measurable and f˙∗ (t) = ẏj(t) (t) for a.a t. The claim remains
valid, replacing max with min.
Proof: As follows from the generalized version of Danskin theorem [50, Theorem 2.1], f∗ (·) is locally Lipschitz
and f˙∗ (t) ∈ {ẏj (t) : yj (t) = f∗ (t)} for a.a. t ≥ 0. The
Filippov-Castaing measurable selector theorem (see e.g. [51,
Theorem 1]) yields that a measurable function j(t) exists such
that f˙∗ (t) = ẏj(t) (t) and yj(t) (t) = f∗ (t). The last claim is
proved by replacement fj 7→ −fj .
Proof of Lemma 8: The proof is via induction on N . For
N = 1, the claim is evident. Let it be true for some N , and
let f1 (·), . . . , fN +1 (·) be locally Lipschitz. The ordering of
the first N functions z1 (·), . . . , zN (·) are locally Lipschitz by
0
the induction hypothesis. The recursion yN
+1 (t) := yN +1 (t),
ν−1
ν
yN
+1 (t) := max{zν (t); yN +1 (t)},
ν−1
zbν (t) := min{zν (t); yN
+1 (t)}, ν ∈ 1 : N
results in the ordering zb1 (t) ≤ . . . ≤ zbN (t) ≤ zbN +1 (t) :=
yN +1,N (t) of the entire set y1 (·), . . . , yN +1 (·). By applying
Lemma 9 at every recursion step, we see that zbν (·) are locally
Lipschitz. For any ν = 1, . . . , N , the sequence
ν
Zν (t) := [b
z1 (t), zb2 (t), . . . , zbν (t), zν+1 (t), . . . , zN (t), yN
+1 (t)]
(15)
is obtained from Zν−1 via a permutation Jν (t) of indices,
which either is the identity one or exchanges the places of the
νth and (N + 1)th entries and may be chosen measurable. By
Lemma 9, the sequence Z0ν (t) that results from replacement of
9
any function in (15) by its derivative is related to Z0ν−1 (t) by
the same permutation for a.a. t. The sequence Z0 (t) is obtained
from Y(t) := [y1 (t), . . . , yN +1 (t)] via a permutation of indices
K(t) = [k 1 (t), . . . , k N (t), N +1]. By the induction hypothesis,
0
K(t) also relates Z00 (t) and Y0 (t) := [y10 (t), . . . , yN
+1 (t)] for
a.a. t. Then KN +1 (t) = JN ◦ · · · ◦ J1 ◦ K(t) transforms Y0 (t)
into Z0N (t) for a.a. t, which proves the induction step.
from where (17) follows since Mi = χki . Using (17), one
has ṀN (t) ≤ 0 for a.a. t ≥ 0 since |θ̃ij | ≤ 1 and Mj ≤
M
R ∞N for any j thus MN (·) is non-increasing. We have also
|ṀN (t)|dt = M (0) − inf t≥0 M (t) ≤ M (0).
0
We also require one additional simple tool which allows
to examine the behavior of system (5) by comparing it
with a simpler system, obtained by ignoring all inessential
interactions between the agents. Consider a protocol
˙ = −L[A(t)]ξ(t)
ξ(t)
C. Some Technical Lemmas and Proofs of Lemmas 3, 5
To start with, we note that since ajk (t) are locally bounded,
this also holds for ẋj and therefore xj (·) are locally Lipschitz.
For any solution x(t) of (4) we introduce functions
χj (t) := |xj (t)|, θij (t) := sgn aij (t) sgn xi (t) sgn xj (t).
The following lemma gives a useful interpretation of dynamics
(4) in terms of the moduli functions χk .
Lemma 10: The functions χj are locally Lipschitz, thus
absolutely continuous. For a.a. t ≥ 0 and any k one has
χ̇k (t) =
N
X
|aki (t)|[χi (t)θki (t) − χk (t)].
(16)
i=1
(since χk ≥ 0, it has sign sgn χk (t) equal to 0 or 1).
Proof: Since ajk are assumed to be locally bounded,
xk (·) are locally Lipschitz. The same applies to χk (·) since
|χk (t1 ) − χk (t2 )| = ||xk (t1 )| − |xk (t2 )|| ≤ |xk (t1 ) − xk (t2 )|.
Therefore χk are absolutely continuous and for a.a. t > 0
the derivative χ̇k (t) exists. For such t we immediately have
χk (t) = 0 =⇒ χ̇k (t) = 0 by the Fermat theorem since 0 is the
global minimum of χk , which proves (16) (indeed, xk (t) = 0
implies that θki (t) = 0 for any i). Let χk (t) > 0. Since
sgn xk (s) = sgn xk (t) for s ≈ t, one has
(5)
χ̇k (t) = ẋk (t) sgn xk (t) =
(5)
=
N
X
Ṁj (t) =
N
X
|ãji (t)|[Mi (t)θ̃ji (t) − Mj (t)].
i=1
Proof: Combining (16) with Lemma 8, we get
=
0
We are going to show that the essentially equivalent protocol
provides the same limit sets for the solutions. Let B1 := {x ∈
RN : |x|1 ≤ 1∀i} be a unit ball in the | · |∞ -norm, positively
invariant by Lemma 11: x(t0 ) ∈ B1 =⇒ x(t) ∈ B1 ∀t ≥ t0 .
Definition 3: Let Ωt0 ,x0 := {y ∈ RN :S ∃tn → ∞ :
Ωt0 ,x0 ⊆ B1
x(tn |t0 , x0 ) −→ y)}. We call the set Ω :=
n→∞
t0 ,x0
the Ω-set of the system (4) (the union is over t0 ≥ 0, x0 ∈ B1 ).
Lemma 12: Suppose the protocols (4) and (18) are essentially equivalent. Then for any ε > 0 there exists T0 = T0 (ε)
such that ξ(T0 ) = x(T0 ) ∈ B =⇒ |x(t)−ξ(t)|∞ ≤ ε ∀t ≥ T0 .
In particular, the systems (4) and (18) have equal Ω-sets.
Proof: Since x(t0 ) ∈ B1 =⇒ x(t) ∈ B1 ∀t ≥ t0 thanks to
Lemma 11, one has
|Φ(t|t0 )|∞ ≤ 1∀t0 ≥ 0∀t ≥ t0 . Let T0 >
R∞
0 be so large that T0 |L[A(t)] − L[A(t)]|∞ dt < ε. Applying
Lemma 11 to (18) implies that ξ(T0 ) ∈ B =⇒ ξ(t) ∈ B∀t ≥
T0 , and hence
R ∞ ∆(t) := (L[A(t)] − L[A(t)])ξ(t) satisfies the
inequality T0 |∆(t)|∞ dt < ε. Since ξ 0 (t) = −L[A(t)]ξ +
∆(t), condition x(T0 ) = ξ(T0 ) ∈ B implies
Z t
ξ(t) − x(t) = ξ(t) − Φ(t|T0 )ξ(T0 ) =
Φ(t|s)∆(s)ds
T0
Rt
which proves (16) since xi (t) = χi (t) sgn xi (t).
Henceforth, we fix some ordering permutation
k 1 (t), . . . , k N (t) for the family χ1 (t), . . . , χN (t) (see
Subsect.VI-B) and put Mj (t) = χkj (t) , in particular,
MN (t) = maxj |xj (t)|. Combining Lemmas 10 and 8, one
gets the following.
Lemma 11: The function MN (t) = max |xi (t)| is noni∈1:N
R∞
increasing and hence 0 |ṀN (t)|dt < ∞. For ãji := akj ki ,
θ̃ji := θkj ki , for a.a. t ≥ 0 and any j ∈ 1 : N one has
Ṁj (t) =
where A(t) = (aij (t)) is locally bounded. We say the protocol
(18) is essentially equivalent to (4) if
Z ∞
|aij (t) − aij (t)|dt < ∞ ∀i, j.
|aki (t)|[xi (t) sgn aki (t) sgn xk (t) − χk (t)],
i=1
N
X
i=1
N
X
i=1
|akj i (t)| [χi (t)θkj i (t) − Mj (t)]
|akj ki (t)| [χki (t)θkj ki (t) − Mj (t)] ,
(17)
(18)
and therefore |ξ(t) − x(t)|∞ ≤ T0 |Φ(t|s)|∞ |∆(s)|∞ ds < ε.
This proves the first claim from where the second one immediate follows: indeed, for any solution x(t|t0 , x0 ) with
t0 ≥ 0, x0 ∈ B and any ε > 0 one can find T0 such that
|ξ(t|T0 , ξ0 ) − x(t|t0 , x0 )|∞ = |ξ(t|T0 , ξ0 ) − x(t|T0 , ξ0 )|∞ ≤ ε
for any t ≥ T0 , where ξ0 := x(T0 |t0 , x0 ) ∈ B. Therefore, any
set Ωt0 ,x0 from Definition 3 belongs to the Ω-set of (18) and
thus the whole Ω-set of (4) belongs to the Ω-set of (18). The
inverse inclusion is proved in the same way.
Remark 4: Such properties of the protocol as modulus
consensus, stability, bipartite consensus, and “partial” modulus
consensus (modulus agreement among a subgroup of agents)
in fact depend only on the Ω-set. For instance, modulus
consensus is established if and only if the Ω-set is comprised
of the set {x ∈ B : |x1 | = . . . = |xN |}. Lemma 12 implies
that those properties are preserved, replacing the protocol with
essentially equivalent one.
We are now going to prove Lemmas 3, 5. Lemma 3 immediately follows from Lemma 11 since MN (t) = maxj |xj (t)|.
Proof of Lemma 5: Suppose the protocol (4) establishes
bipartite consensus. Lemma 12 and Remark 4 show that,
10
without loss of generality, one may assume ajk ≡ 0 unless
j essentially interacts with k, i.e. (j, k) ∈ E[A(·)]. If the
topology is not EQSC, then the graph G[A(·)] is not QSC and
thus, as shown in [5], there exist non-empty disjoint subsets
V1 , V2 ⊂ 1 : N that has no incoming arcs: ajk = 0 if
j ∈ V1 , k 6∈ V1 or j ∈ V2 , k 6∈ V2 . Therefore, the opinions
of agents from V1 are independent on the opinions of agents
from V2 , and hence bipartite consensus is impossible.
D. Proof of Theorems 3, 4 and Corollary 3
Henceforth G[A(·)] is cut-balanced. The cornerstone of the
proofs is the following lemma, based on Lemma 11.
Lemma 13: For a given solution of (4), let η̃ji (t) :=
|ãji (t)|(θ̃ji (t)Mi (t) − Mj (t)), where θ̃ji are the same as in
(16). Then η̃ji ∈ L1 [0; ∞] for any i, j, so that Ṁj ∈ L1 [0; ∞].
Proof: Lemma 11, which is valid for any dynamic graph,
shows that η̃N 1 , . . . , η̃N,N −1 ∈ L1 [0; ∞] since η̃N j ≤ 0 and
ṀN ∈ L1 . We are going to show that η̃N −1,j ∈ L1 .
Note that |η̃N j (t)| ≥ |ãN j (t)|(MN (t) − MN −1 (t)) for any
j < N . Indeed, |θ̃N,j Mj − MN | ≥ |MN | − |θ̃N,j Mj | ≥
MN − MN −1 since Mj ≤ MN −1 . Applying the definition
0
1 2
of cut-balance (2) to
. . , k N −1 } and V 00 =
P V = {k , k , .P
N
{k }, one obtains
|ãjN (t)| ≤ K
|ãN j (t)|. Therefore
j<N
j<N
∆
the function SN (t) = (MN (t) − MN −1 (t))
NP
−1
|ãjN (t)| is
j=1
N
−2
X
+
η̃N −1,j (t)+η̃N
−1,N (t). (19)
j=1
−
Since −η̃N
−1,N (t) ≤ 0 and η̃N −1,j (t) ≤ 0 for any t ≥ 0
1
and the last term in (19)
R ∞is L -summable, we either have
−
1
η̃N −1,N , η̃N −1,j ∈ L or 0 ṀN −1 (t)dt = −∞. The latter is
impossible since MN −1 (t) ≥ 0. Thus η̃N −1,j ∈ L1 [0; ∞] ∀j.
Our next step is to prove that η̃N −2,j ∈ L1 for any
j. We note that for any j ≤ N − 2 and r = N − 1, N
we have |η̃rj (t)| ≥ |ãrj (t)|(MN −1 (t) − MN −2 (t)).
Applying (2) to V 0
=
{k 1 , k 2 , . . . , k N −2 } and
NP
−2 P
N
V 00 = {k N −1 , k N }, we obtain that
|ãjr (t)| ≤
j=1 r=N −1
K
NP
−2
N
P
|ãrj (t)|
and
hence
the
function
j=1 r=N −1
SN −1 (t)
∆
=
(MN −1 (t) − MN −2 (t))
NP
−2
−
−
ṀN −2 (t) = −η̃N
−2,N −1 (t) − η̃N −2,N (t) +
N
P
|ãjr (t)|
j=1 r=N −1
belongs to L1 . If η̃N −2,N −1 (t)
>
0, one has
η̃N −2,N −1 (t) = |ãN −2,N −1 (t)|(MN −1 − MN −2 (t)). There+
fore, η̃N
−2,N −1 ≤ SN −1 . Analogously, if η̃N −2,N (t) > 0
then η̃N −2,N (t) = |ãN −2,N (t)|(MN (t) − MN −1 (t) +
+
MN −1 − MN −2 (t)) and hence η̃N
−2,N ≤ SN −1 + SN . Thus
N
−3
X
η̃N −2,j (t)+
j=1
+
+
+η̃N
−2,N −1 (t) + η̃N −2,N (t).
−
−
Since −η̃N
−2,N (t) ≤ 0, −η̃N −2,N −1 (t) ≤ 0 and η̃N −2,j (t) ≤
0 for
j < N −2, then either all of these functions are summable
R∞
or 0 ṀN −2 (t)dt = −∞. The latter is impossible since
MN −2 (t) ≥ 0. Therefore, η̃N −2,j ∈ L1 [0; ∞] ∀j.
∆
Applying the same procedure, one proves that SN −2 (t) =
NP
−2 P
N
|ãjr (t)| is summable and
(MN −2 (t) − MN −3 (t))
j=1 r=N −2
η̃N −3,j ∈ L1 [0; ∞] ∀j, and so on, η̃ij ∈ L1 [0; ∞].
Corollary 4: For any solution of (4) one has ηij :=
|aij |(θij χj − χi ) ∈ L1 [0; ∞] and χ̇i ∈ L1 [0; ∞], so the finite
limits χ0i = lim χi (t) and x0i := lim xi (t) = ±χ0i exist.
t→+∞
t→+∞
If (i, j) ∈ E[A(·)] then |x0i | = |x0j |; moreover, x0i = x0j when
(i, j) ∈ E + [A(·)] and x0i = −x0j when (i, j) ∈ E − [A(·)]; as a
consequence, x0i = x0j = 0 if (i, j) ∈ E + [A(·)] ∩ E − [A(·)].
Proof: Since k 1 , . .P
. , k N is just P
a permutation of the
set 1 : N , we have
i,j |ηij | =
i,j |η̃ij |, and hence
ηji ∈ L1 [0; ∞] for any i, j. From (16) one immediately
obtains that χ̇i ∈ L1 [0; ∞] for any i, from where the
existence of the finite limits χ0i := lim χi (t) is immediate.
t→+∞
The limits x0i =
summable. Note that if η̃N −1,N (t) > 0 then θ̃N −1,N (t) = 1
and η̃N −1,N (t) = |aN −1,N (t)|(MN (t) − MN −1 (t)). Thus,
+
+
1
η̃N
−1,N (t) ≤ SN (t) and hence η̃N −1,N ∈ L . By invoking
(17) for j = N − 1, one obtains that
−
ṀN −1 (t) = −η̃N
−1,N (t)+
+
+
1
η̃N
−2,N , η̃N −2,N −1 ∈ L [0; ∞]. Applying (17), we get
lim xi (t) = ±χ0i exist since xi are
t→+∞
continuous. From |ηij (t)| ≥ |aij (t)||χj (t) − χi (t)| we know
that if δ := |χ0i − χ0j | > 0, for
R ∞large t > 0 one has
|ηij (t)| ≥ |aij (t)|δ/2 and thus 0 |aij (t)|dt < ∞ (aij
are locally bounded). Therefore, χ0i = χ0j whenever i and
j essentially interact. Suppose that x0i = x0j 6= 0. As
t → ∞, one has sgn xi (t) = sgn x0i = sgn xj (t) and thus if
ajk (t) < 0, we have ηij (t) = |aij (t)|(−xi (t) − xj (t)). Thus
0
|ηij (t)| ≥ |a−
ijR(t)||xi | for t > 0 sufficiently large, from where
−
one has that ij |aij (t)|dt < ∞. So if the agents essentially
compete, the option x0i = x0j 6= 0 is impossible, and thus
x0i = −x0j (with possibility of x0i = x0j = 0). Analogously,
0
one can easily show that |ηij (t)| ≥ |a+
ij (t)||xi | for t > 0
0
0
sufficiently large if xi = −xj 6= 0 which proves the essential
cooperation excludes the possibility of x0i = −x0j 6= 0 and
thus x0i = x0j . At last, simultaneous essential cooperation and
essential competition imply that x0i = x0j = −x0j = 0.
Corollary 5: If the network topology is ESC, the protocol
(4) establishes modulus consensus (χ01 = . . . = χ0N ), and
χ0j = 0 unless G ± is well-defined (E + ∩ E − = ∅) and SB.
Proof: The first statement immediately follows from
Corollary 4 since for any path i1 , i2 , . . . , ir in G one has
χ0i1 = . . . = χ0ir . Assume that for some initial vector x(0) one
has χ0i 6= 0. Corollary 4 implies that no pair of agents may be
both essentially cooperative and essentially competitive, and
thus E + ∩ E − = ∅ so the signed graph G ± is well-defined. We
have to show G ± is structurally balanced, in other words [17],
[28], has no negative cycles. Indeed, the weight of any arc
(i, j) ∈ E is sij = 1 if (i, j) ∈ E + (hence x0i = x0j ) and sij =
−1 if (i, j) ∈ E − (and thus x0i = −x0j ) so that x0i x0j sij ≥ 0.
Given a cycle i1 , . . . , in = i1 , Multiplying the inequalities
11
x0ik x0ik+1 sik ik+1 ≥ 0, where i1 , i2 , . . . , in = i1 is a cycle and
k ∈ 1 : (n − 1), one has si1 i2 si2 i3 . . . sin−1 in (x01 . . . x0n )2 ≥ 0
which means that the cycle is positive.
Proof of Theorem 3: The necessity in the first statement
part follows from Lemma 5 and Corollary 5: indeed, the ESC
condition is necessary for bipartite consensus independent of
the cut-balance property. Under the ESC condition, bipartite
consensus is possible only when G ± exists and is SB. To
prove sufficiency, suppose that G ± is well-defined, strongly
connected and structurally balanced. Thanks to Corollary 5,
the protocol (4) establishes modulus consensus, and it remains
to show it is bipartite consensus. Indeed, consider the protocol
(18), where A(t) = (ajk (t)) and ajk (t) = a+
jk (t) when
−
(j, k) ∈ E + , ajk (t) = a−
(t)
when
(j,
k)
∈
E
,
and
otherwise
jk
ajk ≡ 0. The protocol (18) is equivalent to the protocol (4) and
hence establishes modulus consensus of the same type as (18)
by Lemma 12 and Remark 4. Let V1 , V2 be the hostile camps
of the graph G ± , covering all its nodes. Taking xj = +1
for j ∈ V1 and xj = −1 for j ∈ V2 , one can show that
x = (x1 , . . . , xN )T is an equilibrium point for (18) and hence
bipartite consensus is reached. Accordingly to Corollary 4,
x0i = x0j if i, j ∈ Vr1 or i, j ∈ Vr2 , and x0i = −x0j whenever
i ∈ Vr1 , j ∈ Vr2 ; therefore, opinions polarize unless Er− = ∅.
The claim about stability also follows from Corollary 4.
Remark 5: It may seem that Theorem 3 may be proved by
applying the result for unsigned graphs [10] to the system,
obtained from the protocol (18) just constructed via the gauge
transformation (as Lemma 4 was derived from the relevant
result on cooperative agents). Unfortunately, this is not the
case. The problem is that the graph G[A(·)] is no longer cutbalanced.
This property depends not only on the integrals
R∞
|a
(s)|ds,
but on the whole function A(t), and is lost
jk
0
after removing inessential interactions.
Proof of Theorem 4: The first and the last claims follow
from Corollary 4. The second claim is proved by passing to an
auxiliary protocol (18), constructed in the proof of Theorem 3.
Let Vr1 and Vr2 be hostile camps in Gr± , then taking xi = +1
for i ∈ Vr1 , xi = −1 for i ∈ Vr2 and xi = 0; otherwise, we get
an equilibrium point of (18), and therefore, modulus consensus
in the subcommunity Vr is bipartite. Thanks to Corollary 4,
x0i = x0j if i, j ∈ Vr1 or i, j ∈ Vr2 , and x0i = −x0j whenever
i ∈ Vr1 , j ∈ Vr2 ; therefore, opinions polarize unless Er− = ∅,
when bipartite consensus is established.
Sk (t) ≤ R(t1 − t0 ) ∀t ∈ [t0 ; t1 ]. From (16) one derives that
Zt
N
X
|aki (τ )|χi (τ )dτ e−Sk (t) .
χk (t) ≤ χk (t0 ) + eSk (τ )
0
i=1
(21)
P
Since χi (τ ) ≤ M , one has
|aki (τ )|χi (τ ) ≤ M sk (τ ) and
χk (t) ≤ M + [χk (t0 ) − M ]e−Sk (t) ≤ M + [χk (t0 ) − M ]θ0 .
Lemma 15: Under assumptions of Lemma 14, suppose the
Rt
∆
graph G[ t01 abs A(t)dt] is strongly ε-connected and θ =
2
εθ0 < 1. Let V ( 1 : N be a non-empty set, |x(t0 )|∞ = M
and max |xj (t0 )| = M 0 . Then there exists k ∈ V such that
j6∈V
|xk (t1 )| ≤ θM 0 + (1 − θ)M.
(22)
R t1
Proof: Since the graph G[ t0 abs A(t)dt] is strongly
ε-connected,
there exist i 6∈ V and k ∈ V such that
R t1
|aki (t)|dt ≥ ε. From (20) one has χj (t) ≤ M + (M 0 −
t0
M )θ ∀j 6∈ V and χj (t) ≤ M ∀j ∈ V , which entails that
PN
eSk (τ ) i=1 |aki (τ )|χi (τ ) ≤ M eSk (τ ) sk (τ ) − (M − M 0 )θε
(we used that eSk (τ ) ≥ 1). Inequality (21) yields now that
χk (t1 ) ≤ M + (M 0 − M )θ0 εe−Sk (t1 ) ≤ M + (M 0 − M )θ,
since eSk (t1 ) ≤ eR(t1 −t0 ) = θ0 .
Proof of Theorem 2: By assumption, there exist
R,Rε, T > 0 such that |A(t)|∞ ≤ R and the graph Gt =
t+T
G[ t
abs A(τ )dτ ] is strongly ε-connected for any t ≥ 0.
Let θ0 = e−RT and θ = εθ02 , without loss of generality we
may assume that θ < 1.
We know from Lemma 3 that the maximal modulus MN (t)
always has a limit: MN (t) → M∗ as t → +∞ (here we use
the notation introduced in Subsection VI-C so that Mj (t) is
the j-th modulus in the ascending order, Mj (t) = |xkj (t) (t)|).
Our goal is to show that Mj (t) → M∗ via induction by j =
N, N − 1, . . . , 1 . If M∗ = 0 the latter claim is trivial since
0 ≤ Mj (t) ≤ MN (t); hence we may assume that M∗ > 0.
For j = N our claim holds by definition of M∗ . Suppose
we have proved that MN (t), MN −1 (t), . . . , Mr+1 (t) → M∗
as t → +∞ and have to show that Mr (t) → M∗ . Since
Mr (t) ≤ Mr+1 (t), it suffices to show that lim Mr (t) ≥
t→+∞
M∗ . Assume on the contrary that lim Mr (t) = m < M∗ .
t→+∞
For any δ > 0, we have M∗ + δ > Mj (t) > M∗ − δ for large
t > 0 and j > r. On the other hand, there exist a sequence
tn → ∞, along which Mr (tn ) < m + δ. Assume that δ > 0
is so small that (m + δ)θ + (M∗ + δ)(1 − θ) < M∗ − δ and
E. Proof of Theorem 2 and Corollary 1
(m + δ)θ0 + (M∗ + δ)(1 − θ0 ) < M∗ − δ, that is, 2δ <
(M∗ − m) max(θ0 , θ).
We start with some useful estimates for the solutions.
Accordingly to Lemma 15, applied for t0 = tn and V =
Lemma 14: Suppose that A : [t0 ; t1 ] → RN is a matrixr+1
∆
{k
(tn ), . . . , k N (tn )}, M = M∗ + δ and M 0 = m∗ + δ,
valued function, |A(t)|∞ ≤ R for a.a. ∈ [t0 ; t1 ] and θ0 =
there exists j ∈ V such that |xj (t0 + T )| < M∗ − δ. Similarly,
e−R(t1 −t0 ) . For any solution of (4) one has
for any j 6∈ V we have |xj (tn + T )| < M∗ − δ thanks to
|xk (t)| ≤ θ0 |xk (t0 )|+(1−θ0 )|x(t0 )|∞ ∀k ∈ 1 : N ∀t ∈ [t0 ; t1 ]. Lemma 14. Therefore, at time tn + T there are at least r + 1
(20) agents, whose opinions have moduli less than M∗ − δ and
hence Mr+1 (tn + T ) ≤ M∗ − δ for any n. We arrived at the
∆
Proof: Let M = |x(t0 )|∞ . Thanks to Lemma 3, one has
contradiction
with the induction hypothesis. We thus proved
P
∆
N
|xj (t)| ≤ M for any j, t. Let sk (t) =
j=1 |akj (t)| and
that
M
(t)
→
M∗ ∀j for any solution of (4), that is, modulus
j
∆ Rt
Sk (t) = t0 sk (ξ) dξ. By assumption, sk (t) ≤ R and hence consensus is established.
12
Proof of Corollary 1: By virtue of Theorem 2, modulus
consensus is established. According to Lemma 1 it only three
types of such a consensus are possible, which are stability,
polarization and consensus. The common feature of the first
two types is that for a.a. x(0) there exists i ∈ 1 : N such that
lim xi (t) ≤ 0. It is well known [6], [9], [46] that the convex
polarization). Getting rid of the restriction of static topologies
allows to examine linear and nonlinear dynamics of social
networks, where the agents may change their relations from
friendship to hostility and vice versa. We are currently working
with sociologists to test the theoretical results presented in this
paper using data from human social groups.
hull of the agents’ states ∆(t) = [min xi (t), max xi (t)] is noni
i
expanding over time. Hence if xi (0) ≥ 1 ∀i, then xi (t) ≥ 1
for any t ≥ 0, so the first two options are not possible.
R EFERENCES
t→+∞
F. Proof of Lemma 6 and Theorems 5, 6
We start with proof of Lemma 6, being a basis for Theorem 5.
Proof of Lemma 6: We consider system (9), and the
protocol (10) may be studied in the same way. Equation (11)
is immediate from the definitions of aij and Hij . As follows
from Lemma 3, the solutions of (11) remain bounded since
|x(t)|∞ ≤ |x(0)|∞ . Since Hij (y, z) > 0 are continuous functions and the set {(y, z) : |y|, |z| ≤ |x(0)|∞ } is compact, there
exist M > m > 0 such that m ≤ Hij [y, z] ≤ M whenever
|y|, |z| ≤ |x(0)|∞ . By substituting y := xj (t) sgn aij (t) and
z := xi (t), one shows that m|ajk | ≤ |ajk | ≤ M |ajk |, from
where the claim of Lemma 6 is obvious.
Now we proceed with the proofs of Theorems 5 and 6.
Proof of Theorem 5: Since the right-hand sides of
(9), (10) are smooth in x, the solutions exist locally and
are unique. According to Lemma 3 and (11), the solutions
remain bounded and thus infinitely prolongable. Under the
USC assumption, modulus consensus follows from Theorem 2
and Lemma 6. If the graph G[A(·)] is ESC and cut-balanced,
modulus consensus is implied by Theorem 3.
Proof of Theorem 6: Using Lemma 3, one proves that
the solution is bounded and hence its derivative also remains
bounded due to (13), so any solution is infinitely prolongable.
Since x(t) is bounded, A(t) is also bounded due to (13). The
remaining claims follow now from Theorems 2, 3.
VII. C ONCLUSIONS AND RELATED WORKS
In the present paper, we extend a model of opinion dynamics in social networks with both attractive and repulsive
interactions between the agents, which was proposed in recent papers by C. Altafini, who considered the conventional
first-order consensus protocols over signed graphs. Altafini
showed, in particular, the possibility of opinion polarization
if the interaction graph is structurally balanced. In general,
the protocol establishes modulus consensus, where the agents
agree in modulus but may differ in signs (which not excludes
convergence of all opinions to zero). In the present paper, we
have examined dynamics of Altafini’s protocols with switching
directed topologies and offer sufficient conditions for reaching
modulus consensus that boil down to uniform strong connectivity of the network. Moreover, under the assumption of cutbalance, the uniform connectivity may be further relaxed. In
this case, we have obtained necessary and sufficient conditions
for modulus consensus, classified into stability (converges
of opinions to zero) and bipartite consensus (consensus or
[1] W. Ren and R. Beard, Distributed consensus in multi-vehicle cooperative
control: theory and applications. Springer, 2008.
[2] M. Mesbahi and M. Egerstedt, Graph Theoretic Methods in Multiagent
Networks. Princeton and Oxford: Princeton University Press, 2010.
[3] W. Ren and Y. Cao, Distributed Coordination of Multi-agent Networks.
Springer, 2011.
[4] M. DeGroot, “Reaching a consensus,” Journal of the American Statistical Association, vol. 69, pp. 118–121, 1974.
[5] L. Moreau, “Stability of multiagent systems with time-dependent communication links,” IEEE Trans. Autom. Control, vol. 50, no. 2, pp. 169–
182, 2005.
[6] Z. Lin, B. Francis, and M. Maggiore, “State agreement for continuoustime coupled nonlinear systems,” SIAM Journ. of Control and Optimization, vol. 46, no. 1, pp. 288–307, 2007.
[7] M. Cao, A. Morse, and B. Anderson, “Reaching a consensus in a dynamically changing environment: convergence rates, measurement delays,
and asynchronous event,” SIAM Journal of Control and Optimization,
vol. 47, no. 2, pp. 601–623, 2008.
[8] V. Blondel, J. Hendrickx, A. Olshevsky, and J. Tsitsiklis, “Convergence
in multiagent coordination, consensus, and flocking,” in Proc. IEEE
Conf. Decision and Control, 2005, pp. 2996 – 3000.
[9] A. Matveev, I. Novinitsyn, and A. Proskurnikov, “Stability of
continuous-time consensus algorithms for switching networks with bidirectional interaction,” in Proceedings of European Control Conference
ECC-2013, 2013, pp. 1872–1877.
[10] J. Hendricx and J. Tsitsiklis, “Convergence of type-symmetric and cutbalanced consensus seeking systems,” IEEE Trans. Autom. Control,
vol. 58, no. 1, pp. 214–218, 2013.
[11] U. Münz, A. Papachristodoulou, and F. Allgöwer, “Consensus in multiagent systems with coupling delays and switching topology,” IEEE
Trans. Autom. Control, vol. 56, no. 12, pp. 2976–2982, 2011.
[12] G. Shi and K. Johansson, “Robust consensus for continuous-time multiagent dynamics,” SIAM J. Control Optim, vol. 51, no. 5, pp. 3673–3691,
2013.
[13] ——, “The role of persistent graphs in the agreement seeking of social
networks,” IEEE J. On Selected Areas In Communications, vol. 31, no. 9,
pp. 595–606, 2013.
[14] L. Scardovi and R. Sepulchre, “Synchronization in networks of identical
linear systems,” Automatica, vol. 45, no. 11, pp. 2557–2562, 2009.
[15] J. Hu and W. Zheng, “Emergent collective behaviors on coopetition
networks,” Physica A, vol. 378, pp. 1787–1796, 2014.
[16] J. Hu and H. Zhu, “Adaptive bipartite consensus on coopetition networks,” Physica D, vol. 307, pp. 14–21, 2015.
[17] D. Easley and J. Kleinberg, Networks, Crowds and Markets. Reasoning
about a Highly Connected World. Cambridge: Cambridge Univ. Press,
2010.
[18] S. Wasserman and K. Faust, Social Network Analysis: Methods and
Applications. Cambridge: Cambridge Univ. Press, 1994.
[19] A. Fläche and M. Macy, “Small worlds and cultural polarization,”
Journal of Math. Sociology, vol. 35, no. 1–3, pp. 146–176, 2011.
[20] J. Dillard and L. Shen, “On the nature of reactance and its role in persuasive health communication,” Communication Monographs, vol. 72,
no. 2, pp. 144–168, 2005.
[21] C. Hovland, I. Janis, and H. Kelley, Communication and persuasion.
New Haven: Yale Univ. Press, 1953.
[22] E. Aronson, T. Wilson, and R. Akert, Social psychology. Upper Saddle
River, NJ: Prentice Hall, 2010.
[23] W. Xia and M. Cao, “Clustering in diffusively coupled networks,”
Automatica, vol. 47, no. 11, pp. 2395–2405, 2011.
[24] R. Hegselmann and U. Krause, “Opinion dynamics and bounded confidence models, analysis, and simulation,” Journal of Artifical Societies
and Social Simulation (JASSS), vol. 5, no. 3, p. 2, 2002.
[25] G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch, “Mixing beliefs
among interacting agents,” Advances in Complex Systems, vol. 3, pp.
87–98, 2000.
13
[26] P. Dandekar, A. Goel, and D. Lee, “Biased assimilation, homophily, and
the dynamics of polarization,” PNAS, vol. 110, no. 15, pp. 5791–5796,
2013.
[27] C. Altafini, “Dynamics of opinion forming in structurally balanced social
networks,” PLoS ONE, vol. 7, no. 6, p. e38135, 2012.
[28] ——, “Consensus problems on networks with antagonistic interactions,”
IEEE Trans. Autom. Control, vol. 58, no. 4, pp. 935–946, 2013.
[29] Z. Meng, G. Shi, K. Johansson, M. Cao, and Y. Hong, “Modulus
consensus over networks with antagonistic interactions and switching
topologies,” http://arxiv.org/abs/1402.2766, 2014.
[30] P. Romanczuk and L. Schimansky-Geier, “Swarming and pattern formation due to selective attraction and repulsion,” Interface Focus, vol. 2,
pp. 746–756, 2012.
[31] W. Yu, G. Chen, M. Cao, J. Lü, and H. Zhang, “Swarming behaviors
in multi-agent systems with nonlinear dynamics,” Chaos, vol. 23, p.
043118, 2013.
[32] C. Wang, G. Xie, and M. Cao, “Forming circle formations of anonymous
mobile agents with order preservation,” IEEE Trans. Autom. Control,
vol. 58, no. 12, pp. 3248–3254, 2013.
[33] A. Zakhar’eva, A. S. Matveev, M. C. Hoy, and A. V. Savkin, “Distributed control of multiple non-holonomic robots with sector vision and
range-only measurements for target capturing with collision avoidance,”
Robotica, vol. 33, pp. 385–412, 2015.
[34] K. Ovchinnikov, A. Semakova, and A. Matveev, “Decentralized multiagent tracking of unknown environmental level sets by a team of
nonholonomic robots,” in Proc. of 6th Int. Congress on Ultra Modern
Communication and Control Systems (ICUMT), 2014, pp. 352–359.
[35] M. Valcher and P. Misra, “On the consensus and bipartite consensus
in high-order multi-agent dynamical systems with antagonistic interactions,” Systems Control Letters, vol. 66, pp. 94–103, 2014.
[36] H. Zhang and J. Chen, “Bipartite consensus of linear multi-agent systems
over signed digraphs: An output feedback control approach,” in Proc.
of IFAC World Congress, 2014, pp. 2118 – 2123.
[37] J. Hendrickx, “A lifting approach to models of opinion dynamics with
antagonisms,” in Proc. of IEEE Conference on Decision and Control
(CDC), 2014, pp. 2118 – 2123.
[38] C. Altafini and G. Lini, “Predictable dynamics of opinion forming
for networks with antagonistic interactions,” IEEE Trans. on Autom.
Control, vol. 60, no. 2, pp. 342–357, 2015.
[39] W. Xia, M. Cao, and K. Johansson, “Structural balance and opinion
separation in trust–mistrust social networks,” IEEE Trans. on Control of
Networks, 2015 (accepted).
[40] H. Smith, “Systems of ordinary differential equations which generate an
order preserving flow. A survey of results.” SIAM Review, vol. 30, pp.
87 – 113, 1988.
[41] Z. Lin, B. Francis, and M. Maggiore, “Necessary and sufficient graphical
conditions for formation control of unicycles,” IEEE Trans. Autom.
Control, vol. 50, no. 1, pp. 121–127, 2005.
[42] A. Proskurnikov and M. Cao, “Opinion dynamics using Altafini’s model
with a time-varying directed graph,” in Proceedings of IEEE ISIC 2014
(Part of IEEE MSC 2014), Antibes, 2014, pp. 849–854.
[43] A. Proskurnikov, A. Matveev, and M. Cao, “Consensus and polarization
in Altafini’s model with bidirectional time-varying network topologies,”
in Proceedings of IEEE CDC 2014, Los Angeles, 2014, pp. 2112–2117.
[44] R. Olfati-Saber and R. Murray, “Consensus problems in networks of
agents with switching topology and time-delays,” IEEE Trans. Autom.
Control, vol. 49, no. 9, pp. 1520–1533, 2004.
[45] P. Chebotarev and R. Agaev, “The forest consensus theorem,” IEEE
Trans. Autom. Control, vol. 59, no. 9, pp. 2475–2479, 2014.
[46] L. Moreau, “Stability of continuous-time distributed consensus algorithms,” in Proc. IEEE Conf. Decision and Control (CDC 2004), 2004,
pp. 3998 – 4003.
[47] S. Marvel, J. Kleinberg, R. Kleinberg, and S. Strogatz, “Continuous-time
model of structural balance,” PNAS, vol. 108, no. 5, pp. 1771–1776,
2011.
[48] T. Antal, P. Krapivsky, and S. Redner, “Dynamics of social balance on
networks,” Phys. Rev. E, vol. 72, p. 036121, 2005.
[49] R. Agaev and P. Chebotarev, “On the spectra of nonsymmetric laplacian
matrices,” Linear Algebra Appl., vol. 399, pp. 157–168, 2005.
[50] F. Clarke, “Generalized gradients and applications,” Trans. of Amer.
Math. Soc., vol. 205, pp. 247 – 262, 1975.
[51] E. McShane and R. Warfield, “On Filippov’s implicit functions lemma,”
Proc. Amer. Math. Soc., vol. 18, pp. 41–47, 1967.
Anton V. Proskurnikov was born in Leningrad
(now St. Petersburg) in 1982. He received his M.Sc.
and Ph.D. degrees in 2003 and 2005 respectively,
both from St.-Petersburg State University and supervised by Prof. V.A. Yakubovich. From 2003 till 2010
he was an Assistant Professor of the Department
of Mathematics and Mechanics, St.Petersburg State
University. Now A. Proskurnikov is a postdoctoral
researcher at the ENTEG institute the University
of Groningen, The Netherlands. He also occupies
part-time researcher positions at St. Petersburg State
University and Institute for Problems of Mechanical Engineering of Russian
Academy of Sciences, St.Petersburg, Russia. His research interests include
dynamics and control of complex networks, multi-agent and decentralized
control nonlinear control, robust control, optimal control and optimization. In
2009 Anton Proskurnikov was awarded with a medal of Russian Academy of
Sciences for prominent young researchers for a series of works on optimal
tracking and disturbance rejection.
Alexey S. Matveev was born in Leningrad, USSR,
in 1954. He received the M.S. and Ph.D. degrees
in 1976 and 1980, respectively, both from the
Leningrad University. Currently, he is a professor
of the Department of Mathematics and Mechanics,
St. Petersburg State University. His research interests
include estimation and control over communication
networks, hybrid dynamical systems, and navigation
and control of mobile robots.
Ming Cao is currently a tenured associate professor
responsible for the research direction of network
analysis and control with the Faculty of Mathematics and Natural Sciences at the University of
Groningen, the Netherlands, where he started as a
tenure-track assistant professor in 2008. He received
the Bachelor degree in 1999 and the Master degree
in 2002 from Tsinghua University, Beijing, China,
and the PhD degree in 2007 from Yale University,
New Haven, CT, USA, all in electrical engineering.
From September 2007 to August 2008, he was a
postdoctoral research associate with the Department of Mechanical and
Aerospace Engineering at Princeton University, Princeton, NJ, USA. He
worked as a research intern during the summer of 2006 with the Mathematical
Sciences Department at the IBM T. J. Watson Research Center, NY, USA.
His main research interest is in autonomous agents and multi-agent systems,
mobile sensor networks and complex networks. He is an associate editor for
Systems and Control Letters, and for the Conference Editorial Board of the
IEEE Control Systems Society. He is also a member of the IFAC Technical
Committee on Networked Systems.
| 3cs.SY
|
arXiv:1704.03627v2 [cs.HC] 6 Dec 2017
Real-time On-Demand Crowd-powered Entity Extraction
(Supplementary Technical Report)
Ting-Hao (Kenneth) Huang
Yun-Nung (Vivian) Chen
Jeffrey P. Bigham
Carnegie Mellon University
Pittsburgh, PA, USA
[email protected]
National Taiwan University
Taipei, Taiwan
[email protected]
Carnegie Mellon University
Pittsburgh, PA, USA
[email protected]
[Note] This is the supplementary technical report of our
paper “Real-time On-Demand Crowd-powered Entity
Extraction,” which was published at the 5th Edition of
The Collective Intelligence Conference (CI 2017) as an
oral presentation (Huang et al. 2017). The original paper
was only 3-page long, so we decided to share extra technical
details in this report.
Sunday
flights
from New
York to
Las Vegas
Dialog ESP Game
Answer
Aggregate
Destination:
Las Vegas
User
Abstract
Figure 1: The crowd-powered entity extraction with a multiplayer Dialog ESP Game. By aggregating input answers
from all players, our approach is able to provide good quality results in seconds.
Modern dialog systems rely on accurate entity extraction
to understand user utterances. However, entity extraction is
brittle due to data scarcity, language variability, and out-ofvocabulary entities. To bridge this gap, we propose a realtime crowdsourcing solution based on the ESP game for image labeling. When multiple players agree, entities can be reliably extracted from an utterance. This approach is advantageous because it does not require training data. Further, it is
robust to unexpected input and capable of recognizing new
entities. Our approach achieves better F1-scores than that of
the automated baseline for complex queries with a reasonable response time. The proposed method is also evaluated
via Google Hangouts’ text chat and demonstrates the feasibility of real-time crowd-powered entity extraction.
more difficult to acquire the complicated conversational data
required by other alternative dialog technologies, such as
statistical dialog management (Young 2006) or state tracking (Williams et al. 2013). Second, existing entity extraction technologies are not robust enough to identify out-ofvocabulary entities. Even when labeled training data for
the targeted slot could be collected, state-of-the-art supervised learning approaches are brittle in extracting unseen
entities. (Xu and Sarikaya 2014) find that the CRF-based
entity extractor performed significantly worse when dictionary features were not used. Third, challenges are also posed
by language variability. Successful applications process diverse input languages where potential entities are unlimited.
Therefore, to robustly serve arbitrary input, dialog systems
must collect new sources of entities and update accordingly.
Research on dialog systems has focused on utilizing
the Internet resource to extract entities such as movie
names (Wang, Heck, and Hakkani-Tur 2014); Unsupervised
slot-filling approaches have also been developed in recent
years (Chen, Hakkani-Tür, and Tur 2014; Heck, HakkaniTür, and Tür 2013). However, these methods are still underdeveloped.
To address these challenges, we propose to use real-time
crowdsourcing as an entity extractor in dialog systems. To
the best of our knowledge, few previous works have attempted to use crowdsourcing to extract entities from a running conversation. (Wang et al. 2012), for example, studied
various methods to acquire natural language sentences for a
given semantic form by the crowd. (Lasecki, Kamar, and Bohus 2013) utilized crowdsourcing to collect dialog data, and
Introduction
To understand user utterances, modern dialog systems rely
heavily on entity extraction, known as the core task of slot
filling in many dialog system frameworks such as Olympus (Bohus et al. 2007). The goal of slot filling is to identify
from a running dialog different slots, which correspond to
different parameters of the user’s query. For instance, when
a user queries for nearby restaurants, key slots for location
and preferred food are required for a dialog system to retrieve the appropriate information. Thus, the main challenge
in the slot-filling task is to extract the target entity.
Dialog systems face three key challenges in entity extraction. Due to data scarcity, labeled training data, which
many existing technologies require to identify entities such
as Conditional Random Fields (CRF) (Raymond and Riccardi 2007; Xu and Sarikaya 2014) and Recurrent Neural
Networks (Mesnil et al. 2015a), are often unavailable for
the wide variety of dialog system tasks. Furthermore, it is
Copyright © 2016, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
1
a dialog1 . The ESP Game was originally proposed as a
crowdsourcing mechanism to acquire quality image labels (Von Ahn and Dabbish 2004). The original game randomly pairs two players and presents them with the same
image. Each player guesses the labels that the other player
would answer. If the players match labels, each is awarded
1000 points. Our approach replaces the image in the ESP
Game with a dialog chat log and players answer the required entity name within a short time. We also relax the
constraints of player numbers to increase game speed. As
Figure 1 shows, by aggregating input answers from all players, the Dialog ESP Game is able to provide high quality
results in seconds.
Figure 2 shows the worker’s interface. When input dialog
utterances reach the crowd-powered entity extraction component, workers are recruited from crowdsourcing platforms
such as Amazon Mechanical Turk (MTurk). The timer begins counting down when the input utterance arrives, and
the worker sees the remaining time on the top right corner
of the interface (Figure 2). When two workers match answers, a feedback notification is displayed, and the workers
earn 1000 points. When the time is up, the task automatically
closes.
To recruit crowd workers quickly, many approaches have
been used in real-time crowd-powered systems such as
VizWiz (Bigham et al. 2010) and Chorus (Lasecki et al.
2013). The quikTurkit toolkit (quikturkit.googlecode.com)
attracts workers by posting tasks and using old tasks to
queue workers. Similarly, the Retainer Model maintains a
retaining pool of workers-in-waiting, who receive a signal
when tasks become available. Prior research shows that the
Retainer Model is able to recall 75% of workers within 3
seconds (Bernstein et al. 2011). In Experiment 1, we first focus on the speed and performance of the Dialog ESP Game
itself instead of recruiting time. In Experiment 2, we propose a novel approach to recruit workers within 60 seconds
and discuss details of the end-to-end response speed.
Figure 2: The Dialog ESP Game interface is designed to
encourage quick and correct entity identification by crowd
workers. Workers are shown the complete dialog and a description of the entity they should identify.
illustrated CrowdParse, a system that uses the crowd to parse
dialogs into semantic frames. Recently, (Huang, Lasecki,
and Bigham 2015) presented a crowd-powered dialog system called Guardian that uses the crowd to extract information from input utterances. However, none of these works
conducted formal studies on crowd-powered entity extraction in real-time.
Inspired by the ESP game for image labeling (Von Ahn
and Dabbish 2004), we propose a Dialog ESP Game to encourage crowd workers to accurately and quickly perform
entity extraction. The ESP Game matches answers among
different workers to ensure label quality, and we use a timer
on the interface (Figure 2) to ensure input speed. Our method
offers three main advantages: 1) it does not require training
data; 2) it is robust to unexpected input; and 3) it is capable
of recognizing new entities. Furthermore, answers submitted from the crowd can be used as training data to bootstrap
automatic entity extraction algorithms. In this paper, we conduct experiments on a standard dialog dataset and user experiments with 10 users via Google Hangouts’ text chatting
interface. Detailed experiments demonstrate that our crowdpowered approach is robust, effective, and fast.
In sum, the contributions of our work are as follows:
Experiment 1:
Applying Dialog ESP Game
on ATIS Dataset
To evaluate the Dialog ESP Game for entity extraction, we
conducted experiments on MTurk to extract names of destination cities from a flight schedule query dialog dataset, the
Airline Travel Information System (ATIS) dataset.
1. We propose an ESP-game-based real-time crowdsourcing
approach for entity extraction in dialog systems, which
enables accurate entity extraction for a wide variety of
tasks.
2. To strive for real-time dialog systems, we present detailed
experiments to understand the trade-offs between entity
extraction accuracy and time delay.
ATIS Dataset The ATIS dataset contains a set of flight
schedule query sessions, each of which consists of a sequence of spoken queries (utterances). Each query contains
automatic speech recognized transcripts and a set of corresponding SQL queries. All queries in the data set are annotated with the query category: A, D, or X. Class A queries
are context-independent, answerable, and formed mostly in
a single sentence; however, real-world queries are more
3. We demonstrate the feasibility of real-time crowdpowered entity extraction in instant messaging applications.
Real-time Dialog ESP Game
1
The source code of worker interface and the data collected in
Experiment 2 are available at:
https://github.com/windx0303/dialogue-esp-game
We utilize real-time crowdsourcing with a multi-player Dialog ESP Game setting to extract the targeted entity from
2
complex. In the ATIS data set, 32.2% queries are contextdependent (Class D) and 24.0% of the queries are cannot
be evaluated (Class X) (Hirschman 1992). The “contextdependent” Class D queries require information from previous queries to form a complete SQL query. For instance,
in one ATIS session, the first query is “From Montreal to Las
Vegas” (Class A). The second query in the session is “Saturday,” which requires the destination and departure city name
from the first query, and is thus annotated as Class D. Class
X is of all the problematic queries, e.g., hopelessly-vague or
unanswerable.
Time
Const.
20s
Data Pre-processing & Experiment Setting For Class
A, we obtain the preprocessed data used in many slot filling works (Xu and Sarikaya 2014; Mesnil et al. 2015a;
He and Young 2003; Raymond and Riccardi 2007; Tur,
Hakkani-Tur, and Heck 2010), which contain 4,978 queries
for training, 893 queries for testing, and 491 queries for
developing. 200 queries are randomly extracted from the
developing set for our study; For Class D and X, we obtain the original training set of ATIS-3 data (Dahl et al.
1994), which contains 364 sessions and 3,235 queries. 200
Class-D queries are randomly selected from 200 distinct sessions. For each extracted query, all previous queries before
it within the same session are also obtained and displayed in
the worker’s interface (Figure 2). The same process is used
to extract 150 Class-X queries for the experiments. Note that
in this work we focus only on the toloc.city name slot
(name of destination city), which is the most frequent slot
type in ATIS. For each extracted query of Class D and X, we
define the last-mentioned destination city name of the flight
in the query history (including the extracted query) as the
gold-standard slot value.
15s
#
Player
Avg.
Resp.
Time
P
R
F1
ESP+
1st
10
7.837s
.867
.916
.891
5
11.160s
.828
.877
.852
1st
Only
10
5.590s
.713
.753
.732
5
6.924s
.730
.769
.749
ESP
Only
10
7.837s
.867
.916
.891
5
11.160s
.856
.797
.826
ESP+
1st
10
8.129s
.837
.893
.864
5
10.628s
.799
.798
.798
1st
Only
10
5.895s
.739
.764
.751
5
7.136s
.729
.726
.727
ESP
Only
10
8.129s
.860
.865
.863
5
10.628s
.872
.637
.736
Aggregate
Table 1: Dialog ESP Game results in Class A given different
settings of number of players, time constraint (Time Const.),
and the method to aggregate input answers.
could result in different response speed and output quality.
Note that if there are not any input answers, the methods
above will wait until the time constraint and return an empty
label. In the actual experiments, 5 Dialog ESP Games for 5
different Class-A queries are aggregated in one task, with an
extra scripted game at the beginning as a tutorial. When the
first game ends, the timer of the second ESP game starts and
a browser alert informs the worker. All experiments are run
on MTurk; 800 Human Intelligence Tasks (HITs) are posted,
and 588 unique workers participate in this study.
Table 1 shows the results on Class A queries. With 10
players and a 20-second time constraint, the Dialog ESP
Game achieves a best F1-score of 0.891 by the “ESP+1st”
setting, and achieves the fastest average response time of
5.590 seconds by the “1st” setting. The ESP+1st setting
achieves the best F1-score, and the 1st Only setting has
the shortest response time. In most cases, tightening the
time constraint provides a faster response but reduces output quality.
We also analyze the relations among worker numbers,
performance, and response time. First, Figure 4 shows output quality with respect to answer’s input order. On average, earlier input answers are of better quality, unless 10
or more players participate in the game. However, with 10
players, almost all ESP games have at least one matched answer pair so that the ith answer is not solely used. Therefore, for the following experiments, we set i as 1. Second,
in Figure 3(a) we observe the relations between the number of players and average response time. Adding players
reduces the average response time for all settings. Third, the
relations between number of players and output quality are
also analyzed. Figure 3(b) shows that the F1-scores increase
when adding more players, even with the “1st Only” setting.
Understanding Accuracy and Speed Trade-offs
In order to design an effective crowd-powered real-time entity extraction system, it is crucial to understand trade-offs
between accuracy and speed. These trade-offs correspond to
the three main variables in our system: the number of players recruited to answer each query in the Dialog ESP Game,
the time constraint that each player has to answer a query,
and the method to aggregate input answers. We have 3
ways to aggregate the input answers from the ESP game:
• ESP Only: Return the first matched answer. If no answers
match within the given time, return an empty label.
• ith Only: Return the ith input answer (i = 1, 2, ...). For
example, i = 1 means to return the first input answer.
• ESP + ith: Return the first matched answers of the ESP
game. If no answers match within the given time, return
the ith answer.
We recruit 10 players for each ESP game, and randomly
select player results to simulate the conditions of various
player numbers. All results reported in Experiment 1 are the
averages of 20 rounds of this random-pick simulation process. After empirically testing the interface, we run two sets
of studies with time constraints set at 20 and 15 seconds,
respectively. Different methods to aggregate input answers
3
16
12
8
ESP + 1st (20 sec)
ESP + 1st (15 sec)
1st (20 sec)
1st (15 sec)
1.00
0.90
0.80
0.80
0
2
4
6
8
# Player
(a)
0.60
0
10
10 Players
9 Player
8 players
7 Players
6 Players
5 Players
1st Only
(20 sec)
0.70
0.70
0.60
4
ESP + 1st
(20 sec)
0.90
F1-score
ESP + First (20 sec)
ESP + First (15 sec)
First (20 sec)
First (15 sec)
F1-score
Avg. Resp. Time (sec)
20
2
4
6
8
# Player
(b)
10
5
(c)
6
7
8
9
10
11
12
Avg. Response Time (sec)
Figure 3: Trade-off curves between accuracy, average response time and number of players.
10 Players
4 Players
2 Players
F1-score
0.80
0.70
language understanding model, implemented by an recurrent neural network (RNN) with GRU cells (Mesnil et al.
2015b; Chen et al. 2016), on the crowd-labelled or expertlabelled 200 ATIS conversations used in our study, and use
the standard ATIS Class-A testing set to compare the performance in terms of the number of training samples. Figure 5 illustrates the performance curves of models trained
on crowd-labelled and expert-labelled data. The result shows
that crowd-generated labels can be used to train machinelearning models for bootstrapping in new domains, and
achieve comparable performance to expert-labelled data.
0.60
0
1
2
3
4
Input Order (i)
5
6
7
Figure 4: F1-score of the “ith Only” setting. Earlier input
answers are generally of better quality (unless #players >
10, where almost all ESP games have at least one matched
answer and the ith answer might not be solely used.)
80
Evaluation on Complex Queries
70
Based on the study above, for Class D and X queries, we use
the Dialog ESP Game of 10 players with “ESP+1st” and “1st
Only” settings to measure the best F1-score and speed. The
time constraint is set to 20 seconds. The experiments are run
on MTurk and all settings are identical as the previous section. 76 distinct workers participate in Class D experiments,
and 68 distinct workers participate in Class X experiments.
Experimental results are shown in Table 2. An automated
CRF model is implemented as a baseline.2 The CRF model
is trained on the Class-A training set mentioned above by using neighbor words (window size = 2) and POS tag features.
The CRF model is decoded and timed on a laptop with Intel i5-4200U CPU (@1.60GHz) and 8GB RAM. As a result,
the proposed crowd-powered approach largely outperforms
the CRF baseline in terms of F1-score on both Class D and
X queries . Although the CRF approach is well-developed
on Class A data, it is not effective on the remaining data.
Surprisingly, we find similar average response times in
each query category. Note that the text length is different for
each category: the average token number of Class-A queries
is 11.47, of Class-D queries (including the query history)
is 48.64, and of Class-X queries is 67.72. Studies showed
that eyes’ warm-up time (Inhoff and Rayner 1986) and word
frequency influence speed of text comprehension (Rayner
and Duffy 1986; Healy 1976). These factors might reduce
the effect of text length to the reading speed of crowd works.
We also conduct an error analysis on the result of
“ESP+1st” setting, which achieves our best F1-score. The
distribution of error types are shown in Table 3. The
“fromloc.city name” type indicates that the crowd extracts the departure city, rather than destination city; In “In-
60
F1 (%)
50
40
30
Crowd-Labelled
20
Expert-Labelled
10
0
0
20
40
60
80
100
120
140
160
180
200
#Training Samples for RNN
Figure 5: The performance of the extracted destination city
predicted by the RNN-GRU trained on crowd-labelled and
expert-labelled data. Crowd-labelled labels can be used to
train machine-learning models and achieve comparable performance to expert-labelled data.
Finally, Figure 3(c) demonstrates the trade-offs between performance and speed. For a fixed number of players, different
input aggregate methods have different response times and
F1-scores. The ESP game requires more time for input answer matching, but in return output quality increases.
Bootstrapping Automated System Performance
Once our crowd-powered system starts extracting entities,
the collected annotations can serve as training data for
the automated system. In order to see whether the crowdannotated data is good enough for training a machine learning model, and how many of text instances are required to
achieve reasonable performance, we train a state-of-the-art
2
4
Implemented with CRF++: http://taku910.github.io/crfpp/
Query Category
Methods
CRF Baseline
1st Only
ESP + 1st
Class D (context-dependent)
Resp. Time
P
R
F1
0.043s
.776 .307 .440
5.460s
.658 .641 .649
7.118s
.814 .797 .805
Class X (unevaluable)
Resp. Time
P
R
F1
0.061s
.636 .285 .393
6.342s
.563 .577 .570
8.301s
.654 .675 .664
Class A (context-independent)
Resp. Time
P
R
F1
0.019s
.985 .987 .986
5.590s
.713 .753 .732
7.837s
.867 .916 .891
Table 2: Result for Class D, X and A. Crowd-powered entity extraction outperforms the CRF baseline in terms of F1-score on
both Class D and X queries. Although the CRF baseline is well-developed on Class A, it is not effective on complex queries.
Error Type
fromloc.city name
False Negative
Incorrect City
Correct City & Soft Match
False Positive
Class D
Class X
39.53%
18.60%
16.28%
16.28%
9.30%
16.67%
26.67%
18.33%
5.00%
33.33%
recruited workers and log the timestamps of following activities: 1) users’ and workers’ keyboard typing, 2) workers’
task arrival, and 3) the workers’ answer submissions.
To recruit crowd workers, we introduce fleeting task, a recruiting practice inspired by quikturkit (Bigham et al. 2010).
This approach achieves low latency by posting hundreds of
short lifetime tasks, which increases task visibility. Its short
lifetime (e.g., 60 seconds) encourages workers to complete
tasks quickly. A core benefit of the fleeting task approach is
its ease in implementation: the method bypasses the common practices of pre-recruiting workers and maintaining
a waiting pool (Bigham et al. 2010; Lasecki et al. 2013;
Bernstein et al. 2011). In a system deployed at scale, a retainer or push model is likely to work as well.
Class A
40.00%
0.00%
8.00%
12.00%
40.00%
Table 3: Error Analysis for Class D, X and A.
correct City” type, the crowd extracts an incorrect city from
the query history (but not the departure city); “Correct City
& Soft Match” type means the extracted city name is semantically correct but does not match the gold-standard city
name (e.g., “Washington” and “Washington DC”). From the
error analysis, we conclude two directions to improve performance: 1) treat the cases of absent slot more carefully,
and 2) use domain knowledge if available. First, 28% of errors in Class D and 50% in Class X occur when either the
gold-standard label or the predicted label does not exist. It
suggests that a more reliable step to recognize the existence
of the targeted entity might be required. Second, 16.28% of
Class-D queries and 5% of Class-X queries are of the “Soft
Match” cases. By introducing domain knowledge like a list
of city names, a post-processor that finds the most similar
city name of the predicted label can fix this type of error.
User Experiment Setup
We conduct lab-based user experiments to evaluate the proposed technology on extracting “food” entities. Ten Google
Hangouts users enter our lab with their own laptops. We first
ask them to arbitrarily create a list 9 foods, 3 drinks, and 3
countries based on their own preferences. Then we explain
the purpose of the experiments, and introduce five scenarios
of using instant messaging:
1. Eat: You discuss with your friend about what to eat later.
2. Drink: You discuss with an employee a coffee place, bar,
or restaurant to order something to drink.
Experiments 2:
User Experiment via a Real-world Instant
Messaging Interface
3. Cook: You plan to cook later. You discuss the details with
your friend who knows how to cook.
To examine the feasibility of real-time crowd-powered entity
extraction in an actual system, we conduct lab-based user
experiments via Google Hangouts’ instant messaging interface. Our proposed method has a task completion time of
5-8 seconds, per Experiment 1. In this section, we demonstrate our approach is robust and fast enough to support a
real-world instant messaging application, where the average
time gap between conversational turns is 24 seconds (Isaacs
et al. 2002).
4. Chat: You are chatting with your friend.
System Implementation
3. Mentioning: Naturally converse without asking or answering any specific questions.
5. No Food: You are chatting with your friend. You do not
mention food. Instead, you mention a country name.
We also list three types of conversational acts which could
emerge in each scenario:
1. Question: Ask a question.
2. Answer: Answer a question that could be asked under the
current scenario.
We implemented a Google Hangouts chatbot by using the
Hangupsbot3 framework. Users are able to send text chats
to our chatbot via Google Hangouts. The chatbot recruits
crowd workers on MTurk in real-time to perform the Dialog
ESP Game task upon receiving the chat. Figure 6 shows the
overview of our system. We record all answers submitted by
3
Using their laptops, users send one text chat for each combination of [scenario, conversational act] to our chatbot, i.e.,
15 chats in total. In the Eat, Cook, and Chat scenarios, users
must mention one of the foods they listed earlier; in the
Drink scenario, they must mention one of the drinks they
listed. In the No Food scenario, users must mention one of
https://github.com/hangoutsbot/hangoutsbot
5
Fleeting Task Method
1st Response
1st Worker Arrives
Avg User Typing Time = 27.05s
1st Matched Response
37.14 sec
30.83 sec
40.95 sec
0.5
0.3
0.1
-0.1
-0.3
-0.5
User
0
5
Post 120
fleeting tasks
10
15
20
25
30
35
40
45
Tasks become available to workers
Chatbot
Task Posting Time
Worker Searching Time
Task Routing Time
Task Completion Time
Figure 6: Timeline of the Real-time Crowd-powered Entity Extraction System. On average, the first worker takes 30.83 seconds
to reach, the first answer is received at 37.14 seconds, and the first matched answer occurs at 40.95 seconds. A user on average
spends 27.05 seconds to type a chat line, i.e., the perceived response time to users falls within 10-14 seconds.
Acc (%)
Response Time (s)
Mean (Stdev)
1st Only
77.33%
37.14 (14.70)
ESP Only
81.33%
40.95 (13.56)
ESP + 1st
84.00%
40.95 (13.56)
1st Worker Reached Time (s)
30.83 (16.86)
User Type Time (s)
27.05 (25.28)
1st
Entity
Type
Conv.
Act
Table 4: Result of User Experiment. A trade-off between
time and output quality can be observed.
Acc.
(%)
Avg.
Time(s)
Acc.
(%)
36.64
70.00%
40.19
78.89%
Drink
37.43
80.00%
41.37
83.33%
None
38.33
96.67%
42.83
100.00%
Question
34.26
82.00%
37.94
90.00%
Answer
39.90
68.00%
43.88
78.00%
Mention
37.26
82.00%
41.04
84.00%
37.14
77.33%
40.95
84.00%
Food5
Avg.
the countries they listed, and no food names can be mentioned. In total, we collect 150 chat inputs from 10 user experiments. Correspondingly, instructions on the workers’ interface (Figure 2) is modified as “What is the food name
in this dialog?”, and the explanation of food name is modified as “Food name. The full name of the food. Including
any drinks or beverages.” In the experiments, our chatbot
post 120 HITs with a lifetime of 60 seconds to MTurk upon
receiving a text chat. The price of each HIT is $0.1. We use
the interface shown in Figure 2 with a time constraint of 20
seconds.
Table 5: Results of user experiment for each scenario and
conversational act.
knowledge-base, our crowdsourcing approach achieves an
accuracy of 78.89% in extracting food entities and 83.33%
in extracting drink entities. Despite the significant variety of
the input entities6 , our approach extracts most entities correctly. Furthermore, our method is effective in identifying
the absence of entities; Table 5 also shows the robustness
of the proposed method under various linguistic conditions.
The “ESP+1st” setting achieves accuracies of 90.00% in extracting entities from questions, 78.00% in extracting from
answers, and 84.00% in extracting from regular conversations. Qualitatively, our approach can handle complex input,
such as strange restaurant names and beverage names, which
are essentially confusing for automated approaches. For example, “Have you ever tried bibimbap at Green pepper?”
and “I usually have Magic Hat #9”, where Green pepper
and Magic Hat #9 are names of a restaurant and beverage,
respectively.
Experimental Results
Results are shown in Table 4. The “ESP+1st” setting
achieves the best accuracy of 84% with an average response
time of 40.95 seconds. The “1st Only” setting has the shortest average response time of 37.14 seconds with an accuracy
of 77.33%.4 A trade-off between time and output quality can
be observed.This trade-off is similar to the results of Experiment 1 (shown in Figure 3(c)). On average, 14.45 MTurk
workers participated in each trial and submitted 33.81 answers.
Robustness in Out-of-Vocabulary Entities & Language
Variability The results over each entity type are shown
in Table 5. Without using any training data or pre-defined
4
5
ESP + 1st
Avg.
Time(s)
6
The food entities arbitrarily created by our users are quite diverse: From a generic category (e.g., Thai food) to a specific entry (e.g., Magic Hat #9), and from a simple food (e.g., cherry) to
a complex food (e.g., sausage muffin with egg). The list covers
the food of many other countries (e.g., Okonomiyaki, Bibimbap,
Samosa.)
We only consider the answers submitted within 60 seconds.
Including the results from Food, Cook, and Chat scenarios.
6
Error Analysis Table 6 shows the errors in the user experiments (“ESP+1st” setting). 45.83% of errors are caused by
absence of answers, mainly due to the task routing latency
of the MTurk platform. We discuss this in more detail below.
37.50% of errors are due to various system problems such
as the string encoding issues. More interestingly, 12.50% of
incorrect answers are sub-spans of the correct answers. For
instance, the crowd extracts “rice” for “stew pork over rice”,
and “tea” for “bubble tea”. This type of error is similar to
the “Soft Match” error in Experiment 1. Finally, 4.17% of
errors are caused by user typos (e.g., latter for latte), which
the crowd tends to exclude in their answers.
knowledge can help to fix this type of errors. However, unlike automated technology, we do not have a generic method
to update human workers with new knowledge. Thus, our
next step is to incorporate automated components. It is easy
to replace some workers with automated annotators in our
multi-player ESP Game. Despite fragility in extracting unseen entities, automated approaches are robust in identifying known entities and can be easily updated if new data
is collected. We will develop a hybrid approach, which we
believe will be robust in unexpected input and easily incorporate new knowledge.
Conclusion and Future Work
Error Type
No Answers Received
System Problem
Substring of a Multi-token Entity
Typo
%
We have explored using real-time crowdsourcing to extract
entities for dialog systems. By using an ESP Game setting,
our approach is absolute 36.5% and 27.1% better than the
CRF baseline in terms of F1-score for Class D and X queries
in the ATIS dataset, respectively. The timing cost is about 8
seconds, which is slower than machines but still reasonable
given the large gains in accuracy. The proposed method also
has been evaluated via Google Hangouts’ text chat with 10
users. The results demonstrate the robustness and feasibility
of our approach in real-world systems. In the future, we will
generalize our approach by adding automated components,
and also explore the possibility of using audio input.
45.83%
37.50%
12.50%
4.17%
Table 6: Error Analysis for User Experiment.
Response Speed Table 4 shows the average response time
in the user experiment. On average, the first worker takes
30.83 seconds to reach to our Dialog ESP Game, the first
answer is received at 37.14 seconds, and the first matched
answer occurs at 40.95 seconds. For comparison, we illustrate the timeline of our system in Figure 6. In the user experiments, a user on average spends 27.05 seconds to type
a chat line. If we align the user typing time along with
the system timeline, the theoretical perceived response time
to users falls within 10-14 seconds, while the average response time in instant messaging is 24 seconds (Isaacs et
al. 2002). (Baron 2010) reports that 24.5% of instant messages get responses within 11-30 seconds, and 8.2% of messages have even longer response times. The proposed technology proves to be fast enough to support instant messaging applications. The main bottleneck of the end-to-end response speed is the task routing time in Figure 6, which
approximately ranges from 5-40 seconds and changes over
time. The task routing time also causes the major errors in
Table 6. The task lifetime begins when a task reaches the
MTurk server instead of when it becomes visible to workers. When the task routing time is longer than a task’s lifetime, the task could expire before it is selected by workers. Because MTurk requesters can not effectively reduce
the task routing time, pre-recruiting and queuing workers
seems inevitable for applications which require a response
time sharply shorter than 30 seconds.
Appendix: List of Food and Drinks Used in the
Experiment 2
The followings are the lists of 9 food and 3 drinks created
by 10 participants in our user experiment.
Food
1. spaghetti, burger, vindaloo lamb, makhani chicken, kimchee, wheat bread pizza, cornish pasty, mushroom soup
2. burger, french fries, scallion cake, okonomiyaki, oyakodon, gyudon, fried rice, wings, salad
3. Stinky Tofu, Acai Berry Bowl, Tuna Onigiri, Rice Burger,
Seared Salmon, Milkfish Soup, Mapo Tofu, Beef Pho,
Scallion Pancake
4. pizza, fried rice, waffle, alcohol drink, chocolate pie,
cookie, dimsum, burger, milk shake
5. Pho, BBQ, Thai food, beef noodles, steak, Tomato soup,
Spicy hot pot, Soup dumplings, Ramen
6. chocolate, donut, cheesecake, pad thai, seafood pancake,
fish fillets in hot chili, hot pot, bibimbap, japchae
7. chocolate, pancakes, strawberries, fried fish, fried
chicken, sausages, gulaab jamun, paneer tika, samosa
8. Dumplings, noodle, stew pork over rice, Sandwich, pasta,
hot pot, Potato slices with green peppers, Chinese BBQ,
pancakes
9. stinky tofu, stew pork over rice, yakitori, baked cinnamon
apple, apple pie, stew pork with potato and apple, teppanyaki, okonomiyaki, crab hotpot
10. hot pot, cherry, Chinese cabbage, Pumpkin risotto,
Tomato risotto, Boeuf Bourguignon, stinky tofu, sausage
muffin with egg (McDonald), eggplant with basil
Discussion
Incorporating domain-specific knowledge is a major obstacle in generalization of crowdsourcing technologies (Huang,
Lasecki, and Bigham 2015). We think that automation helps
resolve this challenge. One most common errors in our system are the soft match, where the crowd extracts a sub-string
of the target entity instead of the complete string. Domain
7
Drink
[Heck, Hakkani-Tür, and Tür 2013] Heck, L. P.; HakkaniTür, D.; and Tür, G. 2013. Leveraging knowledge graphs
for web-scale unsupervised semantic parsing. In INTERSPEECH, 1594–1598.
[Hirschman 1992] Hirschman, L. 1992. Multi-site data collection for a spoken language corpus. In Proceedings of the
Workshop on Speech and Natural Language, HLT ’91, 7–
14. Stroudsburg, PA, USA: Association for Computational
Linguistics.
[Huang et al. 2017] Huang, T.-H. K.; Chen, Y.-N.; Bigham,
J. P.; et al. 2017. Real-time on-demand crowd-powered entity extraction. In In Proceedings of the 5th Edition Of The
Collective Intelligence Conference (CI 2017, oral presentation).
[Huang, Lasecki, and Bigham 2015] Huang,
T.-H.
K.;
Lasecki, W. S.; and Bigham, J. P. 2015. Guardian: A
crowd-powered spoken dialog system for web apis. In
HCOMP.
[Inhoff and Rayner 1986] Inhoff, A. W., and Rayner, K.
1986. Parafoveal word processing during eye fixations in
reading: Effects of word frequency. Perception & Psychophysics 40(6):431–439.
[Isaacs et al. 2002] Isaacs, E.; Walendowski, A.; Whittaker,
S.; Schiano, D. J.; and Kamm, C. 2002. The character,
functions, and styles of instant messaging in the workplace.
In Proceedings of the 2002 ACM CSCW, 11–20. ACM.
[Lasecki et al. 2013] Lasecki, W. S.; Wesley, R.; Nichols, J.;
Kulkarni, A.; Allen, J. F.; and Bigham, J. P. 2013. Chorus: A
crowd-powered conversational assistant. In UIST ’13, UIST
’13, 151–162. New York, NY, USA: ACM.
[Lasecki, Kamar, and Bohus 2013] Lasecki, W. S.; Kamar,
E.; and Bohus, D. 2013. Conversations in the crowd: Collecting data for task-oriented dialog learning. In HCOMP.
[Mesnil et al. 2015a] Mesnil, G.; Dauphin, Y.; Yao, K.; Bengio, Y.; Deng, L.; Hakkani-Tur, D.; He, X.; Heck, L.; Tur,
G.; Yu, D.; et al. 2015a. Using recurrent neural networks
for slot filling in spoken language understanding. Audio,
Speech, and Language Processing, IEEE/ACM Transactions
on 23(3):530–539.
[Mesnil et al. 2015b] Mesnil, G.; Dauphin, Y.; Yao, K.; Bengio, Y.; Deng, L.; Hakkani-Tur, D.; He, X.; Heck, L.; Tur,
G.; Yu, D.; et al. 2015b. Using recurrent neural networks for
slot filling in spoken language understanding. IEEE/ACM
Transactions on Audio, Speech, and Language Processing
23(3):530–539.
[Raymond and Riccardi 2007] Raymond, C., and Riccardi,
G. 2007. Generative and discriminative algorithms for
spoken language understanding. In INTERSPEECH, 1605–
1608.
[Rayner and Duffy 1986] Rayner, K., and Duffy, S. A. 1986.
Lexical complexity and fixation times in reading: Effects
of word frequency, verb complexity, and lexical ambiguity.
Memory & Cognition 14(3):191–201.
[Tur, Hakkani-Tur, and Heck 2010] Tur, G.; Hakkani-Tur,
D.; and Heck, L. 2010. What is left to be understood in
atis? In SLT, 2010 IEEE, 19–24. IEEE.
1. tea, coke, latte
2. green tea latte, bubble tea, root beer
3. medium latte with non-fat milk, green Tea Latte,
Soymilk
4. water, pepsi, tea
5. Latte with nonfat milk, Magic hat #9, Old fashion
6. vanilla latte, strawberry smoothie, iced tea
7. coffee, milk shake, beer
8. Mocha coffee, beers, orange juice
9. caramel frappuccino, caramel macchiato, coffee with coconut milk
10. ice tea, macha, apple juice
References
[Baron 2010] Baron, N. S. 2010. Discourse structures in instant messaging: The case of utterance breaks. Language@
Internet 7(4):1–32.
[Bernstein et al. 2011] Bernstein, M. S.; Brandt, J.; Miller,
R. C.; and Karger, D. R. 2011. Crowds in two seconds:
Enabling realtime crowd-powered interfaces. In UIST, 33–
42. ACM.
[Bigham et al. 2010] Bigham, J. P.; Jayant, C.; Ji, H.; Little, G.; Miller, A.; Miller, R. C.; Miller, R.; Tatarowicz, A.;
White, B.; White, S.; et al. 2010. Vizwiz: nearly real-time
answers to visual questions. In UIST, 333–342. ACM.
[Bohus et al. 2007] Bohus, D.; Raux, A.; Harris, T. K.; Eskenazi, M.; and Rudnicky, A. I. 2007. Olympus: an opensource framework for conversational spoken language interface research. In Proceedings of the workshop on bridging
the gap: Academic and industrial research in dialog technologies, 32–39. Association for Computational Linguistics.
[Chen et al. 2016] Chen, Y.-N.; Hakkani-Tur, D.; Tur, G.;
Celikyilmaz, A.; Gao, J.; and Deng, L. 2016. Knowledge as
a teacher: Knowledge-guided structural attention networks.
arXiv preprint arXiv:1609.03286.
[Chen, Hakkani-Tür, and Tur 2014] Chen, Y.-N.; HakkaniTür, D.; and Tur, G. 2014. Deriving local relational surface forms from dependency-based entity embeddings for
unsupervised spoken language understanding. Proceedings
of SLT.
[Dahl et al. 1994] Dahl, D. A.; Bates, M.; Brown, M.; Fisher,
W.; Hunicke-Smith, K.; Pallett, D.; Pao, C.; Rudnicky, A.;
and Shriberg, E. 1994. Expanding the scope of the atis
task: The atis-3 corpus. In HLT, 43–48. Association for
Computational Linguistics.
[He and Young 2003] He, Y., and Young, S. 2003. A datadriven spoken language understanding system. In ASRU’03,
583–588. IEEE.
[Healy 1976] Healy, A. F. 1976. Detection errors on the word
the: Evidence for reading units larger than letters. Journal
of Experimental Psychology: Human Perception and Performance 2(2):235.
8
[Von Ahn and Dabbish 2004] Von Ahn, L., and Dabbish, L.
2004. Labeling images with a computer game. In Proceedings of the SIGCHI conference on Human factors in computing systems, 319–326. ACM.
[Wang et al. 2012] Wang, W. Y.; Bohus, D.; Kamar, E.; and
Horvitz, E. 2012. Crowdsourcing the acquisition of natural
language corpora: Methods and observations. In SLT 2012,
73–78. IEEE.
[Wang, Heck, and Hakkani-Tur 2014] Wang, L.; Heck, L.;
and Hakkani-Tur, D. 2014. Leveraging semantic web search
and browse sessions for multi-turn spoken dialog systems.
In ICASSP 2014, 4082–4086. IEEE.
[Williams et al. 2013] Williams, J.; Raux, A.; Ramachandran, D.; and Black, A. 2013. The dialog state tracking
challenge. In Proceedings of the SIGDIAL 2013 Conference,
404–413.
[Xu and Sarikaya 2014] Xu, P., and Sarikaya, R. 2014. Targeted feature dropout for robust slot filling in natural language understanding. In Fifteenth Annual Conference of the
International Speech Communication Association.
[Young 2006] Young, S. 2006. Using pomdps for dialog
management. In SLT, 8–13.
9
| 2cs.AI
|
Maximizing the Strong Triadic Closure in Split Graphs and
Proper Interval Graphs
Athanasios Konstantinidis∗
Charis Papadopoulos†
arXiv:1609.09433v2 [cs.DS] 7 Oct 2016
Abstract
In social networks the Strong Triadic Closure is an assignment of the edges
with strong or weak labels such that any two vertices that have a common neighbor
with a strong edge are adjacent. The problem of maximizing the number of strong edges
that satisfy the strong triadic closure was recently shown to be NP-complete for general
graphs. Here we initiate the study of graph classes for which the problem is solvable. We
show that the problem admits a polynomial-time algorithm for two unrelated classes of
graphs: proper interval graphs and trivially-perfect graphs. To complement our result,
we show that the problem remains NP-complete on split graphs, and consequently also
on chordal graphs. Thus we contribute to define the first border between graph classes
on which the problem is polynomially solvable and on which it remains NP-complete.
1
Introduction
Predicting the behavior of a network is an important concept in the field of social networks
[7]. Understanding the strength and nature of social relationships has found an increasing
usefulness in the last years due to the explosive growth of social networks (see e.g., [2]).
Towards such a direction the Strong Triadic Closure principle enables to understand
the structural properties of the underlying graph: it is not possible for two individuals to have
a strong relationship with a common friend and not know each other [11]. Such a principle
stipulates that if two people in a social network have a “strong friend” in common, then there
is an increased likelihood that they will become friends themselves at some point in the future.
Satisfying the Strong Triadic Closure is to characterize the edges of the underlying
graph into weak and strong such that any two vertices that have a strong neighbour in
common are adjacent. Since users interact and actively engage in social networks by creating
strong relationships, it is natural to consider the MaxSTC problem: maximize the number
of strong edges that satisfy the Strong Triadic Closure. The problem has been shown
to be NP-complete for general graphs whereas its dual problem of minimizing the number of
weak edges admits a constant factor approximation ratio [25].
In this work we initiate the computational complexity study of the MaxSTC problem
in important classes of graphs. If the input graph is a P3 -free graph (i.e., a graph having
no induced path on three vertices which is equivalent with a graph that consists of vertexdisjoint union of cliques) then there is a trivial solution by labeling strong all the edges. Such
an observation might falsely lead into a graph modification problem, known as Cluster
Deletion problem (see e.g., [3, 12]), in which we want to remove the minimum number of
edges that correspond to the weak edges, such that the resulting graph does not contain a
P3 as an induced subgraph. More precisely the obvious reduction would consist in labeling
the deleted edges in the instance of Cluster Deletion as weak, and the remaining ones as
∗
†
Department of Mathematics, University of Ioannina, Greece. E-mail: [email protected]
Department of Mathematics, University of Ioannina, Greece. E-mail: [email protected]
1
strong. However, this reduction fails to be correct due to the fact that the graph obtained
by deleting the weak edges in an optimal solution of MaxSTC may contain an induced P3 ,
so long as those three vertices induce a triangle in the original graph (prior to deleting the
weak edges).
To the best of our knowledge, no previous results were known prior to our work when
restricting the input graph for the MaxSTC problem. It is not difficult to see that for bipartite graphs the MaxSTC problem has a simple polynomial-time solution by considering
a maximum matching that represent the strong edges [20]. It is well-known that a maximum
matching of a graph corresponds to a maximum independent set of its line graph that represents the adjacencies between the edges [8]. As previously noted, for general graphs it is
not necessarily the case that a maximum matching corresponds to the optimal solution for
MaxSTC. Here we show a similar characterization for MaxSTC by considering the adjacencies between the edges of a graph that participate in induced P3 ’s. Such a characterization
allows us to exhibit structural properties towards the computation of an optimal solution of
MaxSTC.
Due to the nature of the P3 existence that enforce the labeling of weak edges, there
is an interesting connection to problems related to the square root of a graph; a graph H
is a square root of a graph G and G is the square of H if two vertices are adjacent in G
whenever they are at distance one or two in H. Any graph does not have a square root (for
example consider a simple path), but every graph contains a subgraph that has a square
root. Although it is NP-complete to determine if a given chordal graph has a square root
[19], there are polynomial-time algorithms when the input is restricted to bipartite graphs
[18], or proper interval graphs [19], or trivially-perfect graphs [22]. The relationship between
MaxSTC and to that of determining square roots can be seen as follows. In the MaxSTC
problem we are given a graph G and we want to select the maximum possible number of
edges, at most one from each induced P3 in G. Thus we need to find the largest subgraph
(in terms of the number of its edges) H of G such that the square of H is a subgraph of G.
However previous results related to square roots were concerned with deciding if the whole
graph has a square root and there are no such equivalent formulations related to the largest
square root.
Our main motivation is to understand the complexity of the problem on subclasses of
chordal graphs, since the class of chordal graphs (i.e., graphs having no chordless cycle of
length at least four) finds important applications in both theoretical and practical areas
related to social networks [1, 16, 23]. More precisely two famous properties can be found in
social networks. For most known social and biological networks their diameter, that is, the
length of the longest shortest path between any two vertices of a graph, is known to be a small
constant [14]. On the other hand it has been shown that the most prominent social network
subgraphs are cliques, whereas highly infrequent induced subgraphs are cycles of length four
[26]. Thus it is evident that subclasses of chordal graphs are close related to such networks,
since they have rather small diameter (e.g., split graphs or trivially-perfect graphs) and are
characterized by the absence of chordless cycles (e.g., proper interval graphs). Towards such
a direction we show that MaxSTC is NP-complete on split graphs and consequently also
on chordal graphs. On the positive side, we present the first polynomial-time algorithm
for computing MaxSTC on proper interval graphs. Proper interval graphs, also known
as unit interval graphs or indifference graphs, form a subclass of interval graphs and they
are unrelated to split graphs [24]. By our result they form the first graph class, other
than bipartite graphs, for which MaxSTC is shown to be polynomial time solvable. In
order to obtain our algorithm, we take advantage of their clique path and apply a dynamic
programming on subproblems defined by passing the clique path in its natural ordering.
Furthermore by considering the equivalent transformation of the problem mentioned earlier,
2
Figure 1: A split graph G is shown to the left side. The right side depicts a solution for
MaxSTC on G where the weak edges are exactly the edges of G that are not shown.
we show that MaxSTC admits a simple polynomial-time solution on trivially-perfect graphs.
Thus we contribute to define the first borderline between graph classes on which the problem
is polynomially solvable and on which it remains NP-complete.
2
Preliminaries
All graphs considered here are simple and undirected. A graph is denoted by G = (V, E)
with vertex set V and edge set E. We use the convention that n = |V | and m = |E|. The
neighborhood of a vertex v of G is N (v) =S{x | vx ∈ E} and the closed neighborhood of v is
N [v] = N (v) ∪ {v}. For S ⊆ V , N (S) = v∈S N (v) \ S and N [S] = N (S) ∪ S. A graph H
is a subgraph of G if V (H) ⊆ V (G) and E(H) ⊆ E(G). For X ⊆ V (G), the subgraph of
G induced by X, G[X], has vertex set X, and for each vertex pair u, v from X, uv is an
edge of G[X] if and only if u 6= v and uv is an edge of G. For R ⊆ E(G), G \ R denotes
the graph (V (G), E(G) \ R), that is a subgraph of G and for S ⊆ V (G), G − S denotes the
graph G[V (G) − S], that is an induced subgraph of G. Two adjacent vertices u and v are
called twins if N [u] = N [v].
A clique of G is a set of pairwise adjacent vertices of G, and a maximal clique of G is a
clique of G that is not properly contained in any clique of G. An independent set of G is a set
of pairwise non-adjacent vertices of G. For k ≥ 2, the chordless path on k vertices is denoted
by Pk and the chordless cycle on k vertices is denoted by Ck . For an induced path Pk , the
vertices of degree one are called endvertices. A vertex v is universal in G if N [v] = V (G)
and v is isolated if N (v) = ∅. For two vertices u and v we say that u sees v if {u, v} ∈ E(G);
otherwise, we say that u misses v. We extend this notion to vertex sets: a set A sees (resp.,
misses) a vertex set B if every vertex of A is adjacent (resp., non-adjacent) to every vertex
of B. We say that two edges are non-adjacent if they have no common endpoint; otherwise
we call them adjacent edges.
Strong Triadic Closure. Given a graph G = (V, E), a strong-weak labeling on the edges
of G is a function λ that assigns to each edge of E(G) one of the labels strong or weak; i.e.,
λ : E(G) → {strong, weak}. An edge that is labeled strong (resp., weak) is simple called
strong (resp. weak). The strong triadic closure of a graph G is a strong-weak labeling λ such
that for any two strong edges {u, v} and {v, w} there is a (weak or strong) edge {u, w}. In
other words, in a strong triadic closure there are no pair of strong edges {u, v} and {v, w}
such that {u, w} ∈
/ E(G).
The problem of computing the maximum strong triadic closure, denoted by MaxSTC,
is to find a strong-weak labeling on the edges of E(G) that satisfies the strong triadic closure
and has the maximum number of strong edges. Note that its dual problem asks for the
minimum number of weak edges. Here we focus on maximizing the number of strong edges
in a strong triadic closure.
Let G be a strong-weak labeled graph. We denote by (ES , EW ) the partition of E(G)
into strong edges ES and weak edges EW . The graph spanned by ES is the graph G \ EW .
3
For a vertex v ∈ V (G) we say that the strong neighbour of v is the other endpoint of a strong
edge incident to v. We denote by NS (v) ⊆ N (v) the strong neighbours of v. Similarly we say
that a vertex u is strongly adjacent to v if u is adjacent to v and the edge {u, v} is strong.
Observation 2.1. Let G be a strong-weak labeled graph. Then G \ EW satisfies the strong
triadic closure if and only if for every P3 in G \ EW , the vertices of the P3 induce a K3 in
G.
Proof. Observe that G \ EW is the graph spanned by the strong edges. If for two strong
edges {u, v} and {v, w}, {u, w} ∈
/ E(G \ EW ) then {u, w} is an edge in G and, thus, u, v, w
induce a K3 in G. On the other hand notice that any two strong edges of G \ EW are either
non-adjacent or share a common vertex. If they share a common vertex then the vertices
must induce a K3 in G.
Therefore in the MaxSTC problem we want to minimize the number of the removal
(weak) edges EW from G such that every three vertices that induce a P3 in G \ EW form a
clique in G. Then it is not difficult to see that G \ EW satisfies the strong triadic closure if
and only if for every vertex v, NS [v] induces a clique in G.
3
MaxSTC on split graphs
Here we provide an NP-hardness result for MaxSTC on split graphs. A graph G = (V, E) is
a split graph if V can be partitioned into a clique C and an independent set I, where (C, I)
is called a split partition of G. Split graphs form a subclass of the larger and widely known
graph class of chordal graphs, which are the graphs that do not contain induced cycles of
length 4 or more as induced subgraphs. It is known that split graphs are self-complementary,
that is, the complement of a split graph remains a split graph. First we show the following
result.
Lemma 3.1. Let G = (V, E) be a split graph with a split partition (C, I). Let ES be the set
of strong edges in an optimal solution for MaxSTC on G and let IW be the vertices of I
that are incident to at least one edge of ES .
1. If every vertex of IW misses at least three vertices of C in G then ES = E(C).
|
2. If every vertex of IW misses exactly one vertex of C in G then |ES | ≤ |E(C)| + b |IW
2 c.
Proof. Let wi be a vertex of I and let Bi be the set of vertices in C that are non-adjacent to
wi . Let Ai be the strong neighbors of wi in an optimal solution. For the edges of the clique,
there are |Ai ||Bi | weak edges due to the strong triadic closure. Moreover any vertex wj of
I \ {wi } cannot have a strong neighbor in Ai . This means that Ai ∩ Aj = ∅. Notice, however,
that both sets Bi ∩ Bj and Ai ∩ Bj are not necessarily empty.
Observe that IW contains the vertices of I that are incident to at least one strong edge.
Let E(A, B) be the set of weak edges that have one endpointP
in Ai and the other endpoint
in Bi , for every 1 ≤ i ≤ |IW |. We show that 2|E(A, B)| ≥ wi ∈IW |Ai ||Bi |. Let {a, b} ∈
E(A, B) such that a ∈ Ai and b ∈ Bi . Assume that there is a pair Aj , Bj such that {a, b} is
an edge between Aj and Bj , for j 6= i. Then a cannot belong to Aj since Ai ∩ Aj = ∅. Thus
a ∈ Ai and b ∈ Aj . Therefore for every edge {a, b} ∈ E(A, B) there are at most two pairs
(Ai , Bi ) and (Aj , Bj ) for which a ∈ AP
i ∪ Bj and b ∈ Bi ∪ Aj . This means that every edge of
E(A, B) is counted at most twice in wi ∈IW |Ai ||Bi |.
For any two edges {u, v}, {v, z} ∈ E(C) \ E(A, B), observe that they satisfy the strong
triadic closure since there is the edge {u, z} in G. Thus the strong edges of the clique are
exactly the set of edges E(C) \ E(A, B). In total by counting the number of strong edges
4
between the independent
P set and the clique, we have |ES | = |E(C) \ E(A, B)| +
Since 2|E(A, B)| ≥ wi ∈IW |Ai ||Bi |, we get
|ES | ≤ |E(C)| +
X
wi ∈IW
|Bi |
.
|Ai | 1 −
2
P
wi ∈IW
|Ai |.
Now the first claim of the lemma holds because |Bi | = 3 so that IW = ∅. For the second
claim we show that for every vertex of IW , |Ai | = 1. Let wi ∈ IW such that |Ai | ≥ 2 and let
Bi = {bi }. Recall that no other vertex of IW has strong neighbours in Ai . Also note that
there is at most one vertex wj in IW that has bi as a strong neighbour. If such a vertex wj
exist and for the vertex bj of the clique that misses wj it holds bj ∈ Ai , then we let v = bj ;
otherwise we choose v as an arbitrary vertex of Ai . Observe that no vertex of I \ {wi } has a
strong neighbour in Ai \ {v} and only wj ∈ IW is strongly adjacent to bi . Then we label weak
the |Ai | − 1 edges between wi and the vertices of Ai \ {v} and we label strong the |Ai | − 1
edges between bi and the vertices of Ai \ {v}. Making strong the edges between bi and the
vertices of Ai \ {v} does not violate the strong triadic closure since every vertex of C ∪ {wj }
is adjacent to every vertex of Ai \ {v}. Therefore for every vertex wi ∈ IW , |Ai | = 1 and by
substituting |Bi | = 1 in the formula for |ES | we get the claimed bound.
In order to give the reduction, we introduce the following problem that we call maximum disjoint non-neighbourhood: given a split graph (C, I) where every vertex of I misses
three vertices from C, we want to find the maximum subset SI of I such that the nonneighbourhoods of the vertices of SI are pairwise disjoint. In the corresponding decision
version, denoted by MaxDisjointNN, we are also given an integer k and the problem asks
whether |SI | ≥ k. The polynomial-time reduction to MaxDisjointNN is given from the
classical NP-complete problem 3-Set Packing [15]: given a universe U of n elements, a
family F of triplets of U, and an integer k, the problem asks for a subfamily F 0 ⊆ F with
|F 0 | ≥ k such that all triplets of F 0 are pairwise disjoint.
Theorem 3.2. MaxDisjointNN is NP-complete on split graphs.
Proof. Given a split graph G = (C, I) and SI ⊆ I, checking whether SI is a solution for
MaxDisjointNN amounts to checking whether every pair of vertices of SI have common
neighbourhood. As this can be done in polynomial time the problem is in NP. We will give
a polynomial-time reduction to MaxDisjointNN from the classical NP-complete problem
3-Set Packing [15]: given a universe U of n elements, a family F of triplets of U, and an
integer k, the problem asks for a subfamily F 0 ⊆ F with |F 0 | ≥ k such that all triplets of F 0
are pairwise disjoint.
Let (U, F, k) be an instance of the 3-Set Packing. We construct a split graph G = (C, I)
as follows. The clique of G is formed by the n elements of U. For every triplet Fi of F we add
a vertex vi in I that is adjacent to every vertex of C except the three vertices that correspond
to the triplet Fi . Thus every vertex of I misses exactly three vertices from C and sees the rest
of C. Now it is not difficult to see that there is a solution F 0 for 3-Set Packing(U, F, k) of
size at least k if and only if there is a solution SI for MaxDisjointNN(G, k) of size at least
k. For every pair (Fi , Fj ) of F 0 we know that Fi ∩ Fj = ∅ which implies that the vertices
vi and vj have disjoint non-neighbourhood since Fi corresponds to the non-neighbourhood
of vi . By the one-to-one mapping between the sets of F and the vertices of I, every set Fi
belongs to F 0 if and only if vi belongs to SI .
Now we turn to our original problem MaxSTC. The decision version of MaxSTC takes
as input a graph G and an integer k and asks whether there is strong-weak labeling of the
edges of G that satisfies the strong triadic closure with at least k strong edges.
5
w1
···
B1
wk
wk+1
Bk
Bk+1
w|I|
· · ·
I
B|I|
···
· · ·
C
y1
···
yk
yk+1
yk+2
···
yn−1
yn
x1
···
xk
xk+1
xk+2
···
xn−1
xn
CY
IX
Figure 2: The split graph (C ∪ CY , I ∪ IX ) given in the polynomial-time reduction. Every
vertex wi misses the vertices of Bi and sees the vertices of (C ∪ CY ) − Bi . Every vertex xi
misses yi and sees the vertices of (C ∪ CY ) − {yi }. The sets B1 , . . . , Bk are pairwise disjoint
whereas for every set Bj , k < j ≤ |I|, there is a set Bi , 1 ≤ i ≤ k, such that Bi ∩ Bj 6= ∅.
The drawn edges correspond to the strong edges between the independent set and the clique,
and the dashed edges are the only weak edges in the clique C ∪ CY .
Theorem 3.3. The decision version of MaxSTC is NP-complete on split graphs.
Proof. Given a strong-weak labeling (ES , EW ) of a split graph G = (C, I), checking whether
(ES , EW ) satisfies the strong triadic closure amounts to check in G − EW whether there is a
non-edge between its endvertices of every P3 according to Observation 2.1. Thus by listing
all P3 ’s of G \ EW the problem belongs to NP. Next we give a polynomial-time reduction
to MaxSTC from the MaxDisjointNN problem on split graphs which is NP-complete by
Theorem 3.2. Let (G, k) be an instance of MaxDisjointNN where G = (C, I) is a split
graph such that every vertex of the independent set I misses exactly three vertices from the
clique C. For a vertex wi ∈ I, we denote by Bi the set of the three vertices in C that are
non-adjacent to wi . Let |C| = n. We extend G and construct another split graph G0 as
follows (see Figure 2):
• We add n vertices y1 , . . . , yn in the clique that consist the set CY .
• We add n vertices x1 , . . . , xn in the independent set that consist the set IX .
• For every 1 ≤ i ≤ n, yi is adjacent to all vertices of (C ∪ CY ∪ I ∪ IX ) \ {xi }.
• For every 1 ≤ i ≤ n, xi is adjacent to all vertices of (C ∪ CY ) \ {yi }.
Thus wi misses only the vertices of Bi from the clique. By construction it is clear that G0 is
a split graph with a split partition (C ∪ CY , I ∪ IX ). Notice that the clique C ∪ CY has 2n
vertices and G = G0 [I ∪ C].
We claim that G has a solution for MaxDisjointNN of size at least k if and only if G0
has a strong triadic closure with at least n(2n − 1) + b n2 c + d k2 e strong edges.
Assume that {w1 , . . . , wk } ⊆ I is a solution for MaxDisjointNN on G of size at least
k. Since the sets B1 , . . . , Bk are pairwise disjoint, there are k distinct vertices y1 , . . . , yk in
CY such that k ≤ n. We will give a strong-weak labeling for the edges of G0 that fulfills the
strong triadic closure and has at least the claimed number of strong edges. For simplicity,
we describe only the strong edges; the edges of G0 that are not given are all labeled weak.
We label the edges incident to each vertex wi , yi , xi and the three vertices of each set Bi , for
1 ≤ i ≤ k as follows:
6
• The edges of the form {yi , v} are labeled strong if v ∈ (C ∪ CY ) \ Bi or v = wi .
• The edges incident to xi and the three vertices of Bi are labeled strong.
Next we label the edges incident to the rest of the vertices. Let IW be the vertices of
I \ {w1 , . . . , wk } and let CW be the vertices of C \ (B1 ∪ · · · ∪ Bk ). No edge incident to a
vertex of IW is labeled strong. For every vertex u ∈ CW we label the edge {u, v} strong
0 = {x
if v ∈ (C ∪ CY ). Let CY0 = {yk+1 , . . . , yn } and let IX
k+1 , . . . , xn }. Recall that every
0
vertex xk+j is adjacent to every vertex of CY \ {yk+j }. Let ` = b n−k
2 c. Let M = {e1 , . . . , e` }
0
0
be a maximal set of pairwise non-adjacent edges in G [CY ] where ej = {yk+2j−1 , yk+2j }, for
j ∈ {1, . . . , `}; note that M is a maximal matching of G0 [CY0 ]. For every vertex y ∈ CY0 ,
we label the edge {y, v} strong if v ∈ (C ∪ CY ) \ {y 0 } such that {y, y 0 } ∈ M . Moreover, for
j ∈ {1, . . . , `}, the edges {xk+2j−1 , yk+2j } and {xk+2j , yk+2j−1 } are labeled strong. Note that
if n − k is odd then no edge incident to the unique vertex yn belongs to M and all edges
between yn and the vertices of C ∪ CY are labeled strong; in such a case also note that no
edge incident to xn is strong.
Let us show that such a labeling fulfills the strong triadic closure. Any labeling for the
edges inside G0 [C ∪ CY ] is satisfied since G0 [C ∪ CY ] is a clique. Also note that there are
no two adjacent strong edges that have a common endpoint in the clique C ∪ CY and the
two other endpoints in the independent set I ∪ IX . If there are two strong edges incident to
the same vertex v of the independent set then v ∈ {x1 , . . . , xk } and NS [v] = Bi is a clique.
Assume that there are two adjacent strong edges {u, v} and {v, z} such that u ∈ I ∪ IX , and
v, z ∈ C ∪ CY .
• If u ∈ {w1 , . . . , wk } then {u, z} ∈ E(G0 ) since every wi misses only the vertices of Bi .
• If u ∈ {x1 , . . . , xk } then v ∈ Bi and {u, z} ∈ E(G0 ) since every vertex xi misses only
yi .
• If u ∈ IX \ {x1 , . . . , xk } then the strong neighbours of v in C ∪ CY are adjacent to u in
G0 since for the only non-neighbour of u in C ∪ CY there is a weak edge incident to v.
Recall that there is no strong edge incident to the vertices of I \ {w1 , . . . , wk }. Therefore the
given strong-weak labeling fulfills the strong triadic closure.
Observe that the number of vertices in C ∪ CY is 2n. There are exactly 3k + ` weak edges
in G0 [C ∪ CY ]. Thus the number of strong edges in G0 [C ∪ CY ] are n(2n − 1) − 3k − `. There
are k strong edges incident to {w1 , . . . , wk }, 3k strong edges incident to {x1 , . . . , xk }, and 2`
strong edges incident to the vertices of IX \ {x1 , . . . , xk }. Thus the total number of strong
edges is n(2n − 1) − 3k − ` + k + 3k + 2` = n(2n − 1) + ` + k and by substituting ` = b n−k
2 c
we get the claimed bound.
For the opposite direction, assume that G0 has a strong triadic closure with at least
n(2n − 1) + b n2 c + d k2 e strong edges. Let ES be the set of strong edges in such a strongweak labeling. Observe that the number of edges in G0 [C ∪ CY ] is n(2n − 1) which implies
that ES contains edges between the independent set I ∪ IX and the clique C ∪ CY . If no
vertex of IX is incident to an edge of ES then the first statement of Lemma 3.1 implies that
|ES | = |E(C ∪ CY )| = n(2n − 1). And if no vertex of I is incident to an edge of ES then
the second statement of Lemma 3.1 shows that |ES | ≤ |E(C ∪ CY )| + b n2 c. Therefore ES
contains edges that are incident to a vertex of I and edges that are incident to a vertex of
IX .
In the graph spanned by ES we denote by SW the set of vertices of I that have strong
neighbours in C ∪ CY . We will show that the non-neighbourhoods of the vertices of SW in
C ∪CY are disjoint in G0 and, since G is an induced subgraph of G0 , their non-neighbourhoods
are also disjoint in G.
7
Claim 3.4. For every wi ∈ SW , NS (wi ) ⊆ CY and there exists a unique vertex x ∈ IX such
that NS (x) = Bi .
Proof: Let wi be a vertex of SW . We first show that NS (wi ) ⊆ CY . Let Wi be the strong
neighbours of wi in C and let Yi be the strong neighbours of wi in CY . Observe that no other
vertex of SW has a strong neighbour in Wi ∪ Yi . Further notice that there are (|Wi | + |Yi |)|Bi |
weak edges since wi is non-adjacent to the vertices of Bi . We show that for every vertex
wi ∈ SW it holds Wi = ∅. For all vertices wi for which Wi 6= ∅ we replace in ES the strong
edges between wi and the vertices of Wi by the edges between the vertices of Bi and Wi .
Notice that making strong the edges between the vertices of Bi and Wi does not violate the
strong triadic closure since no vertex from SW has a strong neighbour in Bi and every vertex
of IX is adjacent to all the vertices of Wi . Let E(W, B) be the set of edges that have one
endpoint in Wi and the other endpoint in Bi , for every
P wi ∈ SW . Notice that the difference
between the two described solutions
is
|E(W,
B)|
−
|Wi |. By Lemma 3.1 and |Bi | = 3, we
P
know that |E(W, B)| ≥ 3/2 |Wi |. Thus such a replacement is safe for the number of edges
of ES and every vertex wi ∈ SW has strong neighbours only in CY .
Let Xi be the set of vertices of IX that have at least one non-neighbour in Yi . By
construction every vertex of Yi is non-adjacent to exactly one vertex of IX , and thus |Xi | =
|Yi |. Since wi has strong neighbours in Yi , every edge between Xi and Yi is weak. By the
previous argument every vertex of SW has strong neighbours only in CY so that NS (Bi )∩I =
∅. Also notice that no two vertices of the independent set have a common strong neighbour in
the clique, which means that there are at most |Bi | strong neighbours between the vertices of
Bi and IX . Choose an arbitrary vertex x ∈ Xi . We replace all strong edges in ES between Bi
and IX by |Bi | strong edges between x and the vertices of Bi . Notice that such a replacement
is safe since the unique non-neighbour of x belongs to Yi and there are weak edges already
in the solution between Bi and Yi because of the strong edges between wi and Yi . Thus
Bi ⊆ NS (x). We focus on the edges between the vertices of (C ∪ CY ) \ (Bi ∪ Yi ) and x. If
a vertex x of Xi has a strong neighbour u in (C ∪ CY ) \ Bi then the edge {u, y} is weak
where y ∈ Yi is the unique non-neighbour of x. Also notice that NS (u) ∩ (I ∪ IX ) = {x},
NS (y) ∩ (I ∪ IX ) = {wi }, and wi is adjacent to u. Then we can safely replace the strong
edge {x, u} by the edge {u, y} and keep the same size of ES . Hence NS (x) = Bi .
♦
Claim 3.5. For every wi ∈ SW , NS (wi ) = {y} where y ∈ CY is the non-neighbour of x with
NS (x) = Bi .
Proof: Let Yi = NS (wi ). By Claim 3.4 we know that Yi ⊆ CY and there exists x ∈ IX
such that NS (x) = Bi . Both wi and x are vertices of the independent set and, thus, no
other vertex of I ∪ IX has strong neighbours in Bi ∪ Yi . This means that if we remove wi
from SW by making weak the edges incident to wi and the vertices of Yi then the edges
between the vertices of Bi and Yi \ {y} are safely turned into strong. Let ES0 be the set
of strong edges in an optimal solution such that all edges incident to wi are weak. Then
|ES | − |ES0 | = |Yi | + |Bi | − |Yi ||Bi | and |ES | > |ES0 | only if |Yi | = 1 because |Bi | > 1. Thus
NS (wi ) contains exactly one vertex y ∈ CY .
♦
We claim that for every pair of vertices wi , wj ∈ SW , Bi ∩ Bj = ∅. Assume for contradiction that Bi ∩ Bj 6= ∅. Applying Claim 3.4 for wi shows that there exists x ∈ IX that has
strong neighbours in every vertex of Bi ∩ Bj . With a similar argument for wj we deduce that
there exists x0 ∈ IX that has strong neighbours in every vertex of Bi ∩ Bj . If x 6= x0 then a
vertex from Bi ∩ Bj has two distinct strong neighbours in IX which is not possible due to
the strong triadic closure. Thus x = x0 . Claim 3.5 implies that the unique non-neighbour
y of x is strongly adjacent to both wi and wj . This however violates the strong triadic
closure for the edges of ES since wi , wj are non-adjacent and we reach a contradiction. Thus
8
G:
G:
G:
a
b
{cde}
{f gh}
i
j
a
b
{cde}
{f gh}
i
j
a
b
{cde}
{f gh}
i
j
Figure 3: A proper interval graph G and its proper interval ordering. The vertices {c, d, e}
and {f, g, h} form twin sets in G. The two lower orderings show two solutions for MaxSTC
on G. A solid edge corresponds to a strong edge, whereas a dashed edge corresponds to a
weak edge. Observe that the upper solution contains larger number of strong edges than the
lower one. Also note that the lower solution consists an optimal solution for the Cluster
Deletion problem on G.
Bi ∩ Bj = ∅. This means that the number of edges in ES is at least n(2n − 1) + b n2 c + d |S2W | e
which is maximized for k = |SW |. Therefore ES contains the maximum number of |SW |
which is a solution for MaxDisjointNN on G, since G is an induced subgraph of G0 .
4
Computing MaxSTC on proper interval graphs
A graph is a proper interval graph if there is a bijection between its vertices and a family
of closed intervals of the real line such that two vertices are adjacent if and only if the two
corresponding intervals overlap and no interval is properly contained in another interval. A
vertex ordering σ is a linear arrangement σ = hv1 , . . . , vn i of the vertices of G. For a vertex
pair x, y we write x y if x = vi and y = vj for some indices i ≤ j; if x 6= y which implies
i < j then we write x ≺ y. The first position in σ will be referred to as the left end of σ, and
the last position as the right end. We will use the expressions to the left of, to the right of,
leftmost, and rightmost accordingly.
A vertex ordering σ for G is called a proper interval ordering if for every vertex triple
x, y, z of G with x ≺ y ≺ z, {x, z} ∈ E(G) implies {x, y}, {y, z} ∈ E(G). Proper interval
graphs are characterized as the graphs that admit such orderings, that is, a graph is a proper
interval graph if and only if it has a proper interval ordering [21]. We only consider this vertex
ordering characterization for proper interval graphs. Moreover it can be decided in linear
time whether a given graph is a proper interval graph, and if so, a proper interval ordering
can be generated in linear time [21]. It is clear that a vertex ordering σ for G is a proper
interval ordering if and only if the reverse of σ is a proper interval ordering. A connected
proper interval graph without twin vertices has a unique proper interval ordering σ up to
reversal [6, 13]. Figure 3 shows a proper interval graph with its proper interval ordering.
9
b
G:
ab
b{cde}
{cde}{f gh}
{f gh}i
a{cde}
b{f gh}
{cde}i
{f gh}j
ij
IGb
b of the proper interval graph G given in Figure 3.
Figure 4: The line-incompatibility graph G
b by taking into account the weight
The set IGb is a maximum weighted independent set of G,
of each node (i.e., an edge of G) that corresponds to the number of the twin vertices of its
endpoints in G (see Lemma 4.2).
Let us turn our attention to the MaxSTC problem. Instead of maximizing the strong
edges of the original graph G, we will look at the maximum independent set of the following
b of G: for every edge of G there is a node
graph that we call the line-incompatibility graph G
b and two nodes of G
b are adjacent if and only if the vertices of the corresponding edges
in G
induce a P3 in G. Note that the line-incompatibility graph of G is a subgraph of the line
graph1 of G.
Proposition 4.1. A subset S of edges E(G) is an optimal solution for MaxSTC of G if
b
and only if S is a maximum independent set of G.
Proof. By Observation 2.1 for every P3 in G at least one of its two edges must be labeled
b and they cannot belong to
weak in S. This means that these two edges are adjacent in G
b
b are adjacent
an independent set of G. On the other hand, by construction two nodes of G
b
if and only if there is a P3 in G. Thus the nodes of an independent set of G can be labeled
strong in G satisfying the strong triadic closure.
Therefore we seek for the optimal solution of G by looking at a solution for a maximum
b As a byproduct, if we are interested in minimizing the number of
independent set of G.
b We denote by I b the maximum
weak edges then we ask for the minimum vertex cover of G.
G
b To distinguish the vertices of G
b with those of G we refer to the
independent set of G.
former as nodes and to the latter as vertices. For an edge {u, v} of G we denote by uv
b Figure 4 shows the line-incompatibility graph of the proper
the corresponding node of G.
interval graph given in Figure 3.
Lemma 4.2. Let x and y be twin vertices of a graph G. Then there is an optimal solution
IGb such that xy ∈ IGb and for every vertex u ∈ N (x), xu ∈ IGb if and only if yu ∈ IGb .
Proof. First we show that xy is an isolated node in IGb . If xy is adjacent to xu then y is nonadjacent to u in G which contradicts the fact that x and y are twins. Thus xy is an isolated
b which implies xy ∈ I b . For the second argument observe that for every vertex
node in G
G
u ∈ N (x), xu and yu are non-adjacent in IGb . Let u ∈ N (x). Then notice that u ∈ N (y).
b We define
This means that if xu ∈ IGb (resp., yu ∈ IGb ) then yu (resp., xu) is a node of G.
b
the following sets of nodes in G:
/ IGb and let Ay be the set of
• Let Ax be the set of nodes xa such that xa ∈ IGb and ya ∈
nodes ya such that xa ∈ Ax .
• Let By be the set of nodes yb such that yb ∈ IGb and xb ∈
/ IGb and let Bx be the set of
nodes xb such that yb ∈ By .
1
The line graph of G is the graph having the edges of G as vertices and two vertices of the line graph are
adjacent if and only if the two original edges are incident in G.
10
It is clear that Ax ⊆ IGb , By ⊆ IGb , and Ax ∩ By = ∅. Also note that |Ax | = |Ay | and
|By | = |Bx |, since N [x] = N [y].
Let Ixy = IGb \ (Ax ∪ By ) so that IGb = Ax ∪ By ∪ Ixy . We show that every node of Ay is
non-adjacent to any node of IGb \ By . Let ya be a node of Ay . If there is a node az ∈ IGb \ By
that is adjacent to ya then z and y are non-adjacent in G which implies that z and x are
non-adjacent in G. This however leads to a contradiction because xa, az ∈ IGb and xa is
b If there is a node yb ∈ I b that is adjacent to ya then a is non-adjacent
adjacent to az in G.
G
b This means that xb ∈
to b in G so that xa is also adjacent to xb in G.
/ IGb implying that
yb ∈ By . Thus every node of Ay is non-adjacent to any node of IGb \ By and with completely
symmetric arguments, every node of Bx is non-adjacent to any node of IGb \ Ax . Hence both
b By the facts
sets I1 = Ax ∪ Ay ∪ Ixy and I2 = Bx ∪ By ∪ Ixy form independent sets in G.
that |Ax | = |Ay | and |By | = |Bx | we have |I1 | ≥ |Ixy | whenever |Ax | ≥ |By | and |I2 | ≥ |Ixy |
whenever |Ax | < |By |. Therefore we can safely replace one of the sets Ax or By by Bx or Ay
and obtain the solutions I2 or I1 , respectively. Now observe that in both solutions I1 and I2
we have xu ∈ Ii if and only if yu ∈ Ii , for i ∈ {1, 2}, and this completes the proof.
Lemma 4.2 suggests to consider a graph G that has no twin vertices as follows. We
partition V (G) into sets of twins. A vertex that has no twin appears in its twin set alone.
For every twin set Wx we choose an arbitrary vertex x and remove all its twin vertices except
x from G. Let G0 be the resulting graph that has no twin vertices. For every edge {x, y}
of G0 we assign a weight equal to the product |Wx | · |Wy |. This value corresponds to all
edges of the original graph G between the vertices of Wx and Wy . The line-incompatibility
c0 of G0 is constructed as defined above with the only difference that a node of G
c0 has
graph G
0
weight equal to the weight of its corresponding edge in G . Let IG
c0 be a maximum weighted
0
c
independent set, that is an independent set of G such that the sum of the weights of its
nodes is maximized. Then by Lemma 4.2 we have IGb = IG
c0 ∪ S(W ) where S(W ) contains
|Wx |(|Wx | − 1)/2 nodes for every twin set Wx . Therefore we are interested in computing
c0 . Also note that G0 is an induced subgraph of
the maximum weighted independent set of G
the original graph G. Since there is no ambiguity in the forthcoming results and in order
c0 as G
b by assuming that G has no twin vertices and
to avoid heavier notation we refer to G
every vertex of G has a positive weight.
Before reaching the details of our algorithm for proper interval graphs, let us highlight
the difference between the optimal solution for MaxSTC and the optimal solution for the
Cluster Deletion. As already explained in the Introduction a solution for Cluster
Deletion fulfils the strong triadic closure, though the converse is not necessarily true. In
fact such an observation carries out for the class of proper interval graphs as shown in the
example given in Figure 3. For the Cluster Deletion problem twin vertices can be grouped
together following a similar characterization with Lemma 4.2, as proved in [3]. Therefore
when restricted to proper interval graphs the optimal solution for Cluster Deletion does
not necessarily imply an optimal solution for MaxSTC.
Let G be a proper interval graph and let σ be a proper interval ordering for G. We say
that a solution IGb has the consecutive strong ordering with respect to σ if for any three
vertices x, y, z of G with x ≺ y ≺ z the following holds: xz ∈ IGb implies xy, yz ∈ IGb . Our
task is to show that such an optimal ordering exists. We start by characterizing the optimal
solution IGb with respect to the proper interval ordering σ.
Lemma 4.3. Let x, y, z be three vertices of a proper interval graph G such that x ≺ y ≺ z.
If xz ∈ IGb then xy ∈ IGb or yz ∈ IGb .
b If
Proof. We show that at least one of xy or yz belongs to IGb . Consider the node xy in G.
xy is adjacent to a node xx` ∈ IGb then {x` , y} ∈
/ E(G). Then observe that x` ≺ y because
11
x ≺ y and {x` , y} ∈
/ E(G). Since both xx` and xz belong to IGb , {x` , z} ∈ E(G). This
however contradicts the proper interval ordering because x` ≺ y ≺ z, {x` , z} ∈ E(G) and
y is non-adjacent to x` . Thus xy is non-adjacent to any node xx` ∈ IGb and, in analogous
fashion, yz is non-adjacent to any node zzr ∈ IGb .
Now assume that xy is adjacent to a node yyr ∈ IGb and yz is adjacent to a node y` y ∈ IGb .
This means that {x, yr } ∈
/ E(G) and {z, y` } ∈
/ E(G). Since {x, z} ∈ E(G), by the proper
interval ordering we have y` ≺ x ≺ y ≺ z ≺ yr . Then notice that {y` , yr } ∈ E(G), because
both yyr , yy` ∈ IGb . By the proper interval ordering we know that both x and z are adjacent
to y` , yr , leading to a contradiction to the assumptions {x, yr } ∈
/ E(G) and {z, y` } ∈
/ E(G).
Therefore at least one of xy or yz belongs to IGb .
Thus by Lemma 4.3 we have two symmetric cases to consider. The next characterization
suggests that there is a fourth vertex with important properties in each corresponding case.
Lemma 4.4. Let x, y, z be three vertices of a proper interval graph G such that x ≺ y ≺ z
and xz ∈ IGb .
• If xy ∈
/ IGb and yz ∈ IGb then xy is non-adjacent to any node x` x ∈ IGb and there is a
vertex w such that yw ∈ IGb , {x, w} ∈
/ E(G), and z ≺ w.
• If xy ∈ IGb and yz ∈
/ IGb then yz is non-adjacent to any node zzr ∈ IGb and there is a
vertex w such that wy ∈ IGb , {w, z} ∈
/ E(G) and w ≺ x.
Proof. Let xy ∈
/ IGb and yz ∈ IGb . The case for xy ∈ IGb and yz ∈
/ IGb is completely symmetric.
Assume for contradiction that there is no vertex w such that yw ∈ IGb , {x, w} ∈
/ E(G), and
z ≺ w. We prove that xy is non-adjacent to any node of IGb , contradicting the optimality of
IGb . Suppose first that xy is adjacent to a node x` x ∈ IGb . Then y is non-adjacent to x` in
G. Notice that x` ≺ x because y is adjacent to x and x ≺ y. Due to the fact that yz ∈ IGb ,
b which implies that {x` , z} ∈ E(G). Since
we have that x` x and xz are non-adjacent in G
x` ≺ x ≺ y ≺ z and {x` , z} ∈ E(G), by the proper interval ordering we get {x` , y} ∈ E(G)
leading to a contradiction. Thus xy is non-adjacent to any node x` x ∈ IGb .
Next assume that xy is adjacent to a node yyr ∈ IGb . Then {x, yr } ∈
/ E(G). By the
assumption that there is no vertex w with yw ∈ IGb , {x, w} ∈
/ E(G), and z ≺ w, we have
yr ≺ z. This particularly means that yr ≺ x or x ≺ yr ≺ z. However both cases lead
to a contradiction to {x, yr } ∈
/ E(G) since in the former case we have {yr , y} ∈ E(G) and
yr ≺ x ≺ y, and in the latter case we know that {x, z} ∈ E(G). Therefore xy has no neighbor
in IGb reaching a contradiction to the optimality of IGb .
Now we are ready to show that that there is an optimal solution that has the described
properties with respect to the given proper interval ordering.
Lemma 4.5. There exists an optimal solution IGb that has the consecutive strong property
with respect to σ.
Proof. Let σ be a proper interval ordering for G. Assume for contradiction that IGb does not
have the consecutive strong property. Then there exists a conflict with respect to σ, that is,
there are three vertices x, y, z with x ≺ y ≺ z and xz ∈ IGb such that xy ∈
/ IGb or yz ∈
/ IGb . We
will show that as long as there are conflicts in σ, we can reduce the number of conflicts in
σ without affecting the value of the optimal solution IGb . Consider such a conflict formed by
the three vertices x ≺ y ≺ z with xz ∈ IGb . By Lemma 4.3 we know that xy ∈ IGb or yz ∈ IGb .
Assume that yz ∈ IGb . Then clearly xy ∈
/ IGb , for otherwise there is no conflict. Then by
Lemma 4.4 there is a vertex w such that yw ∈ IGb , {x, w} ∈
/ E(G), and x ≺ y ≺ z ≺ w.
Notice that both triples x, y, z and y, z, w create conflicts in σ.
12
We start by choosing an appropriate such conflict that is formed by four vertices x, y, z, w
so that x ≺ y ≺ z ≺ w, xz, yz, yw ∈ IGb , and {x, w} ∈
/ E(G). Fix y and z in σ with y, z
being the leftmost and the rightmost vertices, respectively, such that for every vertex v with
y ≺ v ≺ z, yv, vz ∈ IGb holds. Recall that yz ∈ IGb . We choose x as the leftmost vertex such
that xz ∈ IGb and we choose w as the rightmost vertex such that yw ∈ IGb . Observe that
{x, w} ∈
/ E(G) since y and z participate in a conflict. Due to the properties of the considered
conflicts all such vertices exist (see for e.g., Figure 5).
Let W (x) be the set of vertices wi such that ywi ∈ IGb and {x, wi } ∈
/ E(G), and let X(w)
be the set of vertices xj such that xj z ∈ IGb and {xj , w} ∈
/ E(G). Observe that w ∈ W (x)
and x ∈ X(w) such that w is the rightmost vertex in W (x) and x is the leftmost vertex in
X(w). For a vertex wi of W (x) observe the following. If wi ≺ x then {wi , x} ∈ E(G) because
{wi , y} ∈ E(G) and if x ≺ wi ≺ z then {wi , x} ∈ E(G) because {x, z} ∈ E(G). Thus z ≺ wi
which implies that {z, wi } ∈ E(G) since {y, wi } ∈ E(G). If zwi ∈ IGb then by the fact that
xz ∈ IGb we have {x, wi } ∈ E(G) contradicting the definition of W (x). Moreover for every
vertex b1 such that wi b1 ∈ IGb notice that x ≺ b1 since {x, wi } ∈
/ E(G). If x ≺ b1 ≺ wi then
{z, b1 } ∈ E(G) since x ≺ z ≺ wi ; and if wi ≺ b1 then due to the fact that ywi , wi b1 ∈ IGb
and {y, b1 } ∈ E(G) we have again {z, b1 } ∈ E(G) since y ≺ z ≺ b1 . Furthermore consider a
vertex b2 such that z ≺ b2 ≺ w and b2 ∈
/ W (x). This means that yb2 ∈
/ IGb or yb2 ∈ IGb with
{b2 , x} ∈ E(G). The latter case implies that b2 is adjacent to every vertex of X(w), since x
is the leftmost vertex in X(w) and every vertex of X(w) is to the left of z. Hence for every
vertex wi of W (x) the following hold:
• z ≺ wi ,
• zwi ∈
/ IGb ,
• for every node wi b1 ∈ IGb , {z, b1 } ∈ E(G), and
• for every vertex b2 with z ≺ b2 ≺ w and b2 ∈
/ W (x), yb2 ∈
/ IGb or b2 is adjacent to every
vertex of X(w).
With symmetric arguments for every vertex xj of X(w) we have the following:
• xj ≺ y,
• xj y ∈
/ IGb ,
• for every node a1 xj ∈ IGb , {a1 , y} ∈ E(G), and
• for every vertex a2 with x ≺ a2 ≺ y and a2 ∈
/ X(w), a2 z ∈
/ IGb or a2 is adjacent to every
vertex of W (x).
The topmost ordering given in Figure 5 illustrates the corresponding cases.
b such that wi ∈ W (x), and let Zx be the set of nodes
Let Yw be the set of nodes ywi in G
b
xj z in G such that xj ∈ X(w). Observe that Yw , Zx ⊆ IGb by the previous arguments. We
show that removing either Yw or Zx from IGb does not create any new conflict. Let ywi ∈ Yw
and let u be a vertex such that uy ∈ IGb and uwi ∈ IGb . If y ≺ u ≺ wi then no conflict is
created by removing ywi from IGb . Assume that u ≺ y ≺ wi . Observe that x ≺ u ≺ z. Then
xu ∈
/ IGb because {x, wi } ∈
/ E(G). Since xz ∈ IGb and at least one of xu, uz belongs to IGb ,
we have uz ∈ IGb . However this contradicts the leftmost choice for y in x ≺ u ≺ y ≺ z and
there is no such vertex u. Next assume that y ≺ wi ≺ u. Since wi is non-adjacent to x and
wi ≺ u, u is non-adjacent to x, as well. Then according to the definition of W (x), u ∈ W (x)
and yu ∈ Yw . The case for the nodes of Zx is completely symmetric. Thus no conflicts are
created by removing the nodes of Yw or the nodes of Zx from IGb .
13
X(w)
a1
x
W (x)
···
xj
a2
y
u
z
b2
wi
···
x
···
xj
a2
y
u
z
b2
wi
···
X(w)
a1
x
b1
W (x)
X(w)
a1
w
w
b1
W (x)
···
xj
a2
y
u
z
b2
wi
···
w
b1
Figure 5: A proper interval ordering for a graph G with three different solutions considered
b that belongs to I b ,
in the proof of Lemma 4.5. A solid edge corresponds to a node of G
G
which means that such an edge is labeled strong in an optimal strong-weak labeling, whereas
b that does not belong to I b , which means that
a dashed edge corresponds to a node of G
G
such an edge is labeled weak in an optimal strong-weak labeling. Observe that the lowest
two orderings contain less conflicts than the topmost, that is, triple of vertices that violate
the consecutive strong property.
b such that xj ∈ X(w), and let Zw be the set of
Let Yx be the set of nodes xj y in G
b
nodes zwi in G such that wi ∈ W (x). We denote by I(Yx ) and I(Zw ) the following sets of
nodes: I(Yx ) = IGb \ Yw ∪ Yx and I(Zw ) = IGb \ Zx ∪ Zw . We show that both sets form
b Consider the case for I(Yx ). Let xj y be a node of I(Yx ). There are
independent sets in G.
two cases to consider:
there
is
a
node
ux
∈
I
\
Y
∪ Yx and {u, y} ∈
/ E(G) or there is a
j
w
b
G
node yv ∈ IGb \ Yw ∪ Yx and {xj , v} ∈
/ E(G). In the former case we know that uxj ∈ IGb and
for every node uxj ∈ IGb , {u, y} must be an edge of G which leads to a contradiction to the
non-adjacency of u and y. For the latter case observe that yv ∈ IGb \ Yw and v ∈
/ W (x). Since
{xj , v} ∈
/ E(G) and {y, v} ∈ E(G), we have z ≺ v and by the rightmost choice of w for y we
have z ≺ v ≺ w. This however implies that z ≺ v ≺ w, v ∈
/ W (x) and yv ∈ IGb showing that
{xj , v} ∈ E(G). Completely symmetric arguments hold for I(Zw ). The two lowest orderings
given in Figure 5 illustrate the considered cases. Thus I(Yx ) and I(Zw ) form independent
b
sets in G.
Now observe that both I(Yx ) and I(Zw ) have a smaller number of conflicts with respect
to IGb because either x, y, z in I(Yx ) or y, z, w in I(Zw ) satisfy the consecutive strong property.
It is clear that the difference between I(Yx ) and IGb are the nodes of Yx and Yw , whereas the
14
difference between I(Zw ) and IGb are the nodes of Zw and Zx . For a set A of vertices having
positive weights, denote by M (A) the sum of the weights of its vertices. If M (X(w)) ≥
M (Z(x)) then M (I(Yx )) ≥ M (IGb ) and if M (X(w)) < M (Z(x)) then M (I(Zw )) > M (IGb ).
Thus in any case we can replace appropriate set of nodes in IGb and obtain an optimal solution
with a smaller number of conflicts. Therefore by applying such a replacement in every such
conflict, we get an optimal solution that has no conflicts and, thus, it satisfies the consecutive
strong property.
Lemma 4.5 suggests to find an optimal solution that has the consecutive strong property
with respect to σ. In fact by Proposition 4.1 and the proper interval ordering, this reduces
to computing the largest proper interval subgraph H of G such that the vertices of every P3
of H induce a clique in G.
Let G be a proper interval graph and let σ = hv1 , . . . , vn i be its proper interval ordering.
For a vertex vi we denote by v`(i) and vr(i) its leftmost and rightmost neighbors, respectively,
in σ. Observe that for any two vertices vi ≺ vj in σ, v`(i) v`(j) and vr(i) vr(j) [6]. For
1 ≤ i ≤ r(1), let Vi = {v1 , . . . , vi }, that is, Vi contains the first i vertices in σ. Given the set
Vi , let r be an integer such that 1 ≤ i ≤ r ≤ r(1).
Let A(G) be the value of an optimal solution IGb for G. For the set Vi we denote by
B(Vi ) the value that corresponds to the total weight of the edges incident to v1 and each
of v2 , . . . , vi . Observe that any subset of vertices of Vi induces a clique in G. We denote
by C(Vi ) the value that corresponds to the total weight of the edges among all vertices of
Vi . Given the first vertices Vi and i ≤ r ≤ r(1), let A(G, Vi , r) be the value of the optimal
solution I(G, Vi , r) in G such that every edge among the vertices of Vi belongs to I(G, Vi , r)
and uvk ∈
/ I(G, Vi , r) with u ∈ Vi and k > r. As a trivial case observe that if G contains
exactly two vertices v1 , v2 then A(G) = B({v1 , v2 }) = C({v1 , v2 }).
Lemma 4.6. Let G be a proper interval graph and let Vi and r such that 1 ≤ i ≤ r ≤ r(1).
Then, A(G) = A(G, ∅, r) = A(G, {v1 }, r(1)), and
max {A(G − {v1 }, Vj \ {v1 }, r) + B(Vj )} if i < r,
i≤j≤r
A(G, Vi , r) = A(G − Vi , {vi+1 }, r(i + 1)) + C(Vi )
if i = r and i < n,
C(Vi )
otherwise.
Proof. We show that A(G) computes the value of an optimal solution that satisfies the
consecutive strong property. By Lemma 4.5 such an ordering exists. Since there is no edge
between v1 and vk with k > r(1), it follows that A(G) = A(G, {v1 }, r(1)). Observe that
every induced subgraph of a proper interval graph is proper interval, which implies that the
graphs G − {v1 } and G − Vi remain proper interval. Let Vi = {v1 , . . . , vi } be the first i
vertices of G. According to Lemma 4.5 if vi vk ∈
/ I(G, Vi , r) with k > i, then every node vj vk ,
1 ≤ j ≤ i, does not belong to I(G, Vi , r). Again by Lemma 4.5 if v1 vk ∈ I(G, Vi , r) with
k > i, then every node vj vk , 1 ≤ j ≤ i, belongs to I(G, Vi , r).
b corresponding to the edges of G[Vi ]. Observe that by the
Let I(Vi ) be the nodes of G
definition of I(G, Vi , r), I(Vi ) ⊆ I(G, Vi , r). If i = r then it is clear that the nodes of I(Vi )
belong to I(G, Vi , r). Moreover if i = r < n then no node vi vk , with i < k, can be added in
I(G, Vi , r), implying that all the nodes corresponding to the edges between Vi and G − Vi do
not belong to I(G, Vi , r). Thus we can safely add I(Vi ) to an optimal solution for G − Vi ,
that is, I(G − Vi , {vi+1 }, r(i + 1)).
Assume that i < r. To see that I(Vi ) ⊆ I(G, Vi , r), notice that Vi ⊆ Vj for every
i ≤ j ≤ r and C(Vi ) = B(Vi ) + B(Vi \ {v1 }) + · · · + B({vi−1 , vi }). Consider the nodes v1 vj of
b corresponding to the edges incident to v1 . Let v1 vj ∈ I b with j as large as possible. Then
G
G
15
b with 1 ≤ j 0 ≤ j belongs to I b . Thus
i ≤ j ≤ r ≤ r(1). By Lemma 4.5 every node v1 vj 0 of G
G
I(Vj ) ⊆ I(G, Vi , r). Furthermore for every node vj vk , with r ≤ r(1) < k, we know that vj vk
b since {v1 , vk } ∈
is adjacent to v1 vj in G
/ E(G). Thus vj vk ∈
/ IGb which implies that every node
0
0
vj vk with j ≤ j does not belong to IGb . This particularly means that vj vk ∈ I(G, Vi , r) only
if k ≤ r ≤ r(1). Therefore given an optimal solution by removing v1 for all such possible
values for j, we obtain the desired solution.
Now we are equipped with our necessary tools in order to obtain our main result, namely
a polynomial-time algorithm that solves the MaxSTC problem on a proper interval graph
G.
Theorem 4.7. There is a polynomial-time algorithm that computes the MaxSTC of a proper
interval graph.
Proof. Let G be a proper interval graph on n vertices and m edges. We first compute its
proper interval ordering σ in linear time [21]. Then we compute its twin sets by using the
fact that u and v are twins if and only if `(u) = `(v) and r(u) = r(v). Contracting the
twin sets according to Lemma 4.2 results in a proper interval graph in which every vertex
is associated with a positive weight. In order to compute the optimal solution A(G) we use
a dynamic programming approach based on its recursive formulation given in Lemma 4.6.
Correctness follows from Proposition 4.1 and Lemmata 4.5 and 4.6.
Regarding the running time, notice that given the ordering σ we can remove the twin
vertices in linear time. All instances of A(G, Vi , r) can be computed as follows. Given the first
vertex v1 we compute all possible sets Vi which are bounded by n. Since r ≤ r(1) ≤ n, the
number of instances A(G, Vi , r) generated by v1 is at most n2 . Also observe that computing
the values B(Vi ) and C(Vi ) takes O(m) time. Therefore the total running time of the
algorithm is O(n3 m).
5
Concluding remarks
Given the first study with positive and negative results for the MaxSTC problem on restricted input, there are some interesting open problems. Despite the structural properties
that we proved for the solution on proper interval graphs, the complexity of MaxSTC
on interval graphs is still open. Determining the complexity of MaxSTC for other graph
classes towards AT-free graphs seems interesting direction for future work. More precisely,
by Proposition 4.1 it is interesting to consider the line-incompatibility graph of comparability graphs since they admit a well-known similar characterization [17]. Moreover it is
natural to characterize the graphs for which their line-incompatibility graph is perfect. Such
a characterization will lead to to further polynomial cases of MaxSTC, since the maximum
independent set of perfect graphs admits a polynomial solution [10]. A typical example is the
class of bipartite graphs for which their line graph coincides with their line-incompatibility
graph and it is known that the line graph of a bipartite graph is perfect (see for e.g., [4]).
As we show next, another paradigm of this type is the class of trivially-perfect graphs.
A graph G is called trivially-perfect (also known as quasi-threshold) if for each induced
subgraph H of G, the number of maximal cliques of H is equal to the maximum size of an
independent set of H. It is known that the class of trivially-perfect graphs coincides with
the class of (P4 , C4 )-free graphs, that is every trivially-perfect graph has no induced P4 or
C4 [9]. A cograph is a graph without an induced P4 , that is a cograph is a P4 -free graph.
Hence trivially-perfect graphs form a subclass of cographs.
Theorem 5.1. The line-incompatibility graph of a trivially-perfect graph is cograph.
16
Proof. Let G be a trivially-perfect graph, that is G is a (P4 , C4 )-free graph. We will show
b of G is a P4 -free graph. Consider any P3 in G.
b Due
that the line-incompatibility graph G
b
to the construction of G, the P3 has one of the following forms: (i) v1 v2 , v2 v3 , v3 v4 or (ii)
v1 x, v2 x, v3 x. We prove that the P3 has the second form because G has no induced P4 or
C4 . If (i) applies then {v1 , v3 }, {v2 , v4 } ∈
/ E(G) and {v1 , v2 }, {v2 , v3 }, {v3 , v4 } ∈ E(G) which
implies that v4 6= v1 . Thus G contains a P4 or a C4 depending on whether there is the edge
b has the form v1 x, v2 x, v3 x where v1 , v2 , v3 , x are distinct
{v1 , v4 } in G. Hence every P3 in G
b contains a P4 . Then the P4 is of the
vertices of G. Now assume for contradiction that G
form v1 x, v2 x, v3 x, v4 x because it contains two induced P3 ’s. The structure of the P4 implies
that {v1 , v2 }, {v2 , v3 }, {v3 , v4 } ∈
/ E(G) and {v1 , v3 }, {v2 , v4 }, {v4 , v1 } ∈ E(G). This however
shows that the vertices v3 , v1 , v4 , v2 induce a P4 in G leading to a contradiction that G is a
b is a P4 -free graph.
(P4 , C4 )-free graph. Therefore G
By Theorem 5.1 and the fact that the maximum independent set of a cograph can be
computed in linear time [5], MaxSTC can be solved in polynomial time on trivially-perfect
graphs. We would like to note that the line-incompatibility graph of a cograph or a proper
interval graph is not necessarily a perfect graph.
More general there are extensions and variations of the MaxSTC problem that are
interesting to consider as proposed in [25]. A natural graph modification problem is the
problem of adding the minimum number of edges that satisfy the strong triadic closure
having as few as possible weak edges in the original graph. More formally the objective is
to add F edges in G so that the resulting graph satisfies the strong triadic closure with the
minimum number of |F | + |EW |.
References
[1] A. B. Adcock, B. D. Sullivan, M. W. Mahoney. Tree decompositions and social graphs.
Internet Mathematics, 12:315–361, 2016.
[2] L. Backstrom and J. Kleinberg. Romantic partnerships and the dispersion of social ties:
a network analysis of relationship status on facebook. In Proceedings of CSCW 2014,
pp. 831–841, 2014.
[3] F. Bonomo, G. Durán, and M. Valencia-Pabon. Complexity of the cluster deletion
problem on subclasses of chordal graphs. Theoretical Computer Science, 600:59-69,
2015.
[4] A. Brandstädt, V.B. Le, and J. Spinrad. Graph Classes – a Survey. SIAM Monographs
in Discrete Mathematics and Applications, SIAM, Philadelphia, 1999.
[5] D.G. Corneil, Y. Perl, and L.K. Stewart. Complement reducible graphs. Discrete Applied
Mathematics, 3:163–174, 1981.
[6] X. Deng, P. Hell, and J. Huang. Linear-time representation algorithms for proper
circular-arc graphs and proper interval graphs. SIAM J. Comput., 25:390–403, 1996.
[7] D. Easley and J. Kleinberg. Networks, Crowds, and Markets: Reasoning About a Highly
Connected World. Cambridge University Press, 2010.
[8] J. Edmonds. Paths, trees and flowers. Canad. J. Math., 17:449–467, 1965.
[9] M.C. Golumbic. Trivially perfect graphs. Discrete Mathematics, 24:105-107, 1978.
[10] M. Götschel, L. Lovász, and A. Scrijver. Polynomial algorithms for perfect graphs.
Annals of Discrete Mathematics, 21:325–356, 1984.
17
[11] M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1360–
1380, 1973.
[12] P. Heggernes, D. Lokshtanov, J. Nederlof, C. Paul, and J. A. Telle. Generalized graph
clustering: recognizing (p, q)-cluster graphs. In Proceedings of WG 2010, pp. 171–183,
2010.
[13] L. Ibarra. The clique-separator graph for chordal graphs. Discrete Applied Mathematics,
157:1737-1749, 2009.
[14] M. O. Jackson. Social and economic networks. Princeton University press, vol. 3, 2008.
[15] R. M. Karp. Reducibility among combinatorial problems. Complexity of Computer
Computations, 85–103, 1972.
[16] D. J. Kleitman and R. V. Vohra. Computing the bandwidth of interval graphs. SIAM
J. Disc. Math., 3:373–375, 1990.
[17] D. Kratsch, R. M. McConnell, K. Mehlhorn, and J. P. Spinrad. Certifying algorithms
for recognizing interval graphs and permutation graphs. SIAM J. Comput., 36: 326–353,
2006.
[18] L. C. Lau. Bipartite roots of graphs. ACM Transactions on Algorithms, 2:178–208,
2006.
[19] L. C. Lau and D. G. Corneil. Recognizing powers of proper interval, split, and chordal
graphs. SIAM J. Disc. Math., 18: 83–102, 2004.
[20] F.T. Leighton and S. Rao. An approximate max-flow min-cut theorem for uniform
multicommodity flow problems with applications to approximation algorithms. In Proceedings of FOCS 1988, pp. 422–431, 1998.
[21] P. J. Looges and S. Olariu. Optimal greedy algorithms for indifference graphs. Computers & Mathematics with Applications, 25:1525, 1993.
[22] M. Milanič and O. Schaudt. Computing square roots of trivially perfect and threshold
graphs. Discrete Applied Mathematics, 161:1538-1545, 2013.
[23] J. L. Pfaltz. Chordless cycles in networks. In Proceedings of ICDE Workshops, pp.
223–228, 2013.
[24] F. S. Roberts. Indifference Graphs. In Proof Techniques in Graph Theory, Academic
Press, New York, 139–146, 1969.
[25] S. Sintos and P. Tsaparas. Using strong triadic closure to characterize ties in social
networks, In Proceedings of KDD 2014, pp. 1466–1475, 2014.
[26] J. Ugander, L. Backstrom, and J. Kleinberg. Subgraph frequencies: Mapping the empirical and extremal geography of large graph collections. In Proceedings of WWW 2013,
pp. 1307–1318, 2013.
18
| 8cs.DS
|
arXiv:1603.02177v1 [math.GR] 7 Mar 2016
A Sufficient Condition for Nilpotency of
the Commutator Subgroup
Raimundo Bastos and Pavel Shumyatsky
Abstract. Let G be a finite group with the property that if a, b
are commutators of coprime orders, then |ab| = |a||b|. We show
that G′ is nilpotent.
The following criterion of nilpotency of a finite group was established by B. Baumslag and J. Wiegold [1].
Theorem 1. Let G be a finite group in which |ab| = |a||b| whenever
the elements a, b have coprime orders. Then G is nilpotent.
Here the symbol |x| stands for the order of the element x in a group
G. In the present article we establish a similar criterion of nilpotency
for the commutator subgroup G′ . Recall that an element g ∈ G is a
commutator if g = x−1 y −1xy for suitable x, y ∈ G. By definition, the
commutator subgroup G′ is the subgroup of G generated by all commutators. The purpose of the present article is to prove the following
theorem.
Theorem 2. Let G be a finite group in which |ab| = |a||b| whenever the elements a, b are commutators of coprime orders. Then G′ is
nilpotent.
In view of the above theorem one might suspect that a similar phenomenon holds for other group-words. Recall that a group-word w =
w(x1 , . . . , xs ) is a nontrivial element of the free group F = F (x1 , . . . , xs )
on free generators x1 , . . . , xs . A word is a commutator word if it belongs to the commutator subgroup F ′ . Given a group-word w, it can be
viewed as function defined in any group G. The subgroup of G generated by the w-values is called the verbal subgroup of G corresponding
2010 Mathematics Subject Classification. 20D30, 20F16, 20D25.
Key words and phrases. Finite groups, commutators.
This work was supported by CNPq-Brazil.
1
2
RAIMUNDO BASTOS AND PAVEL SHUMYATSKY
to the word w. It is usually denoted by w(G). One might ask the
following question.
Let w be a commutator word and G a finite group with the property
that if a, b are w-values of coprime order, then |ab| = |a||b|. Is then the
verbal subgroup w(G) nilpotent?
Asking a similar question for noncommutator words would not be
interesting since an easy counter-example is provided just by any nonabelian simple group G, say of exponent e, and the word xn , where
n is a divisor of e such that e/n is prime. Even in the case of commutator words the answer to our question is negative: Kassabov and
Nikolov showed in [3] that for any n ≥ 7 the alternating group An
admits a commutator word all of whose nontrivial values have order
3. We suspect that the answer to the question is positive in the case
of multilinear commutator words, that is, words having a form of a
multilinear Lie monomial (like for example [[x1 , [x2 , x3 ]], [x4 , x5 ]]).
Throughout the remaining part of this short note G denotes a finite
group satisfying the hypothesis of Theorem 2. We denote by X the set
of commutators in G. As usual, π(K) stands for the set of primes
dividing the order of a group K. The Fitting subgroup of K is denoted
by F (K).
Lemma 3. Let x ∈ X and N be a subgroup normalized by x. If
(|x|, |N|) = 1, then [x, N] = 1.
Proof. Choose y ∈ N. The order of the commutator [x, y] is
prime to that of x. Therefore we must have |x[x, y]| = |x||[x, y]|. However x[x, y] = y −1xy. This is a conjugate of x and so |x[x, y]| = |x|.
Therefore [x, y] = 1.
Lemma 4. If G is soluble, then G′ is nilpotent.
Proof. Arguing by induction on |G| we can assume that the second commutator subgroup G′′ is nilpotent. Suppose that there are two
different primes p ∈ π(G′ ) and q ∈ π(G′′ ). Let P be a Sylow p-subgroup
of G′ and Q a Sylow q-subgroup of G′′ . It is straightforward from the
Focal Subgroup Theorem [2, Theorem 7.3.4] that P is generated by
P ∩ X. Lemma 3 tells us that if x ∈ P ∩ X, we have [Q, x] = 1.
Therefore [Q, P ] = 1. It follows that P is normal in P G′′ and therefore
P ≤ F (P G′′). Since P G′′ is normal in G′ , we conclude that P ≤ F (G).
This holds for every prime p such that G′′ is not a p-group. Therefore
if G′′ is divisible by at least two different primes, all Sylow subgroups
of G′ belong to F (G) and so G′ is nilpotent. If G′′ is q-group, it is
obvious that the Sylow q-subgroup of G′ is normal in G and so again
NILPOTENCY
3
we conclude that all Sylow subgroups of G′ belong to F (G). The proof
is complete.
Proof of Theorem 2. Now suppose that G is a counter-example
of minimal order. So all proper subgroups in G are soluble and we can
assume that G = G′ . Let R be the soluble radical in G. It follows
that G/R is nonabelian simple. By Lemma 4 R′ is nilpotent. Suppose
that G is nonsimple and R 6= 1 and, for a prime q, let Q be the Sylow
subgroup of F (G). Let T be the subgroup of G generated by all commutators that are q ′ -elements. In view of the Focal Subgroup Theorem,
all Sylow p-subgroups of G′ for p 6= q are contained in T . Therefore the
commutator subgroup of G/T is a q-group. Since G = G′ , we conclude
that G = T . Combining Lemma 3 with the Focal Subgroup Theorem
we now deduce that F (G) ≤ Z(G).
Further, we remark that for any x ∈ G the subgroup hx, Ri is soluble
and so hx, Ri′ is nilpotent. It follows that [R, x] ≤ F (G) = Z(G)
and therefore R = Z2 (G). In particular, R is nilpotent and therefore
R = Z(G). Thus, our group G is quasisimple.
Since G does not possess a normal 2-complement, it follows from the
Frobenius Theorem [2, Theorem 7.4.5] that G contains a 2-subgroup H
and an element of odd order b ∈ NG (H) such that [H, b] 6= 1. In view
of Thompson’s Theorem [2, Theorem 5.3.11] we can assume that H
is of nilpotency class at most two and H/Z(H) is elementary abelian.
We claim that G contains an element a such that
a is a 2-element;
a ∈ X;
a has order 2 modulo Z(G).
Indeed, since H is of class at most two, all elements in [H, g] are
commutators for any g ∈ H. If for some g ∈ H the subgroup [H, g] is
not contained in Z(G), any element of [H, g] that has order 2 modulo
Z(G) has the required properties. Therefore we assume that [H, g] is
contained in Z(G) for any g ∈ H. In particular H ′ ≤ Z(G). It follows
that [H, b] ∩ CG (b) ≤ Z(G) and all elements in [H, b] are commutators
modulo Z(G). If d ∈ [H, b] such that d 6∈ Z(G) and d2 ∈ Z(G), then
the commutator [d, b] is as required. This proves the existence of an
element a with the above properties.
Now we fix such an element a. Since G/Z(G) is nonabelian simple,
it follows from the Baer-Suzuki Theorem [2, Theorem 3.8.2] that there
exists an element t ∈ G such that the order of [a, t] is odd. On the one
4
RAIMUNDO BASTOS AND PAVEL SHUMYATSKY
hand, it is clear that a inverts [a, t]. On the other hand, by Lemma 3,
a must commute with [a, t]. This is a contradiction.
References
[1] B. Baumslag and J. Wiegold, A Sufficient Condition for Nilpotency in a Finite
Group, preprint available at arXiv:1411.2877v1 [math.GR].
[2] D. Gorenstein, Finite Groups, Chelsea Publishing Company, New York, 1980
[3] M. Kassabov and N. Nikolov, Words with few values in finite simple groups,
The Quarterly Journal of Mathematics, 64, 2013, 1161–1166.
Department of Mathematics, University of Brasilia, Brasilia-DF,
70910-900 Brazil
E-mail address: [email protected]
Department of Mathematics, University of Brasilia, Brasilia-DF,
70910-900 Brazil
E-mail address: [email protected]
| 4math.GR
|
CLAIRE: Combining Sets, Search and Rules
to Better Express Algorithms
Yves Caseau, François-Xavier Josset, François Laburthe
Bouygues SA – e-lab
1 avenue Eugène Freyssinet
78061 St-Quentin en Yvelines cedex, FRANCE
{ycs,fxjosset,flaburth}@challenger.bouygues.fr
Abstract. This paper presents a programming language that includes paradigms that are usually associated
with declarative languages, such as sets, rules and search, into an imperative (functional) language. Although
these paradigms are separately well-known and available under various programming environments, the
originality of the CLAIRE language comes from the tight integration, which yields interesting run-time
performances, and from the richness of this combination, which yields new ways to express complex algorithmic
patterns with few elegant lines. To achieve the opposite goals of a high abstraction level (conciseness and
readability) and run-time performance (CLAIRE is used as a C++ pre-processor), we have developed two kinds
of compiler technology. First, a pattern pre-processor handles iterations over both concrete and abstract sets
(data types and program fragments), in a completely user-extensible manner. Second, an inference compiler
transforms a set of logical rules into a set of functions (demons that are used through procedural attachment).
1. Introduction
The CLAIRE language [CL96a] is born from a research project that started 6 years ago which goal was to study
the relationship between combinatorial optimization and constraints. We decided to evaluate the competitive
advantages and reciprocal benefits of combinatorial optimization (CO) and constraint programming (CP)
techniques, and then to combine them into hybrid algorithms. We followed a systematic approach and looked at
problems such as Resource Allocation, Matching, Scheduling (job-shop, cumulative), Routing (TSP, VRP,
VRPTW) or Time-Tabling. Most real industrial optimization problems are a combination of these more classical
problems, thus another goal of this project was to identify a set of “building blocks” for optimization
applications. For each of these problems, we have produced a library of hybrid algorithms.
The combination of hybrid algorithms can only be made at the source level, using a “white box” approach. The
complexity and the inter-dependence between the various algorithms for propagation, computing lower bounds,
branching, etc. is such that an approach based on components (black boxes) does not seem realistic to us (today)
if one wants to take advantage of all the various techniques provided by the CO field. Thus, we have found the
need for a language to express our different algorithms that would be:
• simple and readable, for many reasons: because reuse of algorithms requires a readable expression of the
ideas, but also because CLAIRE was part of a research and teaching project and we needed an “executable
pseudo-code” to demonstrate algorithms;
• multi-paradigm (supporting logic, imperative and functional programming styles), with few simple and
well-understood concepts, such as objects, functions, rules and versioning for building search trees;
• compiled efficiently so that we could compare our algorithms with state-of-the-art approaches from teams in
the CO community who use C or FORTRAN as their implementation language. We decided to build
CLAIRE as a C++ preprocessor that would generate hand-quality C++ code (CLAIRE has also been ported
to Java).
The paper is organized as follows. The next section is a presentation of CLAIRE at a glance. CLAIRE is an
object-oriented functional language with parametric polymorphism. It is also a modeling language that uses
high-level abstractions such as sets or relations. Last, it includes an inference engine for object-based rules and a
few tools for building tree search algorithms. The third section presents the notion of “set programming” in
CLAIRE, which is derived from a set of techniques that make the use of sets as a programming paradigm both
natural and efficient. The fourth section shows how logical rules are compiled into functions. This is based on
previous work developed for the LAURE language [Cas94] (one of CLAIRE’s ancestors), so we focus on the
application of the technique to the CLAIRE logic and the impressive performance that we now obtain (since
CLAIRE functions are compiled into C++ code with virtually no overhead). The last section shows the
application of CLAIRE to writing optimization algorithms. We show how we can use the built-in features to
write tree search algorithms, and how the strategy of source-to-source optimization introduces new opportunities
for optimization through the notion of composition polymorphism.
1
2. CLAIRE at a Glance
We simply give an overview of the most salient features of the language. A complete description, including a
formal syntax for CLAIRE may be found in [CL96a].
2.1 A Simple Object-Oriented Data Model
We first briefly describe the CLAIRE object-oriented data model. Classes are defined with a list of typed slots,
and only single inheritance is supported. Each class is a first-class object of the system and is accessible at runtime (an optional list of instances is stored for each class). The <: operator is used to define a class (because
subclasses are subtypes in CLAIRE); it consists of appending a list of new slots to the slots of the parent class.
Slots support default values and unknown values, i.e., there is a special unknown object that represents the
absence of value. The following two examples illustrate class definition; the second one shows a parameterized
class (the usual Stack class, parameterized by the type of its elements).
Point <: object(x:integer = 0, y:integer = 0)
Stack<of> <: object(of:type, content:list = nil)
The second example is slightly surprising, compared to other approaches such as template classes, because it
implicitly rely on the fact that types are first-class objects (hence the type). Thus we attach to each stack the type
that must contain the objects that are pushed in the stack through the slot of. The responsibility of checking that
objects in the content of the stack belong to this type is left to the programmer. On the other hand, parameterized
signatures, as we shall see later, can express this dependency to support the strong typing of stack operations.
The CLAIRE data type complements the simplicity of the class hierarchy. A type is either a class, a constant set
of objects, the union or the intersection of two types, a parameterized class, an integer interval or a typed subset
of list, array or set. A parameterized class is the subset of the class such that the parameter belongs to a given
type. For instance, Stack[of:{integer,float}] is the set of stacks whose type parameter is integer or float.
A stack from this parameterized type will contains either integers (if its of parameter is integer) or floats, but
not both. A stack that contains either would be represented by the parameterized type Stack[of:(integer
∪ float)]
There are three kinds of primitive collections: arrays (constant length and ordered), lists (dynamic length,
ordered) and sets (dynamic length, no order and no duplicates). Primitive collection can either be typed, with a
read-only type attribute of, similar to the Stack example, or un-typed and immutable. This means that only
typed lists or sets support updates, which makes sense since we need a type to guarantee the type-safety of
updates. Immutable lists (or sets) receive a dynamic type when they are created.
Consequently, both list and set types come in two flavors: either strongly typed (list<t>, à la C++), or
supporting inclusion polymorphism (list[t]), i.e., list[t1] ≼ list[t2] ⇔ t1 ≼ t2. The type list<t>
contains typed lists l whose type parameter of(l) is precisely t. A list<t> object is a list that contains objects
that belong to t, including instances of subtypes of t.
On the other hand, the type list[t] contains both typed lists l whose type parameter of(l) is a subtype of t, as
well as immutable lists whose member belong to t. This applies equally to set<t> and set[t].
The distinction between these two kinds of list/set types is a key feature in CLAIRE. Since list<t> ≼ list[t],
we can write generic list methods, that apply both to mutable and dynamic, immutable lists. The type list[t]is
interesting because of inclusion polymorphism, and because read operations on lists of type list[t] can be
statically type-checked. On the other hand, list<t> is monomorphic (list<t1> ≼ list<t2> ⇒ t1 = t2), but
both read and write operations can be statically type-checked [Cas95]. Let us briefly illustrate this on an example.
Consider three classes A ≤ B ≤ C and the following methods:
foo(x:list[C], y:B) : void -> x[1] := y
bar(x:list<B>, y:B) : void -> x[1] := y
Although B is a subclass of C, the insertion in the foo method into the list x is not safe, since x may be a
list<A> object; on the other hand, baris safe but less flexible. Thus, the method foo relies on dynamic typing at
run-time to guarantee the safety of the update, whereas the method baris compiled more efficiently.
In addition, the tuple type is used for constant, heterogeneous, typed “array-like” (i.e., indexed) containers; for
instance, tuple(integer,integer,float) represents the set of tuples with exactly three elements: two integers
and a float. For example, tuples are used in CLAIRE to return multiple values from a function.
We can summarize the richness of type expressions with the following grammar (as usual, t[] is the type for
arrays of t (for instance, t = integer) and .. is used to define integer intervals):
2
<type> ::=
<class>
{<object> *}
(<type> ∪ <type>)
set〈<type>〉
set[<type>]
<type>[]
subtype[<type>]
|
|
|
|
|
|
<class>[<parameter>:<type> *]
(<integer> .. <integer>)
(<type> ∩ <type>)
list〈<type>〉
list[<type>]
tuple(<type> *)
|
|
|
|
|
|
Types are conceptually represented as expressions that denote sets of objects, and can be used everywhere in a
program since they are reified. Types as objects are themselves typed with the subtype[...] type; for example,
subtype[integer] contains all types that are included in integer. This set-oriented view is supported by the
fact that type subsumption is defined by the inclusion of the set extensions for all possible evolution of the
object database. Types form an inclusion lattice with syntactical greater lower bound and subsumption
(subtyping). The relationship between the type lattice and the powerset of the object domain is the basis for
using an abstract interpretation scheme [CP93].
CLAIRE inherits the SMALLTALK[GR83] strategy of considering everything as an object, from a class. This
implies that primitive types such as integer, floats, strings, Boolean are seen as primitive classes in CLAIRE.
2.2 Polymorphism and Advanced Typing
Methods in CLAIRE are simply overloaded functions, where each parameter contributes to the overloading (the
so-called multi-methods [CL94]) and each parameter can be typed with any CLAIRE type. For instance, attaching
a method to a class union is useful to palliate the absence of multiple inheritance. Suppose that a class A is a
natural candidate for multiple inheritance with parents B and C. If we chose B as the unique parent of A, we can
define the methods for C that we want to be inherited by A on the explicit union (A U C). This is not equivalent
because of the lack of extensibility (adding a new subclass to (A U C) is only possible through the addition of a
subclass to A or C). However, it is close enough for most practical cases.
Methods may be attached anywhere in the type lattice, not simply to the class hierarchy (more precisely,
anywhere in the lattice of type Cartesian products). This makes CLAIRE closer to a language like Haskell than
to C++. A method is called a restriction of the global function which itself is called a property.
It is important to notice that the class hierarchy is considered as a “law” given by the user (seen as set inclusion)
and is not based on type substitution. As a consequence, there are no constraints imposed on the user when
adding new methods. Covariance is enforced implicitly but not imposed explicitly (adding a new method on a
subdomain may augment the range of the function on a larger domain). If we define:
foo(x:integer) : (0 .. 5) -> ...
// ... stands for “some expression”
foo(x:(1 .. 10)) : (5 .. 10) -> ...
the range of foo on integer is actually the union (0 .. 10). The range in the first definition is taken as a type
restriction for this first definition, not for “foo on any integer” which is defined by the two restrictions.
Covariance comes as no surprise since we are using an overloading approach, where the property is the
“overloaded function” and the methods (i.e., the restrictions of the property for a given signature) are the
“ordinary functions” using Castagna’s terminology [Cas95].
The use of a type lattice does not prevent the occurrence of “inheritance conflicts” where two restrictions have
conflicting definition on overlapping signature. If one domain is included in the other it is assumed to take
precedence (such is the case for the foo example, so foo(3) uses the second definition). Otherwise, a warning is
issued. The lattice structure guarantees that it is possible to solve the inheritance conflict with a proper, more
specialized, definition, since the intersection of overlapping signatures can always be described with types.
Parameterized types can be used to produce parameterized signature. That means that we can use the value of a
parameter, when it is a type, inside the signature, as in the following example (for each operation op, x :op y
is syntactical sugar for x := (x op y)):
push(s:Stack<X>, y:X) : void -> s.content :add y
The use of the type variable X states that the second argument must belong to the type contained in the slot of
from the first argument (the stack). Note that there is an explicit difference between stack[of:{integer}] and
stack[of:subtype[integer]]. The first is the set of stacks with range parameter integer (exactly), whereas
the second can be thought of as the stacks of integers (stacks whose range parameter is a subtype of integer).
There is no parametric subtyping with the first (i.e. stack[of:{integer}] ≼ stack[of:{number}] is false) as
noticed in [DGL+95]. However, there is parametric subtyping with the second (i.e.
stack[of:subtype[integer]] ≼ stack[of:subtype[number]]). To alleviate notations, stack<integer> is
syntactical sugar for stack[of:{integer}]
3
Another important feature is the fact that CLAIRE supports higher-order functions. Properties, that are function
names, may be passed as arguments to a method and they can, in turn, be applied to functions. For instance, one
can write:
exp(f:property, x:any, n:integer) : integer
-> if (n = 0) f(x)
else f(exp(f, x, n - 1))
// exponentiation
This example will not be type-checked by the compiler and CLAIRE will rely on dynamic typing. On the other
hand, most methods are statically type-checked and the C++ code produced by the compiler is very close to
hand-written code (on classical benchmarks for procedural languages, using CLAIRE is similar to using C++, as
is shown in the appendix).
Last, second-order types can be attached to methods. A second-order type is a method annotation, defined by a
lambda abstraction, which represents the relationship between the type of the input arguments and the result.
More precisely, a second-order type is a function such that, if it is applied to any valid type tuple for the input
arguments, its result is a valid type for the result of the original function. Let us consider the two following
examples:
Identity(x:any) : type[x] -> x
top(s:Stack<x>) : type[x] -> last(s.content)
The first classical example states that Identity is its own second-order type. The second one asserts that the top
of a Stack always belong to the type of the Stack elements (of parameter). In the expression e that we introduce
with the type[e] construct, we can use the types of the input variables directly through the variables themselves,
we may also use the extra type variables that were introduced in a parameterized signature (as in the top
example) and we may use the basic CLAIRE operators on types such as ∪ (type union), ∩ (type intersection) and
some useful operations such as member. member is used in particular to describe the range of the enumeration
method set!. This method returns a set, whose members belong to the input class c by definition. Thus, we
know that they must belong to the type member(X) for any type X to which c belongs (If c is a type, member(c) is
the minimal type that contains all possible members of c). This translates into the following definition:
set!(c:class) : type[set[member(c)]] -> instances(c)
In the same way that overloading becomes more powerful with a richer type system, we have introduced tables
to represent binary relations. Tables extend traditional arrays by allowing the domain (and the range) to be any
type. When the domain is not an integer interval (the usual case for arrays) it is implemented through hashing.
The following examples illustrate CLAIRE tables:
square[x:(0 .. 20)] : integer := x * x
dist[x:(0 .. 10), y:(0 .. 10)] : float := 0.0
creator[c:class] : string := “who created that class”
color[s:{car, house, table}] : set<colors> := {}
married[t:tuple(person,person)] : tuple(date,place) U {nil} := nil
The combination of objects, relations (with explicit and implicit inverses), heterogeneous sets and lists makes
CLAIRE a good language for knowledge representation. For instance, entity-relationship modeling is
straightforward.
2.3 Set and Logic Programming
Sets play an important role in CLAIRE. We saw that each type represents a set and may be used as such. A set is
used through testing membership, iteration, or combining with another set and a set operation. Membership is
tested using the operation ∈ (the ASCII representation is ‘%’). Iteration is performed with the for x in S e(x)
control structure. We have also introduced two convenient expressions:
• exists(x in S | P(x)) returns true if there exists an x in S such that P(x) is true, and false otherwise
• some(x in S | P(x)) returns an x from S such that P(x) is true if one exists, and unknown else (as in
ALMA [AS97]).
For instance (refer to [CL96a] for further information), we may write:
x ∈ (string U list)
for y in (1 .. 10) U (20 .. 30)
(if exists(c in (1 .. 10) | ok?(c + y))
when x := some(t in TASK | completed?(t)) in
register(x)
else error(“no completed task was found”)
choose(y))
// t was found
4
Although primitive data types (such as string or list) may be considered as sets, they are seen as infinite sets,
thus trying to enumerate them will yield an error.
New sets can be formed through selection (e.g., {x in S | P(x)}) or set image (e.g., {f(x) | x in S})
[SDD+86]. When duplicates should not be removed, a list image can be formed with list{f(x) | x in S}.
Using a straightforward syntax leads to straightforward examples:
{x in Person | x.age > 18}
exists(p in {x.father | x in (man U woman)} | p.age < 20)
list{x.age | x in Person}
for x in {f(y) | y in (1 .. 10)}
print(x)
sum(list{y.salary | y in {y in Person | y.dept = sales}})
In addition to sets, CLAIRE uses a fragment of an object-oriented logic to support inference rules associated to
events, which will be presented in Section 4. This logic may be seen as an object-oriented extension of binary
DATALOG with object methods, set expressions and negation. The following expression is the logic part of a
CLAIRE rule:
edge(x,y) | exists(z, edge(x,z) & path(z,y))
=>
x.path :add y
The first extension is the introduction of interpreted functions, which are represented by object methods, with a
model similar to [KW89]. These methods are either comparison methods or binary operations. For computing
x.tax from x.salary, we may write:
exists(z, z = x.salary & z > 30000 & z < 50000 & y = 3000 + (z - 30000) * 0.28 )
=> x.tax := y
The second extension is the introduction of set expressions (à la LDL [NT89]). Here is a simple example that
uses a set expression to represent the set of children who are still minors:
z = 2 + size({y in Person | y ∈ x.children & y.age <= 18})
=> x.family_size := z
The last extension is the introduction of negation (using not(P(x,y))). Although this object-oriented logic
supports a top-down complete resolution strategy (with stratified negation), it is only used in CLAIRE to
provide forward-chaining inference rules. A rule is defined by linking a logical condition to a conclusion, which
is any CLAIRE expression. Here is a simple example:
compute_salary(x:Person[age:(18 .. 40)]) :: rule(
x.salary < average_salary({y in Person | x.dept = y.dept})
=> x.next_salary := x.salary * 1.1)
To complete this brief overview of CLAIRE, we need to mention the “versioning” mechanism. A version (also
called a world, using the AI terminology) is a virtual copy of the state of the objects. The goal is to be able to
return to a previously stored state if a hypothetical branch fails during problem solving. As a consequence,
worlds in CLAIRE are organized into a stack and only two operations are allowed: one for copying the current
state of the database and another for returning to the previous state. The part of the objects that supports these
defeasible updates is defined by the programmer and may include slots, tables, global variables or specific data
structures such as lists or arrays (defeasible is an AI term that means “backtrack-able”).
Each time we ask CLAIRE to create a new world, CLAIRE saves the status of defeasible slots (and tables,
variables, ...). Worlds are represented with numbers, and various operations are provided to query the current
world, create and return to previous worlds, with or without “forgetting” the most recent updates. The use of
worlds is also encapsulated with the branch(e) control structure which creates a world, evaluates the expression
e and returns true if the result of e is true, and otherwise backtracks to the previous world and returns false.
Using these programming features makes writing search algorithms, such as branch-and-bound, much simpler in
CLAIRE (or another language with search primitives such as ALMA [AS97]) than with traditional imperative
languages such as Java or C++. For instance, here is a simple program fragment that solves the “n queens”
problem:
D :: (1 .. SIZE)
column[n:D] : D := unknown
possible[x:D, y:D] : boolean := true
event(column)
store(column, possible)
r1(x:D, y:D) :: rule(exists(z:D, column[z] = y)
=>
possible[x,y] := false)
r2(x:D, y:D) :: rule(exists(z:D, column[z] + z = y + x)
=>
possible[x,y] := false)
r3(x:D, y:D) :: rule(exists(z:D, column[z] - z = y - x)
=>
possible[x,y] := false)
5
queens(n:(0 .. SIZE)) : boolean
-> (if (n = 0) true
else exists(p in D |
(possible[n,p] & branch( (column[n] := p, queens(n - 1)) )))
In this program, queens(n) returns true if it is possible to place n queens. The search tree (these embedded
choices) is represented by the stack of the recursive calls to the method queens. At each level of the tree, each
time a decision is made (an assignment to the column table), a new world is created so that we can backtrack
whether this hypothesis (this branch of the tree) leads to a failure.
3. Set-Based Programming
3.1 Sets in CLAIRE
We gave a brief overview of the use of sets in CLAIRE in the previous section. However, there is more to the
concept of “Set-Based Programming”. For us, it comes from the combination of two principles:
• Sets are "first-class citizens" with a choice of multiple representations (abstraction);
• Abstract sets may be used to capture "design patterns" (in the sense of the Object-Oriented Programming
community, that is, a motif that repeats itself in a program because it represents an abstract operation).
The first aspect in CLAIRE is illustrated by the variety of data structures that are available to represent
collections of objects. These include classes, arrays, lists, sorted collections or bit-vectors. Also, we already
mentioned that any type can be used as a collection, as illustrated in the following example:
for x in person[age:(15 .. 18)]
print(x)
Moreover, new collection classes can be introduced. In the following example, we introduce collections that are
implemented with a hash table (hashing an object to get an index in a list is a standard method).
Hset<of> <: collection(of:type, content:list, index:integer)
add(s:Hset<X>, y:X) : void
set!(s:Hset) : set
->
->
let i := hash(s.content, y) in ( ... )
{x in s.content | known?(x)}
In addition to concrete sets, CLAIRE supports set expressions, which can be used freely since they are built
lazily by the compiler so that any useless allocation and construction is avoided, as we shall see later. We
already mentioned set construction by image or selection. New set expressions can also be introduced through
the concept of pattern. A pattern is a function call that can be lazily dealt with. The first step is to define a new
set operator, such as:
but(x:collection,y:any) : set
->
// (x but y) ⇔ x \ {y}
{z in x | z != y}
Now we can treat the pattern (S but x) lazily without building a concrete data structure that would represent it.
The pattern type F[tuple(X,Y)] is the set of function calls with F as the selector (function) and two arguments
(stored in the args list) of respective types X and Y. For instance, we can declare how to compute membership on
the but pattern so that the compilation of the expression (x ∈ (Person but john)) will be performed by code
substitution into (x ∈ Person & x != john).
CLAIRE supports true abstraction for collections since one may substitute a representation by another and not
have to change a line of code in generic methods, such as the following example:
sum(s:subtype[integer]) : integer
=> let d := 0 in (for x in s
// sum is an inline method (=> is the syntactic marker for inline)
d :+ x, d)
On the other hand, re-compiling will be necessary since the efficient implementation of abstraction relies on
source-to-source transformation.
3.2 Customizable Iteration
One of the most important aspects of set programming from a practical perspective is the ability to customize set
iterations. Iteration plays an important role in CLAIRE, either in an explicit form (using the for control structure)
or in an implicit form (an iteration is implied in the image/selection set expressions as well as in the some/exists
structures) as shown in these examples:
{x in (1 .. 10) | f(x) > 0}
{size(c) | c in (class but class)}
// note: class is a class
For each of these iterations, the compiler uses source-to-source optimization and generates the equivalent, but
faster, expressions. The first one is compiled into:
let s := {}, x := 1 in
(while (x <= 10)
(if (f(x) > 0)
s :add x,
x :+ 1),
s)
6
Since the set of collection classes is extensible, the compiler supports the extension of the iteration mechanism
through the definition of the iterate method. For any expression e(v) that contains a variable v, iterate(x,v,e) is
an expression that produces e(v) to be evaluated for all values v in the set x. Here what we would write if x is a
Hset:
iterate(x:Hset, v:Variable, e:any) : any
=>
for v in x.content
(if known?(v)
e)
This is also true for patterns, thus we can explain how the iteration of a pattern should be compiled lazily
without building the set:
iterate(x:but[tuple(collection,any)],v:Variable,e:any) : any
=> for v in args(x)[1] (if (v != args(x)[2]) e)
This mechanism has also been used to implement the lazy iteration of image or selection sets. As a consequence,
an expression such as:
for x in {f(x,0) | x in (myHset but 12)}
print(x)
will be transformed into:
for x in myHset.content
(if (known?(x) & x != 12)
print(f(x,0))
As a consequence, it is both natural and efficient in CLAIRE to use “virtual” sets that are iterated as a
programming pattern. This yields programs that are easier to read since we separate the filtering of the data from
the processing. Note that the iterate optimizing pattern does not carry a type since the type of an iteration will be
determined dynamically after the substitution as occurred.
3.3 Sets and Design Patterns
This section illustrates the previous feature through two examples of using sets as a design and programming
pattern. The first example is the concept of embedded (doubly) linked lists. Linked lists are very common and
useful objects, since they provide insertion and deletion in constant time. The implementation provided by most
libraries is based on cells with pointers to next/previous cells in the list. This is useful but has the inconvenience
of requiring dynamic memory allocation. When performance is critical, most programmer use embedded linked
list, that are implemented by adding the two next/previous slots to the objects that must be chained. This only
works if few lists (e.g., one) need to be kept, since we need a pair of slots for each kind of list, but it has the
double advantage of fewer memory access (twice fewer) and no dynamic allocation as the list grows. For
instance, if we have objects representing tasks and if we need a list of tasks that have to be scheduled, we may
define the class Task as follows:
Task <: object( ..., next:Task, prev:Task, ...)
The obvious drawback is the loss of readability, since the concept of linked list is diluted into pointer chasing. In
CLAIRE, we can use a pattern to represent the concept of a linked chain using these two slots as follows. We
first define chain(x) which is the list of tasks obtained by following the next pointer:
chain(x:Task) : list<Task>
-> let l := list<Task>(x) in
(while known?(next, x)
// x is the first member
(x := x.next, l :add x), l)
Note that the list constructor carries the type of the new list when we used strongly typed lists.
list<integer>(1,2,3) is the list with 3 element (1,2 and 3) whose member type is integer.
We define the iteration of the chain pattern in a very similar way:
iterate(x:chain[tuple(Task)], v:Variable, e:any) : any
=> let v := args(x)[1] in
(while true (e,
// (a,..,c) is a sequence of exprs
if known?(next, v) v := v.next else break()))
We can now use the “abstract” chains as any other collection in CLAIRE:
sum({weight(x) | x in chain(t0)})
count(chain(t1))
The interest of this approach is to keep the benefit of abstraction at no cost (we do not see the pointer slots
anywhere and we can later replace embedded linked list with another representation). The code produced by the
optimizer is precisely the pointer-chasing loop that we would have written in the first place.
The second example shows the power of combining patterns with the concept of iterators. Iterators are a very
popular solution for iterating collection in most Java and C++ libraries. However, for most collection types they
induce a needless overhead (thus, we do not use them in CLAIRE). However, there are more complex data
structures for which iteration can be seen as traversing the structure, and for which the iterator embodies the
traversal strategy. An iterator is simply defined by two methods, start and next, which respectively provide the
7
entry point for the iteration and the succession relationship. The following is an example of a tree iterator. We
introduce a pattern (T by I) which produces the set of nodes in T using the traversing strategy of the iterator I:
Tree <: object(value:any, right:Tree, left:Tree)
TreeIterator <: object(tosee:list, status:boolean)
iterate(x:by[tuple(Tree,TreeIterator)], v:Variable, e:any) : any
=> let v := start(args(x)[2], args(x)[1]) in
while (v != unknown) (e, v := next(args(x)[2], args(x)[1]))
We can define many types of iterators corresponding to the various popular strategies for iterating a tree (DepthFirst Search, Breadth-First Search, etc.):
TreeIteratorDFS <: TreeIterator()
// Depth-First Search strategy
DFS :: TreeIteratorDFS()
start(x:TreeIteratorDFS, y:Tree) -> ...
next(x:TreeIteratorDFS, y:Tree) -> ...
We may then use the pattern (T
by I)
as any other collection and simply write:
sum({y.weight | y in (myTree by DFS)})
which associated optimized code is the following:
let d := 0, y := start(DFS, myTree) in
(while (y != unknown) (d :+ y.weight, v := next(DFS, myTree)), d)
The iterator object plays two roles: its type will determine which sort of tree traversal is required and it also
contains the state of the traversal (the tosee and status slots) that is exploited by the start and next method. Thus,
if the same iterator may be used on different trees, the simultaneous iteration of many trees will require many
iterators.
4. Rule-Based Programming
4.1 Claire Rules
4.1.1 A Logical Language for Assertions
A rule in CLAIRE is obtained by associating a logical condition to an expression. Each time the condition
becomes true for some objects, the expression will be evaluated for these objects (represented by the rule’s free
variables). A condition is defined with a logical language that includes predicate logic to describe the state of
one or many objects and event logic to capture the occurrence of a precise event.
To define a logical condition, we use the logic language defined by the following grammar.
<assertion> ≡ <expression> <comp> <expression>
<variable> :: <class>
|
<value> := < <expression> | (<expression> <- <variable>) >
|
exists(<variable>, <assertion>)
|
|
not(<assertion>)
|
if (<expression> <comp> <expression>) <assertion> else <assertion>
<assertion> & <assertion>
<expression>
≡
<variable>
|
<entity>
|
|
|
<assertion> | <assertion>
<function>(<expression>)
<expression> <operation> <expression>
|
{<var> in <expression> | <assertion>}
|
|
list{<var> in <expression> | <assertion>}
≡
<value>
<rule>
≡
<table>[<expression>]
|
<expression>.<property>
<name>(〈<variable>:<type>〉+) :: rule(<assertion> => <statement>)
The value of a logical expression is a CLAIRE entity. Logical assertions are made by combining expressions. The
most common type of assertion is obtained by comparing two expressions with a comparison operation. A
comparison operation is an operation that returns a Boolean value.
The novelty in CLAIRE 3.0 is the introduction of event logic. There are two events that can be matched
precisely: the update of a slot or a table, and the instantiation of a class. The expression x.r := y is an event
expression that says both that x.r = y and that the last event is actually the update of x.r from a previous value.
Thus, the introduction of event expressions serves two purposes:
8
•
control the triggering of a rule more precisely by telling which event should be considered. Consider the
following example:
x.age = y
&
z.age = 2 * y
This logical expression may become true (and trigger an associated rule) from an update of the age slot in
two manners, either because x.age has changed or because z.age has changed. In most cases, this behavior
is precisely what is expected. In contrast, the following expression :
x.age := y & z.age = 2 * y
•
adds to the previous expression the explicit constraint that the triggering update is applied to the object x.
use the “previous value” of the updated expression x.r in the logic expression. This is achieved with the
expression x.r := (y <- z) which says that the last event is the update of x.r from z to y. For instance,
here is the event expression that states that x.salary crossed the 100000 limit:
x.salary := (z <- y) & y < 100000 & z >= 100000
The other event that can be described with the event logic is the instantiation of a class. The expression x :: C
means that x is a new instance of the class C. As previously, the event expression is the combination of the
statement x ∈ C and the additional constraint that the last event is precisely the creation of the new instance x of
the class C. We use object instantiation to represent external events when writing an application that must be
integrated with other components using a publish & subscribe event model, such as the Java Bean model
[Eng97].
The value of a logical assertion is always a Boolean, thus logical assertions can be combined with & (and) and |
(or). In addition to pre-defined operations such as <= or +, it is possible to use new properties inside logical
assertions but they need to be described using the description table and a set of keywords including comparison,
binary_operation, monoid, group_operation. By declaring the algebraic characterization of a property we are
telling the rewriting system that produces the algebraic representation how to handle the logic expression.
To define a rule, we define a list of free – universally quantified – variables, that are introduced as parameters of
the rule, a condition, which is given as an assertion using the previously defined variables and a conclusion that
is preceded by =>. Here is a classical transitive closure example:
r1(x:Person, y:Person) :: rule(
exists(z, x ∈ z.friends & z ∈ y.friends)
=> y.friends :add x )
4.1.2 Event-Based Rules
Rules are checked (efficiently as we shall later see) each time that an event occurs. Events come in two kinds.
The first kinds of events are updates to slots or tables that are declared as event generating with the event
statement.
<events definition>
≡
*
< event | noevent >( < <table> | <property> > )
The second kinds are instantiations of classes. These include the instantiation of “event objects” classes that
represent “external events” used in a larger-scale application, but also the instantiation of local classes. Note that
the “instantiation event” occurs after the initialization of the object (with default or given values for the slots).
A rule considers as events all slots or tables that have been declared as such before the rule has been declared, so
the event declaration needs to precede the rule declaration, in order to create the “demons” that will watch over
the given relation and fire the rule when needed. The declaration noevent(...) may be used to prevent
explicitly a rule to react to some relations that were declared previously as events for other rules. By spreading
the event declarations (and occasionally noevent declarations) before and between the rules, one has a precise
control over the triggering of the rules. This level of control is further refined with the use of event expressions
within the condition of the rule.
Updates that are considered as events are:
• x.r := y, where r is a slot of x and event(r) has been declared.
• a[x] := y, where a is a table and event(a) has been declared.
• x.r :add y, where r is a multi-valued slot of x (with range bag) and event(r) has been declared.
• a[x] :add y, where a is a multi-valued table and event(a) has been declared.
• The instantiation of a class C, whether static (x :: C(…)) or dynamic (new(C,…)).
The handling of mono- vs. multi- valuation is an important aspect of this logic. Multi-valued slots in CLAIRE
are slots that contains multiple values (i.e., friends is multi-valued since I may have many friends). A multivalued slot is implemented using a container (a list or a set), however, from a semantic point of view, we are
only interested with the multi-valued binary relationship between a person and her friends. Operations on a
multi-valued slots are the addition or the deletion of a new member, whereas a mono-valued slots only supports
9
the update the value (replacing a value by another one). Thus, CLAIRE makes a difference between a multivalued slot (for instance, a slot friends with range set<person>) and a mono-valued slot with range set (we
can use the same example). The management of inverses is different: in the first case, the inverse of friends is a
relation from Person to Person; in the second case, it is a relation from set<Person> to Person. Similarly, the
atomic events are different: in the first case it is the addition of a new friend; in the second case, it is the
replacement of a set of friend by another set. It is our experience that both modeling options are needed to
capture a large set of situations.
4.1.3 Examples
The following first example is taken from our cumulative scheduling program presented in [CL96b]. Cumulative
scheduling is a special planning problem where some tasks have to be scheduled on resources. A resource may
handle several tasks at the same time, but is limited by a finite capacity (capacity). The problem is to perform
all tasks such that the total completion time is minimal. The amount by which a task “consumes” a resource must
fit between two bounds (minUse/maxUse).
The rule eject-up (see below) involves two data structures: Task and Interval. For each Task t, we store (in
slots) the required resource t.res, time bounds t.earliestStart and t.latestEnd, the associated work t.work,
and its extremal resource use levels minUse/maxUse. For each Interval S, we store its bounds (Left/Right), the
common resource of all tasks in the interval (Res), and the sum of the work amount of tasks (Work) in the
Interval.
The rule considers a task t and an interval S. Let A be the earliest start time of the lower bound of S, B the latest
end time of the upper bound of S, and a the earliest start time of t. Whenever t and S are such that:
• they share some common resource r that is actually cumulative (i.e. r.capacity > 1),
• S is not an empty Interval, but t is not included in S,
• t cannot start before A and end before B ((t.work – max(0,A - a)) * t.maxUse > slack), because there
is not enough slack, even with the maximal consumption level for t, in order to perform as much as possible
of t before A.
• t cannot start before A and end after B ((B - A) * t.minUse > slack) because there is not enough slack,
even with the minimal consumption level for t.
In such a case, the rule deduces that t necessarily starts after A, and analyses the amount of t that can be
performed before B in order to update the time bounds of t. We use two update methods
increaseEarliestStart and increaseLatestStart in order to maintain the Interval structure.
[eject-up(t:task, S:Interval) ::
exists(r:resource, S.Res = r & t.res = r & r.capacity > 1 &
not(empty(S)) & not(contains(S,t)) &
exists(a, a = t.earliestStart &
exists(A, A = S.Left.earliestStart &
exists(B, B = S.Right.latestEnd &
exists(slack, slack = (B - A) * r.capacity – S.Work &
(t.work – max(0,A - a)) * t.maxUse > slack &
(B - A) * t.minUse > slack )))))
=> increaseEarliestStart(t, B - (slack div+ t.minUse)),
increaseLatestEnd(t, B - (slack div+ t.maxUse) + t.minDuration) ]
This rule is triggered whenever a time bound earliestStart/latestEnd or the contains relation is modified.
There are multiple propagation patterns and writing the equivalent procedural code is really a tedious and errorprone task.
We will now present a few examples that rely on the event-based logic that we have introduced. First, here are
three (simplified) examples taken from the field of constraint propagation. The first one tells that if two tasks are
consecutive (attached means without idle time in between), we can propagate the increase in minStart (earliest
starting time) directly. The second tells how to propagate a duration increase.
R1(x:task, y:task, z:integer, u:integer) :: rule(
x.attached = y & x.minstart := (z <- u) =>
y.minstart :+ (z – u) )
R2(x:task, I:taskInterval, z:integer, u:integer) :: rule(
x.minStart >= I.minstart & x.maxEnd <= I.maxEnd & x.duration := (z <- u)
=> I.duration :+ (z – u) )
R3(x:task, I:taskInterval, z:integer, u:integer) :: rule(
x.minStart := (z <- u) & z >= I.minstart & u < I.minStart & x.maxEnd <= I.maxEnd
=> I.duration :+ x.duration )
10
The first two rules are similar and illustrate the use of the event pattern to capture a transition and propagate an
incremental change. The second rule also shows that the event pattern forces the rule to trigger when a change is
made on the duration attribute, which is what we intend here, since a different rule (R3) handles the case when a
change is made on the minStart attribute. In R3, the event pattern is used to capture the state transition (x now
belongs to the task interval and did not before).
The next two examples illustrate the use of event-rules to model state-transition systems. They are taken from an
“artificial life” scenario where units move from cell to cell. The first rule says that if a unit moves to a position
where another unit is already installed, a conflict occurs which will result into a failure of the incoming unit if its
strength is less than the strength of the residing unit. The second re-computes the visibility graph for a unit that
gets “out-of-the-woods”.
RS1(x:unit, y:unit) :: rule(
x.location := y.location & x.strength <= y.strength
=>
failure(x))
RS2(x:unit, z:position, u:position) :: rule(
x.location := (z <- u) & u.forest? = true & z.forest? = false
=> computeVisibility(x) )
The use of event logic enables us to represent the dissymmetry between x and y in the first rule, which would not
be possible with sole predicate logic. The second rule is another example of using the event pattern to capture a
state transition (from being in-the-woods to out-of-the-woods). The use of “?” after forest has no special
meaning in CLAIRE, it is a common practice to add “?” to names of slots or methods that represent a Boolean.
4.2 Algebraic Representation of Rules
4.2.1 Principles of Algebraic Rules
CLAIRE rules are compiled into procedural demons in three phases (cf. Figure 1). First, the condition part of the
rule is rewritten into an algebraic expression, which is next differentiated into many functions that are finally
transformed into if-write demons. The process of rule compilation relies on the use of a relational algebra. This
algebra A(R) contains relational terms (elements of R) that represent binary relations; it is generated from a set
of constants (Cartesian products of types), of variables (CLAIRE slots and tables) and a set of operators (similar
to [McL81]). These operators can define unions, intersections and compositions over relational terms, but also
more advanced algebraic functions such as the composition of a binary operation or a comparison operation with
two binary relations, as we shall see in the next section.
Logical
Rules
Rewriting
Algebraic
Rules
Differentiation
if-write
Demons
Propagation
Formulae
Compiling
Figure 1. Compilation scheme of CLAIRE rules.
We will briefly describe each step of the compilation process, and follow the transformation of a rule, from its
logical expression towards the generated procedural demons. Here, we use the closure rule, which performs a
transitive closure over a graph, described through the binary relations edge and path:
closure(x:point, y:point) :: rule(
edge(x,y) | exists(z, edge(x,z) & path(z,y))
•
=>
x.path :add y )
The first phase of the compilation process is the transformation of the conditional part of the rule into a
relational formula that belongs to A(R). Translation into the algebraic form is based on rewriting and
involves a lot of knowledge about object methods. The principle is to solve the equation assertion(x,y),
while considering that x is known and that y is sought. The result is the relational algorithm that explains
how to get y from x, which is represented as a term in A(R). The conditional part or the rule closure is
transformed into the following algebraic term t1:
t1 = edge ∪ (path ο edge)
where ∪ and ο are respectively the union operator and the composition.
11
•
Next, a phase of symbolic differentiation [SZ88] computes the effect of adding a pair of values into a table
or a slot. The differentiation is a function that is applied to the algebraic term t, with respect to each relation
R occurring in the condition, and that produces a term ∂t/∂R in A(R∪{ , }). and are two constant
functions that represent respectively the empty function ( : (x,y) → ∅) and the identity function ( : (x,y)
→ {(x,y)}). A set of differentiation rules (one for each operation on binary relations) is used to compute the
term ∂t/∂R. The term t1 computed above is differentiated with respect to the relation edge and yields the
following function f1:
f1 =
∂t1/∂edge
=
∪ (path ο
)
or in other terms:
f1 : (a,b)
→ {(a,b)} ∪ {(a,y) | (b,y) ∈ [path]}
•
The last phase of the compilation of a rule consists of associating the set of functions (derived from each
relational term occurring in the condition) and the CLAIRE expression in the conclusion, so as to build one
if-write demon per function. The demon is used to propagate each update so that rules are triggered in an
incremental manner, yielding an approach similar to [SKG87].
We now examine these different phases with more details in the following sections.
4.2.2 A Relational Algebra
The relational algebra contains terms that represent binary relations. It is generated from a set of constants
(cartesian products of types), a set of variables (the relations that are described with rules) and a set of relational
operators. This set may be described as follows :
• ∪, ∩ , o are the usual operators for union, intersection and composition (binary join).
• ψ[+](r1, r2) represents the composition of a binary operation (+) with two binary relations r1 and r2.
• φ[<](r1,r2) is the composition of a comparison operation (<) with two binary relations r1 and r2.
• if[φ[<](r1,r2)](r3,r4) is the conditional composition of a test ( φ[<](r1,r2) ) with two binary relations r3 and r4
which represent the two branches of the conditional (r3 if the test succeeds and r4 otherwise).
• {z:r1, r2} represents a relation that associates to an object the set of objects z bound through r1 which also
“satisfy” r2 (hence, r2 is a filtering relation - a φ or a composition of φ’s). This operator is introduced to
handle set creation in logical formulae.
• Set_expansion(r), written r*, is the reciprocal operator which is used to treat a relation r with range set as a
multi-valued relation.
Here is the formal definition of the relational operators:
(x,y) ∈ r1 ∪ r2 ⇔ (x,y) ∈ r1 ∨ (x,y) ∈ r2
(x,y) ∈ r1 ∩ r2 ⇔ (x,y) ∈ r1 ∧ (x,y) ∈ r2
(x,y) ∈ r1 o r2 ⇔ ∃ z, (x,z) ∈ r2 ∧ (z,y) ∈ r1
(x,y) ∈ ψ[+](r1, r2) ⇔ ∃ z1, z2, (x,z1)∈ r1 , (x,z2)∈ r2 ∧ y = z1 + z2
(x,y) ∈ φ[<](r1, r2) ⇔ x = y ∧ ∃ z1, z2, (x,z1)∈ r1, (x,z2)∈ r2 ∧ z1 < z2
(x,y) ∈ if[φ[<](r1,r2)](r3,r4) ⇔
{(x,y) ∈ r3 ∧ ∃ z1, z2, (x,z1)∈ r1, (x,z2)∈ r2 ∧ z1 < z2 } ∨
{(x,y) ∈ r4 ∧ ∃ z1, z2, (x,z1)∈ r1, (x,z2)∈ r2 ∧ ¬(z1 < z2 )}
(x,y) ∈ {z:r1 , r2} ⇔ y = {z | (x,z) ∈ r1 ∧ (z,z)∈ r2}
(x,y) ∈ r* ⇔ ∃ z, (x,z) ∈ r ∧ y ∈ z
To achieve the same expressive power as the logical fragment that we use to define conditions on objects, we
need to introduce the ability to share a sub-term, which will correspond to the introduction of existential
variables. Let us now define A(R) the term algebra generated by the previous set of operators, the constant
cartesian products of types (such as person × {0,1,2}) and the set R of relational variables (that represent
relations from CLAIRE, which are tables or properties). We extend our definition as follows:
• If x is a relation variable that does not belong to R, if t2(R1,...,Rn,x) is a term from A(R ∪ {x}) and
t1(R1,..,Rm) is a term from A(R), then λ(x:t1).t2 is a term from A(R) which represent the relation denoted by
t2 in an new “object system” where x is bound to the relation denoted by t1.
Notice that an “object system” is simply defined by the valuation function q that associates to each relation name
in R the actual binary relation in the current system. We write [t ]q the binary relation denoted by the term t for a
given valuation q. A key result in [Cas94] is that the logic fragment that we use and the relational algebra A(R)
have the same expressive power. This means that for any condition C with at most two free variables x and y
there exists a term t of the algebra such that C(x,y) ⇔ (x,y) ∈ [t ]q . The term is not necessarily unique and the
difficulty is to produce an “optimized” term, which represents the straightest relational computation that is
necessary to produce the set of y starting from the value of x.
12
The transformation of a logic rule into its algebraic representation is based on rewriting, as explained in [Cas94].
This is achieved with rewriting rules that incorporate the algebraic knowledge about objects’methods such as:
group(+,0,-) & x + y = z ⇒ x = z - y
monoid(*,|,/) & x * y = z ⇒ (y | z) & (x = z / y )
The first rule states that if we have a Group (+,0,-) the equation x + y = z can be rewritten into x = z – y where –
is the inverse operation of + (thus, this applies to matrices as well as integers). The second rule states how to
rewrite the same equation for a weaker structure: here * has no complete inverse operation but a partial one, /,
associated by an inversibility relation – divisibility.
In the previous years, we have added the concept of simplification rules, which implement optimizing strategies
(replacing an algebraic term by another one with the same denotation but which is more efficient to compute) in
a manner similar to the optimization of SQL queries. The rules are applied recursively while algebraic terms are
being built. They are mostly based on three ideas:
(1) filtering terms should be ordered from simpler to more complex, and applied as soon as possible from an
evaluation order point of view,
(2) constants sub-terms must be recognized, simplified, and re-organized. For instance, linear sub-term
factorization (2 * x + 3 * x ⇒ 5 * x) is applied through this simplification step.
(3) inversible sub-terms must be detected because they can be used (in their inverse form) to avoid costly
joins.
The motivation for this translation is that we are able to represent propagation as a formal computation over
algebraic terms, called differentiation. Suppose that t is a term for A(R), Ri a relation variable from R and q a
valuation function representing the current object system. We now consider an atomic update, that is the
addition of a pair (x,y) to the relation q(Ri). The term t now represents a new relation in the new object system q’.
The goal of differentiation is to compute [t]q' - [t]q , that is the set of object pairs that “appeared” in the relation
represented by t “because” of the update (since we use a monotonic algebra, we have [t]q' ⊃ [t]q ).
Let us define the functional algebra F(R) as A(R ∪ {
}), where each relation of R is mapped to a constant
function. We use two constants
that represent respectively the “empty function”
((x,y) → ∅ ) and the unit function ((x,y) → {(x,y)}). To represent the propagation of an update in a set-valued
expression, we also need to extend F(R) with a new projection operation π(t) defined as follows.
(x,y) ∈ [π(t)(a,b)]q ⇔ x = y ∧ ∃ z, (x,z) ∈ [t(a,b)]q
Thus, π(t) is a the first projection of the relation represented by t.
Differentiation is a formal operation on A(R) which associates to a pair (t,Ri) ∈ A(R) × R a term ∂t/∂Ri from
another functional algebra F(R) (which represents a function that associates a binary relation to an object pair)
such that :
[t]q' - [t]q ⊆ [∂t/∂Ri(a,b)]q' ⊆ [t]q'
(1)
To guarantee the interest of differentiation we also impose that ∂t/∂Ri(a,b) is the smallest term from F(R) which
satisfies (1) according to the partial order induced by inclusion. However, (1) is a necessary and sufficient
condition to prove the validity of using differentiation to model propagation.
4.2.3 Extending the Algebra to Handle Event-based Logic
The algebra is extended with two operators:
• χ(R) is an “event-filter” : it represents the same relation as R, but it will behave differently when the term is
differentiated.
• R’ represents the “previous” version of the relation R before an atomic update. It cannot be used freely in
the relational algebra, which would require a much more complex implementation, but only in the following
pattern:
λ(z:R’).t{χ(R)}
where t{χ(R)} is a term which contains χ(R) as a sub-term.
The differentiation rules are straightforward:
∂χ(R) /∂R =
, ∂χ(R’) /∂R =
∂χ(λ(z:R’).t{χ(R)}) /∂R = λ(z:R’). ∂t /∂R
The compilation rules (cf. [Cas94]) are two methods, expR and expF, that represent the semantic of the operators
through code generation. Both are defined by structural induction for each operator.
• expR(t,x,y,e(y) ) is a code fragment that applies the expression e(y) to each object y that is linked to x
according to the binary relation represented by the term t. Here is a simple example for a binary composition:
expR(t1 o t2, x, y, e(y)) = expR(t2, x, z, expR(t1,z,y,e(y)))
13
•
expF(∂t/∂R,x,y,u,v,e(u,v) ) is a code fragment that applies the expression e(u,v) for each pair (u,v) that
belongs to the relation which is the value of [∂t/∂R](a,b), where we recall that ∂t/∂R is a term of a
functional algebra that represent a function that associates a binary relation to each pair of objects. Here is
another example for compiling the composition of a derivative and a relation:
expF(∂t/∂R o t ,x,y,u,v,e(u,v) ) = expR(∂t/∂R ,x,y,a,v, expR((t)-1, a,u,e(u,v))
This last example shows that although differentiation rules are simple and intuitive, their actual implementation
through code generation may be more subtle. The ability to inverse any term from the algebra is not easy to
reach, although many terms may be inversed through recursive formulas. For the few but annoying exceptions,
we actually revert to the logical expression and re-apply a translation step (rewriting) while changing the
variable ordering (each translation step takes one free variable as the “base” and the other one as the target). To
achieve this, we need to ensure that for each composition sub-term (r1 o r2), the second relation r2 is always
applied to this “base” variable. We use the associativity of binary join to generate terms like (r1 o (r2 o r3)) as
opposed to ((r1 o r2) o r3).
Similarly, the rule for differentiating a “lambda-term” ((λz.R).t) (i.e., the binding of a sub-term t to a variable z)
looks simple:
∂(λ(z:t1).t2)/∂R = λ(z:∂t1/∂R).t2 ∪ λ(z:t1).∂t2/∂R
However, the actual evaluation of the second part λ(z:t1).∂t2/∂R is subtle, since we need to know the value of this
base variable before being able to apply the sub-term t1 to find z (and compute the whole expression). This
requires a recursive traversal of the derived term to find out exactly when the base variable can be computed.
These compilation methods, expR and expF, are extended to the new operators as follows:
expR(χ(R), x, y, e(y)) = nil
expF(λ(z:[R]).(∂t/∂R), x,y,u,v,e(u,v) )) =
let z = LAST in expF(∂t/∂R, x,y,u,v,e(u,v) )
The first formula tells that χ(R) will be ignored in a rule if it is not differentiated precisely according to R. Thus
it acts as a filter. The second formula shows that we make a direct reference to the previous value LAST of the
attribute that is being updated. This value is stored when we perform the update as we shall later see.
The following is the set of derivation rules for this new logic.
∀ (i,j), ∂Rj/∂Ri = if i = j and otherwise.
-1
-1
if i = j and otherwise.
∀ (i,j), ∂Rj /∂Ri =
∀ p ∈ P, ∂p/∂Ri = .
If S1 and S2 are two types, ∂(S1 × S2)/∂R =
∀ t1, t2 ∈ A(R), ∂(t1 o t2)/∂Ri = (∂t1/∂Ri o t2) ∪ (t1 o ∂t2/∂Ri)
∀ t1, t2 ∈ A(R),∂(t1 ∩ t2)/∂Ri = (∂t1/∂Ri ∩ t2) ∪ (t1 ∩ ∂t2/∂Ri)
∀ t1, t2 ∈ A(R),∂(t1 ∪ t2)/∂Ri = (∂t1/∂Ri ∪ ∂t2/∂Ri )
∀ t1, t2 ∈ A(R), ∀ ƒ ∈ Fo , ∂ψ[ƒ](t1, t2)/∂Ri = ψ[ƒ](∂t1/∂Ri,t2) ∪ ψ[ƒ](t1,∂t2/∂Ri)
∀ t1, t2 ∈ A(R),∀ θ ∈ Fc, ∂φ[θ](t1, t2)/∂Ri = φ[θ](∂t1/∂Ri,t2) ∪ φ[θ](t1,∂t2/∂Ri)
∀ t1, t2 ∈ A(R), ∀ z ∈ V, ∂(λ(z:t1).t2)/∂Ri = λ(z:∂t1/∂Ri).t2 ∪ λ(z:t1).∂t2/∂Ri
∀ t1,t2,tφ ∈ A(R) | tφ=φ[θ](…)),
∂if[tφ](t1,t2) = if[∂tφ/∂Ri](t1,t2) ∪ (∂t1/∂Ri o tφ) ∪ (∂t2/∂Ri o ¬ tφ)
∀ t ∈ A(R), ∂{z:t1, t2}/∂Ri = {z:t1, t2} o π (∂t1/∂Ri ∪ ∂t2/∂Ri)
∀ j, ∂ (Rj*)/∂Ri = (Rj*) o π (∂Rj/∂Ri )
∀ r ∈ R, ∂¬r/∂r = .
∀ (i,j), ∂χ(Rj)/∂Ri = ∂Rj/∂Ri
∀ t ∈ A(R), ∂(λ(z.[R]) t) /∂R = λ(z.[R]) (∂t /∂R)
Figure 2: Differentiation rules.
These rules completely specify differentiation as a formal computation. The analogy with rules for numerical
differential calculus is no coincidence and can be proven using a matrix model for binary relations [Cas94].
14
4.2.4 Examples
For each rule given in Section 4.1.3, we give the equivalent algebraic term t and its derivation ∂t/∂R according to
the appropriate relation. Since these rules use an event pattern to capture one precise pattern, there is only one
relation R such that the derivative ∂t/∂R is not empty.
R1 [t1]:
λ(u:minstart’).λ(z:χ(minstart)).attached
R2 [t2]:
λ(I:task x taskInterval).λ(z:duration).(χ(duration) o
φ[>=](minStart, minStart o I) o φ[<=](maxEnd, maxEnd o I))
R3 [t3]: λ(I:task x taskInterval).(
φ[<=](maxEnd, maxEnd o I) o λ(u:minstart’).
(φ[<](u, minStart o I)) o φ[>=](χ(minstart), minStart o I)))
RS1 [t4]: λ(y:(location–1 o χ(location))). y o φ[>=](strength o y, strength)
RS2 [t5]: λ(u:location’).( φ[=](forest? o u, false) o φ[=](forest? o χ(location), true)
It is easy, although tedious, to verify that these algebraic terms represent indeed the conditions that define rules.
For instance, λ(y:(location–1 o χ(location))). φ[>=](strength o y, strength) (x,z) Ù ∃ w, location(y) = w ∧
location(x) := w ∧ strength(y) >= strength(x). We then apply differentiation with respect to all relations that are
involved in the rules/
Here are some of the derived terms:
∂t1/∂minStart =
∂t2/∂minStart =
∂t4/∂location =
∂t5/∂location =
λ(u:minstart’).((λz. ) attached–1 )
λ(I:task x taskInterval).λ(z:duration’).
(
o φ[>=](minStart, minStart o I) o φ[<=](maxEnd, maxEnd o I))
λ(y:(location–1 o )). φ[>=](strength o y, strength)
λ(u:location’).( φ[=](forest? o u, false) o φ[=](forest?
o
, true)
Each derived term represents a function, which meaning is obtained from the semantic of the functional algebra.
For instance, the first term is a function that takes a pair of objects (a,b), binds z to the value b (from the update
a.minstart := b), binds u to the previous value of a.minstart, and computes the set of objects that are attached to
a. The use of this function will become more evident in the next section, where we generate a demon that
applied the conclusion of the rule to all pairs (a,y) produced by this derived term.
4.3 Code Generation
4.3.1 Generating Demons from Rules
When the compiler is applied to a set of rules, all rules are translated into an algebraic representation and all
derivatives are computed. An algebraic rule is represented as (t => e), where t is the term from the relational
algebra that is equivalent to the logical condition of the rule and e is the “conclusion” of the rule (the action part).
A code fragment is then produced for each rule (t => e) and each derivative ∂t/∂R by applying the exp2 method
as follows:
expF(∂T/∂R,x,y,u,v,e)
The result is a fragment of CLAIRE code that applies the conclusion of the rule to all pairs (u,v) of objects that
satisfies the condition of the rule because of the event “x.R := y”.
These fragments are combined, for each relation R, into a if-write demon that will be used to change the value of
x.R, or R[x] if R is a table (in CLAIRE, tables and slots are abstracted into a binary relations and can be used
indifferently in the logic language). The demon generated for R is based on the following pattern:
if_write[R](x, y)
-> let LAST := get(R,x) in
(if (LAST != y)
(x.R := y,
…
if (x.R = y) …
if (x.R = y) …
…))
// the previous value is stored
// checks that this is indeed an update
// performs the update
st
// propagation fragment from 1 rule
nd
// propagation fragment from 2 rule
rd
// propagation fragment from 3 rule
Note that the propagation fragment obtained from the rules other than the first one are guarded with a test
(x.R = y) to make sure that the rules are only applied if the update is still valid.
CLAIRE makes a difference between mono- and multi-valued relations. For multi-valued relations, the event
model is simpler since the only event that is detected is the addition of a new member in one object’s set of
values. Thus the generation of the demon is slightly simpler in the multi-valued case.
15
For instance, the last phase of the compilation of the closure rule, which we gave as an example in the previous
section, consists of associating the set of functions (derived from each relational term occurring in the condition)
and the CLAIRE expression in the conclusion, so as to build one if-write demon per function. For instance, the
demon associated to the rule closure and the relation edge is compiled as follows (it is evaluated each time a
pair (x,y) is added to the edge relation):
if_write[edge](x, y)
-> if (x.edge add? y)
(x.path :add y,
for z in y.path
// tests if y is not already here
x.path :add z)
The handling of instantiation is straightforward since each instance is attached to its class through an inversible
relationship (isa/instances). Therefore the representation of the event
x :: C
is made with the term χ(minstart). On the other hand, generating a large collection of if-write demons for this
“isa” relation would slow instantiation down for every class; thus, we associated directly the if-write demon
with the class C (this is why C must be a constant in the expression x :: C).
4.3.2 Code Generation Techniques
The code generation phase is mostly the application of the expR and expF methods, which embodies the
application of various optimisation schemes, such as the generation of simpler and faster code if a sub-term
represents a mono-valued relation. Moreover, there are two other techniques that are used to produce procedural
code, which is as close as possible to what the user would write herself to propagate the rules. The first
technique is the use of precise type inference and the second one is the use of modes to distinguish between
different semantics for applying the rules’ conclusions.
Type Inference within the rule compiler is defined by associating a second-order type to each subterm, either
from the relational algebra or the derived functional algebra. These second-order types are functions that infer an
output type from any input type or reciprocally. For instance, if y is bound to x through the relation represented
by t, this function will return the type of y depending on the type of x. The case of a derivative term is slightly
more complex since there are two input type parameters, namely the type of x and y where the update is
“x.R := y”. These functions are obtained in a straightforward manner through the abstract interpretation of the
relational operators on the CLAIRE type domain, which is an inclusion lattice [CC77]. This precise type
inference is key to producing efficient code, and it is more powerful than the type inference performed by
CLAIRE on the fragments generated by the rule compiler.
CLAIRE supports some additional tuning of its rules through the mode declaration. These modes are defined as
follows, and enable the user to remedy some of the problems that occur with non-monotonic and noncommutative rules.
<modes> ≡ mode(
default | once | set |
<integer> )
Rules should not, in general, be written in such a way that the result is order-dependent. The order in which they
are triggered depends on the events (the propagation pattern) and the order in which the rules were entered. If it
becomes necessary to have a more precise control over this order, priorities may be used. A priority is an integer
attached to the rule using the mode declaration. CLAIRE will ensure that rules with higher priority will be
triggered first for each new event. Notice that there is no implicit stack structure for triggering rules: the events
generated by the application of a first rule may cause a new rule to be evaluated before a second rule is applied
to the original event.
The conclusion is applied to any pair of objects that is obtained through a logical derivation of the conclusion
and the update. This assumes that the conclusion can be fired more than once when the logical expression is
redundant (multiple derivation paths for the same pair). However, it may be wrong to apply the conclusion twice
even if a pair is obtained from two different paths. Consider the following example:
strange1(x:Person) :: rule( x.age = 18 | x.age > 10
=>
give(x, $1000))
An update "John.age := 18" may cause the rule to be fired twice. The solution in CLAIRE is to use the
mode(set) declaration before the rule, which will force the computation of the set of pairs before firing the
conclusion (thus eliminating duplicates). Note that the use of an event pattern is precisely another way to get rid
of this problem.
Similarly, rules should have a monotonous behavior, which means that their conclusion should not invalidate the
condition. CLAIRE supports non-monotonous rules but the difficulties linked to the absence of a clear semantic
remain. Let us consider a second example:
strange2(x:Person, y:Person) :: rule(
x.age = 18 & y ∈ x.friends => (x.age := 19, invite(x,y)))
16
Should the rule invite one friend (which one) or all friends when the age of John is set to 18? The default
behavior as well as the "set" behavior will invite all friends. The mode(once) declaration will ensure that the
conclusion is fired only once for each update event. Using non-monotonic rules is tricky, but it is sometimes
very useful.
These modes are implemented as an additional layer in the generation of the code fragments for the demons. The
priorities are used to order the code fragments. The “set” mode builds a temporary set of pairs to be updated
before applying the conclusion. The “once” mode uses an exception handler to make sure that the conclusion is
only fired once.
4.3.3 Application
Here are two examples of demons generated by CLAIRE from the rules that were proposed as examples. The
first one is associated to the minStart slot and represents the two first rules. It is obtained by applying the code
generation method expF to the two derived terms that we have shown in Section 3.3.
if_write[minStart](t, y)
-> let LAST := t.minStart in
(if (LAST != y)
(t.minStart := y,
// the previous value is stored
// checks that this is indeed an update
// performs the update
st
// propagation fragment from 1 rule (R1)
when Y := get(attached,t) in Y.minStart :+ (y – LAST),
// propagation fragment from 2nd rule (R3)
if (t.minStart = y)
for I in taskInterval
if (y >= I.minStart & LAST < I.minStart & t.maxEnd <= I.maxEnd)
I.duration :+ x.duration )
The second example is obtained from rules RS1 and RS2 for the location attribute:
if_write[location](x, y)
-> let LAST := x.location in
(if (LAST != y)
(x.location := y,
// the previous value is stored
// checks that this is indeed an update
// performs the update
st
// propagation fragment from 1 rule (RS1)
for Y in of~(location,y)
if (Y.strength >= x.strength)
// reads the inverse of location
failure(x)
nd
// propagation fragment from 2 rule (RS2)
if (x.location = y)
if (y.forest? & not(LAST.forest?) computeVisibility(x) )
These two examples illustrate our claim that the rule compiler is able to produce procedural code for propagation
that is very close to what a user would write.
4.3.4 Performance Results
We have not tested the new features of ClaireRules from a performance point of view due to the absence of
established benchmarks. On more classical problems, such as those reported in Table 3, the code generation
strategy of CLAIRE is very efficient (between 100 K to 50 Mips = Million inferences per second), even when
solving complex problems. . The CPU time is measured on a Pentium III laptop at 500Mhz, using MSVC++ 6.0.
Since CLAIRE can also generate Java code, we also include the results using Symantec’s Visual Café 3.0.
CLAIRE is between 2 or 3 orders of magnitude faster than what we have measured with RETE-based inference
engines [For82] and various successive improvements such as TREAT [Mi87] or GATOR [HH93]. We have
tested over the last 10 years four major commercial products – they are all based on refinements of the RETE
algorithm - and two academic inference engines. The problems that we use in Table 3 are taken from a small set
of the rare examples that circulate in the inference engine community, they do not exercise other features than
rule propagation – this is not a backtracking benchmark. More empirically, we have noticed that CLAIRE
programs written with production rules yield only about a 10 to 50 % penalty compared with hand-optimized
procedural code.
CPU time
Java version
CPU time
C++ version
Rules/s
C++ version
Simple Filtering
0.01s
0.02s
50 Mips
Planning (Monkey & Banana)
0.03s
0.015s
13 Mips
17
Constraint Propagation (triplet)
0.36s
0.05s
3 Mips
Rules & methods (Airline)
0.05s
0.01s
100Kips
Problem solving (Zebra)
0.043s
0.011
2.7 Mips
Problem solving (Dinner)
0.18s
0.08s
250Kips
Table 3: Benchmarks on rules.
The demons are produced using CLAIRE, taking advantage of CLAIRE high-level of abstraction, which
simplifies the handling and the iteration of set expressions, as well as the reflective nature of the CLAIRE
system, which makes generating new programs much easier. The CLAIRE program is then compiled into C++
or Java. The generation of Java programs is a new feature from the CLAIRE compiler. Our next step is to
generate directly Java beans that exploit the event/listener model. Because we can generate Java code with no
overhead or central control algorithm, this technique is ideally suited for compiling a set of rules into a Java
bean component [Eng97]. This approach can be applied to all other publish & subscribe message architecture,
which makes this technique very interesting for Enterprise Application Integration (EAI). For instance, we plan
to use this approach to implement distributed workflow engines where a set of process rules is compiled into a
group of distributed agents.
5. Search Algorithms
5.1 Search in an Imperative Language
In addition to rules, we saw that CLAIRE also provides the ability to do some hypothetical reasoning. This
possibility to store successive versions of the database and to come back to a previous one is called the world
mechanism. The part of the database that supports these defeasible updates is defined by the programmer and
may include slots, tables, global variables or specific data structures such as lists or arrays. When the data model
is defined, one may specify which slots are defeasible and which are not. Each time we ask CLAIRE to create a
new world, CLAIRE saves the status of defeasible slots (and tables, variables, ...). Worlds are represented with
numbers, and creating a new one is done with choice(). Returning to the previous world is done with
backtrack(). Returning to a previous world n is done with world=(n). Worlds are organized into a stack (one
cannot explore two worlds at the same time) so that save/restore operations are very fast. The current world that
is being used can be found with world?(), which returns an integer. In addition, one may accept the hypothetical
changes that were made within a world while removing the world and keeping the changes. This is done with the
commit() method. commit() decreases the world counter by one, while keeping the updates that were made in
the current world. It can be seen as a collapse of the current world and the previous world. Note that although
the wording is closer to AI concepts, the implementation of worlds using a stack is very close to the trailing
stack of a constraint logic programming system such as CHIP[VH89] and totally similar to the backtracking
stack of a constraint solving tools such as ILOG solver [Pu94].
Here is a real example of the search strategy for the jobshop problem [Lab98]. The functional parameter
tightest is a heuristic that returns the set of tasks (an Interval) that share the same machine and that looks for
the most difficult to process.
solve(tightest:property) : boolean
-> when I:Interval := tightest() in
exists(t in {x in I | canbefirst?(I, t)} |
branch( (for t’ in (I but t) t.After :add t’, solve(tightest) )
else true
// no interval was found
This example shows many interesting features. Some of them have already been mentioned: the iteration of a
selection set (the set of tasks that can be the first in the set I), the use of the pattern (I but t) or the use of a
functional parameter. We also notice the defeasible update t.After :add t’, which adds t’ to the list of tasks
performed after t and triggers the propagation rules that represent the scheduling constraints [Lab98].
Another interesting aspect of the branch control structure is contradiction handling (failure in a sub-tree).
CLAIRE supports exceptions (represented as objects in a hierarchy) with a built-in contradiction subclass.
When a contradiction is raised (for instance, by rule propagation), it is caught by the branch(...) instruction
which backtracks and returns false. Thus, branch support a concise and readable programming style of search
algorithms, an asset for defining easily new variations (other search strategies, instrumentation, ...).
We are also making good use of the extensibility of the iteration compiler. A task interval I is a set of tasks that
share a same resource I.Res whose time windows are included in a given interval [Lab98]. Each task has a
unique index and the set of tasks that belong to I is represented by a bit-vector I.SET. Thus the iteration of a
task interval consists of iterating the set of tasks on the right machine whose indexes belong to the bit-vector.
For instance, the iteration in the previous algorithm will be expanded into:
18
for t in (I.Res).users
(if I.SET[t.index]
(if canbefirst?(I, t)
branch(...) ))
The ability to pass function parameters at no cost from a performance point of view is a key feature to write
parametric algorithms. This is reinforced by the fact that these parameters can be in-line methods, which means
that the original in-line method can be seen as a higher-level function generator. For instance, we can use the
following definition of max to define the method later:
// a generic max method
max(s:subtype[integer], greater:property, default:any) : integer
=> let x := default, empty := true in
(for y in s (if empty (x := y, empty := false)
else if greater(x, y) x := y), x)
before(x:task, y:task) : boolean
=>
later(x:Interval, t:task) : integer
x.atleast ≤ y.atleast
->
max(x but t, before, EndTask)
The code generated for the method later will be:
let t0 := EndTask, empty := true in
(for t1 in (x.Res).users
(if x.SET[t1.index]
(if (t != t1)
(if empty (t0 := t1, empty := false)
else if (t0.atleast ≤ t1.atleast) t0 := t1))),
t0)
In that example, we have used max as a high-level code generator. This is the first step in writing truly reusable
code for complex problem solving algorithms.
5.2 Composition Polymorphism
Multiple layers of rewriting rules lead to the need for a new paradigm to implement simplification (or reduction)
rules. Consider the two following equations:
(A + B)[i,j] = A[i,j] + B[i,j]
x ∈ (s but t) = (x ∈ s) & (x != t)
These equations may be seen as simplification rules since they respectively allow us to extract a cell of a matrix
sum without computing this sum explicitly or evaluate membership to a “but” set without actually computing
this set. Usually, there is no need to represent these rules because the programmer uses them implicitly. However,
this is no longer the case when these sequences of source-to-source rewriting are used. For instance, there may
exist the expression M[i,j] in the body of an inline method that gets transformed into (A + B)[i,j] because of
the form of the input parameters. This is even more obvious with the second example if we apply a set inline
method to the set expression (s but t).
Representing these simplification rules leads to the notion of composition polymorphism. What we need to
represent is that the processing of f(...,x,...) may be different when x is obtained as g(....). For instance, f
is get (get is used implicitly in the form ...[...], e.g. M[i,j] = get(M,i,j)) and g is + in the first case; f is ∈
and g is but in the second case. This type of polymorphism might be captured with a complex abstract data type
in a statically typed language using complex pattern matching rules, but is out of reach with our concrete type
approach. This is why we have introduced the notion of pattern: a pattern is a set of function calls with a given
selector and a list of types (list of types to which must belong the arguments to the call); a pattern in CLAIRE is
written p[tuple(A,B,...)]. Patterns support composition polymorphism through the definition of new inline
methods whose signature are made either of any (for concrete parameters) or patterns (for expressions). The
compiler uses such a restriction when it finds a function call that matches its signature. Here is the application to
the “matrix” example:
get(x:+[tuple(Matrix,Matrix)],i:any,j:any)
=> (args(x)[1][i,j] + args(x)[2][i,j])
Suppose that we now have this situation:
inverseTrace(M:Matrix) => sum(list{1.0 / M[i,i] | i in (1 .. N)})
f(M1:Matrix, M2:Matrix) -> inverseTrace(M1 + M2) > 0.0
The macro-expansion of inverseTrace(M1 + M2) will yield to an expression that involves
This call matches the signature of the optimizing restriction that we defined previously (with
args(x) = (M1,M2)). Thus a further reduction is performed and the result is:
(M1 + M2)[i,i].
x = M1 + M2 and
let x := 0, i := 1 in
(while (i >= N)
(x :+ 1.0 / (M1[i,i] + M2[i,i]), i :+ 1),
x > 0.0)
19
The macro-expansion of inverseTrace(M1 + M2) is performed by the compiler under the same considerations
an any inlining optimization: the compiler will check that no side-effects are involved, or that the parameter of
an inlining pattern is used exactly once.
5.3 Writing Elegant Algorithms
Our last example is taken from a real application that uses the Hungarian Algorithm to solve a bipartite matching
problem (useful for global constraint propagation [Lab98]). Although it does not use search mechanisms, we
believe that it demonstrates the value of CLAIRE high-level features to express a complex algorithm in a more
readable and elegant manner, even if not declarative.
// builds a maximum weight complete matching
match() -> (...,
while (HN != N)
(if not(grow())
dualChange()))
// initialization
// main loop
// a step repeats until the forest is hungarian (return value is false)
// or the matching is improved (return value is true)
// explore is the stack of even nodes that have not been explored yet
grow() : boolean
-> let i := pop(explore) in
// explore is the stack of nodes that need to be explored
(exists(j in {j in GpiSet(i,LastExplored[i] + 1,LastValid[i]) | not(odd?[j])} |
(if (sol-[j] != 0)
(//[SPEAK] grow: add (~S,~S) to forest// i,j,
odd?[j] := true, pushEven+(sol-[j]), tree[j] := i, false)
else (augment(i,j), true))) |
(if not(empty?(explore))
// if we did not find a j to augment the forest,
grow()) )
// grow is called recursively
// change the dual feasible solution, throw a contradiction if there are no perfect matching
dualChange() : integer
-> let e := Min( list{vclose[i] | i in {j in Dom | not(odd?[j])}}) in
(//[SPEAK] DUAL CHANGE: we pick epsilon = ~S // e,
if (e = NMAX) contradiction!(),
for k in stack(even) (pi+[k] :+ e, LastExplored[k] := LastValid[k]),
for j in {j in Dom | odd?[j]} (pi-[j] :- e, vclose[j] := NMAX)),
clear(explore),
for i in stack(even)
let l := Gpi[i], k := size(l), toExplore := false in
(while (LastValid[i] < k)
(k, toExplore) := reduceStep(i,j,l,k,toexplore),
if toExplore push(explore,i)))
// look at edges outside the valid set one at a time
reduceStep(i:Dom,j:Dom,l:list,k:integer,toExplore:boolean) : tuple(integer,boolean)
-> let j := l[k], c := Cpi(i,j) in
(if (c = 0)
(//[SPEAK] dual_change: Add edge ~S,~S // i,j,
Gpiadd(l,i,j,k), toexplore := true)
else (vclose[j] :min c, k :- 1)),
list(k,toexplore))
Let’s briefly comment the three functions above. match builds the matching by repeatedly applying the two steps
grow and dualChange until the complete set of nodes is spanned (this is a primal-dual algorithm). grow builds a
Hungarian forest using a classical search for augmenting chains (with alternate marks even and odd) in the
reduced graph Gpi. dualChange changes the dual values stored in the arrays pi+ and pi- so that the reduced
graph Gpi is augmented. The reduced graph is implicitly defined as the subset of all edges satisfying a given
condition on the dual weights (that the corresponding constraint in the linear model is saturated). It is
represented by the following pattern: GpiSet(i,a,b) refers to the subset of neighbors of the node i in this
reduced graph where a and b are two iteration cursors (we maintain an ordered set of edges incident to i in Gpi;
all edges up to position a have been explored and all edges up to position b have been touched).
A complete explication of the algorithm is out of the scope of this paper, but we can notice:
• The use of patterns such as stack(even) or GpiSet(i,a,b) which encapsulates the complexity due to data
structure handling (e.g., using the even array to implement the stack).
20
•
The use of complex set expressions that are iterated (e.g., the first line of dualChange) and the use of set
operators (exists) and generic functions (min).
• The use of multi-valued functions (reduceStep) to isolate fragments of code that do not return a single
value.
• The use of active comments, which can be used as trace statements.
From our point of view, a description of this complex algorithm in less than 30 lines is very valuable, and is a
strong advocate for using high-level languages. The interest of the techniques presented in this paper is that they
may come with no penalties for run-time performance, since this CLAIRE implementation was checked to be
exactly as efficient as a standard C++ implementation. These 30 lines may be compared with the 60 lines of the
C++ program that was written by hand or the 90 lines that were generated by the CLAIRE compiler. The real
gain is not the concision, it is the ability to grasp the design of the algorithm at a higher level of abstraction
while reviewing the code.
6. Conclusion
Experiments in the previous years have shown that constraint programming was best used in combination with
other optimization techniques for combinatorial problem solving. The fact that hybrid algorithm engineering
cannot be always performed exclusively through the use of components and may require some programming
motivates the use of multi-paradigm programming languages. There have been many proposals for incorporating
“advanced features” such as sets or rules into object-oriented languages, especially in the AI community. On the
other hand, few have managed to incorporate as well a high degree of polymorphism and the use of higher-order
functions. Among those few, the most interesting, from our point of view, are LIFE and Oz.
The major contribution of LIFE [AK93] is to provide with a clean integration of logic, inheritance and functions
(as its name stands). LIFE played an important role when we tried to put some elegance into our “mix of
features”. However, there is a top-down vs. bottom-up difference in the design strategy of CLAIRE and LIFE.
CLAIRE is the bottom-up integration of features that we know how to compile efficiently whereas LIFE is the
top-down implementation of paradigms that are known to blend elegantly. The result is that it is easier, from our
point of view, to write efficient algorithms with CLAIRE than with LIFE.
Oz is a concurrent constraint language [Smo95] belonging to the post-CLP language generation. Its objectoriented kernel offers multiple inheritance and a clean integration of higher order functions, in particular with
the predefined search combinators that offer parametric search procedures [SS94]. These predefined
combinators have been extended into the ability to define search procedures (programming constraint inference
engines [Sch87]) with few lines of elegant code, which is very similar to CLAIRE and LAURE [Cas94], both
from a motivation and a result point of view,
The comparison between Oz and CLAIRE is interesting because Oz is both more sophisticated and simpler than
CLAIRE. On the one hand, Oz is more ambitious than CLAIRE since it proposes a computational model which
is original, centered on constraints and search (stores), and supports distributed computing. CLAIRE uses an
object-oriented data model that is geared towards knowledge representation, with the additional benefits of
providing a strong basis for data types. Oz has been a model for some of CLAIRE features, such as the use of
higher-order functions to capture parametric search strategies. On the other hand, Oz is still an un-typed
language that is too high-level, from our point of view, to be a language of choice to implement propagation
strategies. Oz relies on the ability to use a lower-level language to implement some of the constraint propagation
strategies, while CLAIRE is a self-contained tool.
To summarize, we have presented a high-level language for writing re-usable algorithms. The application of this
language to various optimization problems has resulted in programs that are easier to read (and thus to maintain)
and to reuse (or to combine). This is mostly due to two features:
• Declarative programming is encouraged with the use of logic rules (the programmer is freed from the
concern about propagation patterns), which can be compiled into procedural demons with no run-time
processing overhead.
• Set programming and set iteration raise the level of abstraction and recursively-nested expressions can be
compiled with no run-time processing overhead.
We believe that our experience with CLAIRE may be of interest to the CLP community on three topics: the
technology of compilation-by-differentiation for rules, the definition of a simple multi-paradigm language
supported by real applications and the concern for a general purpose programming language for hybrid
algorithms. On this last point, CLAIRE offers different tools for different concerns: an object oriented type
system for elegant modeling, a data-driven rule compiler for declarative programming, parametric polymorphism,
iteration and patterns for data structure manipulations and a version mechanism (reified in SaLSA [LC98]) for
controlling search trees. This suggests that the scope of CLAIRE is broader than its current use for combinatorial
optimization algorithms and that it could be used for applications that have been associated with logic and rulebased programming.
21
CLAIRE has been used for various deployed industrial applications, in different companies. It was also used as a
support tool of choice for teaching “Constraints and Algorithms”. CLAIRE is written in CLAIRE (10,000 lines of
code), except for a small bootstrapping, run-time kernel, and the optimizer makes heavy use of CLAIRE features
(including garbage collection). CLAIRE is a public domain tool that may be downloaded from various WEB sites.
References
[AK93]
H. Aït-Kaci. An Introduction to LIFE: Programming with Logic, Inheritance, Functions and
Equations. Proceedings of ILPS’93, p.117, 1993.
[AS97]
K.R. Apt, A. Schaerf. Search and Imperative Programming. Proceedings of POPL'97, p. 67-79,
ACM Press, 1997.
[Cas94]
Y. Caseau. Constraint Satisfaction with an Object-Oriented Knowledge Representation Language.
Applied Intelligence, Vol. 4, no. 2, p. 157-184, May 1994.
[Cas95]
G. Castagna. Covariance and Contravariance: Conflict without a Cause. ACM Transactions on
Programming Languages and Systems, Vol 17, no. 3, p. 431-447, May 1995.
[CL94]
C. Chambers, G. Leavens. Typechecking and Modules for Multi-Methods. Proceedings of
OOPSLA’94, ACM Sigplan Notices, p. 805-843, Portland, 1994.
[CL96a]
Y. Caseau, F. Laburthe. Introduction to the CLAIRE Programming Language. LIENS research report
96-16, Ecole Normale Supérieure, 1996.
[CL96b]
Y. Caseau, F. Laburthe. Cumulative Scheduling with Tasks Intervals. Proceedings of JICSLP’96, M.
Maher ed., p. 363-377, The MIT Press, 1996.
[CP93]
Y. Caseau, L. Perron. Attaching Second-Order Types to Methods in an Object-Oriented Language.
Proceedings of ECOOP’93, O.M. Nierstrasz Ed., p.142-160, Kaiserslautern, Germany, 1993.
[DGL95] M. Day, R. Gruber, B. Liskov, A. Myers. Subtypes vs. Where Clauses: Constraining Parametric
Polymorphism. Proceedings of OOPSLA’95, ACM Sigplan Notices, p. 156-168, Austin, TX, 1995.
[Eng97]
R. Englander. Developing Java Beans. O’Reilly, 1997.
[For82]
C.L. Forgy. Rete: A Fast Algorithm for the Many Pattern/Many Object Pattern Match Problem
Artificial Intelligence, 19, p. 17-37, 1982.
[GR83]
A. Goldberg, D. Robson. Smalltalk-80: The Language and its Implementation. Addison-Wesley,
1983.
[HH93]
E. Hanson, M. Hasan. Gator: An Optimized Discrimination Network for Active Database Rule
Condition Testing. Tech report 93-036, CSE CIS Department University of Florida Gainesville, FL,
1993.
[HU94]
U. Holzle, D. Ungar. A Third-Generation Self Implementation: Reconciling Responsiveness with
Performance. Proceedings of the ACM OOPSLA’94 Conference, p. 229-243, Portland, OR,
October 1994.
[Lab98]
F. Laburthe. Constraints and Algorithms in Combinatorial Optimization, Ph.D. Thesis (in French)
University of Paris VII, 1998.
[LC98]
F. Laburthe, Y. Caseau. SaLSA: A Language for Search Algorithms, Proceedings of CP’98,
M.Maher, J.-F. Puget eds., Springer, LNCS 1520, p.310-324, 1998.
[KW89]
M. Kifer, J. Wu. A logic for Object-Oriented Logic Programming (Maier’s O-Logic
Revisited). Proceeding of PODS-89 , Philadelphia, 1989.
[McL81] B.J. MacLennan. Programming with A Relational Calculus. Rep N° NPS52-81-013, Naval
Postgraduate School, September 1981.
[Mir87]
D.P. Miranker. TREAT: A better match algorithm for AI production systems. In Proceedings AAAI87 Sixth National Conference on Artificial Intelligence, pages 42-47. Morgan Kaufmann, San
Francisco, August 1987.
[NT89]
S. Naqvi, S. Tsur. A Logical Language for Data and Knowledge Bases. Computer Science Press,
1989.
[Pug94]
J.-F. Puget. A C++ Implementation of CLP. Ilog Solver Collected papers, Ilog tech. report, 1994.
[Sch87]
C. Schulte. Programming Constraint Inference Engines. Proceedings of CP97, G. Smolka ed.,
Springer, LNCS 1330, p. 519-533, 1997.
[SDD86] J. Schwartz, R. Dewar, E. Dubinsky, E. Schonberg. Programming with Sets: an Introduction to
SETL. Springer, New-York, 1986.
[SKG87] H. Schmidt, W. Kiessling, V. Guntzer, R. Bayer. Compiling Exploratory And Goal-Directed
Deduction into Sloppy Delta-Iteration. Proc. of the Symposium on Logic Programming, p. 233-243,
San Francisco, 1987.
[SS94]
C. Schulte, G. Smolka. Encapsulated Search for Higher-order Concurrent Constraint Programming,
Proceedings of ILPS’94, M. Bruynooghe ed., MIT Press, p. 505-520, 1994.
22
[Smo95]
[SZ88]
[VH89]
G. Smolka. The Oz Programming Model, Proceedings of Computer Science Today, J. Van Leeuwen
ed., LNCS 1000, p. 324-343, Springer, 1995.
D. Sacca, C. Zaniolo. Differential Fixpoint Methods and Stratification of Logic Programs. MCC
Technical Report ACA-ST-032-88, January 1986.
P. Van Hentenryck. Constraint Satisfaction in Logic Programming. The MIT press, Cambridge,
1989.
Appendix: Benchmark Results
The CLAIRE language is not a powerful high-level language whose compiler has progressively been designed
to eliminate undue overhead. On the contrary, CLAIRE was a simple C++ code generator, which was designed
to guarantee the absence of overhead, and that has evolved into a powerful language over the years while we
were improving the compiler technology. The first application of CLAIRE, in 1994, has been job shop
scheduling software; we presented a new state-of-the-art algorithm with a new data structures (task intervals).
Because we did not have the techniques presented here available at that time, the handling of the data structures
was done by hand everywhere in the code. An encapsulation approach based on iterators would have produced a
slow-down of a factor of 10, but we were able to rewrite the algorithm two years later with exactly no overhead,
since the compiler had been tuned to produce precisely the code we were starting from. We have used CLAIRE
to encode many classical graph algorithms (shortest path, flows, matching, etc.). With earlier versions of the
compiler, the encoding was very similar to the C or Pascal algorithms that we were copying from. The
introduction of the techniques presented here allowed us to evolve towards much more elegant and compact
encoding, without any overhead.
This paper contains three sets of benchmarks that we use to monitor CLAIRE performance; the first two are
reported in this appendix and the last one was shown in Section 4.3.4. They illustrate our central claim that
CLAIRE introduces no overhead compared to more traditional procedural languages. We first gathered two
“algorithmic” micro-benchmark suites: respectively the Self and the Stanford benchmarks. Self’s original results
[HU94] are not reproduced since the hardware has changed too much in the last few years; but the comparison
with C++ shows that CLAIRE seems faster than Self.
Fibonacci(38)
Fill a vector of 100,000 integers (x 1,000)
Increment each element of that vector (x 1,000)
Self
benchmarks Add up all the elements of that vector (x 1,000)
Sum iterators of 2 nested 100-loops (x 100,000)
Bubble sort of 10,000 integers
Quick sort of 2,000,000 integers
Tree sort of 5,000 integers
Stanford
Multiplication of 2 300x300-matrices of integers
benchmarks
Multiplication of 2 300x300-matrices of floats
Permutation of the elements of a vector
Time-consuming placement problem (x 500)
CLAIRE
Visual C++ 6
Java (Visual
Café 3)
4,140
1,220
1,800
830
6,970
890
620
660
500
2,080
3,090
7,610
4,090
1,190
1,750
890
6,940
840
560
780
520
1,540
2,520
6,660
4,530
1,200
1,830
970
6,920
1,140
760
1,730
1,190
2,420
2,730
7,470
We also report benchmark results on libraries for collection data structures for the same 3 languages (we chose
the closest C++ and Java libraries to CLAIRE lists and sets). Moreover, multiple experiments have confirmed
what these benchmarks suggest: handling collection data structure is definitely a strong feature of CLAIRE.
23
Creation
Lists of
Iteration
1,000 objects Membership
Deletion and insertion
Creation
Sets of
Iteration
1,000 objects Membership
Deletion and insertion
Creation
Hash sets of Iteration
1,000 objects Membership
Deletion and insertion
CLAIRE
Visual C++ 6
Java (Visual
Café 3)
140
2,690
4,580
1,840
340
2,440
300
4,120
170
3,750
90
60
90
7,260
15,600
5,770
580
7,220
750
4,950
8,770
23,800
8,030
3,170
390
26,700
17,800
6,970
6,090
26,200
133,000
2,450
1,730
29,900
370
870
24
| 2cs.AI
|
1
Gland Instance Segmentation Using
Deep Multichannel Neural Networks
arXiv:1611.06661v3 [cs.CV] 23 Nov 2017
Yan Xu, Yang Li, Yipei Wang, Mingyuan Liu, Yubo Fan, Maode Lai, and Eric I-Chao Chang*
Abstract—Objective: A new image instance segmentation
method is proposed to segment individual glands (instances)
in colon histology images. This process is challenging since
the glands not only need to be segmented from a complex
background, they must also be individually identified. Methods:
We leverage the idea of image-to-image prediction in recent
deep learning by designing an algorithm that automatically
exploits and fuses complex multichannel information - regional,
location and boundary cues - in gland histology images. Our
proposed algorithm, a deep multichannel framework, alleviates
heavy feature design due to the use of convolutional neural networks and is able to meet multifarious requirements by altering
channels. Results: Compared to methods reported in the 2015
MICCAI Gland Segmentation Challenge and other currently
prevalent instance segmentation methods, we observe state-ofthe-art results based on the evaluation metrics. Conclusion: The
proposed deep multichannel algorithm is an effective method
for gland instance segmentation. Significance: The generalization
ability of our model not only enable the algorithm to solve
gland instance segmentation problems, but the channel is also
alternative that can be replaced for a specific task.
Index Terms—Convolutional neural network, instance segmentation, histology image, multichannel, segmentation.
I. I NTRODUCTION
E
XISTING in most organ systems as important structures,
glands secrete proteins and carbohydrates. However,
adenocarcinomas, the most prevalent type of cancer, arises
from the glandular epithelium [1]. The morphology of glands
determines whether they are benign or malignant and the level
of severity [2]. Segmenting glands from the background tissue
is important for analyzing and diagnosing histological images.
In gland labeling/segmentation, each pixel is assigned one
label to represent whether the pixel belongs to the foreground
Manuscript submitted for review on December 24, 2016; accepted on
March 11, 2017. This work is supported by Microsoft Research under the
eHealth program, the Beijing National Science Foundation in China under
Grant 4152033, the Technology and Innovation Commission of Shenzhen
in China under Grant shenfagai2016-627, Beijing Young Talent Project in
China, the Fundamental Research Funds for the Central Universities of China
under Grant SKLSDE-2015ZX-27 from the State Key Laboratory of Software
Development Environment in Beihang University in China.
Yan Xu, Yang Li, Yipei Wang, Mingyuan Liu and Yubo Fan are with
the State Key Laboratory of Software Development Environment and Key
Laboratory of Biomechanics and Mechanobiology of Ministry of Education
and Research Institute of Beihang University in Shenzhen, Beihang University,
Beijing 100191, China.
Yan Xu and *Eric I-Chao Chang are with the Microsoft Research, Beijing
100080, China (*Corresponding author: [email protected]).
Maode Lai is with the Department of Pathology, School of Medicine,
Zhejiang University, China.
Copyright (c) 2016 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending an email to [email protected].
Fig. 1. Gland Haematoxylin and Eosin (H&E) stained slides and ground truth
labels. Images in the first row exemplify different glandular structures. Characteristics such as heterogeneousness and anisochromasia can be observed in
this figure. The second row shows the ground truth. To achieve better visual
effects, each color represents an individual glandular structure.
(gland) or the background. However, which gland the foreground pixel belongs to is still not determined. In order to
analyze the morphology of glands, they need to be recognized
individually. Each pixel needs to be classified and it must
be determined which gland the pixel belongs to, which is
to assign a gland ID to each foreground pixel. We call this
task as gland instance segmentation (as shown in Fig. 1). In
this paper, we aim to solve the gland instance segmentation
problem. We formulate this problem as two subproblems gland labeling/segmentation [3], [4] and instance recognition.
The intrinsic properties of gland histopathological image
pose plenty of challenges in instance segmentation [5]. First
of all, heterogeneous shapes make it difficult to use mathematical shape models to achieve segmentation. As Fig.1
shows, the cytoplasm being filled with mucinogen granule
causes the nucleus to be extruded into a flat shape whereas
the nucleus appears as a round or oval body after secreting.
Second, variability of intra- and extra- cellular matrices often
leads to anisochromasia. Therefore, the background portion
of histopathological images contains more noise like intensity
gradients, compared to natural images. Several problems arise
in our exploration of analyzing gland images: 1) some objects
are very close together making only the tiny gaps between
them visible when zooming in on a particular image area; or
2) one entity borders another making their edges adhesive to
each other. We call this an problem of ‘coalescence’. If these
problems are omitted during instance recognition process, even
if there is only one pixel coalescing with another, the algorithm
will consider two instances as one.
Gland labeling/segmentation, as one subproblem of gland
instance segmentation, is a well-studied field where various
methods have been explored, such as morphology-based methods [6], [7], [8], [9] and graph-based methods [10], [11].
However, glands must be recognized individually to enable
2
the following morphology analysis. Gland segmentation is
insufficient due to its inability to recognize each gland in
histopathological images. MICCAI 2015 Gland Segmentation
Challenge Contest [12] has drawn attention to gland instance
segmentation. The precise gland instance segmentation in
histopathological images is essential for morphology assessment, which is proven to be not only a valuable tool for clinical
diagnosis but also a prerequisite for cancer grading [13].
Although gland instance segmentation is a relatively new
subject, instance segmentation in nature images has attracted
much interest from researchers. Ever since SDS [14] raised
this problem and proposed a basic framework to solve it, other
methods have been proposed thereafter, such as hypercolumn
[15] and MNC [16], which merely optimize and accelerate
the feature extraction process. All of these algorithms fall into
a routine that detects objects first and then segments object
instances inside the detected bounding boxes.
In medical image analysis, traditional methods are more
prevalent for segmenting gland instances instead of learningbased methods. Traditional methods depend heavily on handcraft features and prior knowledge. In natural images, instance
segmentation algorithms are mostly the pipeline of object
detection and masking [14], [15], [16]. The objects in natural
images are regular-shaped, and relatively easy to segment by
first creating bounding boxes for each one. However, most
glands are irregular in shape, which increases the difficulty
of detecting the whole gland structure. Thus the traditional
instance segmentation methods for natural images are not
suitable for gland instance segmentation.
In a broad sense, gland instance segmentation can be viewed
as gland labeling process with commutative labels. Thus gland
labeling can offer useful cues for gland instance segmentation.
The latest advantages in deep learning technologies have led
to explosive growth in machine learning and computer vision
for building systems that have shown significant improvements
in a huge range of applications such as image classification
[17], [18] and object detection [19]. The fully convolutional
neural networks (FCN) [20] permit end-to-end training and
testing for image labeling; holistically-nested edge detector
(HED) [21] detector learns hierarchically embedded multiscale
edge fields to account for the low-, mid-, and high- level
information for contours and object boundaries; Faster RCNN [22] predicts object locations and compensates for the
possible failure of edge prediction. We solve the gland instance
segmentation problem by multitask learning. One task is to
segment the gland images, and another task is to identify the
gland instances. In the gland segmentation subtask, a fully
convolutional neural network (FCN) [20] model is employed
to exploit the advantage of end-to-end training and image-toimage prediction. In the gland instance recognition subtask, a
holistically-nested edge detector (HED) and a Faster R-CNN
object detector are applied to define the instance boundaries.
We make use of multichannel learning to extract region,
boundary and location cues and solve the instance segmentation problem in gland histology images (as shown in Fig. 2).
Our algorithm is evaluated on the dataset provided by the
MICCAI 2015 Gland Segmentation Challenge Contest [12]
and achieves state-of-the-art performance among all partici-
Fig. 2. This illustrates a brief structure of the proposed algorithm. The
foreground segmentation channel distinguishes gland pixels from the background. The edge detection channel outputs the result of boundary detection.
The object detection channel detects glands and their regions in the images.
A convolution neural network concatenates features generated by different
channels and produces segmented instances. The white areas in subimage
“region, edge and boxes” represent the results of the recognized glands, edges
and detected bounding boxes.
pants and other popular methods of instance segmentation.
We conduct a series of ablation experiments and prove the
superiority of the proposed algorithm.
This paper is arranged as follows. We formulate the instance
segmentation problem in Section II. Section III is a review
of related previous works. In section IV, we describe the
complete methodology of the proposed algorithm of gland
instance segmentation. Section V is a detailed evaluation of
our method. Section VI summarizes our conclusion.
II. P ROBLEM
We formulate the instance segmentation problem by two
subproblems, labeling/segmentation and instance recognition.
We denote D = {(Xn , Yn , Zn ), n = 1, 2, ..., N } as the
input training dataset, where N is the image amount. We
subsequently drop the subscript n for notational simplicity,
since we consider each image independently. X = {xj , j =
1, 2, ..., |X|} denotes the raw input image, Y = {yj , j =
1, 2, ..., |X|}, yj ∈ {0, 1} denotes the corresponding segmentation label and Z = {Rk , k = 0, 1, 2, ..., K} denotes the
instance label, in which Rk = {(p, q)} denotes the coordinates
set of pixels inside of region Rk . When k equals 0, it denotes
the background area and it denotes the corresponding instance
3
Fig. 3. This illustrates two subproblems of gland instance segmentation. Gland instance segmentation can be formulated into foreground labeling/segmentation
and gland instance recognition two subproblems. As demonstrated in images of the second column, a small amount of prediction errors have little influence
on the final cost function for the foreground labeling/segmentation subproblem; however, for the gland instance recognition subproblem, even a few pixels
predicted incorrectly can highly increase the cost, which is shown in images of the third column. The bar chart shows the cost of two subproblems.
when k takes other values. K is the total instance number.
Regions in the image satisfy the following relations:
Rk ∩ Rt = ∅, ∀k 6= t,
(1)
∪Rk = Ω.
(2)
Ω denotes the whole image region. Note that instance labels
only count gland instances thus they are commutative. Our
objective is to segment glands while ensuring that all instances
are differentiated. Note that the labeling/segmentation subproblem is a binary classification problem. Ŷ represents the
labeling/segmentation result, the cost function is:
|Y |
Dist(Y, Ŷ ) =
1 X
δ(yj 6= yˆj ).
|Y | j=1
yˆj = arg maxy P (y|X)
(3)
(4)
In the instance recognition subproblem, Ẑ denotes the
instance prediction. The cost function is:
Dist(Z, Ẑ) = 1 −
1
K
K0
X
d
L(R
k0 , Z),
III. R ELATED W ORK
This section is a retrospective introduction about instance
segmentation and gland instance segmentation.
(5)
k0 =0
A. Instance segmentation
where
d0 ∩Rk
1, ∃k 6= 0, R
k
d0 ∪Rk > thre
d
R
0
k
L(Rk , Z) =
0, otherwise
d
b
R
k0 ∈ Z denotes the instance segmentation prediction
region and Rk ∈ Z denotes the instance label region. K 0
represents the total predicted region count. thre is the threshold which is set to 0.5 in this algorithm. When the overlap
ratio of the gland instance in a certain prediction region and
labels is higher than the threshold, this region is considered
an instance prediction by the algorithm. Fig. 3 shows the two
gland instance segmentation subproblems.
Since the cost function of instance recognition is nondifferentiable, it cannot be trained with SGD. We hereby
approximate instance recognition by edge detection and object
detection. We generate edge labels E and object labels O
through Y and Z to train edge detector and object detector, in
which E = {ej , j = 1, 2, ..., |X|}, ej ∈ {0, 1} and ej equals 0
when all four nearest pixels (over, below, right and left) belong
to the same instance. O denotes the smallest bounding box for
each gland instance.
(6)
Instance segmentation, a task distinguishing contour, location, class and the number of objects in an image, is attracting
more and more attention from researchers in image processing
and computer vision. As a complex problem can hardly be
4
solved using traditional algorithms, a growing number of deep
learning approaches have emerged to solve it. For example,
SDS [14] uses a framework that resembles R-CNN [23] to
extract features from both the bounding box of the region and
the region foreground, and then classifies region proposals
and refines the segmentation inside bounding boxes based
on those extracted features. Hypercolumn [15] defines pixel
features as a vector of activations of all CNN units above
that pixel, and then classifies region proposals and refines
region segmentation based on those feature vectors. MNC [16]
integrates three networks designed for detection, segmentation
and classification respectively in a cascaded structure. Unlike
SDS and Hypercolumn, MNC is capable of training in an
end-to-end fashion, since MNC takes advantage of the Region
Proposal Network (RPN) to generate region proposals. Similar
to SDS and hypercolumn, MNC performs segmentation inside
the proposal box as well. In contrast to the above methods,
our method performs segmentation and instance recognition
in a parallel manner.
B. Gland instance segmentation
Gland morphology and structure can vary significantly,
which poses a big challenge in gland instance segmentation.
Researchers have come up with several methods to solve this
problem [24], [25], [12], [26]. Previous works focus on detecting gland structure like nuclei and lumen. Sirinukunwattana
et al. [27] model every gland as a polygon in which the
vertices are located at the nucleus. Cheikh et al. [28] propose
a mathematical morphology method to characterize the spatial
distribution of nuclei in histological images. Nguyen et al.
[29] use texture and structural features to classify the basic
components of glands, and then segment gland instance based
on prior knowledge of gland structure. These methods perform
well in benign images but are comparatively unsatisfactory
when used on malignant images, which has been the impetus
for creating methods based on deep learning [27]. Li et al. [30]
train a window-based binary classifier to segment glands using
both CNN features and hand-crafted features. Kainz et al. [26]
train two separated networks to recognize glands and glandseparating structures respectively. In MICCAI 2015 gland segmentation challenge contest, some teams achieved impressive
performance. DCAN [24] is a multitask learning framework
that combines a down-sampling path and an up-sampling
path together. From the hierarchical layer, the framework is
separated into two branches to generate contour information
and segment objects. Team ExB [12] proposes a multipath
convolutional neural network segmentation algorithm. Each
path consists of different convolutional layers and is designed
to capture different features. All paths are fused by two fully
connected layers to integrate information. Team Freburg [12]
utilizes an off-the-shelf deep convolutional neural network Unet [31], and then performs post-processing of hole-filling
and removes objects less than 100 pixels wide from the final
results.
C. Previous work
An earlier conference version of our approach was presented
in Xu et al. [32]. Here we further illustrate that: (1) we explore
another channel - object detection - in this paper, due to the
edge detection and the object detection channels complementing each other; (2) ablation experiments are carried out to
corroborate the effectiveness of the proposed algorithm; (3)
based on the rotation invariance of histological images, a new
data augmentation strategy is proposed that has proven to be
effective; (4) this algorithm achieves state-of-the-art results on
the dataset provided by the 2015 MICCAI Gland Segmentation
Challenge Contest.
IV. M ETHOD
There are two possible failures for gland instance segmentation. Since the gland-separating tissues are relatively few
and similar to glands in coloration, it is very difficult for
segmentation to rule out those pixels completely. Although
it has little effect on segmentation, it is detrimental to the
instance recognition process. Only one pixel that connects
two glands can mislead the algorithm into recognizing that
they belong to the same gland. Another possible scenario is
that algorithms designed to recognize instances separately may
cause prediction areas to be smaller than the ground truth. In
this case, the objects number and position may be accurate,
but the segmentation performance is substandard. Those two
scenarios are illustrated in Fig. 4.
Fig. 4. Two possible failures of gland instance segmentation. In the instance
results and the ground truth images, different color regions represent different
gland instances. Case 1 and Case 2 are two possible scenarios in which the
algorithm fails to segment gland instances. In Case 1, glands are separated
from the background but instances are not recognized. In Case 2, instances
are labeled yet under the condition of many gland pixels being neglected.
5
We propose a new multichannel algorithm to achieve gland
segmentation and gland instance recognition simultaneously.
Our algorithm consists of three channels and each of them
is designed to undertake different responsibilities. In the
proposed algorithm, we generate one kind of label of the input
image for each channel. Fig. 2 presents the flow chart of the
proposed algorithm. One channel is designed to segment foreground pixels from background pixels. The other two channels
are used to recognize instances. Aiming to determine which
gland each foreground pixel belongs to, we utilize both object
detection and edge detection to define spatial limits of every
gland. The reason for choosing these two channels is based on
the fact that information on contour and location contributes
respectively and complimentarily to instance recognition and
the joint effort will perform much better together than each one
alone. Specifically, edge detection performs a little better than
object detection in instance recognition, but edge detection
fails to complete the task because of the aforementioned
coalescence phenomenon of glands, which affects not only
segmentation but edge detection as well. Gland detection
may perform well for benign and well-shaped glands, but
hardly detect the entire glands accurately for malignant ones.
However, edge detection and object detection can compensate
for each other’s weaknesses and identify instances better. By
integrating the information generated from different channels,
our multichannel framework is capable of instance segmentation. A detailed depiction of our algorithm is presented in Fig
5.
A. Foreground Segmentation Channel
The foreground segmentation channel distinguishes glands
from the background.
The well-suited solutions to image labeling/segmentation in
which each pixel is assigned a label from a pre-specified set
are FCN family models [20], [21]. FCN replaces the fullyconnected layer with a convolutional layer and upsamples the
feature map to the same size as the original images through deconvolution thus an end-to-end training and prediction is guaranteed. Compared to the previous prevalent method, sliding
window [33], [34] in image segmentation, FCN is faster and
simpler. Usually, an FCN model can be regarded as the combination of a feature extractor and a pixel-wise predictor. A
pixel-wise predictor predicts probability masks of segmented
images. The feature extractor is able to abstract high-level
features by down-sampling and convolution. Though useful
high-level features are extracted, details of images sink in the
process of max-pooling and strided convolution. Consequently,
when objects are adjacent to each other, FCN may consider
them as one. Applying FCN to segment images is a logical
choice but instance segmentation is beyond the ability of FCN.
It requires an algorithm to differentiate instances of the same
class even when they are extremely close to each other. Even
so, probability masks produced by FCN still offer valuable
support in solving instance segmentation problems.
To compensate for the resolution reduction of feature maps
due to downsampling, FCN introduces skip architecture to
combine deep semantic information and shallow appearance
information. Nevertheless, Yu et al. [35] propose the dilated
convolution that empowers the network with a wider receptive
field without downsampling. Less downsampling means less
space-invariance brought by downsampling which is beneficial
to increasing segmentation precision.
Our foreground segmentation channel is a modified version
of the FCN-32s [20] of which the strides of pool4 and pool5
are 1 and subsequent convolution layers enlarge the receptive
field with a dilated convolution.
Given an input image X and the parameter of the FCN
network is denoted as ws , thus the output of FCN is
Ps (Y ∗ = k | X; ws ) = µk (hs (X, ws )) ,
(7)
where µ(·) is the softmax function. µk (·) is the output of the
kth category and hs (·) outputs the feature map of the hidden
layer. In this case, there are two categories (foreground/glands
and background), k=2. Y ∗ is the segmentation prediction.
We train the foreground segmentation channel using softmax cross entropy loss.
B. Edge Detection Channel
The edge detection channel detects boundaries between
glands.
To receive precise and clear boundaries, edges are crucial
as proven by DCAN [24]. The effectiveness of edges in
our algorithm can be shown in two ways. First, the edge
compensates for the information loss caused by max-pooling
and strided convolution in FCN. As a result, contours become
more precise and the morphology becomes more similar to the
ground truth. Second, even if the location and the probability
mask are confirmed, it is unavoidable that predicted pixel
regions of adjacent objects are still connected. Edge, however,
is able to differentiate between them. As expected, the synergy
of regions, locations and edges achieves state-of-the-art results.
The edge channel in our model is based on a Holisticallynested Edge Detector (HED) [21]. It is a CNN-based solution
towards edge detection. It learns hierarchically embedded
multiscale edge fields to account for the low-, mid-, and
high- level information of contours and object boundaries. In
edge detection, pixels of labels are much less than pixels of
backgrounds. The imbalance may decrease the convergence
rate or even cause the network being unable to convergence.
To solve the problem, deep supervision [36] is deployed. In
total, there are five side supervisions which are established
before each down-sampling layer.
We denote we as the parameter of HED, thus the mth
prediction of deep supervision is
Pe(m) (E (m)∗ = 1 | X; we ) = σ(h(m)
e (X, we )).
(8)
σ(·) denotes the sigmoid function - the output layer of HED.
(m)
he represents the output of the hidden layer relative to mth
deep supervision and E (m)∗ denotes the mth side output prediction. The weighted sum of M outputs of deep supervision
is the final result of this channel which is denoted as E ∗ , and
the weighted coefficient is α.
Pe (E ∗ = 1|X; we , α) = σ(
M
X
m=1
α(m) , h(m)
e (X, we ))
(9)
6
Fig. 5. This illustrates the structure of this algorithm. For all the channels in this algorithm, FCN for the foreground segmentation channel, Faster R-CNN [22]
for the object detection channel and HED the for edge detection channel, are all based on the VGG16 model, we present this classical five pooling structure
in detail by “Conv Net” at the left side of the figure and represent it as a rectangular block named “Conv Net”. Especially in foreground segmentation and
object detection channels, arrows pointing from “Conv Net” denote the output of the “Conv Net”, whereas in the edge detection channel they represent the
output of deep supervisions. In the foreground segmentation channel, strides of the last two pooling layers of “Conv Net” are set as 1; dilated convolution is
applied to convolution layers leading to the higher resolution of feature maps (as annotated in brackets in blue). In edge detection channel and object detection
channel, the stride of pool4 and pool5 is 2. The ‘×2’ in brackets means that there are two convolutional layers.
This process is delivered through the convolutional layer. The
back propagation enables the network to learn relative levels
of importance of edge predictions under different scales.
We train the edge detection channel using sigmoid cross
entropy loss.
C. Object Detection Channel
The object detection channel detects glands and their locations in the image.
Object detection is helpful in counting and identifying
the range of objects. According to some previous works on
instance segmentation, such as MNC [16], confirmation of the
bounding-box is usually the first step in instance segmentation.
After that, segmentation and other options are carried out
within bounding boxes. Though this method is widely recognized, the loss of context information caused by the limited
receptive field of bounding-box may exacerbate segmentation
results. Consequently, we integrate location information into
the fusion network instead of segmenting instances within
bounding boxes. To obtain location information, Faster RCNN, a state-of-the-art object detection model, is conceived.
Convolutional layers are applied to extract feature maps from
images. After that, the Region Proposal Network (RPN) takes
an arbitrary-sized feature map as input and produces a set of
bounding-boxes with the probability of objects. Region proposals will be converted into regions of interest and classified
to form the final object detection result.
Filling is done in order to transform the bounding box
prediction into a new formation that represents the number
of bounding boxes that every pixel belongs to. The value of
each pixel in regions covered by the bounding boxes equals
the number of bounding boxes it belongs to. For example, if
a pixel is in the overlapping area of three bounding boxes, the
value of that pixel will be three. wd is denoted as the parameter
of Faster R-CNN and φ represents the filling operation. The
output of this channel is
Pd (X, wd ) = φ (hd (X, wd )) .
(10)
hd (·) is the predicted coordinate of the bounding box.
We train the object detection channel using the same loss
as in Faster R-CNN [22]: the sum of a classification loss and
a regression loss.
D. Fusing Multichannel
Merely receiving the information of these three channels is
not the ultimate purpose of our algorithm. As a result, a fusion
algorithm is of great importance to maximize synergies of the
three kinds of information - region, location and boundary
cues. It is hard for an algorithm which is not learning-based
to recognize the patterns of all this information. Naturally, a
CNN based solution is the best choice.
After obtaining outputs of these three channels, a shallow
seven-layer convolutional neural network is used to combine
information and yield the final result. To reduce information
loss and ensure a sufficiently large reception field, we again
replace downsampling with dilated convolution. The architecture of fusion network is designed by cross validation.
We gradually increase the number layers and filters until the
performance no longer improves.
7
We denote wf as the parameter of this network and hf as
the hidden layer. Thus the output of the network is
P (YI∗ = k | Ps , Pd , Pe ; wf ) = µk (hf (Ps , Pd , Pe , wf )) .
(11)
As mentioned above, in this case, there are two categories,
k=2. YI∗ is the instance segmentation prediction.
We train the fusion network using softmax cross entropy
loss.
V. E XPERIMENT
A. Dataset
Our method is evaluated on the dataset provided by the
MICCAI 2015 Gland Segmentation Challenge Contest [12].
The dataset consists of 165 labeled colorectal cancer histological images scanned by Zeiss MIRAX MIDI. The image
resolution is approximately 0.62m per pixel. Original images
are in different sizes, while most of them are 775 × 522. 85
images belong to the training set and 80 are part of test sets
(test set A contains 60 images and test set B contains 20
images). There are 37 benign sections and 48 malignant ones
in the training set, 33 benign sections and 27 malignant ones
in testing set A and 4 benign sections and 16 malignant ones
in testing set B.
B. Data augmentation and Preprocessing
We first preprocess data by performing per channel zero
mean. The next step is to generate edge labels from region labels and perform dilation on edge labels afterwards. A bounding box for a gland is the smallest rectangle that can encircle
k
k
)
,ymax
the gland. Bounding box ground truth (xkmin ,xkmax ,ymin
k
can be generated from segmentation label, in which, xmin =
k
=
min(Px |P ∈ Rk ), xkmax = max(Px |P ∈ Rk ), ymin
k
min(yx |P ∈ Rk ), and ymax = max(Py |P ∈ Rk ). Rk is the
kth region of the instance ground truth and P denotes a
pixel point in Rk . Px and Py represent the X-coordinate
and Y-coordinate of P . Whether a pixel is an edge or not
is decided by its four nearest pixels (over, below, right and
left) in the region label. If all four pixels in the region
label belong to the foreground or in the background, this
pixel does not belong to any edge. To enhance performance
and combat overfitting, copious amounts of training data are
needed. Given the circumstance of the absence of a large
dataset, data augmentation is essential before training. Two
strategies for data augmentation have been carried out and the
improvement of results is strong enough evidence to prove
the efficiency of data augmentation. In Strategy I, horizontal
flipping and rotation operation (0◦ , 90◦ , 180◦ , 270◦ ) are
used in training images. Besides operations in Strategy I,
Strategy II also includes elastic transformation, such as pin
cushion transformation and barrel transformation. Deformation
of original images is beneficial to increasing robustness and the
promotion of the final result. Since the fully-connected layer
is replaced by convolutional layer, FCN takes arbitrary size
images as testing inputs. After data augmentation, a 400 × 400
region is randomly cropped from the original image as input.
C. Hyperparameter
CAFFE [37] is used in our experiments. Experiments are
carried out on K40 GPU and the CUDA edition is 7.0. The
weight decay is 0.002, the momentum is 0.9. While training
the foreground labeling/segmentation channel of the network,
the learning rate is 103 and the parameters are initialized
by pre-trained FCN32s model [20], while the edge detection
channel is trained under the learning rate of 109 and the Xavier
initialization is performed. object detection channel is trained
under the learning rate of 10−3 and initialized by pretrained
Faster R-CNN model. Fusion is learned under the learning rate
of 10−3 and initialized by Xavier initialization.
D. Evaluation
The evaluation method is the same as the competition
requires. Three indicators are used to evaluate the performance
on test A and test B. Indicators assess detection results,
segmentation performance and shape similarity respectively.
The final score is the summation of six rankings and the
smaller the better. Since image amounts of test A and test B
have a significant difference in quantity, we not only calculate
the rank sum as the host of MICCAI 2015 Gland Segmentation
Challenge Contest demands, but we also list the weighted rank
sum. We calculate the weighted average of three evaluation
criteria on test set A and test set B. Since the images in test
A account for 3/4 of the test set and images in test B account
for 1/4, the weighted rank sum is calculated as:
X
X
W eightedRS = 3/4
testARank + 1/4
testBRank.
(12)
The evaluation program is given by the MICCAI 2015 Gland
Segmentation Challenge Contest [12]. The first criterion is
the F1 score, which reflects gland detection accuracy. The
segmented glandular object of True Positive (TP) is the object
that shares more than 50% of areas with the ground truth.
Otherwise, the segmented area will be determined as a False
Positive (FP). Objects of ground truth without corresponding
prediction are considered as False Negatives (FN).
F1
Score =
2 · P recision · Recall
P recision + Recall
(13)
TP
TP + FP
(14)
P recision =
Recall =
TP
TP + FN
(15)
Dice is the second criterion for evaluating segmentation
performance. The dice index of the whole image is
D(G, S) =
2(| G ∩ S |)
,
|G|+|S|
(16)
of which G represents the ground truth and S is the segmented
result. Unfortunately, it is not able to differentiate instances of
the same class. Further, we denote G as a set of all ground
truth objects and S as a set of all segmented objects. Si
denotes the ith segmented object in an image and Gi denotes
a ground truth object that maximally overlaps Si in the image.
8
TABLE I
P ERFORMANCE IN C OMPARISON TO OTHER M ETHODS
Method
FCN [20]
dilated FCN [38]
Ours
CUMedVision2 [24]
ExB3 [12]
ExB2 [12]
ExB1 [12]
Frerburg2 [31]
Frerburg1 [31]
CUMedVision1 [24]
CVIP Dundee
LIB
CVML
vision4GlaS
1
2
Part
Score
0.788
0.854
0.893
0.912
0.896
0.892
0.891
0.870
0.834
0.868
0.863
0.777
0.652
0.635
F1 Score
A
Part
Rank Score
11
0.764
9
0.798
3
0.843
1
0.716
2
0.719
4
0.686
5
0.703
6
0.695
10
0.605
7
0.769
8
0.633
12
0.306
13
0.541
14
0.527
B
Rank
4
2
1
6
5
9
7
8
11
3
10
14
12
13
Part
Score
0.813
0.879
0.908
0.897
0.886
0.884
0.882
0.876
0.875
0.867
0.870
0.781
0.644
0.737
ObjectDice
A
Part
Rank Score
11
0.796
6
0.825
1
0.833
2
0.781
3
0.765
4
0.754
5
0.786
7
0.786
8
0.783
10
0.800
9
0.715
12
0.617
14
0.654
13
0.610
B
Rank
4
2
1
8
9
10
5
6
7
3
11
13
12
14
ObjectHausdorff
Part A
Part B
Score
Rank
Score
Rank
95.054
11
146.2478
4
62.216
9
118.734
2
44.129
1
116.821
1
45.418
2
160.347
9
57.350
6
159.873
8
54.785
3
187.442
11
57.413
7
145.575
3
57.093
4
148.463
6
57.194
5
146.607
5
74.596
10
153.646
7
58.339
8
209.048
13
112.706
13
190.447
12
155.433
14
176.244
10
107.491
12
210.105
14
RS1
WRS2
45
30
8
28
33
41
32
37
46
40
59
76
75
80
27.75
19.5
4.5
9.5
13.75
15.75
16.5
17.75
23
23.5
27.25
37.5
39.25
39.5
RS is the abbreviation for rank sum.
WRS is the abbreviation for weighted rank sum.
e i denotes the ith ground truth object in and image and Sei
G
denotes a segmented object that maximally overlaps in the
image. As a result, an object-level dice score is employed to
evaluate segmentation results. The definition is as follows:
"n
#
nG
S
X
X
e i , Sei ) ,
Dobject (G, S) = 1/2
wi D(Gi , Si ) +
w
ei D(G
i=1
i=1
(17)
| Si |
wi = PnS
,
j=1 | Sj |
(18)
ei |
|G
.
w
ei = PnG
e
j=1 | Gj |
(19)
nS and nG are the numbers of instances in the segmented
results and the ground truth.
Shape similarity reflects the performance on morphology
likelihood which plays a significant role in gland instance
segmentation. Hausdorff distance is exploited to evaluate shape
similarity. To assess glands respectively, the index of Hausdorff distance deforms from the original formation:
H(G, S) = max supinf kx − yk , supinf kx − yk ,
xG yS
yS xG
(20)
to the object-level formation:
"n
#
nG
s
X
X
e i , Sei ) ,
Hobject (S, G) = 1/2
wi H(Gi , Si ) +
w
ei H(G
i=1
where
i=1
(21)
|Si |
wi = PnS
,
j=1 |Sj |
(22)
ei |
|G
w
ei = PnG
.
e
j=1 |Gj |
(23)
Similar to the object-level dice, index nS and nG represent
instances of segmented objects and the ground truth.
E. Result and Discussion
Table I lists results of our proposed algorithm, FCN, dilated FCN and other participants on datasets provided by the
MICCAI 2015 Gland Segmentation Challenge Contest.
In the table, RS and WRS denote rank sum and weighted
rank sum respectively. We rearrange the scores and ranks in
this table. Our method outranks FCN, dilated FCN and other
participants based on both rank sum and weighted rank sum.
Compared to FCN and dilated FCN, our algorithm obtains
better scores which is convincing evidence that our work is
more effective in solving instance segmentation problems in
histological images. Though dilated FCN performs better than
FCN as the dilated convolution process has less pooling and
covers larger receptive fields, our algorithm combines region,
location and edge information to achieve higher scores in the
dataset. The reason our algorithm ranks higher is because
most adjacent glandular structures have been separated, which
is more beneficial to meet the evaluation index of instance
segmentation, whereas in FCN and dilated FCN they are not.
Comparison results are illustrated in Fig. 6.
Ranks of test A are generally higher than test B due
to the inconsistency of data distribution. In test A, most
images are normal ones whereas test B contains a majority
of cancerous images which are more complicated in shape
and larger in size. Hence, a larger receptive field is required
in order to detect cancerous glands. However, before we
exploit dilated convolution, the downsampling layer not only
gives the network a larger receptive field but also makes the
resolution of the feature map decrease, thus it deteriorates
the segmentation results. Dilated convolution empowers the
convolutional neural network with a larger receptive field
with fewer downsampling layers. Our multichannel algorithm
enhances performance based on the dilated FCN by adding
two channels - edge detection and object detection.
Since the differences between background and foreground
in histopathological images are small (3th row of Fig. 6),
FCN and dilated FCN sometimes predict the background pixel
9
Fig. 6. From left to right: original image, ground truth, results of FCN [20], FCN with dilated convolution and the proposed algorithm. Compared to FCN and
dilated FCN, most adjacent glandular structures are separated (as shown inside the red solid boxes) which indicates that our algorithm accomplishes instance
segmentation. Besides, our algorithm is able to correctly judge the small isolated area as non-gland area (as shown inside the red dotted boxes). However, a
few glands that are broken apart escape the detection of our model (as shown inside the black boxes). The bad performance in the last row is due to the fact
that in most samples the white area is recognized as cytoplasm whereas in this sample, the white area is the background.
as gland, raising the false positive rate. The multichannel
algorithm abates the false positive by adding pixel context
while predicting object location.
Compared to CUMedVision1 [24], CUMedVision2 [24]
adds edge information which improves the results of test A
but those of test B deteriorate. Our method improves results
of test A and test B after combining edge and location context.
However, white regions in gland histopathological images
are of two kinds: 1) cytoplasm; and 2) no cell or tissue (background). The difference between these two is that cytoplasm
usually appears surrounded by nuclei or other stained tissue.
In the image of the last row in Fig. 6, glands encircle some
white regions with no existence of cell or tissue causing the
algorithm to mistake them for cytoplasm. As for images of
the 4th and 5th row in Fig. 6, glands are split when cutting
images, which is the reason that cytoplasm is mistaken for
background.
Comparison with instance segmentation methods Cur-
rently, methods suitable for instance segmentation of natural
scene images predict instances based on detection or proposal,
such as SDS [14], Hypercolumn [15] and MNC [16]. One
problem with this logic is its dependence on the precision
of detection or proposal. If the object or a certain pixel of
an object escapes the detection, it will evade the subsequent
segmentation as well. Besides, the segmentation being restricted to a certain bounding box will have little access to
context information hence it impacts the result. Under the
condition of bounding boxes overlapping one another, which
instance the pixel in the overlapping region belongs to cannot
be determined. The overlapping area falls into the category of
the nearest gland in our experiment. The experiment results
are presented in Fig. 7.
To further demonstrate the defect of the cascade architecture, we design a baseline experiment. We first perform gland
detection and then segment gland instances inside bounding
10
Fig. 7. From left to right: original image, ground truth, results of SDS [14], Hypercolumn [15], MNC [16] and the proposed algorithm. Different color regions
represent different gland instances. SDS, Hypercolumn and MNC all perform masking inside bounding boxes produced by object detection, which causes the
coarse boundary of gland instances and even neglects some glands. In the second column, one gland instance is missed by manual labeling but our algorithm
successfully detects its location and segments it with relatively complete shape, yet SDS, Hypercolumn and MNC fail to detect this gland (as shown inside
of the red boxes).
TABLE II
C OMPARISON WITH INSTANCE SEGMENTATION METHODS
Method
HyperColumn [15]
MNC [16]
SDS [14]
BOX->dilated FCN [38]+EDGE3
OURS
F1 Score
Part A
Part B
0.852
0.691
0.856
0.701
0.545
0.322
0.807
0.700
0.893
0.843
boxes. There is a shallow network (same as the fusion network) combining foreground segmentation and edge detection
information to generate the final result. Configurations of all
experiments are set the same as our method. Results are shown
in Table II and less effective than the proposed algorithm.
F. Ablation Experiment
1) Data Augmentation Strategy: Data augmentation contributes to performance enhancement and overfitting elimination. We observe through experiments that adequate transformation of gland images is beneficial to training. This is
because glands naturally form in various shapes and cancerous
glands are more different in morphology. Here we evaluate the
effect on results of the foreground segmentation channel using
Strategy I and Strategy II (as shown in Table III).
2) Plausibility of Channels: In convolutional neural networks, the main purpose of downsampling is to enlarge the
receptive field, but this comes at a cost of decreased resolution
and information loss of original data. Feature maps with low
resolution increase the difficulty of upsample layer training.
The representational ability of feature maps is reduced after
upsampling and further leads to inferior segmentation results.
ObjectDice
Part A
Part B
0.742
0.653
0.793
0.705
0.647
0.495
0.790
0.696
0.908
0.833
ObjectHausdorff
Part A
Part B
119.441
190.384
85.208
190.323
116.833
229.853
114.230
197.360
44.129
116.821
TABLE III
DATA AUGMENTATION S TRATEGY COMPARISON
F1 Score
ObjectDice
ObjectHausdorff
Part A Part B Part A Part B Part A
Part B
FCN [20]
0.709 0.708 0.748 0.779 129.941 159.639
Strategy I
dilated FCN [38] 0.820 0.749 0.843 0.811 79.768 131.639
FCN [20]
0.788 0.764 0.813 0.796 95.054 146.248
Strategy II
dilated FCN [38] 0.854 0.798 0.879 0.825 62.216 118.734
Strategy
Method
Another drawback of downsampling is the space invariance
it introduces whereas segmentation is space sensitive. The
inconsistence between downsampling and image segmentation
is obvious. Dilated convolution empowers the convolutional
neural network with larger receptive field with less downsampling layers.
The comparison between segmentation performances of
FCN with and without dilated convolution shows its effectiveness in enhancing segmentation precision. The foreground
segmentation channel with dilated convolution improves the
performance of the multichannel algorithm. So does the fusion
stage with dilated convolution.
Pixels belonging to the edge occupy an extremely small
11
proportion of the whole image. The imbalance between edge
and non-edge poses a significant barrier to network training
that the network may not convergent. Edge dilation can
alleviate the imbalance and improve edge detection precision.
To prove that these three channels truly improve instance
segmentation performance, we conduct the following two
baseline experiments: a) we launch a foreground segmentation
channel and an edge detection channel; b) we launch a foreground segmentation channel and an object detection channel.
The results favor the three-channel algorithm. Results from the
experiments mentioned above are presented in Table IV.
TABLE IV
P LAUSIBILITY OF C HANNELS .
F1 Score
ObjectDice
Part A Part B Part A Part B
MC: FCN + EDGE1 + BOX
0.863 0.784 0.884 0.833
MC: FCN + EDGE3 + BOX
0.886 0.795 0.901 0.840
MC: dilated FCN + EDGE3 + BOX 0.890 0.816 0.905 0.841
DMC: FCN + EDGE3 + BOX
0.893 0.803 0.903 0.846
DMC: dilated FCN + EDGE3 + BOX 0.893 0.843 0.908 0.833
DMC: dilated FCN + EDGE1 + BOX 0.876 0.824 0.894 0.826
DMC: dilated FCN + BOX
0.876 0.815 0.893 0.808
DMC: dilated FCN + EDGE3
0.874 0.816 0.904 0.832
Method
ObjectHausdorff
Part A Part B
57.519 108.825
49.578 100.681
47.081 107.413
47.510 97.440
44.129 116.821
50.028 123.881
50.823 132.816
46.307 109.174
We denote DMC as the fusion network with dilated convolution [38] and
MC as the fusion network without dilated convolution. EDGE1 represents
that edge label are not dilated whereas EDGE3 represents that edge label
are dilated by a disk filter with radius of 3. BOX indicates that the method
includes object detection [22]. FCN [20] and dilated FCN [38] indicates that
the method includes foreground segmentation.
VI. C ONCLUSION
We propose a new algorithm called deep multichannel
neural networks. The proposed algorithm exploits features of
edge, region and location in a multichannel manner to generate instance segmentation. We observe state-of-the-art results
on the dataset from the MICCAI 2015 Gland Segmentation
Challenge. A series of baseline experiments are conducted to
prove the superiority of this method.
In future work, this algorithm can be expanded to instance
segmentation of other medical images.
ACKNOWLEDGMENT
We thank the MICCAI 2015 Gland Segmentation Challenge
for providing dataset. We thank Zhuowen Tu for all the help.
R EFERENCES
[1] W. D. Travis et al., “International association for the study of lung
cancer/american thoracic society/european respiratory society international multidisciplinary classification of lung adenocarcinoma,” Journal
of Thoracic Oncology, vol. 6, no. 2, pp. 244–285, 2011.
[2] K. Nguyen, A. Sarkar, and A. K. Jain, “Structure and context in prostatic
gland segmentation and classification,” in MICCAI. Springer, 2012, pp.
115–123.
[3] Y. Al-Kofahi et al., “Improved automatic detection and segmentation of
cell nuclei in histopathology images,” IEEE Transactions on Biomedical
Engineering, vol. 57, no. 4, pp. 841–852, 2010.
[4] M. Veta et al., “Automatic nuclei segmentation in h&e stained breast
cancer histopathology images,” PloS one, vol. 8, no. 7, p. e70221, 2013.
[5] S. Dimopoulos et al., “Accurate cell segmentation in microscopy images
using membrane patterns,” Bioinformatics, vol. 30, no. 18, pp. 2644–
2651, 2014.
[6] S. Naik et al., “Gland segmentation and computerized gleason grading
of prostate histology by integrating low-, high-level and domain specific
information,” in MIAAB workshop, 2007, pp. 1–8.
[7] K. Nguyen, A. K. Jain, and R. L. Allen, “Automated gland segmentation
and classification for gleason grading of prostate tissue images,” in
ICPR, 2010, pp. 1497–1500.
[8] S. Naik et al., “Automated gland and nuclei segmentation for grading of
prostate and breast cancer histopathology,” in ISBI, 2008, pp. 284–287.
[9] A. Paul and D. P. Mukherjee, “Gland segmentation from histology
images using informative morphological scale space,” in ICIP, 2016,
pp. 4121–4125.
[10] J. Egger, “Pcg-cut: graph driven segmentation of the prostate central
gland,” PloS one, vol. 8, no. 10, p. e76645, 2013.
[11] A. B. Tosun and C. Gunduz-Demir, “Graph run-length matrices for
histopathological image segmentation,” IEEE Trans. Medical Imaging,
vol. 30, no. 3, pp. 721–732, 2011.
[12] K. Sirinukunwattana et al., “Gland segmentation in colon histology
images: The glas challenge contest,” Medical Image Analysis, vol. 35,
pp. 489–502, 2016.
[13] M. Fleming et al., “Colorectal carcinoma: pathologic aspects,” Journal
of gastrointestinal oncology, vol. 3, no. 3, pp. 153–173, 2012.
[14] B. Hariharan et al., “Simultaneous detection and segmentation,” in
ECCV, 2014, pp. 297–312.
[15] ——, “Hypercolumns for object segmentation and fine-grained localization,” in CVPR, 2015, pp. 447–456.
[16] J. Dai, K. He, and J. Sun, “Instance-aware semantic segmentation via
multi-task network cascades,” in CVPR, 2016, pp. 3150–3158.
[17] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification
with deep convolutional neural networks,” in NIPS, 2012, pp. 1097–
1105.
[18] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
large-scale image recognition,” in ICLR, 2015.
[19] R. Girshick, “Fast r-cnn,” in ICCV, 2015, pp. 1440–1448.
[20] J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks
for semantic segmentation,” in CVPR, 2015, pp. 3431–3440.
[21] S. Xie and Z. Tu, “Holistically-nested edge detection,” in ICCV, 2015,
pp. 1395–1403.
[22] S. Ren et al., “Faster r-cnn: Towards real-time object detection with
region proposal networks,” in NIPS, 2015, pp. 91–99.
[23] R. Girshick et al., “Rich feature hierarchies for accurate object detection
and semantic segmentation,” in CVPR, 2014, pp. 580–587.
[24] H. Chen et al., “Dcan: Deep contour-aware networks for accurate gland
segmentation,” in CVPR, 2016, pp. 2487–2496.
[25] L. Jin, Z. Chen, and Z. Tu, “Object detection free instance segmentation
with labeling transformations,” arXiv preprint arXiv:1611.08991, 2016.
[26] P. Kainz, M. Pfeiffer, and M. Urschler, “Semantic segmentation of
colon glands with deep convolutional neural networks and total variation
segmentation,” arXiv preprint arXiv:1511.06919, 2015.
[27] K. Sirinukunwattana, D. R. Snead, and N. M. Rajpoot, “A stochastic
polygons model for glandular structures in colon histology images,”
IEEE Trans. Medical Imaging, vol. 34, no. 11, pp. 2366–2378, 2015.
[28] B. B. Cheikh, P. Bertheau, and D. Racoceanu, “A structure-based
approach for colon gland segmentation in digital pathology,” in SPIE,
2016, pp. 97 910J–97 910J.
[29] K. Nguyen, B. Sabata, and A. K. Jain, “Prostate cancer grading:
Gland segmentation and structural features,” Pattern Recognition Letters,
vol. 33, no. 7, pp. 951–961, 2012.
[30] W. Li et al., “Gland segmentation in colon histology images using handcrafted features and convolutional neural networks,” in ISBI, 2016, pp.
1405–1408.
[31] O. Ronneberger, P. Fischer, and T. Brox, “U-net: Convolutional networks
for biomedical image segmentation,” in MICCAI. Springer, 2015, pp.
234–241.
[32] Y. Xu et al., “Gland instance segmentation by deep multichannel side
supervision,” in MICCAI, 2016, pp. 496–504.
[33] P. Sermanet et al., “Overfeat: Integrated recognition, localization and
detection using convolutional networks,” in ICLR, 2014.
[34] D. Ciresan et al., “Deep neural networks segment neuronal membranes
in electron microscopy images,” in NIPS, 2012, pp. 2843–2851.
[35] F. Yu and V. Koltun, “Multi-scale context aggregation by dilated
convolutions,” arXiv preprint arXiv:1511.07122, 2015.
[36] C.-Y. Lee et al., “Deeply-supervised nets,” in AISTATS, 2015, pp. 562–
570.
[37] Y. Jia et al., “Caffe: Convolutional architecture for fast feature embedding,” in Proceedings of the 22nd ACM international conference on
Multimedia. ACM, 2014, pp. 675–678.
[38] L.-C. Chen et al., “Deeplab: Semantic image segmentation with deep
convolutional nets, atrous convolution, and fully connected crfs,” arXiv
preprint arXiv:1606.00915, 2016.
| 1cs.CV
|
RAMIFICATION OF WILD AUTOMORPHISMS OF LAURENT SERIES FIELDS
arXiv:1611.01077v1 [math.NT] 3 Nov 2016
KENZ KALLAL AND HUDSON KIRKPATRICK
Abstract. We study the structure of the Nottingham group N (Fp ) of power series f ∈ X · Fp [[X]]
with f ′ (0) = 1 where p > 2 is prime, which is isomorphic to the group of wild automorphisms of
Fp ((X)). We concern ourselves with power series g ∈ N (Fp ) with g ◦m 6= X for all m ≥ 1 (that
is, power series of infinite order in N (Fp )), and we determine a necessary and sufficient criterion
for such g ∈ N (Fp ) having ramification type in (g) = 3(1 + · · · + pn ) given a finite number of
coefficients of g. We also conjecture analogous results for higher ramification based on the results
of a computer program, generalizing Fransson’s 2016 theorem on 2-ramified power series, as well as
the work on minimally ramified power series used in a 2013 result of Lindahl and a 2015 result of
Lindahl–Rivera-Letelier.
1. Introduction
Let p be an odd prime, and consider the set of formal power series over Fp .
Definition 1.1. N (Fp ) is the group under composition of power series of the form
f (X) = X +
∞
X
ai X i ∈ Fp [[X]]
i=2
with coefficients ai ∈ Fp .
It is easy to see that N (Fp ) is a group by explicitly computing compositional inverses from a given
sequence of coefficients [7], and it is isomorphic to the group of wild automorphisms of Fp ((X)) [17].
N (Fp ), also known as the Nottingham group, is an example of a pro-p group (a compact topological
group which is an inverse limit of p-groups) which has recently received a considerable amount of
attention. The study of pro-p groups was originally motivated by number theory in the context of
Galois cohomology and notably discussed by Serre [20]. Since the 1960s, the Nottingham group has
become increasingly studied as a prototypical example and test case for group theorists studying
pro-p groups due to the ease of computation in the Nottingham group, which essentially amounts to
compositions of power series [3]. In particular, the Nottingham group and the computations associated
with it were introduced to group theory by Jennings [7], Johnson [8] and York [22, 21]. One of the
most important recent group-theoretic results on the Nottingham group is due to Leedham-Green–
Weiss and Camina [2]; it states that every finite p-group can be embedded in N (Fp ), and every
countably-based pro-p group can be embedded as a closed subgroup of N (Fp ).
We will only consider power series f ∈ N (Fp ) such that f ◦m (X) 6= X for all m ≥ 1 (that is,
elements of N (Fp ) of infinite order). This is because of a celebrated theorem of Klopsch [10] which
Date: November 3, 2016.
2010 Mathematics Subject Classification. 11S15, 11D88 (Primary), 20E36, 20E18 (Secondary).
1
classified all elements of N (Fp ) of order p up to conjugacy, and was generalized by Jean [6] and Lubin
[16] to order pn (see also [1]).
The number-theoretic work on the Nottingham group relies on ramification theory, which we now
introduce in part.
Definition 1.2 (Valuation). If f (X) ∈ Fp ((X)), then the X-adic valuation of f , valX (f ), is the
integer i such that f (X) ∈ X i Fp [[X]] and f (X) 6∈ X i+1 Fp [[X]]. If f is identically zero, then we write
that valX (f ) = +∞.
Definition 1.3 (Ramification). The ramification number of f ∈ Fp ((X)) is
i(f ) := valX (f (X) − X) − 1.
n
We will frequently mention the “nth ramification number” of f , that is, in (f ) := i(f ◦p ). It is
immediate that conjugation in N (Fp ) preserves ramification. That is, for all f, g ∈ N (Fp ),
i(g ◦ f ◦ g −1 ) = i(f ).
It is therefore natural to consider the power series with certain sequences of ramification numbers and
to classify them up to conjugacy.
Question 1.4. Let b ∈ N. Which conjugacy classes of power series f of infinite order in N (Fp ) have
ramification of the form in (f ) = b(1 + p + · · · + pn ) for all n ≥ 0 with p ∤ b?
We will justify the choice of ramification of this form (which we will write as “b-ramified”) with
Theorem 2.5, a powerful result of Laubie and Saïne which restricts it to that form under certain
conditions. Laubie, Movahhedi and Salinier [12] made progress on Question 1.4 in the case b = 1 by
using advanced tools in number theory to prove that all such elements of N (Fp ) must be conjugate
to powers of each other over some extension of Fp . Motivated by trying to understand power series
with ramification of this form for b ≥ 1, we consider the following question:
Question 1.5. Let b ∈ N with p ∤ b. Given a sequence {ai }i≥1 of coefficients in Fp , does
f (X) = X +
∞
X
ai X i+b ∈ N (Fp )
i=1
n
have ramification in (f ) = b(1 + · · · + p ) for all n ≥ 0?
We will write a1 , . . . , an as defined in Question 1.5 as the “first n nontrivial coefficients of f .”
Fransson [5] solved Question 1.5 for b = 2 by giving a finite polynomial condition on the ai ’s. This
itself is a generalization of the characterization of minimally ramified power series, which has been
used to prove many important theorems in nonarchimedean dynamical systems [12, 15, 13, 14, 18].
We prove the following result, answering Question 1.5 in the case b = 3:
P∞
Theorem 1.6. Let f (X) = X + i=1 ai X i+3 ∈ N (Fp ) be of infinite order in N (Fp ) for some prime
p > 3. Then in (f ) = 3(1+· · ·+pn ) for all n ≥ 0 if and only if a1 6= 0 and 2a41 −a32 +2a1 a2 a3 −a21 a4 6= 0.
Motivated by results of a computer program (see Appendix A), we also conjecture in Conjecture 4.2
that for all b ∈ N, there exists a polynomial Pb ∈ Z[x1 , . . . , xb+1 ] such that f ∈ N (Fp ) with i(f ) = b
is b-ramified if and only if Pb is nonzero when evaluated at the first b + 1 nontrivial coefficients of
f (as defined in Question 1.5) and p ∤ b. This reduces finding a polynomial criterion modulo large
2
products of primes for b-ramification to a finite computation. Assuming that Conjecture 4.2 is true,
these computations (also carried out by the SAGE program in Appendix A) give the following results:
Theorem 1.7. Assume Conjecture 4.2, and let b ∈ N and suppose
f (X) = X +
∞
X
ai X i+b ∈ N (Fp )
i=1
with i(f ) = b (i.e. a1 6= 0). Then there exists a polynomial Pb (X) ∈ Z[x1 , . . . , xb+1 ] such that
in (f ) = b(1 + · · · + pn ) for all n ≥ 0 if and only if p ∤ b and Pb (a1 , . . . , ab+1 ) 6= 0, where the first few
values of Pb modulo the product of the first 100 such primes (which is greater than 10200 ) are listed
below.
P1 = 2x21 − 2x2
P2 = 3x31 + 2x22 − 2x1 x3
P3 = 4x41 − 2x32 + 4x1 x2 x3 − 2x21 x4
P4 = 5x51 + 2x42 − 6x1 x22 x3 + 2x21 x23 + 4x21 x2 x4 − 2x31 x5
P5 = 6x61 − 2x52 + 8x1 x32 x3 − 6x21 x2 x23 − 6x21 x22 x4 + 4x31 x2 x5 − 2x41 x6
P6 = 7x71 + 2x62 − 10x1 x42 x3 − 11x21 x22 x23 − 2x31 x33 + 8x21 x32 x4 + 11x31 x2 x3 x4 + 2x41 x24
− 6x31 x22 x5 + 4x41 x3 x5 + 4x41 x2 x6 − 2x51 x7 .
Our program is capable of computing the Pb ’s from Theorem 1.7 in a reasonable amount of time
for b ≤ 50, though the number of terms becomes too large to display in this paper.
This paper is organized as follows. In Section 2, we describe the historical number-theoretic results
on ramification numbers of power series leading up to our work. In Sections 3 and 4, we give an explicit
computation of a necessary and sufficient criterion for power series of ramification in (f ) = 3(1+· · ·+pn )
for all n ≥ 0 and conjecture similar results in higher ramification based on the computations of our
computer program in Appendix A. In Section 5, we outline future directions for work on this problem.
2. Ramification of Power Series of Infinite Order
We set out with the goal of understanding the restrictions on the sequences of ramification numbers
of elements of infinite order in N (Fp ). The most important historical result with regard to this is due
to Sen [19, Theorem 1]:
Theorem 2.1 (Sen, 1969). Let f ∈ N (Fp ). Then for all n ∈ N,
in (f ) ≡ in−1 (f )
(mod pn ).
The proof of Sen’s Theorem can be done entirely with computations on power series. The following
corollary immediately follows from power series computations and Sen’s Theorem.
Corollary 2.2. Let f ∈ N (Fp ). Then for all n ≥ 0,
(2.3)
in (f ) ≥ 1 + p + · · · + pn .
3
Power series f ∈ N (Fp ) for which inequality holds in (2.3) are called minimally ramified. Much
more difficult to prove is Keating’s Theorem [9, Theorem 7], which gives a general form for in (f ) given
the first two ramification numbers. under certain conditions.
Theorem 2.4 (Keating, 1992). Suppose f ∈ N (Fp ) has infinite order. If i0 (f ) = 1 and i1 (f ) = 1 + bp
with 1 ≤ b ≤ p − 2, then in (f ) = 1 + bp + · · · + bpn .
We will use a powerful generalization of Theorem 2.4 from [11, Theorem 2].
Theorem 2.5 (Laubie and Saïne 1997). Let f ∈ N (Fp ) be of infinite order. Then the following hold:
(1) If p|i(f ), then in (f ) = pn i(f ) for all n ≥ 0.
(2) Otherwise, if i1 (f ) < (p2 − p + 1)i(f ), then
in (f ) = i(f ) + (1 + · · · + pn−1 )(i1 (f ) − i(f ))
It follows from Theorem 2.5 that if f ∈ N (Fp ) with i(f ) = b, i1 (f ) = b + bp and p ∤ b, then
in (f ) = b(1 + · · · + pn ). We write that a power series with ramification of this form is b-ramified, and
in answering Question 1.5 we seek to classify the b-ramified power series for certain values of b. The
special case b = 2 was solved in [5, Theorem 1]:
Theorem 2.6 (Fransson 2016). A given power series of infinite order given by f (X) = X +
P∞
i+2
∈ N (Fp ) is 2-ramified if and only if 3a33 + 2a24 − 2a2 a5 6= 0 and a1 6= 0.
i=1 ai X
We will prove a similar result for the 3-ramified power series, and conjecture a general result on all
b-ramified power series.
3. Classification of 3-Ramified Power Series
We will exploit Theorem 2.5 to classify the 3-ramified power series f (X) ∈ N (Fp ) based on a
polynomial condition on the first four non-trivial coefficients of f . For the remainder of this section,
we let
f (X) = X + a1 X 4 + a2 X 5 + · · · ∈ N (Fp )
be of infinite order in N (Fp ) for some prime p > 3 with a1 6= 0, so that i(f ) = 3.
Define the power series ∆m (X) such that
∆m+1 = ∆m ◦ f − ∆m ,
with ∆1 = f (X) − X. Note that by induction, valX (∆m ) ≥ 3m + 1. The following lemma is also true
by induction:
Lemma 3.1. Suppose m ∈ N. Then,
∆m (X) =
m
X
(−1)i
i=0
m ◦(m−i)
f
(X)
i
Since Fp has characteristic p, this corollary is immediate:
Corollary 3.2. ∆p (X) = f ◦p (X) − X.
4
Therefore, we let
∆m (X) = Am X 3m+1 + Bm X 3m+2 + Cm X 3m+3 + Dm X 3m+4 + · · · ,
and by Definition 1.3, i1 (f ) = 3(1 + p) if and only if valX (∆p ) = 3p + 4. Hence, by Theorem 2.5, f
is 3-ramified if and only if Ap = Bp = Cp = 0 and Dp 6= 0 in Fp . We wish to compute the values of
these first four coefficients of ∆p (X), so we find that modulo hX 3m+8 i,
∆m+1 (X) = Am (X + a1 X 4 + · · · )3m+1
+ Bm (X + a1 X 4 + · · · )3m+2
+ Cm (X + a1 X 4 + · · · )3m+3
+ Dm (X + a1 X 4 + · · · )3m+4
− (Am X 3m+1 + Bm X 3m+2 + Cm X 3m+3 + Dm X 3m+4 )
= (Am (3m + 1)a1 )X 3m+4
+ (Am (3m + 1)a2 + Bm (3m + 2)a1 )X 3m+5
+ (Am (3m + 1)a3 + Bm (3m + 2)a2 + Cm (3m + 3)a3 )X 3m+6
3m + 1
+ Am (3m + 1)a4
+ Am a21
2
!
+ Bm (3m + 2)a3 + Cm (3m + 3)a2 + Dm (3m + 4)a1 X 3m+7 .
From this, we obtain the recurrence
(3.3)
Am+1
Bm+1
Cm+1 =
Dm+1
Am
a1 (3m+1)
0
0
0
Bm
a2 (3m+1)
a1 (3m+2)
0
0
Cm
a3 (3m+1)
a2 (3m+2) a1 (3m+3)
0
Dm
+a4 (3m+1) a3 (3m+2) a2 (3m+3) a1 (3m+4)
a21 3m+1
2
with initial conditions Am = a1 , Bm = a2 , Cm = a3 , Dm = a4 . Now, we solve this recurrence for
the individual coefficients to compute Ap , Bp , Cp , Dp . The solutions follow from basic tools in solving
difference equations (see [4]), and we ultimately obtain that if n!!! is defined by 0!!! = 1!!! = 2!!! = 1
and n!!! = n(n−3)!!!, then the following hold:
(3.4)
Am = am
1 (3m−2)!!!
(3.5)
a2 am−1
1
Bm =
(3m−1)!!!+
m−1
X
r=1
Cm = a3 am−1
(3m)!!!+a3 am−1
1
1
(3r+1)!!!(3m−1)!!!
(3r+2)!!!
m−1
X
r=1
+a22 am−2
1
(3.6)
m−1
X
r=1
(3.7)
(3.8)
!
m−1
X (3m)!!!(3r+2)!!!
(3m)!!!(3r+1)!!!
+a22 am−2
1
(3r+3)!!!
(3r+3)!!!
r=1
r−1
(3m)!!! X (3n+1)!!!(3r+2)!!!
(3r+3)!!! n=1
(3n+2)!!!
Dm = α(m)am+1
+β(m)am−3
a32 +γ(m)am−2
a2 a3 +δ(m)am−1
a4
1
1
1
1
α(m) =
m−1
X
r=1
3r(3m+1)!!!
2(3r+4)
5
(3.9)
β(m) =
m−1
X
r=1
γ(m) =
m−1
X
r=1
(3.10)
(3.11)
n−1
r−1
X
X
(3m+1)!!!
(3j +1)!!!(3n+2)!!!
(3r+3)!!!
(3n+2)!!!+
(3r+4)!!! n=1 (3n+3)!!!
(3j +2)!!!
j=1
(3m+1)!!!
(3r+2)!!!+(3r+3)!!!
(3r+4)!!!
!
r−1
X
(3n+1)!!!(3r+2)!!! (3n+1)!!!(3r+3)!!!
+
+
(3n+2)!!!
(3n+3)!!!
n=1
δ(m) = (3m+1)!!!+
m−1
X
r=1
(3m+1)!!!
3r+4
It follows from (3.4), (3.5) and (3.6) that Ap = Bp = Cp = 0 in Fp . And since a1 6= 0, Fermat’s
Little Theorem gives
Dm = α(m)a41 +β(m)a32 +γ(m)a1 a2 a3 +δ(m)a21 a4 .
It is our goal to compute the coefficients α(p), β(p), γ(p), δ(p).
First, we define the inverse of 3 in Fp to be
(
(2p+1)/3, if p ≡ 1
t=
(p+1)/3, if p ≡ 2
(mod 3)
(mod 3)
.
We will repeatedly exploit the following simple fact.
Lemma 3.12. Let y ∈ {0, 1, 2} and x ∈ Z. Then in Fp ,
(3x+y)!!! = 3x
(x+yt)!
.
(yt)!
All equalities in this section are stated in Qp and reduced to Fp by dividing by nonzero elements
in Fp and cancelling factors of p. We will also write that nk = 0 when k < 0 or k > n.
We will use the following two lemmas repeatedly in our computations for the coefficients of Dp .
Lemma 3.13. Let 0 < r < p−1. Then
(r+1)! =
(−1)r
.
(p−r−2)!
The proof of Lemma 3.13 follows from Wilson’s Theorem and a simple computation in Fp .
Lemma 3.14.
p−1
X
r=1
(p+t−1)!
(r+1)! = 0.
(r+t+1)!
Proof. p+t−1
r+t+1 is non-zero in Fp when r+t+1 ≥ p, so applying Lemma 3.13 and separately considering
the r = p−1 term, we have
p−1
p−2
X
X
(p+t−1)!
p+t−1
(−1)r
(r+1)! =
(r+t+1)!
r+t+1
r=1
r=p−t−1
6
t−1
X
X
t−1
p+t−1
r−p−t−1 t−1
=
(−1)
=
(−1)
p+r
r
r=0
r=0
t−1
X
t−1
= 0.
= (−1)t
(−1)r
r
r=0
r−p−t−1
Proposition 3.15. α(p) = 2 in Fp .
Proof. By (3.8) and Lemma 3.12,
α(p) =
p−1
p−1
X
3r(3p+1)!!! X 3r(p+t)!
=
.
2(3r+4)
2(r+t+1)t!
r=1
r=1
The summand is nonzero only when r+t+1 = p so we have
3(p−t−1)(p+t)!
3t+3
=−
·(p−1)! = (−2)(−1) = 2
2p·t!
2
α(p) =
by Wilson’s Theorem.
Part of the computation of β(p) is given by the following lemma:
Lemma 3.16.
p−1
r−1
XX
(p−t)! t+p+1
(p+t)! (r+1)!
= 0.
·
·(n+2t)!
(r+t+1)! (n+1)!
(p+t)!
2t
r=1 n=1
Proof. By simple algebraic manipulations, we see that the sum above can be written
and we let
p−1 r−1
(p−t)! (p+t+1)! X X (p+t)! (r+1)! (n+2t)!
·
·
·
,
(p+t)! (p−t+1)! r=1 n=1 (r+t+1)! (n+1)! (2t)!
p+t+1
(p−t)! (p+t+1)!
·
=
∈ Fp ,
(p+t)! (p−t+1)!
p−t+1
which is constant with respect to the indices. Hence our original sum reduces to
c=
c
which is zero by Lemma 3.14.
p−1 X
r−1
X
(p+t)! (r+1)! (n+2t)!
·
·
(r+t+1)!
(n+1)! (2t)!
r=1 n=1
Proposition 3.17. β(p) = −1 in Fp .
Proof. Applying (3.9) gives that β(p) = β1 (p)+β2 (p) where
β1 (p) =
p−1
X
r=1
and
β2 (p) =
p−1
X
r=1
r−1
(3p+1)!!! X (3r+3)!!!
(3n+2)!!!
(3r+4)!!! n=1 (3n+3)!!!
r−1
n−1
(3p+1)!!! X (3r+3)!!! X (3j +1)!!!(3n+2)!!!
.
(3r+4)!!! n=1 (3n+3)!!! j=1
(3j +2)!!!
7
First, by Lemma 3.12
β1 (p) =
=
p−1
r−1
XX
(3p+1)!!!
(3r+3)!!!
·
·(3n+2)!!!
(3(r+1)+1)!!!
(3n+3)!!!
r=1 n=1
p−1
r−1
XX
(p+t)! (r+1)! (n+2t)!
·
·
.
(r+t+1)! (n+1)! (2t)!
r=1 n=1
Continuing our simplification, we have
1 n+2t
(n+2t)!
=
(2t)!(n+1)!
2t n+1
so that
r−1
X
r−1
(n+2t)!
1
r+2t
1 X n+2t
=
−1−2t .
=
(2t)!(n+1)!
2t n=1 n+1
2t
r
n=1
This means that by Lemma 3.14 and the Hockey Stick Identity,
p−1
p−1
1+2t X (p+t)!
t X (p+t−1)!(r+1)! r+2t
−
(r+1)!
β1 (p) =
2t r=1
(r+t+1)!
2t r=1 (r+t+1)!
r
p−1
p−1
1 X (p+t−1)!(r+1)! r+2t
1 X (p+t−1)!(r+2t)!
=
(r+1)
=
2 r=1
(r+t+1)!
2 r=1 (r+t+1)!(2t)!
r
p−1
(p+t−1)! X (r+2t)!
(r+t+1−t)
2(2t)! r=1 (r+t+1)!
p−1
r+2t
r+2t
(p+t−1)!t! X
−
=
r+t
2(2t)!
r+t+1
r=1
(p+t−1)!t!
p+2t
2t+1
p+2t
2t+1
=
−
−
+
.
2(2t)!
p+t−1
t
p+t
t+1
=
It trivially follows by expansion of each of the four terms that β1 (p) = 0.
On the other hand,
β2 (p) =
p−1 X
r−1 n−1
X
X (p+t)! (r+1)! (n+2t)! (k+t)!
·
·
(r+t+1)! (n+1)! (k+2t)! t!
r=1 n=1
k=1
p−1 X
r−1 n−1
X
X (p+t)! (r+1)! (n+2t)! (k+t+p)!
·
·
=
(r+t+1)! (n+1)! (k+2t)! (p+t)!
r=1 n=1 k=1
!
p−1 X
r−1
n−1
X
(p+t)! (r+1)!
(p−t)! X k+t+p
=
·
·(n+2t)!
(r+t+1)! (n+1)!
(p+t)!
k+2t
r=1 n=1
k=1
p−1 X
r−1
X
n+t+p
t+p+1
(p−t)!
(p+t)! (r+1)!
−
.
·
·(n+2t)!
=
(r+t+1)! (n+1)!
(p+t)!
n−1+2t
2t
r=1 n=1
By Lemma 3.16,
p−1 X
r−1
X
(p−t)! t+p+1
(p+t)! (r+1)!
=0
·
·(n+2t)!
(r+t+1)! (n+1)!
(p+t)!
2t
r=1 n=1
8
so from now on we will only consider
β2 (p) =
p−1
r−1
XX
(p+t)! (r+1)!
(p−t)! n+t+p
.
·
·(n+2t)!
(r+t+1)! (n+1)!
(p+t)! n−1+2t
r=1 n=1
Note that
(n+2t)! n+t+p
(n+t+p)!
(n+t+p)!
(n+2t)!
·
·
= (n+2t)·
.
=
(n+1)! n−1+2t
(n+1)! (n−1+2t)!(p−t+1)!
(n+1)!(p−t+1)!
Now accounting for the
(p−t)!
(p+t)!
factor, we have
(p−t)!
(n+t+p)!
n+2t (n+t)!
·(n+2t)·
=
·
.
(p+t)!
(n+1)!(p−t+1)!
p−t+1 t!(n+1)!
Hence,
β2 (p) =
p−1
r−1
XX
n+2t (n+t)!
(p+t)!
·(r+1)!·
·
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
p−1
r−1
XX
(p+t)!
n+2t+(t−1)−(t−1) (n+t)!
·(r+1)!·
·
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
p−1
r−1
XX
(n+t)!
t−1
(p+t)!
n+2t−(t−1)
·
·(r+1)!·
+
=
(r+t+1)!
p−t+1
p−t+1 t!(n+1)!
r=1 n=1
=
=
+
p−1
r−1
XX
(p+t)!
n+2t−(t−1) (n+t)!
·(r+1)!·
·
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
p−1
r−1
XX
t−1
(n+t)!
(p+t)!
·(r+1)!·
·
.
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
Breaking the sum apart, we define
R1 =
and
p−1
r−1
XX
n+2t−(t−1) (n+t)!
(p+t)!
·(r+1)!·
·
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
R2 =
p−1 X
r−1
X
(p+t)!
t−1
(n+t)!
·(r+1)!·
·
.
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
We will show R1 = 0 and R2 = −1. First,
R1 =
p−1
r−1
XX
(p+t)!
n+2t−(t−1) (n+t)!
·(r+1)!·
·
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
p−1
r−1
XX
(p+t)!
1
(n+t+1)!
·(r+1)!·
·
(r+t+1)!
p−t+1 t!(n+1)!
r=1 n=1
p−1
r−1
X (p+t)!
X
n+t+1
1
·(r+1)!
=
p−t+1 r=1 (r+t+1)!
n+1
n=1
p−1
X (p+t)!
1
r+t+1
=
·(r+1)!·
p−t+1 r=1 (r+t+1)!
r
=
9
p−1
X (p+t)!
1
=
·(r+1) = 0.
p−t+1 r=1 (t+1)!
Computing R2 , we have
R2 =
=
p−1
r−1
XX
(p+t)!
t−1
(n+t)!
·(r+1)!·
·
(r+t+1)!
p−t+1
t!(n+1)!
r=1 n=1
p−1
r−1
XX
(p+t)!
t−1 (n+t)!
·(r+1)!·
·
(r+t+1)!
−t+1
t!(n+1)!
r=1 n=1
=−
p−1 X
r−1
X
(p+t)!
(n+t)!
·(r+1)!·
(r+t+1)!
t!(n+1)!
r=1 n=1
p−1
r−1
X
(p+t)!
(n+t)!
1X
·(r+1)!
(r+t+1)!
t
(t−1)!(n+1)!
r=1
n=1
p−1
r−1
X (p+t)!
X n+t
= −3
·(r+1)!
n+1
(r+t+1)!
r=1
n=1
p−1
X (p+t)!
r+t
= −3
·(r+1)!
(r+t+1)!
r
r=1
=−
p−1
3 X (p+t)!
·(r+1).
=−
t! r=1 r+t+1
Every term in this sum is 0 except when r+t+1 = p, so
p−1
3 (p+t)!
3
3 X (p+t)!
·(r+1) = − ·
·(p−t)+0 = − ·(−t!)·(−t) = −3t = −1
−
t! r=1 r+t+1
t!
p
t!
Therefore we finally have β(p) = β1 (p)+β2 (p) = R1 +R2 = −1.
Proposition 3.18. γ(p) = 2 in Fp .
Proof. We compute each of the four terms in the sum given in (3.10). First, by Lemma 3.12,
p−1
X
r=1
p−1
X (p+t)! (r+2t)!
(3p+1)!!!
(3r+2)!!! =
·
(3r+4)!!!
(r+t+1)! (2t)!
r=1
p−1
X r+2t (p+t)!(t−1)!
·
=
t−1
(2t)!
r=1
p−1
(p+t)!(t−1)! X r+2t
=
(2t)!
t−1
r=1
(p+t)!(t−1)!
p+2t
2t+1
=
−
(2t)!
t
t
(p+t)!(t−1)! (p+2t)! (2t+1)!
−
=
(2t)!
(p+t)!t! (t+1)!t!
10
=
−p −p(2t+1)
−
= 0.
t
t(t+1)
Moreover, by Lemma 3.14 we have
p−1
X
(3p+1)!!!
r=1
(3r+4)!!!
(3r+3)!!! = 3
p−1
X
r=1
(p+t)!(r+1)!
= 0.
(r+t+1)!
Computing the double sums, we let
γ1 (p) =
p−1
r−1
XX
(3p+1)!!! (3r+2)!!!
·
·(3n+1)!!!
(3r+4)!!! (3n+2)!!!
r=1 n=1
p−1
r−1
XX
(p+t)!(r+2t)!(n+t)!
(r+t+1)!(n+2t)!t!
r=1 n=1
p−1
r−1
XX
(n+t)!
r+2t
(−p)
=
·(t−1)!
(n+2t)!
r+t+1
r=1 n=1
p−1
r−1
X r+2t X
(p+n+t)!
(t−1)!
=
(n+2t)!
r+t+1 n=1
r=1
p−1
r−1
X r+2t X
(p+n+t)!
= (−1)t
r+t+1 n=1 (n+2t)!(p−t)!
r=1
p−1
r−1
X r+2t X
p+n+t
t
= (−1)
r+t+1 n=1 n+2t
r=1
p−1
p−1
X r+2t
X r+2t p+r+t
t p+t+1
t
.
−(−1)
= (−1)
r+t+1
2t
r+t+1 r+2t−1
r=1
r=1
=
Applying the Hockey Stick Identity to the second term in the sum and checking both cases for t
depending on the value of p (mod 3) immediately gives that the second term is zero. Thus,
γ1 (p) = (−1)t
p−1
X
r=1
= (−1)t
p−1
X
r=1
=
r+2t
p+r+t
r+t+1 r+2t−1
(r+2t)!(p+r+t)!
(r+t+1)!(t−1)!(r+2t−1)!(p−t+1)!
p−1
X (r+2t)(−p)
(−1)t
.
(t−1)!(p−t+1)! r=1 (r+t+1)
Using the fact that (t−1)! = (−1)t /(p−t)! (which follows from Lemma 3.13), we get
p−1
γ1 (p) =
X (r+2t)(−p)
1
(p−t+1) r=1 (r+t+1)
The only nonzero term in the sum occurs when r+t+1 = p, which gives γ1 (p) = (1−t)/(1−t) = 1.
To compute the second double sum given by (3.10), we use Lemma 3.12 again to get
γ2 (p) =
p−1
r−1
XX
(3p+1)!!! (3r+3)!!!
·
·(3n+1)!!!
(3r+4)!!! (3n+3)!!!
r=1 n=1
11
p−1
r−1
XX
(p+t)!(r+1)!(n+t)!
(r+t+1)!(n+1)!t!
r=1 n=1
p−1
r−1
X (p+t)!(r+1)! X
n+t
=
t(r+t+1)! n=1 n+1
r=1
p−1
X (p+t)!(r+1)! r+t
−(t+1)
=
t(r+t+1)!
r
r=1
=
=
p−1
X
r=1
p−1
X
(p+t−1)!(r+1)!(r+t)!
(p+t−1)!(r+1)!
−(t+1)
.
(r+t+1)!r!t!
(r+t+1)!
r=1
The second sum is zero by Lemma 3.14, so
γ2 (p) =
p−1
X
r=1
−p(r+1)
.
t(r+t+1)
The only nonzero term in this sum occurs when r+t+1 = p, so γ2 (p) = (t−p)/t = 1. Therefore,
γ(p) = γ1 (p)+γ2 (p) = 2.
Proposition 3.19. δ(p) = −1 in Fp .
Proof. We compute that
δ(p) = (3p+1)!!!+
p−1
X
p−1
(3p+1)!!! X (p+t)!
(p+t)!
=
=
= (p−1)! = −1
3r+4
(r+t+1)t!
t!
r=1
r=1
by the same argument used in Lemma 3.15.
Theorem 1.6 follows from (3.7) and Propositions 3.15, 3.17, 3.18, and 3.19.
4. Generalizing the Classification
Given a positive integer b and an odd prime p such that p ∤ b, our SAGE program (given in
Appendix A) directly generalizes the logic in the computation of (3.3) to b-ramified elements f ∈
N (Fp ), giving b+1 polynomial conditions on the coefficients of f . For f defined as in Question 1.5,
we give the following recurrence for the first b+1 nontrivial coefficients of ∆m , which is as defined in
Section 3:
a1 (bm+1)
0
0···
0
A1,m
A1,m+1
A
A
a2 (bm+1)
a1 (bm+2)
0···
0
2,m
2,m+1
..
..
..
..
..
..
=
(4.1)
.
.
.
.
.
.
Ab,m
Ab,m+1
ab (bm+1)
···
a1 (bm+b)
0
Ab+1,m
Ab+1,m+1
+ab+1 (bm+1) ab (bm+2)
···
a1 (bm+b+1)
a21 bm+1
2
(note that the initial conditions are, by definition, An,1 = an ). In particular, An,m denotes the degree(bm+n) coefficient of ∆m , and we do not list the others since valx (∆m ) is trivially at least bm+1 by
the same argument used in the proof of (3.3).
12
It follows that by Corollary 3.2, a power series given by
f (X) = X +
∞
X
ai X i+b ∈ N (Fp )
i=1
is therefore b-ramified if and only if A1,p , . . . , Ab,p = 0 and Ab+1,p 6= 0. Our SAGE program treats
a1 , . . . , ab+1 as the indeterminants x0 , . . . , xb and computes the coefficients A1,p , . . . , Ab+1,p as polynomials in Fp [x0 , . . . , xb ] by repeatedly applying (4.1). Running this program for the first 100 odd
primes p such that p ∤ b for b ∈ {1, 2, . . . , 10}, the results suggest the following conjecture:
Conjecture 4.2. For all positive integers b, there exists a polynomial Pb ∈ Z[x1 , . . . , xb+1 ] such that
P
i+b
any f (X) = X + ∞
∈ N (Fp ) of infinite order is b-ramified if and only if p ∤ b, a1 6= 0 and
i=1 ai X
Pb (a1 , . . . , ab+1 ) 6= 0.
In other words, the first b polynomials given by the generalized recurrence (4.1) are identically
zero, and the coefficients of the last polynomial do not depend on p as long as p ∤ b. Although the
first part of this conjecture is most likely relatively simple to prove given that the recurrence is easily
generalizable, the second part, while supported by all of our numerical computations, gives much less
certainty in what direction a proof would proceed.
Assuming Conjecture 4.2 is true, it is possible for our SAGE program to compute the generalized
recurrence for a single prime q in order to guarantee the values of the coefficients of Pb modulo q.
Applying the program to a few large primes guarantees the coefficients modulo a very large product of
primes by the Chinese Remainder Theorem, which is likely to be the actual value of Pb . This makes
it easy to compute probable values of Pb for b up to around 50, each using a reasonably small amount
of computation time. Those results are omitted from this paper due to the large numbers of terms in
the resulting polynomials, though the first few are included in the statement of Theorem 1.7, which
indexes the indeterminants starting at x1 for readability.
5. Conclusion
In this paper, we use methods in number theory to prove a characterization of power series in
N (Fp ) with ramification restricted to the form b(1+· · ·+pn ) for certain values of b, as given by the
conclusion of a powerful theorem of Laubie and Saïne. We find a full proof of Theorem 1.6 for b = 3,
and give a conjecture that results in very probable criteria for higher values of b in Theorem 1.7, as
well as the ability to compute similar criteria for arbitrary ramification types of this form.
The numerical results given in Theorem 1.7 immediately show some patterns in the coefficients of
Pb , which, after considering more numerical data, could lead to a conjecture on the general form of
the ramification criteria in the future. Moreover, our conjecture that the first b polynomials given by
the recurrence are identically zero can most likely be proved in the general case from the tools we use
to prove Theorem 1.6 given the fact that the recurrences for those polynomials are given in a simple
and easily generalizable form. As we did for the 3-ramified case, it will most likely take an explicit
computation in the general case to determine that the coefficients are fixed with respect to p.
13
Appendix A. SAGE Program
The SAGE code below generates the b+1 polynomials from the generalized recurrence (4.1), which
give a necessary and sufficient criterion for b-ramification in N (Fp ) for a given b ∈ N and an odd prime
p such that p ∤ b. In particular, A(b, m, p) generates the matrix given by (4.1), and V (p, b) returns a
vector containing the polynomials A1,p , . . . , Ab+1,p .
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
def A (b , m , p ) :
R = P o l y n o m i a l R i n g ( GF ( p ) , b +1 , ’x ’)
M = [[0 for i in range ( b +1) ] for j in range ( b +1) ]
for i in range ( b +1) :
for j in range ( i +1) :
M [ i ][ j ] = R . gen (i - j )* ( b * m + j + 1)
M [ b ][0] = ( b * m + 1) * ( b * m ) /( GF ( p ) (2) )* ( R . gen (0) ) ^2
+ ( b * m + 1) * ( R . gen ( b ) )
return matrix (R , M )
def V (p , b ) :
R = P o l y n o m i a l R i n g ( GF ( p ) , b +1 , ’x ’)
a = []
for i in range ( b +1) :
a . append ( R . gen ( i ) )
v = vector (R , a )
for m in range (1 , p ) :
v = A (b , m , p ) * v
return ( v )
Acknowledgements
The results in this paper originated from a research lab project in PROMYS 2016. We are deeply
grateful to Laurent Berger and Sandra Rozensztajn for proposing this problem, and for their mentoring. We also thank our PROMYS research lab counselor Alyosha Latyntsev for his support, as well as
Krishanu Sankar, David Fried, Glenn Stevens, the PROMYS Foundation, and the Clay Mathematics
Institute for making this research possible.
References
[1] F. M. Bleher, T. Chinburg, B. Poonen, and P. Symonds. Automorphisms of Harbater-Katz-Gabber curves. ArXiv
e-prints, September 2015. arXiv:1509.02139.
[2] Rachel Camina. Subgroups of the nottingham group. Journal of Algebra, 196(1):101–113, 1997.
[3] M. du Sautoy, D. Segal, and A. Shalev. New Horizons in pro-p Groups. New Horizons in Pro-p Groups. Birkhäuser
Boston, 2000.
[4] Saber Elaydi. An introduction to difference equations. Springer Science & Business Media, 2005.
[5] J. Fransson. Complete classification of 2-ramified power series. ArXiv e-prints, January 2016. arXiv:1601.03622.
[6] Sandrine Jean. Conjugacy classes of series in positive characteristic and witt vectors. Journal de ThÃľorie des
Nombres de Bordeaux, 21(2):263–284, 2009.
[7] S.A. Jennings. Substitution groups of formal power series under substitution. Canad. J. Math, 6:325 – 340, 1954.
[8] D. L. Johnson. The group of formal power series under substitution. Journal of the Australian Mathematical
Society. Series A. Pure Mathematics and Statistics, 45(3):296–302, 04 2009.
14
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
Kevin Keating. Automorphisms and extensions of k((t)). Journal of Number Theory, 41(3):314 – 321, 1992.
Benjamin Klopsch. Automorphisms of the nottingham group. Journal of Algebra, 223(1):37 – 56, 2000.
F Laubie and M Saïne. Ramification of automorphisms of k((t)). Journal of Number Theory, 63(1):143 – 145, 1997.
François Laubie, Abbas Movahhedi, and Alain Salinier. Systèmes dynamiques non archimédiens et corps des norms
(non-archimedean dynamic systems and fields of norms). Compositio Mathematica, 132(1):57–98, 2002.
Karl-Olof Lindahl. The size of quadratic p-adic linearization disks. Advances in Mathematics, 248:872 – 894, 2013.
Karl-Olof Lindahl and Juan Rivera-Letelier. Optimal cycles in ultrametric dynamics and minimally ramified power
series. Compositio Mathematica, 152(1):187–222, 009 2015.
Jonathan Lubin. Nonarchimedean dynamical systems. Compositio Mathematica, 94(3):321–346, 1994.
Jonathan Lubin. Torsion in the nottingham group. Bulletin of the London Mathematical Society, 43(3), 2011.
Benjamin Muckenhoupt. Automorphisms of formal power series under substitution. Transactions of the American
Mathematical Society, 99(3):373–383, 1961.
J. Riviera-Letelier. Dynamique des fonctions rationelles sur des corps locaux. PhD thesis, Universite de Paris XI,
2000.
Shankar Sen. On automorphisms of local fields. Annals of Mathematics, 90(1):33–46, 1969.
J.P. Serre. Galois Cohomology. Berlin, 1997.
I.O. York. The exponent of certain p-groups. Proc. Edinburgh Math. Soc., 33:483–490, 1990.
I.O. York. The group of formal power series under substitution. PhD thesis, Nottingham University, 1990.
15
| 4math.GR
|
A new class of metrics for spike trains
Cătălin V. Rusu1,2,3 and Răzvan V. Florian1
arXiv:1209.2918v3 [cs.IT] 17 Jan 2014
1
Center for Cognitive and Neural Studies (Coneural), Romanian
Institute of Science and Technology, Cluj-Napoca, Romania
2
Computer Science Department, Babeş-Bolyai University,
Cluj-Napoca, Romania
3
Frankfurt Institute for Advanced Studies, Frankfurt am Main,
Germany
Abstract
The distance between a pair of spike trains, quantifying the differences between them, can be measured using various metrics. Here we introduce a new
class of spike train metrics, inspired by the Pompeiu-Hausdorff distance, and
compare them with existing metrics. Some of our new metrics (the modulusmetric and the max-metric) have characteristics that are qualitatively different than those of classical metrics like the van Rossum distance or the Victor
& Purpura distance. The modulus-metric and the max-metric are particularly
suitable for measuring distances between spike trains where information is encoded in bursts, but the number and the timing of spikes inside a burst does
not carry information. The modulus-metric does not depend on any parameters and can be computed using a fast algorithm, in a time that depends linearly on the number of spikes in the two spike trains. We also introduce localized versions of the new metrics, which could have the biologically-relevant
interpretation of measuring the differences between spike trains as they are
perceived at a particular moment in time by a neuron receiving these spike
trains.
An edited version has been published in Neural Computation 26(2), pp. 306–
348, 2014, http://dx.doi.org/10.1162/NECO_a_00545
Rate or review this paper at http://epistemio.com/p/r43uM8ke
1
1 Introduction
In recent years several spike train distances, some inspired by existing mathematical distances while others not, have been proposed and used to measure the variability of the neural activity (Victor and Purpura, 1996, 1997; van Rossum, 2001;
Schreiber et al., 2003; Victor, 2005; Schrauwen et al., 2007; Kreuz et al., 2007, 2009;
Naud et al., 2011; Kreuz et al., 2011, 2013). The distance between two spike trains
reflects their similarity or dissimilarity. Because how information is represented in
the spatio-temporal patterns of spike times exchanged by neurons is still a heavily
debated topic in neuroscience, metrics based on different neural codes are available. Traditionally it was thought that the mean firing rate of neurons encapsulated all the relevant information exchanged by neurons. This idea dates back to
the work of Adrian (1926) who showed that the firing rate of motor neurons is proportional to the force applied. More recently, scientists have revealed increasing
evidence of the importance of precise spike timings to representing information in
the brain (Bohte, 2004; VanRullen et al., 2005; Tiesinga et al., 2008). For example,
temporally-structured multicell spiking patterns were observed in the hippocampus and cortex, and were associated to memory traces (Nádasdy et al., 1999; Ji and
Wilson, 2007) while the coding of information in the phases of spikes relative to a
background oscillation has been observed in many brain regions (Lee et al., 2005;
Jacobs et al., 2007; Fries et al., 2007; Montemurro et al., 2008; Siegel et al., 2009).
This change in viewpoints from rate codes to spike-time codes is also reflected in
spike train metrics.
The most basic metrics are the ones that rely on counting the total number
of spikes within a spike train. A major drawback of such an approach is that all
the temporal structure is lost. Even though binning techniques were introduced
as a way to overcome this loss by dividing the spike train into discrete bins, the
temporally–encoded information within a bin was neglected (Geisler et al., 1991).
Other, more complex spike train metrics can be obtained by focusing on the precise spike timing instead of their total count. One example is the van Rossum
(2001) distance which is calculated by filtering the time series corresponding to
the raw spike train with a smoothing kernel, typically an exponential one, and
then using the standard Euclidean distance. Another metric is the Schreiber et al.
(2003) correlation-based measure, which uses a symmetric (Gaussian) filter. In
both cases, the choice of the kernel’s parameters is arbitrary and has a high influence on the properties of the metric.
Another metric was introduced by Victor and Purpura (1996, 1997). According
to this metric, the distance between two spike trains is given by the minimum cost
of basic operations needed to transform one spike train into the other. The basic
operations are insertion or deletion of spikes, with a cost of 1, and the shifting of
a spike, with a cost of q|δt | where q is a parameter and δt the shifting interval.
The parameter q significantly influences the behavior of the metric: for q = 0 the
metric counts the difference in the total number of spikes, while for large values of
q the metric returns the number of non-coincident spikes.
Kreuz et al. (2007, 2009, 2011, 2013) have introduced more recently a series of
parameter-free and time-scale independent measures of spike train synchrony.
Here we introduce a new class of spike train metrics inspired by the PompeiuHausdorff distance between two non-empty compact sets (Pompeiu, 1905; Hausdorff, 1914). Preliminary results have been presented in abstract form in (Rusu and
Florian, 2010).
2
2 A new class of spike train metrics
We consider bounded, nonempty spike trains of the form
T = {t (1) , . . . , t (n) },
(1)
where t (i ) ∈ R are the ordered spike times and n ∈ N∗ is the number of spikes in
the spike train. We consider spike trains with no overlapping spikes. If n > 1, then
t (i −1) < t (i ) , ∀i > 1. We denote by a and b some bounds of the considered spike
trains, i.e. a ≤ t (i ) ≤ b, ∀t (i ) , with a, b ∈ R, finite, and a < b. We denote by S [a,b]
the set of all possible such spike trains bounded by a and b. We study metrics that
compute the distances between two spike trains T and T̄ from S [a,b] .
The new metrics that we introduce are inspired by the Pompeiu-Hausdorff distance (Pompeiu, 1905; Hausdorff, 1914). When applied to a pair of spike trains, the
Pompeiu-Hausdorff distance h returns the largest difference, in absolute value, between the timing of a spike in one train and the timing of the closest spike in the
other spike train:
)
(
h(T, T̄ ) = max sup inf |t − t̄ |, sup inf |t − t̄ | ,
t̄ ∈T̄ t ∈T
t ∈T t̄ ∈T̄
(2)
or, equivalently, the minimal number ² ≥ 0 such that the closed ²-neighborhood of
T includes T̄ and the closed ²-neighborhood of T̄ includes T :
©
ª
h(T, T̄ ) = inf ² such that |t − t̄ | ≤ ², ∀t ∈ T, ∀t̄ ∈ T̄ .
(3)
Another equivalent form of the Pompeiu-Hausdorff distance is the following (Papadopoulos, 2005, pp. 105–110; Rockafellar and Wets, 2009, pp. 117–118; Deza and
Deza, 2009, pp. 47–48):
¯
¯
¯
¯
h(T, T̄ ) = sup ¯¯ inf |t − x| − inf |t̄ − x|¯¯ .
(4)
x∈R t ∈T
t̄ ∈T̄
We introduce a distance d between an arbitrary timing x ∈ R and a spike train
T:
d (x, T ) = inf |t − x|.
(5)
t ∈T
Eq. 2 can then be rewritten as
)
(
h(T, T̄ ) = max sup d (t , T̄ ), sup d (t̄ , T )
t ∈T
(6)
t̄ ∈T̄
and Eq. 4 as
¯
¯
h(T, T̄ ) = sup ¯d (x, T ) − d (x, T̄ )¯ .
(7)
x∈R
Because the global supremum is achieved on the interval [a, b] (Appendix A), we
also have:
¯
¯
h(T, T̄ ) = sup ¯d (x, T ) − d (x, T̄ )¯ .
(8)
x∈[a, b]
The Pompeiu-Hausdorff metric has a quite poor discriminating power, as for many
variations of the spike trains the distances will be equal and any spike train space
endowed with this metric would be highly clustered. Our new metrics generalize
the form of the Pompeiu-Hausdorff distance given in Eq. 8, by introducing features
that are more sensitive to spike timings.
3
2.1 The max-metric
We consider B to be the space of all continuous, positive functions H : [0, b − a] →
R+ that satisfy the condition, ∀u ∈ [a, b],
Z
b
a
H (|u − s|) ds > 0.
(9)
Because
Z
b
a
H (|u − s|) ds =
u
Z
H (u − s) ds +
a
Z u−a
=
0
H (s) ds +
Z
b
H (s − u) ds
(10)
H (s) ds,
(11)
u
b−u
Z
0
and because H is continuous, a sufficient condition for satisfying Eq. 9 is that
H (0) > 0.
On compact sets, continuous functions are bounded (Protter, 1998, p. 56). We
denote by m the upper bound of H on the interval [0, b − a], i.e.
0 ≤ H (x) < m < ∞, ∀ x ∈ [0, b − a].
(12)
In typical applications, H (x) has a maximum for x = 0 and is a decreasing function
of x, for example an exponential,
³ x´
1
exp − ,
τ
τ
(13)
µ
¶
1
x2
exp − 2 ,
p
2τ
τ 2π
(14)
H E (x) =
or a Gaussian,
H G (x) =
with τ a positive parameter.
We introduce the max-metric as
Z b
©
ª
d m (T, T̄ ) =
sup |d (x, T ) − d (x, T̄ )| H (|s − x|) ds.
(15)
a x∈[a,b]
The max-metric integrates, through the variation of s along the interval [a, b] that
contains the two spike trains, the maximum of the difference, in absolute value, between the distances from a point x in that interval to the two spike trains, weighted
by the kernel H (|s − x|) which focuses locally around s. Figure 1 shows how the
distance between two spike trains is computed using the max-metric.
The max-metric is a generalization of the Pompeiu-Hausdorff distance, since
in the particular case that H (·) = 1/(b − a) we have d m (T, T̄ ) = h(T, T̄ ).
In Appendix B we show that d m is finite and that it satisfies the properties
of a metric. We also show that regardless of the kernel H all the max-metrics
are topologically equivalent to each other (O’Searcoid, 2007, p. 229) because they
are equivalent to the Pompeiu-Hausdorff distance. Each metric will generate the
same topology and thus any topological property is invariant under an homeomorphism. This means that the metrics generate the same convergent sequences
in the space of spike trains S [a,b] . Thus, learning rules derived from these metrics
will converge in the same way, regardless of the choice of H .
4
A
T
B
T̄
d(x,T)
C
d(x,T̄)
D
E
F
G
0
100
200
Time (ms)
300
400
500
Figure 1: The modulus-metric and the max-metric.
(A) Spike train T =
{20, 150, 350, 400, 440} ms. Each spike time is represented as a vertical bar. (B)
Spike train T̄ = {100, 270, 300, 370, 480} ms. (C) The distances between a timing x and ¯the spike trains,¯ d (x, T ) and d (x, T̄ ), as a function of x. (D) The
difference ¯d (x, T ) − d (x, T̄ )¯ as a function of x. The modulus-metric distance
d o (T, T̄ ) is the area under this curve. (E) The kernel H (|s − x|) as a function
of s with a fixed x = 250 ms. H is an exponential
(Eq. 13)¯ with a decay con¯
stant τ = 50 ms. (F) The weighted difference ¯d (x, T ) − d (x, T̄ )¯ H (|s − x|) as function of s for
©¯ discrete values¯ of x. (G) ªThe supremum of the weighted difference,
supx∈[a,b] ¯d (x, T ) − d (x, T̄ )¯ H (|s − x|) , as a function of s. The max-metric distance d m (T, T̄ ) is the area under this curve. In (C), (D), and (G), the dashed vertical
lines represent the timing of spikes in T and T̄ .
5
A
T
B
T̄
f(x)
C
f̄(x)
D
E
F
G
0
100
200
Time (ms)
300
400
500
Figure 2: The convolution max-metric. (A) Spike train T = {20, 150, 350, 400, 440}
ms. Each spike time is represented as a vertical bar. (B) Spike train T̄ =
{100, 270, 300, 370, 480} ms. (C) The spike trains T and T̄ filtered with an
¯ exponen-¯
tial kernel (Eq. 18) with a decay constant τ = 10 ms. (D) The difference ¯ f (x) − f¯(x)¯
as a function of x. (E) The kernel H (|s − x|) as a function of s with a fixed x = 250
ms. H is an exponential
(Eq.¯ 13) with a decay constant τ = 50 ms. (F) The
¯
weighted difference ¯ f (x) − f¯(x)¯ H (|s − x|) as function of ©¯
s for discrete¯ values of x.
ª
(G) The supremum of the weighted difference, supx∈[a,b] ¯ f (x) − f¯(x)¯ H (|s − x|) .
The convolution max-metric distance d c (T, T̄ ) is the area under this curve. In (C),
(D), and (G), the dashed vertical lines represent the timing of spikes in T and T̄ .
6
2.2 The modulus-metric
We define the modulus-metric as
Z
d o (T, T̄ ) =
b
a
|d (s, T ) − d (s, T̄ )| ds.
(16)
Figure 1 A–D shows how the distance between two spike trains is computed using
the modulus-metric. The modulus-metric is a particular case of the max-metric in
the limit that H is
(
1, if x = 0,
H (x) =
(17)
0, otherwise.
The modulus-metric does not depend on any kernels or parameters and it also
allows a fast computer implementation in linear complexity. This is because the
graph of the function φ(s) = |d (s, T )−d (s, T̄ )| is made out of line segments that join
or end in the following points: all timings of spikes in the two spike trains T and T̄ ;
the time moments that lie at the middle of the interval between two neighboring
spikes from the same spike train; the time moments that lie at the middle of the
interval between a pair of neighboring spikes where the two spikes belong to different spike trains; and the bounds a and b. This is exemplified in Figures 1 D and
3 D. We denote by P the set of these points. In order to compute the integral of
Rb
this function d o = a φ(s) ds, it is sufficient to compute the function at the points
from P . Since between these points the function is linear, the integral can be then
computed exactly.
Algorithm 1 presents an implementation of the d o metric in pseudo-code. In
this algorithm, the function φ is computed in a set of points that includes P but
also other points. In a second Algorithm 2, the set P as well as the value of φ in
the points of P is computed with a single pass through the spikes in the two spike
trains. The algorithms’ duration depends linearly on the number of spikes in the
two spike trains, n + n̄. Implementations in Python and C++ of the two algorithms
are freely available at https://github.com/modulus-metric/.
It can be shown that the distance d o is finite and that it satisfies the properties
of a metric by particularizing the proofs in Appendix E with L (x) = 1, ∀x ∈ [0, b−a].
2.3 The convolution max-metric
The max-metric can also be given in a convolution form. To construct this form of
the metric we consider an arbitrary continuous, smooth, positive kernel K : R →
R+ , with the properties that it is strictly increasing for x < 0 and strictly decreasing
for x > 0, with K (0) = p finite and positive. We thus have 0 ≤ K (x) ≤ p, ∀x ∈ R.
Typically, K is an exponential,
¶
µ
|x|
,
(18)
K E (x) = exp −
τ
with τ being a positive parameter. We convolve the two spike trains T and T̄ with
the filtering kernel K to obtain
f (x) =
n
X
K (x − t (i ) )
(19)
K (x − t̄ (i ) ).
(20)
i =1
f¯(x) =
n̄
X
i =1
7
We denote by F[a,b] the set of all possible filtered spike trains from S [a,b] .
We also consider a function H ∈ B that is strictly positive, that is derivable on
(0, b − a) and that has a bounded derivative.
The convolution max-metric is defined as
Z b
©
ª
(21)
d c (T, T̄ ) =
sup | f (x) − f¯(x)| H (|s − x|) ds.
a x∈[a,b]
Figure 2 shows how the distance d c between two spike trains is computed. In Appendix C we show that d c is finite and that it satisfies the properties of a metric.
3 Localized metrics
In the case of the max metric, with or without convolution, the use of the kernel
H served the purpose of providing a local perspective, around each point within
[a, b], of the distance between the spike trains. These local perspectives were then
integrated in the final distance. In this section we introduce different metrics that
also depend on a kernel L , but for which the kernel has a different purpose. Here,
the kernel may be regarded as a magnifying glass to be used to focus on one specific area of the spike trains. The kernel should be a continuous, positive function,
L : [0, b − a] → R+ . Similarly with H , because L is a continuous function with
bounded support, it is bounded, i.e.
0 ≤ L (x) < m < ∞, ∀ x ∈ [0, b − a].
(22)
Such a metric is biologically relevant if, for example, we take into consideration
how a neuron responds to input spikes. Recent spikes influence more the neuron
than old ones. If we would like to measure the distance between two spike trains
according to how the differences between them influence the activity of a neuron
at a particular moment of time, recent differences should be taken into account
with a greater weight than differences in the distant past. For the localized metrics,
L could thus model the shape of postsynaptic potentials (PSP) that reflects the
dynamics of the effect of one presynaptic spike on the studied neuron. Thus, L
could typically be an exponential, L E = H E (Eq. 13), an alpha function,
L α (x) =
³ x´
x
exp
− ,
τ2
τ
a difference between two exponentials,
·
µ
¶¸
³ x´
τ
x
L D (x) =
exp − − exp −
,
τ − τs
τ
τs
(23)
(24)
or, if we model the postsynaptic potential generated in an integrate-and-fire neuron by a synaptic current that is a difference between two exponentials,
½
·
µ
¶¸
³ x´
τ
τs
x
L I (x) =
exp − − exp −
τ s − τr τ − τ s
τ
τ
·
µ s ¶¸¾
³ x´
τr
x
−
exp − − exp −
,
(25)
τ − τr
τ
τr
where τ, τs , and τr are positive parameters.
8
3.1 Localized max-metric
We introduce the localized max-metric as
Z b
d l (T, T̄ ) =
L (b − s) sup |d (x, T ) − d (x, T̄ )| ds.
a
(26)
x∈[s,b]
Figure 3 shows how the distance d l between two spike trains is computed. The differences between the spike trains that account the most for the distance are those
that are close to b. The shape of L has a high impact on the behavior of the metric.
In Appendix D we show that the distance d l is finite and that it satisfies the
properties of a metric.
3.2 Localized modulus-metric
The modulus metric can also be given in a localized form:
b
Z
d n (T, T̄ ) =
a
|d (s, T ) − d (s, T̄ )| L (b − s) ds.
(27)
In Appendix E we show that d n is finite and that it satisfies the properties of a
metric.
3.3 Localizing the van Rossum metric
A localization by a kernel L similar to the one we applied in Eqs. 26 and 27 can
also be applied to existing metrics. Let T, T̄ ∈ S [a,b] . Consider the van Rossum
(2001) distance defined as
Z ∞
d R (T, T̄ ) =
(g (s) − ḡ (s))2 ds,
(28)
−∞
where
n
X
g (s) =
H (s − t (i ) ) K E (s − t (i ) )
(29)
H (s − t̄ (i ) ) K E (s − t̄ (i ) ),
(30)
i =1
n̄
X
ḡ (s) =
i =1
H is the Heaviside step function, H (x) = 0 if x < 0 and H (x) = 1 if x ≥ 0, and K E is
defined in Eq. 18. When localized with L the distance becomes
Z
d Rl (T, T̄ ) =
b
−∞
(g (s) − ḡ (s))2 L (b − s) ds.
(31)
Here L may be chosen to have the same qualitative properties as the kernels used
in Eqs. 23–25.
4 Simulation results
We analyzed the behavior of the introduced metrics through computer simulations
using simple setups. Across all simulations, H was an exponential (Eq. 13) with
9
A
T
B
T̄
d(x,T)
C
d(x,T̄)
D
E
F
G
0
100
200
Time (ms)
300
400
500
Figure 3: The localized max-metric. (A) Spike train T = {30, 190, 200, 320, 410, 480}
ms. Each spike time is represented as a vertical bar. (B) Spike train T̄ =
{20, 120, 200, 300, 350, 460} ms. (C) The distances between a timing
¯ x and the spike¯
trains, d (x, T ) and d (x, T̄ ), as function of x. (D) The¯ difference ¯d (x,¯ T ) − d (x, T̄ )¯
as a function of x. (E) The supremum, supx∈[s,b] ¯d (x, T ) − d (x, T̄ )¯, as a function of s. (F) The kernel L (b − s) as function of s, an exponential (Eq. 13)
with a decay constant τ = 50 ms. (G) The supremum weighted by the kernel,
L (b − s) supx∈[s,b] |d (x, T ) − d (x, T̄ )|, as a function of s. The localized max-metric
distance d l (T, T̄ ) is the area under this curve. In (C), (D), and (G), the dashed vertical lines represent the timing of spikes in T and T̄ .
10
τ = 10 ms. For the localized metrics d l and d n , L also was an exponential (Eq.
13) with τ = 20 ms. The convolution kernels for the d c and van Rossum distances
were chosen as exponentials (Eq. 18) with τ = 10 ms. The width of the Gaussian
filter for the Schreiber et al. distance was 10 ms. For the Victor & Purpura distance
we set q = 0.2 ms−1 , except in Figs. 7 – 9 where we also used q = 0.001 ms−1 as in
(Dauwels et al., 2009). We set a = 0 ms and b the maximum length of spike trains
(either 200 or 500 ms, except in Fig. 12 where the length was variable).
4.1 Inserting or shifting one spike
We computed the distances between a particular spike train T and a spike train T̄
obtained from it by either inserting or shifting one spike. In the insertion case, T̄
was generated by inserting a spike into T at various timings. In the shifting case, T̄
was generated by shifting a particular spike of T . The distance was plotted against
the time of the inserted spike or of the shifted spike to see how the change is reflected by the metrics. To compute the distance we used the introduced metrics,
a simple spike count distance (c), the van Rossum (2001) (d R ), Victor and Purpura (1996, 1997) (dV P ), Schreiber et al. (2003) (s), and Pompeiu-Hausdorff (h)
distances, as well as the ISI-distance (k i ) and the improved SPIKE-distance (k s )
by Kreuz et al. (2007, 2013). The spike count distance is defined as
c(T, T̄ ) =
|n − n̄|
,
max(n, n̄)
(32)
where n and n̄ are the number of spikes in each train. The spike trains were 200
ms long.
The results for the insertion case are presented in Figure 4. The Victor & Purpura distance was constant since the cost of adding and removing a spike is fixed
at 1 regardless of its timing. Similarly, the van Rossum metric was insensitive to
the time of the inserted spike, a result which can be also shown analytically (van
Rossum, 2001). The spike count distance remained constant regardless of where
the spike was inserted. The results were qualitatively different in the case of our
newly introduced distances, with the exception of the convolution max-metric,
and in the case of the Kreuz et al. and Schreiber et al. metrics. In the case of the
Pompeiu-Hausdorff distance, max-metric, modulus-metric, of the localized variants of the max-metric and the modulus-metric, and of the Schreiber et al. and
Kreuz et al. metrics, the insertion time of the spike had a significant impact on
the outcome (Figure 4). When the inserted spike overlapped an existing spike, the
Schreiber et al. distance had a low value but remained non-zero, while our new
metrics, with the exception of the convolution max-metric, as well as the Kreuz et
al. metrics, returned a zero distance. It can also be seen that the localized distances
were strongly influenced by the shape of the L kernel.
The results for the shifting case are presented in Figure 5. When the spike at
t (4) was shifted, the Victor & Purpura and van Rossum distances were dependent
only on the width of the shifting interval. These results are confirmed by analytical derivations (Victor and Purpura, 1996; van Rossum, 2001). As in the previous
case, the spike count distance was insensitive to the shift operation and remained
zero since the number of spikes did not change. In contrast, our newly introduced
distances, with the exception of the convolution max-metric, and the Schreiber et
al. and Kreuz et al. metrics showed a dependence not only on the width of the
11
shifting interval but also on the particular timing of the shifted spike. The results
are similar to the ones in Fig. 4 of (Kreuz et al., 2011).
4.2 Bursts
We generated a template spike train T containing three bursts and one isolated
spike. We computed, in 6 setups, using various metrics, the distance between T
and another spike train T̄ obtained from T by either: removing one spike from a
burst; inserting one spike into a burst; or removing or inserting one spike not belonging to the bursts. After computing the distances for each of the setups, the
distances for each metric were normalized to the maximum distance for that particular metric among the setups. The normalized distances are shown, for each
setup, in Figure 6. When a spike is added to a burst or removed from a burst, the
max-metric and modulus-metric distances, as well as the Kreuz et al. distances,
are close to zero. Those distances become non-negligible when a solitary spike,
far from a burst, is removed, or a new spike is added far from a burst. The normalized convolution max-metric and the van Rossum distances are close to 1, and
the Victor & Purpura distance is exactly 1, in all setups. The Schreiber et al. distance exhibited an intermediate behavior, but it also remained non-negligible in
all setups.
4.3 Discriminating timing precision vs. event reliability
Timing precision and event reliability are distinct characteristics of the variation of
a spike train (Tiesinga et al., 2008). In computational neuroscience there is a need
for spike train metrics to both characterize the overall variability as well as for parsing out the precision and reliability separately (Toups et al., 2012). We investigated
how our new metrics and existing metrics perform in discriminating precision vs.
event reliability (Dauwels et al., 2009). We generated a 200 ms template spike train
T using a Poisson process with a rate of 100 Hz. We also generated various spike
trains T̄ obtained from T by both: (a) applying to spikes from T a Gaussian jitter
with zero mean and variance σ in the range of 0 and σm = 20 ms and (b) removing
spikes with a probability p ranging from 0 to p m = 80%. For each (σ, p) pair we
ran 100 trials, where in each trial we generated randomly a new T̄ . For each trial,
we computed the distances between T and T̄ using various metrics and we then
averaged the results over the trials. For each metric, average distances were then
normalized to the maximum average distance across the (σ, p) parameters. The
results are presented in Figs. 7–10. Fig. 7 represents the normalized average distances as a function of σ and p. Figs. 8 and 9 represent sections trough the graphs
in Fig. 7, for illustrating more clearly the dependencies of distances on reliability
and precision.
If Fig. 10, we tried to illustrate how reliability compares to the precision in determining the variability of the distances. For a metric ρ, it is not possible to compare directly the partial derivatives ∂ρ/∂p and ∂ρ/∂σ because they are variables
of different physical dimensions: p is dimensionless, while σ represents a time
interval. In order to compare them, we take into consideration that the relevant
intervals on which p and σ vary are practically bounded. Choosing σm and p m is
theoretically arbitrary, but in practice p m is something slightly less than 1 and the
relevant σm is constrained by the time scales of the considered spike trains and of
the distances that depend on time-scale-like parameters. We use these practical
12
T
A
dR
B
dVP
C
c
D
s
E
ks
F
ki
G
h
H
dm
I
dc
J
do
K
dl
L
dn
M
0
50
100
Time (ms)
150
200
Figure 4: Metric comparison - inserting a spike. We computed the distance between the spike train T = {20, 50, 75, 125, 180} ms and one obtained from this spike
train by inserting a spike at different locations. At each time x ∈ [0, 200] ms a spike
was inserted to generate T̄ and the distance between T and T̄ was computed and
plotted against x. (A) The spike train T . (B) The van Rossum distance. (C) The
Victor & Purpura distance. (D) The spike count distance. (E) The Schreiber et al.
distance. (F) The Kreuz et al. improved SPIKE-distance. (G) The Kreuz et al. ISIdistance. (H) The Pompeiu-Hausdorff distance. (I) The max-metric. (J) The convolution max-metric. (K) The modulus-metric. (L) The localized max-metric. (M)
The localized modulus-metric.
13
T
A
dR
B
dVP
C
c
D
s
E
ks
F
ki
G
h
H
dm
I
dc
J
do
K
dl
L
dn
M
0
50
100
Time (ms)
150
200
Figure 5: Metric comparison - shifting a spike. We computed the distance between
the spike train T = {10, 50, 75, 125, 150} ms and one obtained from this spike train
by shifting the spike at t (4) = 125 ms. The spike was shifted at timings x ∈ [0, 200]
ms to generate T̄ and the distance between T and T̄ was computed and plotted
against x. (A) The spike train T . (B) The van Rossum distance. (C) The Victor &
Purpura distance. (D) The spike count distance. (E) The Schreiber et al. distance.
(F) The Kreuz et al. improved SPIKE-distance. (G) The Kreuz et al. ISI-distance. (H)
The Pompeiu-Hausdorff distance. (I) The max-metric. (J) The convolution maxmetric. (K) The modulus-metric. (L) The localized max-metric. (M) The localized
modulus-metric.
14
Figure 6: Dealing with bursts. We measured distances between a template spike
train that includes bursts and a spike train obtained from the template by adding
or removing one spike. Arrows indicate where the spike was added or removed.
Left: the pair of spike trains. Right: the normalized distances (d o - modulus metric;
d m - max metric; d c - convolution max-metric; d R - van Rossum; dV P - Victor
& Purpura; s - Schreiber et al.; k s - Kreuz et al. improved SPIKE-distance; k i Kreuz et al. ISI-distance). (A), (B) One spike removed from a burst. (C), (D) One
spike inserted into a burst. (E) One isolated spike removed. (F) One isolated spike
inserted.
15
bounds in order to commensurate the variance with respect to the two parameters. By dividing the intervals [0, p m ] and [0, σm ] into the same number of bins N
we get two-dimensional pixels of size δp = p m /N and δσ = σm /N on which we
can consider that the comparison of the variation of d along the two axes can be
compared. We computed
δρ(p, σ) =
∂ρ(p, σ)
∂ρ(p, σ)
δp −
δσ,
∂p
∂σ
(33)
where ρ was replaced with the considered metrics. In areas of the p, σ space where
δρ is positive, we may say that the metric is more sensitive to reliability, while in
areas where it is negative the metric is more sensitive to the precision of spikes.
The interpretation of results should take into consideration the caveat that changes
of the σm /p m ratio may change the sign of δρ.
As expected, the Victor & Purpura distance with q = 0.001 ms−1 does not depend at all on the precision, but just on reliability, since it basically counts the
difference in the number of spikes between the spike trains. Our modulus-metric
and max-metrics have a stronger dependence on reliability than on precision, on
most of the considered range, except for high reliability (very low p) where the dependence on precision is still dominant. For the van Rossum and Schreiber et al.
distances, the dependence on reliability and precision is somehow balanced. The
Kreuz et al. distances and the Victor & Purpura distance with q = 0.2 ms−1 have
a stronger dependence on precision than on reliability. For all distances, except
for the Victor & Purpura distance with q = 0.001 ms−1 , the sensitivity to reliability
increases with the unreliability (with the probability p of spikes not being fired).
These results may be different for a different choice of the σm /p m ratio, of the
time scales of the considered spike trains and of the parameters of the parameterdependent distances. Our results are similar to the ones of Dauwels et al. (2009)
for the Victor & Purpura distance q = 0.001 ms−1 , but different for the Schreiber et
al. distance, probably because Dauwels et al. (2009) used a different approach for
modeling unreliability of spikes.
4.4 Correlations
We explored the correlation between the newly introduced metrics and the classical Victor & Purpura and van Rossum distances. We generated a 500 ms Poisson
spike train with a firing rate of 20 Hz. From this spike train, we generated a new
one by adding a Gaussian jitter with zero mean and 20 ms variance. We considered only generated and jittered spike trains that contained 10 spikes. We then
measured the distance between the original and the jittered spike train using various metrics. We repeated this in 1,000 trials, where for each trial the original spike
train and the jitter were generated randomly. For each metric, distances were normalized to the mean value across samples. The results are displayed in Figure 11.
Table 1 shows the correlation coefficients between the max-metric, the modulusmetric, the convolution max-metric, the Schreiber et al. distance, the Kreuz et al.
distances and, respectively, the van Rossum and Victor & Purpura distances.
4.5 Computation speed
We computed the distances between pairs of randomly generated spike trains, the
spike trains within a pair having the same number of spikes n. We varied n from
16
Figure 7: Normalized average distances between a template spike train and another one generated from it, as a function of the probability p of removing spikes
from the template spike train and of jitter σ added to spikes. Distances are normalized to their maximum over the considered range. (A) Modulus-metric. (B) Maxmetric. (C) Victor & Purpura, q = 0.2 ms−1 . (D) Victor & Purpura, q = 0.001 ms−1 .
(E) Van Rossum. (F) Schreiber et al. (G) Kreuz et al. improved SPIKE-distance. (H)
Kreuz et al. ISI-distance.
17
do
1
Jitter 0 (ms)
Jitter 5 (ms)
Jitter 10 (ms)
Jitter 20 (ms)
B
1
dm
A
0.5
0
C
0
40
80
Spikes removed (%)
0
D
0
F
1
0.5
0.5
G
s
dR
0
40
80
Spikes removed (%)
0.5
1
0
ks
dV P
0.5
E
0
40
80
Spikes removed (%)
0
H
1
1
0.5
0.5
0
0
40
80
Spikes removed (%)
1
ki
dV P
1
0
0.5
0
0
40
80
Spikes removed (%)
0
40
80
Spikes removed (%)
0
40
80
Spikes removed (%)
0
40
80
Spikes removed (%)
Figure 8: Normalized average distances as a function of the probability of removing
spikes p, for several levels of jitter σ (sections trough the panels in Fig. 7). (A)
Modulus-metric. (B) Max-metric. (C) Victor & Purpura, q = 0.2 ms−1 . (D) Victor
& Purpura, q = 0.001 ms−1 . (E) Van Rossum. (F) Schreiber et al. (G) Kreuz et al.
improved SPIKE-distance. (H) Kreuz et al. ISI-distance.
18
A
B
p = 0%
p = 25%
p = 50%
1
dm
do
1
0.5
0
0
C
10
Jitter (ms)
0
20
dV P
dV P
0
20
0
10
Jitter (ms)
20
0
10
Jitter (ms)
20
0
10
Jitter (ms)
20
0.5
0
20
F
1
1
0.5
0.5
0
G
10
Jitter (ms)
0
20
H
1
1
0.5
0.5
ki
ks
10
Jitter (ms)
s
dR
E
0
10
Jitter (ms)
1
0.5
0
0
D
1
0
0.5
0
10
Jitter (ms)
0
20
Figure 9: Normalized average distances as a function of jitter σ, for several levels
of the probability of removing spikes p (sections trough the panels in Fig. 7). (A)
Modulus-metric. (B) Max-metric. (C) Victor & Purpura, q = 0.2 ms−1 . (D) Victor
& Purpura, q = 0.001 ms−1 . (E) Van Rossum. (F) Schreiber et al. (G) Kreuz et al.
improved SPIKE-distance. (H) Kreuz et al. ISI-distance.
19
Figure 10: Illustration of the dominance of reliability over precision for determining the variability of distances (see main text). In white areas, the distance varies
more with respect to reliability than with respect to precision. In dark areas, the
dominance is reversed. (A) Modulus-metric. (B) Max-metric. (C) Victor & Purpura,
q = 0.2 ms−1 . (D) Victor & Purpura, q = 0.001 ms−1 . (E) Van Rossum. (F) Schreiber
et al. (G) Kreuz et al. improved SPIKE-distance. (H) Kreuz et al. ISI-distance.
20
Figure 11: Correlations between the Victor & Purpura (left column) and the van
Rossum (right column) metrics and, respectively, the distances computed with our
newly introduced metrics, the Schreiber et al. and the Kreuz et al. metrics. We
computed distances between Poisson spike trains and a jittered version of them.
Figures represent the distribution of pairs of the normalized values of distances
measured with the different metrics. (A) Max-metric. (B) Convolution max-metric.
(C) Modulus-metric. (D) Schreiber et al. (E) Kreuz et al. improved SPIKE-distance.
(F) Kreuz et al. ISI-distance. (G) Victor & Purpura / van Rossum.
21
Table 1: Correlation coefficients between the van Rossum and Victor & Purpura
distances and, respectively, other distances, computed from data presented in Figure 11.
Distance d R correlation coefficient dV P correlation coefficient
dm
0.54
0.48
do
0.54
0.47
dc
0.84
0.81
s
0.87
0.88
ks
0.51
0.70
ki
0.43
0.44
dR
1.00
0.78
dV P
0.78
1.00
5 to 500 while keeping constant the firing rate of the spike trains. The trains were
generated by randomly choosing the n firing times from a uniform distribution
between 0 and n T , where T=35 ms. We measured the average time needed to
compute distances, as a function of the number of spikes. Performance was measured using C++ implementations of the metrics, running on a Intel Core 2 processor. The Victor & Purpura metric was computed using the algorithm in (Victor
and Purpura, 1996). The van Rossum metric was implemented using the exact,
optimized algorithm presented in (Houghton and Kreuz, 2012) (A1) and a discretetime integration with a timestep of 1 ms (A2), which turned out to be slightly faster
than the optimized one. The Schreiber et al. and the Kreuz et al. metrics have also
been computed using a 1 ms integration timestep. The modulus-metric was implemented using Algorithms 1 and 2. The code used for all metrics is freely available
at https://github.com/modulus-metric/. The results are presented in Figure 12. In
panel (A), the results were averaged over 1,000 trials, while in the other panels the
results were averaged over 10,000 trials.
The simulations showed that the max-metric and the Schreiber et al. metric
are relatively slow to compute. Those two metrics and the Victor & Purpura metric require a computation time that grows more than linearly with the number of
spikes. The other metrics have an approximately linear dependence on the number of spikes; we fitted them with a line and computed the proportionality coefficients in Table 2. The fastest distances or algorithms were, in order: modulusmetric (Algorithm 2); van Rossum (A2); Kreuz et al. ISI-distance; van Rossum (A1);
modulus-metric (Algorithm 1); Kreuz et al. improved SPIKE-distance. It should
be noted that, while the modulus-metric algorithms and the van Rossum A1 algorithm compute the distances exactly (within machine numerical precision), the
other linear-time algorithms compute numerical approximations of the distances
through discrete-time integration, with a precision that depends on the integration
timestep.
5 Discussion
The max-metric and the modulus-metric behave in a qualitatively different way
than the classical van Rossum and Victor & Purpura distances (Figures 4-6), but
similar to the Kreuz et al. distances. Within a set of spike trains that are consid-
22
A
B
2500
3
dV P
ks
Time (ms)
Time (ms)
dm
s
1250
0
0
250
Spike count
0
500
0
250
Spike count
500
D
C
0.4
0.4
dR A1
ki
dR A2
do A1
do A2
Time (ms)
Time (ms)
1.5
0.2
0
0
250
Spike count
0.2
0
500
0
250
Spike count
500
Figure 12: Time needed for computing various distances, as a function of the number of spikes in the spike trains. Note the different time scales. (A) d m : max-metric;
s: Schreiber et al. (B) dV P : Victor & Purpura; k s : Kreuz et al. improved SPIKEdistance. (C) d R : van Rossum; A1: algorithm by (Houghton and Kreuz, 2012); A2:
discrete-time integration; k i - Kreuz et al. ISI-distance. (D) d o : modulus metric;
A1: Algorithm 1; A2: Algorithm 2.
23
Table 2: Average computing time per spike in a spike train, for various distances.
Notation and data as in Figure 12.
Distance (and algorithm) Computing time per spike (ms)
d o A2
0.001570
d R A2
0.001831
ki
0.001965
d R A1
0.002437
d o A1
0.003323
ks
0.010910
ered by the van Rossum and Victor & Purpura metrics to be at equal distance from
a reference spike train, the max-metric, the modulus-metric and the Kreuz et al.
metrics can distinguish a range of distances that reflect similarities in the structure
of the compared spike trains (Figures 4, 5). When comparing spike trains that include bursts, the max-metric, the modulus-metric and the Kreuz et al. metrics ignore differences in the number and position of spikes inside the bursts, while this
kind of differences are considered by the van Rossum and Victor & Purpura metrics
as significant as in the case that differences exist outside the bursts (Figure 6). This
makes the max-metric, the modulus-metric and the Kreuz et al. metrics particularly suitable for measuring distances in spike trains where information is encoded
in the timing of bursts or solitary spikes, but not in the internal structure of bursts.
This is the case in some experiments, such as (Reinagel et al., 1998), where bursts
regarded as unitary events encoded more information per event than otherwise, or
such as (Kepecs and Lisman, 2003), where the timing of the first burst spike carried
70% of the information and the spike count only 22% of the information. However,
in other cases the internal structure of bursts does carry information (Krahe and
Gabbiani, 2004). The Schreiber et al. metric has a behaviour that is intermediate
between the one of the max-metric, the modulus-metric and the Kreuz et al. metrics, on one side, and the van Rossum and Victor & Purpura metrics, on another
side.
While the max-metric depends on a kernel H which can be particularized to
cause distinct behaviors, and the van Rossum, Victor & Purpura and Schreiber et
al. distances also depend on parameters that must be chosen by their users, the
modulus-metric does not depend on any parameters, similarly to the Kreuz et al.
(2009, 2011, 2013) metrics. The lack of parameters allows one to start analyzing
data immediately, without the need of preprocessing it in order to find the appropriate parameters. A parameter-free distance also gives a more objective measure,
that does not depend on any assumptions to be made by the experimenter. In
some cases, when the time scales vary during an experiment, no single time scale
may characterize the spike trains, and thus a time-scale-independent measure may
be preferable.
We have also shown that the modulus-metric can be computed faster than any
of the other considered metrics, through an algorithm that operates in a time that
depends linearly on the number of spikes in the considered spike trains. This
fast algorithm computes the distance exactly (within machine precision), not as a
numerically-approximated discrete-time integration, as some algorithms for other
metrics do.
The convolution-metric that we introduced, although analytically similar to the
24
max-metric, is qualitatively similar to the van Rossum distance. A qualitative difference between the convolution-metric and the van Rossum distance appears when
the differences between the spike trains are localized near the ends of the integration interval, and this is a simple consequence of the difference between the
bounded integration interval for the convolution-metric and the infinite integration interval for the van Rossum distance.
We have considered only spike trains having non-overlapping spikes. If we relax
this constraint, for our newly introduced distances, with the exception of the convolution max-metric, we get a zero distance between a spike train and a second
one generated from the first by adding an extra spike to the first, overlapping an
existing spike (Figure 4). This is due to the distance d between an arbitrary timing
and a spike train in Eq. 5 which does not distinguish between overlapping spikes
in a train. Thus, if we relax the constraint of not allowing non-overlapping spikes,
these distances become pseudo-metrics because there might be a zero distance
between two spike trains that differ through overlapping spikes. However, the case
of overlapping spikes is biologically implausible if we consider spike trains fired by
single neurons. If it is enough that the distances are pseudo-metrics, we may also
relax some of the conditions of the kernels, such as the requirement for L to be
strictly positive on (0, b − a] or the conditions on K .
For our metrics, when the integrating interval [a, b] extends beyond the interval covered by extremes of the spike trains, e.g. [min(t (1) , t̄ (1) ), max(t (n) , t̄ (n̄) )] for
a pair of spike trains, the result of the integration in the area not covered by extremes of the spike trains adds to the distance without contributing information
about the spike trains. Thus, the integrating interval should preferably be chosen
as the interval covered by the extremes of the considered set of spike trains. Alternatively, one may artificially add to all considered spike trains two extra spikes at
the extremities a and b of the integrating interval, a procedure that is also used by
the Kreuz et al. metrics (Kreuz et al., 2013).
We have introduced localized versions of our metrics, which, depending on the
localization kernel L , could have a biologically-relevant interpretation of measuring the differences between two spike trains as they are perceived at a particular
moment in time by a neuron receiving these spike trains.
6 Conclusion
We have introduced here a new class of spike train metrics, inspired by the PompeiuHausdorff distance. The max-metric and the modulus-metric behave in a qualitatively different way than classical metrics and are particularly suitable for measuring distances in spike trains where information is encoded in the identity of bursts,
as unitary events. The modulus-metric does not depend on any parameters and
can be computed faster than other distances, in a time that depends linearly on
the number of spikes in the compared spike trains.
Acknowledgements
We acknowledge the useful suggestions of Adriana Nicolae and Ovidiu Jurjuţ. This
work was funded by the Sectorial Operational Programme Human Resources Development (POSDRU, contract no. 6/1.5/S/3, "Doctoral studies: through science
25
towards society"), by a grant of the Romanian National Authority for Scientific Research (PNCDI II, Parteneriate, contract no. 11-039/2007) and by the Max Planck Coneural PartnerGroup.
Appendix
A Equivalent Hausdorff form
Proposition A.1. The Pompeiu-Hausdorff metric
¯
¯
h(T, T̄ ) = sup ¯d (x, T ) − d (x, T̄ )¯
(34)
x∈R
can be equivalently expressed as
¯
¯
h(T, T̄ ) = sup ¯d (x, T ) − d (x, T̄ )¯ .
(35)
x∈[a, b]
Proof. The result follows by showing that the global supremum is achieved on the
interval [a, b]. We need to show that restricting the interval in Eq. 34 is acceptable
since the supremum is achieved on the interval [a, b].
We first consider x ∈ (−∞, a]. Because ∀ t ∈ T , x ≤ a ≤ t (1) ≤ t , we have d (x, T ) =
(1)
t − x and d (a, T ) = t (1) − a. Because ∀ t̄ ∈ T̄ , x ≤ a ≤ t̄ (1) ≤ t̄ , we have d (x, T̄ ) =
t̄ (1) − x and d (a, T̄ ) = t̄ (1) − a. Thus
sup
¯
¯
¯d (x, T ) − d (x, T̄ )¯ =
x∈(−∞,a]
sup
¯ (1)
¯ ¯
¯
¯(t − x) − (t̄ (1) − x)¯ = ¯t (1) − t̄ (1) ¯
sup
(36)
x∈(−∞,a]
¯
¯ ¯
¯
¯d (x, T ) − d (x, T̄ )¯ = ¯d (a, T ) − d (a, T̄ )¯ .
(37)
x∈(−∞,a]
Analogously, for x ∈ [b, ∞) we have
¯
¯ ¯
¯
sup ¯d (x, T ) − d (x, T̄ )¯ = ¯d (b, T ) − d (b, T̄ )¯ .
(38)
x∈[b,∞)
From Eqs. 37 and 38,
¯
¯
¯
¯
sup ¯d (x, T ) − d (x, T̄ )¯ = sup ¯d (x, T ) − d (x, T̄ )¯ .
x∈R
(39)
x∈[a, b]
B Analysis of the max-metric
Proposition B.1. d m (T, T̄ ) < ∞.
Proof. From Eq. 8, for every x ∈ [a, b] we have
¯
¯
¯d (x, T ) − d (x, T̄ )¯ ≤ h(T, T̄ ).
(40)
Multiplying by H (·), which is positive, we obtain, ∀s ∈ [a, b],
¯
¯
¯d (x, T ) − d (x, T̄ )¯ H (|s − x|) ≤ h(T, T̄ ) H (|s − x|).
26
(41)
By taking the supremum and integrating, the equation above becomes
Z
b
sup
a x∈[a,b]
¯
©¯
ª
¯d (t , T ) − d (t , T̄ )¯ H (|s − x|) ds ≤
Z
b
sup
a x∈[a,b]
©
ª
h(T, T̄ ) H (|s − x|) ds. (42)
The left side of the equation above is the max-metric d m (Eq. 15). Because h(T, T̄ )
is independent of s and x,
Z
d m (T, T̄ ) ≤ h(T, T̄ )
b
sup H (|s − x|)ds.
(43)
a x∈[a,b]
Since h(T, T̄ ) ≤ b − a and H (y) < m, ∀y ∈ [0, b − a] (Eq. 12), we obtain
d m (T, T̄ ) ≤ (b − a)2 m < ∞.
(44)
Proposition B.2. d m : S [a,b] × S [a,b] → R+ is a metric.
Proof. In order to show that d m (·, ·) is a metric we need to prove that it is nonnegative, that d m (T, T̄ ) = 0 ⇔ T = T̄ for any T, T̄ ∈ S [a,b] , that is symmetric, and
that it satisfies the triangle inequality.
It is trivial to show that d m (T, T̄ ) is non-negative, symmetric, and that if T =
T̄ ⇒ d m (T, T̄ ) = 0.
In order to prove that d m (T, T̄ ) = 0 ⇒ T = T̄ we use a reductio ad absurdum
argument. Assume that d m (T, T̄ ) = 0 with T 6= T̄ . Then, there must be at least one
spike in one of the two spike trains that is not in the other, since we do not allow
overlapping spikes within the spike trains. Consider that this spike belongs to T ;
in the case that it belongs to T̄ , the proof is analogous. Let u be the timing of this
spike, u ∈ T \ T̄ . Because u ∈ [a, b], we have, ∀s ∈ [a, b],
¯
¯
ª ¯
©¯
sup ¯d (x, T ) − d (x, T̄ )¯ H (|s − x|) ≥ ¯d (u, T ) − d (u, T̄ )¯ H (|s − u|).
(45)
x∈[a,b]
Because u ∈ T , d (u, T ) = 0. Thus
sup
¯
©¯
ª
¯d (x, T ) − d (x, T̄ )¯ H (|s − x|) ≥ d (u, T̄ ) H (|s − u|).
(46)
x∈[a,b]
By integrating the equation above, we obtain
Z
d m (T, T̄ ) ≥ d (u, T̄ )
b
a
H (|s − u|) ds.
(47)
Because u ∉ T̄ , d (u, T̄ ) > 0. Also considering Eq. 9, we have
Z
b
d (u, T̄ )
a
H (|s − u|) ds > 0.
(48)
Thus, from Eqs. 47 and 48, d m (T, T̄ ) > 0. Since we considered that d m (T, T̄ ) = 0, this
cannot be true. Hence, T ⊆ T̄ . Likewise, one can show that T̄ ⊆ T and so T = T̄ .
In order to prove the triangle inequality, consider T̂ ∈ S [a,b] . We have, ∀x ∈ R,
|d (x, T ) − d (x, T̂ ) + d (x, T̂ ) − d (x, T̄ )| ≤ |d (x, T ) − d (x, T̂ )| + |d (x, T̂ ) − d (x, T̄ )|. (49)
27
Because supx ( f (x) + g (x)) ≤ supx ( f (x)) + supx (g (x)) for any two functions f and g ,
it follows that
¯
¯
©¯
©¯
ª
ª
sup ¯d (x, T ) − d (x, T̄ )¯ H (|s − x|) ≤ sup ¯d (x, T ) − d (x, T̂ )¯ H (|s − x|) +
x∈[a,b]
x∈[a,b]
sup
¯
©¯
ª
¯d (x, T̂ ) − d (x, T̄ )¯ H (|s − x|) . (50)
x∈[a,b]
After integration, it results that
d m (T, T̄ ) ≤ d m (T, T̂ ) + d m (T̂ , T̄ ).
(51)
With this final equality we have shown that the distance is indeed a metric and
the proof ends.
Proposition B.3. The metric d m : S [a,b] × S [a,b] → R is topologically equivalent to
the Pompeiu-Hausdorff distance.
Proof. In order to show that the metrics d m and h are topologically equivalent
it is sufficient to prove that the identity function i S [a,b] : (S [a,b] , d m ) → (S [a,b] , h),
i S [a,b] (T ) = T and its inverse are both continuous (O’Searcoid, 2007, p. 229; Deza
and Deza, 2009, p. 12).
We first show that i S [a,b] is continuous, which is equivalent to: ∀ T ∈ S [a,b] , ∀ ² >
0, ∃ δ(²) > 0 such that ∀ T̄ ∈ S [a,b] with d m (T, T̄ ) ≤ δ we have h(T, T̄ ) ≤ ². We
choose δ(²) = ² A(T, T̄ ) with
Z b
H (|s − t |) ds.
(52)
A(T, T̄ ) = inf
t ∈T ∪T̄ a
From Eq. 9, we have that A(T, T̄ ) > 0. From Eq. 15, for all t ∈ T ,
b
Z
d m (T, T̄ ) ≥
=
a
Z b
a
|d (t , T ) − d (t , T̄ )| H (|s − t |)ds
(53)
d (t , T̄ ) H (|s − t |)ds
(54)
b
Z
≥ d (t , T̄ ) inf
t 0 ∈T a
H (|s − t 0 |) ds
(55)
and thus
Z
d m (T, T̄ ) ≥ sup d (t , T̄ ) inf
b
t 0 ∈T a
t ∈T
H (|s − t 0 |) ds
Z
d m (T, T̄ ) ≥ sup d (t , T̄ )
t ∈T
b
inf
t 0 ∈T ∪T̄ a
(56)
H (|s − t 0 |) ds.
(57)
H (|s − t 0 |) ds.
(58)
Analogously, for all t̄ ∈ T̄ ,
Z
d m (T, T̄ ) ≥ sup d (t̄ , T )
t̄ ∈T̄
b
inf
t 0 ∈T ∪T̄ a
Taking the max value in Eqs. 57 and 58 we obtain
(
)
d m (T, T̄ ) ≥ max sup d (t , T̄ ), sup d (t̄ , T )
t ∈T
t̄ ∈T̄
28
Z
inf
b
t 0 ∈T ∪T̄ a
H (|s − t 0 |) ds.
(59)
From Eq. 6 it follows that
Z
b
d m (T, T̄ ) ≥ h(T, T̄ ) inf
t ∈T ∪T̄ a
H (|s − t |) ds.
(60)
Because ² A(T, T̄ ) = δ(²) ≥ d m (T, T̄ ), from the last equation we have that ² A(T, T̄ ) ≥
h(T, T̄ ) A(T, T̄ ). Thus h(T, T̄ ) ≤ ² since A(T, T̄ ) > 0.
−1
It remains to show that i S
is continuous, which is equivalent to: ∀ T ∈ S [a,b] , ∀ ² >
[a,b]
0, ∃ δ(²) > 0 such that ∀ T̄ ∈ S [a,b] with h(T, T̄ ) ≤ δ we have d m (T, T̄ ) ≤ ². We
choose δ(²) = ²/B (a, b) with
Z b
B (a, b) =
sup H (|s − x|) ds.
(61)
a x∈[a,b]
We have
Z
b
B (a, b) ≥ sup
x∈[a,b] a
H (|s − x|) ds.
Considering Eq. 9, we have B (a, b) > 0. From Eq. 15 we have
Z b
¯
¯
d m (T, T̄ ) ≤
sup ¯d (x, T ) − d (x, T̄ )¯ sup H (|s − x|) ds
a x∈[a,b]
(62)
(63)
x∈[a,b]
¯
¯
d m (T, T̄ ) ≤ sup ¯d (x, T ) − d (x, T̄ )¯
x∈[a,b]
Z
b
sup H (|s − x|) ds.
(64)
a x∈[a,b]
From Eqs. 8 and 62 we have
d m (T, T̄ ) ≤ h(T, T̄ ) B (a, b).
(65)
Since h(T, T̄ ) ≤ δ(²) = ²/B (a, b) and B (a, b) > 0, we get h(T, T̄ ) B (a, b) ≤ ² and, finally, d m (T, T̄ ) ≤ ².
C Analysis of the convolution max-metric
Lemma C.1. Let g : [a, b] → R be a continuous function and h : [0, b − a] → R be
a continuous function which is derivable on (0, b − a) and has bounded derivative.
Then the function q : [a, b] → R,
£
¤
q(s) = sup g (x) h(|s − x|)
(66)
x∈[a,b]
is continuous on [a, b].
Proof. Consider s 0 ∈ [a, b]. We need to show that ∀ ² > 0, ∃ δ(²) > 0 such that ∀ s ∈
T
(s 0 − δ, s 0 + δ) [a, b], we have
¯
¯
¯
£
¤
£
¤¯¯
¯
(67)
¯ sup g (x) h(|s − x|) − sup g (x) h(|s 0 − x|) ¯ < ².
¯x∈[a,b]
¯
x∈[a,b]
We have
¯
¯
g (x) h(|s − x|) − g (x) h(|s 0 − x|) ≤ ¯g (x) h(|s − x|) − g (x) h(|s 0 − x|)¯
¯
¯
g (x) h(|s − x|) ≤ ¯g (x) [h(|s − x|) − h(|s 0 − x|)]¯ + g (x) h(|s 0 − x|)
(69)
g (x) h(|s − x|) ≤ |g (x)| |h(|s − x|) − h(|s 0 − x|)| + g (x) h(|s 0 − x|).
(70)
29
(68)
The function g is bounded since it is continuous on a compact interval (Protter,
1998, p. 56). We denote by M the bound of the absolute value of g , i.e. |g (x)| ≤ M ,
∀x ∈ [a, b]. We denote by L the bound of the absolute value of the derivative of h,
i.e. |h(x) − h(y)| ≤ L |x − y|, ∀ x, y ∈ [0, b − a]. Let ² > 0 and δ = ²/(M L). Then for all
T
s ∈ (s 0 − δ, s 0 + δ) [a, b],
|h(|s − x|) − h(|s 0 − x|)| ≤ L ||s − x| − |s 0 − x||
|g (x)| |h(|s − x|) − h(|s 0 − x|)| ≤ M L ||s − x| − |s 0 − x|| .
(71)
(72)
From Eqs. 70 and 72,
g (x) h(|s − x|) ≤ M L ||s − x| − |s 0 − x|| + g (x) h(|s 0 − x|).
(73)
Because ∀u, v ∈ R we have ||u| − |v|| ≤ |u − v|, it follows that
g (x) h(|s − x|) ≤ M L |s − s 0 | + g (x) h(|s 0 − x|).
(74)
Because |s − s 0 | < δ = ²/(M L),
²
+ g (x) h(|s 0 − x|)
ML
= ² + g (x) h(|s 0 − x|).
g (x) h(|s − x|) < M L
Applying supremum to the equation above we obtain
£
¤
£
¤
sup g (x) h(|s − x|) < ² + sup g (x) h(|s 0 − x|) .
x∈[a,b]
(75)
(76)
x∈[a,b]
It follows that
sup
£
¤
£
¤
g (x) h(|s − x|) − sup g (x) h(|s 0 − x|) < ².
x∈[a,b]
(77)
x∈[a,b]
Analogously, by switching s and s 0 in Eq. 68 and the ensuing equations, we get
£
¤
£
¤
sup g (x) h(|s 0 − x|) − sup g (x) h(|s − x|) < ².
(78)
x∈[a,b]
x∈[a,b]
Thus we have proved Eq. 67 and the proof ends.
Proposition C.1. d c (T, T̄ ) < ∞.
Proof. Because K is positive, we have f ≥ 0 and f¯ ≥ 0. Moreover, ∀x ∈ R,
¯
¯ ¯
¯ ¯
¯
¯ f (x) − f¯(x)¯ ≤ ¯ f (x)¯ + ¯ f¯(x)¯ = f (x) + f¯(x)
n
n̄
X
¯
¯ X
¯ f (x) − f¯(x)¯ ≤
K (x − t (i ) ) +
K (x − t̄ (i ) ).
i =1
Since K (x) ≤ p, ∀ x ∈ R,
(79)
i =1
¯
¯
¯ f (x) − f¯(x)¯ ≤ p (n + n̄).
(80)
From Eq. 21,
Z
d c (T, T̄ ) ≤
b
¯
¯
sup ¯ f (x) − f¯(x)¯ sup H (|s − x|) ds
a x∈[a,b]
Z
d c (T, T̄ ) ≤p (n + n̄)
(81)
x∈[a,b]
b
sup H (|s − x|) ds.
a x∈[a,b]
30
(82)
Because H (y) < m, ∀ y ∈ [0, b − a] (Eq. 12), it follows that
d c (T, T̄ ) ≤ p (n + n̄) (b − a) m < ∞.
(83)
Proposition C.2. d c : S [a,b] × S [a,b] → R+ is a metric.
Proof. In order to show that d c (·, ·) is a metric we need to prove that it is nonnegative, that d c (T, T̄ ) = 0 ⇔ T = T̄ for any T, T̄ ∈ S [a,b] , that it is symmetric, and
that it satisfies the triangle inequality.
It is trivial to show that d c (T, T̄ ) is non-negative, symmetric, and that if T =
T̄ ⇒ d c (T, T̄ ) = 0. In order to prove that d c (T, T̄ ) = 0 ⇒ T = T̄ we use a reductio ad
absurdum argument. Assume that d c (T, T̄ ) = 0 with T 6= T̄ . For s ∈ [a, b] let
q(s) = sup
¯
©¯
ª
¯ f (x) − f¯(x)¯ H (|s − x|) .
(84)
x∈[a,b]
Because | f (x) − f¯(x)| is continuous, from the properties of H and Lemma C.1 we
obtain that q is continuous. Because of the properties of K , T 6= T̄ ⇒ ∃ x ∈ [a, b]
such that f (x) 6= f¯(x); and because H is strictly positive, it follows that q is not
zero everywhere, ∃x ∈ [a, b] such that q(x) > 0. Because q is continuous, it follows
that
Z
b
d c (T, T̄ ) =
q(s) ds > 0
a
(85)
which contradicts the hypothesis that d c (T, T̄ ) = 0. Hence, T = T̄ .
In order to prove the triangle inequality, consider T̂ ∈ S [a,b] . We have, ∀x, s ∈
[a, b],
¯ ¯
¯¢
¯
¯
¡¯
¯ f (x) − fˆ(x) + fˆ(x) − f¯(x)¯ H (|s − x|) ≤ ¯ f (x) − fˆ(x)¯ + ¯ fˆ(x) − f¯(x)¯ H (|s − x|).
(86)
Because sups (g (s)+h(s)) ≤ sups (g (s))+sups (h(s)) for any two functions g and h, it
follows that, ∀s ∈ [a, b],
sup
¯
¯
©¯
ª
©¯
ª
¯ f (x) − f¯(x)¯ H (|s − x|) ≤ sup ¯ f (x) − fˆ(x)¯ H (|s − x|) +
x∈[a,b]
x∈[a,b]
sup
¯
©¯
ª
¯ fˆ(x) − f¯(x)¯ H (|s − x|) .
(87)
x∈[a,b]
After integration, it results that
d c (T, T̄ ) ≤ d c (T, T̂ ) + d c (T̂ , T̄ ).
(88)
With this final equality we have shown that the distance is indeed a metric and
the proof ends.
D Analysis of the localized max-metric
Proposition D.1. d l (T, T̄ ) < ∞.
31
Proof. For every s ∈ [a, b] we have
¯
¯
h(T, T̄ ) = sup ¯d (x, T ) − d (x, T̄ )¯
x∈[a,b]
¯
¯
≥ sup ¯d (x, T ) − d (x, T̄ )¯
(89)
x∈[s,b]
¯
¯
h(T, T̄ ) L (b − s) ≥ L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ .
(90)
x∈[s,b]
By integrating the last equation above, we obtain
b
Z
a
¯
¯
L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ ds ≤ h(T, T̄ )
Z
x∈[s,b]
b
a
L (b − s)ds.
(91)
Since h(T, T̄ ) ≤ b − a and L (y) < m, ∀y ∈ [0, b − a] (Eq. 22), it follows that
d l (T, T̄ ) ≤ m (b − a)2 < ∞.
(92)
Proposition D.2. d l : S [a,b] × S [a,b] → R+ is a metric.
Proof. In order to show that d l (·, ·) is a metric we need to prove that it is nonnegative, that d l (T, T̄ ) = 0 ⇔ T = T̄ for any T, T̄ ∈ S [a,b] , that it is symmetric, and
that it satisfies the triangle inequality.
It is trivial to show that d l (T, T̄ ) is non-negative, symmetric, and that if T = T̄ ⇒
d l (T, T̄ ) = 0.
In order to prove that d l (T, T̄ ) = 0 ⇒ T = T̄ we use a reductio ad absurdum
argument. Assume that d l (T, T̄ ) = 0 with T 6= T̄ . Then, there must be at least one
spike in one of the two spike trains that is not in the other. Consider that this spike
belongs to T ; in the case it belongs to T̄ , the proof is analogous. Let u be the timing
of this spike, u ∈ T \ T̄ .
First, we consider the case u > a. We have, ∀s ∈ [a, u],
¯
¯ ¯
¯
sup ¯d (x, T ) − d (x, T̄ )¯ ≥ ¯d (u, T ) − d (u, T̄ )¯ .
(93)
x∈[s,b]
Because u ∈ T \ T̄ , d (u, T ) = 0 and d (u, T̄ ) > 0. Thus,
¯
¯
sup ¯d (x, T ) − d (x, T̄ )¯ ≥ d (u, T̄ ).
(94)
x∈[s,b]
Multiplying by L (·) and integrating the above equation, we obtain
Z u
Z u
¯
¯
L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ ds ≥ d (u, T̄ )
L (b − s) ds.
a
We also have
Z
b
u
(95)
a
x∈[s,b]
¯
¯
L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ ds ≥ 0.
(96)
x∈[s,b]
By adding the last two inequations above, and considering Eq. 26, we have:
Z u
d l (T, T̄ ) ≥ d (u, T̄ )
L (b − s) ds.
a
32
(97)
Because L is strictly positive on (0, b −a] and continuous, we have
0. Because we have d (u, T̄ ) > 0, we get
Ru
a
L (b −s) ds >
d l (T, T̄ ) > 0.
(98)
Since we have considered d l (T, T̄ ) = 0, it follows that Eq. 98 cannot be true. Hence,
T ⊆ T̄ .
Second, we consider the case u = a. Let v be the timing of the first spike in
either T or T̄ , other than u. Since T 6= T̄ , v > u. Because
b
Z
(u+v)/2
¯
¯
L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ ds ≥ 0,
(99)
x∈[s,b]
from Eq. 26 we have
(u+v)/2
Z
d l (T, T̄ ) ≥
a
d l (T, T̄ ) ≥
a
(100)
x∈[s,b]
(u+v)/2
Z
¯
¯
L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ ds
L (b − s)
¯
¯
¯d (x, T ) − d (x, T̄ )¯ ds.
sup
(101)
x∈[s,(u+v)/2]
For all x ∈ [u, (u + v)/2) we have¯ d (x, T ) = x −u, ¯d (x, T̄ ) ≥ v − x, and because on this
interval v − x > x − u, we have ¯d (x, T ) − d (x, T̄ )¯ > 0. Because L is strictly positive
on (0, b − a], we get
Z
(u+v)/2
a
L (b − s)
¯
¯
¯d (x, T ) − d (x, T̄ )¯ ds > 0
sup
(102)
x∈[s,(u+v)/2]
and thus
d l (T, T̄ ) > 0.
(103)
Since we have considered d l (T, T̄ ) = 0, it follows that Eq. 103 cannot be true. Hence,
T ⊆ T̄ .
Thus, we have shown that in both the case u > a and the case u = a we have
T ⊆ T̄ . Likewise, one can show that T̄ ⊆ T and so T = T̄ if d l (T, T̄ ) = 0.
In order to prove the triangle inequality consider T̂ ∈ S [a,b] . We have, ∀x ∈
[a, b],
|d (x, T ) − d (x, T̂ ) + d (x, T̂ ) − d (x, T̄ )| ≤ |d (x, T ) − d (x, T̂ )| + |d (x, T̂ ) − d (x, T̄ )|. (104)
Because supx (g (x) + h(x)) ≤ supx (g (x)) + supx (h(x)) for any two functions g and h,
it follows that, ∀s ∈ [a, b],
¯
¯
¯
¯
L (b − s) sup ¯d (x, T ) − d (x, T̄ )¯ ≤ L (b − s) sup ¯d (x, T ) − d (x, T̂ )¯ +
x∈[s,b]
x∈[s,b]
¯
¯
L (b − s) sup ¯d (x, T̂ ) − d (x, T̄ )¯ .
(105)
x∈[s,b]
After integration, it results that d l (T, T̄ ) ≤ d l (T, T̂ ) + d l (T̂ , T̄ ).
With this final equality we have shown that the distance is indeed a metric and
the proof ends.
33
E Analysis of the localized modulus-metric
Proposition E.1. d n (T, T̄ ) < ∞.
Proof. From Eq. 8, we have, ∀s ∈ [a, b],
¯
¯
h(T, T̄ ) ≥ ¯d (s, T ) − d (s, T̄ )¯ .
(106)
Multiplying by L (·), which is positive, we obtain
¯
¯
h(T, T̄ ) L (b − s) ≥ L (b − s) ¯d (s, T ) − d (s, T̄ )¯ .
(107)
By integrating the above equation, we obtain
Z b
Z b
¯
¯
h(T, T̄ )
L (b − s) ds ≥
L (b − s) ¯d (s, T ) − d (s, T̄ )¯ ds.
(108)
a
a
Since h(T, T̄ ) ≤ b − a and L (x) < m, ∀x ∈ [0, b − a] it follows that
d n (T, T̄ ) < m (b − a)2 < ∞.
(109)
Proposition E.2. d n : S [a,b] × S [a,b] → R+ is a metric.
Proof. In order to show that d n (·, ·) is a metric we need to prove that it is nonnegative, that d n (T, T̄ ) = 0 ⇔ T = T̄ for any T, T̄ , that it is symmetric, and that it
satisfies the triangle inequality.
Let T, T̄ ∈ S [a,b] . It is trivial to show that d n (T, T̄ ) is non-negative and symmetric, and that T = T̄ ⇒ d l (T, T̄ ) = 0. In order to prove the converse we use a reductio
ad absurdum argument. Assume T 6= T̄ with d n (T, T̄ ) = 0. For s ∈ [a, b] let
¯
¯
q(s) = L (b − s) ¯d (s, T ) − d (s, T̄ )¯ .
(110)
¯
¯
Because ¯d (s, T ) − d (s, T̄ )¯ is continuous and L is continuous it results that q is
continuous. Because T 6= T̄ ⇒ ∃ s ∈ [a, b] such that d (s, T ) 6= d (s, T̄ ); because L is
strictly positive on (0, b −a], it follows that q is not zero everywhere, ∃s ∈ [a, b) such
that q(s) > 0. Because q is continuous, it follows that
Z b
d n (T, T̄ ) =
q(s) ds > 0
(111)
a
which contradicts the hypothesis that d n (T, T̄ ) = 0. Hence, T = T̄ .
In order to prove the triangle inequality consider T̂ ∈ S [a,b] . We have, ∀s ∈ R,
|d (s, T ) − d (s, T̂ ) + d (s, T̂ ) − d (s, T̄ )| ≤ |d (s, T ) − d (s, T̂ )| + |d (s, T̂ ) − d (s, T̄ )|.
(112)
Multiplying by L (·) and integrating the above equation, we obtain
Z b
¯
¯
¯d (s, T ) − d (s, T̄ )¯ L (b − s) ds ≤
Z
a
b¯
a
¯
¯d (s, T ) − d (s, T̂ )¯ L (b − s) ds +
Z
b¯
a
¯
¯d (s, T̂ ) − d (s, T̄ )¯ L (b − s) ds
(113)
It results that
d n (T, T̄ ) ≤ d n (T, T̂ ) + d n (T̂ , T̄ ).
(114)
With this final inequality we have shown that the distance is indeed a metric and
the proof ends.
34
F Algorithms
35
Input: The pair of nonempty spike trains T1 , T2 and the bounds a and b.
Output: The distance d o (T1 , T2 ) between the spike trains.
〈T1 , T2 and P are ordered sets of real numbers, indexed starting from 0.〉
n 1 := length(T1 ); n 2 := length(T2 );
S
P := sort(T1 T2 );
M := ;;
for i := 1 . . . n 1 − 1 do
S
M := M {(T1 [i ] + T1 [i − 1])/2};
for i := 1 . . . n 2 − 1 do
S
M := M {(T2 [i ] + T2 [i − 1])/2};
for i := 1 . . . length(P ) − 1 do
S
M := M {(P [i ] + P [i − 1])/2};
S
S
P := sort(P M {a, b});
d o := 0; i 1 := 0; i 2 := 0;
〈s is the currently considered point from P . φ is the value at s of the integrated
function |d (s, T1 ) − d (s, T2 )|. s p is the previously considered point from P , and φp is
the value at s p of the integrated function. i 1 is the index of the first spike in T1
having a timing that is greater than s, if there is such a spike, or the index of the last
spike of T1 , otherwise. i 2 is computed analogously for T2 .〉
s p := a; φp := |T1 [0] − T2 [0]|;
for i := 1 . . . length(P ) − 1 do
s := P [i ];
while s ≥ T1 [i 1 ] and i 1 < n 1 − 1 do
i 1 := i 1 + 1;
while s ≥ T2 [i 2 ] and i 2 < n 2 − 1 do
i 2 := i 2 + 1;
d 1 := b − a; d 2 := b − a;
if i 1 > 0 then
d 1 := s − T1 [i 1 − 1];
d 10 = |T1 [i 1 ] − s|;
if d 10 < d 1 then
d 1 := d 10 ;
if i 2 > 0 then
d 2 := s − T2 [i 2 − 1];
d 20 = |T2 [i 2 ] − s|;
if d 20 < d 2 then
d 2 := d 20 ;
〈We now have d 1 = d (s, T1 ) and d 2 = d (s, T2 ) and we can compute the value of φ
at s:〉
φ := |d 1 − d 2 |;
〈The integration is performed here:〉
d o := d o + (s − s p )(φ + φp )/2;
s p := s; φp := φ;
return d o ;
Algorithm 1: An algorithm for computing the modulus-metric distance d o between two spike trains T1 and T2 . The text surrounded by 〈. . .〉 represents comments.
36
Input: The pair of non-empty spike trains T1 , T2 and the bounds a and b.
Output: The distance d o (T1 , T2 ) between the spike trains.
〈T1 and T2 are ordered sets of real numbers, indexed starting from 0. i 1 and i 2 are
the indices of the currently processed spikes in the two spike trains. p 1 and p 2 are
the indices of the previously processed spikes in the two spike trains. p is the index
of the spike train to which the previously processed spike belonged (1 or 2), after at
least one spike has been processed, or 0 otherwise.〉
i 1 := 0; i 2 := 0; p 1 := 0; p 2 := 0; p := 0;
n 1 := length(T1 ); n 2 := length(T2 );
〈P is©¡
an array of structures (s, φ)¢ªconsisting of an ordered pair of numbers.〉
P := s 7→ a, φ 7→ |T1 [0] − T2 [0]| ;
〈Process the spikes until the end of one of the spike trains is reached.〉
while i 1 < n 1 and i 2 < n 2 do
if T1 [i 1 ] ≤ T2 [i 2 ] then
proc1(1, 2);
else
proc1(2, 1);
〈Process the rest of the spikes in the spike train that has not been fully processed.〉
while i 1 < n 1 do
proc2(1, 2);
while i 2 < n 2 do
proc2(2, 1);
¢ª
S ©¡
P := P
s 7→ b, φ 7→ |T1 [n 1 − 1] − T2 [n 2 − 1]| ;
〈Sort P . Elements of P are sorted according to their value of s.〉
P := sort(P );
〈Perform the integration.〉
d o := 0;
for i := 1 . . . length(P ) − 1 do
d o := d o + (P [i ].s − P [i − 1].s)(P [i ].φ + P [i − 1].φ)/2;
return d o ;
Algorithm 2: Another algorithm for computing the modulus-metric distance d o
between two spike trains T1 and T2 . The text surrounded by 〈. . .〉 represents comments.
37
Input: The indices j and k of the two sorted spike trains T j , Tk ; j , k ∈ {1, 2}, j 6= k.
Data: Uses as global variables: the indices i j , i k of the current spikes in the two spike
trains; the indices p j , p k of the previously processed spikes in the two spike
trains; the index p of the spike train to which the previously processed spike
belonged (1 or 2; if no spike has been previously processed, p = 0); the data
structure P . We should have here T j [i j ] ≤ Tk [i k ]. If p 6= 0, we should have
T p [i p ] ≤ T j [i j ].
Result: Performs part of the processing needed for creating P . The procedure is used
when processing has not reached the end of one of the spike trains.
if i j > 0 then
〈Adds to P the timing situated at the middle of the interval between the currently
processed spike and the previous spike in the same spike train.〉
t := (T j [i j ] + T j [i j − 1])/2;
〈We have d (t , T j ) = T j [i j ] − t = t − T j [i j − 1] = (T j [i j ] − T j [i j − 1])/2.〉
¯
¯´o
S n³
¯
¯
P := P
s 7→ t , φ 7→ ¯(T j [i j ] − T j [i j − 1])/2) − d (t , k, i k )¯ ;
if p = k then
〈If the previously processed spike was one from the other spike train than the
spike currently processed, adds to P the timing situated at the middle of the
interval between the currently processed spike and the previously processed
spike.〉
t := (T j [i j ] + Tk [p k ])/2;
〈Since t is at equal distance to the closest spikes in the two spike trains, T j [i j ]
and Tk [p k ], we have d (t , T j ) = d (t , Tk ) and φ(t ) = 0.〉
¢ª
S ©¡
P := P
s 7→ t , φ 7→ 0 ;
〈Adds to P the currently processed spike.〉
t := T j [i j ];
〈We have d (t , T j ) = 0. If at least one spike from Tk has been processed, we have
Tk [p k ] ≤ t ≤ Tk [i k ], with i k = p k + 1, and thus d (t , Tk ) = min(|t − Tk [p k ]|, Tk [i k ] − t ).
If no spike from Tk has been processed, we have p k = i k = 0, and the previous
formula for
d (t , Tk ) still holds.〉
¢ª
S ©¡
P := P
s 7→ t , φ 7→ min(|t − Tk [p k ]|, Tk [i k ] − t ) ;
p j := i j ;
i j := i j + 1;
p := j ;
Procedure proc1( j , k).
38
Input: The indices j and k of the two sorted spike trains T j , Tk ; j , k ∈ {1, 2}, j 6= k.
Data: Uses as global variables: the index i j of the current spike in T j ; the index p k of
the previously processed spike in Tk ; the index p of the spike train to which
the previously processed spike belonged (1 or 2); the data structure P . Here, p k
should be the index of the last spike in spike train Tk . We should have
Tk [p k ] ≤ T j [i j ].
Result: Performs part of the processing needed for creating P . The procedure is used
when processing has reached the end of spike train Tk .
if i j > 0 then
〈Adds to P the timing situated at the middle of the interval between the currently
processed spike and the previous spike in the same spike train.〉
t := (T j [i j ] + T j [i j − 1])/2;
〈We have d (t , T j ) = T j [i j ] − t = t − T j [i j − 1] = (T j [i j ] − T j [i j − 1])/2.〉
¯
¯´o
S n³
¯
¯
P := P
s 7→ t , φ 7→ ¯(T j [i j ] − T j [i j − 1])/2) − d (t , k, p k )¯ ;
if p = k then
〈If the previously processed spike was one from the other spike train than the
spike currently processed (i.e., the last spike in the spike train that has been fully
processed), adds to P the timing situated at the middle of the interval between
the currently processed spike and the previously processed spike.〉
t := (T j [i j ] + Tk [p k ])/2;
〈Since t is at equal distance to the closest spikes in the two spike trains, T j [i j ]
and Tk [p k ], we have d (t , T j ) = d (t , Tk ) and φ(t ) = 0.〉
¢ª
S ©¡
P := P
s 7→ t , φ 7→ 0 ;
〈 Adds to P the currently processed spike. 〉
t := T j [i j ];
〈 We have d (t , T j ) = 0. We have Tk [p k ] ≤ t and the spike at p k is the last one in Tk ,
and thus ©¡
d (t , Tk ) = t − Tk [p k ].〉 ¢ª
S
P := P
s 7→ t , φ 7→ t − Tk [p k ] ;
i j := i j + 1;
p := j ;
Procedure proc2( j , k).
39
Input: A timing t , the index k ∈ {1, 2} of a sorted spike train Tk , and the index i of a
spike in Tk , such that either t ≤ Tk [i ] or i is the index of the last spike of Tk .
Output: The distance d (t , Tk ) between the timing t and the spike train Tk .
d := |Tk [i ] − t |;
j := i − 1;
while j ≥ 0 and |Tk [ j ] − t | ≤ d do
d := |Tk [ j ] − t |;
j := j − 1;
return d ;
Function d(t , k, i ).
References
Adrian, E. D. (1926), ‘The impulses produced by sensory nerve endings’, Journal of
Physiology 61, 49–72.
Bohte, S. M. (2004), ‘The evidence for neural information processing with precise
spike-times: A survey’, Natural Computing 3(2), 195–206.
Dauwels, J., Vialatte, F., Weber, T. and Cichocki, A. (2009), On similarity measures for spike trains, in ‘Advances in Neuro-Information Processing. 15th International Conference, ICONIP 2008, Auckland, New Zealand, November 25-28,
2008, Revised Selected Papers, Part I’, Vol. 5506 of Lecture Notes in Computer Science, Springer, pp. 177–185.
Deza, M. M. and Deza, E. (2009), Encyclopedia of Distances, Springer.
Fries, P., Nikolić, D. and Singer, W. (2007), ‘The gamma cycle’, Trends in Neurosciences 30(7), 309–316.
Geisler, W. S., Albrecht, D. G., Salvi, R. J. and Saunders, S. S. (1991), ‘Discrimination performance of single neurons: Rate and temporal information’, Journal of
Neurophysiology 66, 334–362.
Hausdorff, F. (1914), Grundzüge der Mengenlehre, Verlag von Veit & Comp, Leipzig.
Houghton, C. and Kreuz, T. (2012), ‘On the efficient calculation of van Rossum distances’, Network: Computation in Neural Systems 23, 48–58.
Jacobs, J., Kahana, M. J., Ekstrom, A. D. and Fried, I. (2007), ‘Brain oscillations
control timing of single-neuron activity in humans’, Journal of Neuroscience
27(14), 3839–3844.
Ji, D. and Wilson, M. A. (2007), ‘Coordinated memory replay in the visual cortex
and hippocampus during sleep’, Nature Neuroscience 10(1), 100–107.
Kepecs, A. and Lisman, J. (2003), ‘Information encoding and computation with spikes and bursts’, Network: Computation in Neural Systems 14(1), 103–118.
Krahe, R. and Gabbiani, F. (2004), ‘Burst firing in sensory systems’, Nature Reviews
Neuroscience 5, 13–24.
40
Kreuz, T., Chicharro, D., Andrzejak, R., Haas, J. and Abarbanel, H. (2009), ‘Measuring multiple spike train synchrony’, Journal of Neuroscience Methods 183(2), 287–
299.
Kreuz, T., Chicharro, D., Greschner, M. and Andrzejak, R. (2011), ‘Time-resolved
and time-scale adaptive measures of spike train synchrony’, Journal of Neuroscience Methods 195(1), 92–106.
Kreuz, T., Chicharro, D., Houghton, C., Andrzejak, R. G. and Mormann, F. (2013),
‘Monitoring spike train synchrony’, Journal of Neurophysiology 109(5), 1457–
1472.
Kreuz, T., Haas, J. S., Morelli, A., Abarbanel, H. D. and Politi, A. (2007), ‘Measuring
spike train synchrony’, Journal of Neuroscience Methods 165(1), 151–161.
Lee, H., Simpson, G., Logothetis, N. and Rainer, G. (2005), ‘Phase locking of single
neuron activity to theta oscillations during working memory in monkey extrastriate visual cortex’, Neuron 45(1), 147–156.
Montemurro, M. A., Rasch, M. J., Murayama, Y., Logothetis, N. K. and Panzeri, S.
(2008), ‘Phase-of-firing coding of natural visual stimuli in primary visual cortex’,
Current Biology 18(5), 375–380.
Nádasdy, Z., Hirase, H., Czurkó, A., Csicsvari, J. and Buzsáki, G. (1999), ‘Replay and
time compression of recurring spike sequences in the hippocampus’, Journal of
Neuroscience 19(21), 9497–9507.
Naud, R., Gerhard, F., Mensi, S. and Gerstner, W. (2011), ‘Improved similarity measures for small sets of spike trains’, Neural Computation 23, 3016–3069.
O’Searcoid, M. (2007), Metric Spaces, Springer Undergraduate Mathematics Series,
Springer.
Papadopoulos, A. (2005), Metric spaces, convexity and nonpositive curvature, IRMA
lectures in mathematics and theoretical physics, European Mathematical Society.
Pompeiu, D. (1905), ‘Sur la continuité des fonctions de variables complexes’, Annales de la Faculté des Sciences de Toulouse 2/7(3), 265–315.
Protter, M. H. (1998), Basic elements of real analysis, Springer-Verlag, New York,
USA.
Reinagel, P., Godwin, D., Sherman, S. M. and Koch, C. (1998), ‘Encoding of visual
information by LGN bursts’, Journal of Neurophysiology 81(5), 2558–2569.
Rockafellar, R. T. and Wets, R. J.-B. (2009), Variational Analysis, Springer.
Rusu, C. V. and Florian, R. V. (2010), ‘A new spike train metric’, BMC Neuroscience
11(Suppl. 1), P169. Nineteenth Annual Computational Neuroscience Meeting:
CNS*2010.
Schrauwen, B., and Van Campenhout, J. (2007), ‘Linking non-binned spike train
kernels to several existing spike train metrics’, Neurocomputing 70(7–9), 1247–
1253.
41
Schreiber, S., Fellous, J., Whitmer, D., Tiesinga, P. and Sejnowski, T. (2003), ‘A
new correlation-based measure of spike timing reliability’, Neurocomputing 52–
54, 925–931.
Siegel, M., Warden, M. and Miller, E. (2009), ‘Phase-dependent neuronal coding of
objects in short-term memory’, Proceedings of the National Academy of Sciences
of the USA 106(50), 21341–21346.
Tiesinga, P., Fellous, J. and Sejnowski, T. (2008), ‘Regulation of spike timing in visual
cortical circuits’, Nature Reviews Neuroscience 9(2), 97–107.
Toups, J. V., Fellous, J.-M., Thomas, P. J., Sejnowski, T. J. and Tiesinga, P. H. (2012),
‘Multiple spike time patterns occur at bifurcation points of membrane potential
dynamics’, PLoS Computational Biology 8(10), e1002615.
van Rossum, M. C. W. (2001), ‘A novel spike distance’, Neural Computation 13, 751–
763.
VanRullen, R., Guyonneau, R. and Thorpe, S. J. (2005), ‘Spike times make sense’,
Trends in Neurosciences 28(1), 1–4.
Victor, J. D. (2005), ‘Spike train metrics’, Current Opinion in Neurobiology 15, 585–
592.
Victor, J. D. and Purpura, K. P. (1996), ‘Nature and precision of temporal coding
in visual cortex: A metric-space analysis’, Journal of Neurophysiology 76, 1310–
1326.
Victor, J. D. and Purpura, K. P. (1997), ‘Metric-space analysis of spike trains: Theory,
algorithms and application’, Network: Computation in Neural Systems 8, 127–
164.
42
| 9cs.NE
|
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
arXiv:1705.10718v2 [math.AC] 31 Jan 2018
STEVEN V SAM AND ANDREW SNOWDEN
Abstract. Suppose that for each n ≥ 0 we have a representation Mn of the symmetric
group Sn . Such sequences arise in a wide variety of contexts, and often exhibit uniformity
in some way. We prove a number of general results along these lines in this paper: our
prototypical theorem states that if {Mn } can be given a suitable module structure over a
twisted commutative algebra then the sequence {Mn } follows a predictable pattern. We
phrase these results precisely in the language of Hilbert series (or Poincaré series, or formal
characters) of modules over tca’s.
Contents
1. Introduction
2. Preliminaries
3. Formal characters
4. The main theorems on Hilbert and Poincaré series
5. A categorification of rationality
6. D-finiteness of Hilbert series of bounded modules
7. Examples and applications
References
1
3
5
10
15
18
20
27
1. Introduction
Suppose that for each n ≥ 0 we have a complex representation Mn of the symmetric group
Sn . Such sequences of symmetric group representations arise in a variety of contexts, and
naturally occurring examples tend to exhibit some kind of uniformity. For example:
(a) Fix a manifold X of dimension ≥ 2 and a non-negative integer i. Let Mn be the
ith cohomology group of the configuration space of n labeled points on X. This
example was studied in [CEF]. One of the theorems in loc. cit. states that, under
mild assumptions on X, there is a single character polynomial that gives the character
of Mn for all sufficiently large n.
(b) Fix p and r. Let Mn be the space of p-syzygies of the Segre embedding (Pr )n →
Prn+n−1 . This case was studied in [Sno]. One of the theorems in loc. cit. states that
the generating function of the sequence {dim(Mn )} is rational.
(c) Suppose that N is a functor associating to each finite dimensional vector space V a
module N(V ) over the ring Sym(Cd ⊗ V ), for some fixed d (and that satisfies some
Date: November 1, 2017.
2010 Mathematics Subject Classification. 05E05, 13A50.
SS was supported by a Miller research fellowship and NSF grant DMS-1500069.
AS was supported by NSF grants DMS-1303082 and DMS-1453893 and a Sloan Fellowship.
1
2
STEVEN V SAM AND ANDREW SNOWDEN
technical conditions). For example, one could take N(V ) to be the coordinate ring
of the rth determinantal variety for some 0 ≤ r ≤ d. Now let Mn be the Schur–
Weyl dual of the degree n piece of N. This example is studied in [Sno] and, in much
greater detail, [SS5]. Again, it is known that the generating function of the dimension
sequence is rational.
(d) Let E be a representation of a reductive group G, and take Mn = (E ⊗n )G . The
generating function of {dim(Mn )} is D-finite (and typically not rational, or even
algebraic). This is presumably well-known, though we do not know a reference. See
§7.4 for a proof.
In this paper, we study the uniformity properties of sequences {Mn } with the aim of strengthening and generalizing results like those mentioned above. We prove a number of results of
the form “if {Mn } admits a suitable module structure over a twisted commutative algebra
then the sequence {Mn } follows a predictable pattern.” The specific results give various
precise meanings to “suitable” and “predictable pattern.”
1.1. Statement of results. We now state some of our results in a little more detail. Let k
be a field of characteristic 0. AL
twisted commutative algebra (tca) over k is an associative
unital graded k-algebra A = n≥0 An equipped with an action of the symmetric group Sn
on An , such that the multiplication is commutative up L
to a “twist” by the symmetric group.
A module over a tca A is a graded vector space M = n≥0 Mn equipped with an action of
Sn on Mn and a multiplication An × Mm → Mn+m satisfying suitable axioms. Note that a
module M gives rise to a sequence of representations {Mn } as discussed above. TCA’s and
their modules have been a central object of study in the developing field of representation
stability. For example, k[t] can be regarded as a tca (with t of degree 1, and all Sn actions
trivial), and modules over it are equivalent to the FI-modules of Church–Ellenberg–Farb
[CEF].
Suppose that M is a module over a tca. We define its Hilbert series by
X
tn
HM (t) =
dim(Mn ) .
n!
n≥0
The following theorem was proved in [Sno], and later reproved in [SS4]:
Theorem 1.1. Suppose M is a finitely generated module over a tca finitely generated in
degree 1. Then HM (t) is a polynomial in t and et .
This theorem implies that the generating function for {dim Mn } is rational, but is even
stronger than this. The results of this paper generalize and strengthen this theorem in
various ways.
We now informally describe some of the main results of this paper. In what follows, A
denotes a tca generated in degree 1 and M denotes a finitely generated A-module.
(a) We introduce the formal character ΘM of M. This records the character of each
representation Mn , and thus contains much more information than the Hilbert series.
Using the structure theory of A-modules developed in [SS5], we give a very precise
description of ΘM . Our result shows that there is a finite expression for ΘM , and
moreover that the pieces in this expression reflect the structure of M. As a corollary,
we see that if M and N are finitely generated A-modules such that Mn and Nn
have the same character for all n, then M and N represent the same class in the
Grothendieck group of A-modules.
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
3
(b) Using the method of [Sno], we give a different proof of a rationality result for ΘM .
Actually, we work with the enhanced Hilbert series introduced in [SS1], which is
equivalent to the formal character. This is less precise than the proof described in
(a), but does not rely on the theory from [SS5].
(c) We show how the Fourier transform from [SS5] affects (enhanced) Hilbert series.
(d) We explain how all of the results on (enhanced) Hilbert series carry over to the more
subtle Poincaré series.
(e) Theorem 1.1 can be stated equivalently as: there exists a polynomial p(T ) with nonnegative integer roots such that p( dtd )HM (t) = 0. We prove a categorification of this
result, in which dtd is replaced with the Schur derivative.
Additionally, we prove a result for tca’s not necessarily generated in degree 1:
(f) If A is a finitely generated tca with A0 = C and M is a finitely generated and bounded
A-module, then HM (t) is a D-finite power series.
1.2. Open problems. We now list some questions and open problems related to the work
in this paper.
• To what extent do the results here carry over to positive characteristic? Theorem 1.1
is known to hold in positive characteristic by [SS4, Corollary 7.1.7], but the other
results of this paper are not known.
• Result (a) above gives a finite expression for the formal character ΘM in the case
where M is a finitely generated module over a tca A finitely generated in degree 1.
Is there a more general result if one assumes that A is bounded instead of generated
in degree 1?
• Result (e) categorifies Theorem 1.1. Can the rationality theorem for the formal character be similarly categorified? Presumably, such a categorification should make use
of the more general Schur derivatives Dλ .
• The discussion in §5.4 raises a number of questions about the categorified rationality.
For example: in the tensor category of differential operators, what can one say about
the ideal annihilating a given module? Result (e) ensures that it is non-zero.
• What can be said about the Hilbert series of a finitely generated module over an
arbitrary finitely generated tca? For example, is it D-finite?
• There are interesting sequences {Mn } of symmetric group representations that do
not come from tca’s, but related structures, such as FSop -modules (see [SS4, §8]). To
what extent do the results here extend to those sequences?
1.3. Outline. In §2 we review some background material that we will require. In §3 we
introduce the formal character and prove our “rationality” theorem for it. In §4.1 we translate
our results about formal characters to Hilbert series (and Poincaré series), and also give
an elementary proof of the rationality theorem in this setting. In §5 we prove a result
categorifying the rationality theorem. In §6 we prove D-finiteness for Hilbert series over
bounded tca’s not necessarily generated in degree 1. Finally, in §7 we give some examples
and applications of our results.
2. Preliminaries
This paper is a continuation of [SS5] and hence will use the same notation.
4
STEVEN V SAM AND ANDREW SNOWDEN
Throughout, X denotes a separated, noetherian C-scheme of finite Krull dimension, and
E is a vector bundle over X. We will primarily be interested in the case when X is a point,
but in order to simplify some of the arguments, it will be necessary to allow X to be a
Grassmannian. Any extra generality beyond that will not be used, but does not present any
additional difficulties. The reader unfamiliar with the language of sheaf theory can assume
X is a point for most of the paper, in which case quasi-coherent sheaves specialize to complex
vector spaces, and coherent sheaves specialize to finite-dimensional vector spaces.
Throughout, we make use of the category VX , which has several equivalent models. The
two that we use here are the category of sequences of symmetric group representations on
quasi-coherent OX -modules, and the category of polynomial functors from the category of
vector spaces to quasi-coherent OX -modules. See [SS2, §5] for more detailsLin the case
X = Spec(C). In the first model, every object VX admits a decomposition
λ Mλ ⊗ Fλ
where Mλ is the usual Specht module over C and Fλ is a quasi-coherent sheaf on X; in the
second model, we get a similar decomposition, but with Mλ replaced by the Schur functor
Sλ . Given F ∈ VX in the second model, we use ℓ(F ) to denote the maximum number of
parts of any λ such that Sλ has a nonzero multiplicity space. We say that F is bounded
if ℓ(F ) < ∞. We let Vdfg
X denote the subcategory of VX where the multiplicity spaces
Fλ are coherent. (The “dfg” superscript means “degreewise finitely generated.”) We let
Vfg
of Vdfg
X be the subcategory
X where all but finitely many of the Fλ vanish. We also let
S
∞
n
V = C = n≥1 C be the standard representation of GL∞ ; evaluating a Schur functor
on V gives an equivalence between the category of polynomial functors and the category of
polynomial representations of GL∞ .
Since we are working over a field of characteristic 0, we can use an alternative description
of tca’s: they are polynomial functors from the category of vector spaces to the category of
(sheaves of) commutative algebras. We let A(E) denote the tca which sends a vector space
V to the commutative algebra Sym(E ⊗ V ).
2.1. K-theory of relative Grassmannians. For a non-negative integer r, Grr (E) denotes
the relative Grassmannian of rank r quotients of E. Let πr : Grr (E) → X be the structure
map, and let Q = Qr be the tautological quotient bundle on Grr (E) and let R = Rr denote
the tautological subbundle, so that we have a short exact sequence
0 → R → π∗E → Q → 0
on Grr (E). Define
ir : K(Grr (E)) → K(A(E)),
ir ([V ]) = [Rπr∗ (V ⊗ A(Qr ))].
Let Λ denote the ring of symmetric functions, and let Λd be the space of symmetric functions
which are homogeneous of degree d. The group K(A(E)) is naturally a Λ-module via sλ ·[M] =
[Sλ (V) ⊗ M]. The following can be found in [SS5, Theorem 6.19]:
Theorem 2.1. The maps ir induce an isomorphism of Λ-modules
rank
ME
r=0
Λ ⊗ K(Grr (E)) → K(A(E)).
2.2. Integration on the torus. Let T be the diagonal torus in GL(d). Denote by α1 , . . . , αd
the standard characters T → Gm , and identify the representation
ring K(T ) with the ring
R
of Laurent polynomials Q[α1 , α1−1, . . . , αd , αd−1 ]. We let f 7→ T f dα be the projection map
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
5
K(T ) → Q which takes the constant term of f . We let f 7→ f be the ring homomorphism
K(T ) → K(T ) defined by sending αi to αi−1 . Define
Y
(αi − αj ),
|∆|2 = ∆∆.
∆(α) =
1≤i<j≤d
Weyl’s integration formula (see [FH, §26.2]) can then be stated as follows: if f, g ∈ K(T ) are
the characters of irreducible representations of GL(d), then
(
Z
1 if f = g
1
.
(2.2)
f (α)g(α)|∆(α)|2 dα =
d! T
0 if f 6= g
2.3. Symmetric groups and symmetric functions. Fix a nonnegative integer n. Let
λ be an integer partition of n and let cλ be the conjugacy class of permutations with cycle
type λ. Also, partitions parametrize the irreducible complex representations Mλ . We let
tr(cµ |Mλ ) denote the trace of any element of cµ acting on Mλ . We refer to [SS2, §2] for basic
properties and further references.
Given an integer partition
let mi (λ) denote the number of λj that are
Q λ = (λ1 , . . . , λr ),Q
equal to i, and set λ! = i mi (λ)! and zλ = λ! i imi (λ) .
P
For an integer n, let pn = pn (α) denote the power sum symmetric polynomial di=1 αin .
For a partition λ = (λ1 , . . . , λr ), let pλ denote the polynomial pλ1 · · · pλr . We allow d to be
infinite. The notation sλ is reserved for the Schur function. By [Sta, 7.17.5, 7.18.5], we have
X
(2.3)
sλ =
tr(cµ |Mλ )zµ−1 pµ .
|µ|=|λ|
3. Formal characters
In this section, we will assume all schemes X have an ample
line bundle L.1
L
dfg
Let V be an object of VX . Recall that V decomposes as λ Vλ ⊗Sλ (V) where Vλ ∈ Modfg
X.
We define the formal character of V as
X
ΘV =
[Vλ ]sλ ,
λ
where, as usual, [Vλ ] is the class of Vλ in K(X) and sλ ∈ Λ is the Schur function. Thus ΘV
is a potentially infinite series whose terms belong to Λ ⊗ K(X). Since Λ is the polynomial
ring in the complete homogeneous symmetric functions {sn }n≥1 , one can also think of ΘV
as a power series in these variables with coefficients in K(X). When X is a point, dim(Vλ )
is the class of the vector space Vλ in K(X) ∼
= Z.
′
We write K (X) for the Grothendieck group of vector bundles on X. The group K(X) is
a module over K′ (X), and there is a natural map K′ (X) → K(X).
Remark 3.1 (Splitting principle). Given a symmetric polynomial f (x1 , . . . , xn ) and a vector
bundle E of rank n on X, then we define f ([E]) ∈ K′ (X) as follows: if E has a filtration
whose associated graded is L1 ⊕ · · · ⊕ Ln , where the Li are line bundles, then f ([E]) =
f ([L1 ], . . . , [Ln ]). In general, consider the relative flag variety π : Flag(E) → X. In this
case, π ∗ E has a filtration by line bundles, and we define f ([E]) := Rπ∗ (f ([π ∗ E])). (See [Fu,
1Recall
that this means that for every coherent sheaf F, F ⊗ Ln is generated by global sections for n ≫ 0.
This is in particular satisfied if X is a quasi-projective variety, or an affine scheme.
6
STEVEN V SAM AND ANDREW SNOWDEN
§3.2]; note that when E is a line bundle, Flag(E) = X and π ∗ and π∗ are both identity
maps.)
We now introducePsome notation
needed to state our main result on formal characters.
n
For k ≥ 0, let σk = n≥k k sn . (In the definition of σ0 we use the convention s0 = 1.) For
a partition λ, we put
Y
σλ =
σnmn (λ)
n≥1
where mn (λ) is the multiplicity of n in λ.
Lemma 3.2. The elements σ0 , σ1 , . . . are algebraically independent over Q.
Proof. Let md0 ,...,dr be the monomial (σ0 −1)d0 σ1d1 · · · σrdr . Let fd0 ,...,dr (k) denote the sum of the
coefficients of all sλ with |λ| = k. Then fd0 ,...,dr (k) is a polynomial of degree d1 +2d2 +· · ·+rdr .
Moreover, the degree of the leading term (under the usual grading where deg sλ = |λ|) of
md0 ,...,dr is d0 + d1 + 2d2 + · · · + rdr . Hence any linear dependence among the m’s can be
made homogeneous if we assign md0 ,...,dr the bidegree (d0 , d1 + 2d2 + · · · + rdr ).
Since σ0 − 1 is a nonzerodivisor, it suffices to handle the case d0 = 0. But now we can
simply observe that the σk ’s with k ≥ 1 are related to the sn ’s with n ≥ 1 by an upper
triangular change of variables, and the sn ’s are algebraically independent.
(r)
e = Λ ⊗ Z[σ0 , σ1 , . . . ] be the polynomial ring in the sn ’s and σn ’s. Let m be the
Let Λ
λ
monomial symmetric polynomial in r variables associated to the partition λ, and define
(r)
(r)
Mλ (x1 , . . . , xr ) = mλ (x1 − 1, . . . , xr − 1).
For a proper map π : Y → X, we define a bilinear pairing
h, i : K′ (Y ) × K(Y ) → K(X),
h[E], [F]i = [Rπ∗ (E ⊗ F)].
We define a map
e ⊗ K(X),
θr : Λ ⊗ K(Grr (E)) → Λ
X
r−ℓ(λ)
(r)
sµ ⊗ [F] 7→ sµ
σ λ · σ0
· hMλ ([Q]), [F]i.
ℓ(λ)≤r
Here Q is the tautological quotient bundle on Grr (E). We will see below that this sum is
finite: the maximum value of λ1 for which the term can be non-zero is bounded by a function
of dim(X) and rank(E). We can now state our main result:
P
E
Theorem 3.3. Let M ∈ Dbfg (A(E)), and write [M] = rank
r=0 cr with cr ∈ Λ ⊗ K(Grr (E))
per Theorem 2.1. Then
rank
XE
ΘM =
θr (cr ).
r=0
In particular, ΘM is a polynomial in the sn ’s and σn ’s with coefficients in K(X).
Before proving the theorem, we note a few corollaries. First, in Lemma 3.8 below, we
show that θr is injective. Since everything in the image of θr has total degree r in the σ’s, it
follows that the images of the θr ’s are linearly independent. We conclude:
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
7
Corollary 3.4. The map
e ⊗ K(X)
Θ : K(A(E)) → Λ
is injective. Thus if M and N are two finitely generated A(E)-modules then [M] = [N] in
K(A(E)) if and only if [Mλ ] = [Nλ ] in K(X) for all λ.
Let F • K(Grr (E)) be the filtration by codimension of support. We also consider the topo•
logical filtration Ftop
K′ (Grr (E)) on K′ (Grr (E)) which is a ring filtration (see [FL, §V.3]). In
(r)
|λ|
particular, Mλ ([Q]) ∈ Ftop K′ (Grr (E)); by definition, given a subvariety of dimension < |λ|,
(r)
Mλ ([Q]) can be represented by a complex whose homology is 0 along that subvariety. It
(r)
follows that hMλ ([Q]), [F]i = 0 if F has support dimension < |λ|.
For the following, let ModA,≤r be the subcategory of A-modules which are locally annihilated by powers of the rth determinantal ideal ar , and let T>r : ModA → ModA / ModA,≤r be
the localization functor. It admits a section functor (right adjoint) S>r : ModA / ModA,≤r →
ModA and we set Σ>r = S>r ◦ T>r . This is a left exact functor, and induces a functor RΓ>r
on D(A). Next, we define Γ≤r to be the functor that assigns a module M to the maximal
submodule which is locally annihilated by ar . This is also left exact and induces a functor
RΓ≤r on D(A). Finally, we let Dbfg (A)r be the full subcategory of Dbfg (A) of objects which
are sent to 0 by RΓ≤r−1 and RΣ>r . See [SS5, §6.1] for more details.
Corollary 3.5. Suppose M ∈ Dbfg (A(E))r and [M] belongs to Λ ⊗ F k K(Grr (E)). Then ΘM
P
r−ℓ(λ) λ
has the form |λ|≤k cλ σ0
σ , where cλ ∈ Λ ⊗ K(X).
The point of the corollary is that, if one gives σn degree n, then the degree of ΘM is related
to the support dimension of M on Grr (E). Of course, if M is not in Dbfg (A(E))r then one
can apply the corollary separately to each projection RΣ≥r RΓ≤r (M).
We now begin with the proof of the theorem. We start with a few lemmas. If V ∈ Vdfg
X
is OX -flat, we let Θ′V be defined like ΘV except we use the class of Vλ in K′ (X). Under
the natural map K′ (X) → K(X), we have that Θ′V maps to ΘV . Thus Θ′V contains more
information than ΘV , when it is defined. We note that if V, W ∈ Vdfg
X and V is OX -flat
then ΘV ⊗W = Θ′V · ΘW , where the multiplication on the right side uses the K′ (X)-module
structure on K(X).
Lemma 3.6. Let L be a line bundle on Y . Let ℓ = [L] − 1 ∈ K′ (Y ) and d = dim(Y ). Then
Θ′A(L) =
d
X
ℓm σm .
m=0
Proof. By [FL, Corollary V.3.10], ℓd+1 = 0. We have
Θ′A(L) =
X
n≥0
[L]n sn =
X
(ℓ + 1)n sn =
d
XX
n
n≥0 m=0
n≥0
m
ℓ m sn =
d
X
m=0
ℓm
#
X n
sn .
m
n≥m
"
Lemma 3.7. Let Q be a locally free coherent sheaf of rank r on Y . Then
X
(r)
r−ℓ(λ)
Θ′A(Q) =
Mλ ([Q])σ λ σ0
.
ℓ(λ)≤r
8
STEVEN V SAM AND ANDREW SNOWDEN
Proof. By the splitting principle, we
Q may assume [Q] = [L1 ] + · · · + [Lr ] for line bundles Li .
Put ℓi = [Li ] − 1. Since [A(Q)] = ri=1 [A(Li )], we use Lemma 3.6 to get
" d
#
r
r
Y
Y
X
X (r)
r−ℓ(λ)
mλ (ℓ1 , . . . , ℓr )σ λ σ0
.
Θ′A(Q) =
Θ′A(Li ) =
ℓni σn =
i=1
i=1
n=0
λ1 ≤d,
ℓ(λ)≤r
Since ℓd+1
= 0, the bound λ1 ≤ d in the index for the sum is superfluous. We note that
i
(r)
(r)
mλ (ℓ1 , . . . , ℓr ) = Mλ ([Q]), by definition.
Proof of Theorem 3.3. Fix r, let Y = Grr (E), let π : Y → X be the structure map, and let
Q be the tautological bundle on Y . By [SS5, Corollary 6.16], it suffices to prove the result
for M = Rπ∗ (V ⊗ A(Q)) with V ∈ Vfg
Y . In fact, since everything in sight is V- or Λ- linear,
fg
it suffices to treat the case V ∈ ModY . By Lemma 3.7, we have
X
(r)
r−ℓ(λ)
ΘV ⊗A(Q) = ΘV · Θ′A(Q) =
Mλ ([Q])[V ]σ λ σ0
.
ℓ(λ)≤r
Since formation of formal characters is compatible with derived pushforward, we find
X
(r)
r−ℓ(λ)
ΘM = Rπ∗ (ΘV ⊗A(Q) ) =
hMλ ([Q]), [V ]iσ λ σ0
.
ℓ(λ)≤r
Prank E
Now, in the decomposition [M] = r=0 cr with cr ∈ Λ ⊗ K(Grr (E)), we have ci = 0 for
P
E
i 6= r and cr = [V ]. Thus the above is exactly equal to rank
r=0 θr (cr ), which proves the
theorem.
Lemma 3.8. The map θr is injective.
P
(r)
e if
Proof. By definition of Λ,
i sµi ⊗ [Fi ] maps to 0, then hMλ ([Q]), [F]i = 0 for all λ with
ℓ(λ) ≤ r. Via a change of basis, this implies that h[Sλ (Q)], [F]i = 0 for all such λ.
Also, K(Grr (E)) is generated by [Sλ† (R∗ )⊗π ∗ G] where [G] ∈ K(X), λ ⊆ r ×(d−r), and we
whenever λ, µ ⊆ r × (d − r) by [SS5, Corollary A.3].
have h[Sλ† (R∗ ) ⊗ π ∗ G], [Sµ (Q)]i
P = δλ,µ [G]
∗
∗
In particular, write [F] =
λ [Sλ† (R ) ⊗ π Fλ ]. Applying h−, [Sµ (Q)]i, we conclude that
[Fµ ] = 0 for all µ, so [F] = 0.
In [SS5, §7], we define an equivalence of categories
FE : Dbfg (A(E))op → Dbfg (A(E∨ ))
called the “Fourier transform.” To close this section, we examine how FE affects formal
characters. In what follows, we write F in place of FE .
The definition of F depends on the choice of a dualizing complex ωX on X, so we fix
a choice now. We let D be the induced duality on Dbfg (X) and K(X) and K′ (X). Let
(−)‡ : Λ → Λ be the ring homomorphism defined by s‡λ = (−1)|λ| sλ† . We extend (−)‡ to
infinite formal linear combinations of sλ ’s in the obvious manner.
Lemma 3.9. We have the identity
X
n≥0
σn‡ tn =
"
X
n≥0
σn tn
#−1
e
In particular, σ0‡ = σ0−1 and σn‡ ∈ Λ[1/σ
0 ] for all n ≥ 0.
.
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
Proof. We have
X
X k
tn sk =
(1 + t)n sn ,
σn t =
n
n≥0
k≥0
n,k≥0
X
and so
9
n
X
σn‡ tn =
n≥0
X
(1 + t)n (−1)n s1n .
k≥0
Now, we have the basic identity
X
n≥0
sn
!
X
(−1)n s1n
n≥0
!
= 1.
Since Λ is graded with sn and s1n of degree n, the identity continues to hold if we replace
sn by (1 + t)n sn and s1n by (1 + t)n s1n .
Our main result on the Fourier transform is:
Proposition 3.10. Let M ∈ Dbfg (A(E)). Then ΘF (M ) = D(Θ′A(E) · Θ‡M ).
Proof. In [SS5, §7.1.1], we define the Koszul duality functor K = KE . Let T (M) = M ⊗LA(E)
OX , and let T (M)i denote the degree i piece of this object, regarded as a complex in VX .
By [SS5, Prop 7.1], we have
M
A(E)
Hn (K (M)) =
Tori−n (M, OX ),
i∈Z
and so
ΘK (M ) =
X
(−1)i+n ΘT (M )i .
i,n∈Z
We define F (M) by applying D and (−)† to K (M). Note that the above sum is ΘT (M )
with the terms of odd degree multiplied by −1; when we apply (−)† to this, we get exactly
Θ‡T (M ) . We thus have the identity
ΘF (M ) = D(Θ‡T (M ) ).
V
Now, the complex • (E ⊗ V) ⊗ M computes T (M). The formal character of this complex
is exactly (Θ′A(E) )‡ · ΘM . We thus have the identity
ΘT (M ) = (Θ′A(E) )‡ · ΘM .
Combining with the previous equation, we obtain the stated result.
Corollary 3.11. Suppose E is trivial of rank n. Then ΘF (M ) = σ0n · D(Θ‡M ).
e ⊗ K′ (X).
Proof. In this case, Θ′A(E) = (Θ′A(C) )n , and it is clear that Θ′A (C) = σ0 ⊗ 1 ∈ Λ
10
STEVEN V SAM AND ANDREW SNOWDEN
4. The main theorems on Hilbert and Poincaré series
4.1. Standard Hilbert series. Pick V ∈ Vdfg
of as a sequence of Sn X , which we think L
representations on coherent OX -modules, and decompose it as V = λ Vλ ⊗ Mλ . We define
its Hilbert series by
X
t|λ|
HV (t) =
[Vλ ] dim(Mλ )
,
|λ|!
λ
where [Vλ ] is the class of Vλ in K(X). Thus HV (t) is a power series with coefficients in the
group K(X). In [Sno], the following theorem was proved:
Theorem 4.1. Suppose X is a point and that M is a finitely generated A(E)-module, where
P
E is a d-dimensional vector space. Then HM (t) = di=0 pi (t)eit for some polynomials pi (t).
In this section, we generalize this theorem, and examine how the form of HM (t) relates to
the structure of M. To a large extent, we answer [Sno, Question 3].
For a vector bundle E on X, define
µr,0 : K(Grr (E)) → K(X)
X
hmλ ([Q]∗ ), [F]i
[F] 7→
λ1 ≤d,
ℓ(λ)≤r
t|λ|
ert .
λ1 ! · · · λr !
We define a map
µr (sλ ⊗ x) = t|λ| µr,0(x).
µr : Λ ⊗ K(Grr (E)) → K(X)[t],
b = Q Λd . From [Sta, §7.8], we have a ring homomorphism
Let Λ
d≥0
In particular, we have
b → Q[[t]]
ex : Λ
X
tn
f 7→
(coefficient of x1 x2 · · · xn in f ) .
n!
n≥0
t|λ|
ex(sλ ) = dim(Mλ )
,
|λ|!
tk t
ex(Sk ) = e ,
k!
and hence ex(ΘM ) = HM (t). From the above discussion and the definitions of θr and µr , we
have ex ◦ θr = µr .
Our main theorem on Hilbert series is then:
P
Theorem 4.2. Let M be a finitely generated A(E)-module, and write [M] = dr=0 cr with
cr ∈ Λ ⊗ K(Grr (E)) per Theorem 2.1. Then
HM (t) =
d
X
µr (cr )ert .
r=0
Proof. By Theorem 3.3, we have ΘM =
Pd
r=0 θr (cr ).
Now apply ex to both sides.
One consequence of this theorem is that the coefficient of ert in HM (t) depends only on the
projection RΠr (M) of M to Dbfg (A)r . We now examine how the Fourier transform interacts
with Hilbert series.
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
11
Proposition 4.3. Let M be a finitely generated A(E)-module. Then
HFE (M ) (t) = D(edt HM (−t)).
P
P
Thus if HM (t) = dr=0 pr (t)ert , with pr (t) ∈ K(X)[t], then HFE (M ) (t) = dr=0 p∗d−r (−t)ert ,
where p∗r (t) is obtained from pr (t) by applying D to its coefficients.
Proof. Apply ex to Proposition 3.10.
4.2. Enhanced Hilbert series. Let λ be a partition. Recall that mi (λ) is the number of
times i occurs in λ. Define
m (λ) m2 (λ)
t2
tλ = t1 1
··· ,
and
Xλ (t) =
λ! = m1 (λ)!m2 (λ)! · · ·
X
|µ|=|λ|
tr(cµ |Mλ ) ·
tµ
.
µ!
Thus Xλ (t) is a polynomial in the variables ti that encodes the character of Mλ .
Lemma 4.4. The map
is an isomorphism of rings.
ϕ : Λ ⊗ Q → Q[ti ],
sλ 7→ Xλ
Proof. The pn are algebraically independent generators for Λ ⊗ Q, so as can be seen from
(2.3), ϕ can be described as pn 7→ ntn , which is evidently a ring isomorphism.
We can also extend ϕ to a map
b ⊗ Q → Q[[ti ]].
ϕ: Λ
dfg
Now
Llet V ∈ VX . Thinking of V in the symmetric group model, we can decompose it as
V = λ Vλ ⊗ Mλ . We define the enhanced Hilbert series of V by
X
e V (t) =
H
[Vλ ]Xλ (t).
λ
This is a power series in the variables ti with coefficients in K(X). This series was introduced
in [SS1] as an improvement of the Hilbert series, the idea being that it records the character
e V (t) is obtained
of the Sn -representation of Vn rather than just its dimension. Clearly, H
from the formal character ΘV by applying the ring isomorphism ϕ. Thus the two invariants
contain the same information and are just packaged in a different manner. Our results on
the formal character can be easily translated to the language of enhanced
Hilbert series. We
P
n
just state the rationality theorem here. For k ≥ 0, put Tk = n≥k k tk . It is a simple
exercise to show that ϕ(σn ) has the form p(T ) exp(T0 ) where p(T ) is a polynomial in the Tk
with k ≥ 1. Applying this to Theorem 3.3 yields:
Theorem 4.5. Let M be a finitely generated A(E)-module. Then
e M (t) =
H
d
X
pi (t, T )erT0
r=0
where pi (t, T ) is a polynomial in t1 , t2 , . . . and T1 , T2 , . . . with coefficients in K(X).
12
STEVEN V SAM AND ANDREW SNOWDEN
Remark 4.6. One obtains the usual Hilbert series HM (t) from the enhanced Hilbert series
e M (t) by setting ti = 0 for i ≥ 2. Thus the above theorem recovers our earlier rationality
H
result for the non-enhanced Hilbert series.
4.3. Elementary proof of Theorem 4.5. We now give an elementary proof (i.e., not using
the results of [SS5]) of our main theorem on enhanced Hilbert series. The proof follows the
e M (t)
proof of rationality of the usual Hilbert series given in [Sno, §3.1]. Namely, we express H
d
in terms of the T -equivariant Hilbert series of M(C ), where T is the standard maximal torus
in GL(d) for d sufficiently large. Once this expression is obtained, a formal manipulation
gives the theorem.
Let M be a finitely generated A-module, where A is a tca finitely generated in degree 1.
We assume (without loss of generality) that M is a finitely generated module over A = A(U)
for some finite dimensional vector space U. Fix an integer d ≥ max(ℓ(A), ℓ(M)).
L
Let V be a vector space (possibly infinite dimensional) on which T acts. Write V =
Vα ,
where the sum is over the characters α of T and Vα denotes the α-weight space. Assuming
each Vα is finite dimensional, we define the T -equivariant Hilbert series of V by
X
HV,T (α) =
dim(Vα )α.
α
αi±1 ,
Each character α is a monomial in the
and so HV,T (α) can be regarded as a formal
series in these variables. Note that if V comes from a polynomial representation of GL(d)
then no αi−1 ’s appear in HV,T (α).
Regard A and M as Schur functors and evaluate on the vector space Cd . We obtain a
finitely generated C-algebra A(Cd ) and a finitely generated A(Cd )-module M(Cd ), equipped
with compatible actions of GL(d). We can form the T -equivariant Hilbert series of M(Cd ),
which we denote by HM (Cd ),T (α). By the comments of the last paragraph, this is a formal
series in the αi . A simple argument with equivariant resolutions over A(Cd ) (see [Sno,
Lemma 3.3]), shows that
h(α)
HM (Cd ),T (α) = Qd
,
n
i=1 (1 − αi )
where h(α) is a polynomial in the αi ’s and n = dim(U).
Define
X
tλ
K(t, α) =
pλ (α) ,
λ!
λ
where the sum is taken over all partitions λ. The following lemma gives a different expression
for K(t, α).
Lemma 4.7. For a partition λ, let sλ (α) ∈ K(T ) denote the character of Sλ (Cd ). Then
X
e M (t),
K(t, α) =
sλ (α)H
λ
λ
where the sum is over all partitions λ with ℓ(λ) ≤ d.
Proof. By [Sta, Corollary 7.17.4], we have
X
pµ =
tr(cµ |Mλ )sλ
λ
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
13
as elements of K(T ), where the sum is over partitions λ of |µ| with ℓ(λ) ≤ d. Multiplying
by tµ /µ! and summing over µ, we find
X
tµ X e
sλ HMλ .
K(t, α) =
tr(cµ |Mλ )sλ =
µ!
λ
λ,µ
e M (t) to the more accessible object HM (Cd ),T .
The following is the key lemma, relating H
Lemma 4.8. We have
e M (t) = 1
H
d!
Z
HM (Cd ),T (α)K(t, α)|∆(α)|2dα.
T
Proof. Let aλ be the multiplicity of Mλ in M. Note that aλ = 0 if d < ℓ(λ), by definition of
d. We have
X
M ⊕a
e M (t).
e M (t) =
aλ H
and
H
Mλ λ ,
M=
λ
λ
λ
On the other hand,
M(Cd ) =
M
Sλ (Cd )⊕aλ ,
and
HM (Cd ),T (α) =
λ
We therefore have
e M (t) =
H
1
=
d!
=
1
d!
aλ sλ (α).
λ
X
λ
X
e M (t)
aλ H
λ
Z
T
Z
X
λ
aλ sλ (α)
!
X
µ
!
e Mµ (t) |∆(α)|2 dα
sµ (α)H
HM (Cd ),T (α)K(t, α)|∆(α)|2dα.
T
To go from the first line to the second, we used Weyl’s integration formula (2.2). Both sums
in the second equation are over partitions with ℓ ≤ d; in particular, both sλ and sµ are
characters of (non-zero) irreducible representations of GL(d). To go from the second line to
the third, we used Lemma 4.7.
We need one more lemma before proving the theorem.
Lemma 4.9. Let u1 , . . . , ud be indeterminates. We then have
!
Z
d
∞
Y
X
1
K(t, α)dα =
exp
uni tn .
Qd
(1
−
α
u
)
T
i i
i=1
i=1
n=1
Proof. For x ∈ Zd≥0 , let αx denote α1x1 · · · αdxd , and similarly define ux . Then we have
Z
X
1
K(t, α)dα =
(the coefficient of αx in K(t, α))ux
Qd
(1
−
α
u
)
T
i i
i=1
x
X
ux tλ
.
=
(the coefficient of αx in pλ )
λ!
x,λ
14
STEVEN V SAM AND ANDREW SNOWDEN
Here x varies over Zd≥0 , while λ varies over all partitions. Now, a simple computation shows
that the coefficient of αx in pλ is given by
X
λ!
,
µ
!
·
·
·
µ
!
1
d
µ ,...,µ
1
d
where the sum is taken over partitions µ1 , . . . , µd such that µ1 ∪ · · · ∪ µd = λ and |µi | = xi .
We thus find
µ1
µd
X |µ |
X
ux tλ
|µ | t · · · t
(the coefficient of αx in pλ )
=
u1 1 · · · ud d
λ!
µ1 ! · · · µd !
µ1 ,...,µd
x,λ
!
!
X |µ| tµ
X |µ| tµ
···
.
ud
=
u1
µ!
µ!
µ
µ
Now, we have
X
µ
z |µ|
tµ
=
µ! n
=
X
1 ≥0,
∞
Y
k=1
z n1 +2n2 +···
n2 ≥0, ...
tn1 1 tn2 2
···
n1 ! n2 !
#
∞
n
Y
t
kn k
exp(z k tk ).
=
z
n!
n≥0
"
X
k=1
Combining the previous two equations gives the stated result.
Proof of Theorem 4.5. Put
ϕ0 (x, t) =
X
xi ti ,
i≥1
and, more generally,
ϕn (x, t) =
X
i≥1
i(i − 1) · · · (i − n + 1)xi−n ti =
dn
ϕ0 (x, t).
dxn
We have ϕn (1, t) = Tn and ϕn (0, t) = n!tn (with t0 interpreted as 0). Lemma 4.9 can be
restated as
Z
1
K(t, α)dα = exp(ϕ0 (u1 , t) + · · · + ϕ0 (ud , t)).
(4.10)
Qd
T
i=1 (1 − αi ui )
Finally, suppose we are given an expression
Z
p(α)
K(t, α)dα
Qd
ni
T
i=1 (1 − αi )
where p(α) is a polynomial. We claim that it is a polynomial in exp(T0 ) and {Ti , ti | i ≥ 1}.
e M (t) can be expressed as such an integral
This claim proves the theorem, as we know that H
by Lemma 4.8.
We now prove the claim. When ni = 0 for all i, the integral in question is a polynomial
in the ti , so there is nothing to show in that case. By linearity and applying polynomial
long division in each variable separately, we may assume that p(α) is a sum of monomials
α1m1 · · · αdmd where mi < ni for all i. Now apply ( ∂u∂ 1 )n1 −1 · · · ( ∂u∂ d )nd −1 to (4.10) and then set
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
15
ui = 1 for all i. The result is a polynomial in exp(T0 ) and {Ti | i ≥ 1}, which can be seen
by using the right side of (4.10). The left side becomes a scalar multiple of
Z n1 −1
α1
· · · αdnd −1
K(t, α)dα.
Qd
ni
T
i=1 (1 − αi )
For any mi ≤ ni , we then also know that
Z Qd
mi −1
(1 − αi )ni −mi
i=1 αi
K(t, α)dα
Qd
ni
T
i=1 (1 − αi )
is a polynomial in exp(T0 ) and {Ti | i ≥ 1}. Finally, for fixed ni > 0, note that the set
)
( d
Y
αimi −1 (1 − αi )ni −mi 1 ≤ mi ≤ ni
i=1
is a basis for the span of monomials in α1k1 · · · αdkd such that 0 ≤ ki < ni . Hence by linearity
and combining our earlier reduction, we conclude that our original expression is a polynomial
in exp(T0 ) and {Ti , ti | i ≥ 1}.
4.4. Poincaré series. Given an A-module M, define its Poincaré series by
X
(−q)n HTorAn (M,C) (t).
PM (t, q) =
n≥0
Setting q = 1 and multiplying by HA (t) = edt recovers the Hilbert series HM (t). Note that
the Poincaré series has non-trivial information about the A-module structure of M, whereas
the Hilbert series only knows about the underlying object of VX . The Poincaré series does
not factor through K-theory, so it is much harder to study than the Hilbert series. The
following is our main result about it:
Theorem 4.11. Let M be a finitely generated A-module. There exist fr (t, q) ∈ K(X)[t, q, q −1]
such that
d
X
PM (t, q) =
fr (t, q)e−rqt .
r=0
Proof. Let Nk = H−k (F (M)), where
F (M) is the Fourier transform of M. A simple formal
P
manipulation gives PM (t, q) = k≥0 (−q)−k HNk (−qt). The result now follows from the fact
that each Nk is finitely generated and only finitely many Nk are non-zero [SS5, Theorem 7.7]
and the structure theorem for HNk (Theorem 4.2).
There is much more one could say about Poincaré series and variants using the methods of
this paper: for example, one could define an “enhanced Poincaré series” or a Poincaré-variant
of the formal character, and prove results about them.
5. A categorification of rationality
5.1. Motivation. Let D : V → V be the Schur derivative. If F is a polynomial functor, then
DF is the functor assigning to a vector space V the subspace of F (V ⊕ C) on which Gm
acts through its standard character (this copy of Gm acts by multiplication on C only). In
terms of sequences of symmetric group representations, the Schur derivative takes a sequence
M = (Mn )n≥0 to the sequence DM given by (DM)n = Mn+1 |Sn . See [SS2, §6.4] for more
16
STEVEN V SAM AND ANDREW SNOWDEN
details. (There the Schur derivative is denoted D, but this conflicts with our notation for
duality functors.)
Let A = A(E) and suppose M is a finitely generated A-module. One observes that
HD(M ) (t) = dtd HM (t), and so the Schur derivative can be thought of as a categorification of
d
. There is a natural map E ⊗M → D(M). For a subspace V of E, let ∂V (M) be the 2-term
dt
complex [V ⊗ M → D(M)], where the differential is just the restriction of the previously
mentioned map to V ⊗ M. Then H∂V (M ) (t) = ( dtd − d)HM (t), where d = dim(V ), and so ∂V
is a categorification of the operator dtd − d.
The main result about HM (t) is that it isQa polynomial in t and et . It follows that HM (t)
is annihilated by an operator of the form ni=1 ( dtd − di ) for non-negative integers di . The
discussion of the previous paragraph thus suggests a stronger result, namely, that there exists
subspaces V1 , . . . , Vn such that ∂V1 · · · ∂Vn annihilates M. We will show that this is indeed
the case. This is a categorification of the rationality theorem for HM (t).
One may view this as an analogue of the existence of a system of parameters for a finitely
generated module. For some discussion of this analogy, see [SS1, Remark 5.4.2].
5.2. The main theorem. Let A = A(E) and let M be an A-module. There is then a
natural map E ⊗ M → D(M). For a subspace V of E, we let ∂V (M) be the 2-term complex
[V ⊗ M → D(M)]. More generally, for a complex M of A-modules, we let ∂V (M) be the
cone on the map V ⊗ M → D(M). This defines an endofunctor of Dbfg (A). (To actually get
a functor, one should work with the homotopy category of injective objects.) We define a
differential operator on Dbfg (A) to be a finite composition of endofunctors of the form ∂V .
We say that M satisfies a differential equation if there exists a differential operator ∂
such that ∂(M) = 0.
Theorem 5.1. Every object of Dbfg (A) satisfies a differential equation.
Lemma 5.2. Any two differential operators commute (up to isomorphism). In particular,
if ∂ is a differential operator and M satisfies a differential equation then ∂(M) also satisfies
a differential equation.
Lemma 5.3. In an exact triangle in D(A), if two terms satisfy differential equations then
so does the third.
Let r ≥ 0 be an integer, let Y = Grr (E), let π : Y → Spec(C) be the structure map, let
Q be the tautological bundle on Y , and let B = A(Q). For V ⊂ E, we define the differential
operator ∂V on B-modules just as for A-modules, and we define a differential operator on
D(B) to be a composition of ∂V ’s.
Lemma 5.4. Suppose M ∈ Db (B) satisfies a differential equation and F ∈ Vfg
Y . Then
F ⊗LOY M also satisfies a differential equation.
Proof. By induction on Tor-dimension, we can assume F is OY -flat. We have
D(F ⊗ M) = (D(F) ⊗ M) ⊕ (F ⊗ D(M)).
The map E ⊗ (F ⊗ M) → D(F ⊗ M) maps into the factor F ⊗ D(M). We thus see that
∂V (F ⊗ M) = (F ⊗ ∂V (M)) ⊕ (D(F) ⊗ M).
We thus see that if ∂ is a differential operator annihilating M then ∂(F ⊗ M) is a direct sum
of objects of the form F ′ ⊗ M ′ , where F ′ has strictly lower degree than F and M ′ is the result
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
17
of applying some differential operator to M. Since each M ′ satisfies a differential equation,
the result follows by induction on the degree of F.
Lemma 5.5. B satisfies a differential equation.
Proof. We have ∂V (B) = [V → Q] ⊗ B. Since [V → Q] is a complex of OY -modules, it pulls
out of differential operators. We thus see that if ∂ = ∂V1 · · · ∂Vn then
∂(B) = [V1 → Q] ⊗ · · · ⊗ [Vn → Q] ⊗ B.
For appropriate choices of the Vi ’s, the above complex is acyclic: indeed, simply choose the
Vi ’s so that for every y ∈ Y there is some i for which Vi (y) → Q(y) is an isomorphism.
Proof of Theorem 5.1. It is clear that differential operators commute with Rπ∗ . We thus
L
b
see that if F ∈ Vfg
Y then the object Rπ∗ (F ⊗OY B) of Dfg (A) satisfies a differential equation.
These objects generate Dbfg (A) by [SS5, Corollary 6.16] (note that by [SS5, Remark 6.15], one
can take the F to be OY -flat). Thus all objects of Dbfg (A) satisfy a differential equation.
5.3. Differential operators and duality. Let M be a finitely generated A(E)-module.
By Proposition 4.3, we have
HFE (M ) (t) = edt HM (−t).
For any differentiable function f (t), we have the identity
d
d
− d edt f (−t) = −edt f (−t).
dt
dt
e obtained by applying the
Hence, if ∂ is a differential operator that annihilates f (t), then ∂,
d
d
substitution dt 7→ dt − d to ∂, is a differential operator that annihilates edt f (−t).
We can realize this identity using differential operators as follows. Pick a minimal free
resolution F• of M. Note that
D(V ⊗ A) = (D(V ) ⊗ A) ⊕ (V ⊗ E ⊗ A).
Furthermore, for any subspace V ⊂ E, we have FE ◦∂V [1] = ∂(E/V )∗ ◦FE (see lemma below).
This implies that if ∂ annihilates M, then ∂e annihilates FE (M), where ∂e is obtained from
∂ by substitution of ∂(E/V )∗ into ∂V .
Lemma 5.6. For V ⊂ E we have an isomorphism of endofunctors FE ◦∂V [1] ∼
= ∂(E/V )∗ ◦FE
of D(A).
Proof. (We omit many of the details in this proof to keep it short.) By definition, we have
FE (M) = (M ⊗A K)R,∨,† ,
where K = K(E) is the Koszul complex and (−)∨ denotes vector space duality on multiplicity spaces. Using the fact that D satisfies the Leibniz rule and D(Sym(E[1])) =
E[1] ⊗ Sym(E[1]), we find
D((M ⊗A K)R,∨,† ) = ((D(M) ⊕ (E[1] ⊗ M)) ⊗A K)R,∨,† = FE (D(M) ⊕ (E[1] ⊗ M)).
The above identity neglects the differentials: in fact, the complex inside the Fourier transform
is actually the cone on the canonical map E ⊗ M → D(M), namely ∂E (M). We thus find
that ∂(E/V )∗ (FE (M)) is the cone on the natural map
FE ((E/V ) ⊗ M) = (E/V )∗ ⊗ FE (M) → D(FE (M)) = FE (∂E (M)).
18
STEVEN V SAM AND ANDREW SNOWDEN
A computation shows that this map is just FE applied to the canonical map ∂E (M) →
E/V ⊗ M. (Recall that ∂E (M) is the cone of the map E ⊗ M → D(M); the map here comes
from the canonical map E ⊗ M → E/V ⊗ M.) The cone of the map ∂E (M) → E/V ⊗ M is
quasi-isomorphic to the cone of V ⊗ M → D(M), i.e., ∂V (M). This completes the proof.
5.4. The category of differential operators. We end this section with some additional
thoughts on differential operators. It could be interesting to pursue these observations further
in the future.
Write E for the endofunctor M 7→ E ⊗ M of ModA , and write D for the endofunctor
given by the Schur derivative. There is then a natural transformation E → D, from which
all of the differential operator structure derives. Let G ⊂ GL(E ⊕ V) be the subgroup fixing
all elements of E, and let C be the category of polynomial representations of G. Then C
is the universal tensor category having an object X and a morphism E → X (one takes
X = E ⊕ V): that is, given any tensor category D and a morphism E → X in D, there is a
unique left-exact tensor functor C → D mapping E → E ⊕ V to E → X. (The group G is
an example of a “general affine group,” and the universal property of C, in the d = 1 case,
can be found in [SS3, §5.4]. Note that E is simply isomorphic to a direct sum of d copies of
the unit object of C.)
The universal property of C furnishes a functor C → End(ModA ) taking E → E ⊕ V
to the transformation E → D discussed above. Alternatively, we can think of this functor
as an action C × ModA → ModA . This action induces one on derived categories Db (C) ×
Db (A) → Db(A). For V ⊂ E, the 2-term complex [V → X] in Db (C) acts on Db (A) as the
differential operator ∂V . The tensor product structure on Db (C) corresponds to composition
of differential operators.
Our main theorem on differential equations states that every object of Dbfg (A) is annihilated
by some object of Dbfg (C). It would be interesting if this result could be made more precise.
For example, given M ∈ Dbfg (A), what does the annihilator in Dbfg (C) look like? Is it principal,
as a tensor ideal?
Another potentially interesting observation: C is equivalent to both the category Mod0A
of A-modules supported at 0 and the category Modgen
A of “generic” A-modules (see [SS5,
Propositions 5.4, 5.6]). Is this more than a coincidence? Does the action of C on ModA come
from, or extend to, an interesting action of ModA on itself? We have not fully investigated
these questions.
6. D-finiteness of Hilbert series of bounded modules
Recall that a power series f ∈ CJtK is D-finite if it satisfies a differential equation of the
form
n
X
di f
pi (t) i = 0,
dt
i=0
where each pi is a polynomial in t. See [Sta, §6.4] for some basic properties and examples.
In this section, we prove the following theorem.
Theorem 6.1. Let A be a finitely generated tca with A0 = C and let M be a finitely generated
A-module which is bounded. Then HM (t) is D-finite.
We can assume that A is a polynomial tca. Recall the notation from §4.3.
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
19
Lemma 6.2. Suppose max(ℓ(A), ℓ(M)) < ∞. For d ≥ max(ℓ(A), ℓ(M)), we have
Z
P
HM (t) =
HM (Cd ),T (α)e αi t |∆|2 dα.
T
e M (t) by doing the substitution
Proof. HM (t) is obtained from the enhanced Hilbert series H
ti 7→ 0 for i ≥ 2 and t1 7→ t. Apply this substitution to Lemma 4.8. Then K(t, α) becomes
X
λ
dim(Mλ )sλ (α)
X
t|λ|
tn
=
(α1 + · · · + αd )n = exp(α1 t + · · · + αd t)
|λ|! n≥0
n!
where the first equality comes from Schur–Weyl duality (or see [Sta, Corollary 7.12.5]).
We have A(Cd ) = Sym(V ) (we warn the reader that this is evaluation of A on the vector
space Cd , not to be confused with A(Cd )) forLsome polynomial representation V of GL(d).
n
Ai
d
Ai
Write a T -equivariant decomposition V =
means
i=1 Cα , where Ai ∈ Z≥0 and α
Ai,d
Ai,1
α1 · · · αd . We then have
HM (Cd ),T (α)|∆|2 = Q
p(α)
1 − α Ai
for some polynomial p. It suffices to treat the case where p is a monomial, say p(α) = αb ,
with b ∈ Zd . We then have
X
αxA+b ,
HM (Cd ),T (α)|∆|2 =
x∈Zn
≥0
and hence
X
t|xA+b|
,
(xA + b)!
x∈Zn
≥0
P
Q
where for y ∈ Zd≥0 we write |y| = i yi and y! = i yi !. Put
X
X
#{x ∈ Zn≥0 | xA + b = y} · uy .
uxA+b =
F (u1 , . . . , ud ) =
HM (t) =
x∈Zn
≥0
y∈Zd≥0
Then F is a rational function of the ui . Indeed, let R be the ring C[ξ1 , . . . , ξn ] and give
R a Zd≥0 grading by deg(ξi ) = Ai . Then F is the T -equivariant Hilbert series of the free
R-module with one generator of degree b, and is therefore rational [MS, Theorem 8.20]. The
theorem then results from the following general result:
Proposition 6.3. Suppose that
X
ay uy
X
ay
y∈Zd≥0
is a rational function of the ui . Then
y∈Zd≥0
is D-finite.
t|y|
y!
20
STEVEN V SAM AND ANDREW SNOWDEN
Proof. Define the Hadamard product ∗ on multivariate generating functions by the formula
X
X
X
αy βy uy .
αy u y ∗
βy uy =
y∈Zd≥0
y∈Zd≥0
y∈Zd≥0
Furthermore, we define a multivariate generating function F to be D-finite if the vector
space (over the field of rational functions) spanned by all partial derivatives of F is finitedimensional. By [Lip, Remark 2], the Hadamard product of two D-finite generating functions
is D-finite. It is clear that a rational function is D-finite and the exponential function exp(u1 +
·P
· · + ud ) is also D-finite. Hence we conclude that their Hadamard product F (u1 , . . . , ud) =
uy
y∈Zd≥0 ay y! is also D-finite. Now do the substitution ui 7→ t for i = 1, . . . , d. By the chain
rule,
d
X
∂F
d
F (t, . . . , t) =
,
dt
∂ui
i=1
so the result is also D-finite.
7. Examples and applications
7.1. Hilbert series of polynomial tca’s. For an integer n ≥ 1, define a linear map
Q[ti ] → Q[ti ], denoted f (t) 7→ f (t[n] ), by taking tλ to tnλ , where nλ = (nλ1 , nλ2 , . . .). We
extend this map to series in the obvious manner. The following is the main result of this
section:
Proposition 7.1. Let V be a finite length object of V concentrated in degree d 6= 0 and let
A = Sym(V ). Then
!
X
e A (t) = exp
e V (t[n] ) .
H
nd−1 H
n≥1
Proof. Both sides convert direct sums in V to products, so it suffices to treat the case where
V = Sλ (C∞ ). Recall from (2.3) that
X
sλ =
zµ−1 tr(cµ |Mλ )pµ .
Q
µ
The GL-character of A is T (1 − xT )−1 where the sum is over all semistandard Young
m (T )
tableaux T of shape λ and xT is the product of xi i
where mi (T ) is the multiplicity of i
in T . Apply log to this expression:
"
#
X
X X xn
Y
T
log
log(1 − xT )−1 =
(1 − xT )−1 =
n
T
T n≥1
T
X1
X1X
=
zµ−1 tr(cµ |Mλ )pnµ (x).
sλ (xn1 , xn2 , . . . ) =
n
n µ
n≥1
n≥1
Making the substitution pi 7→ iti , we obtain the stated result (see Lemma 4.4).
e V (t) = td , and so H
e V (t[n] ) = td . We thus obtain
Example 7.2. Take V = (C∞ )⊗d . Then H
1
n
X
e A (t) = exp
H
nd−1 tdn .
n≥1
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
Note that for d = 1 this is exp(T0 ).
21
e V = 1 t2 + t2 , and so H
e V (t[n] ) =
Example 7.3. Take V = Sym2 (C∞ ), so d = 2. Then H
2 1
1 2
t + t2n . We thus obtain
2 n
X
2
n
e A (t) = exp
t + nt2n .
H
2 n
n≥1
In particular, HA (t) = exp( 21 t2 ). The case V =
to a − sign.
V2
(C∞ ) is similar: just change the + sign
Remark 7.4. In the notation of the proposition, the tca A is generated in degree d, and
so Theorem 4.5 cannot be applied to it for d > 1; in fact, the above calculations show that
e A computed
the conclusion of the theorem is false in this case. Nonetheless, the values of H
above are sufficiently nice that one might hope for a good generalization of Theorem 4.5
which includes these cases.
7.2. Formal characters of determinantal rings. Let A be the tca A(E), where E is a
d-dimensional vector
space. V
Let ar ⊂ A be the rth determinantal ideal, generated by the
V
representation r+1 (C∞ ) ⊗ r+1 (E). In this section, we derive a formula for the formal
character of A/ar .
Recall that we have an isomorphism of Grothendieck groups
(7.5)
K(A) =
d
M
r=0
Λ ⊗ K(Grr (E)).
To apply Theorem 3.3, we need to understand the class [A/ar ] in K(A) under this identification. The following lemma gives us what we need.
Lemma 7.6. Under the isomorphism (7.5), the class of [A/ar ] corresponds to 1 ⊗ [OGrr (E) ].
Proof. Let Qr be the tautological bundle on Yr = Grr (E), and let πr : Yr → Spec(C) be the
structure map. Let ir : K(Grr (E)) → K(A) be the map defined by ir ([V ]) = [R(πr )∗ (V ⊗
A(Qr ))]. According to [SS5, Theorem 6.19], the maps ir induce the isomorphism (7.5). Now,
we have
ir ([OYr ]) = [R(πr )∗ (A(Qr ))]
and
M
A(Qr ) =
Sλ (C∞ ) ⊗ Sλ (Qr ).
ℓ(λ)≤r
The vector bundle Sλ (Qr ) has no higher cohomology, and its space of sections is Sλ (E). We
thus find that R(πr )∗ (A(Qr )) = A/ar , which proves the lemma.
For the rest of the section, we fix r and put Y = Grr (E). We let Q be the tautological bundle on Y and π : Y → Spec(C) the structure map. From the above lemma and Theorem 3.3,
we see that the formal character ΘA/ar is given by θr ([OY ]). We now compute θr ([OY ]), at
(r)
least to some extent. To do this, we must compute the inner product hMλ ([Q]), [OY ]i. To
(r)
(r)
(r)
start, define Sλ (x1 , . . . , xr ) = sλ (x1 −1, . . . , xr −1) where sλ denotes the Schur polynomial
in r variables.
(r)
Lemma 7.7. If ℓ(λ) ≤ r, then hSλ ([Q]), [OY ]i = dim Sλ† (Cd−r ).
22
STEVEN V SAM AND ANDREW SNOWDEN
Proof. We first verify this when λ = (n). In that case, it follows from the definitions (or the
general formula [Mac, p. 47, Example I.3.10]) that
n
X
(r)
(r)
n−i n + r − 1
si (x1 , . . . , xr ),
sn (x1 − 1, . . . , xr − 1) =
(−1)
i
+
r
−
1
i=0
and so
Sn(r) ([Q])
=
n
X
(−1)
n−i
i=0
Now,
(r)
si ([Q])
i
n + r − 1 (r)
s ([Q]).
i+r−1 i
is simply [Sym (Q)], and so we see
d+i−1
.
]i = [Rπ∗ (Sym (Q))] =
i
Here we used the fact that π∗ (Symi (Q)) has dimension d+i−1
, and the higher pushforwards
i
vanish. We thus find
n
X
d+i−1
n−i n + r − 1
(r)
hSn ([Q]), [OY ]i =
(−1)
i
i+r−1
i=0
n
X
n + r − 1 −d
(−1)n
=
i
n−i
i=0
n−d+r−1
= (−1)n
n
d−r
= dim S(n)† (Cd−r ).
=
n
a
For the second and fourth equalities, we used the identities ab = a−b
and a+b−1
=
b
b −a
(−1) b , and the third identity is the Chu–Vandermonde identity. This proves the lemma
for λ = (n).
(r)
The above reasoning applies equally well to r-fold products of Sn . That is, we have
d−r
d−r
(r)
([Q]),
[O
]i
=
dim
S
† (C
)
⊗
·
·
·
⊗
S
† (C
)
hSn(r)
([Q])
·
·
·
S
Y
(n
)
(n
)
n
r
1
r
1
(r)
hsi ([Q]), [OY
i
for any n1 , . . . , nr . The key point here is that
[Rπ∗ (Symn1 (Q) ⊗ · · · ⊗ Symnr (Q))] = dim Symn1 (Cd ) ⊗ · · · ⊗ Symnr (Cd ) .
To see this, we first decompose the tensor product Symn1 (Q) ⊗ · · · ⊗ Symnr (Q) into a direct
sum of Schur functors Sλ (Q) with ℓ(λ) ≤ r = rank(Q) where the bound comes from the
Pieri rule. Now Borel–Weil–Bott (see [SS5, Theorem A.1] for a convenient formulation) says
that Rπ∗ Sλ (Q) = Sλ (Cd ), and we get a direct sum which is the same as the tensor product
Symn1 (Cd ) ⊗ · · · ⊗ Symnr (Cd ) (it is important that there are at most r factors in the tensor
product so that all Schur functors appearing in it have at most r rows, and therefore do not
annihilate Q).
We now prove the lemma for general λ by induction on dominance order (i.e., λ dominates
µ if |λ| = |µ| and λ1 + · · · + λi ≥ µ1 + · · · + µi for all i). The base case is when λ has a single
part, which we have already done. In general, sλ = sλ1 · · · sλr + C where C is a sum of sµ
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
23
(r)
with µ less dominant than λ. By induction, hSµ ([Q]), [OY ]i = dim Sµ† (Cd−r ) for all such µ.
By the previous paragraph,
hSλ1 ([Q]) · · · Sλr ([Q]), [OY ]i = dim(S(λ1 )† (Cd−r ) ⊗ · · · ⊗ S(λr )† (Cd−r )).
Hence the statement also holds for λ.
Let Kλ,µ be the Kostka number, i.e., the number of semistandard Young tableaux of shape
λ and content µ, so that
X
sλ =
Kλ,µ mµ .
µ
The matrix (Kλ,µ ) is invertible; let
−1
Kλ,µ
denote the entries of the inverse matrix, so that
X
−1
mλ =
Kλ,µ
sµ .
µ
The above identities also hold after specializing to any finite number of variables, as this
operation is linear. We thus find
X
X
(r)
−1
−1 (d−r)
hMλ ([Q]), [OY ]i =
Kλ,µ
hSµ(r) ([Q]), [OY ]i =
Kλ,µ
sµ† (1, . . . , 1).
ℓ(µ)≤r
ℓ(µ)≤r
We finally reach our main result:
Theorem 7.8. We have
X
ΘA/ar =
r−ℓ(λ)
cλ σ λ σ0
λ⊆r×d
where cλ is the integer given by
cλ =
X
−1
Kλ,µ
dim Sµ† (Cd−r ).
µ⊆r×(d−r)
In the case r = 1, we can give a simpler expression for the formal character by computing
directly:
P
d−1
Proposition 7.9. We have ΘA/a1 = d−1
σn .
n=0
n
Proof. We have
A/a1 =
M
n≥0
and so
ΘA/a1
Symn (E) ⊗ Symn (C∞ ),
X d + n − 1
sn ,
=
d
−
1
n≥0
where the binomial coefficient is the dimension of Symn (E). Appealing to the identity
X
d−1
n
d−1
d+n−1
,
=
d
−
i
−
1
i
d−1
i=0
we find
ΘA/a1 =
# X
d−1
d−1
n
σd−1−i ,
sn =
i
d−i−1
i=0
"
d−1
X
d−1 X
i=0
i
n≥0
from which the stated formula follows.
24
STEVEN V SAM AND ANDREW SNOWDEN
7.3. Enhanced Hilbert series of determinantal rings. Keep the same notation as the
e A/ar by a change of variables. In
previous section. The formula for ΘA/ar gives a formula for H
e A/ar directly, without using any of the theory behind Theorem 3.3.
this section, we compute H
L
n
∞ ⊕ dim Symn (E)
First consider the case r = 1. Then A/a1 =
, and so the
n≥0 Sym (C )
enhanced Hilbert series is
X |λ| + d − 1 tλ
(7.10)
.
|λ|
λ!
λ
Lemma 7.11.
X |λ| + d − 1 tλ
λ
|λ|
λ!
=
∂ d−1 sd−1
exp(st1 + s2 t2 + s3 t3 + · · · )
∂sd−1 (d − 1)!
.
s=1
Proof. The coefficient of tn1 · · · tnr in exp(st1 + s2 t2 + · · · ) is
sn1 +2n2 +···+rnr
.
n1 ! · · · nr !
d−1
s
Set n = n1 + 2n2 + · · · + rnr . If we multiply by (d−1)!
, take the (d − 1)st derivative, and
evaluate at s = 1, we get
1
n+d−1
.
n1 ! · · · nr !
n
Finally, given a partition λ, and setting ni = mi (λ), we have n = |λ|.
Using the product rule for derivatives, this can be written as
X d − 1 sj d j
exp(st1 + s2 t2 + · · · )
j
j!
ds
i
i+j=d−1
.
s=1
i
d
2
Note that Ti = i!1 ds
i (st1 + s t2 + · · · )|s=1 , so we see that this expression is a polynomial in
T1 , . . . , Tm−1 times exp(T0 ).
We list the first few derivatives of exp(f (s)) (they are of the form exp(f (s)) · F so we just
list F ):
f ′ (s)
f ′′ (s) + f ′ (s)2
f (3) (s) + f ′ (s)3 + 3f ′(s)f ′′ (s)
f (4) (s) + 3f ′′ (s)2 + f ′ (s)4 + 4f (3) (s)f ′ (s) + 6f ′ (s)2 f ′′ (s)
In particular, we get the following expressions for
the form exp(T0 ) · F so we just list F ):
dj
dsj
exp(st1 + s2 t2 + · · · )|s=1 (they are of
T1
2T2 + T12
6T3 + T13 + 6T1 T2
24T4 + 12T22 + T14 + 24T3 T1 + 12T12T2
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
25
So we have the following evaluations of (7.10) for small d:
d (7.10)
1
2
3
4
5
exp(T0 )
(T1 + 1) exp(T0 )
( 12 (2T2 + T12 ) + 2T1 + 1) exp(T0 )
( 16 (6T3 + T13 + 6T1 T2 ) + 32 (2T2 + T12 ) + 3T1 + 1) exp(T0 )
1
(24T4 + 12T22 + T14 + 24T3 T1 + 12T12 T2 ) + 32 (6T3 + T13 + 6T1 T2 ) + 3(2T2 + T12 ) + 4T1 + 1) exp(T0 )
( 24
One can verify that these quantities correspond to those in Proposition 7.9 under the
appropriate change of variables.
Using [Ges, Theorem 16], we can give a determinantal formula for the enhanced Hilbert
series of A/ar , in general, in terms of certain modifications of (7.10). Define, for any i ∈ Z,
X |λ| + i + d − 1 tλ
ai =
.
|λ| + i
λ!
λ, |λ|≥−i
Then a0 is the same as (7.10), and the enhanced Hilbert series of A/ar is the determinant
det(aj−i )ri,j=1 .
From this formula, we deduce that the enhanced Hilbert series is a polynomial in T1 , . . . , Td−1
times exp(rT0 ). This gives an independent verification of the rationality theorem in this case.
7.4. Hilbert series of invariant rings. Let E be a finite dimensional representation of a
reductive group G and let A be the tca A(E)G . Using the symmetric group model for V, A
is given by An = (E ⊗n )G . Since A(E) is bounded, so is A, and so Theorem 6.1 assures us
that HA is D-finite.
P
n
For the purposes of this section, we let H∗A (t) =
n≥0 dim(An )t . This is the nonexponential form ofPHA (t). The D-finiteness
of HA is equivalent to the D-finiteness of H∗A :
P
n
n
each of the series
n t /n! and
n n!t is D-finite, and D-finiteness is preserved under
Hadamard product by [Lip, Remark 2] (see also [Sta, Theorem 6.4.12] for a simpler reason
for univariate series).
⊗n G
Example 7.12. Take G = SL(2) and E = C2 . Then the dimension of
(E ) is 0 for n
2k
1
odd and the Catalan number Cn/2 for n even. (Recall that Ck = k+1 k .) We thus obtain
H∗A (t) =
X
Ck t2k =
k≥0
2
√
.
1 + 1 − 4t2
We note that any algebraic function is D-finite. We have
X (2k)!
t2k .
HA (t) =
k!(k + 1)!
k≥0
This is (essentially) a modified Bessel function of the first kind, and satisfies the differential
equation
dy
d2 y
t2 2 + 3t − 4t2 y = 0.
dt
dt
26
STEVEN V SAM AND ANDREW SNOWDEN
Example 7.13. Take G = SL(2) × SL(2) and E = C2 ⊗ C2 . Then (E ⊗n )G is the tensor
square of the space ((C2 )⊗n )SL(2) from the previous example, and so we find
2
X
X
1
2k
∗
2 2k
HA (t) =
Ck t =
t2k .
2
(k + 1) k
k≥0
k≥0
This series is not
P algebraic:2 2kindeed, if it were then the Hadamard product of it and the
rational series k≥0 (k + 1) t would also be algebraic [Sta, Proposition 6.1.11], but this is
2 2k
P
the series k≥0 2k
t , which is known to be transcendental [WS, Theorem 3.3]. We thus
k
∗
see that HA (t) need not always be algebraic. Thus Theorem 6.1 is optimal, in a sense.
Remark 7.14. We point out that the D-finiteness of H∗A (t) can be seen directly in this case.
Let T be a maximal torus of G, and let α1 , . . . , αr be characters of T giving an isomorphism
with Grm . Let χ be the character of E,Pregarded as a function on T (and thus a Laurent
polynomial in the αi ’s). Let F (t, α) = n≥0 tn χn = (1 − tχ)−1 . This is a rational function
of t and the α’s. By the Weyl integration formula (see §2.2 for the GL(n) case and [FH,
§26.2] for the general case), we have
Z
1
∗
HA (t) =
F (t, α)|∆|2dα,
|W | T
where W is the Weyl group of G and ∆ is a certain Laurent polynomial in the αi . The
D-finiteness of H∗A (t) now follows from the following general fact: taking the constant term
(with respect to the αi ) of the the product of a D-finite function with a Laurent polynomial
is again D-finite.
Remark 7.15. There are some similar situations where one does not have D-finiteness. For
k ≥ n, the canonical map
((Ck )⊗n )Sk → ((Ck+1 )⊗n )Sk+1
is an isomorphism. Let An be the stable value of this vector space (precisely, we could define
it as the direct limit). The dimension of AP
n is the Bell number Bn . These numbers do not
n
t
have a D-finite generating series: one has n≥0 Bn tn! = ee −1 .
This example can be made to look more like the previous ones by using the category
Rep(S) of algebraic representations of the infinite symmetric group S, as studied in [SS3].
Let E = C∞ be the permutation representation of S. Then the sequence (An )n≥0 is identified
with A(E)S . Thus the conclusion of Theorem 6.1 does not apply to A(E)S.
We thank a referee for suggesting this example.
7.5. Generalizing character polynomials. Let E be a vector space of dimension m, and
let M be a finitely generated module over A(E). Theorem 4.5 tells us that the enhanced
Hilbert series can be written in the form
e M (t) =
H
d
X
pi (t, T )erT0
r=0
where pi (t, T ) is a polynomial in t1 , t2 , . . . and T1 , T2 , . . .. In fact, using Corollary 3.5, we can
be more precise: if we set deg(Td ) = d and deg(td ) = 0, then each polynomial pi has degree
≤ i(m − i).
HILBERT SERIES FOR TWISTED COMMUTATIVE ALGEBRAS
27
We define the kth umbral substitution to be the linear map
Y
Y
Q[ti ] → Q[ai ],
tdi i 7→
k −di (ai )di ,
i
i
where (x)d = x(x − 1) · · · (x − d + 1). This extends to a linear map on polynomial expressions
in the ti and Ti , and we denote this operation by p 7→↓k p. When k = 1, this was denoted ↓
in [SS1, §5.2].
Proposition 7.16. Given M, there exist polynomials p1 , . . . , pd in t1 , t2 , . . . , T1 , T2 , . . . such
that deg(pi ) ≤ i(m − i), and
tr(cλ |M) =
when |λ| ≫ 0.
d
X
i=1
iℓ(λ) ↓i pi |tk =mk (λ)
Proof. Consider an expression t1α1 · · · tαr r T1β1 · · · Tsβs exp(iT0 ). The coefficient of tλ /λ! is
s Y
r
X
Y
λ!
vi,j
ℓ(λ)−|α|−|β|
i
(λ − α − β)! i=1 j=1 i
r
v ,...,v ∈Z
1
s
≥0
where the sum is over all (v1 , . . . , vs ) such that
Qr |vi | = βi , and we define |α| = α1 + · · · + αr ,
|β| = β1 + · · · + βs , and (λ − α − β)! = i=1 (mi (λ) − αi − v1,i − · · · − vs,i )! when the
arguments are nonzero, and otherwise, the term does not appear. This is the same as
e M (t) above if we
↓i (tα1 1 · · · tαr r T1β1 · · · Tsβs ), and hence the result follows from the form of H
only consider |λ| larger than deg(p0 (t, T )) where we define deg(ti ) = i.
When d = 1, the T1 , T2 , . . . do not show up, and ↓1 p1 is a polynomial. This is the
character polynomial discussed in [SS1, §5.2] and [CEF, Theorem 1.5]. In the general case,
we need to use a formal series.
References
[CEF]
[Fu]
[FH]
[FL]
[Ges]
[Lip]
[Mac]
[MS]
[SS1]
[SS2]
Thomas Church, Jordan S. Ellenberg, Benson Farb, FI-modules: a new approach to stability for
Sn -representations, Duke Math. J. 164, no. 9 (2015), 1833–1910, arXiv:1204.4533v4.
William Fulton, Intersection Theory, second edition, Springer-Verlag, Berlin, 1998.
William Fulton, Joe Harris, Representation Theory: A First Course, Graduate Texts in Mathematics, 129, Springer–Verlag, New York, 1991.
William Fulton, Serge Lang, Riemann-Roch Algebra, Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences] 277, Springer-Verlag, New York,
1985.
Ira M. Gessel, Symmetric functions and P-recursiveness, J. Combin. Theory Ser. A 53 (1990), no. 2,
257–285.
L. Lipshitz, The diagonal of a D-finite power series is D-finite, J. Algebra 113 (1988), no. 2, 373–378.
I. G. Macdonald, Symmetric Functions and Hall Polynomials, second edition, Oxford Mathematical
Monographs, Oxford, 1995.
Ezra Miller, Bernd Sturmfels, Combinatorial Commutative Algebra, Graduate Texts in Mathematics
227, Springer-Verlag, New York, 2005.
Steven V Sam, Andrew Snowden, GL-equivariant modules over polynomial rings in infinitely many
variables, Trans. Amer. Math. Soc. 368 (2016), 1097–1158, arXiv:1206.2233v3.
Steven V Sam, Andrew Snowden, Introduction to twisted commutative algebras,
arXiv:1209.5122v1.
28
STEVEN V SAM AND ANDREW SNOWDEN
[SS3]
[SS4]
[SS5]
[Sno]
[Sta]
[WS]
Steven V Sam, Andrew Snowden, Stability patterns in representation theory, Forum Math. Sigma
3 (2015), e11, 108 pp., arXiv:1302.5859v2.
Steven V Sam, Andrew Snowden, Gröbner methods for representations of combinatorial categories,
J. Amer. Math. Soc. 30 (2017), 159–203, arXiv:1409.1670v3.
Steven V Sam, Andrew Snowden, GL-equivariant modules over polynomial rings in infinitely many
variables II, arXiv:1703.04516v1.
Andrew Snowden, Syzygies of Segre embeddings and ∆-modules, Duke Math. J. 162 (2013), no. 2,
225–277, arXiv:1006.5248v4.
Richard P. Stanley, Enumerative Combinatorics, Vol. 2, with a foreword by Gian-Carlo Rota and appendix 1 by Sergey Fomin, Cambridge Studies in Advanced Mathematics 62, Cambridge University
Press, Cambridge, 1999.
Christopher F. Woodcock, Habib Sharif, On the transcendence of certain series, J. Algebra 121
(1989), no. 2, 364–369.
Department of Mathematics, University of Wisconsin, Madison, WI
E-mail address: [email protected]
URL: http://math.wisc.edu/~svs/
Department of Mathematics, University of Michigan, Ann Arbor, MI
E-mail address: [email protected]
URL: http://www-personal.umich.edu/~asnowden/
| 0math.AC
|
Learning ReLUs via Gradient Descent
arXiv:1705.04591v2 [cs.LG] 1 Aug 2017
Mahdi Soltanolkotabi
Ming Hsieh Department of Electrical Engineering
University of Southern California, Los Angeles, CA, 90089
May 2017
Abstract
In this paper we study the problem of learning Rectified Linear Units (ReLUs) which are
functions of the form x ↦ max(0, ⟨w, x⟩) with w ∈ Rd denoting the weight vector. We study
this problem in the high-dimensional regime where the number of observations are fewer than
the dimension of the weight vector. We assume that the weight vector belongs to some closed
set (convex or nonconvex) which captures known side-information about its structure. We
focus on the realizable model where the inputs are chosen i.i.d. from a Gaussian distribution
and the labels are generated according to a planted weight vector. We show that projected
gradient descent, when initialization at 0, converges at a linear rate to the planted model with
a number of samples that is optimal up to numerical constants. Our results on the dynamics of
convergence of these very shallow neural nets may provide some insights towards understanding
the dynamics of deeper architectures.
1
Introduction
Nonlinear data-fitting problems are fundamental to many supervised learning tasks in signal processing and machine learning. Given training data consisting of n pairs of input features xi ∈ Rd and
desired outputs yi ∈ R we wish to infer a function that best explains the training data. In this paper
we focus on fitting Rectified Linear Units (ReLUs) to the data which are functions φw ∶ Rd → R of
the form
φw (x) = max (0, ⟨w, x⟩) .
A natural approach to fitting ReLUs to data is via minimizing the least-squares misfit aggregated
over the data. This optimization problem takes the form
min
w∈Rd
L(w) ∶=
1 n
2
∑ (max (0, ⟨w, xi ⟩) − yi )
n i=1
subject to R(w) ≤ R,
(1.1)
with R ∶ Rd → R denoting a regularization function that encodes prior information on the weight
vector.
Fitting nonlinear models such as ReLUs have a rich history in statistics and learning theory
[11] with interesting new developments emerging [6] (we shall discuss all these results in greater
detail in Section 4). Most recently, nonlinear data fitting problems in the form of neural networks
(a.k.a. deep learning) have emerged as powerful tools for automatically extracting interpretable and
1
actionable information from raw forms of data, leading to striking breakthroughs in a multitude of
applications [12, 13, 4]. In these and many other empirical domains it is common to use local search
heuristics such as gradient or stochastic gradient descent for nonlinear data fitting. These local
search heuristics are surprisingly effective on real or randomly generated data. However, despite
their empirical success the reasons for their effectiveness remains mysterious.
Focusing on fitting ReLUs, a-priori it is completely unclear why local search heuristics such
as gradient descent should converge for problems of the form (1.1), as not only the regularization
function maybe nonconvex but also the loss function! Efficient fitting of ReLUs in this highdimensional setting poses new challenges: When are the iterates able to escape local optima and
saddle points and converge to global optima? How many samples do we need? How does the number
of samples depend on the a-priori prior knowledge available about the weights? What regularizer is
best suited to utilizing a particular form of prior knowledge? How many passes (or iterations) of the
algorithm is required to get to an accurate solution? At the heart of answering these questions is the
ability to predict convergence behavior/rate of (non)convex constrained optimization algorithms.
In this paper we build up on a new framework developed by the author in [17] for analyzing
nonconvex optimization problems to address such challenges.
2
Precise measures for statistical resources
We wish to characterize the rates of convergence for the projected gradient updates (3.2) as a
function of the number of samples, the available prior knowledge and the choice of the regularizer.
To make these connections precise and quantitative we need a few definitions. Naturally the required
number of samples for reliable data fitting depends on how well the regularization function R can
capture the properties of the weight vector w. For example, if we know that the weight vector
is approximately sparse, naturally using an ℓ1 norm for the regularizer is superior to using an ℓ2
regularizer. To quantify this capability we first need a couple of standard definitions which we
adapt from [14, 15, 17].
Definition 2.1 (Descent set and cone) The set of descent of a function R at a point w ∗ is
defined as
DR (w ∗ ) = {h ∶ R(w ∗ + h) ≤ R(w ∗ )}.
The cone of descent is defined as a closed cone CR (w ∗ ) that contains the descent set, i.e. DR (w ∗ ) ⊂
CR (w ∗ ). The tangent cone is the conic hull of the descent set. That is, the smallest closed cone
CR (w ∗ ) obeying DR (w ∗ ) ⊂ CR (w ∗ ).
We note that the capability of the regularizer R in capturing the properties of the unknown weight
vector w ∗ depends on the size of the descent cone CR (w ∗ ). The smaller this cone is the more suited
the function R is at capturing the properties of w ∗ . To quantify the size of this set we shall use
the notion of mean width.
Definition 2.2 (Gaussian width) The Gaussian width of a set C ∈ Rd is defined as:
ω(C) ∶= Eg [sup ⟨g, z⟩],
z∈C
where the expectation is taken over g ∼ N (0, Ip ). Throughout we use B d /Sd−1 to denote the the
unit ball/sphere of Rd .
2
We now have all the definitions in place to quantify the capability of the function R in capturing the
properties of the unknown parameter w ∗. This naturally leads us to the definition of the minimum
required number of samples.
Definition 2.3 (minimal number of samples) Let CR (w ∗ ) be a cone of descent of R at w ∗.
We define the minimal sample function as
M(R, w ∗ ) = ω 2 (CR (w ∗ ) ∩ B d ).
We shall often use the short hand n0 = M(R, w ∗ ) with the dependence on R, w ∗ implied.
We note that n0 is exactly the minimum number of samples required for structured signal recovery
from linear measurements when using convex regularizers [3, 1]. Specifically, the optimization
problem
n
∗
∑ (yr − ⟨xi , w ⟩)
i=1
2
subject to R(w) ≤ R(w ∗ ),
(2.1)
succeeds at recovering an unknown weight vector w ∗ with high probability from n observations of
the form yi = ⟨ai , w ∗ ⟩ if and only if n ≥ n0 .1 While this result is only known to be true for convex
regularization functions we believe that n0 also characterizes the minimal number of samples even
for nonconvex regularizers in (2.1). See [14] for some results in the nonconvex case as well as the role
this quantity plays in the computational complexity of projected gradient schemes for linear inverse
problems. Given that with nonlinear samples we have less information (we loose some information
compared to linear observations) we can not hope to recover the weight vector from n ≤ n0 when
using (1.1). Therefore, we can use n0 as a lower-bound on the minimum number of observations
required for projected gradient descent iterations (3.2) to succeed at finding the right model.
3
Theoretical results for learning ReLUs
A simple heuristic for optimizing (1.1) is to use gradient descent. One challenging aspect of the
above loss function is that it is not differentiable and it is not clear how to run projected gradient
descent. However, this does not pose a fundamental challenge as the loss function is differentiable
except for isolated points and we can use the notion of generalized gradients to define the gradient
at a non-differentiable point as one of the limit points of the gradient in a local neighborhood of
the non-differentiable point. For the loss in (1.1) the generalized gradient takes the form
∇L(w) ∶=
2 n
∑ (ReLU (⟨w, xi ⟩) − yi ) (1 + sgn(⟨w, xi ⟩)) xi .
n i=1
(3.1)
Therefore, projected gradient descent takes the form
wτ +1 = PK (wτ − µτ ∇L(wτ )) ,
(3.2)
where µτ is the step size and K = {w ∈ Rd ∶ R(w) ≤ R} is the constraint set with PK denoting the
Euclidean projection onto this set.
1
We would like to note that n0 only approximately characterizes the minimum number of samples required. A more
√ Γ( t+1 ) √
precise characterization is φ−1 (ω 2 (CR (w∗ ) ∩ Bd )) ≈ ω 2 (CR (w∗ ) ∩ Bd ) where φ(t) = 2 Γ( 2t ) ≈ t. However, since
2
our results have unspecified constants we avoid this more accurate characterization.
3
Theorem 3.1 Let w ∗ ∈ Rd be an arbitrary weight vector and R ∶ Rd → R be a proper function
(convex or nonconvex). Suppose the feature vectors xi ∈ Rd are i.i.d. Gaussian random vectors
distributed as N (0, I) with the corresponding labels given by
yi = max (0, ⟨xi , w ∗ ⟩) .
To estimate w ∗, we start from the initial point w0 = 0 and apply the Projected Gradient (PGD)
updates of the form
wτ +1 = PK (wτ − µτ ∇L(wτ )) ,
(3.3)
with K ∶= {w ∈ Rd ∶ R(w) ≤ R(w ∗ )} and ∇L defined via (3.1). Also set the learning parameter
sequence µτ = 1 for all τ = 0, 1, 2, . . . and let n0 = M(R, w ∗ ), defined by 2.3, be our lower bound on
the number of measurements. Also assume
n > cn0 ,
(3.4)
holds for a fixed numerical constant c. Then there is an event of probability at least 1 − 9e−γn such
that on this event the updates (3.3) obey
1 τ
∥wτ − w ∗∥ℓ2 ≤ ( ) ∥w ∗∥ℓ2 .
2
(3.5)
Here γ is a fixed numerical constant.
The first interesting and perhaps surprising aspect of this result is its generality: it applies not
only to convex regularization functions but also nonconvex ones! As we mentioned earlier the
optimization problem in (1.1) is not known to be tractable even for convex regularizers. Despite
the nonconvexity of both the objective and regularizer, the theorem above shows that with a near
minimal number of data samples, projected gradient descent provably learns the original weight
vector w ∗ without getting trapped in any local optima.
Another interesting aspect of the above result is that the convergence rate is linear. Therefore,
to achieve a relative error of ǫ the total number of iterations is on the order of O(log(1/ǫ)). Thus
the overall computational complexity is on the order of O (nd log(1/ǫ)) (in general the cost is
the total number of iterations multiplied by the cost of applying the feature matrix X and its
transpose). As a result, the computational complexity is also now optimal in terms of dependence
on the matrix dimensions. Indeed, for a dense matrix even verifying that a good solution has been
achieved requires one matrix-vector multiplication which takes O(nd) time.
4
Discussions and prior art
There is a large body of work on learning nonlinear models. A particular class of such problems
that have been studied are the so called idealized Single Index Models (SIMs) [8, 9]. In these
problems the inputs are labeled examples {(xi , yi )}ni=1 ∈ Rd × R which are guaranteed to satisfy
yi = f (⟨w, xi ⟩) for some w ∈ Rd and nondecreasing (Lipchitz continuous) f ∶ R → R. The goal in
this problem is to find a (nearly) accurate such f and w. An interesting polynomial-time algorithm
called the Isotron exists for this problem [11, 10]. In principle, this approach can also be used to
fit ReLUs. However, these results differ from ours in term of both assumptions and results. On
4
the one had, the assumptions are slightly more restrictive as they require bounded features xi ,
outputs yi and weights. On the other hand, these result hold for much more general distributions
and more general models than the realizable model studied in this paper. These results also do
not apply in the high dimensional regime where the number of observations is significantly smaller
than the number of parameters (see [5] for some results in this direction). In the realizable case,
the Isotron result require O( 1ǫ ) iterations to achieve ǫ error in objective value. In comparison, our
results guarantee convergence to a solution with relative error ǫ (∥wτ − w ∗ ∥ℓ2 / ∥w ∗ ∥ℓ2 ≤ ǫ) after
log (1/ǫ) iterations. Focusing on the specific case of ReLU functions, an interesting recent result
[6] shows that reliable learning of ReLUs is possible under very general but bounded distributional
assumptions. To achieve an accuracy of ǫ the algorithm runs in poly(1/ǫ) time. In comparison, as
mentioned earlier our result rquires log(1/ǫ) iterations for reliable parameter estimation. We note
however we study the problem in different settings and a direct comparison is not possible between
the two results.
5
5.1
Proofs
Preliminaries
In this section we gather some useful results on concentration of stochastic processes which will be
crucial in our proofs. These results are mostly adapted from [17, 2, 16]. We begin with a lemma
which is a direct consequence of Gordon’s escape from the mesh lemma [7].
Lemma 5.1 Assume C ⊂ Rd is a cone and Sd−1 is the unit sphere of Rd . Also assume that
n ≥ max (20
ω 2 (C ∩ Sd−1 ) 1
,
− 1) ,
δ2
2δ
for a fixed numerical constant c. Then for all h ∈ C
1 n
∣ ∑(⟨xi , h⟩)2 − ∥h∥2ℓ2 ∣ ≤ δ ∥h∥2ℓ2 ,
n i=1
δ2
holds with probability at least 1 − 2e− 360 n .
We also need a generalization of the above lemma stated below.
Lemma 5.2 ([17]) Assume C ⊂ Rd is a cone (not necessarily convex) and Sd−1 is the unit sphere
of Rd . Also assume that
n ≥ max (80
ω 2 (C ∩ Sd−1 ) 2
, − 1) ,
δ2
δ
for a fixed numerical constant c. Then for all u, h ∈ C
1 n
∣ ∑⟨xi , u⟩⟨xi , h⟩ − u∗ h∣ ≤ δ ∥u∥ℓ2 ∥h∥ℓ2 ,
n i=1
δ2
holds with probability at least 1 − 6e− 1440 n .
5
We next state a generalization of Gordon’s escape through the mesh lemma also from [17].
Lemma 5.3 ([17]) Let s ∈ Rd be fixed vector with nonzero entries and construct the diagonal
matrix S = diag(s). Also, let X ∈ Rn×d have i.i.d. N (0, 1) entries. Furthermore, assume T ⊂ Rd
and define
bd (s) = E[∥Sg∥ℓ2 ],
where g ∈ Rd is distributed as N (0, In ). Define
σ(T ) ∶= max ∥v∥ℓ2 ,
then for all u ∈ T
v∈T
∣∥SAu∥ℓ2 − bd (s) ∥u∥ℓ2 ∣ ≤ ∥s∥ℓ∞ ω(T ) + η,
holds with probability at least
−
1 − 6e
η2
8∥s∥2 σ 2 (T )
ℓ∞
.
The previous lemma leads to the following Corollary.
Corollary 5.4 Let s ∈ Rd be fixed vector with nonzero entries and assume T ⊂ B d . Furthermore,
assume
Then for all u ∈ T ,
∥s∥2ℓ2 ≥ max (20 ∥s∥2ℓ∞
ω 2 (T ) 3
,
− 1) .
δ2
2δ
RRR n 2
RR
2
RRR ∑i=1 si (⟨xi , u⟩) − ∥u∥2 RRRR ≤ δ,
RRR
ℓ2 RR
RR
∥s∥2ℓ2
RR
R
δ2
holds with probability at least 1 − 6e− 1440 ∥s∥ℓ2 .
5.2
2
Convergence proof (Proof of Theorem 3.1)
In this section we shall prove Theorem 3.1. Throughout, we use the shorthand C to denote the
descent cone of R at w ∗, i.e. C = CR (w ∗ ). We begin by analyzing the first iteration. Using w0 = 0
we have
2 n
2 n
w1 ∶= PK (w0 − µ0 ∇L(w0 )) = PK ( ∑ yi xi ) = PK ( ∑ ReLU(⟨xi , w ∗ ⟩)xi ) .
n i=1
n i=1
We use the argument of [17][Page 25, inequality (7.34)] which shows that
2 n
∥w1 − w ∗ ∥ℓ2 ≤ 2 ⋅ sup uT ( ∑ ReLU(⟨xi , w ∗ ⟩)xi − w ∗) .
n i=1
u∈C∩B d
6
(5.1)
Using ReLU(z) =
z+∣z∣
2
we have
2 n
1 n
∗
∗
T 1
∗
T
∗
∑ ReLU(⟨xi , w ⟩)⟨xi , u⟩ − ⟨u, w ⟩ = u ( X X − I) w + ∑ ∣⟨xi , w ⟩∣ ⟨xi , u⟩.
n i=1
n
n i=1
(5.2)
We proceed by bounding the first term in the above equality. To this aim we decompose u in the
direction parallel/perpendicular to that of w ∗ and arrive at
⎛
w ∗ (w ∗ )T ⎞
(uT w ∗)
1
1
T
∗
∗ T 1
I
−
X
X
−
I)
w
+
⟨X
(w
)
(
uT ( X T X − I) w ∗ =
u, Xw ∗ ⟩,
n
n
n
⎝
∥w ∗∥2ℓ
∥w ∗∥2ℓ ⎠
2
2
2
⎞ ∥w ∗∥ℓ
⎛
⎛ ∥g∥ℓ2
w ∗ (w ∗)T ⎞
− 1 + √ 2 aT I −
∼(uT w ∗)
u,
n
⎠
⎝
⎝ n
∥w ∗∥2ℓ2 ⎠
RRR ∥w ∗∥
RRR ∥g∥2
w ∗ (w ∗ )T ⎞
ℓ2
ℓ2
RR
RR
T ⎛
∗
u,
− 1RRR + √
sup a I −
≤ ∥w ∥ℓ2 RRR
n u∈C∩Bd
RRR
⎝
RRR n
∥w ∗∥2ℓ2 ⎠
(5.3)
with g ∈ Rn and a ∈ Rd are independent random Gaussian random vectors distributed as N (0, Id )
and N (0, In ). By concentration of Chi-squared random variables
holds with probability at least 1 − 2e−n
∆2
8
RRR ∥g∥2
RRR
ℓ2
RRR
RR
RRR n − 1RRRR ≤ ∆,
RR
RR
(5.4)
. Also,
⎛
w ∗ (w ∗)T ⎞
1
1
√ aT I −
u ≤ √ (ω (C ∩ B d ) + η) ,
2
n ⎝
n
∥w ∗∥ℓ ⎠
(5.5)
2
holds with probability at least 1 − e−
(5.3), as long as
η2
2
. Plugging (5.4) with ∆ =
n≥
then
sup
u∈C∩B d
δ
6
and (5.5) with η =
δ√
6 n
into
36 2
ω (C ∩ B d ) ,
δ2
1
δ
uT ( X T X − I) w ∗ ≤ ∥w ∗ ∥ℓ2 ,
n
2
(5.6)
δ2
holds with probability at least 1 − 3e−n 288 .
We now focus on bounding the second term in (5.2). To this aim we decompose u in the
direction parallel/perpendicular to that of w ∗ and arrive at
RRR
RRR
n
1 n
∣⟨xi , w ∗ ⟩∣ ⟨xi , w ∗ ⟩ 1 n
RR T ∗ 1
R
∗
∗
∣ ∑ ∣⟨xi , w ⟩∣ ⟨xi , u⟩∣ = RRR(u w ) ∑
+ ∑ ∣⟨xi , w ⟩∣ ⟨xi , u⊥ ⟩RRRR ,
2
∗
n i=1
n i=1
n i=1
RRR
RRR
∥w ∥ℓ2
RRR n
R
1
∣⟨xi , w ∗ ⟩∣ ⟨xi , w ∗ ⟩ RRRR 1 n
≤ ∥w ∗∥ℓ2 RRRR ∑
RR + ∣ ∑ ∣⟨xi , w ∗ ⟩∣ ⟨xi , u⊥ ⟩∣ .
2
RRR n i=1
RRR n i=1
∗
∥w ∥ℓ2
R
R
7
(5.7)
with u⊥ = (I −
by
w ∗ (w ∗ )T
∥w ∗ ∥2ℓ
2
) u. Now note that
∥
∣⟨xi ,w ∗ ⟩∣⟨xi ,w ∗ ⟩
∥w ∗ ∥2ℓ
is sub-exponential with norm bounded
2
∣⟨xi , w ∗ ⟩∣ ⟨xi , w ∗ ⟩
∥w ∗∥2ℓ2
∥
≤ c,
ψ1
with fixed numerical constant. Thus by Bernstein’s type inequality ([18][Proposition 5.16])
RR n
R
RRR 1
∣⟨xi , w ∗ ⟩∣ ⟨xi , w ∗ ⟩ RRRR
RR ≤ t,
RR ∑
RRR n i=1
RRR
∗ ∥2
∥w
ℓ
2
R
R
holds with probability at least 1 − 2e−γn min(t
2
Furthermore,
(5.8)
,t)
with γ a fixed numerical constant. Also note that
¿
Á1 n
1 n
∗
À ∑ ∣⟨xi , w ∗ ⟩∣2 √1 ⟨g, u⊥ ⟩.
∑ ∣⟨xi , w ⟩∣ ⟨xi , u⊥ ⟩ ∼ Á
n i=1
n i=1
n
1 n
∗ 2
∗ 2
∑ ∣⟨xi , w ⟩∣ ≤ (1 + ∆) ∥w ∥ℓ2 ,
n i=1
holds with probability at least 1 − 2e−n
sup
u∈C∩Sd−1
∆2
8
and
(2ω (C ∩ Sd−1 ) + η)
1
√ ∣⟨g, u⊥ ⟩∣ ≤
√
,
n
n
holds with probability at least 1 − e−
η2
2
. Combining the last two inequalities we conclude that
√
(2ω (C ∩ Sd−1 ) + η)
1 n
√
∥w ∗∥ℓ2 ,
∣ ∑ ∣⟨xi , w ∗ ⟩∣ ⟨xi , u⊥ ⟩∣ ≤ 1 + ∆
n i=1
n
holds with probability at least 1 − 2e−n
δ √
η= √
n into (5.7)
∆2
8
− e−
η2
2
(5.9)
. Plugging (5.8) and (5.9) with t = 6δ , ∆ = 1, and
6 2
δ
1 n
∣ ∑ ∣⟨xi , w ∗ ⟩∣ ⟨xi , u⟩∣ ≤ ∥w ∗∥ℓ2 ,
n i=1
2
holds with probability at least 1 − 3e−γnδ − 2e− 8 as long as
2
n ≥ 288
n
ω 2 (C ∩ Sd−1 )
δ2
.
Thus pluggin (5.6) and (5.10) into (5.1) we conclude that for δ = 7/400
2 n
∥w1 − w ∗∥ℓ2 ≤2 ⋅ sup uT ( ∑ ReLU(⟨xi , w ∗ ⟩)xi − w ∗ ) ,
n i=1
u∈C∩B d
≤2δ ∥w ∗ ∥ℓ2 ,
7
∥w ∗ ∥ℓ2 ,
≤
200
8
(5.10)
holds with probability at least 1 − 8e−γn as long as
n ≥ cω 2 (C ∩ Sd−1 ) ,
for a fixed numerical constant c.
To introduce our general convergence analysis we begin by defining
E(ǫ) = {w ∈ Rd ∶ R(w) ≤ R(w ∗ ), ∥w − w ∗ ∥ℓ2 ≤ ǫ ∥w ∗∥ℓ2 } with
ǫ=
7
.
200
To prove Theorem 3.1 we use the argument of [17][Page 25, inequality (7.34)] which shows that if
we apply the projected gradient descent update
the error hτ = wτ − w ∗ obeys
wτ +1 = PK (wτ − ∇L(wτ )) ,
∥hτ +1 ∥ℓ2 = ∥wτ +1 − w ∗ ∥ℓ2 ≤ 2 ⋅ sup u∗ (hτ − ∇L(wτ )) .
(5.11)
u∈C∩B n
To complete the convergence analysis it is then sufficient to prove
sup u∗ (hτ − ∇L(wτ )) ≤
u∈C∩B n
1
1
∥hτ ∥ℓ2 = ∥wτ − w ∗ ∥ℓ2 .
4
4
(5.12)
We will instead prove that the following stronger result holds for all u ∈ C ∩ B n and w ∈ E(ǫ)
u∗ (w − w ∗ − ∇L(w)) ≤
1
∥w − w ∗∥ℓ2 .
4
(5.13)
The equation (5.13) above implies (5.12) which when combined with (5.11) proves the convergence
result of the Theorem (specifically equation (3.5)).
The rest of this section is dedicated to proving (5.13). To this aim note that ReLU(⟨xi , w⟩) =
⟨xi ,w⟩+∣⟨xi ,w⟩∣
. Therefore, the loss function can alternatively be written as
2
L(w) =
1 n
1 n
1 n
2
∗
∗ 2
∗
∗
∑ (∣⟨xi , w⟩∣ − ∣⟨xi , w ⟩∣) +
∑ (⟨xi , w − w ⟩) +
∑ (∣⟨xi , w⟩∣ − ∣⟨xi , w ⟩∣) (⟨xi , w − w ⟩) .
4n i=1
4n i=1
2n i=1
9
Thus
⟨∇L(w), u⟩ =
1 n
∗
∑ (⟨xi , w⟩ − sgn(⟨xi , w⟩) ∣⟨xi , w ⟩∣) ⟨xi , u⟩
2n i=1
+
+
1 n
1 n
∗
∗
∑⟨xi , w − w ⟩⟨xi , u⟩ +
∑ (∣⟨xi , w⟩∣ − ∣⟨xi , w ⟩∣) ⟨xi , u⟩
2n i=1
2n i=1
1 n
∗
∑ sgn(⟨xi , w⟩)⟨xi , w − w ⟩⟨xi , u⟩
2n i=1
1 n
1 n
= ∑⟨xi , w − w ∗⟩⟨xi , u⟩ + ∑ (∣⟨xi , w⟩∣ − ∣⟨xi , w ∗ ⟩∣) ⟨xi , u⟩
n i=1
n i=1
+
1 n
∗
∗
∗
∑ (1 − sgn(⟨xi , w ⟩)sgn(⟨xi , w⟩) + sgn(⟨xi , w ⟩) − sgn(⟨xi , w⟩)) ⟨xi , w ⟩⟨xi , u⟩
2n i=1
1 n
1 n
= ∑⟨xi , w − w ∗⟩⟨xi , u⟩ + ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , w − w ∗ ⟩⟨xi , u⟩
n i=1
n i=1
+
+
1 n
∗
∗
∑ (sgn(⟨xi , w⟩) − sgn(⟨xi , w ⟩)) ⟨xi , w − w ⟩⟨xi , u⟩
n i=1
1 n
∗
∗
∗
∑ (1 − sgn(⟨xi , w ⟩)sgn(⟨xi , w⟩) − sgn(⟨xi , w ⟩) + sgn(⟨xi , w⟩)) ⟨xi , w ⟩⟨xi , u⟩
2n i=1
1 n
1 n
= ∑⟨xi , w − w ∗⟩⟨xi , u⟩ + ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , w − w ∗ ⟩⟨xi , u⟩
n i=1
n i=1
+
+
1 n
∗
∗
∑ (sgn(⟨xi , w⟩) − sgn(⟨xi , w ⟩)) ⟨xi , w − w ⟩⟨xi , u⟩
n i=1
1 n
∗
∗
∗
∑ (1 − sgn(⟨xi , w ⟩)) (sgn(⟨xi , w ⟩) − sgn(⟨xi , w⟩)) ∣⟨xi , w ⟩∣ ⟨xi , u⟩
2n i=1
Now defining h = w − w ∗ we conclude that
⟨u, w − w ∗ − ∇L(w)⟩ =⟨u, h − ∇L(w)⟩,
=uT (I −
+
+
1 n
1
XX T ) h − ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⟩⟨xi , u⟩,
n
n i=1
1 n
∗
∗
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) sgn(⟨xi , w ⟩)⟨xi , h⟩⟨xi , u⟩,
n i=1
1 n
∗
∗
∗
∑ sgn(⟨xi , w⟩) (1 − sgn(⟨xi , w ⟩)) (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) ∣⟨xi , w ⟩∣ ⟨xi , u⟩.
2n i=1
10
Now define h⊥ = h −
(hT w ∗ ) ∗
w .
∥w ∗ ∥2ℓ
Using this we can rewrite the previous expression in the form
2
⟨u, w − w ∗ − ∇L(w)⟩ =uT (I −
+
+
1 n
1
XX T ) h − ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⟩⟨xi , u⟩,
n
n i=1
1 n
∗
∗
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩,
n i=1
⟨h, w ∗ ⟩ 1 n
∗
∗
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) ∣⟨xi , w ⟩∣ ⟨xi , u⟩,
∥w ∗ ∥2ℓ n i=1
2
1 n
∗
∗
∗
+
∑ sgn(⟨xi , w⟩) (1 − sgn(⟨xi , w ⟩)) (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) ∣⟨xi , w ⟩∣ ⟨xi , u⟩
2n i=1
=uT (I −
+
+
1 n
1
XX T ) h − ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⟩⟨xi , u⟩,
n
n i=1
1 n
∗
∗
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩,
n i=1
1 n sgn(⟨xi , w⟩)
⟨h, w ∗ ⟩
(1 − sgn(⟨xi , w ∗ ⟩)) +
]
∑[
n i=1
2
∥w ∗ ∥2ℓ
2
(1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ∗ ⟩)) ∣⟨xi , w ∗ ⟩∣ ⟨xi , u⟩
(5.14)
We now proceed by bounding each of the four terms in (5.14) and then combine them in Section
5.2.5.
5.2.1
Bounding the first term in (5.14)
To bound the first term we use Lemma 5.2, which implies that as long as
then for all u ∈ C ∩ B n and h ∈ E(ǫ)
n ≥ max (80
u∗ (I −
δ2
n0 2
, − 1) ,
δ2 δ
1 ∗
X X) h ≤ δ ∥h∥ℓ2 ,
n
(5.15)
holds with probability at least 1 − 6e− 1440 n .
5.2.2
Bounding the second term in (5.14)
To bound the second term we first define
u⊥ = u −
(uT w ∗)
∥w ∗∥2ℓ2
w∗
and h⊥ = h −
11
(hT w ∗)
∥w ∗ ∥2ℓ2
w∗.
Now note that
1 n
(uT w ∗)(hT w ∗) 1 n
∗
∗
− ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⟩⟨xi , u⟩ = −
∑ ∣⟨xi , w ⟩∣ ⟨xi , w ⟩
4
∗
n i=1
n
∥w ∥ℓ2
i=1
−
(uT w ∗) 1 n
∗
∑ ∣⟨xi , w ⟩∣ ⟨xi , h⊥ ⟩
∥w ∗∥2ℓ n i=1
2
(h w ) 1 n
∗
∑ ∣⟨xi , w ⟩∣ ⟨xi , u⊥ ⟩
∥w ∗ ∥2ℓ n i=1
∗
T
−
2
1 n
− ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⊥ ⟩⟨xi , u⊥ ⟩,
n i=1
1 n ∣⟨xi , w ∗ ⟩∣ ⟨xi , w ∗ ⟩
≤ ∥h∥ℓ2 ∣ ∑
∣
n i=1 ∥w ∗∥ℓ2 ∥w ∗∥ℓ2
1 n ∣⟨xi , w ∗ ⟩∣
1 n ∣⟨xi , w ∗ ⟩∣
⟨x
,
h
⟩∣
+
∥h∥
∣
⟨xi , u⊥ ⟩∣
+∣ ∑
∑
i
⊥
ℓ
2
n i=1 ∥w ∗ ∥ℓ2
n i=1 ∥w ∗ ∥ℓ2
1 n
+ ∣ ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⊥ ⟩⟨xi , u⊥ ⟩∣ .
n i=1
(5.16)
We now proceed by bound the four terms on the right-hand side of the above inequality. To bound
the first term we use (5.8) to conclude that
R
RRR n
∣⟨xi , w ∗ ⟩∣ ⟨xi , w ∗ ⟩ RRRR
RR 1
RRR ≤ t,
RRR ∑
RRR
RRR n i=1
∥w ∗∥2ℓ2
holds with probability at least 1 − 2e−γn min(t
use (5.9) to conclude that
2
,t)
. To bound the second and third terms in (5.16) we
√
√
√
(2 n0 + η n)
1 n ∣⟨xi , w ∗ ⟩∣
∣ ∑
⟨x
,
h
⟩∣
≤
1
+
∆
√
∥h∥ℓ2 ,
i
⊥
n i=1 ∥w ∗∥ℓ2
n
√
√
√
(2 n0 + η n)
1 n ∣⟨xi , w ∗ ⟩∣
√
⟨xi , u⊥ ⟩∣ ≤ 1 + ∆
,
∣ ∑
n i=1 ∥w ∗∥ℓ2
n
holds with probability at least 1 − 2e−n
variables independent from xi . Then,
Define T = (I −
∆2
8
− e−
(5.17)
η2
n
2
(5.18)
. To bound the last term let ǫi be i.i.d. ±1 random
1 n
1 n
∗
∑ sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⊥ ⟩ ∼ ∑ ǫi ⟨xi , h⊥ ⟩⟨xi , u⊥ ⟩.
n i=1
n i=1
w ∗ (w ∗ )T
∥w ∗ ∥2ℓ
2
) C ∩ Sd−1 and note that
1 n
1 n
∣ ∑ ǫi ⟨xi , h⊥ ⟩⟨xi , u⊥ ⟩∣ ≤ ( sup ∣ ∑ ǫi ⟨xi , u⟩⟨xi , v⟩∣) ∥h∥ℓ2 .
n i=1
u,v∈T n i=1
12
(5.19)
Now to bound the term in the parenthesis note that by concentration of sums of sub-Gaussian
random variables [18, Proposition 5.10]
¿
n
∆Á
1 n
À 1 ∑(⟨xi , u⟩)2 (⟨xi , v⟩)2 ,
(5.20)
∣ ∑ ǫi ⟨xi , u⟩⟨xi , v⟩∣ ≤ Á
n i=1
n
n i=1
holds with probability at least 1 − 2e−γn∆ . Now note that
√
√
sup ∣⟨xi , u⟩∣ ≤ 2ω(T ) + η ≤ 2 n0 + η n,
2
u∈T
holds with probability at least 1 − e−
sup
η2
n
2
. Thus using the union bound
√
√
√
sup ∣⟨xi , u⟩∣ ≤ 2ω(T ) + η n ≤ 2 n0 + η n,
i=1,2,...,n u∈T
holds with probability at least 1 − ne−
S = I, we conclude that
η2
n
2
. Plugging this into (5.20) and using Lemma 5.3 with
¿
n
√ Á
∆ √
1 n
Àsup 1 ∑(xT v)2 ,
sup ∣ ∑ ǫi ⟨xi , u⟩⟨xi , v⟩∣ ≤ (2 n0 + η n) Á
i
n
u,v∈T n i=1
v∈T n i=1
√
√
√
∆ √
≤ (2 n0 + η n) ( n0 + (η + 1) n) ,
n
η2
η2
holds with probability at least 1 − 2e−γn∆ − ne− 2 n − 6e− 8 n . Using the latter inequality in (5.19)
we conclude that for all h ∈ C and u ∈ C ∩ Sn−1
√
√
√
∆ √
1 n
(5.21)
∣ ∑ ǫi ⟨xi , h⊥ ⟩⟨xi , u⊥ ⟩∣ ≤ (2 n0 + η n) ( n0 + (η + 1) n) ∥h∥ℓ2
n i=1
n
2
η2
η2
holds with probability at least 1 − 2e−γn∆ − ne− 2 n − 6e− 8 n , completing the bound of the last term
of (5.16). Combining (5.17), (5.18), and (5.21) with η = ∆ = 1, we conclude that
2
1 n
− ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⟩⟨xi , u⟩ ≤ δ ∥h∥ℓ2 ,
n i=1
(5.22)
− (n + 10)e−γn as long as
n0
n≥c 2.
δ
This completes the bound on the second term in (5.14).
holds with probability at least 1 − 2e−γδ
5.2.3
2
n
Bounding the third term in (5.14)
To bound the third term note that
1 n
∗
∗
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩))sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩
n i=1
2 n
= ∑ sgn(⟨xi , w ∗ ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩1{⟨xi ,w⟩⟨xi ,w∗ ⟩≤0} ,
n i=1
¿
¿
Á1 n
(a) Á 1 n
2
Á
À ∑ ∣⟨xi , u⟩∣2 , (5.23)
À ∑ ∣⟨xi , h⊥ ⟩∣ 1
≤ 2Á
{⟨xi ,w⟩⟨xi ,w ∗ ⟩≤0}
n i=1
n i=1
13
where the last inequality follows from Cauchy Schwarz. Note that by Lemma 5.1 as long as
n ≥ max (80 nδ20 , 2δ − 1), then
1 n
2
∑ ∣⟨xi , u⟩∣ ≤ 1 + δ,
n i=1
holds for all u ∈ C ∩ Sd−1 with probability at least 1 − 2e−γδ n . Combining the latter inequality with
(5.23) we conclude that with high probability
2
1 n
∗
∗
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩
n i=1
¿
√
Á1 n
À ∑ ∣⟨xi , h⊥ ⟩∣2 1
≤ 2 1 + δÁ
{⟨xi ,w⟩⟨xi ,w ∗ ⟩≤0} .
n i=1
(5.24)
We now turn our attention to bounding the right-hand side of (5.24). To this aim first note that
as long as ∥h∥ℓ2 ≤ ǫ ∥w ∗∥ℓ2 we have (w T w ∗ ) ≥ (1 − ǫ) ∥w ∗ ∥2ℓ2 . Thus, we have the following chain of
inequalities
1 n
1 n
2
2
∑ ∣⟨xi , h⊥ ⟩∣ 1{⟨xi ,w⟩⟨xi ,w∗⟩≤0} = ∑ ∣⟨xi , h⊥ ⟩∣ 1
⎛ T ∗
n i=1
n i=1
{ (w w ) (xT w∗ )+xT h
⎝
∥w∗ ∥2
ℓ2
⊥
i
i
⎞ T ∗
(x w )≤0}
⎠ i
1 n
= ∑ ∣⟨xi , h⊥ ⟩∣2 1
T ∗
n i=1
{ (w w ) (xT w∗ )2 ≤−(xT h
∥w∗ ∥2
ℓ2
i
1 n
≤ ∑ ∣⟨xi , h⊥ ⟩∣2 1
n i=1
{∣xT w∗ ∣≤∥w∗ ∥2
∣xT h⊥ ∣
i
ℓ2 (wT w∗ )
i
1 n
≤ ∑ ∣⟨xi , h⊥ ⟩∣2 1
.
n i=1
{(1−ǫ)∣xTi w∗ ∣≤∣xTi h⊥ ∣}
}
T ∗
⊥ )(xi w )
i
}
(5.25)
We now proceed by using the following result from [17].
Lemma 5.5 [17] Let C ∈ Rd be a closed cone. Also let w ∗ be a fixed vector in Rd . Furthermore,
assume
n ≥ c ⋅ ω 2 (C ∩ Sd−1 ),
with c a fixed numerical constant. Then
⎛
1 n
2
≤ δ+
∑ ∣⟨xi , h⊥ ⟩∣ 1
n i=1
{(1−ǫ)∣xTi w∗ ∣≤∣xTi h⊥ ∣} ⎝
holds with probability at least 1 − 2e−γδ
2
n
√
21 ⎞
ǫ ∥h∥2ℓ2 ,
20 ⎠
for all vectors h ∈ C obeying
∥h∥ℓ2 ≤ ǫ ∥w ∗ ∥ℓ2 .
14
2
Proof This lemma follows from the argument on pages 27-30 of [17].
Combining the lemma with equations (5.23), (5.24), and (5.25) we conclude that as long as n ≥ cn0 ,
then
√
√
⎛
21 ⎞
1 n
∗
∗
ǫ ∥h∥ℓ2 ,
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩ ≤ 2 1 + δ δ +
n i=1
20 ⎠
⎝
(5.26)
holds for all u ∈ C ∩ Sd−1 and h ∈ E(ǫ) with probability at least 1 − 4e−γnδ . This completes the
bound on the third term of (5.14).
2
5.2.4
Bounding the fourth term in (5.14)
To bound the fourth term of (5.14) note that by the argument leading to (5.23)
1 n sgn(⟨xi , w⟩)
⟨h, w ∗ ⟩
(1 − sgn(⟨xi , w ∗ ⟩)) +
] (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ∗ ⟩)) ∣⟨xi , w ∗ ⟩∣ ⟨xi , u⟩,
∑[
n i=1
2
∥w ∗∥2ℓ2
¿
R2
Á n RRR
√
sgn(⟨xi , w⟩)
⟨h, w ∗ ⟩ RRRR
Á1
À ∑ RRRR
R ∣⟨xi , w ∗ ⟩∣2 1{⟨xi ,w⟩⟨xi ,w∗ ⟩≤0} ,
(1 − sgn(⟨xi , w ∗ ⟩)) +
≤ 2 1 + δÁ
2 RR
∗
n i=1 RRR
2
∥w ∥ℓ2 RRR
R
¿
√
Á1 n
À ∑ ∣⟨xi , w ∗ ⟩∣2 1{⟨x ,w⟩⟨x ,w∗ ⟩≤0} ,
≤ 4 1 + δÁ
(5.27)
i
i
n i=1
holds for all u ∈ C ∩ Sd−1 with probability at least 1 − 2e−γδ n . We again proceed by using the
following result from [17].
2
Lemma 5.6 [17] Let C ∈ Rd be a closed cone. Also let w ∗ be a fixed vector in Rd . Furthermore,
assume
n ≥ c ⋅ ω 2 (C ∩ Sd−1 ),
with c a fixed numerical constant. Then
⎛
1
1 n
∗ 2
δ+
∑ ∣⟨xi , w ⟩∣ 1{⟨xi ,w⟩⟨xi ,w∗⟩≤0} ≤
2
n i=1
(1 − ǫ) ⎝
holds with probability at least 1 − 2e−γδ
2
n
√
21 ⎞
ǫ ∥h∥2ℓ2 ,
20 ⎠
2
for all vectors h ∈ C obeying
∥h∥ℓ2 ≤ ǫ ∥w ∗ ∥ℓ2 .
Proof This lemma follows from the argument on pages 27-30 of [17].
Combining the lemma with (5.27) we conclude that as long as n ≥ cn0 , then
√
√
1 n
21 ⎞
4 1+δ ⎛
∗
∗
ǫ ∥h∥ℓ2 ,
δ+
∑ (1 − sgn(⟨xi , w⟩)sgn(⟨xi , w ⟩)) sgn(⟨xi , w ⟩)⟨xi , h⊥ ⟩⟨xi , u⟩ ≤
2
n i=1
(1 − ǫ) ⎝
20 ⎠
(5.28)
holds for all u ∈ C ∩ Sd−1 and h ∈ E(ǫ) with probability at least 1 − 4e−γnδ . This completes the
bound on the fourth term of (5.14).
2
15
5.2.5
Putting the bounds together
In this Section we put together the bounds of the previous sections. Combining (5.15), (5.22),
(5.26), and (5.28) we conclude that
√
⎛
⎛ √
21 ⎞⎞
2
∗
) δ+
ǫ ∥w − w ∗ ∥ℓ2 ,
⟨u, w − w − ∇L(w)⟩ ≤ 2 δ + 1 + δ (1 +
2
(1 − ǫ) ⎝
20 ⎠⎠
⎝
holds for all u ∈ C ∩ Sd−1 and w ∈ E(ǫ) with probability at least 1 − 16e−γδ
this inequality with δ = 10−4 and ǫ = 7/200 we conclude that
⟨u, w − w ∗ − ∇L(w)⟩ ≤
1
∥w − w ∗∥ℓ2 ,
4
2
n
− (n + 10)e−γn . Using
holds for all u ∈ C ∩ Sd−1 and w ∈ E(ǫ) with high probability.
Acknowledgements
M.S. would like to thank Adam Klivans and Matus Telgarsky for discussions related to [6] and the
Isotron algorithm. This work was done in part while the author was visiting the Simons Institute
for the Theory of Computing.
References
[1] D. Amelunxen, M. Lotz, M. B. McCoy, and J. A. Tropp. Living on the edge: Phase transitions
in convex programs with random data. Information and Inference, 2014.
[2] E. J. Candes, X. Li, and M. Soltanolkotabi. Phase retrieval via Wirtinger flow: Theory and
algorithms. IEEE Transactions on Information Theory, 61(4):1985–2007, 2015.
[3] V. Chandrasekaran, B. Recht, P. A. Parrilo, and A. S. Willsky. The convex geometry of linear
inverse problems. Foundations of Computational Mathematics, 12(6):805–849, 2012.
[4] R. Collobert and J. Weston. A unified architecture for natural language processing: Deep
neural networks with multitask learning. In Proceedings of the 25th international conference
on Machine learning, pages 160–167. ACM, 2008.
[5] R. Ganti, N. Rao, R. M. Willett, and R. Nowak. Learning single index models in high dimensions. arXiv preprint arXiv:1506.08910, 2015.
[6] S. Goel, V. Kanade, A. Klivans, and J. Thaler. Reliably learning the ReLU in polynomial
time. arXiv preprint arXiv:1611.10258, 2016.
[7] Y. Gordon. On Milman’s inequality and random subspaces which escape through a mesh in Rn .
Springer, 1988.
[8] J. L. Horowitz and W. Hardle. Direct semiparametric estimation of single-index models with
discrete covariates. Journal of the American Statistical Association, 91(436):1632–1640, 1996.
16
[9] H. Ichimura. Semiparametric least squares (SLS) and weighted SLS estimation of single-index
models. Journal of Econometrics, 58(1-2):71–120, 1993.
[10] S. M. Kakade, V. Kanade, O. Shamir, and A. Kalai. Efficient learning of generalized linear and
single index models with isotonic regression. In Advances in Neural Information Processing
Systems, pages 927–935, 2011.
[11] A. T. Kalai and R. Sastry. The isotron algorithm: High-dimensional isotonic regression. In
COLT, 2009.
[12] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional
neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012.
[13] A. Mohamed, G. E. Dahl, and G. Hinton. Acoustic modeling using deep belief networks. IEEE
Transactions on Audio, Speech, and Language Processing, 20(1):14–22, 2012.
[14] S. Oymak, B. Recht, and M. Soltanolkotabi. Sharp time–data tradeoffs for linear inverse
problems. arXiv preprint arXiv:1507.04793, 2015.
[15] S. Oymak and M. Soltanolkotabi. Fast and reliable parameter estimation from nonlinear
observations. arXiv preprint arXiv:1610.07108, 2016.
[16] M. Soltanolkotabi. Algorithms and Theory for Clustering and Nonconvex Quadratic Programming. PhD thesis, Stanford University, 2014.
[17] M. Soltanolkotabi. Structured signal recovery from quadratic measurements: Breaking sample
complexity barriers via nonconvex optimization. arXiv preprint arXiv:1702.06175, 2017.
[18] R. Vershynin. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint
arXiv:1011.3027, 2010.
17
| 7cs.IT
|
Syntax and Semantics of Linear Dependent Types
Technical Report
Matthijs Vákár
Oxford, UK, January 19, 2015
arXiv:1405.0033v4 [cs.LO] 16 Jan 2015
Abstract
A type theory is presented that combines (intuitionistic) linear types with type dependency,
thus properly generalising both intuitionistic dependent type theory and full linear logic. A syntax
and complete categorical semantics are developed, the latter in terms of (strict) indexed symmetric
monoidal categories with comprehension. Various optional type formers are treated in a modular
way. In particular, we will see that the historically much-debated multiplicative quantifiers and
identity types arise naturally from categorical considerations. These new multiplicative connectives
are further characterised by several identities relating them to the usual connectives from dependent
type theory and linear logic. Finally, one important class of models, given by families with values in
some symmetric monoidal category, is investigated in detail.
1
Disclaimer and Acknowledgements
The concept of a syntax with linear dependent types is not new. Such a calculus was first considered in
[1], in the context of a linear extension of the Logical Framework (LF). In terms of the semantics, the
author would like to point to [2] and [3], which study very similar semantic semantic objects, although
without the notion of comprehension. Finally, the author would like to thank Urs Schreiber for sparking
his interest in the topic through many enthusiastic posts on the nLab and nForum.
The contribution of the present work is as follows.
1. The presentation of a syntax in a style that is very close both to the dual intuitionistic linear logic
of [4] and to that of intuitionistic dependent type theory in [5]. This clarifies, from a syntactic
point of view, how exactly linear dependent types fit in with the work in both traditions.
2. Adding various structural rules, that allow us to consider the more basic setting without the
various type formers of the Linear Logical Framework (LLF). In the rich setting of LLF, these
become admissible.
3. The addition of various type formers to the syntax (most notably, Σ-, !-, and Id-types).
4. The development of the first categorical semantics for linear dependent types - although there have
been some suggestions about this on the nLab, by Mike Shulman and Urs Schreiber, in particular,
as far as the author is aware, no account of this has been published. The semantics is developed
in a style that combines features of the linear-non-linear adjunctions of [4] and the comprehension
categories of [6]. Among other things, it shows that multiplicative quantifiers arise very naturally,
as adjoints to substitution, thereby offering a new point of view on long-debated issue of quantifiers
in linear logic.
2
Contents
0 Preliminaries
0.1 (Non-Linear) Intuitionistic Dependent Type Theory (DTT) . . . . . . . . . . . . . . . . . .
0.2 Intuitionistic Linear (Non-Dependent) Type Theory (ILTT) . . . . . . . . . . . . . . . . . .
5
5
6
1 Intuitionistic Linear Dependent Type Theory?
7
2 Syntax of ILDTT
8
3 Semantics of ILDTT
3.1 Tautological models of ILDTT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Categorical Semantics of ILDTT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
16
17
4 Some Discrete Models: Monoidal Families
31
5 Conclusions and Future Work
34
3
Introduction
To put this work in context, the best point of departure may be Church’s simply typed λ-calculus (or
intuitionistic propositional type theory), [7], which according to the Curry-Howard correspondence (e.g.
[8]) can be thought of as a proof calculus for intuitionistic propositional logic. To this, Lambek (e.g. [9])
added the new idea that it can also be viewed as a syntax for describing Cartesian closed categories.
From this starting point, two traditions depart that are particularly relevant for us.
On the one hand, so-called dependent type theory, can be seen to extend along the Curry-Howard
correspondence, to provide a proof calculus for intuitionistic predicate logic. See e.g. [10]. Various
flavours of categorical semantics for this calculus have been given, but they almost all boil down to the
same essential ingredients of talking about certain fibred or, equivalently, indexed Cartesian categories,
usually (depending on the exact formulation of the type theory) with a notion of comprehension that
relates the fibres to the base category.
On the other hand, there is a school of logic, initiated by Girard, so-called linear logic, that has
pursued a further, resource sensitive, analysis of the intuitionistic propositional type theory by exposing
precisely how many times each assumption is used in proofs. See e.g. [11]. Later, the essence of Girard’s
system was seen to be captured by a less restrictive system called (multiplicative) intuitionistic linear
logic (where Girard’s original system is now referred to as classical linear logic). This will be the sense
in which we use the word ’linear’. A satisfactory proof calculus and categorical semantics, in terms of
symmetric monoidal closed categories, are easily given. The final essential element of linear type theories,
the resource modality providing the connection with intuitionistic type theories, can be given categorical
semantics as a monoidal adjunction between an intuitionistic and a linear model. [4]
The question rises if this linear analysis can be extended to predicate logic. Although some work has
been done in this direction, the author feels a satisfactory answer has not been given.
Although Girard’s early work in linear logic already talks about quantifiers, the analysis appears to
have stayed rather superficial. In particular, an account of internal quantification, or a linear variant
of Martin-Löf’s type theory, was missing, let alone a Curry-Howard correspondence. Later, linear types
and dependent types were first combined in [1], where a syntax was presented that extends LF (Logical
Framework) with linear types (that depend on terms of intuitionistic types). This has given rise to a line
of work in the computer science community. See e.g. [12, 13, 14]. All the work seems to be syntactic in
nature, however.
On the other hand, very similar ideas, this time at the level of categorical semantics and specific models
(coming from homotopy theory, algebra, and mathematical physics), have emerged in the mathematical
community lately, perhaps independently so. Relevant literature is e.g. [15, 2, 3, 16].
Although, in the past months, some suggestions have been made on the nLab and nForum, of possible
connections between both lines of work, no account of the correspondence was ever published, as far as
the author is aware. Moreover, the syntactic tradition seems to have stayed restricted to the situation
of functional type theory, in which one has Π- and ⊸-types, while we are really interested in the general
case of algebraic type theory, which is of fundamental importance from the point of view of mathematics
where structures seldom admit internal homs. Simultaneously, in the syntactic traditions there seems
to be a lack of other type formers (like Σ-, !-, and Id-types). The semantic tradition, however, does not
seem to have given a sufficient account of the notion of comprehension. The present text will take some
steps to close this gap in the existing literature.
The point of this paper is to illustrate how linear and dependent types can be combined straightforwardly and in great generality. Firstly, in section 1, we start with some general discussion on the matter
of combining linear and dependent types. Secondly, in section 2, we present a syntax, intuitionistic linear
dependent type theory (ILDTT), a natural blend of the dual intuitionistic linear logic (DILL) of [4] and
dependent type theory (DTT) of e.g. [5]. Thirdly, in section 3, we present a complete categorical semantics that is the obvious combination of linear/non-linear adjunctions of e.g. [4] and indexed Cartesian
categories with comprehension of e.g. [6]. Finally, in section 4, an important class of (rather discrete)
models is investigated, in terms of families with values in a fixed symmetric monoidal category.
This paper forms the first report of a research programme that aims to explore the interplay between
type dependency and linearity. We we will therefore end with a brief discussion of some our work in
progress and planned work on related topics.
4
0
Preliminaries
We will start these notes with some suggestions of references for both linear type theory and dependent
type theory, as having the right point of view on both subjects greatly simplifies understanding our
presentation of the new material.
0.1
(Non-Linear) Intuitionistic Dependent Type Theory (DTT)
Syntax
For an introductory but thorough treatment of the syntax, we refer the reader to [5].
Categorical Semantics
There are many (more or less) equivalent kinds of categorical model of a dependent type theory. Perhaps the best definition the have in mind while reading this text is either the notion of a full (split)
comprehension category of [6] or the following rephrasing of a full split comprehension category with 1and ×-types1 .
Definition (Strict Indexed Cartesian Monoidal Category with Comprehension). By a strict2 indexed3
Cartesian monoidal category with comprehension, we will mean the following data.
1. A category of intuitionistic contexts C with a terminal object ⋅.
2. A strict indexed Cartesian monoidal category I over C, i.e. a contravariant functor I into the
category CMCat of (small) Cartesian monoidal categories and strong cartesian monoidal functors
I
C op Ð→ CMCat.
We will also write −{f } ∶= I(f ) for the action of I on a morphism f of C.
3. A comprehension schema, i.e. for each ∆ ∈ ob(C) and A ∈ ob(I(∆)) a representation for the functor
x ↦ I(dom(x))(1, A{x}) ∶ (C/∆)op Ð→ Set,
p∆,A
which induces a fully faithful comprehension functor : if we write the representing object ∆.A Ð→
∆ ∈ ob(C/∆), write a ↦ ⟨f, a⟩ for the isomorphism I(∆′ )(1, A{f }) ≅ C/∆(f, p∆,A ), and write
v∆,A ∈ I(∆.A)(1, A{p∆,A }) for the universal element, the comprehension functor I Ð→ C/− is
defined as
✲ C/∆
I(∆)
f
A Ð→ B
✲
p∆,A
⟨p∆,A , I(p∆,A )(f ) ○ v∆,A ⟩
✲ p∆,B .
Note that the comprehension schema says that we build up the morphisms into objects that arise as
lists of types in our category of contexts C as lists of closed terms. It will be the crucial aspect that makes
sure we are in the world of internal quantification. The fact that we are demanding the comprehension
functor to be fully faithful means that also the non-closed terms in I(∆)(A, B) correspond precisely
with the closed terms I(∆.A)(I, B). The equivalent condition on a comprehension category is the
notion of fullness of [6]. This is essential to get a precise fit with the syntax. However, we shall drop this
restriction in modelling linear dependent types, as, there, having A as a linear assumption (which will
be an assumption in the fibre) can really be different from having A as an intuitionistic assumption (an
assumption in the base).
1
This restriction avoids us having to talk about multicategories. We are sure the reader familiar with multicategories
can see the obvious generalisation to the case without 1- and ×-types.
2
The strictness, here, refers to the fact that I is a functor, rather than a pseudofunctor. This reflects the fact that term
substitution in types is a strict operation in type theory, even though the non-strict version might seem more natural from
the point of view of category theory. It should be noted, though, that every indexed category is equivalent to a strict one.
[17]
3
Of course, using the Grothendieck construction, we could, equivalently, use split fibred categories, here, as is in fact
done in certain accounts of semantics for DTT. However, indexed categories seem closer to the syntax and are technically
less involved in the strict case.
5
0.2
Intuitionistic Linear (Non-Dependent) Type Theory (ILTT)
The most suitable flavour of ILTT to have in mind while reading these notes is the so-called dual
intuitionistic linear logic (DILL) of [4]. This will be our principal reference for both syntax and semantics.
Both the syntax and semantics given in this reference are very close in intuition to our syntax and
semantics of linear dependent types. For the semantics, more background is provided in [18].
6
1
Intuitionistic Linear Dependent Type Theory?
Although it is a priori not entirely clear what linear dependent type theory should be, one can easily
come up with some guiding criteria. My gut reaction was the following.
What we want to arrive at is a version of dependent type theory without weakening and contraction
rules. Moreover, we would want an exponential co-modality on the type theory that gives us back the
missing structural rules.
When one first tries to write down such a type theory, however, one will run into the following
discrepancy.
• The lack of weakening and contraction rules in linear type theory forces us to refer to each declared
variable precisely once: for a sequent x ∶ A ⊢ t ∶ B, we know that x has a unique occurence in t.
• In dependent type theory, types can have free (term) variables: x ∶ A ⊢ B type, where x is a free
variable in B. Crucially, we can then talk about terms of B: x ∶ A ⊢ b ∶ B, where generally x may
also be free in b. For almost all interesting applications we will need multiple occurences of x to
construct b ∶ B, at least one for B and one for b.
The question now is what it means to refer to a declared variable only once.
Do we not count occurences in types? This point of view seems incompatible with universes, however, which play an important role in dependent type theory. If we do, however, the language seems to
lose much of its expressive power. In particular, it prevents us from talking about constant types, it seems.
In this paper, we will circumvent the issue by restricting to type dependency on terms of intuitionistic types. In this case, there is no conflict, as those terms can be copied and deleted freely.
An argument for this system, that is of a semantic rather than a syntactic nature, is the following.
We shall see that if we start out with a model of linear type theory with external quantification (i.e.
strict indexed symmetric monoidal category) and demand the quantification to be internal (i.e. demand
it to be a linear dependent type theory) in the natural way (i.e. impose the comprehension axiom), we
will see that our base category becomes a cartesian category (i.e. a model of intuitionistic type theory).
Our best attempt to give meaning on type dependency on linear types, will be through dependency
on a (co-Kleisli or co-Eilenberg-Moore) category of co-algbras for !. We will briefly return to the issue
later, but most of the discussion is beyond the scope of this paper.
In a linear dependent type theory, one could initially conceive of the option of an additive - denote
⊗
with Σ&
x∶X A - and multiplicative - denote with Σx∶X A - Σ-type to generalise the additive and multiplicative conjunction of intuitionistic linear logic. The modality would relate the additive Σ-type of linear type
families to the multiplicative Σ-type of intuitionistic type families, through a Seely-like isomorphism:
⊗
!(Σ&
x∶X A) = Σx∶!X !A.
The idea is that the linear Σ-types should simultaneously generalise the conjunctions from propositional
linear logic and the Σ-types from intuitionistic dependent type theory.
Generally, though, since we are restricting to type dependency on !-ed types, the additive Σ-type (as
far as one can make sense of the notion) would become effectively intuitionistic (as both terms in the
introduction rule would have to depend on the same context, one of which is forced to be intuitionistic).
This also ruins the symmetry in the Seely isomorphism. Moreover, we will see that the multiplicative
Σ-types (and Π-types) arise naturally in the categorical semantics. We will later briefly return to the
possibility of a really linear additive Σ-type and Seely isomorphisms.
For the Π-type, one would also expect to obtain two linear cousins: an additive and a multiplicative
version. However, given the overwhelming preference in the linear logic literature of the multiplicative
implication, we can probably safely restrict our attention to multiplicative Π-types for now.
7
2
Syntax of ILDTT
We assume the reader has some familiarity with the formal syntax of dependent type theory and linear
type theory. In particular, we will not go into syntactic details like α-conversion, name binding, capturefree substitution of a for x in t (write t[a/x]), and pre-syntax. The reader can find details on all of these
topics in [5].
We next present the formal syntax of ILDTT. We start with a presentation of the judgements that
will represent the propositions in the language and then discuss its rules of inference: first its structural
core, then the logical rules for a series of optional type formers. We conclude this section with a few
basic results about the syntax.
Judgements
We adopt a notation ∆; Ξ for contexts, where ∆ is ‘an intuitionistic region’ and Ξ is ‘a linear region’,
similarly to [4]. The idea will be that we have an empty context and can extend an existing context ∆; Ξ
with both intuitionistic and linear types that are allowed to depend on ∆.
Our language will express judgements of the following six forms.
ILDTT judgement
⊢ ∆; Ξ ctxt
∆; ⋅ ⊢ A type
∆; Ξ ⊢ a ∶ A
⊢ ∆; Ξ ≡ ∆′ ; Ξ′ ctxt
∆; ⋅ ⊢ A ≡ A′ type
∆; Ξ ⊢ a ≡ a′ ∶ A
Intended meaning
∆; Ξ is a valid context
A is a type in (intuitionistic) context ∆
a is a term of type A in context ∆; Ξ
∆; Ξ and ∆′ ; Ξ′ are judgementally equal contexts
A and A′ are judgementally equal types in (intuitionistic) context ∆
a and a′ are judgementally equal terms of type A in context ∆; Ξ
Figure 1: Judgements of ILDTT.
Structural Rules
We will use the following structural rules, which are essentially the structural rules of dependent type
theory where some rules appear in both an intuitionistic and a linear form. We present the rules per
group, with their names, from left-to-right, top-to-bottom.
⋅; ⋅ ctxt
C-Emp
⊢ ∆; Ξ ctxt
∆; ⋅ ⊢ A type
Int-C-Ext
⊢ ∆, x ∶ A; Ξ ctxt
∆; Ξ ≡ ∆′ ; Ξ′ ctxt
⊢ ∆; Ξ ctxt
∆; ⋅ ⊢ A type
Lin-C-Ext
⊢ ∆; Ξ, x ∶ A ctxt
∆; Ξ ≡ ∆′ ; Ξ′ ctxt
∆, x ∶ A, ∆′ ; ⋅ ctxt
∆, x ∶ A, ∆′ ; ⋅ ⊢ x ∶ A
∆; ⋅ ⊢ A ≡ B type
⊢ ∆, x ∶ A; Ξ ≡ ∆′ , y ∶ B; Ξ′ ctxt
∆; ⋅ ⊢ A ≡ B type
⊢ ∆; Ξ, x ∶ A ≡ ∆′ ; Ξ′ , y ∶ B ctxt
Int-C-Ext-Eq
Lin-C-Ext-Eq
∆; x ∶ A ctxt
Lin-Var
∆; x ∶ A ⊢ x ∶ A
Int-Var
Figure 2: Context formation and variable declaration rules.
8
⊢ ∆; Ξ ≡ ∆′ ; Ξ′ ctxt
⊢ ∆; Ξ ctxt
C-Eq-R
⊢ ∆; Ξ ≡ ∆; Ξ ctxt
⊢ ∆; Ξ ≡ ∆′ ; Ξ′ ctxt
⊢ ∆′ ; Ξ′ ≡ ∆; Ξ ctxt
⊢ ∆′ ; Ξ′ ≡ ∆′′ ; Ξ′′ ctxt
∆′′ ; Ξ′′
⊢ ∆; Ξ ≡
ctxt
C-Eq-T
∆; Ξ ⊢ A ≡ A′ type
∆; Ξ ⊢ A type
Ty-Eq-R
∆; Ξ ⊢ A ≡ A type
∆; Ξ ⊢ A ≡ A′ type
∆; Ξ ⊢ A′ ≡ A type
∆; Ξ ⊢ A′ ≡ A′′ type
∆; Ξ ⊢ A ≡ A′′ type
∆; Ξ ⊢ a ≡ a′ ∶ A
∆; Ξ ⊢ a′ ≡ a ∶ A
∆; Ξ ⊢ a′ ≡ a′′ ∶ A
∆; Ξ ⊢ a ≡ a′′ ∶ A
⊢ ∆; Ξ ≡ ∆; Ξ′ ctxt
∆; Ξ ⊢ a ∶ A
′
′
∆ ;Ξ ⊢ a ∶ A
∆′ ; ⋅ ⊢ A type
∆; ⋅ ⊢ A ≡ A′ Type
⊢ ∆; ⋅ ≡ ∆′ ; ⋅ ctxt
∆ ; ⋅ ⊢ A type
Tm-Eq-S
Tm-Eq-T
′
′
Ty-Eq-S
Ty-Eq-T
∆; Ξ ⊢ a ∶ A
Tm-Eq-R
∆; Ξ ⊢ a ≡ a ∶ A
∆; Ξ ⊢ a ≡ a′ ∶ A
C-Eq-S
Tm-Conv
Ty-Conv
Figure 3: A few standard rules for judgemental equality, saying that it is an equivalence relation and is
compatible with typing.
∆, ∆′ ; Ξ ⊢ J
∆; ⋅ ⊢ A type
∆, x ∶ A, ∆′ ; Ξ ⊢ J
∆, x ∶ A, x′ ∶ A′ , ∆′ ; Ξ ⊢ J
∆, x′ ∶ A′ , x ∶ A, ∆′ ; Ξ ⊢ J
Int-Weak
∆; Ξ, x ∶ A, x′ ∶ A′ , Ξ′ ⊢ J
Int-Exch
∆; Ξ, x′ ∶ A′ , x ∶ A, Ξ′ ⊢ J
Lin-Exch
(if x is not free in A′ )
∆, x ∶ A, ∆′ ; ⋅ ⊢ B type
∆, ∆′ [a/x]; ⋅
∆; ⋅ ⊢ a ∶ A
⊢ B[a/x] type
∆, x ∶ A, ∆′ ; Ξ ⊢ b ∶ B
∆; ⋅ ⊢ a ∶ A
′
∆, ∆ [a/x]; Ξ[a/x] ⊢ b[a/x] ∶ B[a/x]
∆; Ξ, x ∶ A ⊢ b ∶ B
∆; Ξ′ ⊢ a ∶ A
∆; Ξ, Ξ′ ⊢ b[a/x] ∶ B
Int-Ty-Subst
∆, x ∶ A, ∆′ ; ⋅ ⊢ B ≡ B ′ type
∆; ⋅ ⊢ a ∶ A
∆, ∆′ [a/x]; ⋅ ⊢ B[a/x] ≡ B ′ [a/x] type
∆, x ∶ A, ∆′ ; Ξ ⊢ b ≡ b′ ∶ B
Int-Tm-Subst
∆; ⋅ ⊢ a ∶ A
∆, ∆′ [a/x]; Ξ ⊢ b[a/x] ≡ b′ [a/x] ∶ B[a/x]
∆; Ξ, x ∶ A ⊢ b ≡ b′ ∶ B
Lin-Tm-Subst
∆; Ξ′ ⊢ a ∶ A
∆; Ξ, Ξ′ ⊢ b[a/x] ≡ b′ [a/x] ∶ B
Int-Ty-Subst-Eq
Int-Tm-Subst-Eq
Lin-Tm-Subst-Eq
Figure 4: Exchange, weakening, and substitution rules. Here, J represents a statement of the form
B type, B ≡ B ′ , b ∶ B, or b ≡ b′ ∶ B, such that all judgements are well-formed.
9
Logical Rules
We introduce some basic (optional) type and term formers, for which we will give type formation (denoted
-F), term introduction (-I), term elimination (-E), term computation rules (-C), and (judgemental) term
uniqueness principles (-U). We also assume the obvious rules to hold that state that the new type
formers and term formers respect judgemental equality. Moreover, Σ!x∶!A , Π!x∶!A , λ!x∶!A , and λx∶A are
name binding operators, binding free occurences of x within their scope. Preempting some theorems of
the calculus, we overload some of the notation for -I and -E various type formers, in order to avoid a
lot of syntactic clutter. Needless to say, uniqueness of typing can easily be restored by carrying around
enough type information on the notations corresponding to the various -I and -E rules.
We demand -U-rules for the various type formers in this paper, as this allows us to give a natural
categorical semantics. In practice, when building a computational implementation of a type theory like
ours, one would probably drop these rules to make the system decidable, which would correspond to
switching to weak equivalents of the categorical constructions presented here.4
∆, x ∶ A; ⋅ ⊢ B type
Σ-F
∆; ⋅ ⊢ Σ!x∶!A B type
∆; ⋅ ⊢ C type
∆; Ξ ⊢ t ∶ Σ!x∶!AB
∆; ⋅ ⊢ a ∶ A
∆; Ξ ⊢ b ∶ B[a/x]
Σ-I
∆; Ξ ⊢!a ⊗ b ∶ Σ!x∶!A B
∆, x ∶ A; Ξ′ , y ∶ B ⊢ c ∶ C
∆; Ξ, Ξ′ ⊢ let t be !x ⊗ y in c ∶ C
∆; Ξ ⊢ let !a ⊗ b be !x ⊗ y in c ∶ C
Σ-C
∆; Ξ ⊢ let !a ⊗ b be !x ⊗ y in c ≡ c[a/x, b/y] ∶ C
Σ-E
∆; Ξ ⊢ let t be !x ⊗ y in !x ⊗ y ∶ Σ!x∶!A B
Σ-U
∆; Ξ ⊢ let t be !x ⊗ y in !x ⊗ y ≡ t ∶ Σ!x∶!A B
∆, x ∶ A; ⋅ ⊢ B type
Π-F
∆; ⋅ ⊢ Π!x∶!A B type
∆; ⋅ ⊢ a ∶ A
⊢ ∆; Ξ ctxt
∆, x ∶ A; Ξ ⊢ b ∶ B
Π-I
∆; Ξ ⊢ λ!x∶!A b ∶ Π!x∶!A B
∆; Ξ ⊢ (λ!x∶!A b)(!a) ∶ B
∆; Ξ ⊢ (λ!x∶!A b)(!a) ≡ b[a/x] ∶ B[a/x]
∆; ⋅ ⊢ a ∶ A
∆; ⋅ ⊢ a′ ∶ A
∆; ⋅ ⊢ Id!A (a, a′ ) type
∆; ⋅ ⊢ a ∶ A
∆; ⋅ ⊢ refl!a ∶ Id!A (a, a)
∆; Ξ ⊢ f ∶ Π!x∶!A B
∆; Ξ ⊢ f (!a) ∶ B[a/x]
∆; Ξ ⊢ λ!x∶!A f (!x) ∶ Π!x∶!A B
Π-C
∆; Ξ ⊢ f ≡ λ!x∶!A f (!x) ∶ Π!x∶!A B
∆, x ∶ A, x′ ∶ A; ⋅ ⊢ D type
∆, z ∶ A; Ξ ⊢ d ∶ D[z/x, z/x′ ]
∆; ⋅ ⊢ a ∶ A
∆; ⋅ ⊢ a′ ∶ A
∆; Ξ′ ⊢ p ∶ Id!A (a, a′ )
Id-F
Id-I
∆; Ξ[a/z], Ξ′ ⊢ let (a, a′ , p) be (z, z, refl!z ) in d ∶ D[a/x, a′ /x′ ]
∆; Ξ ⊢ let (a, a, refl!a ) be (z, z, refl!z ) in d ∶ D[a/x, a/x′ ]
∆; Ξ ⊢ let (a, a, refl!a ) be (z, z, refl!z ) in d ≡ d[a/z] ∶ D[a/x, a/x′ ]
Π-E
Π-U
Id-E
Id-C
∆, x ∶ A, x′ ∶ A; Ξ, z ∶ Id!A (x, x′ ) ⊢ let (x, x′ , z) be (x, x, refl!x ) in c[x/x′ , refl!x /z] ∶ C
∆, x ∶ A, x′ ∶ A; Ξ, z ∶ Id!A (x, x′ ) ⊢ let (x, x′ , z) be (x, x, refl!x ) in c[x/x′ , refl!x /z] ≡ c ∶ C
Id-U
Figure 5: Rules for linear equivalents of some of the usual type formers from DTT: Σ-, Π-, and Id-types.
4
In that case in DTT, one would usually demand some stronger ‘dependent’ elimination rules, which would make propositional equivalents of the -U-rules provable, adding some extensionality to the system, while preserving its computational
properties. Such rules are problematic in ILDTT, however, both from a syntactic and semantic point of view and a further
investigation is warranted here.
10
I-F
∆; ⋅ ⊢ I type
I-I
∆; ⋅ ⊢ ∗ ∶ I
∆; Ξ′ ⊢ t ∶ I
∆; Ξ ⊢ a ∶ A
∆; Ξ, Ξ′ ⊢ let t be ∗ in a ∶ A
I-E
∆; Ξ ⊢ let t be ∗ in ∗ ∶ I
I-U
∆; Ξ ⊢ let t be ∗ in ∗ ≡ t ∶ I
∆; Ξ ⊢ let ∗ be ∗ in a ∶ A
I-C
∆; Ξ ⊢ let ∗ be ∗ in a ≡ a ∶ A
∆; ⋅ ⊢ A type
∆; ⋅ ⊢ B type
⊗-F
∆; ⋅ ⊢ A ⊗ B type
∆; Ξ′ ⊢ b ∶ B
∆; Ξ ⊢ a ∶ A
′
∆; Ξ, Ξ ⊢ a ⊗ b ∶ A ⊗ B
∆; Ξ ⊢ t ∶ A ⊗ B
⊗-I
∆; Ξ′ , x ∶ A, y ∶ B ⊢ c ∶ C
′
∆; Ξ, Ξ ⊢ let t be x ⊗ y in c ∶ C
∆; Ξ ⊢ let a ⊗ b be x ⊗ y in c ∶ C
⊗-C
∆; Ξ ⊢ let a ⊗ b be x ⊗ y in c ≡ c[a/x, b/y] ∶ C
⊗-E
∆; Ξ ⊢ let t be x ⊗ y in x ⊗ y ∶ A ⊗ B
⊗-U
∆; Ξ ⊢ let t be x ⊗ y in x ⊗ y ≡ t ∶ A ⊗ B
∆; ⋅ ⊢ A type
∆; ⋅ ⊢ B type
⊸-F
∆; ⋅ ⊢ A ⊸ B type
∆; Ξ ⊢ f ∶ A ⊸ B
∆; Ξ, x ∶ A ⊢ b ∶ B
⊸-I
∆; Ξ ⊢ λx∶A b ∶ A ⊸ B
∆; Ξ ⊢ (λx∶A b)(a) ∶ B
∆; Ξ ⊢ (λx∶A b)(a) ≡ b[a/x] ∶ B
∆; ⋅ ⊢ ⊺ type
∆; Ξ, Ξ′
∆; Ξ ctxt
⊺-I
∆; Ξ ⊢ ⟨⟩ ∶ ⊺
⊸-E
∆; Ξ ⊢ t ∶ ⊺
⊺-U
∆; Ξ ⊢ t ≡ ⟨⟩ ∶ ⊺
∆; Ξ ⊢ a ∶ A
∆; Ξ ⊢ b ∶ B
&-I
∆; Ξ ⊢ ⟨a, b⟩ ∶ A&B
∆; ⋅ ⊢ A type
∆; ⋅ ⊢ B type
&-F
∆; ⋅ ⊢ A&B type
∆; Ξ ⊢ t ∶ A&B
&-E1
∆; Ξ ⊢ fst(t) ∶ A
∆; Ξ ⊢ t ∶ A&B
&-E2
∆; Ξ ⊢ snd(t) ∶ B
∆; Ξ ⊢ fst(⟨a, b⟩) ∶ A
∆; Ξ ⊢ fst(⟨a, b⟩) ≡ a ∶ A
∆; Ξ ⊢ snd(⟨a, b⟩) ∶ B
&-C1
∆; Ξ ⊢ ⟨fst(t), snd(t)⟩ ∶ A&B
∆; Ξ ⊢ ⟨fst(t), snd(t)⟩ ≡ t ∶ A&B
∆; ⋅ ⊢ 0 type
⊢ f (a) ∶ B
∆; Ξ ⊢ λx∶A f x ∶ A ⊸ B
⊸-U
∆; Ξ ⊢ λx∶A f x ≡ f ∶ A ⊸ B
⊸-C
⊺-F
∆; Ξ′ ⊢ a ∶ A
∆; Ξ ⊢ snd(⟨a, b⟩) ≡ b ∶ B
&-C2
&-U
∆; Ξ ⊢ t ∶ 0
0-F
∆; Ξ, Ξ′ ⊢ false(t) ∶ B
0-E
∆; Ξ ⊢ t ∶ 0
0-U
∆; Ξ ⊢ false(t) ≡ t ∶ 0
∆; ⋅ ⊢ A type
∆; ⋅ ⊢ B type
⊕-F
∆; ⋅ ⊢ A ⊕ B type
∆; Ξ ⊢ b ∶ B
∆; Ξ ⊢ a ∶ A
⊕-I1
∆; Ξ ⊢ inl(a) ∶ A ⊕ B
∆; Ξ, x ∶ A ⊢ c ∶ C
∆; Ξ, y ∶ B ⊢ d ∶ C
∆; Ξ ⊢ inr(b) ∶ A ⊕ B
∆; Ξ′ ⊢ t ∶ A ⊕ B
′
∆; Ξ, Ξ ⊢ case t of inl(x) → c ∣∣ inr(y) → d ∶ C
∆; Ξ, Ξ′ ⊢ case inl(a) of inl(x) → c ∣∣ inr(y) → d ∶ C
∆; Ξ, Ξ′ ⊢ case inl(a) of inl(x) → c ∣∣ inr(y) → d ≡ c[a/x] ∶ C
∆; Ξ, Ξ′ ⊢ case inr(b) of inl(x) → c ∣∣ inr(y) → d ∶ C
∆; Ξ, Ξ′ ⊢ case inr(b) of inl(x) → c ∣∣ inr(y) → d ≡ d[b/y] ∶ C
⊕-C1
⊕-C2
∆; Ξ, Ξ′ ⊢ case t of inl(x) → inl(x) ∣∣ inr(y) → inr(y) ∶ A ⊕ B
∆; Ξ, Ξ′ ⊢ case t of inl(x) → inl(x) ∣∣ inr(y) → inr(y) ≡ t ∶ A ⊕ B
11
⊕-E
⊕-U
⊕-I2
∆; ⋅ ⊢ A type
!-F
∆; ⋅ ⊢!A type
∆; Ξ ⊢ t ∶!A
∆; ⋅ ⊢ a ∶ A
!-I
∆; ⋅ ⊢!a ∶!A
′
∆, x ∶ A; Ξ′ ⊢ b ∶ B
∆; Ξ, Ξ ⊢ let t be !x in b ∶ B
∆; Ξ ⊢ let !a be !x in b ∶ B
∆; Ξ ⊢ let !a be !x in b ≡ b[a/x] ∶ B
!-E
∆; Ξ ⊢ let t be !x in !x ∶!A
!-U
∆; Ξ ⊢ let t be !x in !x ≡ t ∶!A
!-C
Figure 6: Rules for the usual linear type formers in each context: I-, ⊗-, ⊸-, ⊺-, &-, 0-, ⊕-, and !-types.
Finally, we add rules that say we have all the possible commuting conversions, which from a syntactic
point of view restore the subformula property and from a semantic point of view say that our rules are
natural transformations (between hom-functors), which simplifies the categorical semantics significantly.
We represent these schematically, following [4]. That is, if C[−] is a linear (program rather than typing)
context, then (abusing notation and dealing with all the let be in -constructors in one go).
∆; Ξ ⊢ C[let a be b in c] ∶ D
∆; Ξ ⊢ C[let a be b in c] ≡ let a be b in C[c] ∶ D
if C[−] does not bind any free variables in a or b;
∆; Ξ ⊢ C[false(t)] ∶ D
∆; Ξ ⊢ C[false(t)] ≡ false(t) ∶ D
if C[−] does not bind any free variables in t;
∆; Ξ ⊢ C[case t of inl(x) → c ∣∣ inr(y) → d] ∶ D
∆; Ξ ⊢ C[case t of inl(x) → c ∣∣ inr(y) → d] ≡ case t of inl(x) → C[c] ∣∣ inr(y) → C[d] ∶ D
if C[−] does not bind any free variables in t or x or y.
Figure 7: Commuting conversions.
Remark 1. Note that all type formers that are defined context-wise (I, ⊗, ⊸, ⊺, &, 0, ⊕, and !)
are automatically preserved under the substitutions from Int-Ty-Subst (up to canonical isomorphism5 ),
in the sense that F (A1 , . . . , An )[a/x] is isomorphic to F (A1 [a/x], . . . , An [a/x]) for an n-ary type former F . Similarly, for T = Σ or Π, we have that (T!y∶!B C)[a/x] is isomorphic to T!y∶!B[a/x] C[a/x] and
(Id!B (b, b′ ))[a/x] is isomorphic to Id!B[a/x] (b[a/x], b′ [a/x]). (This gives us Beck-Chevalley conditions
in the categorical semantics.) These are the remaining naturality conditions for rules.
Remark 2. The reader can note that the usual formulation of universes for DTT transfers very naturally
to ILDTT, giving us a notion of universes for linear types. This allows us to write rules for forming types
as rules for forming terms, as usual. We do not choose this approach and define the various type formers
in the setting without universes, as this will give a cleaner categorical semantics.
Some Basic Results
As the focus of this paper is the syntax-semantics correspondence, we will only briefly state a few syntactic
results. For some standard metatheoretic properties for the ⊸, Π, ⊺, &-fragment of our syntax, we refer
the reader to [1]. Standard techniques and some small adaptations of the system should be enough to
extend the results to all of ILDTT.
Theorem 1 (Consistency). ILDTT with all its type formers is consistent.
Proof. We discuss a class of models in section 4.
5
By an isomorphism of types ∆; ⋅ ⊢ A type and ∆; ⋅ ⊢ B type in context ∆, we here mean a pair of terms ∆; x ∶ A ⊢ f ∶ B
and ∆; y ∶ B ⊢ g ∶ A together with a pair of judgemental equalities ∆; x ∶ A ⊢ g[f /y] ≡ x ∶ A and ∆; y ∶ B ⊢ f [g/x] ≡ y ∶ B.
12
To give the reader some intuition for these linear Π- and Σ-types, we suggest the following two
interpretations.
Theorem 2 (Π and Σ as Dependent !(−) ⊸ (−) and !(−) ⊗ (−)). Suppose we have !-types. Let ∆, x ∶
A; ⋅ ⊢ B type, where x does not occur freely in B. Then, for the purposes of the type theory,
1. Π!x∶!A B is isomorphic to !A ⊸ B, if we have Π-types and ⊸-types;
2. Σ!x∶!A B is isomorphic to !A ⊗ B, if we have Σ-types and ⊗-types.
Proof.
1. We will construct terms
and ∆; y ′ ∶!A ⊸ B ⊢ g ∶ Π!x∶!A B
∆; y ∶ Π!x∶!A B ⊢ f ∶!A ⊸ B
s.t.
∆; y ∶ Π!x∶!A B ⊢ g[f /y ′] ≡ y ∶ Π!x∶!A B
and ∆; y ′ ∶!A ⊸ B ⊢ f [g/y] ≡ y ′ ∶!A ⊸ B.
First, we construct f .
Int-Var
Lin-Var
∆, x ∶ A; ⋅ ⊢ x ∶ A
∆, x ∶ A; y ∶ Π!x∶!A B ⊢ y ∶ Π!x∶!A B
Π-E
Lin-Var
∆, x ∶ A; y ∶ Π!x∶!A B ⊢ y(!x) ∶ B
∆; x′ ∶!A ⊢ x′ ∶!A
!-E
∆; y ∶ Π!x∶!A B, x′ ∶!A ⊢ let x′ be !x in y(!x) ∶ B
⊸-I
∆; y ∶ Π!x∶!A B ⊢ f ∶!A ⊸ B
Then, we construct g.
Int-Var
∆, x ∶ A; ⋅ ⊢ x ∶ A
Lin-Var
!-I
∆, x ∶ A; ⋅ ⊢!x ∶!A
∆, x ∶ A; y ′ ∶!A ⊸ B ⊢ y ′ ∶!A ⊸ B
⊸-E
∆, x ∶ A; y ′ ∶!A ⊸ B ⊢ y ′ (!x) ∶ B
Π-I
∆; y ′ ∶!A ⊸ B ⊢ g ∶ Π!x∶!A B
It is easily verified that ⊸-C, !-C, and Π-U imply the first judgemental equality:
g[f /y ′] ≡ λ!x∶!A (λx′ ∶!A let x′ be !x in y(!x))(!x) ≡ λ!x∶!A let !x be !x in y(!x) ≡ λ!x∶!A y(!x) ≡ y.
Similarly, Π-C, commuting conversions, !-U, and ⊸-U imply the second judgemental equality:
f [g/y] ≡ λx′ ∶!A let x′ be !x in (λ!x∶!A y ′ (!x))(!x) ≡ λx′ ∶!A let x′ be !x in y ′ (!x) ≡ λx′ ∶!A y ′ (let x′ be !x in !x)
≡ λx′ ∶!A y ′ (x′ ) ≡ y ′ .
2. We will construct terms
and ∆; y ′ ∶!A ⊗ B ⊢ g ∶ Σ!x∶!A B
∆; y ∶ Σ!x∶!A B ⊢ f ∶!A ⊗ B
s.t.
∆; y ∶ Σ!x∶!A B ⊢ g[f /y ′] ≡ y ∶ Σ!x∶!A B
and ∆; y ′ ∶!A ⊗ B ⊢ f [g/y] ≡ y ′ ∶!A ⊗ B.
First, we construct f .
∆; x′ ∶!A ⊢ x′ ∶!A
Lin-Var
′
∆; z ∶ B ⊢ z ∶ B
′
∆; x ∶!A, z ∶ B ⊢ x ⊗ z ∶!A ⊗ B
′
∆; y ∶ Σ!x∶!A B ⊢ y ∶ Σ!x∶!A B
Lin-Var
′
∆, x ∶ A; x ∶!A, z ∶ B ⊢ x ⊗ z ∶!A ⊗ B
Lin-Var
⊗-I
Int-Weak
∆, x ∶ A; z ∶ B ⊢!x ⊗ z ∶!A ⊗ B
∆; y ∶ Σ!x∶!A B ⊢ f ∶!A ⊗ B
∆, x ∶ A; ⋅ ⊢ x ∶ A
∆, x ∶ A; ⋅ ⊢!x ∶!A
Σ-E
Then, we construct g.
Int-Var
Lin-Var
∆, x ∶ A; y ∶ B ⊢ y ∶ B
Σ-I
∆; x′ ∶!A ⊢ x′ ∶!A
∆, x ∶ A; y ∶ B ⊢!x ⊗ y ∶ Σ!x∶!A B
∆; x′ ∶!A, y ∶ B ⊢ let x′ be !x in !x ⊗ y ∶ Σ!x∶!A B
⊗-E
∆; y′ ∶!A ⊗ B ⊢ g ∶ Σ!x∶!A B
∆, x ∶ A; ⋅ ⊢ x ∶ A
∆; y′ ∶!A ⊗ B ⊢ y′ ∶!A ⊗ B
Lin-Var
Lin-Var
!-E
Here, the first judgemental equality follows from commuting conversions, ⊗-C, !-C, and Σ-U:
13
Int-Var
!-I
Lin-Subst
g[f /y ′] ≡ let (let y be !x ⊗ z in !x ⊗ z) be x′ ⊗ y in (let x′ be !x in !x ⊗ y) ≡ let y be !x ⊗ z in let !x ⊗
z be x′ ⊗ y in (let x′ be !x in !x ⊗ y) ≡ let y be !x ⊗ z in (let x′ be !x in !x ⊗ y)[!x/x′ ][z/y] ≡
let y be !x ⊗ z in (let !x be !x in !x ⊗ z) ≡ let y be !x ⊗ z in !x ⊗ z ≡ y.
The second judgemental equality follows from commuting conversions, Σ-C, !-U, and ⊗-U:
f [g/y] ≡ let (let y ′ be x′ ⊗ y in (let x′ be !x in !x ⊗ y)) be !x ⊗ z in !x ⊗ z ≡ let y ′ be x′ ⊗
y in let x′ be !x in let !x ⊗ y be !x ⊗ z in !x ⊗ z ≡ let y ′ be x′ ⊗ y in let x′ be !x in (!x ⊗ y) ≡
let y ′ be x′ ⊗ y in (let x′ be !x in !x) ⊗ y ≡ let y ′ be x′ ⊗ y in x′ ⊗ y ≡ y ′ .
In particular, we have the following stronger version of a special case.
Theorem 3 (! as ΣI). Suppose we have Σ- and I-types. Let ∆; ⋅ ⊢ A type. Then, Σ!x∶!A I satisfies the
rules for !A. Conversely, if we have !- and I-types, then !A satisfies the rules for Σ!x∶!A I.
Proof. We obtain the !-rule as follows.
I-I
∆; ⋅ ⊢ a ∶ A
∆, x ∶ A; ⋅ ⊢ ∗ ∶ I
Σ-I
∆; ⋅ ⊢!a ⊗ ∗ ∶ Σ!x∶!A I
We obtain the !-E rule as follows.
Lin-Var
∆, x ∶ A; Ξ′ ⊢ c ∶ C
∆; y ∶ I ⊢ y ∶ I
I-E
∆; Ξ ⊢ t ∶ Σ!x∶!A I
∆, x ∶ A; Ξ′ , y ∶ I ⊢ let y be ∗ in c ∶ C
Σ-E
∆; Ξ, Ξ′ ⊢ let t be !x ⊗ y in let y be ∗ in c ∶ C.
It is easily seen that Σ-C and I-C imply !-C (let !a ⊗ ∗ be !x ⊗ y in let y be ∗ in c ≡ (let y be ∗
in c)[a/x][∗/y] ≡ let ∗ be ∗ in c[a/x] ≡ c[a/x]) and that I-U and Σ-U (and commuting conversions) imply !-U (let t be !x⊗y in let y be ∗ in x⊗∗ ≡ let t be !x⊗y in !x⊗let y be ∗ in ∗ ≡ let t be !x⊗y in !x⊗y ≡ t).
The converse statement follows through a similarly trivial argument, noting that I[a/x] is isomorphic to
I.
A second interpretation is that Π and Σ generalise & and ⊕. Indeed, the idea is that (or their
infinitary equivalents) is what they reduce to when taken over discrete types. The subtlety in this result
will be the definition of a discrete type. The same phenomenon is observed in a different context in
section 4.
For our purposes, a discrete type is a strong sum of I (a sum with a dependent -E-rule). Let us for
simplicity limit ourselves to the binary case. For us, the discrete type with two elements will be 2 = I ⊕ I,
where ⊕ has a strong/dependent -E-rule (note that this is not our ⊕-E). Explicitly, 2 is a type with the
following rules:
∆; ⋅ ⊢ 2 type
2-F
∆, x ∶ 2; ⋅ ⊢ A type
∆; ⋅ ⊢ tt ∶ 2
∆; ⋅ ⊢ t ∶ 2
∆; Ξ ⊢ att ∶ A[tt/x]
2-I1
∆; ⋅ ⊢ ff ∶ 2
∆; Ξ ⊢ aff ∶ A[ff/x]
∆; Ξ ⊢ if t then att else aff ∶ A[t/x]
∆; Ξ ⊢ if tt then att else aff ∶ A[tt/x]
∆; Ξ ⊢ if tt then att else aff ≡ att ∶ A[tt/x]
2-E
∆; Ξ ⊢ if ff then att else aff ∶ A[ff/x]
2-C1
2-I2
∆; Ξ ⊢ if ff then att else aff ≡ aff ∶ A[ff/x]
2-C2
∆; Ξ ⊢ if t then tt else ff ∶ 2
2-U
∆; Ξ ⊢ if t then tt else ff ≡ t ∶ 2
Figure 8: Rules for a discrete type 2.
Theorem 4 (Π and Σ as Infinitary Non-Discrete & and ⊕). If we have a discrete type 2 and a type
family ∆, x ∶ 2; ⋅ ⊢ A, then
1. Π!x∶!2 A satisfies the rules for A[tt/x]&A[ff/x];
14
2. Σ!x∶!2 A satisfies the rules for A[tt/x] ⊕ A[ff/x].
Proof.
1. We obtain &-I as follows.
∆, x ∶ 2; Ξ ⊢ a ∶ A[tt/x]
Int-Var
∆, x ∶ 2; Ξ ⊢ b ∶ A[ff/x]
∆, x ∶ 2; ⋅ ⊢ x ∶ 2
∆, x ∶ 2; Ξ ⊢ if x then a else b ∶ A
Π-I
∆; Ξ ⊢ λ!x∶!2 if x then a else b ∶ Π!x∶!2 A
∆, x ∶ 2; ⋅ ⊢ A type
Assumption
2-E-dep
Moreover, we obtain &-E1 as follows (similarly, we obtain &-E2).
2-I1
∆; ⋅ ⊢ tt ∶ 2
∆; Ξ ⊢ t ∶ Π!x∶!2 A
Π-E
t(!tt)
The &-C-rules follow from Π-C and 2-C, e.g.
fst⟨a, b⟩ ∶≡ (λ!x∶!2 if x then a else b)(!tt) ≡ if tt then a else b ≡ a.
The &-U-rules follow from Π-U and 2-U (and commuting conversions):
⟨fst(t), snd(t)⟩ ∶≡ λ!x∶!2 if x then t(!tt) else t(!ff) ≡ λ!x∶!2 t(!x) ≡ t.
2. We obtain ⊕-I1 as follows (and similarly, we obtain ⊕-I2):
2-I1
∆; ⋅ ⊢ tt ∶ 2
∆; Ξ ⊢ a ∶ A[tt/x]
Σ-I
∆; Ξ ⊢ !tt ⊗ a ∶ Σ!x∶!2 A
Moreover, we obtain ⊕-E as follows.
∆; Ξ′ ⊢ t ∶ Σ!x∶!2 A
∆; Ξ, z ∶ A[tt/x] ⊢ c ∶ C
∆; Ξ, w ∶ A[ff/x] ⊢ d ∶ C
∆, x ∶ 2; Ξ, y ∶ A ⊢ c[y/z] ∶ C
∆, x ∶ 2; Ξ, y ∶ A ⊢ d[y/w] ∶ C
∆, x ∶ 2; ⋅ ⊢ x ∶ 2
∆, x ∶ 2; ⋅ ⊢ A type
∆, x ∶ 2; Ξ, y ∶ A ⊢ if x then c[y/z] else d[y/w] ∶ C
∆; Ξ, Ξ′ ⊢ let t be !x ⊗ y in if x then c[y/z] else d[y/w] ∶ C
Assump
2-E-dep
Σ-E
The ⊕-C-rules follow from Σ-C and 2-C, e.g.
case inl(a) of inl(z) → c∣∣ inr(w) → d ∶ ≡ let !tt ⊗ a be !x ⊗ y in if x then c[y/z] else d[y/w]
≡ if tt then c[a/z] else d[a/w]
= c[a/z].
The ⊕-U-rules follow from Σ-U and 2-U (and commuting conversions):
case t of inl(z) → inl(z)∣∣ inr(w) → inr(w) ∶ ≡ let t be !x ⊗ y in if x then inl(z)[y/z] else inr(w)[y/w]
≡ let t be !x ⊗ y in if x then !tt ⊗ z[y/z] else !ff ⊗ w[y/w]
≡ let t be !x ⊗ y in if x then !tt ⊗ y else !ff ⊗ y
≡ let t be !x ⊗ y in !(if x then tt else ff) ⊗ y
≡ let t be !x ⊗ y in !x ⊗ y
≡ t.
We see that we can view Π and Σ as generalisations of & and ⊕, respectively.
15
3
Semantics of ILDTT
The idea behind the categorical semantics we present for the structural core of our syntax (with I- and
⊗-types) will be to take our suggested categorical semantics for the structural core of DTT (with ⊺- and
∧-types) and relax the assumption of the Cartesian character of its fibres to them only being (possibly
non-Cartesian) symmetric. This entirely reflects the relation between the conventional semantics of nondependent intuitionistic and linear type systems. The structure we obtain is that of a strict indexed
symmetric monoidal6 category with comprehension.
The Σ- and Π-types arise as left and right adjoints of substitution functors along projections in
the base-category and the Id-types arise as left adjoints to substitution along diagonals, all satisfying
Beck-Chevalley (and Frobenius) conditions, as is the case in the semantics for DTT. The !-types boil
down to having a left adjoint to the comprehension (which can be made a functor), giving a linear-nonlinear adjunction as in the conventional semantics for linear logic. Finally, additive connectives arise as
compatible Cartesian and distributive co-Cartesian structures on the fibres, as would be expected from
the semantics of linear logic.
3.1
Tautological models of ILDTT
First, we translate the structural core of our syntax to the tautological notion of model. We will later
prove this to be equivalent to the more intuitive notion of categorical model we referred to above.
̃ of ILDTT, we shall mean
Definition (Tautological model of ILDTT). With a (tautological) model T
the following.
1. We have a set ICtxt, of which the elements will be interpreted as (dependent) contexts consisting
of intuitionistic types. Then, for all ∆ ∈ ICtxt, we have a set LType(∆) of linear types and a set
LCtxt(∆) of linear contexts (multisets of linear types) in the context ∆. For each ∆, Ξ ∈ LCtxt(∆),
and each A ∈ LType(∆), we have a set LTerm(∆, Ξ, A) of (linear) terms of A in context ∆; Ξ. On
all these sets, judgemental equality is interpreted by equality of elements, taking into account αconversion for terms. (The means that, if we construct a model from the syntax, we devide out
judgemental equality on the syntactic objects.) This takes care of the -Eq rules, the rules expressing
that judgemental equality is an equivalence relation, and the rules relating typing and judgemental
equality.
2. C-Emp says that ICtxt has a distinguished element ⋅ and that LType(⋅) has a distinguished element
⋅.
3. Int-C-Ext says that for all ∆ ∈ ICtxt and A ∈ LType(∆), we can form a context ∆.A ∈ ICtxt, and
that we have a function LCtxt(∆) Ð→ LCtxt(∆.A), introducing fake dependencies of the linear
types on A. Int-Exch says that for two types in the same context, the order in which we append
them to a context does not matter.
4. Lin-C-Ext says that for all Ξ ∈ LCtxt(∆) and A ∈ LType(∆), we can form a context Ξ.A ∈
LCtxt(∆). Lin-Exch says that the order in which we do this does not matter.
5. Int-Var says that for a context ∆.A.∆′ , we have a term der∆,A,∆′ ∈ LTerm(∆.A.∆′ , ⋅, A), that this is implicitly present in the syntax - acts as a diagonal morphism through the substitution
operations of Int-Ty-Subst and Int-Tm-Subst, equating the values of two variables of type A.
6. Lin-Var says that for a context ∆ and a type A ∈ LType(∆), we have a term idA ∈ LTerm(∆, A, A),
that - this is implicitly present in the syntax - acts as the identity for the substitution operation
of Lin-Tm-Subst.
7. Int-Weak says that we have functions (abusing notation) LType(∆.∆′ )
weak∆,A,∆′
weak∆,A,∆′
Ð→
LType(∆.A.∆′ )
Ð→
LTerm(∆.A.∆′ , Ξ, B). We think of this as projecting away a
and LTerm(∆.∆′ , Ξ, B)
variable x ∶ A to introduce a fake dependency.
6
As said before, we can easily obtain a sound and complete semantics for only the structural core, possibly without Iand ⊗-types, by considering strict indexed symmetric multicategories with comprehension.
16
8. Int-Ty-Subst says that for B ∈ LType(∆.A.∆′ ) and a ∈ LTerm(∆, ⋅, A), we have a context ∆.∆′ [a/x] ∈
ICtxt and a B[a/x] ∈ LType(∆.∆′ [a/x]).
9. Int-Tm-Subst says that for b ∈ LTerm(∆.A, ∆′ , Ξ, B) and a ∈ LTerm(∆, ⋅, A), we have b[a/x] ∈
LTerm(∆.∆′ [a/x], Ξ[a/x], B[a/x]).
10. Lin-Tm-Subst says that for b ∈ LTerm(∆, Ξ.A, B) and a ∈ LTerm(∆, Ξ′ , A), we have b[a/x] ∈
LTerm(∆, Ξ.Ξ′ , B).
For these last three substitution operations it is implicit in the syntax that they are associative.
Finally, the remarks in Int-Var and Int-Weak about diagonals and projections in formal terms mean
that the morphisms coming from these rules work together to form a generalised comonoid.
It is tautological that there is a one to one correspondence between theories T in ILDTT and models
̃ of this sort.
T
We now define what it means for the model to support various type formers.
̃ supports I-types, if for all ∆ ∈ ICtxt, we have
Definition (Semantic I- and ⊗-types). We say a model T
an I ∈ LType(∆) and ∗ ∈ LTerm(∆, ⋅, I) and whenever t ∈ LTerm(∆, Ξ, I) and a ∈ LTerm(∆, Ξ, A), we
have let t be ∗ in a ∈ LTerm(∆, Ξ.Ξ′ , A), such that let ∗ be ∗ in a = a and let t be ∗ in ∗ = t.
Similarly, we say it admits ⊗-types, if for all A, B ∈ LType(∆), we have a A ⊗ B ∈ LType(∆),
for all a ∈ LTerm(∆, Ξ, A), b ∈ LTerm(∆, Ξ′ , B), we have a ⊗ b ∈ LType(∆, Ξ.Ξ′ , A ⊗ B), and if t ∈
LTerm(∆, Ξ, A ⊗ B) and c ∈ LTerm(∆, Ξ′ .A.B, C), we have let t be x ⊗ y in c ∈ LTerm(∆, Ξ.Ξ′ , C), such
that let a ⊗ b be x ⊗ y in c = c and let t be x ⊗ y in x ⊗ y = t.
⊗
Note that this defines a function LCtxt(∆) Ð→ LType. The C-rule precisely says that from the
point of view of the (terms of the) type theory this map is an injection, while the U-rule says it is a
surjection7 . We conclude that in presence of I- and ⊗-types, we can faithfully describe the type theory
without mentioning linear contexts, replacing them by the linear type that is their ⊗-product.
We will henceforth assume that our type theory has I- and ⊗-types, as this simplifies the categorical
semantics8 and is appropriate for the examples we are interested in.
For the other type formers, one can give a similar, almost tautological, translation from the syntax
into a tautological model. We trust this to the reader when we discuss the semantic equivalent of various
type formers in the categorical semantics we present next.
3.2
Categorical Semantics of ILDTT
Strict Indexed Symmetric Monoidal Categories with Comprehension
We now introduce a notion of categorical model for which soundness and completeness results hold with
respect to the syntax of ILDTT in presence of I- and ⊗-types9 . This notion of model will prove to be
particularly useful when thinking about various (extensional) type formers.
Definition 1. By a strict indexed symmetric monoidal category with comprehension, we will mean the
following data.
1. A category C with a terminal object ⋅.
2. A strict indexed symmetric monoidal category L over C, i.e. a contravariant functor L into the
L
category SMCat of (small) symmetric monoidal categories and strong monoidal functors C op Ð→
SMCat. We will also write −{f } ∶= L(f ) for the action of L on a morphism f of C.
7
The precise statement that we are alluding to here would be that the multicategory of linear contexts is equivalent
to the (monoidal) multicategory of linear types. Really, ⊗ is only part of an equivalence of categories rather than an
isomorphism, i.e. it is injective on objects up to isomorphism rather than on the nose.
8
To be precise, it allows us to give a categorical semantics in terms of monoidal categories rather than multicategories.
9
In case we are interested in the case without I- and ⊗-types, the semantics easily generalises to strict indexed symmetric
multicategories with comprehension.
17
3. A comprehension schema, i.e. for each ∆ ∈ ob(C) and A ∈ ob(L(∆)) a representation for the
functor
x ↦ L(dom(x))(I, A{x}) ∶ (C/∆)op Ð→ Set.
p∆,A
We will write its representing object10 ∆.A Ð→ ∆ ∈ ob(C/∆) and universal element v∆,A ∈
L(∆.A)(I, A{p∆,A }). We will write a ↦ ⟨f, a⟩ for the isomorphism L(∆′ )(I, A{f }) ≅ C/∆(f, p∆,A ).
Again, the comprehension schema means that the morphisms in our category of contexts C, into a
context built by adjoining types, arise as lists of closed linear terms. Here, there is the crucial identification with intuitionistic terms of linear terms without linear assumptions: they can be freely copied and
discarded.
Remark 3. Note that this notion of model reduces to a standard notion of model for intuitionistic
dependent type theory in the case that the monoidal structures on the fibre categories are Cartesian:
a strict indexed Cartesian monoidal category with comprehension. Indeed, these are easily seen to be
equivalent to, for instance, the split comprehension categories of [6] with terminal object and Cartesian
products. However, it turns we have to impose the extra requirement of fullness on the comprehension
category to get an exact match with the syntax. The corresponding condition in our framework is to ask
for the comprehension functor to be full and faithful. See [6] for more discussion.
Theorem 5 (Comprehension functor). A comprehension schema (p, v) on a strict indexed symmetric
monoidal category (C, L) defines a morphism L Ð→ I of indexed categories, which lax-ly sends the
monoidal structure of L to products in I (where they exist), where I is the full subindexed11 category of
C/− on the objects of the form p∆,A .
M
Proof. First note that a morphism M of indexed symmetric monoidal categories consists of lax monoidal
functors in each context ∆ ∈ C such that
M∆
✲ I(∆)
L(∆)
L(f )
I(f ) = ”pullback along f ”
≅
❄
✲ I(∆′ ).
❄ M ′
∆
L(∆′ )
We define
M∆ (A Ð→ B) ∶= p∆,A
a
⟨p∆,A , a{p∆,A } ○ v∆,A ⟩
✲ p∆,B .
Functoriality follows from the uniqueness property of ⟨id∆ , a⟩.
We define the lax monoidal structure
mI∆
id∆
p∆,A ○ p∆.A,B{p∆,A} = M∆ (A) × M∆ (B)
✲ M∆ (I) = p∆,I
mA,B
∆✲
M∆ (A ⊗ B) = p∆,A⊗B ,
where mI∆ ∶= ⟨id∆ , idI ⟩ and mA,B
∶= ⟨p∆,A ○ p∆.A,B{p∆,A} , v∆,A {p∆.A,B{p∆,A} } ⊗ v∆.A,B{p∆,A } ⟩.
∆
Finally, we verify that I(f )M∆ = M∆′ L(f ). This follows directly from the fact that the following
square is a pullback square:
∆′ .A{f }
qf,A
✲ ∆.A
p∆,A
p∆′ ,A{f }
❄
∆′
10 Really,
f
p∆,M A
❄
✲ ∆,
∆.M A Ð→ ∆ would be a better notation, where we think of L ⊣ M as an adjunction inducing !, but it would
be very verbose.
11
Here, we use the axiom of choice to make a choice of pullback and make I really into an indexed category (or cloven
fibration). Alternatively, we can avoid the axiom of choice and treat it as a more general fibration.
18
where qf,A ∶= ⟨f p∆′ ,A{f } , v∆′ ,A{f } ⟩. We leave this verification to the reader as an exercise. Alternatively,
a proof for this fact in DTT, that will transfer to our setting in its entirety, can be found in [5].
Remark 4. Note that I is a display map category (or, less specifically, a full comprehension category).
Hence, it is a model of intuitionistic type theory. We will see that, in many ways, we can regard it as
the intuitionistic content of L.
Remark 5. We will see that this functor will give us a unique candidate for !-types: ! ∶= LM , where
L ⊣ M . We conclude that, in ILDTT, the !-modality is uniquely determined by the indexing. This is
worth noting, because, in propositional linear type theory, we might have many different candidates for
!-types.
Moreover, it explains why we don’t demand M to be fully faithful in the case of linear types. Indeed,
although we have a map L(∆)(A, B) Ð→ I(∆)(p∆,A , p∆,B ) ≅ L(∆.A)(I, B{p∆,A }), this is not generally
an isomorphism. In fact, in presence of !-types, we will see that the right hand side is precisely isomorphic
to L(∆)(!A, B) and the map is precomposition with dereliction.
M∆
Next, we prove that we have a sound interpretation of ILDTT in such categories.
Theorem 6 (Soundness). A strict indexed symmetric monoidal category with comprehension (C, L, p, v)
̃(C,L,p,v) of ILDTT with I- and ⊗-types.
defines a model T
Proof. We define
1. ICtxt ∶= ob(C)
LType(∆) ∶= ob(L(∆))
LCtxt(∆) ∶= free − comm. − monoid(LType(∆)) (where we will write 0 and + for the operations)
LTerm(∆, Ξ, A) ∶= L(∆)(⊗ Ξ, A)
2. C-Emp: ⋅ICtxt ∶= ⋅C and ⋅LCtxt(∆) ∶= 0LCtxt(∆) .
3. Int-C-Ext: ∆.ICtxt A ∶= ∆.C A and LType(∆) Ð→ LType(∆.A) ∶= −{p∆,A} inducing the obvious
function LCtxt(∆) Ð→ LCtxt(∆.A). We have seen how
∆.A.B{p∆,A }
qp∆,A ,B
✲ ∆.B
p∆.A,B{p∆,A }
p∆,B
❄
∆.A
p∆,A
❄
✲ ∆
is a product in C/∆ which interprets the double context extension ∆.A.B where A, B ∈ LType(∆).
Being a Cartesian monoidal structure, this is, in particular, symmetric, so validates Int-Exch.
4. Lin-C-Ext: Ξ.A ∶= Ξ + A
5. Int-Var: der∆,A,∆′ ∈ LTerm(∆.A.∆′ , ⋅, A) is defined as
v∆,A {p∆.A,∆′ } ∶ I Ð→ A{p∆,A ○ p∆.A,∆′ } ∈ L(∆.A.∆′ )
Note that der∆,A,∆′ defines a morphism
∆.A.∆′ Ð→ ∆.A.∆′ .A{p∆,A ○ p∆.A,∆′ } ∶= ⟨id∆.A.∆′ , der∆,A,∆′ ⟩.
We will later show that this in fact behaves as a diagonal morphism on A.
diag∆,A,∆′
6. idA ∈ LTerm(∆, A, A) is taken to be idA ∈ L(∆)(A, A). Note that this is indeed the neutral element
for our semantic linear term substitution operation that we will define shortly.
19
7. The required morphisms in Int-Weak are interpreted as follows. Suppose we are given A, ∆′ ∈
ob(L(∆)). We will define a functor
L(∆.∆′ {p∆,A })
L(⟨f, a⟩)
✲
L(∆.A.∆′ ),
where f and a are defined as follows.
f ∶= p∆,A ○ p∆.A,∆′ {p∆,A }
✲ ∆
∆.A.∆′ {p∆,A}
and
I
a = v∆,A.∆′ {p∆,A } ′
✲ ∆ {f } = ∆′ {p∆,A.∆′{p } } ∈ L(∆.A.∆′ {p∆,A }).
∆,A
8.&9. Int-Ty-Subst and Int-Tm-Subst, along a term ∆; ⋅ ⊢ a ∶ A, are interpreted by the functors L(⟨id∆ , a⟩) =
−{⟨id∆ , a⟩}. Indeed, let B ∈ L(∆.A.∆′ ) and a ∈ L(∆)(I, A). Then, we define the context ∆.∆′ [a/x]
as ∆.(∆′ {⟨id∆ , a⟩}) and the type B[a/x] as B{⟨f, a′ ⟩}, where
∆.∆′ {⟨id∆ , a⟩}.I
′
⟨f, a✲
⟩
∆.A.∆′
is defined from
∆.∆′ {⟨id∆ , a⟩}
p∆,∆′ {⟨id∆ ,a⟩}
✲ ∆
f
✲
⟨id∆ , a⟩
❄
∆.A
and
I
a′ ∶= v∆,∆′ {⟨id∆ ,a⟩} ′
✲ ∆ {f } = (∆′ {⟨id∆ , a⟩}){p∆,∆′{⟨id ,a⟩} }.
∆
10. Lin-Tm-Subst is interpreted by composition in L(∆). To be precise, given b ∈ L(∆)(⊗ Ξ ⊗ A, B)
and a ∈ L(∆)(⊗ Ξ′ , A), we define b[a/x] ∈ L(∆)(⊗ Ξ ⊗ ⊗ Ξ′ , B) as b ○ id⊗ Ξ ⊗ a.
Note that all our substitution rules are interpreted by functors and are therefore clearly associative.
The fact that Int-Var and Int-Weak define compatible (generalised) diagonals and projections is
reflected in the fact that diag and p obey generalised comonoid laws:
∆.A.∆′
diag∆,A,∆′
✲ ∆.A.∆′ .A{p∆,A.∆′ }
id
∆.
∆.A.∆′
A.
p∆.A.∆′,A{p∆,!A.∆′ }
∆′
✲ ❄
∆.A.∆′
diag∆,A,∆′
✲ ∆.A.∆′ .A{p∆,A.∆′ }
diag∆,A,∆′
❄
∆.A.∆′ .A{p∆,A.∆′ }
diag∆,A,∆′ .A{p∆,A.∆′ }
❄
✲ ∆.A.∆′ .A{p∆,A.∆′ }.A{p∆,A.∆′.A{p
},
∆,A.∆′ }
diag∆.A.∆′,A{p∆,A.∆′ },⋅
where we use p∆,A.∆′ as a shorthand notation for p∆,A ○ p∆.A,∆′ .
Finally, the model clearly supports I- and ⊗-types. We interpret I ∈ LType(∆) as the unit object in
L(∆) while its term ∗ is interpreted as the identity morphism. Similarly, we interpret ⊗ by the monoidal
product on the fibres: ∗ ∶= idI ∈ L(∆), let t be ∗ in a ∶= t ⊗ a, a ⊗ b is defined as the tensor product of
morphisms in L(∆), and let t be x ⊗ y in c ∶= c ○ (idΞ′ ⊗ t) (ignoring associatiators and unitors, here).
The C- and U-rules are immediate.
20
In fact, the converse is also true: we can build a category of this sort from the syntax of ILDTT.
̃ of ILDTT with I and ⊗-types defines a strict indexed
Theorem 7 (co-Soundness). A tautological model T
symmetric monoidal category with comprehension (C T , LT , pT , vT ).
Proof. The main technical difficulty in this proof will be that our category of contexts has context
morphisms as morphisms (corresponding to lists of terms of the type theory) while the type theory only
talks about individual terms. This exact difficulty is also encountered when proving completeness of the
categories with families semantics for ordinary DTT. It is sometimes fixed by (conservatively) extending
the the type theory to also talk about context morphisms explicitly. See e.g. [19].
1. We define ob(C T ) ∶= ICtxt, modulo α-equivalence, and write ∆.A ∶= ∆, x ∶ A. The designated
object will be ⋅ (from C-Emp), which will automatically become a terminal object because of our
definition of a morphism of C T (context morphism). Indeed, we define morphisms in C T , as follows,
by induction.
Start out defining C T (∆′ , ⋅) ∶= {⟨⟩} and for ∆ ∈ ICtxt that are not of the form ∆′′ .A, define
C T (∆′ , ∆) = {id∆ } if ∆′ = ∆ and C T (∆′ , ∆) = ∅ otherwise.
Then, by induction on the length n of ∆ = x1 ∶ A1 , . . . , xn ∶ An , we define
C T (∆′ , ∆.An+1 ) ∶= Σf ∈C T (∆′ ,∆) LTerm(∆′ , ⋅, An+1 [f /x]),
where An+1 [f /x] is defined, using Int-Ty-Subst, to be the (syntactic operation of) parallel substitution (see [5], section 2.4) of the list f1 , . . . , fn of linear terms ∆′ ; ⋅ ⊢ fi ∶ Ai [f1 /x1 , . . . , fi−1 /xi−1 ]
that f is made up out of, for the variables x1 , . . . , xn in ∆.
Note that, in particular, according to Int-Var, LTerm(A1 . . . . .An ., ⋅, Ai ) contains a term
derA1 .....Ai−1 ,Ai ,Ai+1 .....An , which allows us to define, inductively,
pA1 .....An ,⋅ ∶= ⟨⟩ ∈ C T (A1 . . . . .An , ⋅)
pA1 .....An ,A1 .....Ai ∶= pA1 .....An ,A1 .....Ai−1 , derA1 .....Ai−1 ,Ai ,Ai+1 .....An ∈ C T (A1 . . . . .An , A1 . . . . .Ai )
In particular, we define identities in C T from these: idA1 .....An ∶= pA1 .....An ,A1 .....An . We will also
use these ’projections’ in 3. to define the comprehension schema.
f =f1 ,...,fn
We define composition in C T by induction. Let B1 . . . . .Bm = ∆′
Ð→
∆ = A1 . . . . .An and
′′ g=g1 ,...,gm
′
∆
Ð→ ∆ . Then, we define, (f1 , . . . , fn−1 , fn ) ○ g ∶= (f1 , . . . , fn−1 ) ○ g, fn [g/x], where fn [g/x]
denotes the parallel substitution of g = g1 , . . . , gm for the free variables x1 , . . . , xm in fn , using IntTm-Subst. Note that associativity of composition comes from the associativity of substitution that
is implicit in the syntax while the identity morphism we defined clearly acts as a neutral element
for our composition.
2. Define ob(LT (∆)) ∶= LCtxt(∆) and LT (∆)(Ξ, Ξ′ ) ∶= LTerm(∆, Ξ, ⊗ Ξ′ ). Composition is defined
through Lin-Tm-Subst and ⊗-E. Identities are given by Lin-Var. The monoidal unit is given by
⋅ ∈ LCtxt(∆), while the monoidal product ⊗ on objects is given by context concatenation. The
monoidal product ⊗ on morphisms is given by ⊗-I. Note that the associators and unitors follow
from the associative and unital laws for the commutative monoid of contexts together with ⊗-C
and ⊗-U. (Note that the rules for ⊗ give us an isomorphism between an arbitrary context Ξ and
the one-type-context ⊗ Ξ, while the rules for I do the same for ⋅ and I.)
We define LT (f ) on objects by parallel substitution in each type in a linear context, via Int-TySubst, and on morphisms by parallel substitution, via Int-Tm-Subst. Note that functoriality is
given by implicit properties of the syntax like associativity of substitution. Note that this defines
a strong symmetric monoidal functor. We conclude that LT is a functor C Top Ð→ SMCat.
3. We define following comprehension schema on LT . Suppose ∆ ∈ C T and A ∈ LT (∆).
Define ∆.A Ð→ ∆ as p∆,A from 1. and I Ð→ A{p∆,A } (through Int-Var) as
derA ∈ LTerm(∆.A, ⋅, A) = LT (∆.A)(I, A{pT ∆,A }).
pT ∆,A
vT ∆,A
21
Suppose we are given ∆′ Ð→ ∆ and a ∈ LT (∆′ )(I, A{f }) = LTerm(∆′ , ⋅, A[f /c]). Then, by definition of the morphisms in C T , there is a unique morphism
⟨f, a⟩ ∶= f, a ∈ C T (∆′ , ∆.A) ∶= Σf ∈C T (∆′ ,∆) LTerm(∆′ , ⋅, A[f /x]) such that pT∆,A ○ ⟨f, a⟩ = f and
T
v∆,A
{⟨f, a⟩} = a. The uniqueness follows from the fact that pT∆,A ○ − and vT ∆,A {−} are the two
(dependent) projections of the Σ-type (in Set) that defines this homset.
f
Theorem 8 (Completeness). The construction described in ’co-Soundness’ followed by the one described
in ’Soundness’ is the identity (up to categorical equivalence12 ): i.e. strict indexed symmetric monoidal
categories with comprehension provide a complete semantics for ILDTT with I- and ⊗-types13 .
Proof. This is a trivial exercise.
Theorem 9 (Failure of co-Completeness). The construction described in ’Soundness’ followed by the
one described in ’co-Soundness’ is not equivalent to the identity: i.e. co-Completeness fails (as for the
categories with families semantics for DTT).
Proof. Indeed, if we start with a strict indexed symmetric monoidal category with comprehension, coñ and then construct its syntactic category, we effectively
struct the corresponding tautological model T
have thrown away all the non-trivial morphisms into objects that are not of the form ∆.A.
Of course, we can easily obtain a co-complete model theory by putting this extra restriction on our
models. Alternatively - this may be nicer from a categorical point of view -, we can take the obvious (see
e.g. [19]) conservative extension of our syntax by also talking about context morphisms (corresponding
to morphisms in our base category). In that case, we would obtain an actual internal language for strict
indexed symmetric monoidal categories with comprehension. This also has the advantage that we can
easily obtain an internal language for strict indexed monoidal categories by dropping the axioms Int-CExt, Int-C-Ext-Eq, and Int-Var, which correspond to the comprehension schema. We have not chosen
this route as it would mean that the syntax does not fit as well with what has been considered so far in
the syntactic tradition.
Corollary 1 (Relation with DTT and ILTT). A model (C, L, p, v) of ILDTT with I- and ⊗-types defines
a model I of DTT, that should be thought of the intuitionistic content of the linear type theory. This will
become even more clear through our treatment of !-types and in the examples we treat.
Moreover, it clearly defines a model of ILTT with I- and ⊗-types (i.e. a symmetric monoidal category)
in every context.
Conversely, it is easily seen that every syntactic model14 of DTT can be obtained this way, up to
equivalence, from a syntactic model of ILDTT (we take the same constants and axioms: effectively the
same theory but in a system without contraction and weakening) and that every model of ILTT can be
embedded in a model of ILDTT. (As we will see later, we can cofreely add type dependency on Set.)
Semantic Type Formers
Theorem 10 (Semantic type formers). For the other type formers, we have the following. A model of
ILDTT with I- and ⊗-types (a strict indexed symmetric monoidal category with comprehension)...
1. ...supports Σ-types iff all the pullback functors L(p∆,A ) have left adjoints Σ!A that satisfy the
12
The correct formal statement here would be that co-soundness followed by soundness (both of which define 2-functors
between the 2-category of tautological models of ILDTT and the 2-category of strict indexed symmetric monoidal categories
with comprehension) is 2-equivalent to the identity.
13 It is easy to see that, similarly, indexed symmetric multicategories with comprehension form a complete semantics for
ILDTT, possibly without I- and ⊗-types.
14
i.e. a model where we do not have any non-trivial morphisms into contexts that are not built from ⋅ by appending
types.
22
Beck-Chevalley condition1516 for pullback squares in C of the following form,17 .
∆′ .B{f }
qf,B
✲ ∆.B
(∗)
p∆′ ,B{f }
❄
∆′
f
p∆,B
❄
✲ ∆,
and that satisfy Frobenius reciprocity18 in the sense that the canonical morphism
Σ!A (Ξ′ {p∆,A} ⊗ B) Ð→ Ξ′ ⊗ Σ!A B
is an isomorphism , for all Ξ′ ∈ L(∆), B ∈ L(∆.A) .
2. ...supports Π-types iff all the pullback functors L(p∆,A ) have right adjoints Π!A that satisfy the
dual Beck-Chevalley condition for pullbacks of the form (∗).
3. ...supports ⊸-types iff L factors over SMCCat.
4. ...supports ⊺-types and &-types iff L factors over the category SMCCat of Cartesian categories with
a symmetric monoidal structure and their homomorphisms.
5. ...supports 0-types and ⊕-types iff L factors over the category dSMcCCat of co-Cartesian categories
with a distributive19 symmetric monoidal structure and their homomorphisms.
M∆
6. ...that supports ⊸-types20 , supports !-types iff all the comprehension functors L(∆) Ð→ I(∆)
L∆
have a left adjoint I(∆) Ð→ L(∆) in the 2-category SMCat of symmetric monoidal categories,
lax symmetric monoidal functors, and monoidal natural transformations21 and (compatibility with
15
Remember that the Beck-Chevalley condition for a pullback square
A
h
✲
f
B
k
❄
C
✲
g
❄
D
corresponds to the statement that the obvious morphism (from commuting of pullback square, unit, and counit) f! h∗ Ð→
≅
f! h∗ k ∗ k! Ð→ f! f ∗ g ∗ k! Ð→ g ∗ k! is an isomorphism, where we write f ∗ for L(f ) and f! for its left adjoint. In case f ∗
has a right adjoint (as for the Π-type), f∗ , we mean by the dual Beck-Chevalley condition that the obvious morphism
≅
g ∗ k∗ Ð→ g ∗ k∗ h∗ h∗ Ð→ g ∗ g∗ f∗ h∗ Ð→ f∗ h∗ is an iso.
16
The reader is encouraged to think of this condition as the equivalent for Σ- and Π-types of the condition on the
subtitution functors preserving the appropriate categorical structure for other type formers. It says that, in a sense, Σand Π-types are preserved under substitution.
17
Recall that qf,B ∶= ⟨f ○ p∆′ ,B{f } , v∆′ ,B{f } ⟩ and that this square is indeed a pullback.
18
Frobenius reciprocity expresses compatibility of Σ and ⊗, which is reasonable if we want a reading of Σ as a generalisation of ⊗. If one wants to drop Frobenius reciprocity in the semantics, it is easy to see that the equivalent in the syntax
is setting Ξ′ ≡ ⋅ in the Σ-E-rule.
19
Note that in the light of theorem 4, the demand of distributivity here is essentially the same phenomenon as the
demand of Frobenius reciprocity for Σ-types.
20 Actually, we only need this for the ’if’. The ’only if’ always holds. To make the ’if’ work, as well, in absence of ⊸-types,
we have to restrict !-E to the case where Ξ′ ≡ ⋅.
21
i.e. a symmetric lax monoidal left adjoint functor L∆ such that an inverse for its lax structure is given by the oplax
structure on L∆ coming from the lax structure on M∆ . Put differently, L∆ is a left adjoint functor to M∆ and is a strong
monoidal functor in a way that is compatible with the lax structure on M∆ .
23
f
substitution) for all ∆′ Ð→ ∆ ∈ C which makes L− into a morphism of indexed categories.:
L(f )
L(∆)
✻
✲ L(∆′ )
✻
L∆′
L∆
I(∆)
✲ I(∆′ ).
I(f ) = f ∗ (=pullback along f )
Then the linear exponential comonad !∆ ∶= L∆ ○ M∆ ∶ L(∆) Ð→ L(∆) will be our interpretation of
the comodality ! in the context ∆.
7. ... that supports ⊸-types, supports Id-types iff for all A ∈ ob L(∆), we have left adjoints Id!A ⊣
−{diag∆,A } that satisfy a Beck-Chevalley condition: Id!A{f } ○ L(qf,A ) Ð→ L(qqf,A ,A{p∆,A } ) ○ Id!A
is an iso.
diag∆,A ∶= ⟨id∆.A , v∆,A ⟩
✲ ∆.A.A{p∆,A }.
Here, ∆.A
Proof.
1. Assume our model supports Σ-types. We will show the claimed adjunction. The morphism
from left to right is provided by Σ-I. The morphism from right to left is provided by Σ-E. Σ-C and
Σ-U say exactly that these are mutually inverse. Naturality corresponds to the compatibility of
Σ-I and Σ-E with substitution.
c′
✲ c′ {p∆,A } ○ ⟨diag∆,A,⋅ , idB ⟩
L(∆)(Σ!A B, C) ✛≅
✲
L(∆.A)(B, C{p∆,A })
let z be !x ⊗ y in c ✛
c
We show how the morphism from left to right arises from Σ-I.
Int-Var
Lin-Var
∆; z ∶ Σ!x∶!A B ⊢ c′ ∶ C
∆, x ∶ A; ⋅ ⊢ x ∶ A
∆, x ∶ A; w ∶ B ⊢ w ∶ B
Int-Weak
Σ-I
∆, x ∶ A; z ∶ Σ!x∶!A B ⊢ c′ ∶ C
∆, x ∶ A; w ∶ B ⊢!x ⊗ w ∶ Σ!x∶!A B
Lin-Tm-Subst
∆, x ∶ A; w ∶ B ⊢ c′ [!x ⊗ w/z] ∶ C
We show how the morphism from right to left is exactly Σ-E (with Ξ′ ≡ ⋅, Ξ ≡ z ∶ Σ!x∶!A B, t ≡ z).
Lin-Var
∆; z ∶ Σ!x∶!A B ⊢ z ∶ Σ!x∶!A B
∆, x ∶ A; y ∶ B ⊢ c ∶ C
Σ-E
∆; z ∶ Σ!x∶!A B ⊢ let z be !x ⊗ y in c ∶ C
We show how Frobenius reciprocity can be proved in our type system (particularly relying on
the form of the Σ-E-rule22 ).
∆; ⋅ ⊢ C type
Lemma 1 (Frobenius reciprocity). The canonical morphism
Σ!A (Ξ′ {p∆,A} ⊗ B) Ð→ Ξ′ ⊗ Σ!A B
f
is an isomorphism, for all Ξ′ ∈ L(∆), B ∈ L(∆.A).
Proof. We first show how to construct the morphism f we mean.
22
To be precise, we will see Frobenius reciprocity is validated because we allow dependency on Ξ′ in the Σ-E-rule.
Conversely, it is easy to see we can prove Frobenius reciprocity holds in our model if we have (semantic) ⊸-types, as this
allows us to remove the dependency on Ξ′ in Σ-E.
24
∆, x ∶ A; z ∶ Ξ′ ⊢ z ∶ Ξ′
∆; x′ ∶ Σ!x∶!A (Ξ′ ⊗ B) ⊢ x′ ∶ Σ!x∶!A (Ξ′ ⊗ B)
Lin-Var
∆, x ∶ A; ⋅ ⊢ x ∶ A
Int-Var
∆; y ∶ B ⊢ y ∶ B
∆, x ∶ A; y ∶ B ⊢!x ⊗ y ∶ Σ!x∶!A B
∆, x ∶ A; z ∶ Ξ′ , y ∶ B ⊢ z⊗!x ⊗ y ∶ Ξ′ ⊗ Σ!x∶!A B
Lin-Var
Lin-Var
Σ-I
⊗-I
⊗-E
∆, x ∶ A; w ∶ Ξ′ ⊗ B ⊢ let w be z ⊗ y in z⊗!x ⊗ y ∶ Ξ′ ⊗ Σ!x∶!A B
Σ-E
∆; x′ ∶ Σ!x∶!A (Ξ′ ⊗ B) ⊢ f ∶ Ξ′ ⊗ Σ!x∶!A B
We now construct its inverse. Call it g.
∆; y1 ∶ Ξ′ ⊢ y1 ∶ Ξ′
Lin-Var
Lin-Var
∆; y ∶ B ⊢ y ∶ B
⊗-I
Int-Var
∆, x ∶ A; y1 ∶ Ξ′ , y ∶ B ⊢ y1 ⊗ y ∶ Ξ′ ⊗ B
∆, x ∶ A; ⋅ ⊢ x ∶ A
Lin-Var
∆, x ∶ A; y1 ∶ Ξ′ , y ∶ B ⊢!x ⊗ y1 ⊗ y ∶ Σ!x∶!A (Ξ′ ⊗ B)
∆; y2 ∶ Σ!x∶!A B ⊢ y2 ∶ Σ!x∶!A B
Σ-E
∆; y1 ∶ Ξ′ , y2 ∶ Σ!x∶!A B ⊢ let y2 be !x ⊗ y in !x ⊗ y1 ⊗ y ∶ Σ!x∶!A (Ξ′ ⊗ B)
⊗-E
′
′
′
∆; y ∶ Ξ ⊗ Σ!x∶!A B ⊢ g ∶ Σ!x∶!A (Ξ ⊗ B)
Σ-I
23
We leave it to the reader to verify that these morphisms are mutually inverse in the sense that
∆; x′ ∶ Σ!x∶!A (Ξ′ ⊗B) ⊢ g[f /y ′ ] ≡ x′ ∶ Σ!x∶!A (Ξ′ ⊗B) and ∆; y ′ ∶ Ξ′ ⊗Σ!x∶!A B ⊢ f [g/x′ ] ≡ y ′ ∶ ⊗Σ!x∶!A B.
For the converse, we show how to obtain Σ-I from our morphism from left to right:
Lin-Var
∆; z ∶ Σ!x∶!AB ⊢ z ∶ Σ!x∶!A B
”left to right”
∆, x ∶ A; w ∶ B ⊢!x ⊗ w ∶ Σ!x∶!A B
∆; w ∶ B ⊢!a ⊗ w ∶ Σ!x∶!A B
∆; ⋅ ⊢ a ∶ A
Int-Tm-Subst
∆; Ξ ⊢!a ⊗ b ∶ Σ!x∶!A B
∆; Ξ ⊢ b ∶ B[a/x]
Lin-Tm-Subst
We show how to obtain Σ-E from our morphism from right to left, using Frobenius reciprocity. In
particular, note that we don’t need Frobius reciprocity.
∆, x ∶ A; y ∶ Ξ′ , B ⊢ c ∶ C
∆; ⋅ ⊢ C type
∆, x ∶ A; y ∶ Ξ′ ⊗ B ⊢ c ∶ C
∆; z ∶ Σ!x∶!A (Ξ′ ⊗ B) ⊢ let z be !x ⊗ y in c ∶ C
∆; z ∶ (Ξ′ ⊗ Σ!x∶!A B) ⊢ let z be !x ⊗ y in c ∶ C
⊗-E
”right to left”
Frobenius reciprocity
∆; z1 ∶ Ξ′ , z2 ∶ Σ!x∶!A B ⊢ let z1 ⊗ z2 be !x ⊗ y in c ∶ C
Lin-Tm-Subst,⊗-I,2×Lin-Var
∆; Ξ ⊢ t ∶ Σ!x∶!A B
∆; z1 ∶ Ξ′ , Ξ ⊢ (let z1 ⊗ z2 be !x ⊗ y in c)[t/z2 ] ∶ C
Lin-Tm-Subst
As usual, the Beck-Chevalley condition says precisely that Σ-types commute with substitution,
as dictated by the type theory.
2. Assume our model supports Π-types. We will show the claimed adjunction. The morphism from
left to right is provided by Π-I - in fact, it is exactly the I-rule - and the one from right to left
by Π-E. Π-C and Π-U say exactly that these are mutually inverse. Naturality corresponds to the
compatibility of Π-I and Π-E with substitution.
✲ λ!x∶!A b
b
✲
L(∆.A)(Ξ{p∆.A }, B) ✛
≅ L(∆)(Ξ, Π!x∶!A B)
f (!x) ✛
f.
We show how we obtain the definition of f (!x) from Π-E.
∆, x ∶ A; ⋅ ⊢ x ∶ A
∆; Ξ ⊢ f ∶ Π!x∶!A B
Int-Weak
∆, x ∶ A; Ξ ⊢ f ∶ (Π!x∶!A B)
Π-E
∆, x ∶ A; Ξ ⊢ f (!x) ∶ B
Int-Var
For the converse, we have to show that we can recover Π-E from the definition of f (!x).
23
At the use of Σ-E, is really where the Frobenius reciprocity comes in, because of the factor Ξ′ in the Σ-E-rule.
25
∆; Ξ ⊢ f ∶ Π!x∶!A B
Definition f (x)
∆; ⋅ ⊢ a ∶ A
∆, x ∶ A; Ξ ⊢ f (!x) ∶ B
Int-Tm-Subst
∆; Ξ ⊢ f (!x)[a/x] ∶ B[a/x]
∆; Ξ ⊢ f (!a) ∶ B[a/x]
This shows that individual Π-types correspond to right adjoint functors to substitution along projections. The type theory dictates that Π-types interact well with substitution. This corresponds
to the dual Beck-Chevalley condition, as usual.
3. From the categorical semantics of (non-dependent) linear type theory (see e.g. [20] for a very complete account) we know that ⊸-types correspond to monoidal closure of the category of contexts.
The extra feature in dependent linear type theory is that the syntax dictates that the type formers
are compatible with substitution. This means that we also have to restrict the functors L(f ) to
preserve the relevant categorical structure.
4. Idem.
5. Idem.
6. Assume that we have !-types. We will define a left adjoint L∆ ⊣ M∆ as L∆ p∆,A ∶=!A (this is
easily seen to be well-defined up to isomorphism, so we can use AC for a definition on the nose)
and, noting that every morphism p∆,A Ð→ p∆,B in C/∆ is of the form ⟨p∆,A , b⟩ for some unique
I Ð→ B{p∆,A } ∈ L(∆.A), we define L∆ as acting on b as the map obtained from
∆, x ∶ A; ⋅ ⊢ b ∶ B
Lin-Var
!-I
∆; y ∶!A ⊢ y ∶!a
∆, x ∶ A; ⋅ ⊢!b ∶!B
!-E
∆; y ∶!A ⊢ let y be !x in !b ∶!B
which indeed gives us L∆ (⟨p∆,A , b⟩) ∈ L(∆)(!A, !B). Note that L∆ is strong monoidal, as the rules
for ! define a natural bijection between terms ∆, x ∶ A, y ∶ B; ⋅ ⊢ t ∶ C and ∆; x′ ∶!A, y ′ ∶!B ⊢ t′ ∶ C.
In terms of the model, this gives a natural bijection L(∆)(L∆ (M∆ A × M∆B), C) ≅ L(∆)(!D, C) ≅
L(∆.D)(I, C) ≅ L(∆.A.B)(I, C) ≅ L(∆)(!A⊗!B, C), where we write D for an object such that
M∆ D = M∆ A × M∆ B (which exists if the product exists), so strong monoidality follows by the
Yoneda lemma. (A keen reader can verify that the oplax structure on L∆ corresponds with the lax
structure on M∆ .)
b
We exhibit the adjunction by the following isomorphism of hom-sets, where the morphism from
left to right comes from !-I and the one from right to left comes from !-E.
✲ b[!x/x′ ]
b
✲
L(∆)(L∆ p∆,A , B) = L(∆)(!A, B) ✛
≅ L(∆.A)(I, B{p∆,A }) ≅ C/∆(p∆,A , p∆,B ) = I(∆)(p∆,A , M∆ B)
let y be !x in b′
✛
b′
We show how to construct the morphism from left to right, using !-I.
Int-Var
∆; x′ ∶!A ⊢ b ∶ B
∆, x ∶ A; ⋅ ⊢ x ∶ A
Int-Weak
!-I
′
∆, x ∶ A; x ∶!A ⊢ b ∶ B
∆, x ∶ A; ⋅ ⊢!x ∶!A
Lin-Tm-Subst
∆, x ∶ A; ⋅ ⊢ b[!x/x′ ] ∶ B
We show to construct the morphism from right to left, using !-E. Suppose we’re given b′ ∈
L(∆.A)(I, B{p∆,A }). From this, we produce a morphism in L(∆)(!A, B) as follows.
Lin-Var
∆; y ∶!A ⊢ y ∶!A
∆, x ∶ A; ⋅ ⊢ b′ ∶ B
!E
∆; y ∶!A ⊢ let y be !x in b′ ∶ B
We leave it up to the reader to verify that these morphisms are mutually inverse, according to
!-C and !-U.
Conversely, suppose we have a strong monoidal left adjoint L∆ ⊣ M∆ . We define, for A ∈ ob(L(∆)),
!A ∶= L∆ M∆ (A).
26
We verify that !-I can be derived from the homset morphism from left to right:
Lin-Var
∆; x′ ∶!A ⊢ x′ ∶!A
”left to right”
∆, x ∶ A; ⋅ ⊢!x ∶!A
∆; ⋅ ⊢!x[a/x] ∶!A
∆; ⋅ ⊢ a ∶ A
Int-Tm-Subst
We verify that, in presence of ⊸-types, !-E can be derived from the homset morphism from right
to left:
∆; w ∶ Ξ′ ⊢ w ∶ Ξ′
∆, x ∶ A; y ∶ Ξ′ ⊢ b ∶ B
⊸-I
∆, x ∶ A; ⋅ ⊢ λy∶Ξ′ b ∶ Ξ′ ⊸ B
Lin-Var
∆; z ∶!A, Ξ′ ⊢ let z be !x in b[w/y] ∶ B
∆; Ξ ⊢ t ∶!A
”right to left”
∆; z ∶!A ⊢ let z be !x in λy∶Ξ′ b ∶ Ξ′ ⊸ B
∆; Ξ, Ξ′ ⊢ let t be !x in b[w/y] ∶ B
⊸-E
Lin-Tm-Subst
Note that the !-C- and !-U-rules correspond precisely to the fact that our morphisms from left
to right and from right to left define a homset isomorphism.
Finally, it is easily verified that the condition that L(f ) ○ L∆ ≅ L∆′ ○ L(f ) corresponds exactly
to the compatibility of ! with substitution.
7. Suppose we have Id!A ⊣ −{diag∆,A }, i.e. we have a (natural) homset isomorphism
✲
L(∆.A.A{p∆,A })(Id!A (B), C) ✛
≅ L(∆.A)(B, C{diag∆,A }).
The claim is that Id!A (I) satisfies the rules for the Id-type of A (or maybe it would be more appropriate to say of !A). Indeed, we have Id-I as follows.
∆, x ∶ A, x′ ∶ A; w ∶ Id!A (I)(x, x′ ) ⊢ w ∶ Id!A (I)(x, x′ )
∆, x ∶ A; y ∶ I ⊢
refly
!x
∶ Id!A (I)(x, x)
Int-Tm-Subst
Lin-Var
”left to right”
I-I
∆, x ∶ A; ⋅ ⊢ ∗ ∶ I
Lin-Tm-Subst
∆, x ∶ A; ⋅ ⊢ refl!x ∶ Id!A (I)(x, x)
∆; ⋅ ⊢ a ∶ A
∆; ⋅ ⊢ refl!x ∶ Id!A (I)(a, a)
We obtain Id-E as follows. Let ∆, x ∶ A, x′ ∶ A; ⋅ ⊢ C type.
∆, x ∶ A; B ⊢ c ∶ C[x/x′ ]
∆, x ∶ A, x′ ∶ A; Id!A (B) ⊢ c′ ∶ C
Lin-Tm-Subst
”right to left”
∆; ⋅ ⊢ a′ ∶ A
∆; ⋅ ⊢ a ∶ A
Int-Tm-Subst
∆; Id!A (B)[a/x, a′ /x′ ] ⊢ c′ [a/x, a′ /x′ ] ∶ C[a/x, a′ /x′ ]
(*)
∆; B ′ ⊢ p ∶ Id!A (I)[a/x, a′ /x′ ]
∆; B[a/x], B ′ ⊢ p′ ∶ Id!A (B)[a/x, a′ /x′ ]
∆; B[a/x], B ′ ⊢ let (a, a′ , p) be (z, z, refl !z ) in c ∶ C[a/x, a′ /x]
Here, (∗) is a slightly non-trivial step that follows immediately when we note that Id!A (B) ≅
Id!A (I) ⊗ B{p∆,A } (by tensoring with idB ). Indeed,
L(∆.A.A{p∆,A })(Id!A (B), C) ≅ L(∆.A)(B, C{diag∆,A })
≅ L(∆.A)(I, (B{p∆,A } ⊸ C){diag∆,A })
≅ L(∆.A.A{p∆,A })(Id!A (I), B{p∆,A } ⊸ C)
≅ L(∆.A.A{p∆,A })(Id!A (I) ⊗ B{p∆,A }, C).
Since all these isomorphisms are natural in C, the Yoneda lemma says that Id!A (B) ≅ Id!A (I) ⊗
B{p∆,A }.
Conversely, suppose we have Id-types. Then, define Id!A (B) ∶= Id!A ⊗ B{p∆,A }, with the obvious extension on morphisms. Then, we obtain the morphism ”left to right” as follows.
∆, x ∶ A, x′ ∶ A; z ∶ Id!A , y ∶ B ⊢ c ∶ C
′
∆, x ∶ A; ⋅ ⊢ x ∶ A
′
′
∆, x ∶ A; z ∶ Id!A [x/x ], y ∶ B ⊢ c[x/x ] ∶ C[x/x ]
Int-Var
Int-Tm-Subst
∆, x ∶ A; y ∶ B ⊢ c′ ∶ C[x/x′ ]
Int-Var
Id-I
∶ Id!A (x, x)
Lin-Tm-Subst
∆, x ∶ A; ⋅ ⊢ x ∶ A
∆, x ∶ A; ⋅ ⊢ refl!x
The morphism ”right to left” is obtained as follows.
∆, x0 ∶ A; y ∶ B ⊢ c ∶ C[x0 /x1 ]
Lin-Var
∆, x0 ∶ A, x1 ∶ A; w ∶ Id!A ⊢ w ∶ Id!A
∆, x0 ∶ A, x1 ∶ A; w ∶ Id!A , y ∶ B ⊢ c′ ∶ C
27
∆, x0 ∶ A, x1 ∶ A; ⋅ ⊢ xi ∶ A
Int-Var
Id-E
We leave it to the reader to verify that the Id-C- and Id-U-rules translate precisely into the ”right
to left” and ”left to right” morphisms being inverse.
The semantics of ! suggests an alternative definition for the notion of a comprehension: if we Σ-types
in a strong sense, it is a derived notion!
Theorem 11 (Lawvere Comprehension). Given a strict indexed monoidal category (C, L) with left ad-
joints ΣLf to L(f ) for arbitrary ∆′ Ð→ ∆ ∈ C, then we can define C/∆ Ð→ L(∆) by
f
L∆
L∆ (−) ∶= ΣL− I.
In that case, (C, L) has a comprehension schema iff L∆ has a right adjoint M∆ (which then automatically
satisfies M∆′ ○ L(f ) = L(f ) ○ M∆ for all ∆′ Ð→ ∆ ∈ C). That is, our notion of comprehension generalises
that of [21].
Finally, if ΣLf are demanded to satisfy the Beck-Chevalley condition and Frobenius reciprocity, then
(C, L) satisfies the comprehension schema iff it admits !-types.
f
Proof. Suppose that we have said right adjoints M∆ . We will construct a comprehension schema.
We define p∆,A ∶= M∆ (A) and
≅
≅
L(∆′ )(I, A{f }) ✲ L(∆)(ΣLf I∆′ , A) = L(∆)(L∆ f, A) ✲ C/∆(f, M∆ A)
✲ ⟨f, a⟩,
✲ af
a
where the first natural isomorphism comes from the adjunction ΣLf ⊣ −{f } and the second one comes
from the adjunction L∆ ⊣ M∆ . Note that, by definition, p∆,A ⟨f, a⟩ = f .
In particular, we obtain a unique v∆,A ∈ L(∆.A)(I, A{p∆,A }) inducing idM∆ as ⟨p∆,A , v∆,A ⟩. Finally, the Yoneda lemma (i.e. naturality of these isomorphisms) says that v∆,A {⟨f, a⟩} = a.
Conversely, suppose we’re given a comprehension schema. Then, we know, by theorem 5, that we
can define a comprehension functor M∆ such that M∆′ ○ L(f ) = L(f ) ○ M∆ . Then we have the following:
≅
≅
C/∆(f, M∆ A) ✲ L(∆′ )(I, A{f }) ✲ L(∆)(ΣLf I∆′ , A) = L(∆)(L∆ f, A)
⟨f, a⟩
✲ a
✲ af ,
where the first isomorphism is precisely the representation defined by our comprehension and the second
isomorphism comes from the fact that ΣLf ⊣ −{f }.
Finally, the following calculation shows that it follows from Frobenius reciprocity and Beck-Chevalley
that L∆ is strong monoidal:
L∆ (f ) ⊗ L∆ (g) = (ΣLf Idomf ) ⊗ (ΣLg Idomg )
= ΣLg ((ΣLf Idomf ){g} ⊗ Idomg ) (Frobenius reciprocity)
= ΣLg ((ΣLf Idomf ){g})
= ΣLg ΣLf ∗ g Idomf {g ∗ f } (Beck-Chevalley)
= ΣLg ΣLf ∗ g Idomf ×g
= ΣL(f ×g) Idomf ×g
= L∆ (f × g).
Theorem 12 (Type Formers in I). I supports Σ-types iff ob(I) is closed under compositions (as
morphisms in C). It supports Id-types iff ob(I) is closed under post-composition with maps diag∆,A . If
L supports !- and Π-types, then I supports Π-types. Moreover, we have that
Σ!A !B ≅ L(ΣMA M B)
Id!A (!B) ≅ LIdMA (M B)
28
M Π!B C ≅ ΠMB M C.
Proof. We write out the adjointness condition
I(∆)(Σp∆,B f, p∆,D ) ≅ I(∆.B)(f, p∆,D {p∆,B })
!
≅ I(∆.B)(f, p∆,D{p∆,B } )
≅ L(∆.B.C)(I, D{p∆,B }{f })
≅ L(∆.B.C)(I, D{p∆,B ○ f })
≅ I(∆)(p∆,B ○ f, p∆,D ).
Now, the Yoneda lemma gives us that Σp∆,B f = p∆,B ○ f .
Similarly,
I(∆.A.A)(Idp∆,A (f ), p∆.A.A,C ) ≅ I(∆.A)(f, p∆.A.A,C {diag∆,A })
!
≅ L(∆.A.B)(I, C{diag∆,A }{f })
≅ L(∆.A.B)(I, C{diag∆,A ○ f })
≅ I(∆.A.A)(diag∆,A ○ f, p∆.A.A,C ),
so diag∆,A ○ f models Idp∆,A (f ).
Finally,
I(∆)(M∆ D, Πp∆,B p∆.B,C ) ≅ I(∆.B)((M∆ D){p∆,B }, p∆.B,C )
!
≅ I(∆.B)((M∆ D){p∆,B }, M∆.B C)
≅ L(∆.B)(L∆.B ((M∆ D){p∆,B }), C)
≅ L(∆.B)((L∆ M∆ D){p∆,B }, C)
≅ L(∆)(L∆ M∆ D, Π!B C)
≅ I(∆)(M∆ D, M∆ Π!B C)
Again, using the Yoneda lemma, we conclude that M∆ Π!B C models ΠM∆ B M∆.B C.
In all cases, we have not worried about Beck-Chevalley (and Frobenius reciprocity for Σ-types) as they
are trivially seen to hold.
Note that if L has !- and Σ-types, then
L(∆)(L∆ (ΣM∆ A M∆.A B), C) ≅ I(∆)(ΣM∆ A M∆.A B, M∆ C)
≅ I(∆.A)(M∆.A B, (M∆ C){p∆,A })
≅ I(∆.A)(M∆.A B, M∆ (C{p∆,A }))
≅ L(∆.A)(!B, C{p∆,A })
≅ L(∆)(Σ!A !B, C).
By the Yoneda lemma, conclude that Σ!A !B ≅ L∆ (ΣM∆ A M∆.A B).
Note that, in case L admits !- and Id-types,
L(∆.A.A)(Id!A (!B), C) ≅ L(∆.A)(!B, C{diag ∆,A })
≅ I(∆.A)(M∆.A B, M∆.A (C{diag∆,A }))
≅ I(∆.A)(M∆.A B, M∆.A.A (C){diag∆,A })
≅ I(∆.A.A)(diag ∆,A ○ M∆.A B, M∆.A (C))
≅ I(∆.A.A)(IdM∆ A (M∆.A B), M∆.A (C))
≅ L(∆.A.A)(L∆.A.A IdM∆ A (M∆.A B), C).
29
We conclude that Id!A (!B) = L∆.A.A IdM∆ A (M∆.A B) and in particular Id!A (I) ≅ L∆.A.AIdM∆ A (id∆.A ).
The last statement is easily seen to also be valid in absence of ⊺-types.
Remark 6 (Dependent Seely Isomorphisms?). Note that, in our setup, we have a version of the normal
Seely isomorphisms in each fibre. Indeed, suppose L supports ⊺-, &, and !-types. Then, M∆ (⊺) = id∆
and M∆ (A&B) = M∆ (A) × M∆ (B), as M∆ has a left adjoint and therefore preserves products. Now,
L∆ is strong monoidal and !∆ = L∆ M∆ , so it follows that !∆ ⊺ = I and !∆ (A&B) =!∆ A⊗!∆ B.
Now, theorem 12 suggests the possibility of similar Seely isomorphisms on us for Σ-types and Idtypes. Indeed, I supports Σ-types iff we have additive Σ-types in L in the sense of objects Σ&
A B such
that
&
⊗
M Σ&
A B ≅ ΣMA M B and hence !ΣA B ≅ Σ!A !B,
where we suggestively write Σ⊗ for the usual multiplicative Σ-type in L. In an ideal world, one would
hope that Σ&
A B generalise A&B in the same way that Σ!A B is a dependent generalisation of !A ⊗ B.
Similarly, we get a notion of additive Id-types: I supports Id-types iff we have objects Id&
A (B) in L
such that
&
⊗
M Id&
A (B) ≅ IdMA (M B) and hence !IdA (B) ≅ Id!A (!B),
writing Id⊗ for the usual (multiplicative) Id-type in L. Note that this suggests that, in the same way
⊗
&
that Id⊗
!A (B) ≅ Id!A (I) ⊗ B (a sense in which usual Id-types are multiplicative connectives), IdA (B) ≅
&
&
IdA (⊺)&B. In fact, if we have ⊺- and &-types, we only have to give IdA (⊺) and can then define
&
Id&
A (B) ∶= IdA (⊺)&B to obtain additive Id-types in generality.
A fortiori, if some M∆ is essentially surjective, we obtain such additive Σ- and Id-types in the fibre
over ∆. In particular, we are in this situation if L⋅ ⊣ M⋅ is the usual co-Kleisli adjunction of !⋅ , where
I(⋅) = C. This shows that if we are hoping to obtain a model of ILDTT indexed over the co-Kleisli
category, in the natural way, we need to support these additive connectives.
It still remains to be seen if an understanding of these “additive connectives” can be found from
a syntactic point of view. Similarly, it seems like the natural models of ILDTT do not support them.
Finally, it is difficult to come up with an intuitive interpretation of the meaning of such connectives, in
the sense of a resource interpretation. Clearly, further investigation is necessary, here.
30
4
Some Discrete Models: Monoidal Families
We discuss a simple class of models in terms of families with values in a symmetric monoidal category. On
a logical level, what the construction boils down to is starting with a model V of a linear propositional
logic and taking the cofree linear predicate logic on Set with values in this propositional logic. This
important example illustrates how Σ- and Π-types can represent infinitary additive disjunctions and
conjunctions. The model is discrete in nature, however, and in that respect not representative for the
type theory.
Suppose V is a symmetric monoidal category. We can then consider a strict Set-indexed category,
defined through the following enriched Yoneda embedding Fam(V) ∶= V − ∶= SMCat(−, V):
Setop
Fam(V)
✲ SMCat
′
−○f
✲ V S ←Ð
VS .
f
S Ð→ S ′
Note that this definition naturally extends to a functor Fam.
Theorem 13 (Families Model ILDTT). The construction Fam adds type dependency on Set cofreely in
the sense that it is right adjoint to the forgetful functor ev1 that evaluates a model of linear dependent
Setop
type theory at the empty context to obtain a model of linear propositional type theory (where SMCatcompr
op
is the full subcategory of SMCatSet on the objects with comprehension):
SMCat
ev1
✛
op
✲ SMCatSet
compr .
⊂
Fam
Proof. Fam(V) admits a comprehension, by the following isomorphism
Fam(V)(S)(I, B{f }) = V S (I, B ○ f )
= Πs∈S V(I, B(f (s)))
≅ Set/S(S Ð→ S, Σs∈S V(I, B(f (s))) Ð→ S)
idS
fst
≅ Set/S ′ (S Ð→ S ′ , Σs′ ∈S ′ V(I, B(s′ )) Ð→ S ′ )
f
fst
= Set/S ′ (f, pS ′ ,B ),
where pS ′ ,B ∶= Σs′ ∈S ′ V(I, B(s′ )) Ð→ S ′ . (vS ′ ,B is obtained as the image of idS ′ ∈ Set/S ′ under this
s
isomorphism.) To see that ev1 ⊣ Fam, note that the following naturality diagrams for elements 1 Ð→ S
fst
1
ev1 (L) = L(1)
φ1 ✲
V = Fam(V)(1)
✻
✻
s
−○s
−{s}
❄
S
L(S)
φS
✲ V S = Fam(V)(S)
s
together with the fact that all 1 Ð→ S are jointly surjectiveopand hence the fact that − ○ s are jointly
injective means that a natural transformation φ ∈ SMCatSet (L, Fam(V)) is uniquely determined by
φ1 ∈ Cat(ev1 (L), V).
We have the following results for type formers24 .
Theorem 14 (Type Formers for Families). V has small coproducts that distribute over ⊗ iff Fam(V)
supports Σ-types. In that case, Fam(V) also supports 0- and ⊕-types (which correspond precisely to finite
distributive coproducts).
24
We do not examine Id-types here, as they will precisely correspond to intuitionistic identity type in I, which probably
is not very interesting seeing that I is a submodel of the normal set-based model of dependent types (i.e. fibred sets, which
is equivalent to indexed sets: Set-valued families).
31
V has small products iff Fam(V) supports Π-types. In that case, Fam(V) also supports ⊺- and &-types
(which correspond precisely to finite products).
Fam(V) supports ⊸-types iff V is monoidal closed.
Fam(V) supports !-types iff V has small coproducts of I that are preserved by ⊗ in the sense that
the canonical morphism coprodS (Ξ′ ⊗ I) Ð→ Ξ′ ⊗ coprodS I is an isomorphism for any Ξ′ ∈ ob V and
S ∈ ob Set. In particular, if Fam(V) supports Σ-types, then it also supports !-types.
Fam(V) supports Id-types if V has an initial object. Supposing that V has a terminal object, the only
if also holds.
Proof. The statement about 0-, ⊕-, ⊺-, and &-types should be clear from the previous sections, as
products and coproducts in V S are pointwise (and hence automatically preserved under substitution).
We will denote coproducts in V with ⊕. Then,
Πs′ ∈S ′ V(
⊕
s∈f −1 (s′ )
A(s), B(s′ )) ≅ Πs′ ∈S ′ Πs∈f −1 (s′ ) V(A(s), B(s′ ))
≅ Πs∈Σs′ ∈S′ f −1 (s′ ) V(A(s), B(f (s)))
≅ Πs∈S V(A(s), B(f (s))
= V S (A, B ○ f ).
So, we see that we can define ΣLf (A)(s′ ) ∶= ⊕s∈f −1 (s′ ) A(s) to get a left adjoint ΣLf ⊣ −{f }, if we have
coproducts. (With the obvious definition on morphisms coming from the coCartesian monoidal structure
on V.) Conversely, we can clearly use ΣLf to define any coproduct by using, for instance, an identity
function for f on the set we want to take a coproduct over and a family A that denotes the objects
we want to comultiply. The Beck-Chevalley condition is taken care of by the fact that our substitution
morphisms are given by precomposition. Frobenius reciprocity precisely corresponds to distributivity of
the coproducts over ⊗.
˘
Similarly, if V has products, we will denote them ˘
with
to suggest the connections with linear type
theory. In that case, we can define ΠLf (A)(s′ ) ∶= s∈f −1 (s′ ) A(s) to get a right adjoint −{f } ⊣ ΠLf .
(With the obvious definition on morphisms coming from the Cartesian monoidal structure on V.) Indeed,
¯
A(s)) ≅ Πs′ ∈S ′ Πs∈f −1 (s′ ) V(B(s′ ), A(s))
Πs′ ∈S ′ V(B(s′ ),
s∈f −1 (s′ )
≅ Πs∈Σs′ ∈S′ f −1 (s′ ) V(B(f (s)), A(s))
≅ Πs∈S V(B(f (s)), A(s))
= V S (B ○ f, A).
Again, in the same way as before, we can construct any product using ΠLf . The dual Beck-Chevalley
condition comes for free as our substitution morphisms are precomposition.
The claim about ⊸-types follows immediately from the previous section: Fam(V) supports ⊸-types
iff all its fibres have a monoidal closed structure that is preserved by the substitution functors. Seeing
that our monoidal structure is pointwise, the same will hold for any monoidal closed structure. Seeing
that substitution is given by precomposition the preservation requirement comes for free.
The characterisation of !-types is given by 3, which tells us we can define !A ∶= ΣpS′ ,A I = s′ ↦
⊕V(I,A(s′ )) I and conversely.
Finally, for Id-types, note that the adjointness condition Id!A ⊣ −{diag∆,A } boils down to the requirement (*)
Πs∈S Πa∈A(s) V(B(s, a), C(s, a, a)) ≅ V Σs∈S A(s) (B, C{diagS,A })
≅ V Σs∈S A(s)×A(s) (Id!A (B), C)
!
≅ Πs∈S Πa∈A(s) Πa′ ∈A(s) V(Id!A (B)(s, a, a′ ), C(s, a, a′ )).
We see that if we have an initial object 0 ∈ ob(V), we can define
Id!A (B)(s, a, a′ ) ∶= {
32
B(s, a) if a = a′
0 else
For a partial converse, suppose we have a terminal object ⊺ ∈ V. Let V ∈ ob(V). Let S ∶= {∗}, A ∶= {0, 1}
and C s.t. C(0, 0) = C(1, 1) = C(0, 1) = ⊺ and C(1, 0) = V . Then, (*) becomes the condition that
{∗} ≅ V(Id!A (B)(1, 0), V ). We conclude that Id!A (B)(1, 0) is initial in V.
Remark 7. Note that an obvious way to guarantee distributivity of coproducts over ⊗ is by demanding
that V is monoidal closed.
Remark 8. It is easily seen that Σ-types in I, or additive Σ-types in L = Fam(V), boil down to having
an object ors∈S C(s) ∈ ob(V) for a family (C(s) ∈ ob(V))s∈S such that Σs∈S V(I, C(s)) ≅ V(I, ors∈S C(s)).
Similarly, Id-types in I, or additive Id-types in L, boil down to having objects one, zero ∈ ob(V) such
that V(I, one) ≅ 1 and V(I, zero) = 0.
Two particularly simple concrete examples of V come to mind that can accomodate all type formers
and form a nice illustration: a category V = VectF of vector spaces over a field F , with the tensor product,
and the category V = Set∗ of pointed sets, with the smash product. All type formers get their obvious
interpretation, but let us stop to think about ! for a second as it is a novelty of ILDTT that it gets uniquely
determined by the indexing, while in propositional linear type theory we might have several different
choices. In the first example, ! boils down to the following: (!B)(s′ ) = coprodVectF (F,B(s′ )) F ≅ ⊕B(s′ ) F ,
i.e. taking the vector space freely spanned by all the vectors. In the second example, (!B)(s′ ) =
coprodSet∗ (2∗ ,B(s′ )) 2∗ = ⋁B(s′ ) 2∗ = B(s′ ) + {∗}, i.e. ! freely adds a new basepoint. These models show
the following.
Theorem 15 (DTT, DILL⊊ILDTT). ILDTT is a proper generalisation of DTT and DILL: we have
inclusions of the classes of models DTT,DILL⊊ILDTT.
Proof. By the Grothendieck construction, every split fibration can equivalently be seen as the category
of elements of the corresponding strict indexed category defined by the fibres. Under this equivalence
split full comprehension categories with finite fibrewise products (i.e. models of DTT with 1- and ×types) correspond precisely to strict indexed Cartesian monoidal categories with comprehension where
the comprehension functor is full and faithful. Clearly, these are a special case of our notion of model of
ILDTT. Moreover, in such cases clearly !A ≅ A. From their categorical description, it is also clear that
the other connectives of ILDTT reduce to those of DTT. This proves the inclusion DDT⊂ILDTT.
The models described above are clearly more general than those of DTT, as we are dealing with a
non-Cartesian monoidal structure on the fibre categories. This proves that the inclusion is proper.
We have seen that the Fam-construction realises the category of models of DILL as a reflective
subcategory of the category of models of ILDTT. Moreover, from various non-trivial models of DTT
indexed over other categories than Set it is clear that this inclusion is proper as well.
Finally, we note that these inclusions still remain valid in the sub-algebraic setting where we do not
have I- and ⊗-types. A simple variation of the argument using multicategories rather than monoidal
categories does the trick.
Although this class of families models is important, it is clear that it only represents a very limited
part of the generality of ILDTT: not every model of ILDTT is either a model of DTT or of DILL.
Hence, we are in need of models that are less discrete in nature but still linear, if we are hoping to
observe interesting new phenomena arising from the connectives of linear dependent type theory. Some
suggestions and work in progress will be discussed in the next section.
33
5
Conclusions and Future Work
We hope to have convinced the reader that linear dependent types fit very naturally in the landscape
of existing type theories and that they admit a rich theory rather than being limited to the specific
examples that had been considered so far. There is a larger story connecting these examples!
On a syntactic level our system is a very natural blend between (intuitionistic) dependent type theory
and dual intuitionistic linear logic. On a semantic level, if one starts with the right notion of model for
dependent types, the linear generalisation is obtained through the usual philosophy of passing from
Cartesian to symmetric monoidal structures. The resulting notion of a model forms a natural blend
between comprehension categories, modelling DTT, and linear-non-linear models, modelling DILL.
It is very pleasing to see that all the syntactically natural rules for type formers are equivalent to their
semantic counterparts that would be expected based on the traditions of categorical logic of dependent
types and linear types. In particular, from the point of view of logic, it is interesting to see that the
categorical semantics seems to have a preference for multiplicative quantifiers.
Finally, have shown that, as in the intuitionistic case, we can represent infinitary (additive) disjunctions and conjunctions in linear type theory, through cofree Σ- and Π-types, indexed over Set. In
particular, this construction exhibits a family of non-trivial truly linear models of dependent types, providing an essential reality check for our system.
Despite what might be expected from this paper, much of this work has been very semantically motivated, by specific models. In joint work with Samson Abramsky, a model of linear dependent types
with comprehension has been constructed in a category of coherence spaces. Apart from the usual type
constructors from linear logic, it also supports Σ-, Π-, and Id-types. A detailed account of this model
will be made available soon.
In addition to providing (what as far as we are aware is) the first non-trivial, semantically motivated
model of such a type system, this work serves as a stepping stone for a model that we are currently
developing in a category of games, together with Samson Abramsky and Radha Jagadeesan. This, in
particular, should provide a game semantics for dependent type theory.
An indexed category of spectra up to homotopy over topological spaces has been studied in e.g. [15, 3]
as a setting for stable homotopy theory. It has been shown to admit I-, ⊗-, ⊸-, and Σ-types. The natural
candidate for a comprehension adjunction, here, is that between the infinite suspension spectrum and
the infinite loop space: L ⊣ M = Σ∞ ⊣ Ω∞ . A detailed examination of the situation and an explanation
of the relation with the Goodwillie calculus would be very desirable here, though. This might fit in with
our related objective of giving a linear analysis of homotopy type theory.
Another fascinating possibility is that of models related to quantum mechanics. Non-dependent linear
type theory has found very interesting interpretations in quantum computation, e.g. [22]. The question
rises if the extension to dependent linear types has a natural counterpart in physics. In [16], Urs Schreiber
has recently sketched how linear dependent types can serve as a language to talk about quantum field
theory and quantisation in particular. There are plenty of interesting open questions here.
Finally, there are still plenty of theoretical questions within the type theory. Can we expect to have
interesting models with type dependency on the co-Kleisli category of ! and can we make sense of additive
Σ- and Id-types, e.g. from a syntactic point of view? Is there an equivalent of strong/dependent E-rules
for ILDTT? Does the Curry-Howard correspondence extend in its full glory: do we have a propositionsas-types interpretation of linear predicate logic in ILDTT? These questions need to be addressed by a
combination of research into the formal system and study of specific models. We hope that the general
framework we sketched will play its part in connecting all the different sides of the story: from syntax
to semantics; from computer science and logic to geometry and physics.
34
References
[1] Cervesato, I., Pfenning, F.: A linear logical framework. In: LICS’96. Proceedings., IEEE (1996)
264–275
[2] Shulman, M.: Enriched indexed categories. Theory and Applications of Categories 28(21) (2013)
616–695
[3] Ponto, K., Shulman, M.: Duality and traces for indexed monoidal categories. Theory and Applications of Categories 26(23) (2012) 582–659
[4] Barber, A.: Dual intuitionistic linear logic. Technical Report ECS-LFCS-96-347, University of
Edinburgh, Edinburgh (1996)
[5] Hofmann, M.: Syntax and semantics of dependent types. In: Extensional Constructs in Intensional
Type Theory. Springer (1997) 13–54
[6] Jacobs, B.: Comprehension categories and the semantics of type dependency. Theoretical Computer
Science 107(2) (1993) 169–207
[7] Church, A.: A formulation of the simple theory of types. The journal of symbolic logic 5(02) (1940)
56–68
[8] Howard, W.A.: The formulae-as-types notion of construction. (1995)
[9] Lambek, J.: Deductive systems and categories iii. cartesian closed categories, intuitionist propositional calculus, and combinatory logic. In: Toposes, algebraic geometry and logic. Springer (1972)
57–82
[10] Martin-Löf, P.: An intuitionistic theory of types. Twenty-five years of constructive type theory 36
(1998) 127–172
[11] Girard, J.Y.: Linear logic. Theoretical computer science 50(1) (1987) 1–101
[12] Dal Lago, U., Gaboardi, M.: Linear dependent types and relative completeness. In: LiCS 2011.
Proceedings., IEEE (2011) 133–142
[13] Petit, B., et al.: Linear dependent types in a call-by-value scenario. In: Proceedings of the 14th
symposium on Principles and practice of declarative programming, ACM (2012) 115–126
[14] Gaboardi, M., Haeberlen, A., Hsu, J., Narayan, A., Pierce, B.C.: Linear dependent types for
differential privacy. In: ACM SIGPLAN Notices. Volume 48., ACM (2013) 357–370
[15] May, J.P., Sigurdsson, J.: Parametrized homotopy theory. Number 132. American Mathematical
Soc. (2006)
[16] Schreiber, U.: Quantization via linear homotopy types. arXiv preprint arXiv:1402.7041 (2014)
[17] Power, A.J.: A general coherence result. Journal of Pure and Applied Algebra 57(2) (1989) 165–173
[18] Melliès, P.A.: Categorical semantics of linear logic. Panoramas et Syntheses 27 (2009) 15–215
[19] Pitts, A.M.: Categorical logic. In Abramsky, S., Gabbay, D.M., Maibaum, T.S.E., eds.: Handbook
of Logic in Computer Science, Volume 5. Algebraic and Logical Structures. Oxford University Press
(2000) 39–128
[20] Bierman, G.M.: On intuitionistic linear logic. PhD thesis, Citeseer (1994)
[21] Lawvere, F.W.: Equality in hyperdoctrines and comprehension schema as an adjoint functor.
Applications of Categorical Algebra 17 (1970) 1–14
[22] Abramsky, S., Duncan, R.: A categorical quantum logic. Mathematical Structures in Computer
Science 16(3) (2006) 469–489 Preprint available at http://arxiv.org/abs/quant-ph/0512114.
35
| 6cs.PL
|
Noname manuscript No.
(will be inserted by the editor)
Improved Power Decoding of Interleaved One-Point
Hermitian Codes
Sven Puchinger · Johan Rosenkilde · Irene
Bouw
arXiv:1801.07006v1 [cs.IT] 22 Jan 2018
Received: date / Accepted: date
Abstract We propose a new partial decoding algorithm for h-interleaved one-point
Hermitian codes that can decode—under certain assumptions—an error of relative
g hh
+1 , where k is the dimension, n the length, and g the genus
weight up to 1 − ( k+
n )
of the code. Simulation results for various parameters indicate that the new decoder
achieves this maximal decoding radius with high probability. The algorithm is based
on a recent generalization of Rosenkilde’s improved power decoder to interleaved Reed–
Solomon codes, does not require an expensive root-finding step, and improves upon
the previous best decoding radius by Kampf at all rates. In the special case h = 1, we
obtain an adaption of the improved power decoding algorithm to one-point Hermitian
codes, which for all simulated parameters achieves a similar observed failure probability
as the Guruswami–Sudan decoder above the latter’s guaranteed decoding radius.
Keywords Interleaved One-Point Hermitian Codes · Power Decoding · Collaborative
Decoding · 94B35 · 14G50
1 Introduction
One-point Hermitian (1-H) codes are algebraic geometry codes that can be decoded
beyond half the minimum Goppa distance. Most of their decoders are conceptually
similar to their Reed–Solomon (RS) code analogs, such as the Guruswami–Sudan (GS)
Sven Puchinger
Institute of Communications Engineering, Ulm University, Germany
E-mail: [email protected]
Johan Rosenkilde
Department of Applied Mathematics and Computer Science, Technical University of Denmark
E-mail: [email protected]
Irene Bouw
Institute of Pure Mathematics, Ulm University, Germany
E-mail: [email protected]
2
Sven Puchinger, Johan Rosenkilde, Irene Bouw
algorithm [1] and power decoding (PD) [2–4]. For both RS and 1-H codes, PD is only
able to correct as many errors as the Sudan algorithm, which is a special case of the
GS algorithm. Recently [5], PD for RS codes was improved to correct as many errors as
the GS algorithm.
An h-interleaved 1-H code is a direct sum of h many 1-H codes. By assuming that errors
occur at the same positions in the constituent codewords (burst errors), it is possible to
decode far beyond half the minimum distance [6], which is inspired by decoding methods
for interleaved RS codes [2, 7]. In the RS case, there have been many improvements on
the decoding radius in the last two decades [2, 7–12], which have not all been adapted
to 1-H codes. The currently best-known decoding radius for interleaved RS codes is
achieved by both the interpolation-based technique in [8, 10] and the method based on
improved PD in [12], where the latter has a smaller complexity since it does not rely on
an expensive root-finding step.
In this paper, we adapt the decoder in [12], which is based on improved PD, to hinterleaved 1-H codes using the description of PD for 1-H as in [4]. Similar to the RS
case, we derive a larger system of non-linear key equations (cf. Section 3) and reduce
the decoding problem to a linear problem whose solution—under certain assumptions—
agrees with the solution of the system of key equations (cf. Section 4).
Using a linear-algebraic argument, we derive an upper bound on the maximum number
of errors which can yield a unique solution of the linear problem (cf. Section 5). This
decoding radius improves upon the previous best, [6], at all rates. In Section 6, we
present simulation results for various code and decoder parameters which indicate that
the new algorithm achieves the maximal decoding radius with high probability. The
complexity of solving the linear problem is shown to be sub-quadratic in the code
length in Section 7. Finally, we compare the decoding radii of RS, interleaved RS and
interleaved 1-H codes for the same overall field size and length in Section 8.
In the special case h = 1, we obtain an 1-H analogue of the improved PD for RS
codes [5]. This improves the decoding radius of the 1-H PD decoder of [4] at a similar
cost, sub-quadratic in the code length, and similar to the best known cost of the 1-H
GS algorithm [4]. Simulation results suggest that the decoder has a similar failure
probability as the GS algorithm for the same parameters when the decoding radius is
beyond the guaranteed radius of the GS algorithm (cf. Section 6).
The decoder is described for codes of full length n = q 3 ; the approach works for any
n < q 3 , but to obtain the good complexities, certain restrictions to how the evaluation
points are chosen should be kept. For notational convenience, we restrict ourselves to
homogeneous interleaved 1-H codes, i.e., where the constituent codes have the same
rate. The generalization to inhomogeneous codes is straightforward.
The results of this article were partly presented at the International Workshop on
Coding and Cryptography, Saint-Petersburg, Russia, 2017, where we only considered
the case h = 1 [13]. While writing this extension, we discovered some slightly improved
key equations, which are presented here. In the previous paper we sought Λs where
Λ is a usual notion of error-locator; now we instead define and seek Λs , which is an
“error-locator of multiplicity s”.
Improved Power Decoding of Interleaved One-Point Hermitian Codes
3
2 Preliminaries
Let q be a prime power. We follow the notation of [4]. The Hermitian curve H/Fq2
is the smooth projective plane curve defined by the affine equation Y q + Y = X q+1 .
The curve H(Fq2 ) has genus g = 12 q (q − 1) and q 3 + 1 many Fq2 -rational points
P = {P1 , . . . , Pq3 , P∞ }, where P∞ denotes the point at infinity. We define R :=
∪mH ≥0 L(mH P∞ ) = Fq2 [X, Y ]/(Y q + Y − X q+1 ), which has an Fq2 -basis of the form
{X i Y j : 0 ≤ i, 0 ≤ j < q}. The order function degH : R → Z≥0 ∪{−∞}, f 7→ −vP∞ (f )
is defined by the valuation vP∞ at P∞ . As a result, we have degH (X i Y j ) = iq + j (q +1).
We will think often operate with elements of R as bivariate polynomials in X and Y ,
represented as Fq2 -linear combinations of the aforementioned basis. In this paper, when
we say “degree” of an element in R, we mean its degH . A non-zero element of R is
called monic if its monomial of largest degH has coefficient 1.
Let n = q 3 and mH ∈ N with 2(g − 1) < mH < n. The one-point Hermitian code of
length n and parameter mH over Fq2 is defined by
CH (n, mH ) = {(f (P1 ), . . . , f (Pn )) : f ∈ L(mH P∞ )} .
The dimension of CH is given by k = mH − g + 1 and the minimum distance d is
lower-bounded by the designed minimum distance d∗ := n − mH .
The (homogeneous) h-interleaved one-point Hermitian code of length n and parameter
mH over Fq2 is the direct sum of h one-point Hermitian codes CH (n, mH ), i.e.,
c1
..
h×n
CH (n, mH ; h) = . ∈ Fq2 : ci ∈ CH (n, mH ) .
ch
As a metric for errors, we consider burst errors: If r = c + e ∈ Fh×n
is received for a
q2
codeword c ∈ CH (n, mH ; h), then the error positions E ⊆ {1, . . . , n} are given by the
non-zero columns of e, i.e.,
E :=
Sh
j =1
i : ej,i 6= 0 .
For a vector i = [i1 , . . . , im ] ∈ Zh
≥0 , we define its size as |i| :=
P
µ iµ .
We denote by
the product partial order on Zh
≥0 , i.e. i j if iµ ≤ jµ for all µ. The number of vectors
h+µ−1
∈Zm
). We use the following relations, which follow
≥0 of size |i| = µ is given by (
µ
from properties of the binomial coefficient.
Lemma 1 Let m, t ∈ Z>0 . Then,
Pt
m+µ−1
)
µ=0 (
µ
= (mm+t), and
Pt−1
µ=0 µ(
m+µ−1
)
µ
Note that the Lemma 1 means e.g.
X
+t−1
|i| = t(hh
+1 ) .
i∈Zh
≥0 ,|i|<t
We also introduce the following notational short-hands:
t−1
= t(mm++1
).
4
Sven Puchinger, Johan Rosenkilde, Irene Bouw
Definition 1 For a ∈ Rh , and i, j ∈ Zh
≥0 , we define
ai :=
iµ
µ=1 aµ ,
Qh
(ji ) :=
Qm
jµ
µ=1 ( iµ ).
By extending the binomial theorem to this notation, we obtain the following lemma.
Lemma 2 Let a, b ∈ Rh , and j ∈ Zm
≥0 . Then,
(a + b)j =
j i j−i
.
ij ( i )a b
P
For computational complexities, we use the soft-O notation O∼ , which omits log factors.
3 System of Key Equations
In this section, we derive the system of key equations that we need for decoding, using
the same trick as [12] for interleaved Reed–Solomon codes. We use the description of
power decoding for one-point Hermitian codes as in [4]. Suppose that the received word
is r = c + e ∈ Fh×n
q 2 , consisting of an error e with corresponding (burst) error positions
E and a codeword c ∈ CH (n, mH ; h), which is obtained from the message polynomials
f = [f1 , . . . , fh ] ∈ L(mP∞ )h .
In the following sections we show how to retrieve the message polynomials f from the
received word r if the number of errors |E| does not exceed a certain decoding radius,
which depends on the parameters of the decoding algorithm. Similar to [4], we define
the following polynomials.
Definition 2 Let
locator polynomial Λs of multiplicity s is the
P s ∈ N. The error
element in L − i∈E sPi + ∞P∞ of minimal degree that is monic.
Theorem 1 The error locator polynomial of multiplicity s is unique and has degree
s|E| ≤ degH Λs ≤ s|E| + g.
clear since if there were
Proof: The proof is similar to [4, Lemma 23]. Uniqueness is P
two such polynomials, their difference
would
also
be
in
L
−
i∈E sPi + ∞P∞ , but
P
of smaller degH . Being in L − i∈E sPi + ∞P∞ specifies s|E| homogeneous linear
equations
P in the coefficients of Λs , since for any i ∈ E, we can expand Λs into a power
series j≥s γi,j φji for a local parameter φi of Pi (e.g., take φi = X − αi if Pi = (αi , βi )).
By requiring degH Λs ≤ s|E| + g, we have more variables than equations, so there is a
non-zero Λs of the sought form with degree at most s|E| + g. The lower bound works
exactly as in [4, Lemma 23].
Lemma 3 For each i = 1, . . . , h, there is a polynomial Ri ∈ R with degH (Ri ) <
n + 2g that satisfies R(Pj ) = ri,j for all Pj ∈ P ∗ . Each Ri can be computed in O∼ (n)
operations over Fq2 .
Improved Power Decoding of Interleaved One-Point Hermitian Codes
5
Proof: Apply [4, Lemma 6] to each row of the received word.
In the following, let R = [R1 , . . . , Rh ] ∈ Rh be as in Lemma 3 and G ∈ R be defined as
G=
Q
α∈Fq2 (X
2
− α) = X q − X.
Lemma 4 For each i ∈ Z≥0 with |i| ≤ s, there is a unique Ωs,i ∈ R of degree
degH Ωs,i ≤ degH Λs + |i|(2g − 1) such that
Λs (f − R)i = G|i| Ωs,i .
Proof: Consider vPj (Λs (f − R)i ) for j = 1, . . . , n: if j ∈ E then vPj (Λs (f − R)i ) =
vPj (Λs ) ≥ s ≥ |i|. If j ∈
/ E then vPj (Λs (f − R)i ) ≥ vPj ((f − R)i ) ≥ |i|. We conclude
Λs (f − R)i ∈ L − |i|
n
X
Pj + ∞P∞ .
j =1
Since the divisor in that L-space is exactly div(G|i| ) + ∞P∞ , then Λs (f − R)i must
be divisible by G|i| (see e.g., [4, Lemma 3]) with quotient in R. The degree is given by
taking degH on both sides and using degH (Ri ) < n + 2g − 1.
The following theorem states the system of key equations that we will use for decoding in
the next sections. Note that the formulation is similar to its interleaved Reed–Solomon
analog [12], with the difference that all involved polynomials are elements of the ring R.
Theorem 2 (System of Key Equations) Let `, s ∈ Z>0 be such that s ≤ ` and Λs ,
f , R, G, and Ωs,i as above. Then, for all j ∈ Zh
≥0 of size 1 ≤ |j| ≤ `, we have
"
j
Λs f =
X
Ωs,i
ij
"
j
Λs f ≡
X
Ωs,i
ij
|i|<s
!
#
j
Rj−i G|i| ,
i
!
j
Rj−i G|i|
i
1 ≤ |j| < s
(1)
s ≤ |j| ≤ `,
(2)
i
(3)
#
mod Gs ,
as congruences over R.
Proof: Using Lemma 2, we obtain
j
Λs f j = Λs (R + (f − R)) =
j
ij ( i )Λs (f
P
− R) Rj−i .
In all summands with |i| < s, we can rewrite, using Lemma 4,
Λs (f − R) = G|i| Ωs,i .
i
(4)
If |i| ≥ s, we can write i = i0 + i00 , for some i0 , i00 ∈ Z≥0 with |i0 | = s, and
i
0
00
00
Λs (f − R) = Λs (f − R)i (f − R)i = Gs Ωs,i0 (f − R)i ,
so all those terms are divisible by Gs . For |j| < s, all summands of (3) have |i| ≤ |j| < s
and are of the form (4). We therefore obtain (1). For |j| ≥ s, all summands of (3) with
|i| ≥ s are divisible by Gs , so we get (2).
6
Sven Puchinger, Johan Rosenkilde, Irene Bouw
4 Solving the System of Key Equations
The key equations in Theorem 2 are non-linear relations between the unknown polynomials Λs , f , and Ω. We therefore relax them into—at the first glance much weaker—linear
problem and hope that their solutions agree. The resulting problem is a heavy generalisation of multi-sequence linear shift register synthesis [14, 15], which is very related to
simultaneous Hermite Padé approximations [16].
Problem 1 Consider a code C = CH (n, mH ; h) and a decoding instance with received
word r = c + e ∈ Fh×n
q 2 , where c ∈ C is unknown and is obtained from the unknown
message polynomials f ∈ L(mP∞ )h . Let R and G be as in Section 3. Given positive
integers s ≤ `, let
Ai,j = (ji )Rj−i G|i| ∈ R
h
for all i ∈ I := {i ∈ Nh
0 : 0 ≤ |i| < s} and j ∈ J := {j ∈ N0 : 1 ≤ |j| ≤ `}. Find
λi , ψj ∈ R for i ∈ I and j ∈ J with monic λ0 , such that
X
j ∈ J and |j| < s,
(5)
j ∈ J and |j| ≥ s,
(6)
degH λ0 ≥ degH λi − |i|(2g − 1)
i ∈ I,
(7)
degH λ0 ≥ degH ψj − |j|mH
j ∈ J.
(8)
ψj =
λi Ai,j
i∈I
ψj ≡
X
λi Ai,j
mod Gs
i∈I
Definition 3 Consider an instance of Problem 1. We say that a solution (λi )i∈I , (ψj )j∈J ,
has degree τ ∈ Z≥0 if degH λ0 = τ . Furthermore, we call a solution minimal if its
degree is minimal among all solutions.
Problem 1 is connected to the key equations through the following statement.
Theorem 3 Consider an instance of Problem 1. Then,
λi = Λi := Ωs,i ,
i ∈ I,
ψj = Ψj := Λs f j ,
j ∈ J,
is a solution to the problem of degree τ = degH Λs , where s · |E| ≤ τ ≤ s · |E| + g.
Proof: Note Ωs,0 = Λs . The equalities and congruences are now clear from the key
equations. As for the degree restrictions, we have
degH Λi ≤ degH Λ0 + |i|(2g − 1),
degH Ψj = degH (Λs ) + degH (f j ) ≤ degH Λ0 + |j|mH ,
which proves the claim.
Improved Power Decoding of Interleaved One-Point Hermitian Codes
7
Remark 1 Most received words will satisfy degH Ri = n + 2g − 1 for all i = 1, . . . , h. In
such a case, the solution of Problem 1 given in Theorem 3 fulfills all degree restrictions
of the problem with equality. These relative upper bounds on the degrees of λi and ψj
are therefore the minimal choice among all such bounds for which Theorem 3 holds.
Theorem 3 motivates a decoding strategy, which is outlined in Algorithm 1: To every
codeword c0 ∈ CH (n, mH ; h) corresponds a solution to Problem 1 whose degree is
roughly s · |E 0 |, where |E 0 | is the number of errors (i.e., non-zero columns) of r − c0 .
Among those solutions, we want to find the one of smallest degree, i.e., the one for
the closest codeword. There will also be other solutions to Problem 1, which do not
correspond to codewords, but the idea is that in most cases, and when the number of
errors is not too large, the minimal solution will correspond to the closest codeword.
Algorithm 1: Improved Power Decoder for h-Interleaved 1-Point Hermitian Codes
Input: Received word r ∈ Fh×n
q m and positive integers s ≤ `
1
Output: f ∈ L(mH P∞ )h such that ci = [fi (P1 ), . . . , fi (Pn )] for all i = 1, . . . , h is
the codeword with a corresponding minimal degH Λs ; or “decoding failure”.
Compute R and G as in Section 3
8
Ai,j ← (ji )Rj−i G|i| for all i j
λi , ψj ← Minimal solution to Problem 1 with input s, `, Ai,j , and G
if λ0 divides all ψui over R for i = 1, . . . , h, where ui is the ith unit vector then
f ← [ψu1 /λ0 , . . . , ψuh /λ0 ]
E ← Error setPcorresponding toei = r i − [fi (α1 ), . . . , fi (αn )] for i = 1, . . . , h
if λ0 ∈ L − i∈E sPi + ∞P∞ and s · |E| ≤ degH λ0 ≤ s(|E| + g ) then
return f
9
return “decoding failure”
2
3
4
5
6
7
In the cases for which this does not happen, the decoder will fail; we will return to this
in Section 5. If the algorithm finds a solution that corresponds to a codeword, then we
have λ0 = Λs and ψui = Λs fi for i = 1, . . . , h, where ui = [0, . . . , 1, . . . , 0] is the ith
unit vector. Hence, we obtain the ith message polynomial fi by division of ψui by λ0 .
Note that Algorithm 1 does not exactly promise to find the closest codeword: it finds
the codewords whose corresponding Λs has minimal degH . When the number of errors
is very small, we will often or always have degH Λs < s|E| + g; but in this case all
other codewords are much farther away from r. On the other hand, when the number
of errors is large, most error vectors will satisfy degH Λs = s|E| + g. In both these cases
Algorithm 1 will find the closest codewords. It seems reasonable to expect, however,
that there exist some rare received words for which a farther codeword will have an
associated Λs of lower degH than the closest codeword.
We will see in Section 7 that we can find a minimal solution of Problem 1 efficiently.
8
Sven Puchinger, Johan Rosenkilde, Irene Bouw
5 Decoding Radius and Failure Behavior
In this section, we derive an upper bound on the maximal degree of the error locator
polynomial Λs for which there can be a unique minimal solution of Problem 1. Since the
degree of Λs is related to the number of errors, this implies an estimate of the maximal
decoding radius of our decoder. We also briefly discuss in which cases the decoder fails
below this bound.
Lemma 5 Let τ, `, s ∈ N such that s ≤ ` and τ + `mH < sn. All polynomials λi , ψj ∈
R for i ∈ I and j ∈ J that fulfill (5), (6), and the absolute degree restrictions
degH λi − |i|(2g − 1) ≤ τ,
(9)
degH ψj − |j|mH ≤ τ,
(10)
can be computed by a homogeneous linear system of equations over Fq2 with at least
h
i
`
h+s−1
h+`
h+s−1
h+`
h+`
δ (τ ) = (τ + 1)(h+
h ) − n h( h+1 ) + s( h ) − s( h ) + mH h(h+1) − g ( h )
more variables than equations, whenever δ (τ ) ≥ 0. If τ ≥ 2g − 1, there are received
words for which the difference is exactly δ (τ ).
Proof: We have degH Ai,j ≤ (n + 2g − 1)|j| − (2g − 1)|i|, so we get
degH
X
λi Ai,j
≤ τ + |j|(n + 2g − 1)
∀j ∈ J.
i∈I
P
Thus, for most j the polynomial ψj has lower degree than the terms in i∈I λi Ai,j in
the case |j| < s and less than the degree of the modulus Gs in the other case.
P Consider
i j
2 . Since the Fq 2 -coefficients of
functions
in
R
over
the
basis
{X
Y
}
over
F
q
i∈I λi Ai,j
P
and ( i∈I λi Ai,j mod Gs ) are known linear combinations of the unknown coefficients
of the λi , the restrictions of the lemma on the degrees of ψj ∈ R can be described by
an Fq2 homogeneous linear system of equations that specify that the top coefficients of
ψj be zero (τ + |j|mH + 1 and higher).
For non-negative integers a and b, there are between b − a − g and b − a many monomials
xi y j ∈ R with j < q of degree at least a and less than b. The lower bound is due to the
Riemann–Roch theorem and the upper bound follows from the injectivity of degH on
the set of monomials.
Due to the degrees of the involved polynomials, the number of Fq2 -linear restrictions
for each |j| < s becomes
Nj = (τ + |j|(n + 2g − 1)) − (τ + |j|mH ) = |j|(n + 2g − 1 − mH ).
For |j| ≥ s, the analysis is a bit more involved: Since G is a polynomial only in X with
s
degX (Gs ) = sq 2 , the congruence
the X-degree of all monomials
Pmodulo G reduces
2
below sq , i.e., the polynomial ( i∈I λi Ai,j mod Gs ) can be written as
!
X
i∈I
s
λi Ai,j mod G
=
2
q−
−1
X1 sqX
j =0 i=0
aij X i Y j ,
Improved Power Decoding of Interleaved One-Point Hermitian Codes
9
where aij ∈ Fq2 are linear expressions of the coefficients of the λi . By the degree
restriction of ψj , we must have that the coefficients aij with degH (X i Y j ) > τ + |j|mH
are zero. Thus, we get at most
q−
X1
Nj =
j =0
sq 2 − |{(i, j ) : qi + (q + 1)j ≤ τ + |j|mH }|
|
{z
}
= τ +|j|mH −g +1
= sn − τ − |j|mH + g − 1
linear equations. Note that the condition τ + `mH < sn guarantees that there is no
monomial X i Y j of degH (X i Y j ) > τ + |j|mH with degX ≥ sq 2 . In total, and using
Lemma 1 repeatedly:
NE =
X
Nj =
X
1≤|j|<s
j∈J
= (n + 2g
X
|j|(n + 2g − 1 − mH ) +
sn − τ − |j|mH + g − 1
s≤|j|≤`
s−1
− 1)h(h+
h+1 ) + (sn − τ
`
h+s−1
h+`
− 1 + g ) (h+
h ) − ( h ) − mH h(h+1).
The number of variables, i.e., the number of Fq2 -coefficients of the λi is at least
NV =
X
s−1
(τ + |i|(2g − 1) + 1 − g ) = (τ + 1 − g )(h+hs−1) + (2g − 1)h(h+
h+1 ).
i∈I
The claim follows by subtracting NV − NE.
In the case τ ≥ 2g − 1, all Weierstraß gaps are below the degree bounds of the λi and
ψj . Hence, the number of variables and equations is equal to the derived NE and NV,
respectively, as long as the maximal possible degree of degH
P
i∈I
λi Ai,j , i.e., for
some choice of the λi , is equal to τ + |j|(n + 2g − 1). There are received
words for which
degH Ri = n + 2g − 1 for all i. In these cases, we can have degH
P
i∈I
=
λi Ai,j
τ + |j|(n + 2g − 1) for some values of λi , so (if τ ≥ 2g − 1), the number of variables
minus the number of equations is exactly δ (τ ).
Lemma 6 If Problem 1 has a solution of degree τ , it has at least (q 2 )δ(τ )−1 many
such solutions.
Proof: Solutions of degree τ of Problem 1 are exactly the solutions of the homogeneous
linear system in Lemma 5 with degH λ0 = τ and monic λ0 . Thus, we set the τ th
coefficient of λ0 to 1 and obtain an inhomogeneous linear system of equations with at
least δ (τ ) − 1 more variables than equations. If Problem 1 has a solution of degree τ ,
then this system has at least (q 2 )ker(A) solutions, where A is the system’s matrix. The
claim follows by dim(ker(A)) ≥ δ (τ ) − 1.
Lemma 6 implies the following statement.
Theorem 4 Let τ = degH Λs and s, ` ∈ N such that s ≤ ` and τ + `mH < sn and
τ > τmax := sn 1 −
s−1
s−1
s(h+h
)−h(h+h+1
)
+`
s(hh
)
−
h
h+1 `mH +
Then, Problem 1 has at least two solutions of degree τ .
1
(hh+`)
−1
+ g.
(11)
10
Sven Puchinger, Johan Rosenkilde, Irene Bouw
Proof: Condition (11) is fulfilled if and only if δ (τ ) > 1. Due to τ = degH Λs , Problem 1
has a solution of degree τ and the claim follows by Lemma 6.
Theorem 4 can be interpreted as follows: If degH Λs > τmax , then either Λs does not
correspond to a minimal solution of Problem 1, or it is a minimal solution but there
are many other minimal solutions as well. There is no reason to think that our solver
for Problem 1 will find Λs among all those solutions, so decoding will likely fail.
Since we have |E| ≤ degH Λs ≤ s|E| + g, and often degH Λs = s|E| + g, we usually have
no unique solution whenever s|E| + g > τmax , i.e.,
|E| >
and for sure if |E| >
tnew =
τmax −g
s
τmax
s .
τmax −g
s
We therefore call
s−1
s−1
s(h+h
)−h(h+h+1
)
=n 1−
−
+`
s(hh
)
h
`
h+1 s mH
+
1
s
1
(hh+`)
−1
(12)
the decoding radius of Algorithm 1.
Remark 2 For τ ≥ 2g − 1, by Lemma 5, there are received words (in fact most of them)
such that the difference of numbers of variables and equations of the inhomogeneous
system for computing all degree-τ solutions of Problem 1 is exactly δ (τ ) − 1. Thus, if
there are sufficiently many linearly independent equations1 , there is no other solution
of the problem, besides the error locator, of degree τ whenever δ (τ ) < 0.
For τ < 2g − 1, the degree bounds of λ0 and ψ0 are smaller than 2g − 1, but those of all
other λi and ψj are bigger (note that mH ≥ 2g − 1). Thus, there can be up to g fewer
equations and up to g more variables than predicted by δ (τ ) for any received word. The
value of τmax as in Theorem 4 can in this case therefore be smaller by a value up to
0
τmax
= τmax − 2g
1
(hh+`)
,
`
which reduces the decoding radius by at most 2g/[s(h+
h )].
In the case τ + `mH ≥ sn, the number of equations is also smaller than predicted by
τmax . However, we will see in Section 5.1 that the best choice of s for a given ` yields
τ + `mH < sn for τ ≤ τmax .
Since we cannot guarantee that the linear equations of the system in Lemma 5 are
linearly independent for τ ≤ degH Λs , Algorithm 1 can fail to return the sent codeword
c for some errors of weight less than the maximal decoding radius. In these cases, we
have one of the following.
– There is a solution of Problem 1 of degree < degH Λs .
– There is more than one solution of Problem 1 of degree = degH Λs and the decoder
picks the wrong one.
1 This linear-algebraic condition resembles, but seems weaker than, the “(non-linear) algebraic
independence assumption” in [10] for decoding interleaved RS codes.
Improved Power Decoding of Interleaved One-Point Hermitian Codes
11
However, the simulation results for various code and decoder parameters, presented
in the following section, indicate that the new decoder is able to decode most error
patterns up to the derived decoding radius tnew . Sometimes, decoding succeeds even
beyond tnew . In these cases, we usually have degH (Λs ) < s|E| + g.
In all previous power decoding algorithms for Reed–Solomon [2, 5], one-point Hermitian
[4, 6], and interleaved Reed–Solomon codes [12], simulation results indicate that the
failure probability for a number of errors below the maximal decoding radius is small
and decreases exponentially in the difference of maximal decoding radius and number
of errors.
As for these other variants, except for a few parameters of theirs (e.g., ` ≤ 3 and s ≤ 2
for a single Reed–Solomon code in [5]), it remains an open problem to prove an analytic
upper bound on the failure probability of Algorithm 1.
5.1 Asymptotic Analysis and Parameter Choice
We study the asymptotic behavior of the decoding radius τmax and give explicit parameters to achieve the given limit. The analysis is based on the following lemma.
Lemma 7 ([12, Lemma 14]) Let γ ∈ (0, 1) and h ∈ N be fixed. Then, we have
(h+bγic
)
h
= γ h + O( 1i )
(hh+i)
for (i → ∞).
Theorem 5 Let (`i , si ) = (i, bγic + 1) for i ∈ N, where γ =
tnew (`i , si ) = n 1 −
mH
n
hh+1
− O( 1i )
pm
h+1
H
n
. Then,
for (i → ∞).
Proof: We have
tnew
n
h
h i (h+bγic
)
h
= 1 − 1 + 1 − s1i h+1
−
(hh+i)
| {z }
|
{z
}
= 1−O ( 1i )
= γ h +O ( 1 )
h
h+1
m
m+1
γ h − γ −1 mnH
{z
}
|
=0
− γh − O
1
i
mH
n
1
+
−1
=γ
+O ( 1i )
=1−
mH
n
s
|{z}
i
=1+
`i
si
i
(
|{z}
|
1
=O i
hh+1
−O
1
h+`i
h
)
{z
−1
}
= −1+O ( 1i )
1
i
,
which proves the claim.
Note that the choice of `i and si in Theorem 5 ensures that τ + `i mH < si n for all
τ ≤ s · tnew (`i , si ).
12
Sven Puchinger, Johan Rosenkilde, Irene Bouw
6 Numerical Results
In this section, we present simulation results. We have conducted Monte-Carlo simulations for estimating the failure probability of the new decoding algorithm in a channel
that randomly adds t = |E| errors, using N ∈ {103 , 104 } samples. The decoder was
implemented in SageMath v7.5 [17], based on the power decoder implementation of [4].
All simulated examples fulfill degH Λs ≥ st ≥ 2g − 1. If this condition is not fulfilled,
the simulation results might differ from the expected decoding radius, cf. Remark 2.
6.1 Case h = 1
We first compare the new improved power (P̂fail,IPD ) with the Guruswami–Sudan
(P̂fail,GS ) decoder. The used implementation of the Guruswami–Sudan decoder is the
publicly available one from [4]. Table 1 presents the simulation results for various code
(q, m, n, k, d∗ ), decoder (`, s), and channel (t) parameters.
Table 1 Observed failure rate of the improved power (P̂fail,IPD ) and Guruswami–Sudan
(P̂fail,GS ) decoder for h = 1. Code parameters q, m, n, k, d∗ . Decoder parameters `, s. Number
of errors t (+ t = tnew decoding radius as in (12)). Number of experiments N .
q
m
n
k
d∗
`
s
4
15
64
10
49
4
2
5
55
125
46
70
3
2
5
20
125
11
105
5
2
7
70
343
50
273
3
2
7
70
343
50
273
4
2
7
55
343
35
288
4
2
t
28
29+
30
35
36+
37
67
68+
69
160
161+
162
168
169+
170
183
184+
185
P̂fail,IPD
P̂fail,GS
N
0
0
9.93 · 10−1
0
0
9.57 · 10−1
0
0
9.91 · 10−1
0
0
9.78 · 10−1
0
0
9.79 · 10−1
0
0
9.82 · 10−1
0
3.30 · 10−3
9.39 · 10−1
0
4.00 · 10−4
9.60 · 10−1
0
7.00 · 10−3
9.60 · 10−1
0
0
9.86 · 10−1
0
0
2.2 · 10−2
0
0
1.9 · 10−2
104
104
104
104
104
104
103
103
103
103
103
103
103
103
103
103
103
103
It can be observed that both algorithms can almost always correct tnew many errors,
improving upon classical power decoding. Also, neither of the two algorithms is generally
superior in terms of failure probability.
When comparing the two algorithms, one has to keep in mind that the GS algorithm is
g
g
`
`
guaranteed to work only up to n[1 − 2(s`+1
+1) ] − 2s mH − s = tnew − s + s(`+1) errors.
Improved Power Decoding of Interleaved One-Point Hermitian Codes
13
6.2 General Case
We now turn to the general case of h > 1, where the previous best relative decoding
h
radius is tK = h+1
(n − mH ) [6]. The simulations results for various code and decoder
parameters are given in Table 2.
Table 2 Observed failure rate of Algorithm 1 (P̂fail,IPD ) for h > 1. Code parameters
q, mH , n, k, d∗ , h. Decoder parameters `, s. Number of errors t (+ t = tnew decoding radius
as in (12)). Number of experiments N . Previous best decoding radius tK [6].
q
4
mH
15
n
64
k
10
d∗
49
h
2
`
3
s
2
t
P̂fail,IPD
N
tK
36
36+
37
38+
39
39+
40
29+
30
0
9.18 · 10−1
0
9.31 · 10−1
0
9.42 · 10−1
0
1
0
9.44 · 10−1
105
103
103
103
105
103
102
102
103
103
32
32
32
32
36
36
36
36
28
28
79+
80
81+
82
86+
87
0
9.37 · 10−1
0
9.93 · 10−1
0
9.94 · 10−1
105
103
103
103
103
103
70
70
70
70
78
78
35+
4
15
64
10
49
2
5
3
4
15
64
10
49
3
3
2
4
15
64
10
49
3
4
3
4
22
64
17
42
2
4
3
5
20
125
11
105
2
3
2
5
20
125
11
105
2
4
2
5
20
125
11
105
3
3
2
5
55
125
46
70
2
4
3
48+
49
0
9.86 · 10−1
103
103
46
46
7
90
343
70
253
2
3
2
183+
184
0
9.72 · 10−1
103
103
168
168
8
128
512
101
384
2
3
2
281+
282
0
1
102
102
256
256
In all tested cases, Algorithm 1 corrected all decoding trials up to tnew many errors and
failed with large observed probability one error beyond this radius.
7 Efficiently Finding a Minimal Solution of Problem 1
We use the Fq2 [X ]-vector representation of an element of R (cf. [4]) to reformulate
Pq−1
i
Problem 1 over Fq2 [X ]. Recall that for a ∈ R, we can write a =
i=0 ai Y ∈ R
with unique ai ∈ Fq2 [X ]. Then, the vector representation [4] of a is defined by ν (a) =
(a0 , . . . , aq−1 ) ∈ Fq2 [X ]q . Note that q deg(ai ) + i(q + 1) ≤ degH (a). For a, b ∈ R it
can be shown that
ν (a + b) = ν (a) + ν (b),
ν (ab) = ν (a)µ(b)Ξ,
14
Sven Puchinger, Johan Rosenkilde, Irene Bouw
where µ(b) ∈ Fq2 [X ]q×(2q−1) and Ξ ∈ Fq2 [X ](2q−1)×q are defined by
b0 b1 b2
b0 b1
µ(b) :=
..
.
. . . bq−1
. . . bq−2 bq−1
,
..
..
..
. ...
.
.
b0 b1 . . . bq−2 bq−1
1
1
Ξ := q+1
−1
X
X q+1
..
.
..
.
−1
..
.
X q+1
1
.
−1
Note further that for c ∈ Fq2 [X ] we have simply µ(ac) = µ(a)c. Using the notation
above, we can reformulate Problem 1 into the following problem over Fq2 [X ]. In the
following, let [q ) denote {0, . . . , q − 1}.
Problem 2 Given positive integers s ≤ `, R and G as in Section 3, and
A(i,j ) := µ(Ai,j )Ξ = µ (ji )Rj−i G|i| Ξ ∈ Fq2 [X ]q×q
h
for all i ∈ I := {i ∈ Nh
0 : 0 ≤ |i| < s} and j ∈ J := {j ∈ N0 : 1 ≤ |j| ≤ `}. Find
λi,ι , ψj,κ ∈ Fq2 [X ] for i ∈ I, j ∈ J , ι, κ ∈ [q ), not all zero, such that
ψj,κ =
X q−
X1
(i,j )
1 ≤ |j| < s,
λi,ι Aι,κ
i∈I ι=0
ψj,κ ≡
X q−
X1
(i,j )
λi,ι Aι,κ
mod Gs
1 ≤ |j| < s,
i∈I ι=0
max q deg λ0,ι + ι(q + 1) ≤ q deg λi,ι + ι(q + 1) − |i|(2g − 1)
ι∈[q )
max q deg λ0,ι + ι(q + 1) ≤ q deg ψj,κ + κ(q + 1) − |j|mH
ι∈[q )
0 ≤ |i| < s, ι ∈ [q )
1 ≤ |j| ≤ `, κ ∈ [q )
Similar toits R-equivalent, we define the degree of a solution of the above problem to be
maxι∈[q) q deg λ0,ι + ι(q + 1) and call the solution monic if the leading coefficient of
the λ0,ι that maximizes maxι∈[q) q deg λ0,ι + ι(q + 1) is 1. The following statement
establishes the connection between Problem 1 and Problem 2.
Theorem 6 Let τ ∈ Z≥0 . Then, λi , ψj ∈ R for i ∈ I and j ∈ J is a solution of
degree τ of Problem 1 if and only if
[λi,0 , . . . , λi,q−1 ] := ν (λi )
[ψj,0 , . . . , ψj,q−1 ] := ν (ψj )
is monic solution of degree τ of Problem 2.
Improved Power Decoding of Interleaved One-Point Hermitian Codes
15
Proof: If λi and ψj forms a solution to Problem 1 this means for |j| ≥ s that there is
some uj ∈ R such that:
ψj =
X
λi Ai,j + uj Gs
⇐⇒
ij
|i|<s
ν (ψj ) =
X
ν (λi )µ(Ai,j )Ξ + µ(uj )Gs .
ij
|i|<s
since Gs ∈ Fq2 [X ]. This implies element-wise the congruence of Problem 2. The opposite
direction is analogous, as is the case |j| < s. The degree restrictions follow immediately
from degH (a) = maxι∈[q) {q deg aι + ι(q +1)} for any a ∈ R and ν (a) = (a1 , . . . , aq−1 ).
Problem 2 is of the same instance as the problem discussed in [4, Section V.B],2 which
can be solved by transforming an Fq2 [X ]-module basis that depends on the entries of
A(i,j ) and the relative degree bounds in Problem 2, into a reduced polynomial matrix
form (weak Popov form). Using this approach, finding a minimal solution of Problem 1
can be implemented in
ω
`
O∼ (h+
h ) sn
ω +2
3
⊆ O∼ `hω sn
ω +2
3
operations over Fq2 , where 2 ≤ ω ≤ 3 is the matrix multiplication exponent. In [5],
a similar kind of problem was reduced to finding solution bases of so-called Padé
approximation problems. In this way, the complexity can be slightly reduced to
`
O∼ (h+hs−1)(h+
h )
ω−1
sn
ω +2
3
⊆ O∼ `h(ω−1) sh+1 n
ω +2
3
operations over Fq2 . In order to achieve the asymptotic decoding radius, the code
parameters must be chosen as in Section 5.1. In this case, the two asymptotic complexity
statements above coincide and we get the following result.
Theorem 7 For a fixed code of rate R =
k
n
s, ` ∈ O(1/ε) such that tnew ≥ n(1 − (R +
∼
costs O ((1/ε)
hω +1
n
ω +2
3
and any constant ε > 0, we can choose
g−1 hh
+1
n )
− ε). In this case, Algorithm 1
).
Proof: The first statement directly follows from Theorem 5. The pre- and post-computations
in Algorithm 1 are negligible compared to Line 3 by similar arguments as in [4]. The
complexity thus follows by the arguments above.
2
Using this approach, it is necessary to reformulate the equations for 1 ≤ |j| < s into
(i,j)
congruences modulo xξ , where ξ is greater than the largest possible degree of the λi,ι Aι,κ for
the maximal number of errors that we expect to corrected.
16
Sven Puchinger, Johan Rosenkilde, Irene Bouw
8 Comparison to Interleaved Reed–Solomon Codes
An h-interleaved code over some field FQ over the burst error channel can equivalently
be considered as a code over FQh considered over the Qh -ary channel. This allows
comparing the decoding capability of interleaved 1-H codes with other constructions
of short codes over large fields, most notably RS codes and interleaved RS codes, see
Figure 1 for the case Qh = q 6 .
More precisely, for any h ∈ Z>0 , we have several ways of obtaining [n, k] codes over
Fq6h for n = q 3 and some dimension k < n. We will compare the following relative
decoding radii:
tRS : an RS code over Fq6h decoding up to the Johnson radius using one of [1, 5, 18].3
tIRS : 2h-interleaved RS code over Fq3 using one of [10, 12].
t1H : 3h-interleaved 1-H code over Fq2 using the proposed algorithm.
RS Codes
Interleaved RS Codes
Interleaved 1-H Codes
n = q3
n = q3
n = q3
(q 3 )2
q6
1
(q 2 )3
2
1 − R2
1 − R3
1 − (R +
g 3
)4
n
Fig. 1 Example: Comparison of interleaved Reed–Solomon and one-point Hermitian codes of
length n = q 3 over an overall field size of q 6 .
These values are as follows:
1
1 2
tRS = 1 − ( k−
n )
2h
1 2h+1
tIRS = 1 − ( k−
,
n )
1
tIH = 1 − ( k−
n −
g 3h3h
+1 ,
n)
g
→ 0 for n → ∞, we can asymptotically
The asymptotics are already clear: since n
achieve larger decoding radii with interleaved 1-H codes than with interleaved RS codes,
when considering comparable overall field size. Below follows some concrete parameter
examples.
q = 13 is the smallest prime power for which tIH > tIRS for rate 1/2, i.e. both interleaved
codes can be considered as [2197, 1098] codes over F136 , and the decoding radii are
tRS = 644, tIRS = 814 and tIH = 823. A list of decoding radii of rate 1/2 codes with
even q is given in Table 3.
9 Conclusion
We have presented a new decoding algorithm for h-interleaved one-point Hermitian codes
based on the improved power decoder for Reed–Solomon codes in [5], its generalization
3 As pointed out in [19], an RS code over F
q 6h whose evaluation points all lie in Fq 3 are
equivalent to a 2h-interleaved RS codes over Fq3 , i.e. can be decoded up to tIRS . In our
comparison here we therefore consider RS codes with arbitrary evaluation points for which this
equivalence doesn’t hold.
Improved Power Decoding of Interleaved One-Point Hermitian Codes
17
Table 3 Examples for tIH and tIRS for rate 1/2 codes of several lengths for hRS = 2 and
hH = 3.
q
23
24
25
26
27
n = q3
512
4096
32768
262144
2097152
k= n
2
256
2048
16384
131072
1048576
tRS
150
1200
9598
76780
614242
tIRS
190
1516
12126
97004
776029
tIH
183
1555
12844
104478
842936
tIH /tRS ≈
1.22
1.30
1.34
1.36
1.37
tIH /tIRS ≈
0.96
1.03
1.06
1.08
1.09
to h-interleaved Reed–Solomon codes in [12], and the power decoder for one-point
Hermitian codes in [4, 6].
The maximal decoding radius of the new algorithm is n(1 − (R +
ω +2
3
g−1 hh
+1
n )
− ε) at
a cost of O∼ ((1/ε)hω+1 n
) operations over Fq2 , where 2 ≤ ω ≤ 3 is the matrix
multiplication exponent, and improves upon previous best decoding radii at all rates.
Experimental results indicate that the algorithm achieves this maximal decoding radius
with large probability.
For large n, interleaved one-point Hermitian codes achieve larger maximal decoding
radii than interleaved Reed–Solomon codes when compared for the same length and
overall field size.
In the case h = 1, we obtain a one-point Hermitian codes equivalent of the improved
power decoder for Reed–Solomon codes in [5], which achieves a similar decoding radius
as the Guruswami–Sudan list decoder. Simulation results indicate that the new decoder
has a similar failure probability for numbers of errors beyond the latter’s guaranteed
decoding radius.
As for any other power decoding algorithm, both for Reed–Solomon and one-point
Hermitian codes, deriving analytic bounds on the failure probability remains an open
problem. So far, the only parameters for which such an expression is known are h = 1,
` ≤ 3, and s ≤ 2, cf. [2, 5].
References
1. V. Guruswami and M. Sudan, “Improved Decoding of Reed–Solomon and AlgebraicGeometric Codes,” in IEEE Annual Symposium on Foundations of Computer Science,
1998, pp. 28–37.
2. G. Schmidt, V. R. Sidorenko, and M. Bossert, “Syndrome Decoding of Reed–Solomon Codes
Beyond Half the Minimum Distance Based on Shift-Register Synthesis,” IEEE Transactions
on Information Theory, vol. 56, no. 10, pp. 5245–5252, 2010.
3. S. Kampf, “Decoding Hermitian Codes - An Engineering Approach,” Ph.D. dissertation,
Universität Ulm, 2012.
4. J. S. R. Nielsen and P. Beelen, “Sub-Quadratic Decoding of One-Point Hermitian Codes,”
IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3225–3240, 2015.
5. J. Rosenkilde, “Power Decoding Reed–Solomon Codes up to the Johnson Radius,” Accepted
for: Advances in Mathematics of Communications, (2018), arXiv preprint arXiv:1505.02111.
6. S. Kampf, “Bounds on Collaborative Decoding of Interleaved Hermitian Codes and Virtual
Extension,” Designs, codes and cryptography, vol. 70, no. 1-2, pp. 9–25, 2014.
7. V. Y. Krachkovsky and Y. X. Lee, “Decoding for Iterative Reed–Solomon Coding Schemes,”
IEEE Trans. Magn., vol. 33, no. 5, pp. 2740–2742, 1997.
18
Sven Puchinger, Johan Rosenkilde, Irene Bouw
8. F. Parvaresh and A. Vardy, “Multivariate Interpolation Decoding Beyond the Guruswami–
Sudan Radius,” in Proceedings of the 42nd Allerton Conference on Communication, Control
and Computing, 2004.
9. G. Schmidt, V. Sidorenko, and M. Bossert, “Enhancing the Correcting Radius of Interleaved
Reed-Solomon Decoding using Syndrome Extension Techniques,” in IEEE ISIT, 2007, pp.
1341–1345.
10. H. Cohn and N. Heninger, “Approximate Common Divisors via Lattices,” The Open Book
Series, vol. 1, no. 1, pp. 271–293, 2013.
11. A. Wachter-Zeh, A. Zeh, and M. Bossert, “Decoding Interleaved Reed–Solomon Codes
Beyond Their Joint Error-Correcting Capability,” Designs, Codes and Cryptography, vol. 71,
no. 2, pp. 261–281, 2014.
12. S. Puchinger and J. Rosenkilde né Nielsen, “Decoding of Interleaved Reed-Solomon Codes
Using Improved Power Decoding,” IEEE International Symposium on Information Theory,
2017.
13. S. Puchinger, I. Bouw, and J. Rosenkilde né Nielsen, “Improved Power Decoding of OnePoint Hermitian Codes,” in International Workshop on Coding and Cryptography, 2017,
arXiv:1703.07982.
14. G.-L. Feng and K. K. Tzeng, “A Generalized Euclidean Algorithm for Multisequence ShiftRegister Synthesis,” IEEE Transactions on Information Theory, vol. 35, no. 3, pp. 584–594,
1989.
15. J. S. R. Nielsen, “Generalised Multi-sequence Shift-Register Synthesis using Module
Minimisation,” in IEEE International Symposium on Information Theory, 2013, pp. 882–886.
[Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6620353
16. B. Beckermann and G. Labahn, “A Uniform Approach for the Fast Computation
of Matrix-Type Padé Approximants,” SIAM Journal on Matrix Analysis and
Applications, vol. 15, no. 3, pp. 804–823, Jul. 1994. [Online]. Available: http:
//epubs.siam.org/doi/abs/10.1137/S0895479892230031
17. W. A. Stein et al., “SageMath Software,” http://www.sagemath.org.
18. Y. Wu, “New List Decoding Algorithms for Reed-Solomon and BCH Codes,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3611–3630, 2008.
19. V. Sidorenko, G. Schmidt, and M. Bossert, “Decoding Punctured Reed–Solomon Codes up
to the Singleton Bound,” in International ITG Conference on Source and Channel Coding,
2008, pp. 1–6.
| 7cs.IT
|
Bayesian Conditional Cointegration
Chris Bracegirdle
[email protected]
David Barber
[email protected]
Centre for Computational Statistics and Machine Learning, University College London, Gower Street, London
Abstract
Cointegration is an important topic for timeseries, and describes a relationship between
two series in which a linear combination is
stationary. Classically, the test for cointegration is based on a two stage process in
which first the linear relation between the series is estimated by Ordinary Least Squares.
Subsequently a unit root test is performed
on the residuals. A well-known deficiency of
this classical approach is that it can lead to
erroneous conclusions about the presence of
cointegration. As an alternative, we present a
framework for estimating whether cointegration exists using Bayesian inference which is
empirically superior to the classical approach.
Finally, we apply our technique to model segmented cointegration in which cointegration
may exist only for limited time. In contrast
to previous approaches our model makes no
restriction on the number of possible cointegration segments.
1. Introduction
Cointegration is an important concept in time-series
analysis and relates to the fact that the differences
between two time-series may be more predictable than
any individual time-series itself. We make two contributions to this area—first, we formulate determining
whether two series are cointegrated as an instance of
Bayesian inference in an associated probabilistic model.
This enables us to bring modern statistical and machine
learning techniques to the analysis of cointegration and
also provides a useful conceptual framework to describe
cointegration. The resulting regression estimation algorithm is shown to be more robust than least-squares
estimation to spurious results. This is we believe an
Appearing in Proceedings of the 29 th International Conference on Machine Learning, Edinburgh, Scotland, UK, 2012.
Copyright 2012 by the author(s)/owner(s).
important result that establishes a new and coherent
approach to the long-standing problem of inconsistency
in establishing cointegration. Second, in practice two
series may only be intermittently cointegrated—that
is, they are only cointegrated over shorter segments of
time. To date the identification of these segments has
been attempted with rather limiting assumptions such
as the presence of either only two or three segments
(Gregory & Hansen, 1996; Hatemi-J, 2008). To address
this we phrase the problem as inference in a corresponding changepoint model, placing no limitation on the
number of segments. We develop an efficient specialised
inference scheme for this model and demonstrate its
practical applicability on real-world problems.
1.1. Cointegration
Whilst individual time-series may not be predictable,
the relationships between two time-series may be more
predictable. For example, series x1:T , y1:T formed by
xt+1 = xt + t+1 ,
yt+1 = yt + t+1 ,
t ∼ N (0, 1)
both follow an unpredictable random walk. However,
the future difference xt+1 − yt+1 = xt − yt , is perfectly
predictable given knowledge of the current difference.
In the economics and finance literature such instances
are common; for example underlying mechanisms such
as limited money supply may forge dependencies between time-series (Dickey et al., 1991). It is of significant interest in finance to find pairs of asset price series
that are cointegrated—such estimation underpins one
of the classical statistical arbitrage strategies known as
‘pairs trading’.
From an individual series x1:T we can form a new
series x12:T by taking the difference x1t = xt − xt−1 .
Repeating this differencing process d times, a series is
order d integrated, written I(d), if the series xdt formed
from repeatedly taking the difference d times yields
a stationary series I(0). In our example above, both
x and y are each I(1) and hence integrated. As we
showed, there is a linear combination that is I(0). More
generally, two series x1:T and y1:T are cointegrated
Bayesian Conditional Cointegration
if they are each individually integrated and a linear
combination of the two is integrated with a lower order.
For our purposes, we define xt and yt to be cointegrated
within a specified time segment if there is a linear
regression relationship between the two variables that
forms a stationary process. For the most simple case
of a single regressor, we write such a relationship as
we form a generative model on observations1 y1:T and
latent variables 1:T
Y
p(yt xt , t ) p(t t−1 ) , 0 = ∅
p(y1:T , 1:T x1:T ) =
t
where2
p(yt xt , t ) = δ(yt − α − βxt − t )
yt = α + βxt + t
t = φt−1 + ηt ,
ηt ∼ N 0, σ 2 ,
|φ| < 1
and the transition for t is given as
p(t t−1 ) = N t φt−1 , σ 2 .
where α represents a constant, and β the regression coefficient. Here 1:T forms a mean-reverting, stationary
process. For brevity, we focus attention on estimation
in this model, however more flexible cases can easily be
considered, including the case with a trend coefficient
γ in which the regression is written
yt = α + βxt + γt + t
with the same autoregression for t . Adapting our
technique to more complex models with exogenous
variables, and to the vector case, is also possible.
Testing for and estimating a cointegration relationship is classically a two-step process (Granger, 1986).
Firstly, the regression equation is estimated based on
a
least squares (OLS) fit to minimise
Psimple ordinary
2
t (yt −α−βxt ) (which we show is equivalent to maximum likelihood (ML) parameter optimisation assuming
that φ = 0 in a corresponding model). Subsequently,
a test for a unit root in the residuals is performed using the Dickey-Fuller test, see for example Harris &
Sollis (2003), which tests the hypothesis that φ = 1
against the alternative |φ| < 1 (for |φ| < 1 the series is
stationary and non-stationary otherwise). In the case
that φ = 1, it is well-known that OLS can deliver a
spurious regression (Granger & Newbold, 1974), and
this problem is not limited to cointegration. The classical approach is conceptually undesirable since it makes
strong, potentially conflicting assumptions about the
data: in the regression part, the residuals are effectively assumed uncorrelated whilst in the subsequent
unit root test, they may be determined not to be (under the null hypothesis of the test, the regression was
spurious). In this work we relax the assumptions placed
on φ during parameter estimation to reduce the impact
of any conflicting assumptions.
2. Modelling Cointegration
Our approach is to form a generative
model of observations p(y1:T x1:T , θ), where θ = α, β, σ 2 , φ . First,
The belief network (see Barber (2012) for an introduction) for this model is given in figure 1. The likelihood
on the observations y1:T is given by
Z
p(y1:T x1:T ) =
p(y1:T , 1:T x1:T ) .
1:T
The integration distributes,
TY
−1
Z
p(y1:T x1:T ) =
p(yt xt , t ) p(t t−1 )
1:T −1 t=1
Z
×
p(yT xT , T ) p(T T −1 )
T
and since we have a delta function, the
final term
evaluates to N yT − α − βxT φT −1 , σ 2 . Iterating
this yields a product of Gaussian terms
T
Y
N yt − α − βxt φ (yt−1 − α − βxt−1 ) , σ 2 .
t=2
Finally, applying labels according to t = yt − α − βxt ,
p(y1:T x1:T ) = p(1 )
T
Y
N t φt−1 , σ 2 = p(1:T ) .
t=2
Hence the likelihood p(y1:T x1:T ) is equivalent to the
likelihood on the Markov chain with ‘observations’ t
shown in figure 2. The log likelihood log p(1:T ) is
log p(1 ) −
1
T
1 X
T −1
2
(t − φt−1 ) −
log 2πσ 2
2
2σ t=2
2
Note that we make no assumption about the underlying process x; we work with the conditional relationship
p(y1:T x1:T ) not the joint p(x1:T , y1:T ). As far as we are
aware previous Bayesian approaches to cointegration make
stronger assumptions about the underlying process, see for
example Koop et al. (2006).
2
The Dirac delta distribution δ(x − a) represents a deRgenerate probability density function with the property that
δ(x − a) f (x) = f (a) .
x
Bayesian Conditional Cointegration
1
2
3
...
T
x1
x2
x3
...
xT
y1
y2
y3
...
yT
Figure 1. Belief network for the natural model for cointegration. Diamonds represent delta functions, shaded variables
are in the conditioning set.
1
2
3
...
T
Figure 2. Belief network for the Markov chain model for t .
3.1. Inference of φ
The process 1:T is stationary when each3 ht i = 0
and 2t is constant, independent of t. According to
the recurrence relation for t , the variance satisfies
2t+1 = φ2 2t + σ 2 and we can therefore
ensure
2
2
2
stationary of 1:T if 1 = σ / 1 −
φ . We then
choose p(1 φ) = N 1 0, σ 2 / 1 − φ2 . The posterior
p(φ 1:T ) is proportional to
"
#
T
X
p
−1
2
p(φ) 1 − φ2 exp 2 21 1 − φ2 +
(t − φt−1 )
2σ
t=2
and by completing the square we see that the posterior
is given by a truncated Gaussian distribution with a
prefactor (subject to normalisation),
p
ê12 σ 2
,
p(φ) 1 − φ2 N φ
ê1 ê1
where
and when φ = 0, maximising this degenerates to minimising the sum of squared residual terms
ê12 ≡
T
X
ê1 ≡
t t−1 ,
t=2
T
X
t=2
2t =
T
X
2
(yt − α − βxt ) .
T
X
2t−1 .
t=3
For the data likelihood, we write for p(1:T ),
t=2
OLS estimation for the regression parameters α and β
therefore corresponds to the ML solution of this model,
on the assumption that φ = 0. In the case that φ is
non-zero, a different solution may be optimal in the
ML sense. This is a source of potential inconsistency
in the classical approach to cointegration testing.
2πσ
2
1−T
2
!
T
2
X
(ê12 )
1
2
t −
exp − 2
2σ
ê1
t=1
Z 1 p
1
ê
σ2
1
2 N φ 12 ,
×√
1
−
φ
.
ê1 ê12
ê1 −1 2
φ
3.2. Estimating α, β, σ 2
3. Bayesian Cointegration
We can construct a model for estimating both φ and
the parameters α, β, σ 2 by considering φ to be a latent
variable and providing a prior distribution. In this case,
for cointegration we require |φ| < 1, and we can encode
this with a uniform distribution p(φ) = U(φ (−1, 1)) =
1
2 [φ ∈ (−1, 1)]. We complete the model specification
with a distribution for 1 and form the joint model
p(y1:T , 1:T , φ x1:T ) = p(y1:T 1:T , x1:T ) p(1:T φ) p(φ)
from which the marginal model
φ
Since φ is a latent variable, it is convenient to approach
this using the Expectation-Maximisation algorithm.
Writing v for the observations and h for the latent
variables EM is based on the Kullback-Leibler bound
q(h v)
0 ≤ KL(p q) ≡ log
p(h v) q(h v)
log p(v) ≥ hlog p(h, v)iq(h v) − hlog q(h v)iq(h v)
|
{z
} |
{z
}
Z
p(y1:T , φ x1:T ) = p(φ)
Our interest is to set the parameters θ = α, β, σ 2
based on maximising the likelihood
Z
p(y1:T x1:T , θ) =
p(φ) p(1:T φ) .
energy
p(y1:T 1:T , x1:T ) p(1:T φ)
1:T
is formed by integration. The posterior p(φ x1:T , y1:T )
is then equivalent to p(φ 1:T ) ∝ p(φ) p(1:T φ).
entropy
where p is a variational distribution and q a fixed posterior. EM corresponds to iteratively maximising this
3
Angled brackets represent expectation, hxi = E [x].
Bayesian Conditional Cointegration
lower bound with respect to the variational distribution
p, and using this as the next q following inference. For
this model, we replace h → φ, v → 1:T .
The energy term4 is the log of the model joint, and
since we are interested in maximising with respect to
the regression parameters α and β the only relevant
terms are given as
hlog p(1 φ)iq(φ
1:T ) +
T
X
hlog p(t t−1 , φ)iq(φ
Algorithm 1 Bayesian cointegration testing
α, β, σ 2 ← LinearRegression (x1:T , y1:T )
repeat
1:T ← y1:T − α − βx1:T
2
2
l
,
hφi
,
φ
←
CointInference
,
σ
C
1:T
α, β, σ 2 ← EM x1:T , y1:T , hφi , φ2
until convergence
QT
b2
lRW ← t=2 N t t−1 , σ
return cointegrated ← lRW /lC < threshold
1:T )
t=2
and up to a constant, this equals
"
#
T D
E
X
−1 2
2
2
1−φ +
(t − φt−1 )
−
2σ 2 1
t=2
T
2
log 2πσ 2
where q(φ 1:T ) = p φ 1:T , θold is the posterior from
the previous iteration. The energy can be optimised
by finding the stationary point by differentiating by α
and β. Since
D
E
2
(t − φt−1 ) = 2t − 2t t−1 hφi + 2t−1 φ2
the result is a system of linear equations for α and β
involving the first and second (non-central) moments
of φ from the posterior q(φ 1:T ).
By differentiating the above energy term with respect
to σ 2 , we find that optimally
"
#
T D
E
X
1 2
2
2
2
σ
b =
1−φ +
(t − φt−1 )
T 1
t=2
so the variance can be estimated once the new regression estimates α and β have been found.
4. The Random Walk model
A primary concern in the economics literature is to test
the hypothesis of cointegration for series. The analogue
with our Bayesian generative model is to compare the
likelihoods of the above cointegration model and a
random walk (RW) model. The likelihood for 1:T a
RW is calculated as
p(1:T φ = 1) = p(1 )
T
Y
N t t−1 , σ 2
t=2
For p(1 ) we choose a wide-interval uniform distribution.
The cointegration model and random walk model can
then be compared according to the Bayes factor,
p(y1:T x1:T ; φ = 1)
p(1:T φ = 1)
lRW
=
≡
p(y1:T x1:T ; |φ| < 1)
p(1:T |φ| < 1)
lC
4
Also called the expected completed data log likelihood.
where the numerator represents the ‘null hypothesis’
of a unit root in the residuals process. The denominator is simply the marginal likelihood for the Bayesian
cointegration model given in section 3.1.
Whilst a fully-Bayesian approach to cointegration testing may be considered by placing prior distributions
and seeking to integrate over the parameters α, β, σ 2
separately for each model, here we restrict our analysis
to point estimation for reasons of both simplicity and
computational speed. Furthermore we wish to relate
closely to the classical point estimate approach to cointegration estimation and testing. The purpose of this
study is demonstrate the potential advantage of using
a ‘partial’ Bayesian approach for φ alone.
4.1. Point Estimation
Both the numerator and denominator of the Bayes
factor are functions in the variance σ 2 , and we set σ
for each of the two models by ML. The estimate for σ 2
for the RW model is given according to
T
σ
b2 =
1 X
2
(t − t−1 ) .
T − 1 t=2
Note that here t depends on α and β, and we now
discuss possible ways to determine point estimates for
these parameters. There are three primary options: (i)
find the parameters by OLS and use these values for
both the cointegration and RW models; (ii) find the
parameters by ML in the cointegration model and use
the same parameters for the RW model; and (iii) find
the parameters for each of the cointegration and RW
models by ML. Conceptually, our interest is to first
estimate a cointegration relationship, and second to test
whether this relationship is more likely to be a random
walk—and for this reason, we consider the third option
undesirable. Whilst the first option is computationally
the simplest it suffers from the implicit assumption
that φ = 0. For this reason the second is our preferred
method.
Algorithm 1 shows the calculation steps for the
Bayesian cointegration test. The results in figure 3
Bayesian Conditional Cointegration
1
0.7
DF FP
DF FN
Bayes FP
Bayes FN
0.99
0.6
0.98
True Positive Rate
Error rate
0.5
0.4
0.3
0.2
0.97
0.96
0.95
0.94
0.93
0.92
0.1
OLS/DF
OLS/Likelihood
EM/DF
EM/Likelihood
0.91
0.9
0
0
50
100
150
200 250 300
Series length T
350
400
450
500
Figure 3. Plot of false positive (FP) and false negative (FN)
rates (calculated as number of FP/FN outcomes divided
by number of true negatives/positives respectively) for the
classical OLS/DF approach (5% significance) and Bayesian
EM/likelihood method (threshold C = exp 2) for generated
series. 5000 series of each length were simulated according
to the generative model, uniformly split between |φ| < 1
in the cointegrated case and φ = 1 in the random walk
case. The high rate of false positives for the classical test
is striking: here cointegration was detected when the data
were generated with φ = 1. We attribute this to the fact
that OLS is known to produce invalid estimates when the
process is non-stationary: so called ‘spurious regression’.
show that, compared with OLS estimation and unit
root testing, our Bayesian technique is less likely to
result in a spurious relationship for series of length
T > 20. In figure 4 we show comparisons for differing
decision boundaries5 .
5. Intermittent Cointegration
For some series, cointegration may only apply for certain segments. A good example is the Interconnector
gas pipeline between Bacton, UK and Zeebrugge, Belgium, which allows gas to flow between the two countries, providing a direct link in the gas price at each end.
When the pipeline closes each year for maintenance,
the link between the prices is temporarily broken. It
was shown by Kim (2003) that classical tests for cointegration may fail to detect a relationship even though,
for a part of the series, there is such a relationship. The
following model seeks to detect a cointegration relationship between two series, while allowing for regions
when the relationship is in fact a random walk.
5
Differing decision thresholds correspond to different
widths of uniform prior for 1 in the RW model since
˜
lRW
lRW
<C⇔
< 1,
lC
lC
lRW
˜
lRW ≡
.
C
0
0.1
0.2
0.3
0.4 0.5 0.6 0.7
False Positive Rate
0.8
0.9
1
Figure 4. Plot of the receiver operating characteristic (ROC)
curve for the cointegration estimation/testing combinations,
for T = 100. 10,000 series were generated; we plot the true
positive rate against the false positive rate for different
values of the decision threshold. EM refers to estimation
in the Bayesian cointegration model by ML; DF refers to
a Dickey-Fuller test; Likelihood refers to a comparison of
the likelihood in the cointegration model with the random
walk model φ = 1. Optimal classification occurs with true
positive rate 100%, false positive rate 0%—the results show
that OLS/DF is dominated by EM/Likelihood.
Previous works in this area typically limit the number
of regimes in which cointegration can occur to either
only two or three segments (Gregory & Hansen, 1996;
Hatemi-J, 2008). In contrast, for our model we allow
time-varying φt arranged to be piecewise-constant with
no a priori restriction on the number of piecewiseconstant regions. The model will switch between the
cointegrated case |φt | < 1 and the alternative φt = 1,
corresponding to a random walk.
We use the binary state switch it to denote whether
there is a cointegration relationship at time t: it =
1 denotes regions of t corresponding to a random
walk; alternatively when it = 0, t follows a stationary
cointegration relation. In the random walk regions, we
have φt = 1, which is encoded in the prior distribution
p1 (φt ) = δ(φt − 1). We therefore specify
(
p1 (φ2 ) = δ(φ2 − 1)
i2 = 1
p(φ2 i2 = 0) =
0
p (φ2 ) = U(φ2 (−1, 1)) i2 = 0
and for the piecewise-constant transition,
1
it = 1
p (φt )
p(φt φt−1 , it , it−1 ) = δ(φt − φt−1 ) it = 0, it−1 = 0
0
p (φt )
it = 0, it−1 = 1.
Whilst the state transition p(it it−1 ) and p(i2 ) can
also in principle be learned on the basis of ML, we
Bayesian Conditional Cointegration
1
i2
i3
...
iT
φ2
φ3
...
φT
2
3
...
T
Figure 5. Belief network for the intermittent cointegration
model. Dashed edges to φt are absent when it = 1.
leave these quantities to be user specified. Note that
whilst φt can change with time, for computational
tractability we assume that the remaining parameters
α, β, σ 2 are fixed throughout time. The belief network
representation is given in figure 5.
The switching inference routine described in the following section relies on the recursive updates given in
appendix A, in which we use the uniform prior for t
at the start of each cointegrated segment.
5.1. Inference of i2:T , φ2:T
The regime-switching model with piecewise-constant φt
is an example of a changepoint model, in which a change
of regime drops the dependency of the continuous latent
variable φt on the past. The model is therefore an
example of the ‘reset model’ as set out by Bracegirdle
& Barber (2011), and we apply such results here. Exact
inference is then possible by applying recursions for
filtering (calculating each p(φt , it 1:t )) and correctionsmoothing (for p(φt , it 1:T )). For brevity, we show here
only some of the key considerations; a full derivation
is given in the supplementary material.
It is easy to show that both the filtered and smoothed
posteriors for φt in the case that it = 1 degenerate in
an intuitive way to
p(φt it = 1, 1:t ) = p(φt it = 1, 1:T ) = p1 (φt ) .
For the case it = 0, the posterior for φt is more complex
because of the temporal dependency. For filtering, the
posterior depends on the previous regime: in the event
that it−1 = 1, a new cointegration regime has begun,
and a Gaussian term is contributed to the posterior
in accordance with (2); otherwise, each component is
updated as for the simple cointegration case (1). We
therefore see that the posterior p(φt it = 0, 1:t ) is given
as a truncated mixture of Gaussian components.
For correction smoothing, it can be difficult to derive a
recursion analytically because the backwards-recursive
step requires a ‘dynamics reversal’ term that is calculated with the filtered posterior in the denominator. In
the case that the filtered posterior is a mixture distribution, the algebra is intractable. However, we appeal
to the result of Bracegirdle & Barber (2011) that by
indexing the components in the filtered posterior according to the number of observations since a switch
to cointegration, the smoothing recursion can be written exactly. The resulting recursion shows that, as we
may expect, a subset of the Gaussian components from
p(φt+1 it+1 = 0, 1:T ) are contributed to the posterior
p(φt it = 0, 1:T ) without change, along with the components from filtering p(φt it = 0, 1:t ) in the case that
the cointegration regime ends at t.
The discrete filtering and smoothing components,
p(it 1:t ) and p(it 1:T ), are also calculated as part of
the recursions. The result is an algorithm for exact
inference in this switching model that scales as T 2 .
5.2. Likelihood
It is useful to evaluate the likelihood in order to (i)
ensure that the likelihood is maximised, and (ii) provide
a convergence criterion. Fortunately the likelihood
is easy to calculate since the value is given by the
product of normalisation constants from each step of
the filtering recursion,
p(1:T ) = p(1 )
T
Y
p(t 1:t−1 ) = p(1 )
t=2
T
Y
Zt
t=2
where each Zt is calculated when filtering, see the
supplementary material.
5.3. Learning
EM is again used for parameter estimation in this
model. For this regime-switching problem, the latent
variables are h → {i2:T , φ2:T }, and the observations
remain as before, v → 1:T .
Terms relevant to the optimal solution are the sum of
quadratic forms derived in section 3.2 with varying φt ,
D
E
2
(t − φt t−1 ) = 2t − 2t t−1 hφt i + 2t−1 φ2t .
By retaining the first and second (non-central) moments
of each component found while filtering, the linear
system of equations for the regression parameters can
be solved exactly in this switching model, and the
variance estimate can be updated accordingly.
5.4. Point Estimate of φt
Whilst our model gives a distribution over φt for each
timepoint, in order to be able to compare our approach
Bayesian Conditional Cointegration
2.5
1
5.5
0.8
1
0.8
5
2
0.6
0.6
4.5
0.4
0.4
1.5
4
0.2
1
0.2
0
Sep 2010
Sep 2011
3.5
Sep 2010
0.4
1.2
Mar 2008
Mar 2008
0.8
1.6
0.6
1.4
0.6
0.4
1.2
0.4
0.2
1
0
0.8
1
0.2
0
Sep 2011
0.8
0
−0.2
0.2
−0.4
−0.6
0
Sep 2010
−0.2
Sep 2011
Sep 2010
Sep 2011
Figure 6. Results of learning for the Interconnector gas
prices—maintenance occurs each September. We show
(NW) the price series xt , yt ; (SW) residuals t calculated
with the final estimates for α, β; (NE) filtered (blue) and
smoothed (red) posterior for random walk it = 1; and (SE)
the maximum posterior marginal result for φt .
to other intermittent cointegration methods that only
give point estimates, we may take each
bit = arg max p(it 1:T )
it
and then calculate the posteriors p φt bi2:T , 1:T to
give the point estimates
φbt = arg max p φt bi2:T , 1:T .
φt
6. Experiments
We consider real-world applications for the intermittent
cointegration model. For these experiments, we ran the
inference and learning algorithm for the parameters θ =
{α, β, σ} initialised by OLS, and use the state transition
distributions fixed at values designed to match our a
priori belief about the cointegration regimes.
6.1. Gas Prices
The Interconnector, as noted in section 5, is a sub-sea
natural gas pipeline: we took for y UK gas prices6 and
for x the Zeebrugge prices7 . There are approximately
6
UK SAP natural gas prices were downloaded from
www.nationalgrid.com/uk/Gas/Data.
7
Prices for Zeebrugge are from www.apxendex.com and
were converted into kWh using 1 kWh=29.3072222 therm.
−0.2
Mar 2008
2
4
6
8
10
Figure 7. Results of learning for the Euro-area bond yields.
We show (NW) the yield series xt , yt ; (SW) residuals t
calculated with the final estimates for α, β; (NE) filtered
(blue) and smoothed (red) posterior for random walk it = 1;
and (SE) the convergence of parameters α, β—note the
relative change in the estimate for intercept α (green).
245 pricing days per year, and the pipeline closes annually for two weeks, so we specified the state transition
distribution accordingly. The algorithm reaches convergence within four minutes with parameters α, β that
show cointegration between the annual maintenance
period, see figure 6.
6.2. Euro-area Bond Yields
We consider possible cointegration between Greek and
German 10-year benchmark bond yields8 prior to the
Euro-area financial crisis. We use the cointegration
switching model to find regions of cointegration, which
we expect to hold until the yield on Greek debt spiralled as Greece’s debt burden took toll. The results
are shown in figure 7; inference and learning takes
roughly five minutes. This is an example for which,
over the time window shown in the figure, the data
do not show cointegration according to the classical
test (Dickey-Fuller test shows p-value 0.927241, and
does not reject the null hypothesis of random walk),
but the intermittent cointegration model does show a
segment of cointegration—the classical test passes in
the detected region, and fails for the remainder.
Whilst our approach is both flexible and simple, there
are limitations. In particular, the switching model
8
The bond yield data were obtained from Reuters.
Bayesian Conditional Cointegration
requires that the regions of cointegration are governed
by a time-invariant linear relationship. For example,
in the case that deviations from the relationship in
the random-walk segments are permanent, the model
presented here would struggle to properly estimate
a relationship since piecewise-constant values of the
constant term α would be required. Such considerations
provide opportunities for future research.
Gregory, A. W. and Hansen, B. E. Residual-based tests
for cointegration in models with regime shifts. Journal of Econometrics, 70(1):99–126, January 1996.
7. Discussion
Hatemi-J, A. Tests for cointegration with two unknown
regime shifts with an application to financial market
integration. Emp. Economics, 35(3):497–505, 2008.
We presented two novel techniques for estimation of a
linear cointegration relationship for time-series. First,
the method in section 3 allows estimation of a linear
relationship between variables and we showed that our
resulting algorithm is less likely to deliver a spurious
relationship than the classical OLS–unit root testing
approach. The benefit of our approach is that it results
in a fast O(T ) algorithm for testing cointegration. A
natural extension would be to consider a more complete
Bayesian analysis and marginalise over all parameters
in both the cointegration and random walk models.
Second, we developed a switching model to detect a
relationship and regimes in which that relationship
is a random walk. Whilst the model has an obvious
limitation (shared by other existing intermittent cointegration models) it has the benefit of fast exact inference,
scaling O(T 2 ). A further natural extension would be
to consider regimes in which the linear relationship can
also vary. A full derivation of inference for the switching
model is given in the supplementary material.
Acknowledgements
We thank Ricardo Silva for useful discussions.
References
Barber, D. Bayesian Reasoning and Machine Learning.
Cambridge University Press, 2012.
in econometrics. Journal of Econometrics, 2(2):111–
120, 1974.
Harris, R. and Sollis, R. Applied Time Series Modelling
and Forecasting. Wiley, 2003.
Kim, J. Y. Inference on Segmented Cointegration.
Econometric Theory, 19(4):620–639, 2003.
Koop, G. M., Strachan, R. W., Van Dijk, H., and
Villani, M. Bayesian approaches to cointegration. In
The Palgrave Handbook of Theoretical Econometrics,
pp. 871–898. Palgrave Macmillan, 2006.
A. Sequential inference of φ
Given a sequence of ‘observations’ 1:T we describe
here a method to sequentially update the posterior
distribution p(φ 1:T ). An extension of this inference
routine is used in the intermittent cointegration model
in section 5. We place an improper uniform prior
p(1 ) = U(1 R), representing our belief that 1 may
take any real value, and use a recursive update filtering
routine—see for example Barber (2012).
Initially, we begin with the prior p(φ) = U(φ (−1, 1)),
and then update the distribution by finding the
posterior after observing each t . For 1 , there
is no update to make since p(φ 1 ) ∝ p(φ) p(1 ).
Thereafter, p(φ 1:t ) ∝ p(t t−1 , φ) p(φ 1:t−1 ).
This can be calculated analytically since, if
p(φ 1:t−1 ) ∝ p(φ) N (φ ft−1 , Ft−1 ), then9 p(φ 1:t ) ∝
p(φ) N (φ ft , Ft ) where
ft =
Bracegirdle, C. and Barber, D. Switch-Reset Models :
Exact and Approximate Inference. In AISTATS,
volume 15. JMLR, 2011.
Dickey, D. A., Jansen, D. W., and Thornton, D. L.
A primer on cointegration with an application to
money and income. Federal Reserve Bank of St.
Louis Review, (Mar):58–78, 1991.
Granger, C. W. J. Developments in the study of cointegrated economic variables. Oxford Bulletin of Economics and Statistics, 48(3):213–228, 1986.
Granger, C. W. J. and Newbold, P. Spurious regressions
ft−1 σ 2 + t t−1 Ft−1
,
σ 2 + 2t−1 Ft−1
Ft =
σ2
σ 2 Ft−1
(1)
+ 2t−1 Ft−1
which on setting the initial10 f2 , F2 from the emission
1
2 σ 2
2
N 2 φ1 , σ =
N φ , 2
(2)
|1 |
1 1
defines a recursion for the parameters ft , Ft . After completing the updates, the required posterior p(φ 1:T ) is
given by a Gaussian distribution with mean fT and
covariance FT truncated to the interval (−1, 1).
9
Details of the derivation are omitted; recursions correspond to Kalman updates—see for example Barber (2012).
10
In the unlikely event that 1 = 0, the Gaussian term
arises from the first non-zero t−1 .
| 5cs.CE
|
A Note on the Practicality of
Maximal Planar Subgraph Algorithms
Markus Chimani1 , Karsten Klein2 , Tilo Wiedera1
arXiv:1608.07505v1 [cs.DS] 26 Aug 2016
1
University Osnabrück, Germany
{markus.chimani,tilo.wiedera}@uni-osnabrueck.de
2
Uni Konstanz, Germany
[email protected]
Abstract. Given a graph G, the NP-hard Maximum Planar Subgraph
problem (MPS ) asks for a planar subgraph of G with the maximum
number of edges. There are several heuristic, approximative, and exact
algorithms to tackle the problem, but—to the best of our knowledge—
they have never been compared competitively in practice.
We report on an exploratory study on the relative merits of the diverse
approaches, focusing on practical runtime, solution quality, and implementation complexity. Surprisingly, a seemingly only theoretically strong
approximation forms the building block of the strongest choice.
1
Introduction
We consider the problem of finding a large planar subgraph in a given non-planar
graph G = (V, E); n := |V |, m := |E|. We distinguish between algorithms that
find a large, maximal, or maximum such graph: while the latter (MPS) is one with
largest edge cardinality and NP-hard to find [18], a subgraph is inclusionwise
maximal if it cannot be enlarged by adding any further edge of G. Sometimes,
the inverse question—the skewness of G—is asked: find the smallest number
skew (G) of edges to remove, such that the remaining graph is planar.
The problem is a natural non-trivial graph property, and the probably best
known non-planarity measure next to crossing number. This already may be
reason enough to investigate its computation. Moreover, MPS/skewness arises
at the core of several other applications: E.g., the practically strongest heuristic
to draw G with few crossings—the planarization method [2, 7]3 —starts with a
large planar subgraph, and then adds the other edges into it.
Recognizing graphs of small skewness also plays a crucial role in parameterized complexity: Many problems become easier when considering a planar graph;
e.g., maximum flow can be computed in O(n log n) time, the Steiner tree problem allows a PTAS, the maximum cut can be found in polynomial time, etc. It
hence can be a good idea to (in a nutshell) remove a couple of edges to obtain
a planar graph, solve the problem on this subgraph, and then consider suitable
3
In contrast to this meaning, the MPS problem itself is also sometimes called planarization. We refrain from the latter use to avoid confusion.
2
Markus Chimani, Karsten Klein, Tilo Wiedera
modifications to the solution to accommodate for the previously ignored edges.
E.g., we can compute a maximum flow in time O(skew (G)3 · n log n) [13].
While solving MPS is NP-hard, there are diverse polynomial-time approaches
to compute a large or maximal planar subgraph, ranging from very trivial to
sophisticated. By Euler’s formula we know that already a spanning tree gives a
1/3-approximation for MPS. Hence all reasonable algorithms achieve this ratio.
Only the cactus algorithms (see below) are known to exhibit better ratios. We will
also consider an exact MPS algorithm based on integer linear programs (ILPs).
All algorithms considered in this paper are known (for quite some time, in
fact), and are theory-wise well understood both in terms of worst case solution
quality and running time. To our knowledge, however, they have never been
practically compared. In this paper we are in particular interested in the following quality measures, and their interplay:
– What is the practical difference in terms of running time?
– What is the practical difference in solution quality (i.e., subgraph density)?
– What is the implementation effort of the various approaches?
Overall, understanding these different quality measures as a multi-criteria setting, we can argue for each of the considered algorithms that it is pareto-optimal.
We are in particular interested in studying a somewhat “blurred” notion of
pareto-optimality: We want to investigate, e.g., in which situations the additional sophistication of algorithms gives “significant enough” improvements.4
Also the measure of “implementation complexity” is surprisingly hard to concisely define, and even in the field of software-engineers there is no prevailing
notion; “lines of code” are, for example, very unrelated to the intricacies of algorithm implementation. We will hence only argue in terms of direct comparisons
between pairs of algorithms, based on our experience when implementing them.5
As we will see in the next section, there are certain building blocks all algorithms require, e.g., a graph data structure and (except for C, see below) an
efficient planarity test. When discussing implementation complexity, it seems
safe to assume that a programmer will already start off with some kind of graph
library for her basic datastructure needs.6 In the context of the ILP-based approach, we assume that the programmer uses one of the various freely available
(or commercial) frameworks. Writing a competitive branch-and-cut framework
from ground up would require a staggering amount of knowledge, experience,
time, and finesse. The ILP method is simply not an option if the programmer
may not use a preexisting framework.
In the following section, we discuss our considered algorithms and their implementation complexity. In Section 3, we present our experimental study. We
4
5
6
Clearly, there is a systematic weakness, as it may be highly application-dependent
what one considers “significant enough”. We hence cannot universally answer this
question, but aim to give a guideline with which one can come to her own conclusions.
This measure is still intrinsically subjective (although we feel that the situation is
quite clear in most cases), and opinions may vary depending on the implementor’s
knowledge, experience, etc. We discuss these issues when they become relevant.
Many freely available graph libraries contain linear-time planarity tests. They usually
lack sophisticated algorithms for finding large planar subgraphs.
A Note on the Practicality of Maximal Planar Subgraph Algorithms
3
first consider the pure problem of obtaining a planar subgraph. Thereafter, we
investigate the algorithm choices when solving MPS as a subproblem in a typical
graph drawing setting—the planarization heuristic.
2
Algorithms
Naı̈ve Approach (Nı̈). The algorithmically simplest way to find a maximal planar
subgraph is to start with the empty graph and to insert each edge (in random
order) unless the planarity test fails. Given an O(n) time planarity test (we use
the algorithm by Boyer and Myrvold [3], which is also supposed to be among
the practically fastest), this approach requires O(nm) overall time.7
In our study, we consider a trivial multi-start variant that picks the best solution after several runs of the algorithm, each with a different randomized order.
The obvious benefit of this approach is the fact that it is trivial to understand
and implement—once one has any planarity test as a black box.
Augmented Planarity Test (BM, BM+). Planarity tests can be modified to allow
the construction of large planar subgraphs. We will briefly sketch these modifications in the context of the above mentioned O(n) planarity test by Boyer and
Myrvold [3]: In the original test, we start with a DFS tree and build the original
graph bottom-up; we incrementally add a vertex together with its DFS edges to
its children and the backedges from its decendents. The test fails if at least one
backedge cannot be embedded.
We can obtain a large (though in general not maximal) planar subgraph by
ignoring whether some backedges have not been embedded, and continuing with
the algorithm (BM). If we require maximality, we can use Nı̈ as a prostprocessing
to grow the obtained graph further (BM+). While this voids the linear runtime,
it will be faster than the pure naı̈ve approach. Given an implementation of the
planarity testing algorithm, the required modifications are relatively simple per
se—however, they are potentially hard to get right as the implementor needs to
understand side effects within the complex planarity testing implementation.
Alternatively, Hsu [14] showed how to overcome the lack of maximality directly within the planarity testing algorithm [19] (which is essentially equivalent
to [3]), retaining linear runtime. While this approach is the most promising in
terms of running time, it would require the most demanding implementation of
all approaches discussed in this paper (including the next subsection)—it means
to implement a full planarity testing algorithm plus intricate additional procedures. We know of no implementation of this algorithm.
Cactus Algorithm (C, C+). The only non-trivial approximation ratios are achieved
by two cactus-based algorithms [4]. Thereby, one starts with the disconnected
vertices of G. To obtain a ratio of 7/18 (C), we iteratively add triangles connecting formerly disconnected components. This process leaves a forest F of tree-like
7
We could speed-up the process in practice by starting with a spanning tree plus three
edges. However, there are instances where the initial inclusion of a spanning tree
prohibits the optimal solution and restricts one to approximation ratios ≤ 2/3 [8].
4
Markus Chimani, Karsten Klein, Tilo Wiedera
structures made out of triangles—cactusses. Finally, we make F connected by
adding arbitrary edges of E between disconnected components. Since this subgraph will not be maximal in general, we can use Nı̈ to grow it further (C+).
From the implementation point of view, this algorithm is very trivial and—
unless one requires maximality—does not even involve any planarity test. While
a bit more complex than the naı̈ve approach, it does not require modifications
to complex and potentially hard-to-understand planarity testing code like BM.
For the best approximation ratio of 4/9 one seeks not a maximal but a
maximum cactus forest. However, this approach is of mostly theoretical interest
as it requires non-trivial polynomial time matroid algorithms.
ILP Approach (ILP). Finally, we use an integer linear program (ILP) to solve
MPS exactly in reasonable (but formally non-polynomial) time, see [15]. With
binary variables for each edge, specifying whether it is in the solution, we have
nX
o
X
max
xe
xe ≤ |K|−1 for all Kuratowski subdivisions K ⊆ G .
e∈E
e∈K
Kuratowski’s theorem [17] states that a graph is planar if and only if it does
not contain a K5 or a K3,3 as a subdivision—Kuratowski subdivisions. Hence
we guarantee a planar solution by requiring to remove at least one edge in each
such subgraph K. While the set of these constraints is exponential in size, we
can separate them heuristically within a branch-and-cut framework, see [15]:
after each LP relaxation, we round the fractional solution and try to identify a
Kuratowski subdivision that leads to a violated constraint.
This separation in fact constitutes the central implementation effort. Typical planarity testing algorithms initially only answer yes or no. In the latter
case, however, all known linear-time algorithms can be extended to extract a
witness of non-planarity in the form of a Kuratowski subdivision in O(n) time.
If the available implementation does not support this additional query, it can
be simulated using O(n) calls to the planarity testing algorithm, by incrementally removing edges whenever the graph stays non-planar after the removal.
Both methods result in a straight-forward implementation (assuming some familiarity with ILP frameworks), but an additional tuning step to decide, e.g., on
rounding thresholds, is necessary. The overall complexity is probably somewhere
in-between C and BM. In our study, we decided to use the effective extraction
scheme described in [10] which gives several Kuratowski subdivions via a single
call. We propose, however, to use this feature only if it is already available in
the library: its implementation effort would otherwise be comparable to a full
planarity test, and in particular for harder instances its benefit is not significant.
3
Experiments
For an exploratory study we conducted experiments on several benchmark sets.
We summarize the results as follows—observe the inversion between F1 and F2.
F1. C+ yields the best solutions. Choosing a “well-growable” initial subgraph—
in our case a good cactus—is practically important. The better solution of
BM is a weak starting point for BM+; even Nı̈ gives clearly better solutions.
A Note on the Practicality of Maximal Planar Subgraph Algorithms
5
F2. BM gives better solutions than C; both are the by far fastest approaches.
Thus, if runtime is more crucial than maximality, we suggest to use BM.
F3. ILP only works for small graphs. Expander graphs (they are sparse but
well-connected) seem to be among the hardest instances for the approach.
F4. Larger planar subgraphs lead to fewer crossings for the planarization method.
However, this is much less pronounced with modern insertion methods.
Setup & Instances. All considered algorithms are implemented in C++ (g++ 5.3.1,
64bit, -O3) as part of OGDF [5], the ILP is solved via CPLEX 12.6. We use an
Intel Xeon E5-2430 v2, 2.50 GHz running Debian 8; algorithms use singles cores
out of twelve, with a memory limit of 4GB per process.
We use the non-planar graphs of the established benchmark sets North [12]
(423 instances), Rome [11] (8249), and SteinLib [16] (586), all of which include
real-world instances. In our plots, we group instances according to |V | rounded to
the nearest multiple of 10; for Rome we only consider graph with ≥ 25 vertices.
Additionally, we consider two artificial sets: BaAl [1] are scale-free graphs,
and Regular [20] (implemented as part of the OGDF) are random regular
graphs; they are expander graphs w.h.p. [folklore]. Both sets contain 20 instances
for each combination of |V | ∈ {102, 103 , 104 } and |E|/|V | ∈ {2, 3, 5, 10, 20}.
Evaluation. Our results confirm the need for heuristic approaches, as ILP solves
less than 25% of the larger graphs of the (comparably simple) Rome set within
10min. Even deploying strong preprocessing [6] (+PP) and doubling the computation time does not help significantly, cf. Fig. 1(d). Already 30-vertex graphs with
density 3, generated like Regular, cannot be solved within 48 hours (→F3).
We measure solution quality by the density (edges per vertices) of the computed planar subgraph. Independently of the benchmark set, C+ always achieves
the best solutions, cf. Fig. 1(a)(b)(table) (→F1). We know instances where Nı̈
is only a 1/3 approximation whereas the worst ratio known for BM+ is 2/3 [8].
Surprisingly, Nı̈ yields distinctly better solutions than BM+ in practice (→F1).
On SteinLib, BaAl, and Regular, both C and BM behave similar w.r.t.
solution quality. For Rome and North, however, BM yields solutions that are 20–
30% better, respectively (→F2). This discrepancy seems to be due the fact that
the found subgraphs are generally very sparse for both algorithms on BaAl and
Regular (average density of 1.1 and 1.2, respectively, for the largest graphs).
Both C and BM are extremly (and similarly) fast; Fig. 1(c)(table) (→F2).
For BM+ and C+, the Nı̈-postprocessing dominates the running time: Nı̈ is worst,
followed by C+ and BM+—a larger initial solution leads to fewer trys for growing.
Nonetheless, we observe that the (weaker) solution of C allows for significantly
more successful growing steps that BM (→F1).
Finally, we investigate the importance of the subgraph selection for the planarization method, cf. Fig. 1(e)(f). For the simplest insertion algorithms (iterative edge insertions, fixed embedding, no postprocessing, [2]), a strong subgraph
method (C+) is important; C leads to very bad solutions. For state-of-the-art insertion routines (simultaneous edge insertions, variable embedding, strong postprocessing, [7, 9]) the subgraph selection is less important; even C is feasible.
Markus Chimani, Karsten Klein, Tilo Wiedera
S (= constr. sparse): PUC, SP;
V (= VLSI): ALUE, ALUT, LIN, TAQ, DIW, DMXA, GAP, MSM, 1R, 2R
(b) North, solution quality relative to ILP
(over instances solved by ILP),
C = 0.76[0.64, 0.85]
density
20
15
10
1.2
5
1.15
40
60
80
relative density
BM
BM+
C+
Nı̈
# instances (×100)
(a) Rome, solution quality,
C = 1.02[1.01, 1.06]
1.25
0
100
1
80
0.98
60
BM
BM+
C+
Nı̈
0.96
0.94
0.92
50
# vertices
3
15
2
10
1
5
60
80
100
success-rate
runtime [ms]
20
# instances (×100)
25
BM+
C+
Nı̈
40
20
0.75
15
0.5
0.25
0
0
10
ILP, 10min
ILP+PP, 10min
ILP+PP, 20min
40
10
5
5
40
60
80
# vertices
100
0
no. of crossings, relative to best (∆%)
15
# instances (×100)
no. of crossings, relative to best (∆%)
20
BM
BM+
C+
Nı̈
10
0
60
5
80
100
0
# vertices
(e) Rome, simple planarization,
C = 102[61, 173]
15
0
1
# vertices
20
20
(d) Rome, success-rate of ILP
5
0
100
40
# vertices
(c) Rome, running time,
BM ≈ 0, C ≈ 0
4
Regular
2
3
4
.00 .02
2
.03 4.60 236
.00 .01
1
.04 5.34 217
.04 4.85 252
# instances
†
relative to best
runtime [s]
BaAl
Regular
SteinLib
BaAl
2 3 4 2 3 4
B-E
I*
S
V
2
3
4
.72 .64 .66 .82 .84 .95
.06
.07 .01
.11 .00
.02
1
.85 .74 .73 .89 .89 .97 47.34 8.85 2.70 90.97 .06 10.57 143
.60 .68 .75 .74 .88 .95
.04
.04 .01
.07 .00
.01
0
1.0 1.0 1.0 1.0 1.0 1.0 9.19 16.22 3.13 16.35 .06 12.32 152
.96 .94 .92 .92 .91 .97 49.38 28.59 2.43 95.08 .05 7.92 239
# instances (×100)
density,
SteinLib
B-E I* S† V†
BM .86 .85 .82 .84
BM+ .90 .90 .88 .86
C
.84 .67 .81 .87
C+ 1.0 1.0 1.0 1.0
Nı̈ .92 .98 .91 .91
(f ) Rome, state-of-the-art planarization
BM
BM+
C
C+
Nı̈
10
7.5
5
15
10
2.5
0
20
5
40
60
80
100
# instances (×100)
6
0
# vertices
Fig. 1. We may omit algorithms whose values are unsuitable for a plot; instead we
give their average[min, max] in the caption.
A Note on the Practicality of Maximal Planar Subgraph Algorithms
7
References
1. BarabasiAlbertGenerator of the java universal network/graph framework,
jung.sourceforge.net
2. Batini, C., Talamo, M., Tamassia, R.: Computer aided layout of entity relationship
diagrams. Journal of Systems and Software 4(2-3), 163–173 (1984)
3. Boyer, J.M., Myrvold, W.J.: On the cutting edge: Simplified O(n) planarity by
edge addition. J. Graph Algorithms Appl. 8(2), 241–273 (2004)
4. Călinescu, G., Fernandes, C., Finkler, U., Karloff, H.: A better approximation
algorithm for finding planar subgraphs. J. Algorithms 27, 269–302 (1998)
5. Chimani, M., Gutwenger, C., Jünger, M., Klau, G.W., Klein, K., Mutzel, P.:
The open graph drawing framework (OGDF). In: Tamassia, R. (ed.) Handbook
of Graph Drawing and Visualization, chap. 17, pp. 543–569. CRC Press (2014),
www.ogdf.net
6. Chimani, M., Gutwenger, C.: Non-planar core reduction of graphs. Discrete Mathematics 309(7), 1838–1855 (2009)
7. Chimani, M., Gutwenger, C.: Advances in the planarization method: Effective multiple edge insertions. J. Graph Algorithms Appl. 16(3), 729–757 (2012)
8. Chimani, M., Hedtke, I., Wiedera, T.: Limits of greedy approximation algorithms
for the maximum planar subgraph problem. In: Proc. Int’l Workshop on Combinatorial Algorithms (IWOCA) 2016. LNCS (2016), to appear
9. Chimani, M., Hlinený, P.: Inserting multiple edges into a planar graph. CoRR
abs/1509.07952 (2015), http://arxiv.org/abs/1509.07952
10. Chimani, M., Mutzel, P., Schmidt, J.M.: Efficient extraction of multiple kuratowski
subdivisions. In: Graph Drawing, 15th Int’l Symposium, GD 2007, Sydney, Australia, September 24-26, 2007. Revised Papers. pp. 159–170 (2007)
11. Di Battista, G., Garg, A., Liotta, G., Tamassia, R., Tassinari, E., Vargiu, F.: An
experimental comparison of four graph drawing algorithms. Computational Geometry 7(56), 303–325 (1997)
12. Di Battista, G., Garg, A., Liotta, G., Parise, A., Tassinari, R., Tassinari, E., Vargiu,
F., Vismara, L.: Drawing directed acyclic graphs: An experimental study. Int’l J.
of Computational Geometry & Applications 10(06), 623–648 (2000)
13. Hochstein, J.M., Weihe, K.: Maximum s-t-flow with k crossings in O(k3 n log n).
In: Proc. SODA 2007. pp. 843–847. ACM-SIAM (2007)
14. Hsu, W.: A linear time algorithm for finding a maximal planar subgraph based on
PC-trees. LNCS, vol. 3595, pp. 787–797. Springer (2005)
15. Jünger, M., Mutzel, P.: Maximum planar subgraphs and nice embeddings: Practical
layout tools. Algorithmica 16(1), 33–59 (1996)
16. Koch, T., Martin, A., Voß, S.: SteinLib: An updated library on steiner tree problems in graphs. Tech. Rep. ZIB-Report 00-37, Konrad-Zuse-Zentrum für Informationstechnik Berlin (2000), http://elib.zib.de/steinlib
17. Kuratowski, C.: Sur le problme des courbes gauches en topologie. Fundamenta
Mathematicae 15(1), 271–283 (1930)
18. Liu, P.C., Geldmacher, R.C.: On the deletion of nonplanar edges of a graph. In:
Proc. 10th Southeastern Conf. on Combinat., Graph Theory and Comput. pp.
727–738. Congress. Numer., XXIII–XXIV, Utilitas Math., Winnipeg, Man. (1979)
19. Shih, W., Hsu, W.: A new planarity test. Theor. Comput. Sci. 223(1-2), 179–191
(1999)
20. Steger, A., Wormald, N.C.: Generating random regular graphs quickly. Combinatorics, Probability & Computing 8(4), 377–396 (1999)
| 8cs.DS
|
arXiv:1801.08350v1 [cs.LO] 25 Jan 2018
THEORY OF HIGHER ORDER INTERPRETATIONS AND APPLICATION TO BASIC
FEASIBLE FUNCTIONS
EMMANUEL HAINRY AND ROMAIN PÉCHOUX
Inria project Mocqua, CNRS, and Université de Lorraine, LORIA
e-mail address: [email protected]
Inria project Mocqua, CNRS, and Université de Lorraine, LORIA
e-mail address: [email protected]
A BSTRACT. Interpretation methods and their restrictions to polynomials have been deeply used to
control the termination and complexity of first-order term rewrite systems. This paper extends interpretation methods to a pure higher order functional language. We develop a theory of higher order
functions that is well-suited for the complexity analysis of this programming language. The interpretation domain is a complete lattice and, consequently, we express program interpretation in terms
of a least fixpoint. As an application, by bounding interpretations by higher order polynomials, we
characterize Basic Feasible Functions at any order.
1. INTRODUCTION
1.1. Higher order interpretations. This paper introduces a theory of higher order interpretations.
These interpretations are an extension of usual (polynomial) interpretation methods introduced in [MN70,
Lan79] and used to show the termination of (first order) term rewrite systems [CMPU05, CL92] or
to study their complexity [BMM11].
This theory is a novel and uniform extension to higher order functional programs: the definition works at any order on a simple programming language, where interpretations can be elegantly
expressed in terms of a least fixpoint, and no extra constraints are required.
The language has only one semantics restriction: its reduction strategy is enforced to be leftmost outermost as interpretations are non decreasing functions. Similarly to first order interpretations, higher order interpretations ensure that each reduction step corresponds to a strict decrease.
Consequently, some of the system properties could be lost if a reduction occurs under a context.
This work has been partially supported by ANR Project ELICA ANR-14-CE25-0005.
LOGICAL METHODS
IN COMPUTER SCIENCE
DOI:10.2168/LMCS-???
1
© E. Hainry and R. Péchoux
Creative Commons
2
E. HAINRY AND R. PÉCHOUX
1.2. Application to higher order polynomial time. As Church-Turing’s thesis does not hold at
higher order, distinct and mostly pairwise uncomparable complexity classes are candidates as a natural equivalent of the notion of polynomial time computation for higher order.
The class of polynomially computable real functions by Ko [Ko91] and the class of Basic Feasible Functional at order 𝑖 (BFF𝑖 ) by Irwin, Kapron and Royer [IKR02] belong to the most popular
definitions for such classes. In [Ko91] polynomially computable real functions are defined in terms
of first order functions over real numbers. They consist in order 2 functions over natural numbers
and an extension at any order is proposed by Kawamura and Cook in [KC10]. The main distinctions
between these two models are the following:
∙ the paper [Ko91] deals with representation of real numbers as input while the paper [IKR02]
deals with general functions as input,
∙ the paper [Ko91] deals with the number of steps needed to produce an output at a given precision while the paper [IKR02] deals with the number of reduction steps needed to evaluate
the program.
Moreover, it was shown in [IKR02] and [Fér14] that the classes BFF𝑖 cannot capture some functions that could be naturally considered to be polynomial time computable because they do not take
into account the size of their higher order arguments. However they have been demonstrated to be
robust, they characterize exactly the well-known class FPTIME and BFF at order 1 and order 2, and
have already been characterized in various ways, e.g. [CK89].
The current paper provides a characterization of the BFF𝑖 classes as they deal with discrete
data as input and they are consequently more suited to be studied with respect to usual functional
languages. This result was expected to hold as it is known for a long time that (first order) polynomial
interpretations characterize polynomial time (that is BFF1 ) and as it is shown in [FHHP15] that (first
order) polynomial interpretations on stream programs characterize BFF2 .
1.3. Related works. The present paper is an extended version of the results in [HP17]: more proofs
and examples have been provided. An erratum has been provided: the interpretation of the case
construct has been slightly modified so that we can consider non decreasing functions (and not only
strictly increasing functions).
There are two lines of work that are related to our approach. In [VdP93], Van De Pol introduced higher order interpretation for showing the termination of higher order term rewrite systems.
In [BL12, BL16], Baillot and Dal Lago introduce a higher order interpretations for complexity analysis of term rewrite systems. While the first work only deals with termination properties, the second
work is restricted to a family of higher order term rewrite systems called simply typed term rewrite
systems.
1.4. Outline. In Section 2, the syntax and semantics of the functional language are introduced. The
new notion of higher order interpretation and its properties are described in Section 3. Next, in Section 4, we briefly recall the BFF𝑖 classes and their main characterizations, including a characterization
based on the BTLP programming language of [IKR02]. Section 5 is devoted to the characterization
of these classes using higher order polynomials. The soundness relies on interpretation properties: the reduction length is bounded by the interpretation of the initial term. The completeness is
demonstrated by simulating a BTLP procedure: compiling procedures to terms after applying some
program transformations. In Section 6, we briefly discuss the open issues and future works related
to higher order interpretations.
INSTRUCTIONS
2. FUNCTIONAL
3
LANGUAGE
2.1. Syntax. The considered programming language consists in a unpure lambda calculus with constructors, primitive operators, a 𝚌𝚊𝚜𝚎 construct for pattern matching and a 𝚕𝚎𝚝𝚁𝚎𝚌 instruction for
function definitions that can be recursive. It is as an extension of PCF to inductive data types.
The set of terms of the language is generated by the following grammar:
𝙼, 𝙽 ∶∶= 𝚡 | 𝚌 | 𝚘𝚙 | 𝚌𝚊𝚜𝚎 𝙼 𝚘𝚏 𝚌1 (⃖⃖⃖
𝚡⃗1 ) → 𝙼1 , ..., 𝚌𝑛(⃖⃖⃖
𝚡⃗𝑛 ) → 𝙼𝑛 | 𝙼 𝙽 | 𝜆𝚡.𝙼 | 𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼,
where 𝚌, 𝚌1 , ⋯ , 𝚌𝑛 are constructor symbols of fixed arity and 𝚘𝚙 is an operator of fixed arity.
Given a constructor or operator symbol 𝑏, we write 𝑎𝑟(𝑏) = 𝑛 whenever 𝑏 is of arity 𝑛. 𝚡, 𝚏 are
variables in and 𝚡⃖⃖⃗𝑖 is a sequence of 𝑎𝑟(𝚌𝑖 ) variables.
The free variables 𝐹 𝑉 (𝙼) of a term 𝙼 are defined as usual. Bounded variables are assumed to
have distinct names in order to avoid name clashes. A closed term is a term 𝙼 with no free variables,
𝐹 𝑉 (𝙼) = ∅.
A substitution {𝙽1 ∕𝚡1 , ⋯ , 𝙽𝑛 ∕𝚡𝑛 } is a partial function mapping variables 𝚡1 , ⋯ , 𝚡𝑛 to terms 𝙽1 , ⋯ , 𝙽𝑛 .
The result of applying the substitution {𝙽1 ∕𝚡1 , ⋯ , 𝙽𝑛 ∕𝚡𝑛 } to a term 𝙼 is noted 𝙼{𝙽1 ∕𝚡1 , ⋯ , 𝙽𝑛 ∕𝚡𝑛 }
⃖⃗ 𝚡⃗} when the substituting terms are clear from the context.
or 𝙼{𝙽∕⃖
2.2. Semantics. Each primitive operator 𝚘𝚙 of arity 𝑛 has a corresponding semantics J𝚘𝚙K fixed by
the language implementation, a total function from 𝑛 to .
We define the following relations between two terms of the language:
∙ 𝛽-reduction: 𝜆𝚡.𝙼 𝙽 →𝛽 𝙼{𝙽∕𝚡},
⃖⃖⃖⃗𝑗 ) of … 𝚌𝑗 (⃖⃖⃖
⃖⃖⃖⃗𝑗 ∕⃖⃖⃖
∙ pattern matching: case 𝚌𝑗 (𝙽
𝚡⃗𝑗 ) → 𝙼𝑗 … →𝚌𝚊𝚜𝚎 𝙼𝑗 {𝙽
𝚡⃗𝑗 },
∙ operator evaluation: 𝚘𝚙 𝙼1 … 𝙼𝑛 →𝚘𝚙 J𝚘𝚙K(𝙼1 , … , 𝑀𝑛 ),
∙ fixpoint evaluation: 𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼 →𝚕𝚎𝚝𝚁𝚎𝚌 𝙼{𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼∕𝚏},
We extend these relations by: if 𝙼 →𝛼 𝙽 then case 𝙼 of … →𝛼 case 𝙽 of … , with 𝛼 ∈
{𝛽, 𝚌𝚊𝚜𝚎, 𝚕𝚎𝚝𝚁𝚎𝚌, 𝚘𝚙}.
Let ⇒ be the left-most outermost evaluation strategy with respect to, →{𝛽,𝚌𝚊𝚜𝚎,𝚕𝚎𝚝𝚁𝚎𝚌,𝚘𝚙} . Let ⇒𝑘
be the k-fold self composition of the relation ⇒. Moreover, let |𝙼 ⇒𝑘 𝙽| be the number of reductions
distinct from →𝚘𝚙 in a given a derivation 𝙼 ⇒𝑘 𝙽. |𝙼 ⇒𝑘 𝙽| ≤ 𝑘 always holds. J𝙼K is a notation for
the term computed by 𝙼 (if it exists), i.e. ∃𝑘, 𝙼 ⇒𝑘 J𝙼K and ∄𝙽, J𝙼K ⇒ 𝙽.
A (first order) value 𝚟 is defined inductively by either 𝚟 = 𝚌, if 𝑎𝑟(𝚌) = 0, or 𝚟 = 𝚌 𝚟⃖⃗, for
𝑎𝑟(𝚌) > 0 values 𝚟⃖⃗, otherwise.
2.3. Type system. Let B be a set of basic inductive types b described by their constructor symbol
set b .
The set of simple types is defined by:
𝚃 ∶∶= b | 𝚃 ⟶ 𝚃,
with b ∈ B.
As usual ⟶ associates to the right.
Example 2.1. The type of unary numbers 𝙽𝚊𝚝 can be described by 𝙽𝚊𝚝 = {0, +𝟷}, 0 being a
constructor symbol of 0-arity and +𝟷 being a constructor symbol of 1-arity.
For any type 𝑇 , [𝑇 ] is the base type for lists of elements of type 𝚃 and has constructor symbol
set [𝚃] = {𝚗𝚒𝚕, 𝚌}, 𝚗𝚒𝚕 being a constructor symbol of 0-arity and 𝚌 being a constructor symbol of
2-arity.
4
E. HAINRY AND R. PÉCHOUX
Γ(𝚡) = 𝚃
(Var)
Γ; Δ ⊢ 𝚡 ∶∶ 𝚃
Δ(𝚌) = 𝚃
(Cons)
Γ; Δ ⊢ 𝚌 ∶∶ 𝚃
Δ(𝚘𝚙) = 𝚃
(Op)
Γ; Δ ⊢ 𝚘𝚙 ∶∶ 𝚃
Γ; Δ ⊢ 𝙼 ∶∶ 𝚃1 ⟶ 𝚃2 Γ; Δ ⊢ 𝙽 ∶∶ 𝚃1
(App)
Γ; Δ ⊢ 𝙼 𝙽 ∶∶ 𝚃2
Γ, 𝚡 ∶∶ 𝚃1 ; Δ ⊢ 𝙼 ∶∶ 𝚃2
(Abs)
Γ; Δ ⊢ 𝜆𝚡.𝙼 ∶∶ 𝚃1 → 𝚃2
Γ, 𝚏 ∶∶ 𝚃; Δ ⊢ 𝙼 ∶∶ 𝚃
(Let)
Γ; Δ ⊢ 𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼 ∶∶ 𝚃
Γ; Δ ⊢ 𝙼 ∶∶ b
Γ; Δ ⊢ 𝚌𝑖 ∶∶ b⃖⃖⃗𝑖 ⟶ b Γ, 𝚡⃖⃖⃗𝑖 ∶∶ b⃖⃖⃗𝑖 ; Δ ⊢ 𝙼𝑖 ∶∶ 𝚃 (1 ≤ 𝑖 ≤ 𝑚)
(Case)
Γ; Δ ⊢ 𝚌𝚊𝚜𝚎 𝙼 𝚘𝚏 𝚌1 (⃖⃖⃖
𝚡⃗1 ) → 𝙼1 , ..., 𝚌𝑛 (⃖⃖⃖
𝚡⃗𝑛 ) → 𝙼𝑛 ∶∶ 𝚃
Figure 1: Type system
The type system is described in Figure 1 and proves judgments of the shape Γ; Δ ⊢ 𝙼 ∶∶ 𝚃
meaning that the term 𝙼 has type 𝚃 under the variable and constructor symbol contexts Γ and Δ
respectively ; a variable (a constructor, respectively) context being a partial function that assigns
types to variables (constructors and operators, respectively).
As usual, the input type and output type of constructors and operators of arity 𝑛 will be restricted
to basic types. Consequently, their types are of the shape b1 ⟶ … ⟶ b𝑛 ⟶ b. A well-typed
term will consist in a term 𝙼 such that ∅; Δ ⊢ 𝙼 ∶∶ 𝚃 (Consequently, it is mandatory for a term to be
closed in order to be well-typed).
In what follows, we will consider only well-typed terms. The type system assigns types to all
the syntactic constructions of the language and ensures that a program does not go wrong. Notice
that the typing discipline does not prevent a program from diverging.
Definition 2.2 (Order). Given a term 𝙼 of type 𝚃, i.e. ∅; Δ ⊢ 𝙼 ∶∶ 𝚃, the order of 𝙼, noted 𝚘𝚛𝚍(𝙼),
is equal to the order of 𝚃, noted 𝚘𝚛𝚍(𝚃) and defined inductively by:
if b ∈ B,
𝚘𝚛𝚍(b) = 0,
′
′
𝚘𝚛𝚍(𝚃 ⟶ 𝚃 ) = max(𝚘𝚛𝚍(𝚃) + 1, 𝚘𝚛𝚍(𝚃 ))
otherwise.
Example 2.3. Consider the following term 𝙼 that maps a function to a list given as inputs:
𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝜆g.𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌 (g 𝚢) (𝚏 g 𝚣),
𝚗𝚒𝚕 → 𝚗𝚒𝚕
Let [𝙽𝚊𝚝] is the base type for lists of natural numbers of constructor symbol set [𝙽𝚊𝚝] = {𝚗𝚒𝚕, 𝚌}.
The term 𝙼 can be typed by ∅; Δ ⊢ 𝙼 ∶∶ (𝙽𝚊𝚝 ⟶ 𝙽𝚊𝚝) ⟶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝], , as illustrated by the
following typing derivation:
INSTRUCTIONS
5
⋯
(App)
⋯
Γ′ ; Δ ⊢ (g 𝚢) ∶∶ 𝙽𝚊𝚝
⋯
(App)
(App)
′
′
⋯
Γ ; Δ ⊢ 𝚌 (g 𝚢) ∶∶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝]
Γ ; Δ ⊢ (𝚏 g 𝚣) ∶∶ [𝙽𝚊𝚝]
(App)
⋯
Γ, 𝚢 ∶∶ 𝙽𝚊𝚝, 𝚣 ∶∶ [𝙽𝚊𝚝]; Δ ⊢ 𝚌 (g 𝚢) (𝚏 g 𝚣) ∶∶ [𝙽𝚊𝚝]
(Case)
Γ, 𝚡 ∶∶ [𝙽𝚊𝚝]; Δ ⊢ 𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌 (g 𝚢) (𝚏 g 𝚣), 𝚗𝚒𝚕 → 𝚗𝚒𝚕 ∶∶ [𝙽𝚊𝚝]
(Abs)
Γ; Δ ⊢ 𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌 (g 𝚢) (𝚏 g 𝚣), 𝚗𝚒𝚕 → 𝚗𝚒𝚕 ∶∶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝]
(Abs)
𝚏 ∶∶ 𝚃; Δ ⊢ 𝜆g.𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌 (g 𝚢) (𝚏 g 𝚣), 𝚗𝚒𝚕 → 𝚗𝚒𝚕 ∶∶ 𝚃
(Let)
∅; Δ ⊢ 𝙼 ∶∶ (𝙽𝚊𝚝 ⟶ 𝙽𝚊𝚝) ⟶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝]
where with 𝚃 is a shorthand notation for (𝙽𝚊𝚝 ⟶ 𝙽𝚊𝚝) ⟶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝], where the derivation
of the base case 𝚗𝚒𝚕 has been omitted for readability and where the contexts Δ, Γ, Γ′ are such that
Δ(𝚌) = 𝙽𝚊𝚝 ⟶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝], Δ(𝚗𝚒𝚕) = [𝙽𝚊𝚝] and Γ = 𝚏 ∶∶ 𝚃, g ∶∶ 𝙽𝚊𝚝 ⟶ 𝙽𝚊𝚝 and
Γ′ = Γ, 𝚢 ∶∶ 𝙽𝚊𝚝, 𝚣 ∶∶ [𝙽𝚊𝚝]. Consequently, the order of 𝙼 is equal to 2, i.e. 𝚘𝚛𝚍(𝙼) = 2.
3. INTERPRETATIONS
3.1. Interpretations of types. We briefly recall some basic definitions that are very close from the
notions used in denotational semantics (See [Win93]) since, as we shall see later, interpretations can
be defined in terms of fixpoints. Let (ℕ, ≤, ⊔, ⊓) be the set of natural numbers equipped with the
usual ordering ≤, a max operator ⊔ and min operator ⊓ and let ℕ be ℕ ∪ {⊤}, where ⊤ is the greatest
element satisfying ∀𝑛 ∈ ℕ, 𝑛 ≤ ⊤, 𝑛 ⊔ ⊤ = ⊤ ⊔ 𝑛 = ⊤ and 𝑛 ⊓ ⊤ = ⊤ ⊓ 𝑛 = 𝑛.
The interpretation of a type is defined inductively by:
if b is a basic type,
⦇b⦈ = ℕ,
′
↑
′
⦇𝚃 ⟶ 𝚃 ⦈ = ⦇𝚃⦈ ⟶ ⦇𝚃 ⦈,
otherwise,
where ⦇𝚃⦈ ⟶↑ ⦇𝚃′ ⦈ denotes the set of total non decreasing functions from ⦇𝚃⦈ to ⦇𝚃′ ⦈. A function
𝐹 from the set 𝐴 to the set 𝐵 being non decreasing if for each 𝑋, 𝑌 ∈ 𝐴, 𝑋 ≤𝐴 𝑌 implies 𝐹 (𝑋) ≤𝐵
𝐹 (𝑌 ), where ≤𝐴 is the usual pointwise ordering induced by ≤ and defined by:
𝑛 ≤ℕ 𝑚 iff 𝑛 ≤ 𝑚
𝐹 ≤𝐴⟶↑ 𝐵 𝐺 iff ∀𝑋 ∈ 𝐴, 𝐹 (𝑋) ≤𝐵 𝐺(𝑋)
Example 3.1. The type 𝚃 = (𝙽𝚊𝚝 ⟶ 𝙽𝚊𝚝) ⟶ [𝙽𝚊𝚝] ⟶ [𝙽𝚊𝚝] of the term 𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼 in
Example 2.3 is interpreted by:
⦇𝚃⦈ = (ℕ ⟶↑ ℕ) ⟶↑ (ℕ ⟶↑ ℕ).
⃖⃖⃗ of 𝑚 terms in the interpretation domain and a sequence 𝚃⃖⃗
In what follows, given a sequence 𝐹
⃖⃖⃖⃖⃖
⃗
⃖⃖
⃗
of 𝑘 types, the notation 𝐹 ∈ ⦇𝚃⦈ means that both 𝑘 = 𝑚 and ∀𝑖 ∈ [1, 𝑚], 𝐹𝑖 ∈ ⦇𝚃𝑖 ⦈.
6
E. HAINRY AND R. PÉCHOUX
3.2. Interpretations of terms. Each closed term of type 𝚃 will be interpreted by a function in ⦇𝚃⦈.
The application is denoted as usual whereas we use the notation Λ for abstraction on this function
space in order to avoid confusion between terms of our calculus and objects of the interpretation
domain. Variables of the interpretation domain will be denoted using upper case letters. When
needed, Church typing discipline will be used in order to highlight the type of the bound variable in
a lambda abstraction.
An important distinction between the terms of the language and the objects of the interpretation
domain lies in the fact that beta-reduction is considered as an equivalence relation on (closed terms
of) the interpretation domain, i.e. Λ𝑋.𝐹 𝐺 = 𝐹 {𝐺∕𝑋} underlying that Λ𝑋.𝐹 𝐺 and 𝐹 {𝐺∕𝑋}
are distinct notations that represent the same higher order function. The same property holds for
𝜂-reduction, i.e. Λ𝑋.𝐹 𝑋 and 𝐹 denote the same function.
In order to obtain complete lattices, each type ⦇𝚃⦈ has to be completed by a lower bound ⊥⦇𝚃⦈
and an upper bound ⊤⦇𝚃⦈ as follows:
⊥ℕ = 0
⊤ℕ = ⊤
⊥⦇𝚃⟶𝚃′ ⦈ = Λ𝑋 ⦇𝚃⦈ .⊥⦇𝚃′ ⦈
⊤⦇𝚃⟶𝚃′ ⦈ = Λ𝑋 ⦇𝚃⦈ .⊤⦇𝚃′ ⦈
Lemma 3.2. For each 𝚃 and for each 𝐹 ∈ ⦇𝚃⦈, ⊥⦇𝚃⦈ ≤⦇𝚃⦈ 𝐹 ≤⦇𝚃⦈ ⊤⦇𝚃⦈ .
Proof. By induction on types.
Notice that for each type 𝚃 it also holds that ⊤⦇𝚃⦈ ≤⦇𝚃⦈ ⊤⦇𝚃⦈ , by an easy induction.
In the same spirit, max and min operators ⊔ (and ⊓) over ℕ can be extended to higher order
functions 𝐹 , 𝐺 of any arbitrary type ⦇𝚃⦈ ⟶↑ ⦇𝚃′ ⦈ by:
⊔⦇𝚃⦈⟶
↑ ⦇𝚃′ ⦈
(𝐹 , 𝐺) = Λ𝑋 ⦇𝚃⦈ . ⊔⦇𝚃 ⦈ (𝐹 (𝑋), 𝐺(𝑋))
′
⊓⦇𝚃⦈⟶
↑ ⦇𝚃′ ⦈
(𝐹 , 𝐺) = Λ𝑋 ⦇𝚃⦈ . ⊓⦇𝚃 ⦈ (𝐹 (𝑋), 𝐺(𝑋))
′
In the following, we use the notations ⊥, ⊤, ≤, <, ⊔ and ⊓ instead of ⊥⦇𝚃⦈ , ⊤⦇𝚃⦈ , ≤⦇𝚃⦈ , <⦇𝚃⦈ , ⊔⦇𝚃⦈ and
⊓⦇𝚃⦈ , respectively, when ⦇𝚃⦈ is clear from the typing context. Moreover, given a boolean predicate
𝑃 on functions, we will use the notation ⊔𝑃 {𝐹 } as a shorthand notation for ⊔{𝐹 | 𝑃 }.
Lemma 3.3. For each type 𝚃, (⦇𝚃⦈, ≤, ⊔, ⊓, ⊤, ⊥) is a complete lattice.
Proof. Consider a subset 𝑆 of elements in ⦇𝚃⦈ and define ⊔𝑆 = ⊔𝐹 ∈𝑆 𝐹 . By definition, we have
𝐹 ≤ ⊔𝑆, for any 𝐹 ∈ 𝑆. Now consider some 𝐺 such that for all 𝐹 ∈ 𝑆, 𝐹 ≤ 𝐺. We have ∀𝐹 ∈ 𝑆,
∀𝑋, 𝐹 (𝑋) ≤ 𝐺(𝑋). Consequently, ∀𝑋, 𝑆(𝑋) = ⊔𝐹 ∈𝑆 𝐹 (𝑋) ≤ 𝐺(𝑋) and 𝑆 is a supremum. The
same holds for the infimum.
Now we need to define a unit (or constant) cost function for any interpretation of type 𝚃 in order
to take the cost of recursive calls into account. For that purpose, let + denote natural number addition
extended to ℕ by ∀𝑛, ⊤ + 𝑛 = 𝑛 + ⊤ = ⊤. For each type ⦇𝚃⦈, we define inductively a dyadic sum
function ⊕⦇𝚃⦈ by:
𝑋 ℕ ⊕ℕ 𝑌 ℕ = 𝑋 + 𝑌
𝐹 ⊕⦇𝚃⟶𝚃′ ⦈ 𝐺 = Λ𝑋 ⦇𝚃⦈ .(𝐹 (𝑋) ⊕⦇𝚃′ ⦈ 𝐺(𝑋))
INSTRUCTIONS
7
Let us also define the constant function 𝑛⦇𝚃⦈ , for each type 𝚃 and each integer 𝑛 ≥ 1, by:
𝑛ℕ = 𝑛
𝑛⦇𝚃⟶𝚃′ ⦈ = Λ𝑋 ⦇𝚃⦈ .𝑛⦇𝚃′ ⦈
Once again, we will omit the type when it is unambiguous using the notation 𝑛⊕ to denote the
function 𝑛⦇𝚃⦈ ⊕⦇𝚃⦈ when ⦇𝚃⦈ is clear from the typing context.
For each type ⦇𝚃⦈, we can define a strict ordering < by: 𝐹 < 𝐺 whenever 1 ⊕ 𝐹 ≤ 𝐺.
Definition 3.4. A variable assignment, denoted 𝜌, is a map associating to each 𝚏 ∈ of type 𝚃 a
variable 𝐹 of type ⦇𝚃⦈.
Now we are ready to define the notions of variable assignment and interpretation of a term 𝙼:
Definition 3.5 (Interpretation). Given a variable assignment 𝜌, an interpretation is the extension of
𝜌 to well-typed terms, mapping each term of type 𝚃 to an object in ⦇𝚃⦈ and defined by:
∙ ⦇𝚏⦈𝜌 = 𝜌(𝚏), if 𝚏 ∈ ,
∙ ⦇𝚌⦈𝜌 = 1 ⊕ (Λ𝑋1 . … .Λ𝑋𝑛 .
∙ ⦇𝙼𝙽⦈𝜌 = ⦇𝙼⦈𝜌 ⦇𝙽⦈𝜌 ,
∑𝑛
𝑖=1 𝑋𝑖 ),
if 𝑎𝑟(𝚌) = 𝑛,
∙ ⦇𝜆𝚡.𝙼⦈𝜌 = 1 ⊕ (Λ⦇𝚡⦈𝜌 .⦇𝙼⦈𝜌 ),
∙ ⦇case 𝙼 of … 𝚌𝑗 (⃖⃖⃖
𝚡⃗𝑗 ) → 𝙼𝑗 …⦈𝜌 = 1 ⊕ ⊔1≤𝑖≤𝑚 ⊔⦇𝙼⦈
⃖⃖⃖⃗ ⃖⃖⃖⃖⃖⃖⃖⃖⃖⃗
⃖⃖⃗ {⦇𝙼⦈𝜌 ⊕ ⦇𝙼𝑖 ⦈𝜌 {𝐹𝑖 ∕⦇𝚡𝑖 ⦈𝜌 }},
𝜌 ≥⦇𝚌𝑖 ⦈𝜌 𝐹𝑖
∙ ⦇𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼⦈𝜌 = ⊓{𝐹 ∈ ⦇𝚃⦈ | 𝐹 ≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙼⦈𝜌 𝐹 }.
where ⦇𝚘𝚙⦈𝜌 is a sup-interpretation, i.e. a non decreasing total function such that:
∀𝙼1 , … , ∀𝙼𝑛 , ⦇𝚘𝚙 𝙼1 … 𝙼𝑛 ⦈𝜌 ≥ ⦇J𝚘𝚙K(𝙼1 , … , 𝙼𝑛 )⦈𝜌 .
See [Péc13] for more details about sup-interpretations.
As operator sup-interpretations are fixed, an interpretations should also be indexed by some
mapping 𝑚 assigning a sup-interpretation to each operator of the language. To simplify the formalism, we will omit this mapping in what follows.
3.3. Existence of an interpretation. The interpretation of a term is always defined. Indeed, in Definition 3.5, ⦇𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼⦈𝜌 is defined in terms of the least fixpoint of the function Λ𝑋 ⦇𝚃⦈ .1 ⊕⦇𝚃⦈
(Λ⦇𝚏⦈𝜌 .⦇𝙼⦈𝜌 𝑋) and, consequently, we obtain the following result as a direct consequence of KnasterTarski [Tar55, KS01] Fixpoint Theorem:
Proposition 3.6. Each term 𝙼 of type 𝚃 has an interpretation.
Proof. By Lemma 3.3, 𝐿 = (⦇𝚃⦈, ≤, ⊔, ⊓, ⊤, ⊥) is a complete lattice. The function 𝐹 = Λ𝑋 ⦇𝚃⦈ .1⊕⦇𝚃⦈
(Λ⦇𝚏⦈𝜌 .⦇𝙼⦈𝜌 𝑋) ∶ 𝐿 → 𝐿 is monotonic. Indeed, both constructor terms and letrec terms of type
⦇𝚃⦈ are interpreted over a space of monotonic functions ⦇𝚃⦈. Moreover monotonicity is preserved
by application, abstraction and the ⊓ and ⊔ operators. Applying Knaster-Tarski, we obtain that 𝐹
admits a least fixpoint, which is exactly ⊓{𝑋 ∈ ⦇𝚃⦈ | 𝑋 ≥ 𝐹 𝑋}.
8
E. HAINRY AND R. PÉCHOUX
3.4. Properties of interpretations. We now show intermediate lemmata. The following Lemma
can be shown by structural induction on terms:
Lemma 3.7. For all 𝙼, 𝙽, 𝚡 such that 𝚡 ∶∶ 𝚃; Δ ⊢ 𝙼 ∶∶ 𝚃′ , ∅; Δ ⊢ 𝙽 ∶∶ 𝚃, we have
⦇𝙼⦈𝜌 {⦇𝙽⦈𝜌 ∕⦇𝚡⦈𝜌 } = ⦇𝙼{𝙽∕𝚡}⦈𝜌 .
Lemma 3.8. For all 𝙼, 𝙽, 𝚡 such that 𝚡 ∶∶ 𝚃; Δ ⊢ 𝙼 ∶∶ 𝚃′ , ∅; Δ ⊢ 𝙽 ∶∶ 𝚃, we have ⦇𝜆𝚡.𝙼 𝙽⦈𝜌 >
⦇𝙼{𝙽∕𝚡}⦈𝜌.
Proof.
⦇𝜆𝚡.𝙼 𝙽⦈𝜌 = ⦇𝜆𝚡.𝙼⦈𝜌 ⦇𝙽⦈𝜌
= Λ⦇𝚡⦈𝜌 .1 ⊕ ⦇𝙼⦈𝜌 ⦇𝙽⦈𝜌
= 1 ⊕ ⦇𝙼⦈𝜌 {⦇𝙽⦈𝜌 ∕⦇𝚡⦈𝜌 }
= 1 ⊕ ⦇𝙼{𝙽∕𝚡}⦈𝜌
> ⦇𝙼{𝙽∕𝚡}⦈𝜌
By Definition 3.5
By Definition 3.5
By definition of =
By Lemma 3.7
By definition of >
and so the conclusion.
Lemma 3.9. For all 𝙼, we have: if 𝙼 ⇒ 𝙽 then ⦇𝙼⦈𝜌 ≥ ⦇𝙽⦈𝜌 . Moreover if |𝙼 ⇒ 𝙽| = 1 then
⦇𝙼⦈𝜌 > ⦇𝙽⦈𝜌 .
Proof. If |𝙼 ⇒ 𝙽| = 0 then 𝙼 = 𝚘𝚙 𝙼1 … 𝙼𝑛 →𝚘𝚙 J𝚘𝚙K(𝙼1 , … , 𝙼𝑛 ) = 𝙽, for some operator 𝚘𝚙
and terms 𝙼1 , … , 𝙼𝑛 and consequently, by Definition of interpretations we have ⦇𝚘𝚙 𝙼1 … 𝙼𝑛 ⦈𝜌 ≥
⦇J𝚘𝚙K(𝙼1 , … , 𝙼𝑛 )⦈𝜌 .
If |𝙼 ⇒ 𝙽| = 1 then the reduction does not involve a →𝚘𝚙 (i.e. an operator evaluation). By
Lemma 3.8, in the case of a 𝛽-reduction and, by induction, by Lemma 3.7 and Definition 3.5 for the
other cases. e.g. For a letrec reduction, we have: if 𝙼 = 𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼′ →𝚕𝚎𝚝𝚁𝚎𝚌 𝙼′ {𝙼∕𝚏} = 𝙽 then:
⦇𝙼⦈𝜌 = ⊓{𝐹 ∈ ⦇𝚃⦈ | 𝐹 ≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 𝐹 }
≥ ⊓{1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 𝐹 | 𝐹 ≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 𝐹 }
≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 ⊓ {𝐹 | 𝐹 ≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 𝐹 }
≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 ⦇𝙼⦈𝜌
≥ 1 ⊕ ⦇𝙽⦈𝜌 {⦇𝙼⦈𝜌 ∕⦇𝚏⦈𝜌 }
≥ 1 ⊕ ⦇𝙽{𝙼∕𝚏}⦈𝜌, by Lemma 3.7
> ⦇𝙽{𝙼∕𝚏}⦈𝜌, By definition of >
The first inequality holds since we are only considering higher order functions 𝐹 satisfying 𝐹 ≥
1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 𝐹 . The second inequality holds because Λ⦇𝚏⦈𝜌 .⦇𝙽⦈𝜌 is a non decreasing function
(as the interpretation domain only consists in such functions).
As each reduction distinct from an operator evaluation corresponds to a strict decrease, the
following corollary can be obtained:
⃖⃗ such that ∅; Δ ⊢ 𝙼 𝙽⃖⃗ ∶∶ 𝚃, if 𝙼 𝙽⃖⃗ ⇒𝑘 𝙼′ then ⦇𝙼⦈𝜌 ⦇𝙽⦈
⃖⃗ 𝜌 ≥
Corollary 3.10. For all terms, 𝙼, 𝙽,
|𝙼 𝙽⃖⃗ ⇒𝑘 𝙼′ | ⊕ ⦇𝙼′ ⦈𝜌 .
As basic operators can be considered as constant time computable objects the following Corollary also holds:
INSTRUCTIONS
9
⃖⃗ such that ∅; Δ ⊢ 𝙼 𝙽⃖⃗ ∶∶ b, with b ∈ B, if ⦇𝙼 𝙽⦈
⃖⃗ 𝜌 ≠ ⊤ then 𝙼 𝙽⃖⃗
Corollary 3.11. For all terms, 𝙼, 𝙽,
⃖⃗ 𝜌 ).
terminates in a number of reduction steps in 𝑂(⦇𝙼 𝙽⦈
The size |𝚟| of a value 𝚟 is defined by |𝚌| = 1 and |𝙼 𝙽| = |𝙼| + |𝙽|.
Lemma 3.12. For any value 𝚟, such that ∅; Δ ⊢ 𝚟 ∶∶ b, with b ∈ B, we have ⦇𝚟⦈ = |𝚟|.
Example 3.13. Consider the following term 𝙼 ∶∶ 𝙽𝚊𝚝 ⟶ 𝙽𝚊𝚝 computing the double of a unary
number given as input:
𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 +𝟷(𝚢) → +𝟷(+𝟷(𝚏 𝚢)),
0→0
We can see below how the interpretation rules of Definition 3.5 are applied on such a term.
⦇𝙼⦈𝜌 = ⊓{𝐹 | 𝐹 ≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 +𝟷(𝚢) → +𝟷(+𝟷(𝚏 𝚢))| 0 → 0⦈𝜌 𝐹 }
= ⊓{𝐹 | 𝐹 ≥ 2 ⊕ (Λ⦇𝚡⦈𝜌 .⦇𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 +𝟷(𝚢) → +𝟷(+𝟷(𝚏 𝚢))| 0 → 0⦈𝜌 {𝐹 ∕⦇𝚏⦈𝜌 })}
= ⊓{𝐹 | 𝐹 ≥ 3 ⊕ (Λ𝑋.𝑋 ⊕ ((⊔𝑋≥⦇+𝟷(𝚢)⦈𝜌 ⦇+𝟷(+𝟷(𝚏 𝚢))⦈𝜌 ) ⊔ (⊔𝑋≥⦇0⦈𝜌 ⦇0⦈𝜌 ){𝐹 ∕⦇𝚏⦈𝜌 })}
= ⊓{𝐹 | 𝐹 ≥ 3 ⊕ (Λ𝑋.𝑋 ⊕ ((⊔𝑋≥1⊕⦇𝚢⦈𝜌 2 ⊕ (⦇𝚏⦈𝜌 ⦇𝚢⦈𝜌 )) ⊔ (⊔𝑋≥1 1){𝐹 ∕⦇𝚏⦈𝜌 })}
= ⊓{𝐹 | 𝐹 ≥ 3 ⊕ (Λ𝑋.𝑋 ⊕ ((⊔𝑋≥1⊕⦇𝚢⦈𝜌 2 ⊕ (𝐹 ⦇𝚢⦈𝜌 )) ⊔ (1))}
= ⊓{𝐹 | 𝐹 ≥ 3 ⊕ (Λ𝑋.𝑋 ⊕ ((2 ⊕ (𝐹 (𝑋 − 1))) ⊔ (1))},
= ⊓{𝐹 | 𝐹 ≥ Λ𝑋.(5 ⊕ 𝑋 ⊕ (𝐹 (𝑋 − 1))) ⊔ (4 ⊕ 𝑋)}
𝑋 −1≥ 0
≤ Λ𝑋.6𝑋 2 + 5
At the end we search for the minimal non decreasing function 𝐹 greater than Λ𝑋.(5 ⊕ 𝑋 ⊕
(𝐹 (𝑋 − 1))) ⊔ (4 ⊕ 𝑋), for 𝑋 > 1. As the function Λ𝑋.6𝑋 2 ⊕ 5 is solution of such an inequality,
the fixpoint is smaller than this function. Notice that such an interpretation is not tight as one should
have expected the interpretation of such a program to be Λ𝑋.2𝑋. This interpretation underlies that:
∙ the iteration steps, distinct from the base case, count for 5 ⊕ 𝑋: 1 for the letRec call, 1 for
the application, 1 ⊕ 𝑋 for pattern matching and 2 for the extra-constructors added,
∙ the base case counts for 4 ⊕ 𝑋: 1 for recursive call, 1 for application, 1 ⊕ 𝑋 for pattern
matching and 1 for the constructor.
Consequently, we have a bound on both size of terms and reduction length though this upper bound
is not that accurate. This is not that surprising as this technique suffers from the same issues as
first-order interpretation based methods.
3.5. Relaxing interpretations. For a given program it is somewhat difficult to find an interpretation
that can be expressed in an easy way. This difficulty lies in the homogeneous definition of the
considered interpretations using a max (for the case construct) and a min (for the letrec construct).
Indeed, it is sometimes difficult to eliminate the constraint (parameters) of a max generated by the
interpretation of a case. Moreover, it is a hard task to find the fixpoint of the interpretation of a
letRec. All this can be relaxed as follows:
∙ finding an upper-bound of the max by eliminating constraint in the case construct interpretation,
∙ taking a particular function satisfying the inequality in the letrec construct interpretation.
In both cases, we will no longer compute an exact interpretation of the term but rather an upper
bound of the interpretation.
10
E. HAINRY AND R. PÉCHOUX
Lemma 3.14. Given a set of functions 𝑆 and a function 𝐹 ∈ 𝑆, the following inequality always
holds 𝐹 ≥ ⊓{𝐺|𝐺 ∈ 𝑆}.
This relaxation is highly desirable in order to find “lighter” upper-bounds on the interpretation
of a term. Moreover, it is a reasonable approximation as we are interested in worst case complexity.
Obviously, it is possible by relaxing too much to attain the interpretation ⊤⦇𝚃⦈ , which gives
nothing interesting. Of course these approximation have to be performed with moderation as taking
too big intermediate upper bounds might lead to an uninteresting upper bound on the interpretation
of the term (i.e. ⊤).
Example 3.15. Consider the term 𝙼 of Example 2.3:
𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝜆g.𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌 (g 𝚢) (𝚏 g 𝚣),
𝚗𝚒𝚕 → 𝚗𝚒𝚕
Its interpretation ⦇𝙼⦈𝜌 is equal to:
= ⊓{𝐹 | 𝐹 ≥ 1 ⊕ Λ⦇𝚏⦈𝜌 .⦇𝜆g.𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌(g 𝚢)(𝚏 g 𝚣)| 𝚗𝚒𝚕 → 𝚗𝚒𝚕⦈𝜌 𝐹 }
= ⊓{𝐹 | 𝐹 ≥ 3 ⊕ (Λ⦇𝚏⦈𝜌 .Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .⦇𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → 𝚌(g 𝚢)(𝚏 g 𝚣)| 𝚗𝚒𝚕 → 𝚗𝚒𝚕⦈𝜌 𝐹 )}
= ⊓{𝐹 | 𝐹 ≥ 4 ⊕ (Λ⦇𝚏⦈𝜌 .Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .⦇𝚡⦈𝜌 ⊕ (⊔(⦇𝚗𝚒𝚕⦈𝜌 , ⊔⦇𝚡⦈𝜌 ≥⦇𝚌(𝚢,𝚣)⦈𝜌 (⦇𝚌(g 𝚢)(𝚏 g 𝚣)⦈𝜌 ))𝐹 ))}
= ⊓{𝐹 | 𝐹 ≥ 4 ⊕ (Λ⦇𝚏⦈𝜌 .Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .⦇𝚡⦈𝜌 ⊕ (⊔(1, ⊔⦇𝚡⦈𝜌 ≥1⊕⦇𝚢⦈𝜌 +⦇𝚣)⦈𝜌 (1 ⊕ (⦇g⦈𝜌 ⦇𝚢⦈𝜌 )
+ (⦇𝚏⦈𝜌 ⦇g⦈𝜌 ⦇𝚣⦈𝜌 )))𝐹 ))}
= ⊓{𝐹 | 𝐹 ≥ 5 ⊕ (Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .⦇𝚡⦈𝜌 ⊕ (⊔⦇𝚡⦈𝜌 ≥1⊕⦇𝚢⦈𝜌 +⦇𝚣)⦈𝜌 ((⦇g⦈𝜌 ⦇𝚢⦈𝜌 ) + (𝐹 ⦇g⦈𝜌 ⦇𝚣⦈𝜌 ))))}
≤ ⊓{𝐹 | 𝐹 ≥ 5 ⊕ (Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .⦇𝚡⦈𝜌 ⊕ (((⦇g⦈𝜌 (⦇𝚡⦈𝜌 − 1)) + (𝐹 ⦇g⦈𝜌 (⦇𝚡⦈𝜌 − 1)))))}
≤ Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .(5 ⊕ (⦇g⦈𝜌 ⦇𝚡⦈𝜌 )) × (2 × ⦇𝚡⦈𝜌 )2
In the penultimate line, we obtain an upper-bound on the interpretation by approximating the
case interpretation, substituting ⦇𝑥⦈𝜌 − 1 to both ⦇𝑦⦈𝜌 and ⦇𝑧⦈𝜌 . This is a first step of relaxation
where we find an upper bound for the max. The below inequality holds for any non decreasing
function 𝐹 :
𝑎 = ⊔⦇𝚡⦈𝜌 ≥1⊕⦇𝚢⦈𝜌 +⦇𝚣)⦈𝜌 𝐹 (⦇𝚢⦈𝜌 , ⦇𝚣⦈𝜌 ) ≤ ⊔⦇𝚡⦈𝜌 ≥1⊕⦇𝚢⦈𝜌 ,⦇𝚡⦈𝜌 ≥1⊕⦇𝚣)⦈𝜌 𝐹 (⦇𝚢⦈𝜌 , ⦇𝚣⦈𝜌 ) = 𝑏.
Consequently, ⊔{𝐹 | 𝐹 ≥ 𝑏} ≤ ⊔{𝐹 | 𝐹 ≥ 𝑎}.
In the last line, we obtain an upper-bound on the interpretation by approximating the letrec
interpretation, just checking that the function 𝐹 = Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .(5 ⊕ (⦇g⦈𝜌 ⦇𝚡⦈𝜌 )) × (2 × ⦇𝚡⦈𝜌 )2 ,
where × is the usual multiplication symbol over natural numbers, satisfies the inequality:
𝐹 ≥ 5 ⊕ (Λ⦇g⦈𝜌 .Λ⦇𝚡⦈𝜌 .⦇𝚡⦈𝜌 ⊕ (((⦇g⦈𝜌 (⦇𝚡⦈𝜌 − 1)) + (𝐹 ⦇g⦈𝜌 (⦇𝚡⦈𝜌 − 1))))).
3.6. Higher Order Polynomial Interpretations. At the present time, the interpretation of a term
of type 𝚃 can be any total functional over ⦇𝚃⦈. In the next section, we will concentrate our efforts to
study polynomial time at higher order. Consequently, we need to restrict the shape of the admissible
interpretations to higher order polynomials which are the higher order counterpart to polynomials in
this theory of complexity.
INSTRUCTIONS
11
Definition 3.16. Let 𝑃𝑖 denote a polynomial of order 𝑖 and let 𝑋𝑖 denote an order 𝑖 variable. Higher
order (order 1 and order i+1) polynomials can be defined by the following grammar:
𝑃1 ∶∶= 𝑐|𝑋0 |𝑃1 + 𝑃1 |𝑃1 × 𝑃1
𝑃𝑖+1 ∶∶= 𝑃𝑖 |𝑃𝑖+1 + 𝑃𝑖+1 |𝑃𝑖+1 × 𝑃𝑖+1 |𝑋𝑖 (𝑃𝑖+1 )
where 𝑐 represents constants in ℕ.
Clearly, the set of order 𝑖 polynomials is strictly included in the set of order 𝑖 + 1 polynomials
by the above definition. Moreover, by definition, a higher order polynomial 𝑃𝑖+1 has variables of
⃖⃖⃗ is the sequence of such variables ordered by decreasing order, we will treat the
order at most 𝑖. If 𝑋
⃖⃖⃗ 𝑖+1 (𝑋).
⃖⃖⃗
polynomial 𝑃𝑖+1 as total functions Λ𝑋.𝑃
We are now ready to define the class of functions computed by terms admitting an interpretation
that is (higher order) polynomially bounded:
Definition 3.17. Let FP𝑖 , 𝑖 ≥ 0, be the class of polynomial functions at order 𝑖 that consist in functions
computed by terms 𝙼 over the basic type 𝙽𝚊𝚝 and such that:
∙ 𝚘𝚛𝚍(𝙼) = 𝑖
∙ ⦇𝙼⦈𝜌 is bounded by an order 𝑖 polynomial (i.e. ∃𝑃𝑖 , ⦇𝙼⦈𝜌 ≤ 𝑃𝑖 ).
Example 3.18. The term 𝙼 of Example 3.15 is such that 𝚘𝚛𝚍(𝙼) = 1 and admits an interpretation
bounded by 𝑃1 = Λ𝑋0 .6𝑋02 + 5. Consequently, J𝙼K ∈ FP1 .
4. BASIC FEASIBLE FUNCTIONALS
The class of tractable type 2 functionals has been introduced by Constable and Mehlhorn [Con73,
Meh74]. It was later named BFF for the class of Basic Feasible Functionals and characterized in
terms of function algebra [CK89, IRK01]. We choose to define the class through a characterization
by Bounded Typed Loop Programs from [IKR02] which extends the original BFF to any order.
4.1. Bounded Typed Loop Programs.
Definition 4.1 (BTLP). A Bounded Typed Loop Program (BTLP) is a non-recursive and wellformed procedure defined by the grammar of Figure 2.
The well-formedness assumption is given by the following constraints: Each procedure is supposed to be well-typed with respect to simple types over 𝙳, the set of natural numbers of dyadic
representation over {0, 1} (0 ≡ 𝜖, 1 ≡ 0, 2 ≡ 1, 3 ≡ 00, …). When needed, types are explicitly mentioned in variables’ superscript. Each variable of a BTLP procedure is bound by either the procedure
declaration parameter list, a local variable declaration or a lambda abstraction. In a loop statement,
the guard variables 𝑣0 and 𝑣1 cannot be assigned to within 𝐼 ∗ . In what follows 𝑣1 will be called the
loop bound.
The operational semantics of BTLP procedures is standard: parameters are passed by call-byvalue. +, − and # denote addition, proper subtraction and smash function (i.e. 𝑥#𝑦 = 2|𝑥|×|𝑦| , the size
|𝑥| of the number 𝑥 being the size of its dyadic representation), respectively. Each loop statement
is evaluated by iterating |𝑣0 |-many times the loop body instruction under the following restriction:
if an assignment 𝑣 ∶= 𝐸 is to be executed within the loop body, we check if the value obtained by
evaluating 𝐸 is of size smaller than the size of the loop bound |𝑣1 |. If not then the result of evaluating
this assignment is to assign 0 to 𝑣.
12
E. HAINRY AND R. PÉCHOUX
(Procedures) ∋ 𝑃
(Declarations) ∋ 𝑉
𝜏
𝜏
∶∶= Procedure 𝑣𝜏1 ×…×𝜏𝑛 →𝙳 (𝑣11 , … , 𝑣𝑛𝑛 ) 𝑃 ∗ 𝑉 𝐼 ∗ Return 𝑣𝙳𝑟
∶∶= Var 𝑣𝙳1 , … , 𝑣𝙳𝑛 ;
(Instructions) ∋ 𝐼
(Expressions) ∋ 𝐸
(Arguments) ∋ 𝐴
∶∶= 𝑣𝙳 ∶= 𝐸; | Loop 𝑣𝙳0 with 𝑣𝙳1 do {𝐼 ∗ }
𝜏
𝜏
∶∶= 1 | 𝑣𝙳 | 𝑣𝙳0 + 𝑣𝙳1 | 𝑣𝙳0 − 𝑣𝙳1 | 𝑣𝙳0 #𝑣𝙳1 | 𝑣𝜏1 ×…×𝜏𝑛 →𝙳 (𝐴11 , … , 𝐴𝑛𝑛 )
∶∶= 𝑣 | 𝜆𝑣1 , … , 𝑣𝑛 .𝑣(𝑣′1 … , 𝑣′𝑚 ) with 𝑣 ∉ {𝑣1 , … , 𝑣𝑛 }
Figure 2: BTLP grammar
Let the size of an argument be the number of syntactic elements in it. The size of input arguments
is the sum of the size of the arguments in the input.
𝜏
𝜏
Definition 4.2 (Time complexity). For a given procedure 𝑃 of parameters (𝑣11 , … , 𝑣𝑛𝑛 ), we define
its time complexity 𝑡(𝑃 ) to be a function of type ℕ → ℕ that, given inputs of type 𝜏1 × … × 𝜏𝑛 and
size bounded by 𝑛 returns the maximal number of assignments executed during the evaluation of the
procedure.
We are now ready to provide a definition of Basic Feasible Functionals at any order:
Definition 4.3 (BFF𝑖 ). For any 𝑖 ≥ 1, BFF𝑖 is the class of order 𝑖 functionals computable by a BTLP
procedure1 .
It is straightforward that BFF1 = FPTIME and BFF2 =BFF.
4.2. Safe Feasible Functionals. Now we restrict the domain of BFF𝑖 classes to inputs in BFF𝑘 for
𝑘 < 𝑖, the obtained classes are named SFF for Safe Feasible Functionals.
Definition 4.4 (SFF𝑖 ). SFF1 is defined to be the class of order 1 functionals computable by BTLP a
procedure and, for any 𝑖 ≥ 1, SFF𝑖+1 is the class of order 𝑖 + 1 functionals computable by BTLP a
procedure on the input domain SFF𝑖 . In other words,
SFF 1
SFF 𝑖+1
=BFF1 ,
=BFF𝑖+1↾SFF 𝑖
∀𝑖, 𝑖 ≥ 1
This is not a huge restriction since we want an arbitrary term of a given complexity class at
order 𝑖 to compute over terms that are already in classes of the same family at order 𝑘, for 𝑘 < 𝑖.
Consequently, programs can be built in a constructive way component by component. Another strong
argument in favor of this domain restriction is that the partial evaluation of a functional at order 𝑖
will, at the end, provide a function in ℕ ⟶ ℕ that is shown to be in BFF1 (=FPTIME).
5. A CHARACTERIZATION
OF SAFE FEASIBLE FUNCTIONALS OF ANY ORDER
In this section, we show our main characterization of safe feasible functionals:
Theorem 5.1. For any order 𝑖 ≥ 0, the class of functions in FP𝑖+1 over
class of functions in SFF𝑖+1 , up to an isomorphism. In other words,
SFF 𝑖+1
FP 𝑘 ,
𝑘 ≤ 𝑖, is exactly the
≡ FP𝑖+1↾(∪𝑘≤𝑖 FP𝑘 ) ,
for all 𝑖 ≥ 0, up to an isomorphism.
1As demonstrated in [IKR02], all types in the procedure can be restricted to be of order at most 𝑖 without any distinction.
INSTRUCTIONS
13
Proof. For a fixed 𝑖, the theorem is proved in two steps: Soundness, Theorem 5.2, and Completeness,
Theorem 5.14. Soundness consists in showing that any term 𝙼 whose interpretation is bounded by an
order 𝑖 polynomial, computes a function in SFF𝑖 . Completeness consists in showing that any BTLP
procedure 𝑃 of order 𝑖 can be encoded by a term 𝙼 computing the same function and admitting a
polynomial interpretation of order 𝑖.
Notice that functions in SFF𝑖+1 return the dyadic representation of a natural number. Consequently, the isomorphism is used on functions in FP𝑖 to illustrate that a function of type ℕ → (ℕ → ℕ)
and order 1 is isomorphic to a functional of type ℕ → ℕ and of the same order using decurryfication
and pair encoding over ℕ. In order to simplify the treatment we will restrict ourselves to functional
terms computing functionals that are terms of type 𝚃 ⟶ b, with b ∈ B, in the remaining of the
paper.
5.1. Soundness. The soundness means that any term whose interpretation is bounded by an order
𝑖 polynomial belongs to SFF𝑖 . For that, we will show that the interpretation allows us to bound the
computing time with an higher order polynomial.
Theorem 5.2. Any functional term 𝙼 whose interpretation is bounded by an order 𝑖 polynomial,
computes a functional in SFF𝑖 .
Proof. For order 1, consider that the term 𝙼 has an interpretation bounded by a polynomial 𝑃1 . For
any value 𝑣, we have, by Corollary 3.10, that the computing time of 𝙼 on input 𝑣 bounded by ⦇𝙼 𝑣⦈𝜌 .
Consequently, using Lemma 3.12, we have that:
⦇𝙼 𝑣⦈𝜌 = ⦇𝙼⦈𝜌 ⦇𝑣⦈𝜌 = ⦇𝙼⦈𝜌 (|𝑣|) ≤ 𝑃1 (|𝑣|).
Hence 𝙼 belongs to FPTIME = SFF 1 .
Now, for higher order, let 𝙼 be an order 𝑖 + 1 term of interpretation ⦇𝙼⦈𝜌 . There exists an
order 𝑖 + 1 polynomial 𝑃𝑖+1 such that ⦇𝙼⦈𝜌 ≤ 𝑃𝑖+1 . We know that on input 𝙽, 𝙼 normalizes in
𝑂(⦇𝙼 𝙽⦈𝜌 ), by Corollary 3.11. Since 𝙽 computes a functional J𝙽K ∈ SFF𝑖 there is a polynomial 𝑃𝑖
such that ⦇𝙽⦈𝜌 ≤ 𝑃𝑖 , by induction on the order 𝑖. Consequently, we obtain that the maximal number
of reduction steps is bounded polynomially in the input size by:
⦇𝙼 𝙽⦈𝜌 = ⦇𝙼⦈𝜌 ⦇𝙽⦈𝜌 ≤ 𝑃𝑖+1 ◦𝑃𝑖
that is, by a polynomial 𝑄𝑖+1 of order 𝑖 + 1 defined by 𝑄𝑖+1 = 𝑃𝑖+1 ◦𝑃𝑖 .
The above result holds for terms over arbitrary basic inductive types, by considering that each
value on such a type encodes an integer value.
5.2. Completeness. To prove that all functions computable by a BTLP program of order 𝑖 can be
defined as terms admitting a polynomial interpretation, we proceed in several steps:
(1) We show that it is possible to encode each BTLP procedure 𝑃 into an intermediate procedure
❲𝑃 ❳ of a language called IBTLP (See Figure 3) for If-Then-Else Bounded Typed Loop Program such that ❲𝑃 ❳ computes the same function as 𝑃 using the same number of assignments
(i.e. with the same time complexity).
(2) We show that we can translate each IBTLP procedure ❲𝑃 ❳ into a flat IBTLP procedure ❲𝑃 ❳,
i.e. a procedure with no nested loops and no procedure calls.
14
E. HAINRY AND R. PÉCHOUX
𝜏
𝜏
𝐼𝑃 ∶∶= 𝑣𝜏1 ×…×𝜏𝑛 →𝙳 (𝑣11 , … , 𝑣𝑛𝑛 ){𝐼𝑃 ∗ 𝐼𝑉 𝐼𝐼 ∗ } ret 𝑣𝙳𝑟
𝐼𝑉 ∶∶= var 𝑣𝙳1 , … , 𝑣𝙳𝑛 ;
𝐼𝐼 ∶∶= 𝑣𝙳 ∶= 𝐼𝐸 𝙳 ; | loop 𝑣𝙳0 {𝐼𝐼 ∗ } | 𝚒𝚏 𝑣𝙳 { 𝐼𝐼 ∗ } [else { 𝐼𝐼 ∗ }] | (𝐼𝐼 ∗ )𝑣𝙳
𝜏
𝜏
𝐼𝐸 ∶∶= 1 | 𝑣𝙳 | 𝑣𝙳0 + 𝑣𝙳1 | 𝑣𝙳0 − 𝑣𝙳1 | 𝑣𝙳0 #𝑣𝙳1 | 𝑣𝜏1 ×…×𝜏𝑛 →𝙳 (𝐼𝐴11 , … , 𝐼𝐴𝑛𝑛 ) | 𝑣𝙳0 × 𝑣𝙳1 | 𝚌𝚞𝚝(𝑣𝙳 )
| 𝚌𝚑𝚔𝚋𝚍(𝐸, 𝑋)
𝐼𝐴 ∶∶= 𝑣 | 𝜆𝑣1 , … , 𝑣𝑛 .𝑣(𝑣′1 … , 𝑣′𝑚 ) with 𝑣 ∉ {𝑣1 , … , 𝑣𝑛 }
Figure 3: IBTLP grammar
(3) Then we transform the flat IBTLP procedure ❲𝑃 ❳ into a “local” and flat IBTLP procedure
[❲𝑃 ❳]∅ checking bounds locally in each assignment instead of checking it globally in each
loop. For that purpose, we use a polynomial time computable operator of the IBTLP language called 𝚌𝚑𝚔𝚋𝚍. The time complexity is then asymptotically preserved.
(4) Finally, we compile the IBTLP procedure [❲𝑃 ❳]∅ into a term of our language and we use
completeness for first order function to show that there is a term computing the same function and admitting a polynomial interpretation. This latter transformation does not change
the program behavior in terms of computability and complexity, up to a O, but it makes
the simulation by a functional program easier as each local assignment can be simulated
independently of the context.
The 3 first steps just consist in transforming a BTLP procedure into a IBTLP procedure in order to
simplify the compilation procedure of the last step. These steps can be subsumed as follows:
Language
BTLP
Program
𝑃
IBTLP
❲❳
❲𝑃 ❳
IBTLP
flat
❲𝑃 ❳
local
IBTLP
[❲𝑃 ❳]∅
compile
𝚌𝚘𝚖𝚙([❲𝑃 ❳]∅ )
For each step, we check that the complexity in terms of reduction steps is preserved and that the
transformed program computes the same function.
5.2.1. From BTLP to IBTLP.
Definition 5.3 (IBTLP). A If-Then-Else Bounded Typed Loop Program (IBTLP) is a non-recursive
and well-formed procedure defined by the grammar of Figure 3.
The well-formedness assumption and variable bounds are the same as for BTLP. In a loop statement, the guard variable 𝑣0 still cannot be assigned to within 𝐼𝐼 ∗ . A IBTLP procedure 𝐼𝑃 has also
a time complexity 𝑡(𝐼𝑃 ) defined similarly to the one of BTLP procedures.
The main distinctions between an IBTLP procedure and a BTLP procedure are the following:
∙ there are no loop bounds in IBTLP loops. Instead loop bounds are written as instruction annotations: a IBTPL loop (loop 𝑣𝙳0 {𝐼𝐼 ∗ })𝑣𝙳 corresponds to a BTLP instruction Loop 𝑣𝙳0 with 𝑣𝙳 do {𝐼𝐼 ∗ }.
∙ IBTLP includes a conditional statement if 𝑣𝙳 { 𝐼𝐼1∗ } else { 𝐼𝐼2∗ } evaluated in a standard way:
if variable 𝑣 is 𝜖 (the dyadic encoding of 0) then it is evaluated to 𝐼𝐼2∗ . In all other cases, it
is evaluated to 𝐼𝐼1∗ , the else branching being optional.
∙ IBTLP includes a basic operator × such that 𝑥 × 𝑦 = 2|𝑥|+|𝑦| .
INSTRUCTIONS
15
∙ IBTLP includes a unary operator 𝚌𝚞𝚝 which removes the first character of a number (i.e.
𝚌𝚞𝚝(𝜖) = 𝜖, 𝚌𝚞𝚝(𝑖𝑣) = 𝑣).
∙ IBTLP includes an operator 𝚌𝚑𝚔𝚋𝚍 computing the following function:
{
J𝐸K if |J𝐸K| ≤ |𝑥|, 𝑥 ∈ 𝑋
𝚌𝚑𝚔𝚋𝚍(𝐸, 𝑋) =
0
otherwise
where J𝐸K is the dyadic number obtained after the evaluation of expression 𝐸 and 𝑋 is a
finite set of variables.
Notice that 𝚌𝚑𝚔𝚋𝚍 is in SFF1 provided that the input 𝐸 is computable in polynomial time and both
× and cut are in SFF1 . The semantics of an IBTLP procedure is also similar to the one of a BTLP
procedure: during the execution of an assignment, the bound check is performed on instruction
annotations instead of being performed on loop bounds. However IBTLP is strictly more expressive
than BTLP from an extensional perspective: a loop can be unbounded. This is the reason why
only IBTLP procedures obtained by well-behaved transformation from BTLP procedures will be
considered in the remainder of the paper.
Now we define a program transformation ❲.❳ from BTLP to IBTLP. For each loop of a BTLP
program, this transformation just consists in recording the variable appearing in the with argument
of a contextual loop and putting it into an instruction annotation as follows:
❲Loop 𝑣𝙳0 with 𝑣𝙳1 do {𝐼 ∗ }❳ = (loop 𝑣𝙳0 {❲𝐼❳∗ })𝑣𝙳
1
Any assignment is left unchanged and this transformation is propagated inductively on procedure
instructions so that any inner loop is transformed. We denote by ❲𝑃 ❳ the IBTLP procedure obtained
from the BTLP procedure 𝑃 . Hence the following lemma straightforwardly holds:
Lemma 5.4. Given a procedure 𝑃 , let J𝑃 K denote the function computed by 𝑃 . For any BTLP
procedure 𝑃 , we have J𝑃 K = J❲𝑃 ❳K and 𝑡(𝑃 ) = 𝑡(❲𝑃 ❳).
Proof. The transformation is semantics-preserving (the computed function is the same). Any assignment in 𝑃 corresponds to exactly one assignment in ❲𝑃 ❳ and the number of iterations of Loop 𝑣 with …
and loop 𝑣 are both in |𝑣|.
5.2.2. From IBTLP to Flat IBTLP.
Definition 5.5 (Flat IBTLP). A If-Then-Else Bounded Typed Loop Program (IBTLP) is flat if it
does not contain nested loops.
We will show that it is possible to translate any IBTLP procedure into a Flat IBTLP procedure
using the if construct.
There are only three patterns of transformation:
(1) one pattern for nested loops, called Unnest,
(2) one pattern for sequential loops, called Unseq,
(3) and one for procedure calls inside a loop, called Unfold
that we describe below:
(1) The first transformation Unnest consists in removing a nested loop of a given procedure.
Assume we have a IBTLP procedure with two nested loops:
( loop x { 𝐼𝐼1∗ ( loop y {𝐼𝐼2∗ }) 𝑧 𝐼𝐼3∗ }) w
we can translate it to a IBTLP procedure as:
16
E. HAINRY AND R. PÉCHOUX
total := w×y ; dx := 1; gt := total ; gy := y;
lb := x#total ;
loop lb {
if dx {(𝐼𝐼1∗ ) w }
if gy {((𝐼𝐼2∗ ) z ) w gy := cut ( gy );}
if dx { dx := 𝜀; (𝐼𝐼3∗ ) w }
if gt { gt := cut ( gt );}
else { gt := total ; gy := y ; dx := 1;}
}
where all the variables dx, total, gt, gy and lb are fresh local variables and 𝐼𝐼1∗ , 𝐼𝐼2∗ and
𝐼𝐼3∗ are instructions with no loop. The intuition is that variables dx and gy tell whether the
loop should execute 𝐼𝐼1∗ and 𝐼𝐼2∗ respectively. Variable gt counts the number of times to
execute the subloop.
(2) The second transformation Unseq consists in removing two sequential loops of a given procedure. Assume we have a IBTLP procedure with two sequential loops,
( loop x 1 {𝐼𝐼1∗ }) w1 𝐼𝐼2∗ ( loop x 3 {𝐼𝐼3∗ }) w3
We can translate it to a single loop IBTLP procedure as:
gx := x1 ; dy := 1; lb := x 1 ×x 3 ;
loop lb {
if gx { gx := cut gx ; (𝐼𝐼1∗ ) w1 }
else {
if dy {𝐼𝐼2∗ }
else { dy := 𝜀; (𝐼𝐼3∗ ) w3 }
}
}
where gx, dy and lb are fresh local variables and 𝐼𝐼1∗ , 𝐼𝐼2∗ and 𝐼𝐼3∗ are instructions with no
loop.
(3) The last transformation Unfold consists in removing one procedure call of a given procedure.
Assume we have a IBTLP procedure with a call to procedure 𝑃 of arity 𝑛: 𝑋 := 𝑃 (𝐼𝐴1 , ..., 𝐼𝐴𝑛 );
We can translate it to a computationally equivalent IBTLP procedure after removing the
call to procedure 𝑃 . For that purpose, we carefully alpha-rename all the variables of the procedure declaration (parameters and local variables) to obtain the procedure 𝑃 (𝑣1 , … , 𝑣𝑛 ){𝐼𝑃 ∗ 𝐼𝑉 𝐼𝐼 ∗ }
ret 𝑣𝑟 then we add the procedure declarations 𝐼𝑃 ∗ to the caller procedure list of procedure
declarations, and the local variables 𝐼𝑉 and parameters 𝑣1 , … , 𝑣𝑛 to the caller procedure
list of local variable declarations and then we generate the following code:
𝑣1 := 𝐼𝐴1 ; … 𝑣𝑛 := 𝐼𝐴𝑛 ; 𝐼𝐼 ∗ 𝑋 := 𝑣𝑟 ;
This program transformation can be extended straightforwardly to the case where the procedure call is performed in a general expression. Notice that unfolding a procedure is necessary
as nested loops may appear because of procedure calls.
These three patterns can be iterated on a IBTLP procedure (from top to bottom) to obtain a Flat
IBTLP procedure in the following way:
INSTRUCTIONS
𝜏
𝜏
17
𝜏
𝜏
[𝑣𝜏1 ×…×𝜏𝑛 →𝙳 (𝑣11 , … , 𝑣𝑛𝑛 )𝐼𝑃 ∗ 𝐼𝑉 𝐼𝐼 ∗ ret 𝑣𝙳𝑟 ]𝑋 = 𝑣𝜏1 ×…×𝜏𝑛 →𝙳 (𝑣11 , … , 𝑣𝑛𝑛 )𝐼𝑃 ∗ 𝐼𝑉 [𝐼𝐼]∗𝑋 ret 𝑣𝑟
[𝐼𝐼𝑣 ]𝑋 = [𝐼𝐼]𝑋∪{𝑣}
[if 𝑣𝙳 { 𝐼𝐼1∗ } else { 𝐼𝐼2∗ }]𝑋 = if 𝑣𝙳 { [𝐼𝐼1 ]∗𝑋 } else { [𝐼𝐼2 ]∗𝑋 }
[loop 𝑣𝙳0 {𝐼𝐼 ∗ }; ]𝑋 = loop 𝑣𝙳0 {[𝐼𝐼]∗𝑋 }
[𝑣𝙳 ∶= 𝐼𝐸; ]𝑋 = 𝑣𝙳 ∶= 𝚌𝚑𝚔𝚋𝚍(𝐼𝐸 𝙳 , 𝑋);
Figure 4: From Flat IBTLP to Local and Flat IBTLP
Definition 5.6. The transformation 𝐼𝑃 is a mapping from IBTLP to IBTLP defined by:
𝐼𝑃 = (Unnest! ◦Unseq! )! ◦Unfold! (𝐼𝑃 ),
where, for given function f, 𝑓 ! is the least fixpoint of 𝑓 on a given input and ◦ is the usual mapping
composition.
Notice that this procedure is polynomial time computable as each application of an Unfold call
consumes a procedure call (and procedures are non recursive) and each application of an Unnest or
Unseq call consumes one loop. Consequently, fixpoints always exist.
Lemma 5.7. For any BTLP procedure 𝑃 , ❲𝑃 ❳ is a flat IBTLP procedure.
Proof. First notice that repeated application of the Unfold pattern may only introduce a constant
number of new loops as procedures are non-recursive. Consequently, the fixpoint Unfold! is defined
and reached after a constant number (in the size of the procedure) of applications. Each application of a Unseq pattern or Unnest pattern decreases by one the number of loop within a procedure.
Consequently, a fixpoint is reached (modulo 𝛼-equivalence) and the only programs for which such
patterns cannot apply are programs with a number of loops smaller than 1.
Lemma 5.8. For any BTLP procedure 𝑃 , we have J❲𝑃 ❳K = J𝑃 K and 𝑡(❲𝑃 ❳) = 𝑂(𝑡(𝑃 )).
Proof. In the first equality, the computed functions are the same since the program transformation
preserves the extensional properties. For the second equality, the general case can be treated by
a structural induction on the procedure ❲𝑃 ❳. For simplicity, we consider the case of a procedure
❲𝑃 ❳ only involving 𝑛 nested loops over guard variables 𝑥1 , … , 𝑥𝑛 and loop bounds 𝑥𝑛+1 , … , 𝑥2𝑛 ,
respectively over one single basic instruction (e.g. one assignment with no procedure call). With
inputs of size 𝑚, this procedure will have a worst case complexity of 𝑚𝑛 (when the loop bounds are
not reached). Consequently, 𝑡(𝑃 )(𝑚) = 𝑚𝑛 . This procedure will be transformed into a flat IBTLP
procedure using the Unnest transformation 𝑛 − 1 times over a variable 𝑧 containing the result of the
computation 𝑥1 #((𝑥2 ×𝑥𝑛+1 )#(… 𝑥3 ×𝑥𝑛+2 )#(𝑥𝑛 ×𝑥2𝑛 ) …) as initial value. Consequently, on an input
of size 𝑚, we have 𝑡(❲𝑃 ❳)(𝑚) ≤ |𝑧| = |𝑥1 |×(|𝑥2 |+|𝑥𝑛+1 |)×…×(|𝑥𝑛 |+|𝑥2𝑛 |) ≤ 2𝑛−1 ×𝑚𝑛 = 𝑂(𝑚𝑛 ),
as for each 𝑖 |𝑥𝑖 | ≤ 𝑚 and by definition of the # and × operators. We conclude using Lemma 5.4.
5.2.3. From Flat IBTLP to Local and Flat IBTLP. Now we describe the last program transformation
[−]𝑋 that makes the check bound performed on instruction annotations explicit. For that purpose,
[−]𝑋 makes use of the operator 𝚌𝚑𝚔𝚋𝚍 and records a set of variables 𝑋 (the annotations enclosing the
considered instruction). The procedure is described in Figure 4. Notice that the semantics condition
ensuring that no assignment must be performed on a computed value of size greater than the size
18
E. HAINRY AND R. PÉCHOUX
𝚌𝚘𝚖𝚙(𝑣(𝑣1 , … , 𝑣𝑚 ) 𝐼𝑃 ∗ var 𝑣𝑚+1 , … , 𝑣𝑛 ; 𝐼𝐼 ∗ ret 𝑣𝑟 ) = 𝜆𝑠.𝜋𝑟𝑛 (𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼 ∗ ) 𝑠)
𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼1 … 𝐼𝐼𝑘 ) = 𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼𝑘 ) … 𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼1 )
𝚌𝚘𝚖𝚒𝑛 (𝑣𝑖 ∶= 𝐼𝐸; ) = 𝜆⟨𝑣1 , … , 𝑣𝑛 ⟩.⟨𝑣1 , … , 𝑣𝑖−1 , 𝚌𝚘𝚖𝚎(𝐼𝐸), 𝑣𝑖+1 , … , 𝑣𝑛 ⟩
(
𝚕𝚎𝚝𝚁𝚎𝚌 𝑓 = 𝜆𝑡̃.𝜆𝑠.𝚌𝚊𝚜𝚎 𝑡̃ 𝚘𝚏 𝜖
𝑛
∗
𝚌𝚘𝚖𝚒 (loop 𝑣𝑖 {𝐼𝐼 }) = 𝜆⟨𝑣1 , … , 𝑣𝑛 ⟩.(
𝑗(𝑡)
→
→
𝑠
𝑓 𝑡 (𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼 ∗ ) 𝑠)
)
𝑣𝑖 )
𝚌𝚘𝚖𝚒𝑛 (if 𝑣𝙳𝑖 { 𝐼𝐼1∗ } else { 𝐼𝐼2∗ }) = 𝜆⟨𝑣1 , … , 𝑣𝑛 ⟩.𝚌𝚊𝚜𝚎 𝑣𝑖 𝚘𝚏 𝜖 → 𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼2∗ ) | 𝑗(𝑡) → 𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼1∗ )
with 𝑗 ∈ {0, 1}
𝚌𝚘𝚖𝚎(𝑐) = 𝑐,
𝑐 ∈ {1, 𝑣𝙳 }
𝚌𝚘𝚖𝚎(𝑣𝙳0 𝚘𝚙 𝑣𝙳1 ) = 𝚘𝚙 𝑣0 𝑣1 ,
𝚘𝚙 ∈ {+, −, #, ×}
𝚌𝚘𝚖𝚎(𝚌𝚞𝚝(𝑣𝙳 )) = 𝚌𝚞𝚝 𝑣
𝚌𝚘𝚖𝚎(𝚌𝚑𝚔𝚋𝚍(𝐼𝐸, {𝑣𝑗1 , … , 𝑣𝑗𝑟 })) = 𝚌𝚑𝚔𝚋𝚍 𝚌𝚘𝚖𝚎(𝐼𝐸) (⊓𝙳𝑟 𝑣𝑗1 … 𝑣𝑗𝑟 )
𝚌𝚘𝚖𝚎(𝑣(𝐼𝐴1 , … , 𝐼𝐴𝑛 )) = 𝑣 𝚌𝚘𝚖𝚎(𝐼𝐴1 ) … 𝚌𝚘𝚖𝚎(𝐼𝐴𝑛 )
𝚌𝚘𝚖𝚎(𝜆𝑣1 , … , 𝑣𝑛 .𝑣(𝑣′1 … , 𝑣′𝑚 )) = 𝜆𝑣1 . … 𝜆𝑣𝑛 .(… (𝑣 𝑣′1 ) … 𝑣′𝑚 ) …)
Figure 5: Compiler from Local and Flat IBTLP to terms
of the loop bounds for a BTLP procedure or than the size of the loop annotations for a IBTLP
procedure has been replaced by a local computation performing exactly the same check using the
operator 𝚌𝚑𝚔𝚋𝚍. Consequently, we have:
Lemma 5.9. For any BTLP procedure 𝑃 , we have J[❲𝑃 ❳]∅ K = J𝑃 K and 𝑡([❲𝑃 ❳]∅ ) = 𝑂(𝑡(𝑃 )).
Proof. We use Lemma 5.8 together with the fact that extensionality and complexity are both preserved.
5.2.4. From Local and Flat IBTLP to terms. We then encode Flat and Local IBTLP in our functional
language. For this, we define a procedure 𝚌𝚘𝚖𝚙 that will “compile” IBTLP procedures into terms.
For that purpose, we suppose that the target term language includes constructors for dyadic numbers
(𝜖, 0 and 1), a constructor for tuples ⟨…⟩, all the operators of IBTLP as basic prefix operators (+, -,
#, …), min operators ⊓𝙳𝑛 computing the min of the sizes of 𝑛 dyadic numbers and a 𝚌𝚑𝚔𝚋𝚍 operator
of arity 2 such that J𝚌𝚑𝚔𝚋𝚍(𝙼, 𝙽)K = J𝙼K if |J𝙼K| ≤ |J𝙽K| (and 𝜖 otherwise). All these operators
are extended to be total functions in the term language: they return 𝜖 on input terms for which they
are undefined. Moreover, we also require that the Flat and Local IBTLP procedures given as input
are alpha renamed so that all parameters and local variables of a given procedure have the same
name and are indexed by natural numbers. The compiling process is described in Figure 5, defining
𝚌𝚘𝚖𝚙, 𝚌𝚘𝚖𝚒𝑛 , 𝚌𝚘𝚖𝚎 that respectively compile procedures, instructions and expressions. The 𝚌𝚘𝚖𝚒
compiling process is indexed by the number of variables in the program 𝑛.
For convenience, let 𝜆⟨𝑣1 , … , 𝑣𝑛 ⟩. be a shorthand notation for 𝜆𝑠.𝚌𝚊𝚜𝚎 𝑠 𝚘𝚏 ⟨𝑣1 , … , 𝑣𝑛 ⟩ → and
let 𝜋𝑟𝑛 be a shorthand notation for the r-th projection 𝜆⟨𝑣1 , … , 𝑣𝑛 ⟩.𝑣𝑟 .
The compilation procedure works as follows: any Local and Flat IBTLP procedure of the shape
𝑣(𝑣1 , … , 𝑣𝑚 ) 𝐼𝑃 ∗ var 𝑣𝑚+1 , … , 𝑣𝑛 ; 𝐼𝐼 ∗ ret 𝑣𝑟 will be transformed into a term of type 𝜏1 × … ×
𝜏𝑛 → 𝜏𝑟 , provided that 𝜏𝑖 is the type of 𝑣𝑖 and that 𝜏1 × … × 𝜏𝑛 is the type for n-ary tuples of the
shape ⟨𝑣1 , … , 𝑣𝑛 ⟩. Each instruction within a procedure of type 𝜏1 × … × 𝜏𝑛 → 𝜏𝑟 will have type
INSTRUCTIONS
19
𝜏1 × … × 𝜏𝑛 → 𝜏1 × … × 𝜏𝑛 . Consequently, two sequential instructions 𝐼𝐼1 𝐼𝐼2 within a procedure
of 𝑛 variables will be compiled into a term application of the shape 𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼2 ) 𝚌𝚘𝚖𝚒𝑛 (𝐼𝐼1 ) and
instruction type is preserved by composition. Each assignment of the shape 𝑣𝑖 ∶= 𝐼𝐸; is compiled
into a term that takes a tuple as input and returns the identity but on the i-th component. The ith component is replaced by the term obtained after compilation of 𝐼𝐸 on which a checkbound
is performed. The min operator applied for this checkbound is ⊓𝙳𝑛 whenever 𝑋 is of cardinality
𝑛. The compilation process for expressions is quite standard: each construct is replaced by the
corresponding construct in the target language. Notice that the compiling procedure is very simple
for procedures as it only applies to Flat IBTLP procedures on which any procedure call has been
removed by unfolding. The only difficulty to face is for loop compilation: we make use of a letrec
of type 𝙳 → 𝜏1 × … × 𝜏𝑛 → 𝜏1 × … × 𝜏𝑛 . The first argument is a counter and is fed with a copy of
the loop counter 𝑣𝑖 so that the obtained term has the expected type 𝜏1 × … × 𝜏𝑛 → 𝜏1 × … × 𝜏𝑛 .
Again, for a given term 𝙼 of type 𝜏1 … ⟶ … 𝜏𝑛 ⟶ 𝜏, we define its time complexity 𝑡(𝙼)
to be a function of type ℕ → ℕ that, for any inputs of type 𝜏𝑖 𝙽⃗ and size bounded by 𝑚 returns the
maximmal value of |𝙼 𝙽⃗ ⇒ J𝙼 𝙽⃗ K|. In other words, 𝑡(𝙼)(𝑚) = max|𝙽⃗ |≤𝑚 {|𝙼 𝙽⃗ ⇒ J𝙼 𝙽⃗ K|}.
Lemma 5.10. For any BTLP procedure 𝑃 , we have J𝚌𝚘𝚖𝚙([❲𝑃 ❳]∅ )K = J𝑃 K and 𝑡(𝚌𝚘𝚖𝚙([❲𝑃 ❳]∅ )) =
𝑂(𝑡(𝑃 )).
Proof. The term obtained by the compilation process is designed to compute the same function
as the one computed by the initial procedure. It remains to check that for a given instruction the
number of reductions remains in 𝑂(𝑡(𝑃 )). This is clearly the case for an assignment as it consists in
performing one beta-reduction, one case reduction, and the evaluation of a fixed number of symbols
within the expression to evaluate. For an iteration the complexity of the letrec call is in |𝑣𝑖 | as for
an IBTLP loop. Indeed each recursive call consists in removing one symbol. Finally, it remains to
apply lemma 5.9.
Example 5.11. Let us take a simple BTLP procedure:
Procedure mult (x ,y)
Var z ,b; z := 𝜖; b := x #y;
Loop x with b do {z := z+ y ;}
Return z
It will be translated in Local and Flat IBTLP as:
mult (x ,y ){
var z ,b ; z := 𝜖; b := x#y ;
loop x {z := chkbd (z +y ,{ b });}
ret z}
And be compiled modulo 𝛼-equivalence in a term as:
(
)
⎛
⎞
𝜆𝑡̃.𝜆̃𝑠.case 𝑡̃ of 𝜀 → 𝑠
𝜆⟨x, y, z, b⟩. 𝚕𝚎𝚝𝚁𝚎𝚌 𝑓 =
x ⎟
𝑗(𝑡) → 𝑓 𝑡 (𝙼 𝑠̃))
𝜆𝑠.𝜋34 ⎜
⎜
⎟
⎝ (𝜆⟨x, y, z, b⟩.⟨x, y, z, # x y⟩(𝜆⟨x, y, z, b⟩.⟨x, y, 𝜖, 𝑏⟩ 𝑠))
⎠
where 𝙼 = 𝜆⟨x, y, z, b⟩.⟨x, y, 𝚌𝚑𝚔𝚋𝚍 (+ z y) (⊓𝙳1 b), b⟩
Now it remains to check that any term obtained during the compilation procedure has a polynomial interpretation. In order to show this result, we first demonstrate some intermediate results:
20
E. HAINRY AND R. PÉCHOUX
Lemma 5.12. Given an assignment 𝜌, the operators +, −, #, ×, 𝚌𝚞𝚝, ⊓𝙳𝑛 and 𝚌𝚑𝚔𝚋𝚍 admit a polynomial sup-interpretation.
Proof. We can check that the following are polynomial sup-interpretations.
⦇+⦈𝜌
⦇−⦈𝜌
⦇#⦈𝜌
⦇×⦈𝜌
⦇𝚌𝚞𝚝⦈𝜌
= Λ𝑋.Λ𝑌 .𝑋 + 𝑌 ,
= Λ𝑋.Λ𝑌 .𝑋,
= Λ𝑋.Λ𝑌 .𝑋 × 𝑌 ,
= Λ𝑋.Λ𝑌 .𝑋 + 𝑌 ,
= Λ𝑋. ⊔ (𝑋 − 1, 0),
⦇⊓𝙳𝑛 ⦈𝜌 = Λ𝑋1 . … .Λ𝑋𝑛 . ⊓ℕ (𝑋1 , … , 𝑋𝑛 ),
⦇𝚌𝚑𝚔𝚋𝚍⦈𝜌 = Λ𝑋.Λ𝑌 .𝑌 .
The inequalities are straightforward for the basic operators +, −, #, …. For ⦇𝚌𝚑𝚔𝚋𝚍⦈𝜌 , to be a supinterpretation, we have to check that:
∀𝙼, ∀𝙽, ⦇𝚌𝚑𝚔𝚋𝚍 𝙼 𝙽⦈𝜌 ≥ ⦇J𝚌𝚑𝚔𝚋𝚍(𝙼, 𝙽)K⦈𝜌 .
⦇𝚌𝚑𝚔𝚋𝚍 𝙼 𝙽⦈𝜌 = ⦇𝚌𝚑𝚔𝚋𝚍⦈𝜌 ⦇𝙼⦈𝜌 ⦇𝙽⦈𝜌
= Λ𝑋.Λ𝑌 .𝑌 ⦇𝙼⦈𝜌 ⦇𝙽⦈𝜌
= ⦇𝙽⦈𝜌
≥ ⦇J𝙽K⦈𝜌
by Corollary 3.10
≥ |J𝙽K|
by Lemma 3.12
≥ |J𝚌𝚑𝚔𝚋𝚍(𝙼, 𝙽)K|
≥ ⦇J𝚌𝚑𝚔𝚋𝚍(𝙼, 𝙽)K⦈𝜌
by Definition of 𝚌𝚑𝚔𝚋𝚍
by Lemma 3.12
and so the conclusion.
In the particular case where J𝙽K is not a value, we have ⦇J𝚌𝚑𝚔𝚋𝚍𝙼, 𝙽)K⦈𝜌 = ⦇𝜖⦈𝜌 = 1 so the
inequality is preserved.
Now we are able to provide the interpretation of each term encoding an expression:
Corollary 5.13. Given a BTLP procedure 𝑃 , any term 𝙼 obtained by compiling an expression 𝐼𝐸
(i.e. 𝙼 = 𝚌𝚘𝚖𝚎(𝐼𝐸)) of the flat and local IBTLP procedure [❲𝑃 ❳]∅ admits a polynomial interpretation ⦇𝙼⦈𝜌 .
Proof. By unfolding, there is no procedure call in the expressions of procedure [❲𝑃 ❳]∅ . By Lemma 5.12
and by Definition 3.5 , any symbol of an expression has a polynomial interpretation, obtained by finite composition of polynomials.
Theorem 5.14. Any BTLP procedure 𝑃 can be encoded by a term 𝙼 computing the same function
and admitting a polynomial interpretation.
Proof. We have demonstrated that any loop can be encoded by a first order term whose runtime is
polynomial in the input size. Each higher order expression in a tuple can be encoded by a first order
term using defunctionalization. Consequently, by completeness of first-order polynomial interpretations there exists a term computing the same function and admitting a polynomial interpretation.
INSTRUCTIONS
21
Example 5.15. We provide a last example to illustrate the expressivity of the presented methodology.
Define the term 𝙼 by:
𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝜆g.𝜆𝚡.𝚌𝚊𝚜𝚎 𝚡 𝚘𝚏 𝚌(𝚢, 𝚣) → g (𝚏 g 𝚣),
𝚗𝚒𝚕 → 𝚗𝚒𝚕
The interpretation of 𝙼 has to satisfy the following inequality:
⊓{𝐹 | 𝐹 ≥ Λ𝐺.Λ𝑋.4 ⊕ (1 ⊔ (⊔𝑋≥1 (𝐺(𝐹 𝐺 (𝑋 − 1))))}
Clearly, this inequality does not admit any polynomial interpretation as it is at least exponential
in 𝑋. Now consider the term 𝙼 (𝜆𝚡.1 + (1 + (𝚡)). The term 𝜆𝚡.1 + (1 + (𝚡)) can be given the
interpretation Λ𝑋.𝑋 ⊕ 3. We have to find a function 𝐹 such that 𝐹 (Λ𝑋.𝑋 ⊕ 3) ≥ Λ𝑌 .4 ⊕
(1 ⊔ (⊔𝑌 ≥1 (𝐹 (Λ𝑋.𝑋 ⊕ 3) (𝑌 − 1)) ⊕ 3)). This inequality is satisfied by the function 𝐹 such that
𝐹 (Λ𝑋.𝑋 ⊕ 3) 𝑌 = (7 × 𝑌 ) ⊕ 4 and consequently 𝙼 has an interpretation. This highlights the fact
that a term may have an interpretation even if some of its subterms might not have any. As expected,
any term admitting an interpretation of the shape Λ𝑋.𝑋 ⊕ 𝛽, for some constant 𝛽, will have an
interpretation when applied as first operand of this fold function.
6. CONCLUSION
This paper introduces a theory for higher-order interpretations that can be used to deal with higherorder complexity classes. This is a novel approach but there are still some important issues to discuss.
∙ Synthesis: it is well-known for a long time that the synthesis problem that consists in finding
the sup-interpretation of a given term is undecidable in general for first order terms using
interpretations over natural numbers (see [Péc13] for a survey). As a consequence this problem is also undecidable for higher order. However it is also well-known that it will become
decidable if programs are defunctionalized (up to a first order term) using polynomial functions over real numbers.
∙ Expressivity: the expressivity of interpretations is as usual their main drawback: As for first
order interpretations, a lot of interesting terms computing polynomial time functions will
not have any polynomial interpretation, i.e. its interpretation will sometimes be ⊤, although
the function will be computed by another algorithm (term) admitting a finite interpretation.
It should be possible to relax the tool and to extend it to more complex data structures such
as streams, infinite trees. At least, the presented paper has shown that the tool expressivity
can be extended to higher order.
∙ Space: space issues were not discussed in this paper as there is no theory for higher order polynomial space. In analogy with the usual first order theory, a suitable definition for
higher order space complexity classes could be to consider terminating terms admitting a
non strict polynomial interpretation. By non strict, we mean, for example, that the last rule
of Definition 3.5 can be replaced by:
⦇𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝙼⦈𝜌 = 1 ⊕ ⊓{𝐹 ∈ ⦇𝚃⦈ | 𝐹 ≥ Λ⦇𝚏⦈𝜌 .⦇𝙼⦈𝜌 (𝐹 )}
Thus termination is lost as the term 𝚕𝚎𝚝𝚁𝚎𝚌 𝚏 = 𝚏 could be interpreted by 1 ⊕ Λ𝐹 .𝐹 .
This is the reason why we need to restrict the class to terminating terms. However a result
equivalent to Lemma 3.9 holds: we still keep a non-strict upper bound on the interpretation
of any derived term.
22
E. HAINRY AND R. PÉCHOUX
R EFERENCES
[BL12]
Patrick Baillot and Ugo Dal Lago. Higher-order interpretations and program complexity. In Computer Science
Logic (CSL’12), volume 16 of LIPIcs, pages 62–76, 2012.
[BL16] Patrick Baillot and Ugo Dal Lago. Higher-order interpretations and program complexity. Inf. Comput., volume 248, pages 56–81, 2016.
[BMM11] Guillaume Bonfante, Jean-Yves Marion and Jean-Yves Moyen. Quasi-interpretations a way to control resources. In Theoretical Computer Science, volume 412, pages 2776–2796, Elsevier, 2011.
[CL92] Adam Cichon and Pierre Lescanne. Polynomial interpretations and the complexity of algorithms. In Journal of
Automated Reasoning, volume 34(4), pages 325–363, 2005.
[CMPU05] Evelyne Contejean, Claude Marché, Ana Paula Tomás and Xavier Urbain. Higher-order interpretations and
program complexity. International Conference on Automated Deduction, Springer, pages 139–147, 1992.
[CK89] Stephen A. Cook and Bruce M. Kapron. Characterizations of the basic feasible functionals of finite type. In
Foundations of Computer Science, pages 154–159. IEEE Computer Society, 1989.
[Con73] Robert L. Constable. Type two computational complexity. In Proc. 5th annual ACM Symposium on Theory of
Computing, pages 108–121. ACM, 1973.
[Fér14] Hugo Férée. Complexité d’ordre supérieur et analyse récursive. (Higher order complexity and computable analysis). PhD thesis, University of Lorraine, Nancy, France, 2014.
[FHHP15] Hugo Férée, Emmanuel Hainry, Mathieu Hoyrup and Romain Péchoux. Characterizing polynomial time complexity of stream programs using interpretations In Theor. Comput. Sci., volume 585, pages 41–54, 2015.
[HP17] Emmanuel Hainry and Romain Péchoux. Higher order interpretation for higher order complexity In 21st International Conference on Logic for Programming, Artificial Intelligence and Reasoning, pages 269–285, 2017.
[IKR02] Robert J. Irwin, Bruce M. Kapron, and James S. Royer. On characterizations of the basic feasible functionals
(part II). Technical report, Syracuse University, 2002.
[IRK01] Robert J. Irwin, James S. Royer, and Bruce M. Kapron. On characterizations of the basic feasible functionals
(part I). Journal of Functional Programming, 11(1):117–153, 2001.
[KC10] Akitoshi Kawamura and Stephen A. Cook. Complexity theory for operators in analysis. In Leonard J. Schulman,
editor, Proc. 42nd ACM Symposium on Theory of Computing, pages 495–502. ACM, 2010.
[Ko91] Ker-I Ko. Complexity Theory of Real Functions. Birkhäuser, 1991.
[KS01] William A Kirk and Brailey Sims. Handbook of metric fixed point theory. Springer, 2001.
[Lan79] D.S. Lankford. On proving term rewriting systems are noetherian. Technical report, 1979.
[Meh74] Kurt Mehlhorn. Polynomial and abstract subrecursive classes. In Proc. 6th annual ACM Symposium on Theory
of Computing, pages 96–109. ACM, 1974.
[MN70] Zohar Manna and Steven Ness. On the termination of Markov algorithms. In Third Hawaii International Conference on System Science, pages 789–792, 1970.
[Péc13] Romain Péchoux. Synthesis of sup-interpretations: A survey. Theor. Comput. Sci., 467:30–52, 2013.
[Tar55] Alfred Tarski. A lattice-theoretical fixpoint theorem and its applications. Pacific journal of Mathematics,
5(2):285–309, 1955.
[VdP93] Jaco Van de Pol. Termination proofs for higher-order rewrite systems. In International Workshop on HigherOrder Algebra, Logic, and Term Rewriting, volume 816 of LNCS, pages 305–325. Springer, 1993.
[Win93] Glynn Winskel. The formal semantics of programming languages: an introduction. MIT press, 1993.
| 6cs.PL
|
Statistical mechanics of unsupervised feature learning in a
restricted Boltzmann machine with binary synapses
Haiping Huang∗
RIKEN Brain Science Institute, Wako-shi, Saitama 351-0198, Japan
(Dated: March 8, 2017)
arXiv:1612.01717v2 [cs.LG] 7 Mar 2017
Revealing hidden features in unlabeled data is called unsupervised feature learning, which plays an important role in pretraining a deep neural network. Here we
provide a statistical mechanics analysis of the unsupervised learning in a restricted
Boltzmann machine with binary synapses. A message passing equation to infer the
hidden feature is derived, and furthermore, variants of this equation are analyzed. A
statistical analysis by replica theory describes the thermodynamic properties of the
model. Our analysis confirms an entropy crisis preceding the non-convergence of the
message passing equation, suggesting a discontinuous phase transition as a key characteristic of the restricted Boltzmann machine. Continuous phase transition is also
confirmed depending on the embedded feature strength in the data. The mean-field
result under the replica symmetric assumption agrees with that obtained by running
message passing algorithms on single instances of finite sizes. Interestingly, in an
approximate Hopfield model, the entropy crisis is absent, and a continuous phase
transition is observed instead. We also develop an iterative equation to infer the
hyper-parameter (temperature) hidden in the data, which in physics corresponds
to iteratively imposing Nishimori condition. Our study provides insights towards
understanding the thermodynamic properties of the restricted Boltzmann machine
learning, and moreover important theoretical basis to build simplified deep networks.
Keywords: Neuronal networks, Cavity and replica method, Learning theory, Statistical inference
I.
INTRODUCTION
Standard machine learning algorithms require a huge number of training examples to
uncover hidden features, while humans and other animals can learn new concepts from
only a few examples without any supervision signal [1]. Learning hidden features in unlabeled training examples is called unsupervised learning. Understanding how the number of
examples confines the learning process is of fundamental importance in both cognitive neuroscience and machine learning [2, 3]. As already observed in training of deep neural networks,
unsupervised pretraining can significantly enhance the final performance, because the unsupervised pretraining provides a good initial region in parameter space from which the final
fine-tuning starts [4]. However, there are few theoretical works addressing how unsupervised
learning extracts hidden features. One potential reason is that the unsupervised learning
process in a deep neural network is typically very complicated. Hence, understanding the
∗
Electronic address: [email protected]
2
mechanism of unsupervised learning in simple models is of significant importance.
This topic is recently studied based on the Bayesian inference framework [5]. In this
recent work, the authors treated each example (data) as a constraint on the factor graph, and
reformulated the learning of model parameters as a Bayesian inference problem on graphical
models, and derived the message passing equations to infer the hidden feature from a finite
amount of data. They observed an entropy crisis in a simple restricted Boltzmann machine
(RBM) model, and predicted a discontinuous phase transition. However, in an approximate
Hopfield model obtained by a high-temperature expansion of the RBM model, the entropy
crisis is absent, and instead, a continuous transition is observed. These properties observed
in studies of single instances capture key characteristics of the unsupervised feature learning.
Here, we further demonstrate that the message passing equation derived in the recent
work [5] agrees with the statistical analysis of the system in the thermodynamic limit via
replica theory, a standard theoretical tool in spin glass theory of disordered systems [6].
The replica computation predicts the location of phase transition separating an impossibleto-infer regime to inferable regime. This transition can be continuous depending on the
embedded feature strength. A discontinuous phase transition always exists in a restricted
Boltzmann machine learning, but absent in an approximate Hopfield model where only continuous phase transition is observed. We also develop an iterative equation to infer the
hyper-parameter (temperature) hidden in the data, which in physics corresponds to iteratively imposing Nishimori condition. This iterative scheme can even quantitatively predict
how apparent features embedded in a real dataset are. Our analysis gives a thorough understanding of novel properties of the restricted Boltzmann machine within replica symmetric
approximation.
This paper is structured as follows. In Sec. II, we introduce a simple RBM model for
unsupervised feature learning, and propose the Bayesian inference framework to derive the
message passing equation on factor graph representation of the learning process, and this
equation is then statistically analyzed and compared with replica computation under the
replica symmetric assumption. A more efficient approximate message passing equation is also
derived. We also derive an iterative equation based on Bayes rule to predict the unknown
temperature (feature strength) in the data. In Sec. III, we approximate the RBM with
the Hopfield model where the stored pattern is interpreted as the feature vector. Similar
statistical analysis is carried out, and its physical implications are discussed. We end the
paper with a summary in Sec. IV.
II.
SIMPLE RESTRICTED BOLTZMANN MACHINE LEARNING AND ITS
STATISTICAL MECHANICS PROPERTIES
A.
Simple restricted Boltzmann machine learning with binary synapses
Restricted Boltzmann machine is a basic unit widely used in building a deep belief network [4, 7]. It consists of two layers of neurons. The visible layer receives the input examples
while the other hidden layer builds an internal representation of the input. No lateral connections exist within each layer for computational efficiency. The symmetric connections
(synapses) between visible and hidden neurons are considered as features the network tries
to learn from a large number of training examples.
It is a common strategy to use sampling-based gradient-decent method to learn features
in the data [4], however, the gradient-decent learning is complicated and not amenable for
3
analytical studies. Recent work showed that learning features can also be studied within a
Bayesian learning framework [5], which has the advantage of accounting for the uncertainty
(about the features) caused by noises in the data [8], and furthermore can be analytically
studied on probabilistic graphical models.
We focus on an unsupervised learning of finite samplings generated by a simple RBM,
where a single hidden neuron is considered. The task is to uncover an unknown rule embedded in the unlabeled data. The rule is represented by a binary feature vector defined
as {ξi } where i goes from 1 to N, the number of neurons in the visible layer. We assume
components of the true hidden feature vector connecting the visible neurons and the hidden
neuron can take only two values, i.e., +1 or −1, with equal probabilities. Then this feature
vector is used to generate
independent random samples according to the joint probability
√
P
−βE(σ,h)/ N
P (σ, h) ∝ e
, where E(σ, h) = − i hξi σi , and σ is the visible configuration and
h is the hidden neuron’s state. Both h and components of σ take binary values (±1) as
well. ξi represents the connection between visible neuron σi and the unique hidden neuron
h. Moreover, we assume ξ is a binary feature vector in the current setting of unsupervised
learning. A rescaled feature factor by the system size is assumed as well. The feature vector
is also multiplied by an inverse-temperature parameter β to investigate effects of the feature
strength on the unsupervised learning. For simplicity, we consider the case of neurons without any external biases (fields). Generalization to the case of neurons with external fields is
straightforward (Appendix F).
The distribution of σ can be obtained by marginalization of h on the joint distribution
P (σ, h), resulting in
cosh √βN ξ T σ
,
P (σ|ξ) = P
(1)
√β ξ T σ
cosh
σ
N
P
√β ξ T σ
where the normalization is in fact independent of ξ, since
cosh
=
σ
N
iN
h
2 cosh √βN . Suppose we have M independent samples or examples {σ a }M
a=1 to learn the
true hidden feature vector ξ, using the Bayes’ formula, we have the posterior distribution of
the feature vector as
Q
P (σ a |ξ)
β T a
1Y
a
a
P (ξ|{σ }) = P Q
(2)
cosh √ ξ σ ,
=
a
Z a
N
ξ
a P (σ |ξ)
where Z is the partition function of the model, a goes over all examples and T denotes a
vector transpose operation. A uniform prior probability for the feature vector is assumed for
simplicity. A large β indicates the feature in the data is strong, and expected to be revealed
by a few examples, while a weak feature vector may not be revealed by a huge number of
examples. Each example serves as a constraint to the learning process. Once M > 1, the
model becomes non-trivial as the partition function could not be computed exactly for a
large number of visible neurons. This M can be finite or proportional to the system size, and
in the latter case we define a data density as α = M/N. Hereafter, we omit the conditional
dependence of P (ξ|{σ a}) on {σ a }.
4
FIG. 1: (Color online) Schematic illustration of factor graph representation and message passing.
Left panel: circle nodes indicate feature components to be inferred. Square nodes indicate data
constraints. The strength of each connection is given by the data, e.g., σia indicates the strength
(±1) with which the feature component ξi is related to a-th example. Right panel: the top
panel shows constraint a collects information from its neighboring feature nodes other than i and
produces an output message to node i. The bottom panel shows node i collects information from
its neighboring constraints other than b and produces an output message to node b. The figure is
taken from Ref [5].
B.
Bayesian learning via message passing
We call optimizing the marginal posterior probability of feature vectors given the data
as Bayesian learning in the current unsupervised learning context. That is, we compute the
maximizer of the posterior marginals (MPM) estimator ξˆi = arg maxξi Pi (ξi ) [9]. We define
P
the overlap between the inferred feature vector and the true one as q = N1 i ξitrue ξˆi , where
ξ̂ is the inferred feature vector. The MPM estimator maximizes the overlap. If q = 0, the
examples do not give any information about the feature vector. If q = 1, the feature vector is
perfectly determined. In the numerical simulations, q is evaluated by an average over many
random instances (different true feature
D P vectors).
D EE To compare with replica computation
1
true ˆ
(Sec. II D), the average value q = N i ξi
ξi
is used. Note that the inner average is
the thermal average, and the outer average is taken with respect to different choices of true
features.
The statistical inference now is simplified to the computation of marginal probabilities,
e.g., Pi (ξi ), which is still a hard problem due to the interaction among example constraints.
However, by mapping the model (Eq. (2)) onto a factor graph [10, 11], the marginal probability can be estimated by message passing (Fig. 1). For simplicity, we give the final simplified
message passing equations (sMP) as follows (detailed derivations are given in Ref [5], also
in Appendix A):
X
mi→a = tanh
ub→i ,
(3a)
b∈∂i\a
√
ub→i = tanh−1 tanh(βGb→i ) tanh(βσib / N ) ,
(3b)
P
where Gb→i = √1N j∈∂b\i σjb mj→b. The cavity magnetization is defined as mj→b =
P
ξj ξj Pj→b (ξj ). mi→a can be interpreted as the message passing from feature i to the
5
data constraint a, while ub→i can be interpreted as the message passing from data constraint b to its feature i. If the weak correlation assumption (also named Bethe approximation [12]) is self-consistent, the sMP would converge to a fixed point corresponding to
a stationary point of the Bethe free energy function with respect to the cavity messages
{mi→a , ua→i } [10]. From this fixed point, one can extract useful information about the
1+mi ξi
true feature vector of the data,
by calculating the marginal probability as Pi (ξi ) = 2
P
where mi = tanh
b∈∂i ub→i . Note that we perform the feature inference using the same
inverse-temperature as used to generate the data, thus the inference is Bayes-optimal and
satisfies the Nishimori condition [9]. In the simulation section, we also perform the Bayesian
inference using slightly different temperatures.
P
Next,P
we compute the Bethe free energy, which is obtained by −βNfRS = i ln Zi −
(N − 1) a ln Za . The free energy contribution of a feature node reads
Y
Xh
√ i
Ga→i ,
(4)
β 2 Ξ2a→i /2 + ln cosh βGa→i + βσia / N + ln 1 +
ln Zi =
a∈∂i
a∈∂i
and the free energy contribution of a data node reads
ln Za = β 2 Ξ2a /2 + ln cosh βGa ,
(5)
P
P
where we define Ga→i = e−2ua→i , Ξ2a→i ≃ N1 j∈∂a\i (1 − m2j→a ), Ga = √1N i∈∂a σia mi→a , and
P
Ξ2a = N1 i∈∂a (1 − m2i→a ).
Another important quantity is the number of feature vectors consistent
Pwith the presented
1
random samplings, characterized by the entropy per neuron s = − N ξ P (ξ) ln P (ξ). In
the presence of a larger dataset, the generative machine should have less uncertainty about
the underlying feature, corresponding to small or vanishing entropy. The entropy can be
∂
derived by using the standard thermodynamic formula s = (1 − β ∂β
)(−βfRS ). Under the
Bethe approximation, s is evaluated
as summing
P
P up contributions from single feature nodes
and example nodes: Ns = i ∆Si −(N −1) a ∆Sa , where single feature node contribution
is expressed as
!
i
Xh
Y
√
β 2 Ξ2a→i /2 + ln cosh(βGa→i + βσia / N ) + ln 1 +
∆Si =
Ga→i
a∈∂i
−
a∈∂i
"
X
a∈∂i
Ha→i (+1) +
Y
a∈∂i
Ga→i
X
a∈∂i
#
Ha→i (−1) / 1 +
Y
a∈∂i
Ga→i
!
(6)
,
and single example contribution reads
∆Sa = ln cosh(βGa ) − β 2 Ξ2a /2 − βGa tanh(βGa ),
(7)
√
√
where we define Ha→i (ξi ) = β 2 Ξ2a→i + (βGa→i + βσia ξi / N) tanh(βGa→i + βσia ξi / N ).
C.
Approximate message passing equations
One iteration of the sMP equation (Eq. (3)) requires the time complexity of the order
O(MN) and memory of the order O(MN). The sMP equation can be further simplified
6
by reducing computational complexity. The final equation in physics is called ThoulessAnderson-Palmer (TAP) equation [13], and in information theory is named approximate
message passing (AMP) equation [14]. One strategy is to use large-N limit. We first get
βσb
the cavity bias in this limit as ub→i ≃ √Ni tanh βGb→i . Then by applying the same large-N
βσa
expansion, we obtain mi→a ≃ mi − (1 − m2i ) √Ni tanh βGa→i . Therefore, we get the first AMP
equation as follows:
1 X a
σi mi − β(1 − Q) tanh βGa ,
(8)
Ga = √
N i∈∂a
P
P
σib
tanh βGb→i , and note
where Q ≡ N1 i m2i . Then we define the local field Hi = b∈∂i √N
that Gb→i = Gb −
σb
√ i mi→b ,
N
Hi ≃
we can obtain an approximate Hi in the large-N expansion,
X σb
βmi X
√ i tanh βGb −
(1 − tanh2 βGb ).
N
N
b∈∂i
b∈∂i
(9)
The last term in the expression of Hi serves as an Onsager reaction term in a standard TAP
equation. Finally we arrive at the second AMP equation:
!
2
X
X βσ b
β
m
i
√ i tanh βGb −
(1 − tanh2 βGb ) .
(10)
mi ≃ tanh
N
N
b∈∂i
b∈∂i
Now we have only N + M equations to solve rather than 2NM equations in the sMP
equation (Eq. (3)). To make AMP equations converge in a parallel iteration, the time
indexes for the variables are important [15, 16]. Here we write down the closed form of
AMP equation with correct time indexes:
1 X a t−1
Gt−1
=√
σi mi − β(1 − Qt−1 ) tanh βGt−2
(11a)
a
a ,
N i∈∂a
!
2 t−1 X
X βσ b
β
m
2
i
i
√ tanh βGt−1
−
mti ≃ tanh
(1 − tanh βGt−1
(11b)
b
b ) ,
N
N
b∈∂i
b∈∂i
where t denotes the time index for iteration. These time indexes just follow the temporal
order when we derive the AMP equation from the sMP equation.
D.
Statistical analysis of sMP equations and replica computation
Next, we P
give a statistical analysis of the sMP equation. We first define the cavity field
hi→a = √1N b∈∂i\a σib tanh βGb→i . Under the replica symmetric assumption, hi→a follows
a Gaussian distribution with mean zero and variance αQ̂ in the large-N limit. We define
Q̂ ≡ tanh2 βGb→i . Similarly, Gb→i also follows a Gaussian distribution with mean zero
but variance Q. Therefore, we arrive at the following thermodynamic equation:
Z
q
2
(12a)
Q = Dz tanh β αQ̂z,
Z
p
Q̂ = Dz tanh2 β Qz,
(12b)
7
−z 2 /2
where Dz = dze√2π . One can expect that when α is small, only one solution of Q = 0
exists for the above equation, however, at some critical αc , there is a nontrivial solution of
Q 6= 0, which signals the fixed point of sMP or AMP starts to contain information about
the underlying true feature vector. αc can be determined by expanding the above equation
around Q = 0. The expansion leads to αc = β −4, which implies that when α < αc , Q = 0
is the stable solution of the thermodynamic equation, but as long as α > αc , the Q = 0 is
not the stable solution any more. However, as we compare this solution with sMP result
on single instances, Q 6= 0 solution does not match the numerical simulation very well. To
explain this, a replica computation is required.
Now, we perform a replica computation of the free energy function. Instead of calculating
a disorder average of ln Z, the replica trick computes the disorder average of an integer power
of Z, then the free energy density (multiplied by −β) can be obtained as [9]
− βf =
ln hZ n i
,
n→0,N →∞ nN
lim
(13)
where the limit N → ∞ should be taken first since we can apply the saddle-point analysis [9], and the disorder average is taken over all possible samplings (data) and the random
realizations of true feature vector. The explicit form of hZ n i reads
γ a
X
XY
βξ σ
1
a
true
n
√
P ({σ }|ξ )
cosh
hZ i = N
,
(14)
2
N
{σa ,ξtrue }
{ξγ } a,γ
where γ indicates the replica index. We leave the technical details to the appendix D, and
give the final result here. The free energy function reads,
Z
√
r̂(r − 1) αβ 2
+
(1 − r) + Dz ln 2 cosh(q̂ + r̂z)
−βfRS = −q q̂ +
2
2
Z
Z
(15)
p
−β 2 /2
2
Dy Dt cosh βt ln cosh β(qt + r − q y).
+αe
and the associated saddle-point equations are expressed as
Z
√
q = Dz tanh(q̂ + r̂z),
Z
√
r = Dz tanh2 (q̂ + r̂z),
Z
Z
p
2 −β 2 /2
Dt Dy sinh βt tanh β(qt + r − q 2 y),
q̂ = αβ e
Z
Z
p
2 −β 2 /2
Dt Dy cosh βt tanh2 β(qt + r − q 2 y).
r̂ = αβ e
(16a)
(16b)
(16c)
(16d)
We make some remarks about the above saddle-point equations. q indicates the typical
value of the overlap between the true feature vector and the estimated one, while r indicates
the typical value of the overlap between two estimated feature vectors selected from the
posterior probability (Eq. (2)). According to the Nishimori condition, q = r, implying
that the embedded true feature vector follows the same posterior distribution in Bayesian
inference. We verify this point later in numerical solution of the saddle point equations.
8
Assuming q and r are both small values close to zero, Eq. (16) in this limit implies that a
critical αc = β14 , above which q = 0 is not a stable solution any more. By expanding Eq. (16)
around q = 0 up to the second order O(q 2 ), we find q ≃ β 2 (α − αc ) when α approaches αc
from above.
Note that by assuming q = 0 in Eq. (16), we obtain Eq. (12); this is the reason why
Eq. (12) can predict the correct threshold for transition but could not describe the property
of q 6= 0. This may be because the Gaussian assumption for messages does not generally
hold when the messages start to have partial (even full) alignment with the true feature
vector (i.e., q 6= 0), as also observed in a similar study of the retrieval phase in the Hopfield
model by message passing methods [17].
The entropy can be derived from the free energy, and the result (Appendix D) is given
by
Z
√
r̂(r − 1) αβ 2
s = −2q q̂ + rr̂ +
−
(r + 1) + Dz ln 2 cosh(q̂ + r̂z)
2
2
Z
Z
(17)
p
2
−β /2
2
Dy Dt cosh βt ln cosh β(qt + r − q y).
+αe
2
When q = 0, s = ln 2 − αβ2 , which coincides with that obtained with cavity method
(Appendix B). Given q = 0, that is the data still do not contain information about the
hidden feature, the entropy will become negative once α > 2βln2 2 ≡ αs=0 . This suggests that
the entropy crisis can even occur within
√
pq α= 0 regime. Alternatively, at a fixed α, the entropy
crisis occurs at a temperature Tc = 2 ln 2 . Setting αc = αs=0 , one obtains Te = 2 ln 2,
which distinguishes two cases: (i) for T > Te , the transition of q from zero to non-zero value
takes place after the entropy crisis; (ii) for T < Te , the transition takes place before the
crisis. This has clear physical implications. If the transition occurs before the entropy crisis,
the location of transition identified by the replica-symmetric theory is correct. However,
the transition after the crisis is incorrect under the replica-symmetric assumption, because
although the replica-symmetric solution is stable, the entropy is negative, violating the fact
that for a system with discrete degrees of freedom, the entropy should be non-negative.
According to arguments in Refs. [18, 19], there exists a discontinuous transition before the
entropy crisis takes place, since the transition can not continuously emerge from a stable
replica-symmetric solution. Without further solving complex more-steps replica symmetric
breaking equations, we adopt an alternative explanation of this entropy crisis. Under the
current context, if the data size is large enough, the data would shrink the feature space to
a sub-exponential regime where the number of candidate features is not exponential with
N any more. In this case, we encounter the entropy crisis. Therefore, the entropy crisis
separates an exponential regime from a sub-exponential regime. The transition for q occurs
within the exponential regime if the feature strength is strong enough (large β).
E.
Simulations on single instances compared with theory
We use the above mean field theory to analyze single realizations (instances) of the
unsupervised learning model. Random
samplings are first generated according to a RBM
√
distribution P (σ, h) ∝ e−βE(σ,h)/ N [11, 20], where the energy is rescaled by the system size
and the inverse temperature, which tunes difficulty level of the learning task. These random
samplings then serve as the quenched disorder specifying the interaction between the feature
9
(a)
0.6
=1.0
entropy per neuron
=0.8
0.4
0.2
0.0
-0.2
-0.4
0.0
0.5
0.4
r,
q,
r,
0.3
q, r
q,
1.0
1.5
2.0
2.5
3.0
3.5
(b)
=0.8
=0.8
=1.0
=1.0
0.2
0.1
0.0
0.0
0.5
1.0
1.5
2.0
2.5
3.0
3.5
FIG. 2: (Color online) Mean-field result obtained by replica theory compared with simulations
carried out by running sMP on single instances of RBM. In simulations, we consider 20 instances
of size N = 400. (a) Entropy per neuron versus data density α. The lines are replica result, while
the symbols are results obtained on single instances. The error bars are smaller than the symbol
size. (b) Order parameters (q, r) versus α. q = r as expected. The numerical simulations (q) on
single instances are indicated by symbols (solid circles for β = 1.0, and solid squares for β = 0.8),
while the theoretical predictions of replica computation are indicated by lines.
vector and the example constraint (Fig. 1). Finally, by initializing the message on each link
of the factor graph (Fig. 1), we run the sMP equation (Eq. (3)) until it converges within
a prefixed precision. From the fixed point, we compute the entropy of consistent feature
vectors and the overlap between the inferred feature vector and the true one.
We first compare results of the message passing algorithm with those obtained by replica
computation. In Fig. 2 (a), we show the entropy density versus the data density α. The
entropy characterizes how the number of candidate feature vectors compatible with the given
data changes with the network size N. The replica result predicts an entropy crisis, i.e., the
entropy becomes negative at some data size, but the negativity of the entropy is not allowed
in a system with discrete degrees of freedom (ξi = ±1). This implies that, a discontinuous
phase transition should be present before the crisis [18, 19]. The results obtained by running
sMP coincide perfectly with the replica result. The entropy density decreases more rapidly
10
1.0
sMP
0.8
AMP
q
0.6
0.4
0.2
0.0
0
1
2
3
4
5
FIG. 3: (Color online) Performance comparison between sMP and AMP for RBM. The model
parameters are N = 100, β = 1. 30 random instances are considered.
with α at larger β. This is expected, because large β indicates strong feature, thus to shrink
the feature space to the same size, less data is required compared to the case of detecting
weak feature (small β).
In Fig. 2 (b), we show how order parameters change with α. The simulation results agree
with the replica prediction, despite slightly large deviations observed around the transition
point. For β > Te−1 , a first continuous transition occurs at αc = 1, which should be correct
since the replica computation is stable and the entropy is positive there. At α = 1, the
system starts to have information about the embedded feature, and therefore, the overlap
q starts to increase even for a finite-size system. The asymptotic behavior of q at a slightly
larger α (> αc ) is captured by β 2 (α−αc ), as already derived in the theory section (Sec. II D).
As predicted by replica computation, at a larger value of α = αs=0 , the entropy becomes
negative. Equivalently, at this α, the entropy vanishes at a critical temperature, and thus the
equilibrium is dominated by a finite number of lowest energy states (so-called condensation
phenomenon [10, 21]). But the sMP is still stable, therefore a one-step replica symmetry
breaking solution should grow discontinuously from the replica symmetric solution, and
this second discontinuous glass transition is expected before or at the crisis α to resolve the
entropy crisis. Intuitively, we expect that the increasing data will freeze the value of synapses,
thus vanishing entropy indicates that the feature space develops isolated configurations: each
configuration forms a single valley in the free energy profile, while the number of these valleys
is not exponential any more (but sub-exponential). To prove this picture, one needs to go
beyond the replica symmetric assumption.
For β < Te−1 , the continuous transition takes place after the entropy crisis, which is
incorrect. Therefore, according to the above argument, a discontinuous transition should be
expected at or before the crisis data size. Our simulation result also confirms the Nishimori
condition (q = r), that is, when the temperature used to generate data is equal to that used
to infer the true feature, the true feature follows the posterior distribution as well. As a
consequence, the overlap between a typical feature configuration and the embedded one is
equal to the overlap between two typical configurations.
11
0.8
0.7
1.2
0.6
0.9
q
0.5
0.4
0.3
0.2
0.1
0.0
0
1
2
3
4
5
6
FIG. 4: (Color online) Inference performance with different inference temperatures for RBM. The
model parameters are N = 100, β ∗ = 0.8. 30 random instances are considered.
Secondly, the inference can also be carried out by using AMP with less requirements of
computer memory and time. The result is compared with that obtained by sMP, which is
shown in Fig. 3.
We also study the effects of temperature deviation. If the inference is carried out in a
different temperature from that used to generate the data, is the performance degraded?
We address this question by considering two different temperatures: one is slightly larger
than the data temperature (0.9β ∗ ); the other is slightly below the data temperature (1.2β ∗),
where β ∗ denotes the inverse data temperature. As shown in Fig. 4, when β = β ∗ , the
performance is optimal in the inferable regime, compared to other inference temperatures,
as expected from the Nishimori condition [9]. Large fluctuations around the transition point
may be caused by finite size effects.
Finally, we explore the effect of network size keeping the identical feature strength (Fig. 5).
At a given number of examples, larger network size yields better performance in terms of
prediction overlap. However, the performance seems to get saturated when N ≃ 1000 at
a relatively large M in the current context. Using a larger network seems to make the
unsupervised learning better, but further increasing the network size has a little effect on
the performance.
F.
Learning temperature parameters from a dataset: how cold is a dataset?
In Fig. 4, we have showed the inference performance with slightly different inference
temperatures. Is it possible to infer the true temperatures used to generate the data itself?
If we can learn the temperature parameters, we can know the typical properties of phase
transitions intrinsic in the system. This is possible by applying the Bayesian rule once again.
12
1.0
0.8
0.6
q
N=100
N=500
0.4
N=1000
0.2
0.0
0
100
200
300
400
500
600
M
FIG. 5: (Color online) Inference √
overlap versus the number of examples for RBM with different
values of N . Feature strength β/ N is kept constant (0.1).
The posterior probability of β given the data {σ a }M
a=1 is given by
P ({σ a }|ξ, β)P0(ξ, β)
P
dβ ξ P ({σ a }|ξ, β)P0(ξ, β)
ξ
√
X
−N M ln 2 cosh(β/ N ) Y
β T a
1
e
cosh √ ξ σ
=
Z({σ a }) ξ
N
a
P (β|{σ a}) =
X
P (β, ξ|{σ a}) = R
∝ e−M
β2
2
(18)
Z(β, {σ a}),
where we used the uniform prior probability P0 for the hyper-parameters. Note that
Z(β, {σ a }) is the same partition function as in Eq. (2). We maximize the posterior probability with respect to β, and obtain the self-consistent equation β should satisfy:
∂ ln Z(β, {σ a})
= Nαβ.
∂β
(19)
The left hand side of the above equation is exactly the negative energy (−Nǫ), which can
be evaluated by sMP equation (Eq. (3)).
When
N is not very large, the equation deter
√
−1
− α√ǫ N , from which Eq. (19) is recovered in large
mining β is given by β = N tanh
N limit.PUnder the BethePapproximation, the energy per neuron ǫ can be computed by
Nǫ = − i ∆ǫi + (N − 1) a ∆ǫa , where ∆ǫi and ∆ǫa are given respectively by
!
"
#
X
X
Y
Y
∆ǫi =
Ha→i (+1) +
Ga→i
Ha→i (−1) / β + β
Ga→i ,
(20a)
∆ǫa =
a∈∂i
βΞ2a +
a∈∂i
Ga tanh(βGa ).
a∈∂i
a∈∂i
(20b)
Starting from some initial value of β, one can iteratively update the value of β until
convergence within some precision. After one updating, the messages in sMP equation
13
are also updated. To avoid numerical instability, we used the damping technique, i.e.,
β(t) = ηβ(t) + (1 − η)β(t − 1), where t denotes the iteration step and η ∈ [0, 1] is a damping
factor. It is not guaranteed that there exists unique maximum of the posterior (Eq. (18)) [16],
but if necessary, one can choose the hyper-parameter corresponding to the global maximum
of the posterior by running the sMP from different initial conditions.
In statistics, this iterative scheme is named Expectation-Maximization algorithm [22],
where the message updates are called E-step, and the temperature update is called M-step.
In physics, Eq. (19) corresponds to the Nishimori condition (q = r, see also Appendix D
for derivation of the energy function). This means that, in principle, the hyper-parameter
can be learned by iteratively imposing the Nishimori condition [16, 23]. On the Nishimori
condition, the state space of the model is simple [24], and thus sMP yields informative
information about the dominant feature vector.
We know that the temperature parameter is related to the feature strength embedded in
the data. Once we learn the temperature, we are able to know how apparent the hidden
feature is in a dataset, and determine the critical data size for unsupervised feature learning.
We first test our method in synthetic dataset as already studied in Sec. II E, where the true
value of hyper-parameter is known. We then infer the embedded feature strength in the real
dataset (MNIST handwritten digit dataset [25]), where we do not have any knowledge about
the true feature strength. Results are shown in Fig. 6. For the synthetic data at βtrue = 1,
as the data size grows, inferred value of β gets closer to the true value as expected (Fig. 6
(a)). As shown in the inset, the time (iteration steps) dependent inferred value first drops to
a lower value, and then gradually approaches the true value. With a larger data size (e.g.,
M = 800), β increases more rapidly after a sudden drop. For the real dataset (Fig. 6 (b)),
we observe that the final fixed point of β is quite large, implying that the feature strength
in the handwritten digits is very strong (β ∗ ≃ 21.5).
We also test effects of β on learned features. As shown in the feature map (Fig. 6 (c)), it
turns out that the learning works quite well for a broad range of values for β except for very
small values (e.g., 0.005), even when the data is scarce (M = 50). When β = 0.005, learning
fails to identify the meaningful feature. However, a relatively large value of β results in
well-structured feature, which has been shown to have the discriminative power for image
classification [5]. We conjecture that given the data, these values of β have non-vanishing
posterior probability (Eq. (18)). In fact, the value of β = 21.5 has a maximal posterior
probability.
III.
THE HOPFIELD MODEL AND SIMPLIFIED MESSAGE PASSING
EQUATIONS
A.
Message passing equations for an approximate Hopfield model
It is interesting to show that one can also perform the same unsupervised learning task
by using an associative memory (Hopfield) model defined by
2
β̃
T
a
Y 2N
ξ σ
P̂ (ξ) ∝
e
,
(21)
a
where β̃ = β 2 . This posterior distribution of feature vectors given the input examples can
be obtained by a small-β expansion of Eq. (2) [26]. This relationship implies that one can
14
100
0.16
N=100,
(a)
=1.0
(b)
MNIST(0&1) dataset
80
true
M=200
M=400
1.0
0.12
60
0.08
M=600
0.6
M=800
0.4
|
(t)
true
|
(t)
0.8
true
0
200
400
20
t
0.04
40
600
0
0.00
2
3
4
5
6
7
8
0
200
400
600
800
t
(c)
FIG. 6: (Color online) Inference of hyper-parameter β in synthetic (RBM) and real (MNIST, digits
0 and 1) dataset. (a) Deviation of inferred β from the true value decreases with the data size. In
simulations, we consider 10 instances of size N = 100, and use η = 0.02 and initial value of β0 = 0.8.
Two examplar trajectories of β(t) are shown in the inset. (b) Examplar trajectories of β(t) are
shown for the real dataset. We use β0 = 1.0 and η = 0.01. The fixed point does not change when
we use β0 = 1.5. (c) Feature vector (ξ) organized as a 28 × 28 matrix. They are learned from
M = 50 training images with corresponding β = 0.005, 0.5, 5.0 and 21.5 (from the left to the right,
and from the top to the bottom). The color black and white indicate active (ξi = +1) and inactive
(ξi = −1) feature components, respectively.
infer the feature vector of a RBM by an approximate Hopfield model, and the feature vector
is interpreted as the stored pattern in the Hopfield model, encoding memory characteristics
of the input data. Note that, {σ a } are still governed by a RBM distribution, whereas, by
applying the associative memory framework, we show many similar interesting properties of
the unsupervised learning model.
In analogous to the derivation of Eq. (3), we have the sMP corresponding to the posterior
probability (Eq. (21)):
X
β̃
mi→a = tanh √
σib G̃b→i Fb→i ,
(22)
N b∈∂i\a
P
where G̃b→i = √1N k∈∂b\i σkb mk→b , Fb→i = 1+ 1−β̃Cβ̃Cb→i in which Cb→i =
b→i
Details to derive Eq. (22) are given in Appendix C.
1
N
P
2
k∈∂b\i (1−mk→b ).
15
In the approximate
Hopfield model,
P
P the Bethe free energy can be constructed similarly,
i.e., −βNfRS = i ln Zi − (N − 1) a ln Za , where
#
"
X β̃
1
(1/N + G̃2a→i )Fa→i − ln(1 − β̃Ca→i ) + ln 2 cosh β̃Hi ,
(23a)
ln Zi =
2
2
a∈∂i
β̃ 2
1
G̃a Fa − ln(1 − β̃Ca ),
(23b)
2
2
P
P
where we define G̃a = √1N k∈∂a σka mk→a , Ca = N1 k∈∂a (1 − m2k→a ), Fa = 1 + 1−β̃Cβ̃Ca , and
a
P
Hi = √1N b∈∂i σib G̃b→i Fb→i .
Similar
RBM, the entropy for the approximate model can be evaluated as
P to the case in P
Ns = i ∆Si − (N − 1) a ∆Sa , where single feature node contribution reads
"
#
X 1
β̃
β̃Ca→i
′
+ (1/N + G̃2a→i )Fa→i
∆Si = −
ln(1 − β̃Ca→i ) +
2
2
2(1
−
β̃C
)
a→i
(24)
a∈∂i
+ ln 2 cosh(β̃Hi ) − (β̃Hi + β̃Hi′ ) tanh(β̃Hi ),
ln Za =
and single example contribution reads
β̃
β̃Ca
1
− G̃2a Fa′ ,
∆Sa = − ln(1 − β̃Ca ) −
(25)
2
2(1 − β̃Ca ) 2
P
β̃Ca
b
′
′
′
′
a→i
√1
,
F
=
,
and
H
=
where Fa→i
= (1−β̃C
2
2
a
i
b∈∂i σi G̃b→i Fb→i .
β̃Ca→i )
(1−β̃Ca )
N
We also derive AMP equations for the Hopfield model. Note that mi→a ≃ mi − (1 −
a
P
1
2 β̃σ
mi ) √Ni G̃a→i Fa→i . Therefore G̃a ≃ √1N i∈∂a σia mi − β̃(1 − Q)G̃a 1−β̃(1−Q)
, we thus derive the
first AMP equation for the Hopfield model as
G̃a =
where Q ≡ N1
P
1
1
√
1−β̃(1−Q) N
1 − β̃(1 − Q) X a
√
σi mi ,
N
i∈∂a
(26)
2
From the definition of the local field Hi ,
i mi .
α
a
a∈∂i σi G̃a − 1−β̃(1−Q) mi in the large-N expansion. Finally, we
AMP equation:
P
mi ≃ tanh
1 X a
αβ̃
β̃
√
mi
σi G̃a −
1 − β̃(1 − Q) N a∈∂i
1 − β̃(1 − Q)
we have Hi ≃
derive the second
!
.
(27)
Taking the time index into account, the AMP equations can be summarized in a parallel
update scheme as follows:
1 X a t−1
1
√
G̃t−1
≃
σi mi − β̃(1 − Qt−1 )G̃t−2
,
a
a
N i∈∂a
1 − β̃(1 − Qt−2 )
mti ≃ tanh
1 X a t−1
β̃
αβ̃
√
mt−1
σi G̃a −
i
t−1
t−1
1 − β̃(1 − Q ) N a∈∂i
1 − β̃(1 − Q )
(28a)
!
.
(28b)
16
B.
Thermodynamic equations for the approximate Hopfield model
In this section,
we derive the thermodynamic equation. Similarly, the local field defined as
P
1
√
hi→a = N b∈∂i\a σib G̃b→i Fb→i follows a Gaussian distribution with mean zero and variance
D
E
αQ
2
. The variance can be derived by noting that G̃b→i ≃ Q. Therefore, we have
(1−β̃(1−Q))2
the following thermodynamic equation for the Hopfield model:
!
Z
p
β̃
Q = Dz tanh2
αQz .
(29)
1 − β̃(1 − Q)
i2
h
Q = 0 is a solution of Eq. (29), however, it is stable only when α ≤ αc = 1−β̃ β̃ . This threshold can be derived by expanding Eq. (29) around Q = 0 to the first order. Interestingly, this
equation matches the mean-field equation without ferromagnetic part (related to retrieval
phase) derived in standard Hopfield model [27]. Gaussian assumption for messages does not
generally hold, particularly for those messages related to the memorized patterns [17].
We also perform replica computation for the approximate Hopfield model. The free
energy function is given in the appendix E. The associated saddle-point equations are given
as follows:
Z
√
q = Dz tanh(q̂ + r̂z),
(30a)
Z
√
(30b)
r = Dz tanh2 (q̂ + r̂z),
αβ̃ 2 q
,
q̂ =
1 − β̃(1 − r)
(30c)
αβ̃ 2 (β̃q 2 + r)
r̂ =
.
(1 − β̃(1 − r))2
(30d)
Note that, the data is generated by the RBM, but the inference is carried out in an approximate Hopfield model. Although we use the same temperature, the model mismatching leads
to q 6= r. The threshold for the transition ofhr can
i be determined by studying the linear
stability around r = 0, and the result is αcr =
1−β̃
β̃
2
, consistent with the cavity prediction.
2
β̃
When α approaches αcr from above, r behaves like r ≃ 2(1−
(α − αcr ). The transition for
β̃)
q can only be determined√ numerically, since r could not be assumed a small value, and it
R
αβ̃ 2 r
The recursive equation for r in the
follows r = Dz tanh2 ( r̂z) where r̂ = (1−β̃(1−r))
2.
regime of q = 0 is exactly the equation derived from the sMP equation (Eq. (29)).
The entropy of the model can also be similarly computed, and reads as follows:
s=
Z
√
αβ̃((1 − β̃(1 − r))(1 − 3r) + 2r + 2q 2 β̃)
α
Dz ln 2 cosh(q̂ + r̂z) − ln(1 − β̃(1 − r)) −
.
2
2(1 − β̃(1 − r))2
(31)
17
entropy per neuron or overlap
0.7
s
0.6
r
q
0.5
0.4
0.3
0.2
0.1
0.0
0
1
2
3
4
FIG. 7: (Color online) Thermodynamic properties of the approximate Hopfield model compared
with the inference performed on single instances. The lines are replica result, compared with
symbols indicating the sMP results. In simulations, we consider 20 instances of size N = 400. The
feature strength β = 0.8.
C.
Numerical simulations compared with theory
The thermodynamic properties of the approximate Hopfield model are shown in Fig. 7.
First, we show that the entropy crisis is absent in the Hopfield model, although the inference
is carried out by the sMP equation of Hopfield model. This is quite interesting, because
within the associative memory framework, the inference is improved smoothly and there
does not exist condensation in the feature space. Secondly, the replica computation predicts
q 6= r, as expected from the fact that by applying Hopfield model approximation, the
Nishimori condition does not hold. Thirdly, the simulation results obtained by running
sMP equation agree with the theoretical predictions for the entropy, in spite of observed
fluctuations of order parameters caused by finite size effects. The asymptotic behavior of r
near αcr can be analytically determined by small-r expansion of the saddle-point equation
β̃ 2
(α − αcr ) when α
(Eq. (30)). As already derived in the theory section (Sec. III B), r ≃ 2(1−
β̃)
tends to αcr from above. The transition for q can only be determined by numerically solving
the saddle-point equation. It seems that q changes smoothly to a non-zero value at the same
data size as that of the RBM. Due to the model mismatching, transition for r takes place
much more earlier than that for q.
Finally, the inference can also be carried out by using AMP with less requirements of
memory storage and computer time. The result is compared with that obtained by sMP,
which is shown in Fig. 8. We also study the effects of temperature deviation. As shown
in Fig. 9, even when β = β ∗ , it is not guaranteed that the performance is optimal in the
inferable regime, compared to other inference temperatures.
IV.
CONCLUSION
In conclusion, we build a physical model of unsupervised learning from a finite number of examples in the framework of RBM. Here, we consider binary features rather than
18
0.7
0.6
sMP
AMP
0.5
q
0.4
0.3
0.2
0.1
0.0
0
1
2
3
4
5
FIG. 8: (Color online) Performance comparison between sMP and AMP for Hopfield model. The
model parameters are N = 100, β = 0.8. 30 random instances are considered.
0.8
0.7
1.2
0.6
0.9
q
0.5
0.4
0.3
0.2
0.1
0.0
0
1
2
3
4
5
6
FIG. 9: (Color online) Inference performance with different inference temperatures for Hopfield
model. The model parameters are N = 100, β ∗ = 0.8. 30 random instances are considered.
real-valued ones; this is because binary features are more robust and efficient in large-scale
neuromorphic applications [28], yet it remains open to figure out an efficient algorithm.
We show that physics method can inspire an efficient (fully-distributed) message passing
procedure not only to infer the hidden feature embedded in a noisy data, but also to estimate the entropy of candidate features. Distinct from conventional slow sampling-based
methods, each example in this work is treated as a constraint on the factor graph, and the
message passing carries out a direct Bayesian inference of the hidden feature, which marks
an important step implementing unsupervised learning in neural networks. In particular,
the approximate message passing equation has low requirements of computer space and time
in practical applications.
19
We show that, the results obtained by the cavity method are consistent with the statistical
analysis by replica theory. The replica theory describes the thermodynamic properties of the
unsupervised learning system. It first predicts a discontinuous phase transition in a restricted
Boltzmann machine, signaled by the entropy crisis before the message passing equation loses
its stability. However, if the feature strength is strong enough, there exists another phase
transition which is continuous, i.e., the order parameter (the overlap between the true feature
vector and the inferred one) smoothly changes from zero to non-zero value. This continuous
transition will be followed by an additional discontinuous transition at a larger data size.
Interestingly, in an approximate Hopfield model, the entropy crisis is absent, and the entropy
decreases much more slowly towards zero. Therefore, there exists a continuous transition
from impossible-to-infer to inferable regime. Unlike the RBM, inference in the Hopfield
model does not satisfy the Nishimori condition, and thus the statistics of metastable states
would be very interesting, and its relationship with the dynamics of inference deserves further
investigation.
Our work not only derives in detail various kinds of message passing algorithms in a
Bayesian framework for practical applications, but also statistically characterizes the thermodynamic properties of the restricted Boltzmann machine learning with binary synapses,
and its connection with associative memory networks. Many interesting properties related to
phase transitions are also revealed. In addition, we derive an iterative equation to infer the
unknown temperature in the data, providing a quantitative measure of how cold a dataset
is. This method corresponds to Expectation-Maximization algorithm in statistics [22], and
in physics iteratively imposing Nishimori condition [9, 23]. Therefore, our study forms a
theoretical basis of unsupervised feature learning in a single simple RBM, and are expected
to be helpful in constructing a deep architecture for hierarchical information processing,
which is currently under way.
Appendix A: Derivation of simplified mesage passing equations for RBM
We first assume feature components on the factor graph are weakly correlated, then by
using the cavity method [10], we define a cavity probability Pi→a (ξi ) of ξi on a modified factor
graph with example node a removed. Due to the weak correlation assumption, Pi→a (ξi )
satisfies a recursive equation (namely belief propagation (BP) in computer science [29]):
Y
Pi→a (ξi ) ∝
µb→i (ξi ),
(A1a)
b∈∂i\a
µb→i (ξi ) =
X
{ξj |j∈∂b\i}
cosh
β
√ ξTσb
N
Y
Pj→b(ξj ),
(A1b)
j∈∂b\i
where the symbol ∝ indicates a normalization constant, ∂i\a defines the neighbors of node
i except constraint a, ∂b\i defines the neighbors of constraint b except visible node i, and
the auxiliary quantity µb→i (ξi ) represents the contribution from constraint b to visible node
i given the value of ξi [10]. Eq. (A1) has been similarly derived to understand RBM in a
recent paper [11]. Here, we exchange the role of the observed data {σ a } and that of synaptic
interaction (feature vector here), and predict feature vector given the data. Therefore the
data (random samplings), rather than the synaptic interaction in the previous work [11],
becomes a quenched disorder.
20
Note that in Eq. (A1b), the sum inside the hyperbolic cosine function with the idependent term excluded is a random variable following
a normal distributionP
with mean
P
1
1
b
2
2
Gb→i and variance Ξb→i [11], where Gb→i = √N j∈∂b\i σj mj→b and Ξb→i ≃ N j∈∂b\i (1 −
P
m2j→b ). The cavity magnetization is defined as mj→b = ξj ξj Pj→b(ξj ). Thus the intractable
sum over all ξj (j 6= i) can be replaced by an integral over the normal distribution. Using
the magnetization representation [11], the BP equation (Eq. (A1)) could be reduced to the
simplified message passing equations (see Eq. (3) in the main text).
In physics, the contribution fromPa single
Q feature node to the partition function, Zi is
obtained via cavity method as Zi = ξi =±1 b∈∂i µb→i (ξi ); the contribution of a single data
Q
P
node reads Za = {ξj |j∈∂a} cosh √βN ξ T σ a
j∈∂a Pj→a (ξj ), which can be further computed
by applying the central-limit theorem as well. This calculation is exact only when the
underlying factor graph is a tree. However, it is approximately correct when correlations
among feature components are weak. It needs to be compared with numerical simulations
and replica computations.
Appendix B: Simplification of entropy formula for RBM in the limit of q = 0
√
First, we compute ∆Si . By noting that Ξ2a→i = 1 − N1 , ln cosh(βσia / N ) ≃
√
√
2
βσia ξi / N tanh(βσia ξi / N) ≃ βN , we have
X β2
αβ 2
Ξ2a→i − αβ 2 +
+ ln 2,
∆Si = −
2
2
a∈∂i
β2
,
2N
and
(B1)
where we have used the fact that Ga→i = 0 and Ga→i = 1. Analogously, ∆Sa is simplified to
be
β2
∆Sa = − .
(B2)
2
2
Collecting the above results, we arrive at the final simplified entropy as s = ln 2 − αβ2 .
Appendix C: Derivation of simplified mesage passing equations for the approximate
Hopfield model
For the approximate Hopfield model, we similarly define the auxiliary quantity µb→i (ξi )
as
X
µb→i (ξi ) =
exp
{ξj |j∈∂b\i}
≃
Z
=q
z 2 /2
Dz exp
1
β̃ T b 2
(ξ σ )
2N
!
Y
Pj→b(ξj )
j∈∂b\i
!
p
ξi σib i2
β̃ h
G̃b→i + Cb→i z + √
2
N
!
β̃Fb→i 1
exp
+ G̃2b→i
exp
2
N
1 − β̃Cb→i
(C1)
β̃ G̃b→i ξi σib Fb→i
√
N
!
,
where Dz ≡ e √2πdz . Pi→a (ξi ) is the same as that in RBM. Using Eq. (C1), the cavity
magnetization mi→a can thus be derived as Eq. (22).
21
Appendix D: Replica computation for the RBM model
true
γ
a
a
We first define ua = ξ √Nσ , and v γa = ξ√σN . Both ua and v γa are random variables
subject to the covariance structure: hui = 0, hu2 i = 1, hv γ i = 0, h(v γ )2 i = 1, huv γ i = q γ ,
′
′
v γ v γ = r γγ , where we have dropped off the data index a because of independence among
data samples,
defined the overlap between true feature vector and the estimated one
P and
′
γ true
1
γ
as q = N i ξi ξi , and the overlap between two estimated feature vectors as r γγ =
P γ γ′
1
γ
γγ ′
= r, after introducing
i ξi ξi . Under the replica symmetric assumption, q = q and r
N
γ
γγ ′
n
the definition of q (and r ) as a delta function, hZ i can be estimated as
Z
Z
Z
√
dqdq̂
drdr̂
n(n − 1)
r̂
n
n
hZ i =
exp −Nnq q̂ − Nrr̂
− Nn + N ln Dz(2 cosh(q̂ + r̂z))
2πi/N
2πi/N
2
2
Z
Z
p
n
−β 2 /2
2
,
Dy Dt cosh βt(cosh β(qt + r − q y))
× exp αN ln e
(D1)
p
where we have written u = t, v γ = qt + 1 − rxγ + r − q 2 y (t, xγ and y are standard
Gaussian random variables). Finally, we arrived at the following free energy function:
Z
√
r̂(r − 1) αβ 2
−βfRS = −q q̂ +
+
(1 − r) + Dz ln 2 cosh(q̂ + r̂z)
2
2
Z
Z
(D2)
p
−β 2 /2
2
Dy Dt cosh βt ln cosh β(qt + r − q y).
+αe
√
The saddle-point equation for the order parameters {q, q̂, r, r̂} can be derived from
RS )
0, ∂(−βf
∂r
∂(−βfRS )
∂ q̂
∂(−βfRS )
∂q
=
∂(−βfRS )
∂ r̂
= 0,
= 0, and
= 0.
∂
) hln Zi (β ′ , β)|β ′=β , where
Note that to derive the entropy formula, we used s = (1 − β ∂β
β ′ is the inverse temperature at which the data is generated, and β the temperature at which
the Bayesian inference is carried out.
Appendix E: Replica computation for the Hopfield model
Q
γ a
βξ
√σ
N
Q
β̃
2
γ σa
ξ√
N
2
For the approximate Hopfield model, we replace a,γ cosh
with a,γ e
in Eq. (14). The subsequent calculation proceeds similarly to the appendix D. Analogously,
we have
Z
Z
Z
√
drdr̂
n(n − 1)
r̂
dqdq̂
n
n
exp −Nnq q̂ − Nrr̂
− Nn + N ln Dz(2 cosh(q̂ + r̂z))
hZ i =
2πi/N
2πi/N
2
2
√
Z
Z
2
2
β̃(qt+ r−q y)
n
1
2
.
× exp αN ln e−β /2 Dy Dt cosh βt q
e 2(1−β̃(1−r))
1 − β̃(1 − r)
(E1)
Using the replica trick defined in Eq. (13), we obtain the free energy function
Z
√
α
αβ̃(r + β̃q 2 )
r̂
, (E2)
−β̃fRS = −q q̂+ (r−1)+ Dz ln 2 cosh(q̂+ r̂z)− ln(1−β̃(1−r))+
2
2
2(1 − β̃(1 − r))
22
p
R
R
where we used the identity Dy Dt[qt + r − q 2 y]2 cosh βt = eβ̃/2 (β̃q 2 + r). The saddlepoint equations can be derived similarly.
Appendix F: Generalization to the case of the hidden neuron with an external field
in RBM
The sMP for RBM can be easily generalized to take into account external fields of visible
neurons and the hidden neuron. Here, for simplicity, we consider only the case of hidden
neuron with external field. The external field has binary values as well, defined by Bh φ0
(Bh = ±1). The only modification to the factor graph in Fig. 1 is to add one additional
variable node named by λ for the unknown external field. The additional node λ is connected
to all data nodes. Following the similar procedure as in Appendix A, we obtain the following
four kinds of messages:
X
mλ→a = tanh
ub→λ ,
(F1a)
b∈∂λ\a
−1
ub→λ = tanh
mi→a
(tanh(βGb→λ ) tanh(βφ0 )) ,
X
= tanh
ub→i ,
(F1b)
(F1c)
b∈∂i\a
ub→i
1
= ln
2
1+mλ→b
2
1+mλ→b
2
√
cosh β(Gb→i + σib / N + φ0 ) +
√
cosh β(Gb→i − σib / N + φ0 ) +
1−mλ→b
2
1−mλ→b
2
√
cosh β(Gb→i + σib / N − φ0 )
√
.
cosh β(Gb→i − σib / N − φ0 )
(F1d)
Once φ0 = 0, the original sMP for the RBM in the main text is recovered. To derive sMP for
the case of visible neurons with external fields, an additional central limit theorem applies to
the interacting external fields ({Bi φ0 }), which leads to introducing a joint cavity probability
Pi→a (ξi , Bi ) as well as µb→i (ξi , Bi ) where Bi = ±1.
Acknowledgments
I am very grateful to Taro Toyoizumi, Lukasz Kusmierz, Alireza Goudarzi and Roberto
Legaspi for attending a series of lectures about this work and their useful feedback. I thank
Lukasz Kusmierz for a careful reading of the manuscript and his useful feedback. This
work was supported by the program for Brain Mapping by Integrated Neurotechnologies for
Disease Studies (Brain/MINDS) from Japan Agency for Medical Research and development,
AMED.
[1] Brenden M. Lake, Ruslan Salakhutdinov, and Joshua B. Tenenbaum. Human-level concept
learning through probabilistic program induction. Science, 350:1332–1338, 2015.
[2] Daniel Kersten, Pascal Mamassian, and Alan Yuille. Object Perception as Bayesian Inference.
Annu. Rev. Psychol., 55:271–304, 2004.
23
[3] Geoffrey E. Hinton. Learning multiple layers of representation. Trends in Cognitive Sciences,
11:428–434, 2007.
[4] Y. Bengio, A. Courville, and P. Vincent. Representation learning: A review and new perspectives. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 35:1798–1828,
2013.
[5] Haiping Huang and Taro Toyoizumi. Unsupervised feature learning from finite data by message
passing: Discontinuous versus continuous phase transition. Phys. Rev. E, 94:062310, 2016.
[6] M. Mézard, G. Parisi, and M. A. Virasoro. Spin Glass Theory and Beyond. World Scientific,
Singapore, 1987.
[7] G. E. Hinton and R. R. Salakhutdinov. Reducing the dimensionality of data with neural
networks. Science, 313(5786):504–507, 2006.
[8] C. Blundell, J. Cornebise, K. Kavukcuoglu, and D. Wierstra. Weight Uncertainty in Neural
Networks. arXiv: 1505.05424, 2015. In Proceedings of the 32nd International Conference on
Machine Learning (ICML 2015).
[9] H. Nishimori. Statistical Physics of Spin Glasses and Information Processing: An Introduction.
Oxford University Press, Oxford, 2001.
[10] M. Mézard and A. Montanari. Information, Physics, and Computation. Oxford University
Press, Oxford, 2009.
[11] Haiping Huang and Taro Toyoizumi. Advanced mean-field theory of the restricted boltzmann
machine. Phys. Rev. E, 91:050101, 2015.
[12] M. Mézard and G. Parisi. The bethe lattice spin glass revisited. Eur. Phys. J. B, 20:217,
2001.
[13] D. J. Thouless, P. W. Anderson, and R. G. Palmer. Solution of ’Solvable model of a spin
glass’. Philosophical Magazine, 35(3):593–601, 1977.
[14] David L. Donoho, Arian Maleki, and Andrea Montanari. Message-passing algorithms for
compressed sensing. Proceedings of the National Academy of Sciences, 106(45):18914–18919,
2009.
[15] Erwin Bolthausen. An Iterative Construction of Solutions of the TAP Equations for the
SherringtonKirkpatrick Model. Communications in Mathematical Physics, 325:333–366, 2014.
[16] Lenka Zdeborová and Florent Krzakala. Statistical physics of inference: thresholds and algorithms. Advances in Physics, 65:453–552, 2016.
[17] Marc Mézard. Mean-field message-passing equations in the hopfield model and its generalizations. Phys. Rev. E, 95:022117, 2017.
[18] D.J. Gross and M. Mezard. The simplest spin glass. Nuclear Physics B, 240:431–452, 1984.
[19] E. Gardner. Spin glasses with p-spin interactions. Nuclear Physics B, 257:747–765, 1985.
[20] G Hinton, S Osindero, and Y Teh. A fast learning algorithm for deep belief nets. Neural
Computation, 18:1527–1554, 2006.
[21] Tommaso Castellani and Andrea Cavagna. Spin-glass theory for pedestrians. Journal of
Statistical Mechanics: Theory and Experiment, 2005(05):P05012, 2005.
[22] A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data
via the em algorithm. Journal of the royal statistical society. Series B, 39:1–38, 1977.
[23] Florent Krzakala, Marc Mezard, Francois Sausset, Yifan Sun, and Lenka Zdeborova.
Probabilistic reconstruction in compressed sensing: algorithms, phase diagrams, and
threshold achieving matrices. Journal of Statistical Mechanics: Theory and Experiment,
2012(08):P08009, 2012.
[24] Hidetoshi Nishimori and David Sherrington. Absence of replica symmetry breaking in a region
24
[25]
[26]
[27]
[28]
[29]
of the phase diagram of the Ising spin glass. AIP Conference Proceedings, 553:67–72, 2001.
Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner. Gradient-based learning applied to document
recognition. Proceedings of the IEEE, 86:2278–2324, 1998.
Elena Agliari, Adriano Barra, Andrea Galluzzi, Francesco Guerra, and Francesco Moauro.
Multitasking associative networks. Phys. Rev. Lett., 109:268101, 2012.
Daniel J. Amit, Hanoch Gutfreund, and H. Sompolinsky. Storing infinite numbers of patterns
in a spin-glass model of neural networks. Phys. Rev. Lett., 55:1530–1533, 1985.
Matthieu Courbariaux, Yoshua Bengio, and Jean-Pierre David. Binaryconnect: Training
deep neural networks with binary weights during propagations. In C. Cortes, N. D. Lawrence,
D. D. Lee, M. Sugiyama, and R. Garnett, editors, Advances in Neural Information Processing
Systems 28, pages 3105–3113. Curran Associates, Inc., 2015.
J. S. Yedidia, W. T. Freeman, and Y. Weiss. Constructing free energy approximations and
generalized belief propagation algorithms. IEEE Trans Inf Theory, 51:2282–2312, 2005.
| 9cs.NE
|
Khalid Raza / Indian Journal of Computer Science and Engineering
Vol 1 No 2, 114-118
APPLICATION OF DATA MINING IN BIOINFORMATICS
KHALID RAZA
Centre for Theoretical Physics,
Jamia Millia Islamia, New Delhi-110025, India
Abstract
This article highlights some of the basic concepts of bioinformatics and data mining. The major research areas of bioinformatics are highlighted.
The application of data mining in the domain of bioinformatics is explained. It also highlights some of the current challenges and opportunities of
data mining in bioinformatics.
Keywords: Data Mining, Bioinformatics, Protein Sequences Analysis, Bioinformatics Tools.
1. Introduction
In recent years, rapid developments in genomics and proteomics have generated a large amount of biological data.
Drawing conclusions from these data requires sophisticated computational analyses. Bioinformatics, or
computational biology, is the interdisciplinary science of interpreting biological data using information technology
and computer science. The importance of this new field of inquiry will grow as we continue to generate and
integrate large quantities of genomic, proteomic, and other data.
A particular active area of research in bioinformatics is the application and development of data mining
techniques to solve biological problems. Analyzing large biological data sets requires making sense of the data by
inferring structure or generalizations from the data. Examples of this type of analysis include protein structure
prediction, gene classification, cancer classification based on microarray data, clustering of gene expression data,
statistical modeling of protein-protein interaction, etc. Therefore, we see a great potential to increase the interaction
between data mining and bioinformatics.
2. Bioinformatics
The term bioinformatics was coined by Paulien Hogeweg in 1979 for the study of informatic processes in biotic
systems. It was primary used since late 1980s has been in genomics and genetics, particularly in those areas of
genomics involving large-scale DNA sequencing.
Bioinformatics can be defined as the application of computer technology to the management of biological
information. Bioinformatics is the science of storing, extracting, organizing, analyzing, interpreting and utilizing
information from biological sequences and molecules. It has been mainly fueled by advances in DNA sequencing
and mapping techniques. Over the past few decades rapid developments in genomic and other molecular research
technologies and developments in information technologies have combined to produce a tremendous amount of
information related to molecular biology. The primary goal of bioinformatics is to increase the understanding of
biological processes.
Some of the grand area of research in bioinformatics includes:
2.1. Sequence analysis
Sequence analysis is the most primitive operation in computational biology. This operation consists of finding which
part of the biological sequences are alike and which part differs during medical analysis and genome mapping
processes. The sequence analysis implies subjecting a DNA or peptide sequence to sequence alignment, sequence
databases, repeated sequence searches, or other bioinformatics methods on a computer.
ISSN : 0976-5166
114
Khalid Raza / Indian Journal of Computer Science and Engineering
Vol 1 No 2, 114-118
2.2. Genome annotation
In the context of genomics, annotation is the process of marking the genes and other biological features in a DNA
sequence. The first genome annotation software system was designed in 1995 by Dr. Owen White.
2.3. Analysis of gene expression
The expression of many genes can be determined by measuring mRNA levels with various techniques such as
microarrays, expressed cDNA sequence tag (EST) sequencing, serial analysis of gene expression (SAGE) tag
sequencing, massively parallel signature sequencing (MPSS), or various applications of multiplexed in-situ
hybridization etc. All of these techniques are extremely noise-prone and subject to bias in the biological
measurement. Here the major research area involves developing statistical tools to separate signal from noise in
high-throughput gene expression studies.
2.4. Analysis of protein expression
Gene expression is measured in many ways including mRNA and protein expression, however protein expression is
one of the best clues of actual gene activity since proteins are usually final catalysts of cell activity. Protein
microarrays and high throughput (HT) mass spectrometry (MS) can provide a snapshot of the proteins present in a
biological sample. Bioinformatics is very much involved in making sense of protein microarray and HT MS data.
2.5. Analysis of mutations in cancer
In cancer, the genomes of affected cells are rearranged in complex or even unpredictable ways. Massive sequencing
efforts are used to identify previously unknown point mutations in a variety of genes in cancer. Bioinformaticians
continue to produce specialized automated systems to manage the sheer volume of sequence data produced, and they
create new algorithms and software to compare the sequencing results to the growing collection of human genome
sequences and germline polymorphisms. New physical detection technologies are employed, such as oligonucleotide
microarrays to identify chromosomal gains and losses and single-nucleotide polymorphism arrays to detect known
point mutations. Another type of data that requires novel informatics development is the analysis of lesions found to
be recurrent among many tumors.
2.6. Protein structure prediction
The amino acid sequence of a protein (so-called, primary structure) can be easily determined from the sequence on
the gene that codes for it. In most of the cases, this primary structure uniquely determines a structure in its native
environment. Knowledge of this structure is vital in understanding the function of the protein. For lack of better
terms, structural information is usually classified as secondary, tertiary and quaternary structure. Protein structure
prediction is one of the most important for drug design and the design of novel enzymes. A general solution to such
predictions remains an open problem for the researchers.
2.7. Comparative genomics
Comparative genomics is the study of the relationship of genome structure and function across different biological
species. Gene finding is an important application of comparative genomics, as is discovery of new, non-coding
functional elements of the genome. Comparative genomics exploits both similarities and differences in the proteins,
RNA, and regulatory regions of different organisms. Computational approaches to genome comparison have
recently become a common research topic in computer science.
2.8. Modeling biological systems
Modeling biological systems is a significant task of systems biology and mathematical biology. Computational
systems biology aims to develop and use efficient algorithms, data structures, visualization and communication tools
for the integration of large quantities of biological data with the goal of computer modeling. It involves the use of
ISSN : 0976-5166
115
Khalid Raza / Indian Journal of Computer Science and Engineering
Vol 1 No 2, 114-118
computer simulations of biological systems, like cellular subsystems such as the networks of metabolites and
enzymes, signal transduction pathways and gene regulatory networks to both analyze and visualize the complex
connections of these cellular processes. Artificial life is an attempt to understand evolutionary processes via the
computer simulation of simple life forms
2.9. High-throughput image analysis
Computational technologies are used to accelerate or fully automate the processing, quantification and analysis of
large amounts of high-information-content biomedical images. Modern image analysis systems augment an
observer's ability to make measurements from a large or complex set of images. A fully developed analysis system
may completely replace the observer. Biomedical imaging is becoming more important for both diagnostics and
research. Some of the examples of research in this area are: clinical image analysis and visualization, inferring clone
overlaps in DNA mapping, Bioimage informatics, etc.
2.10. Protein-protein docking
In the last two decades, tens of thousands of protein three-dimensional structures have been determined by X-ray
crystallography and Protein nuclear magnetic resonance spectroscopy (protein NMR). One central question for the
biological scientist is whether it is practical to predict possible protein-protein interactions only based on these 3D
shapes, without doing protein-protein interaction experiments. A variety of methods have been developed to tackle
the Protein-protein docking problem, though it seems that there is still much work to be done in this field.
3. Bioinformatics Tools
Following are the some of the important tools for bioinformatics (Table 1)
Table 1: Some of the tools for bioinformatics
Bioinformatics Research Area
Sequence alignment
Multiple sequence alignment
Gene Finding
Protein Domain Analysis
Pattern Identification
Genomic Analysis
Motif finding
Tool (Application)
BLAST
CS-BLAST
HMMER
FASTA
MSAProbs
DNA Alignment
MultAlin
DiAlign
GenScan
GenomeScan
GeneMark
Pfam
BLOCKS
ProDom
Gibbs Sampler
AlignACE
MEME
SLAM
Multiz
MEME/MAST
eMOTIF
References
http://blast.ncbi.nlm.nih.gov/Blast.cgi
ftp://toolkit.lmb.uni-muenchen.de/csblast/
http://hmmer.janelia.org/
www.ebi.ac.uk/fasta33
http://msaprobs.sourceforge.net/
http://www.fluxus-engineering.com/align.htm
http://multalin.toulouse.inra.fr/multalin/multalin.html
http://bibiserv.techfak.uni-bielefeld.de/dialign/
genes.mit.edu/GENSCAN.html
http://genes.mit.edu/genomescan.html
http://exon.biology.gatech.edu/
http://pfam.sanger.ac.uk/
http://blocks.fhcrc.org/
http://prodom.prabi.fr/prodom/current/html/home.php
http://bayesweb.wadsworth.org/gibbs/gibbs.html
http://atlas.med.harvard.edu/
http://meme.sdsc.edu/
http://bio.math.berkeley.edu/slam/
http://www.bx.psu.edu/miller_lab/
http://meme.sdsc.edu
http://motif.stanford.edu
4. Data Mining
Data mining refers to extracting or “mining” knowledge from large amounts of data. Data Mining (DM) is the
science of finding new interesting patterns and relationship in huge amount of data. It is defined as “the process of
ISSN : 0976-5166
116
Khalid Raza / Indian Journal of Computer Science and Engineering
Vol 1 No 2, 114-118
discovering meaningful new correlations, patterns, and trends by digging into large amounts of data stored in
warehouses”. Data mining is also sometimes called Knowledge Discovery in Databases (KDD). Data mining is not
specific to any industry. It requires intelligent technologies and the willingness to explore the possibility of hidden
knowledge that resides in the data.
Data Mining approaches seem ideally suited for Bioinformatics, since it is data-rich, but lacks a comprehensive
theory of life’s organization at the molecular level. The extensive databases of biological information create both
challenges and opportunities for development of novel KDD methods. Mining biological data helps to extract useful
knowledge from massive datasets gathered in biology, and in other related life sciences areas such as medicine and
neuroscience.
4.1. Data mining tasks
The two "high-level" primary goals of data mining, in practice, are prediction and description. The main tasks wellsuited for data mining, all of which involves mining meaningful new patterns from the data, are:
Classification: Classification is learning a function that maps (classifies) a data item into one of several predefined
classes.
Estimation: Given some input data, coming up with a value for some unknown continuous variable.
Prediction: Same as classification & estimation except that the records are classified according to some future
behaviour or estimated future value).
Association rules: Determining which things go together, also called dependency modeling.
Clustering: Segmenting a population into a number of subgroups or clusters.
Description & visualization: Representing the data using visualization techniques.
Learning from data falls into two categories: directed (“supervised”) and undirected (“unsupervised”) learning.
The first three tasks – classification, estimation and prediction – are examples of supervised learning. The next three
tasks – association rules, clustering and description & visualization – are examples of unsupervised learning. In
unsupervised learning, no variable is singled out as the target; the goal is to establish some relationship among all
the variables. Unsupervised learning attempts to find patterns without the use of a particular target field.
The development of new data mining and knowledge discovery tools is a subject of active research. One
motivation behind the development of these tools is their potential application in modern biology.
5. Application of Data Mining in Bioinformatics
Applications of data mining to bioinformatics include gene finding, protein function domain detection, function
motif detection, protein function inference, disease diagnosis, disease prognosis, disease treatment optimization,
protein and gene interaction network reconstruction, data cleansing, and protein sub-cellular location prediction.
For example, microarray technologies are used to predict a patient’s outcome. On the basis of patients’ genotypic
microarray data, their survival time and risk of tumor metastasis or recurrence can be estimated. Machine learning
can be used for peptide identification through mass spectroscopy. Correlation among fragment ions in a tandem
mass spectrum is crucial in reducing stochastic mismatches for peptide identification by database searching. An
efficient scoring algorithm that considers the correlative information in a tunable and comprehensive manner is
highly desirable.
6. Conclusion and challenges
Bioinformatics and data mining are developing as interdisciplinary science. Data mining approaches seem ideally
suited for bioinformatics, since bioinformatics is data-rich but lacks a comprehensive theory of life’s organization at
the molecular level.
However, data mining in bioinformatics is hampered by many facets of biological databases, including their size,
number, diversity and the lack of a standard ontology to aid the querying of them as well as the heterogeneous data
of the quality and provenance information they contain. Another problem is the range of levels the domains of
expertise present amongst potential users, so it can be difficult for the database curators to provide access
mechanism appropriate to all. The integration of biological databases is also a problem. Data mining and
ISSN : 0976-5166
117
Khalid Raza / Indian Journal of Computer Science and Engineering
Vol 1 No 2, 114-118
bioinformatics are fast growing research area today. It is important to examine what are the important research
issues in bioinformatics and develop new data mining methods for scalable and effective analysis.
7. References
[1] Zaki , J.; Wang , T.L. and Toivonen, T.T. (2001). BIOKDD01: Workshop on Data Mining in Bioinformatics”.
[2] Li, J.; Wong, L. and Yang, Q. (2005 ). Data Mining in Bioinformatics, IEEE Intelligent System, IEEE Computer Society.
[3] Liu, H.; Li, J. and Wong, L. (2005). Use of Extreme Patient Samples for Outcome Prediction from Gene Expression Data,
Bioinformatics, vol. 21, no. 16, pp. 3377–3384
[4] Yang, Qiang. Data Mining and Bioinformatics: Some Challenges, http://www.cse.ust.hk/~qyang
[5] Berson, Alex, Smith, Stephen and Threaling, Kurt, “Building Data Mining Application for CRM”, Tata McGraw Hill.
[6] Zhang, Yanqing; C., Jagath, Rajapakse, Machine Learning in Bioinformatics, Wiley, ISBN: 978-0-470-11662-3
[7] Kuonen, Diego. Challenges in Bioinformatics for Statistical Data Miner, Bulletin of the Swiss Statistical Society, 46; 10-17.
[8] Richard, R.J. A. and Sriraam, N. (2005). A Feasibility Study of Challenges and Opportunities in Computational Biology: A
Malaysian Perspective, American Journal of Applied Sciences 2 (9): 1296-1300.
[9] Tang, Haixu and Kim, Sun. Bioinformatics: mining the massive data from high throughput genomics experiments, analysis
of biological data: a soft computing approach, edited by Sanghamitra Bandyopadhyay, Indian Statistical Institute, India
[10] Nayeem, Akbar; Sitkoff, Doree, and Krystek, Jr., Stanley. (2006) A comparative study of available software for highaccuracy homology modeling: From sequence alignments to structural models, Protein Sci. April; 15(4): 808–824
[11] N., Cristianini and M., Hahn. (2006) Introduction to Computational Genomics, Cambridge University Press. ISBN 0-52167191-4.
[12] SJ, Wodak and Janin, J. (1978). Computer Analysis of Protein-Protein Interactions. Journal of Molecular Biology 124 (2):
323–42.
[13] Mewes, H.W.; Frishman, D.; X.Mayer, K. F.; Munsterkotter, M., Noubibou , O.; Pagel, P. and Rattei, T. (2006) Nucleic
Acids Research, 34, D169.
[14] Lee, Kyoungrim. (2008). Computational Study for Protein-Protein Docking Using Global Optimization and Empirical
Potentials, Int. J. Mol. Sci. 9, 65-77.
[15] Hirschman, Lynette; C. Park, Jong; T., Junichi, Wong, L. and H. Wu., Cathy (2002). Accomplishments and challenges in
literature data mining for biology, BIOINFORMATICS REVIEW, Vol. 18 no. 12, 1553–1561
[16] Luis, T.; Chitta; B. and Kim, S. (2008). Fuzzy c-means clustering with prior biological knowledge, Journal of Biomedical
Informatics.
[17] Han and Kamber (2006). Data Mining concepts and techniques, Morgan Kaufmann Publishers.
[18] Hand, D. J.; Mannila, H. and Smyth, P. Principles of Data Mining, MIT Press.
[19] Aluru, S., ed. (2006). Handbook of Computational Molecular Biology. Chapman & Hall/Crc,
[20] Baxevanis, A.D.; Petsko, G.A.; Stein, L.D. and Stormo, G.D., eds. (2007). Current Protocols in Bioinformatics. Wiley.
[21] Mount, D. W. (2002). Bioinformatics: Sequence and Genome Analysis Spring Harbor Press.
[22] Gilbert, D. (2004). Bioinformatics software resources. Briefings in Bioinformatics, Briefings in Bioinformatics.
[23] Jiong, Lei Liu; Yang, A. and Tung, K. H. Data Mining Techniques for Microarray Datasets, Proceedings of the 21st
International Conference on Data Engineering (ICDE 2005).
[24] Pevzner, P. A. (200). Computational Molecular Biology: An Algorithmic Approach The MIT Press.
[25] Soinov, L. (2006). Bioinformatics and Pattern Recognition Come Together. Journal of Pattern Recognition Research
(JPRR), Vol 1 (1) p.37-41
ISSN : 0976-5166
118
| 5cs.CE
|
arXiv:1803.04639v1 [cs.IT] 13 Mar 2018
Correct Undetected Errors with List Decoding in
ARQ Error-control Systems
Jingzhao Wang
Yuan Luo
Department of Computer Science and
Engineering
Shanghai Jiao Tong University
Shanghai 200240, China
Email: [email protected]
Department of Computer Science and
Engineering
Shanghai Jiao Tong University
Shanghai 200240, China
Email: [email protected]
Abstract—Undetected errors are important for linear codes,
which are the only type of errors after hard decision and
automatic-repeat-request (ARQ), but do not receive much attention on their correction. In concatenated channel coding, suboptimal source coding and joint source-channel coding, constrains
among successive codewords may be utilized to improve decoding
performance. In this paper, list decoding is used to correct the
undetected errors. The benefit proportion of the correction is
obviously improved especially on Hamming codes and ReedMuller codes, which achieves about 40% in some cases. But
this improvement is significant only after the selection of final
codewords from the lists based on the constrains among the
successive transmitted codewords. The selection algorithm is
investigated here to complete the list decoding program in the
application of Markov context model. The performance of the
algorithm is analysed and a lower bound of the correctly selected
probability is derived to determine the proper context length.
I. I NTRODUCTION
Error detection using block codes combined with repeat
requests is a widely used method of error control in communication systems[6], which is called automatic-repeat-request
(ARQ) scheme.
Undetected errors are the only type of errors after hard
decision and automatic-repeat-request (ARQ), where the sent
codeword is transmitted into another codeword. List decoding
was introduced independently by Elias [1] and Wozencraft
[11] in the late 1950’s. For a received vector, the decoder
doesn’t output a single codeword, but outputs a list of possible
codewords. It is considered to be list decoded correctly if the
sent codeword is in the list. This paper uses list decoding
to correct undetected errors of ARQ systems and give a
list of possible codewords for each received codeword after
retransmissions.
In some cases, there may be constraints among successive codewords, i.e. the input codewords are dependent. For
example, when concatenated codes [2] are used in channel
coding, the codewords of the inner code must be constrained
by the outer code. In joint source-channel coding, there also
be memory structure inherent with in the sequence output
from the source [12]. Moreover, in the model for storage or
communication, many files are not compressed or compressed
sub-optimally in source coding [4],[5],[10]. In this situation,
there may also be constraints among the successive transmitted
codewords , where redundancy mining can be used for error
correction, which is considered in [4],[5]. Inspired by these
works, we assume the code context model is a Markov chain
which is an elementary stochastic model used in natural
language processing models, and investigate an algorithm to
select codewords from the lists.
This paper is organized as follows. Section II presents
some necessary preliminaries and notations. In Section III
the error correcting probability by list decoding of linear
codes is analysed. And Hamming codes and Reed-Muller
codes are investigated as numerical examples where the benefit
proportion of list decoding can achieve about 40% in some
cases. In Section IV, an algorithm based on context is investigated to complete list decoding program, with which the most
probable codewords are selected from the lists. The algorithm
performance is analysed in Section V. Finally, we conclude
this paper in Section VI.
II. P RELIMINARIES AND N OTATIONS
The communication channel used in this paper is binary
symmetric channel (BSC) with crossover probability p. The
encoder is a one-to-one map function from the message set
M = {0, 1, ..., M − 1} to the codebook C, where C is a
subset of {0, 1}n and n is known as the blocklength of code
C .
wH (x) is the Hamming weight of a vector x and dH (x, y)
is the Hamming distance between two vectors x, y ∈ {0, 1}n .
For a binary [n, k, d] linear code C with minimum distance
d = min{wH (x)|x ∈ C, x 6= 0}, the weight distribution is
defined as
w
Aw
i = Ai (C) = #{x ∈ C|wH (x) = i}
and the weight distribution function is defined as
Aw
C (x, y) =
n
X
n−i i
Aw
y.
i x
i=0
III. T HE ERROR PROBABILITY OF ARQ SYSTEMS WITH
LIST DECODING
In this section, we first analyse the error correcting probability by list decoding of linear codes, which can be calculated
by Proposition 1. Then the error probability of ARQ systems
is calculated in Proposition 2. In subsection III-A and III-B,
the benefit proportion of error probability after list decoding
is illustrated in Fig. 1 and Fig. 2, where Hamming codes and
Reed-Muller codes are investigated as numerical examples.
Assume X = (X1 , X2 , ..., Xn ) ∈ {0, 1}n is sent and Y =
(Y1 , Y2 , ..., Yn ) ∈ {0, 1}n is received, where X and Y are
vectors of random variables. Let B(y, r) = {z ∈ {0, 1}n :
y ∈ {0, 1}n , dH (z, y) ≤ r} denote the sphere of radius r
about y and consider the conditional probability as follows:
Pr{Y ∈ C and Y 6= 0n , 0n ∈ B(Y, r)|X = 0n }
= Pr{Y ∈ C and Y 6= 0n , Y ∈ B(0n , r)|X = 0n },
After list decoding in ARQ system, the Pue is reduced to
List
= Pue − P List and the error probability changes from
Pue
(3) to
PeARQ,List =
The benefit proportion is defined by
Pb =
PeARQ − PeARQ,List
PeARQ
.
(5)
The results (3), (4) and (5) form the following proposition.
Proposition 2. If the crossover probability of BSC is p, it is
w
clear that Pc = (1 − p)n , Pue = Aw
C (1 − p, p) − Pc = AC (1 −
n
p, p) − (1 − p) . The probability of undetected error after list
List
decoding is Pue
= Pue − P List . After ARQ retransmissions,
assume all the received vectors are codewords, then the error
probability is
Pue
Pue + Pc
Aw (1 − p, p) − (1 − p)n
,
= C
Aw
C (1 − p, p)
PeARQ =
c∈C,c6=0n
where r ≥ d. P List (r) is called the error correcting probability
by list decoding, which is also the reduced probability of
undetected error, see Proposition 1.
Remark. As is shown in [3], the list size should not be too
large and be at most a polynomial in the blocklength. So this
paper considers the cases that the decoding radius r equals to
d, the minimum distance of code C. Note that, the completing
of list decoding program will be provided in Section IV by
using context.
Proposition 1. Assume the channel is BSC with crossover
probability p. Then, the error correcting probability by list
decoding with radius r = d is
P List , P List (d)
X
=
P r{Y = c, c ∈ B(0n , d)|X = 0n }
=
(4)
(1)
where r ≥ d. 0n ∈ B(Y, r) and Y 6= 0n mean that an
undetected error occurs when X = 0n is sent and the correct
codeword 0n is in the list with decoding radius r (r ≥ d). In
this case, it is defined to be list decoded correctly.
For all the codewords in C, the probability in (1) can be
described as follows:
X
P List (r) =
Pr{Y = c, c ∈ B(0n , r)|X = 0n }, (2)
c∈C,c6=0n
d
Aw
d · p · (1
List
Pue
.
Pue + Pc
the error probability after list decoding is
List
Pue
Pue + Pc
d
n−d
Aw (1 − p, p) − (1 − p)n − Aw
d · p · (1 − p)
,
= C
w
AC (1 − p, p)
PeARQ,List =
and the benefit proportion is
Pb =
PeARQ − PeARQ,List
PeARQ
Aw · pd · (1 − p)n−d
= wd
.
AC (1 − p, p) − (1 − p)n
Two numerical examples of Proportion 2 in ARQ systems
are given in Subsection III-A and III-B, respectively.
− p)n−d .
A. Hamming Codes
The list size is L = Aw
d + 1.
For ordinary linear codes, the computation of Aw
i (0 ≤ i ≤
n) is an NP-hard problem. But for some special codes, the
weight distributions are known and can be used to calculate
P List .
In ARQ systems, the error probability is defined in [7], see
PeARQ =
Pue
,
Pue + Pc
(3)
where Pc denotes the probability that a received vector contains no error and Pue denotes the probability that a received
vector contains an undetected error pattern.
Next we illustrate the benefits of list decoding on the error
probability PeARQ of [n = 2m −1, n−m] Hamming code. The
weight distribution function of Hamming code is known [8]
and the corresponding list size in Proposition 1 is L = Aw
3 +1.
ARQ
ARQ,List
The parameters of Proposition 2, i.e. Pe
, Pe
and
Pb , are illustrated in Fig. 1, where the messages are transmitted
through BSC with crossover probability p. As is shown by
the figure, PeARQ increases with block length. For Hamming
codes of m = 4, 5, 6 (p = 0.1) or m = 3, 4, 5 (p = 0.2), the
benefit of list decoding is obvious. Especially for m = 5 (p =
0.1) and m = 4 (p = 0.2), PeARQ is large and the benefit
proportion Pb is about 40%, a meaningful amount.
Assume the process is a Markov chain and let Pij denote
the one-step transition probability from state i to state j, then
Pij = Pr{Xt+1 = j|Xt = i},
(6)
for all states i, j ∈ M and all t ≥ 0. Let P denote the the
matrix of Pij , then
P = (Pij )M ×M (0 ≤ i, j ≤ M − 1).
Fig. 1. The Numerical Results of Hamming Codes
B. Reed-Muller Codes
As is shown in [8], the weight distribution of RM codes
is partly known. In most cases, the higher the code rate is,
the higher the undetected error probability is, and correcting
undetected errors is significant when the probability is high.
Let RM (r, m) denote the rth order binary Reed-Muller code
with block length n = 2m .
The numerical results of PeARQ , PeARQ,List and Pb in
Proposition 2 are illustrated in Fig. 2, where we can see
that the benefit proportion is decreasing with the crossover
probability p. And for Reed-Muller codes of high rate, the
benefit of list decoding is evident for small p, which is
supported by Fig. 2 (a) and (d)-(f). When PeARQ is less than
0.4, the benefit proportion is more than 40% shown in Fig. 2
(a)-(e).
IV. L IST- DECODING BASED ON C ONTEXT
In this section, an algorithm based on the context is investigated and dubbed context list decoding algorithm (CLDA).
The code context is described with Markov chain satisfying
equation (6). The performance of CLDA depends on the
context structure. The process of CLDA is shown in Algorithm
1 and Example 1, with which the most probable codewords
are selected from the lists.
The appearance of a codeword may be affected by former
or latter codewords, which is called the context of a code.
For instance, the appearance of each English letter in a word
depends on its former and latter letters. At the same time,
an English word is also affected by its adjacent words in
a sentence. In natural language processing models, Markov
chain is primary. Therefore, we assume the code context model
is Markov.
Then the context of all the received codewords can be seen
as a stochastic process {Xt , t = 0, 1, 2, ...} that takes values
on M = {0, 1, ..., M − 1}. Each codeword is bijectively
mapped to a state of the process. After retransmissions in
ARQ systems, all the received vectors are codewords. So
in the following part, we use the state in M to represent
the corresponding codeword and give a list of all possible
codewords for each received codeword. The proper ones are
selected from the lists based on the context. The selection of
codewords from lists is equivalent to the determination of the
states, see the following part.
The context of a code can be represented by P, with which
Algorithm 1 (CLDA) will select the most probable queue of
codewords. To describe CLDA, some definitions are given as
follows.
Definition 1. A queue of successive codewords with context
constraint is called a codeword sentence. If the queue length
is N , it is said to be an N -codeword sentence. The appearance probability of a codeword sentence is dubbed codeword
sentence weight.
Then, the weight of N -codeword sentence (i0 , i1 , ..., iN −1 )
is
Pr{X0 = i0 , ..., XN −1 = iN −1 }
= Pr{i0 } · Pr{i1 |i0 } · ... · Pr{iN −2 |iN −1 }
= πi0 · Pi1 ,i0 · ... · PiN −2 ,iN −1 ,
(7)
where let Pr{i0 } , Pr{X0 = i0 } , πi0 denote the priori probability of i0 and let Pr{ik+1 |ik } , Pr{Xk+1 = ik+1 |Xk =
ik }.
For linear codes, every given list contains the same number
of codewords and L is the list size. Let r = (r0 , r1 , ..., rN −1 )
denote the received codeword sentence and N is the codeword
sentence length. Let l = (l0 , l1 , ..., lN −1 ) denote the codeword
sentence selected from the successive lists, then the problem
of finding the most probable N -codeword sentence in the lists
is equivalent to compute
arg max
Pr{(l0 , l1 , ..., lN −1 )},
(l0 ,l1 ,...,lN −1 )∈L0 ×L1 ×...×LN −1
where L0 , L1 , ..., LN −1 are successive lists given by r as
follows:
Li = L(ri ), 0 ≤ i ≤ N − 1,
L(ri ) = {c ∈ C : dH (c, ri ) ≤ d}.
(8)
Let function T (li ) compute the maximal codeword sentence
weight when some codeword li is selected form List Li
and appended to the previously selected codeword sentence
(l0 , l1 , ..., li−1 ). For i ∈ [2, N − 1], we have
T (li ) ,
max
(l0 ,l1 ,...,li−1 )∈L0 ×L1 ×...×Li−1
Pr{(l0 , l1 , ..., li )}.
Then
T (li ) =
=
=
max
(l0 ,l1 ,...,li−1 )∈
L0 ×L1 ×...×Li−1
max
li−1 ∈Li−1
max
li−1 ∈Li−1
Pr{(l0 , l1 , ..., li−1 )}Pr{li |li−1 }
Pr{li |li−1 } ·
max
(l0 ,l1 ,...,li−2 )∈
L0 ×L1 ×...×Li−2
Pr{li |li−1 }T (li−1 )
Pr{(l0 , l1 , ..., li−1 )}
(a) RM(2,4)
(b) RM(2,5)
(c) RM(3,5)
(d) RM(4,6)
(e) RM(5,7)
(f) RM(6,8)
Fig. 2.
The Numerical Results of Reed-Muller Codes
and T (l0 ) = Pr{l0 } = πl0 .
The derived recurrence suggests that the optimization problem can be solved with dynamic programming algorithm
specified in Algorithm 1 (CLDA), which is adapted from the
Viterbi decoding [9]. The final solution is computed iteratively,
starting from T (l1 ) according to the recurrence. When the
last iteration is finished, we trace back along the path with
the maximal codeword sentence weight, selecting the most
probable codeword sentence.
Let L = (lij )L×N (0 ≤ i ≤ L − 1, 0 ≤ j ≤ N − 1) store the
values of each node. Let P = (Pij )M ×M (0 ≤ i, j ≤ M − 1)
denote the codeword transition probability matrix and
Π = (π0 , π1 , ..., πM −1 )T denote the priori probability of
each codeword, which are decided by the context of the
codewords. The CLDA is as follows:
Algorithm 1(CLDA).
In the following four steps, first, P, L and Π defined above
can be used to calculate a weight matrix T and a jumping
point matrix D. Then, matrix R, which stores the jumping
points of the path with length N and the largest weight, is
determined by T and D. At last, the final codewords after
context list decoding are stored in F calculated by R and L.
1. Initialize matrix T = (tij )L×N where tij stores the
maximum codeword sentence weight from the nodes in List
0 to the ith node in the current List j. The first column
of T is initialized with (πl0,0 , πl1,0 , ..., πlL−1,0 )T , namely,
ti,0 = πli,0 (0 ≤ i ≤ L − 1) and others with zeroes.
2. From List 0 to List N −1, compute the codeword sentence
weight:
tij = max (tk,j−1 · Plk,j−1 ,lij ),
(9)
0≤k≤L−1
where 0 ≤ i ≤ L − 1, 1 ≤ j ≤ N − 1.
The corresponding k which achieves the maximum value is
stored in matrix D = (xij )L×N :
xij = arg
max (tk,j−1 · Plk,j−1 ,lij ),
0≤k≤L−1
(10)
where 0 ≤ i ≤ L − 1, 1 ≤ j ≤ N − 1.
Remark.
• k is the row (node) index and j is the column (list) index;
• lij is the value (codeword) of the ith node in List j;
• xij is the jumping point from List j −1 to the ith node in
List j, which reaches the largest weight to current node.
• we select one codeword randomly if there are more than
one achieving the maximum value.
3. Calculate R = (r0 , r1 , ..., rN −1 ), where rN −1 =
arg max ti,N −1 and rk−1 = xrk ,k (k is from N − 1 to
0≤i≤L−1
0).
4. Calculate F = (f0 , f1 , ..., fN −1 ), where fk = lrk ,k (k is
from 0 to N − 1). Return F.
The complexity of CLDA is O(L2 N ), where L is the list
size and N is the length of codeword sentence. An example
of CLDA is illustrated as follows.
Example 1. Let the codeword
be
1/3
P = 2/9
0
transition probability matrix P
2/3
0
5/9 2/9
2/3 1/3
Note that, P is from the context and has no relation with
BSC. Meanwhile, let the priori probability of each codeword
be Π = (1/5, 3/5, 1/5)T . There are 3 successive lists with list
size 3, which is stored in L.
0 0 0
L= 1 1 1
2 2 2
1. Initialize the first column of T with Π =
(1/5, 3/5, 1/5)T .
2. For each 2-codeword sentence from List 0 to List 1, (9)
and (10) are calculated as follows: π0 ∗P00 = 1/15, π1 ∗P10 =
2/15, π2 ∗ P20 = 0. Then, record the biggest value 2/15 in T
and corresponding jumping point x01 : t01 = 2/15, x01 = 1.
Similarly, calculate π0 ∗ P01 = 2/15, π1 ∗ P11 = 1/3, π2 ∗
P21 = 2/15. Then t11 = 1/3, x11 = 1.
And calculate π0 ∗ P02 = 0, π1 ∗ P12 = 2/15, π2 ∗ P22 =
1/15. Then t21 = 2/15, x21 = 1.
For each 3-codeword sentence from List 0 to List 3,
compute t01 ∗ P00 = 2/45, t11 ∗ P10 = 2/27, t21 ∗ P20 = 0,
and record the biggest value 2/27 and corresponding index 1.
Then t02 = 2/27, x02 = 1.
Similarly, t12 = 5/27, x12 = 1, t22 = 2/27, x22 = 1.
3. We can find the most probable sentence using T and A,
as shown in Algorithm 1. t12 is the maximum among t02 , t12
and t22 . Then r2 = 1 and r1 = x12 = 1, r0 = x11 = 1. Using
R = (1, 1, 1), we get F = (l10 , l11 , l12 ) = (1, 1, 1) which is
the final codeword sentence after context list decoding.
V. P ERFORMANCE OF CLDA
As the ARQ system transmits messages through BSC with
crossover probability p, the probability of retransmission each
time is
Pretrans = 1 − Aw
C (1 − p, p),
where we assume the sent codeword is (0, 0, ..., 0)n . In the
following paragraphs, α(α ≥ 0) denotes the number of
retransmissions for receiving a legal codeword.
Let s = (s0 , s1 , ..., sN −1 ) be the sent codeword sentence.
To guarantee that s can be selected from the N lists in the
decoding, it is obvious that Pr{s} should be the biggest among
all the sentences in L0 × L1 × ... × LN −1 . This constraint
depends not only on the codeword sentence but also on the
transition probability matrix P .
Assumption. Assume that Pr{s} is the biggest among all
the codeword sentence in L(s0 ) × L(s1 ) × ... × L(sN −1 ).
Then if received sentence r equals to s, the CLDA selects
s obviously. The following paragraphs try to consider the
situation that r 6= s.
Assume si 6= ri for some 0 ≤ i ≤ N − 1. If the list given
by si is the same with the list given by ri , s will be selected
from the lists correctly, otherwise s may be selected wrongly.
Let S(si ) denote the set of codewords which give the same
list with si , namely
S(si ) = {c ∈ C : L(c) = L(si )}.
(11)
We use Ec to denote the event that s is selected from the
lists correctly. Meanwhile, let Ec (i)(0 ≤ i ≤ N − 1) denote
the event that si is selected correctly from Li . Then a lower
bound of Pr{Ec } is as follows:
Pr{Ec } = Pr{
N\
−1
Ec (i)} =
i=0
≥
N
−1
Y
N
−1
Y
Pr{Ec (i)}
i=0
Pr{L(ri ) = L{si }}
i=0
=
N
−1 X
∞
Y
i=0
=
α
Pretrans
Pr{ri ∈ S(si )}
α=0
N
−1
Y
1
(1 − Pretrans
)N
(Pc + (|S(si )| − 1)pd (1 − p)n−d ). (12)
i=0
Note that Pr{ri ∈ S(si )} is calculated based on the definition
of L(·) and S(·), see (8) and (11).
Numerical results for (12) are shown in Fig. 3, where the
lower bound of PEc is evaluated with RM(3,5) code. In Fig. 3
(a), the lower bound of PEc decreases when the crossover
probability p of BSC varies from 0 to 0.1 for codeword
sentence length N = 10, 20. It can be seen that the bound is
better for small p, i.e. p ∈ (0, 0.06), which is partly show in
Fig. 3 (b). The lower bound is about 0.98 for p ∈ (0.04, 0.06)
which may be practical. Fig. 3 (c) shows that the lower bound
of PEc decreases when the codeword sentence N varying from
5 to 30 and p = 0.06. For small N , PEc may be relatively
large, however, the context may not work well in CLDA.
When p and PEc is fixed, the largest N can be calculated
out with (12), which is meaningful for the selection of the
proper codeword sentence length.
When p is fixed, the lower bound can be used to calculated
the proper N needed to achieve required correctly selected
probability PEc .
In the following part, we try to analyse the average correctly
selected probability denoted by Paverage .
The probability of all the M N codeword sentences can
be calculated out with P. It is convenient to order all the
codeword sentences by the probability from large to small.
Let si = (si0 , si1 , ..., si,N −1 )(1 ≤ i ≤ M N ) denote the
ordered codeword sentences, where Pr{si } is decreasing by
i from 1 to M N , namely, Pr{s1 } is largest and Pr{sM N } is
the smallest.
For each sent codeword sentence si , the probability that si is
selected correctly varies with Pr{si }. Consider si and Pr{si }
for different 1 ≤ i ≤ M N respectively as follows:
1. s1 and Pr{s1 }:
(a)
(b)
(c)
Fig. 3. The lower bound of correctly selected probability Pr{Ec }
Pr{s1 } is the largest among all the codeword sentences, so
if s1 in the given lists, it will be selected correctly.
Pr{s1 in the lists|s1 is sent}
1
=
(Pc + Ad · pd (1 − p)n−d )N
(1 − Pretrans )N
2. si and Pr{s1 }:
If sj (1 ≤ j ≤ i) in the lists, si will not be selected out and
errors happen. When si is sent, the given lists should contain
si and not contain sj (1 ≤ j ≤ i).
Pr{si is selected correctly|si is sent}
i−1
[
L(sk ) |si is sent}
= Pr{r ∈ L(si )\
k=1
=
1
·
(1 − Pretrans )N
N
−1
X
Y
r∈L(si )\(
Si−1
k=1
pdH (rk ,si,k ) (1 − p)n−dH (rk ,si,k ) ,
L(sk )) k=0
where L(si ) = {L(si0 ) × L(si1 ) × L(si,N −1 )} and L(ri ) =
{c ∈ C : dH (c, ri ) ≤ d}, defined in (19).
Then, the average correctly selected probability is
Paverage
=
N
M
X
(Pr{si is sent} · Pr{si is selected correctly|si is sent})
i=1
=
1
(1 − Pretrans )N
X
N
M
X
i=1
N
−1
Y
Pr{si }·
pdH (rk ,si,k ) (1 − p)n−dH (rk ,si,k ) .
S
k=0
r∈L(si )\( i−1
k=1 L(sk ))
S0
To be convenient, we assume k=1 L(sk ) = ∅.
Paverage can be calculated when the transition probability
matrix P is known. However, the calculation complexity is
high. But when P is sparse or with other special structures,
the evaluation maybe useful. Besides, when M and N are
relatively small, Paverage can be calculated and used to
construct possible codes with better performance.
VI. C ONCLUSION
In this paper, we use list decoding to correct undetected
errors. The benefit is illustrated with numerical results of
Hamming codes and Reed-Muller codes in ARQ systems,
where the benefit proportion with list decoding can achieve
about 40% in some cases. We assume the code context model
is a Markov chain and an algorithm based on context, named
CLDA, is investigated to select the most probable codewords
from lists. The performance of CLDA is analysed and a lower
bound on the probability that the CLDA selects the correct
codeword sentence is derived.
R EFERENCES
[1] P. Elias, “List decoding for noisy channels,” Technical Report 335,
Research Laboratory of Electronics, 1957.
[2] G. D. Forney and G. D. Forney, Concatenated codes. Citeseer, 1966,
vol. 11.
[3] V. Guruswami and M. Sudan, “List decoding of error-correcting codes,”
Ph.D. dissertation, Springer, 2001.
[4] A. Jiang, Y. Li, and J. Bruck, “Enhanced error correction via language
processing,” in Proc. Non-Volatile Memories Workshop (NMVW), 2015.
[5] A. Jiang, Y. Li, and J. Bruck, “Error correction through language
processing,” in Proc. IEEE Information Theory Workshop (ITW), 2015.
[6] T. Klove, Codes for Error Detection. River Edge, NJ, USA: World
Scientific Publishing Co., Inc., 2007.
[7] S. Lin and D. J. Costello, Error Control Coding, Second Edition. Upper
Saddle River, NJ, USA: Prentice-Hall, Inc., 2004.
[8] F. MacWilliams and N. Sloane, The Theory of Error-Correcting Codes,
2nd ed. North-holland Publishing Company, 1978.
[9] A. J. Viterbi, “Error bounds for convolutional codes and an asymptotically
optimum decoding algorithm,” Information Theory, IEEE Transactions
on, vol. 13, no. 2, pp. 260–269, 1967.
[10] T. Weissman, E. Ordentlich, G. Seroussi, S. Verdú, and M. J. Weinberger,
“Universal discrete denoising: Known channel,” Information Theory,
IEEE Transactions on, vol. 51, no. 1, pp. 5–28, 2005
[11] J. M. Wozencraft, “List decoding,” Quarterly Progress Report, Research
Laboratory of Electronics, vol. 48, pp. 90–95, Jan 1958.
[12] G.-C. Zhu and F. Alajaji, “Joint source-channel turbo coding for binary
markov sources,” IEEE Transactions on Wireless Communications, vol. 5,
no. 5, pp. 1065–1075, May 2006.
| 7cs.IT
|
1
Generalised Precoded Spatial Modulation for
Integrated Wireless Information and Power Transfer
arXiv:1705.11076v1 [cs.IT] 31 May 2017
Rong Zhang, Lie-Liang Yang and Lajos Hanzo
Communications, Signal Processing and Control, School of ECS, University of Southampton, SO17 1BJ, UK
Email: rz,lly,[email protected], http://www-mobile.ecs.soton.ac.uk
Abstract—Conventional wireless information transfer by modulating the amplitude, phase or frequency leads to an inevitable
Rate-Energy (RE) trade-off in the presence of simultaneous
Wireless Power Transfer (WPT). In echoing Varshney’s seminal
concept of jointly transmitting both information and energy,
we propose the so-called Generalised Precoded Spatial Modulation (GPSM) aided Integrated Wireless Information and Power
Transfer (IWIPT) concept employing a power-split receiver. The
principle of GPSM is that a particular subset of Receive Antennas
(RA) is activated and the activation pattern itself conveys useful
information. Hence, the novelty of our GPSM aided IWIPT
concept is that RA pattern-based information transfer is used in
addition to the conventional waveform-based information carried
by the classic M -ary PSK/QAM modulation. Following the Radio
Frequency (RF) to Direct Current (DC) power conversion invoked
for WPT at the power-split receiver, the non-coherent detector
simply compares the remaining received power accumulated by
each legitimate RA pattern for the sake of identifying the most
likely RA. This operation is then followed by down-conversion
and conventional Base Band (BB) M -ary PSK/QAM detection.
Both our analysis and simulations show that the RA patternbased information transfer represented in the Spatial Domain
(SD) exhibits a beneficial immunity to any potential powerconversion induced performance degradation and hence improves
the overall RE trade-off when additionally the waveform-based
information transfer is also taken into account. Moreover, we
investigate the impact of realistic imperfect Channel State Information at the Transmitter (CSIT) as well as that of the antenna
correlations encountered. Finally, the system’s asymptotic performance is characterised in the context of large-scale Multiple
Input Multiple Output (MIMO) systems.
I. I NTRODUCTION
1) Motivation: In thermal and statistical physics, the earliest and most famous thought experiment regarding information
and energy was conceived by Maxwell in 1867, which is
referred to as ”Maxwell’s Demon” [1], where the second
law of thermo-dynamics was hypothetically violated by the
bold hypothesis of information to energy conversion. This
stimulated further intriguing research in the mid-20th century
as to whether information processing itself dissipates energy,
which subsequently led to ”Landauer’s principle” [2], [3] suggesting that thermo-dynamically reversible manipulations of
information in computing, measurement and communications
do not necessarily dissipate energy, since no energy is required
to perform mathematical calculations. This principle has thus
The financial support of the EPSRC under the India-UK Advanced Technology Centre (IU-ATC), that of the EU under the Concerto project as well
as that of the European Research Council’s (ERC) Advanced Fellow Grant is
gratefully acknowledged.
led to further research in the area of reversible computing and
reversible electronic circuits [4]. Although elusive, a so-called
”information heat engine” was experimentally demonstrated
in [5] for showcasing information to energy conversion with
the aid of feedback control.
Despite the fact that information to energy conversion is
in its infancy, it was suggested from a fundamental perspective [6] that the currently separate treatment of information and
energy has to be challenged in the practical design of engineering systems. Naturally, information is carried by attaching
itself to a physical medium, such as waves or particles. In
molecular and nano communications, information is delivered
by conveying encoded particles from the source to destination [7], [8]. Similarly, in optical communications, information
is delivered by photons having information-dependent intensities, which may be detected by a photon-counting process [9],
[10]. Given the nature of the process, the system is capable
of providing a heating/illumination/propulsion function. Both
of the above examples suggest that the underlying matter that
carries information can be effectively reused for diverse applications. The explicit concept of transporting both information
and energy simultaneously was raised by the authors of [11],
[12], [13] in the context of power-line communications, where
information is conveyed by wires that carry electricity. This
topic was recently further extended to wireless communications, since it is desirable that a mobile device is free from
being tethered in any way, as prophesied a century ago [14].
2) Background: Before delving into the topic of Simultaneous Wireless Information and Power Transfer (SWIPT), a
brief historical portrayal of Wireless Power Transfer (WPT)
is warranted [15]. The earliest experiments on WPT were
conducted by Tesla with the ultimate goal of creating a
worldwide wireless power distribution system [16]. In the mid20th century, one of the most influential projects was the
microwave-powered helicopter [17]. Similarly, the National
Aeronautics and Space Administration’s (NASA) feasibility
study of the space-solar program [18] attracted global attention. The need for small to moderate power requirements (upto
hundreds of watts) and near-field (upto a few meters) WPT
increased substantially owing to the development of electronic
devices in the late 20th century. Hence the wireless power
consortium was established for promoting the standardization
for wireless charging, known as Qi 1 . WPT can be carried out
in two basic ways, namely based on either electromagnetic
1 see
websites: http://www.wirelesspowerconsortium.com/
induction in the form of inductive coupling and resonant
coupling relying on coils or with the aid of electromagnetic
radiation using microwave frequencies by relying on so-called
rectennas, which will be discussed in Section II-C. At the
time of writing there are already numerous WPT applications, ranging from wirelessly charged mobile phones [19] to
wirelessly powered medical implants [20] and to ’immortal’
sensor networks [21] in addition to passive Radio-frequency
IDentification (RFID) devices [22]. Furthermore, along with
successful start-up companies like WiTricity and Powercast 2 ,
it is thus the maturing WPT and wireless communications
fields that make the SWIPT an interesting emerging research
topic.
However, the current research of SWIPT is still in its
infancy and hence there is a paucity of literature, which
may be classified as follows. The first set of contributions
considered one-way SWIPT, where the transmitter simultaneously conveys both information and power to the receiver
that may be operated in two different modes [23], namely
either on a time-division basis or on a power-split basis.
To be more specific, in the time-division mode, the receiver
alternatively and opportunistically acts as an information detector and power converter [24]. On the other hand, in the
power-split mode, a portion of the received power is used
for powering the receiver and the remaining received power
is used for retrieving information [25], [26]. The second set
of contributions considered two-way SWIPT. Specifically, the
authors of [27], [28] investigated the scenario, where the
transmitter conveys power to the receiver, which is converted
to Direct Current (DC) power and reused for the destination’s
information transmission in the reverse direction. This mode
of operation is similar to that of the passive RFID devices
and hence it may be referred to as being two-way half-duplex.
Distinctively, [29] investigated a two-way full-duplex operational mode, where a pair of nodes interactively communicates
and exchanges power. The final set of treatises considered a
range of energy-transfer-aided systems, such as multi-carrier
systems [30], relay-assisted systems [31], interference-limited
arrangements [32], beamforming-assisted regimes [33], [34],
multiple access [35] and unicast/multicast scenarios [36].
3) Novelty: A close inspection of the existing literature
reveals that most of the current designs are centered on the
information transfer strategy in the presence of power transfer,
while satisfying a specific received energy constraint. It would
be however more beneficial to aim for the full ”integration” of
information and power transfer as the ultimate objective in the
spirit of Varshney’s concept [12], who proposed that energy
and information transfer should be innately inter-linked.
To be more explicit, in one-way SWIPT equipped with a
power-split receiver 3 , an inevitable Rate-Energy (RE) tradeoff has to be obeyed, which simply suggests that the more
power is transferred for powering the receiver, the lower the
communications rate becomes. This observation is intuitive,
since from an information theoretic point of view, less power
is left for information transfer, which inevitably leads to a
2 see
websites: http://www.witricity.com/ and http://www.powercastco.com/
time-division receiver is conceptually simple but it has been shown
to be sub-optimum [12]. Hence it is not considered in this paper.
3 The
reduced information rate. Naturally, having a reduced power
for information transfer implies that the information becomes
more prone to errors. One of the fundamental reasons for the
RE trade-off is that information is conventionally transferred
by modulating the amplitude, phase or frequency, which are
naturally subjected to channel-induced distortion, noise and
power-splitting. In order to eliminate these impediments, we
propose a completely different modulation type for Integrated
Wireless Information and Power Transfer (IWIPT), where
information is carried not by waveforms but by patterns.
Explicitly, a multi-antenna aided system is conceived for
IWIPT, where the specific Receive Antenna (RA) patterns
are used for conveying information, while simultaneously
transferring power.
• We achieve this with the aid of our recently proposed Generalised Pre-coding aided Spatial Modulation
(GPSM) scheme [37], where information is conveyed by
appropriately selecting the RA indices for information
transfer in addition to the information carried by the
conventional M -ary PSK/QAM modulation 4 .
• We show that the RA pattern-based information transfer represented in the Spatial Domain (SD) exhibits
a beneficial immunity to any performance degradation
imposed by the Radio Frequency (RF) to DC power
conversion in a power-split receiver and that our GPSM
scheme is capable of improving the overall RE tradeoff, when additionally the waveform-based information
transfer represented in the classic time domain is also
taken into account.
4) Organisation: The rest of our paper is organised as
follows. In Section II, we introduce the underlying concept as
well as the transceiver architecture of the GPSM aided IWIPT
system employing a power-split receiver. This is followed
by our analytical study in Section III, where we demonstrate that the proposed RA pattern-based information transfer
represented in the SD exhibits a beneficial immunity to RF
to DC power conversion induced performance erosion. We
then continue by charactering the RE trade-off of the overall
system. Our simulation results are provided in Section IV,
while we conclude in Section V.
II. S YSTEM M ODEL
Our proposed GPSM aided IWIPT system relies on the
availability of Channel State Information at the Transmitter
(CSIT) for supporting Transmitter Pre-Coding (TPC). This
scenario has been widely considered in the SWIPT literature [23], [27], [32], [33], [34], since it is desirable to shift
most/all signal processing demands from the less powerful
Down-Link (DL) receiver that may be passive or semi-passive
to the more powerful DL transmitter that may have access to
the mains power.
A. Conceptual Description
Consider a Multiple Input Multiple Output (MIMO) system
equipped with Nt Transmit Antennas (TA) and Nr RAs, where
4 Spatial Modulation [38], [39] conveys extra information by appropriately
selecting the transmit antenna indices, but our GPSM scheme conveys extra
information by appropriately selecting the receive antenna indices [37].
Booster
σa2 ρ Rectifier
RF
DC
k
DC
DC
σb2
bm 1
bm N a
inactive
(1)
BB
RF
active
s km = Ω kb m ,
bm̂1
RF
P
we have the relationship
Battery
Nt
1−ρ
Nr
BB
k̂
bm̂Na
Fig. 1.
Transceiver architecture of GPSM aided IWIPT. For example, activating Na = 2 RAs out of Nr = 4 RAs results in a total
of |Ct | = 6 legitimate activation patterns, i.e. the patterns of Ct =
{[1, 2], [1, 3], [1, 4], [2, 3], [2, 4], [3, 4]}. This configuration delivers kant =
2 bits of information because ⌊log2 (|6|)⌋ = 2. Upon selecting for example
C = {Ct (1), Ct (2), Ct (3), Ct (4)}, we have the following mapping between
the SD symbol and the activation patterns k = 1 7→ C(1) = [1, 2], k = 2 7→
C(2) = [1, 3], k = 3 7→ C(5) = [1, 4] and k = 4 7→ C(6) = [2, 3].
we assume Nt ≥ Nr . In this MIMO set-up, a maximum
of Nr = min(Nt , Nr ) parallel data streams may be supported by conventional waveform-based information transfer,
conveying a total of kef f = Nr kmod bits altogether, where
kmod = log2 (M ) denotes the number of bits per symbol of
a conventional M -ary PSK/QAM scheme and its alphabet is
denoted by A. The TPC matrix of P ∈ CNt ×Nr may be used
for pro-actively mitigating the Inter-Channel Interference (ICI)
at the transmitter by pre-processing the source signal before
its transmission upon exploiting the knowledge of the CSIT.
As a benefit, a low-complexity single-stream detection scheme
may be used by the receiver, because the ICI is eliminated at
the transmitter.
In contrast to the above-mentioned classic waveform-based
multiplexing of Nr data streams, in our GPSM scheme a total
of Na < Nr RAs are activated so as to facilitate the simultaneous transmission of Na data streams, where the particular
pattern of the Na RAs activated conveys information in form
of so-called SD symbols in addition to the information carried
by the conventional M -ary PSK/QAM modulated symbols as
seen in Fig 1 5 . Hence, the number of bits in GPSM conveyed
by a SD symbol becomes kant = ⌊log2 (|Ct |)⌋, where the set Ct
contains all the combinations associated with choosing Na activated RAs out of Nr RAs. As a result, the total number of bits
transmitted by the GPSM scheme is kef f = kant +Na kmod . To
assist our further discussions, let us define the set of selected
activation patterns as C ⊂ Ct . We also let C(k) and C(k, i)
denote the kth RA activation pattern and the ith activated RA
in the kth activation pattern, respectively. Finally, it is plausible
that the conventional MIMO scheme using purely waveformbased information transfer obeys Na = Nr .
B. IWIPT Transmitter
More specifically, let s km be an explicit representation of
a so-called super-symbol s ∈ CNr ×1 , indicating that the RA
pattern k is activated and Na conventional modulated symbols
b m = [bm1 , . . . , bmNa ]T ∈ CNa ×1 are transmitted, where we
have bmi ∈ A and E[|bmi |2 ] = 1, ∀i ∈ [1, Na ]. In other words,
5 Note that in our GPSM scheme, it is not necessary to convey any additional
information by a conventional M -ary PSK/QAM scheme, we may consider
a pure spatial modulation-aided system.
where Ω k = I [:, C(k)] is constituted by the specifically
selected columns determined by C(k) of an identity matrix of
I Nr . Following TPC, the resultant transmit signal x ∈ CNt ×1
may be written as
p
(2)
x = βs /NaP s km .
In order to avoid any power fluctuation during the preprocessing, we introduce the scaling factor of βs designed for
x ||2 = 1. As a natural
maintaining the power-constraint of ||x
requirement, the TPC matrix has to ensure that no energy leaks
into the RA-elements of the unintended RA patterns. Hence,
the classic linear Channel Inversion (CI)-based TPC [40], [41]
may be used, which is formulated as
H H H )−1 ,
P = H H (H
(3)
where H ∈ CNr ×Nt represents the MIMO channel involved.
We assume furthermore that each entry of H undergoes
frequency-flat Rayleigh fading and it is uncorrelated between
different super-symbol transmissions, while remains constant
within the duration of a super-symbol’s transmission. The
power-normalisation factor of the output power after preprocessing is given by
H H H )−1s .
βs = Na /ssH (H
(4)
The Base Band (BB) signal x is then up converted to x RF
and sent through Nt TAs.
C. IWIPT Receiver
1) Architecture: The power-split receiver of Fig 1 is employed [23], where we have a power transfer tunnel and
information transfer tunnel. As seen from Fig 1, the received
signal will be first subject to power conversion at each RA
using a power-splitting ratio of ρ ∈ (0, 1) at the RF stage,
where the power transfer tunnel consists of a rectifier used
for converting the received RF power to DC power, which is
followed by a (multi-stage) DC to DC booster. Note that from
a pure WPT point of view, the RAs, the rectifier and the DCbooster are jointly known as a rectenna. After power-splitting,
the remaining signal power will be used for information
transfer, which relies on determining the SD symbol for RA
pattern-based information transfer at the RF-stage and on
detecting the conventional modulated symbols for waveformbased information transfer at the BB-stage. Note that an
additional benefit of our GPSM scheme is that a reduced
number of RF to BB conversion chains are required.
2) Power Conversion: The RF signal observed at the Nr
RAs may be written as
r RF = H xRF + w RF
a ,
w RF
a
(5)
where
is the RF receiver’s noise. The equivalent BB
representation of the noise w a ∈ CNr ×1 may be modelled by
a circularly symmetric complex-valued Gaussian noise vector
with each entry having a zero mean and a variance of σa2 , i.e.
w a ||2 ] = σa2 Nr .
we have E[||w
At the RF-stage of Fig 1, a portion ρ of the received power
is converted to DC, where the average energy transferred by
the transmitter per unit time and gleaned from all the Nr RAs
is represented as
#
" N
r
X
RF 2
|r̃i | ,
(6)
Q = ξE ρ
i=1
where r̃ RF = H x RF is the noiseless part of r RF , representing
the power transferred by the transmitter, while the additive
noise of w RF
in (5) is not transferred by the transmitter, it
a
is imposed by the RF receiver. For the time being, designing
adaptive RA specific power-splitting ratios ρi , i ∈ [1, Nr ] is
set aside for our future investigations and we also set the RF
to DC conversion efficiency to ξ = 1 in this paper.
3) RA Pattern-based Information Transfer: After RF to DC
power conversion of each RA at a ratio of ρ, the remaining
RF signal observed at the Nr RAs invoked for information
transfer may be written as
p
= 1 − ρ H x RF + w RF
y RF
,
(7)
a
a
where the SD symbol may be determined by simply sorting
the remaining received power accumulated by each legitimate
RA pattern, which is mathematically represented as
(N
)
a
X
RF
2
|ya,C(ℓ,i) | .
(8)
k̂ = arg max
ℓ∈[1,|C|]
m̂i = arg min
ni ∈[1,M]
|yb,v̂i −
s
(1 − ρ)β
h v̂i p v̂i bni |2 , (11)
Na
where v̂i = C(k̂, i). Thus, correct detection is declared, when
we have m̂i = mi , ∀i.
III. S YSTEM A NALYSIS
In this section, we will first show that the RA pattern-based
information transfer of (8) is immune to power conversion,
since the Symbol Error Ratio (SER) of the SD symbols
remains the same as in the absence of power transfer. This
is then followed by our RE trade-off analysis of the overall
GPSM scheme, which is constituted by both the SD symbol
used for RA pattern-based information transfer and by the
conventional modulated symbols employed for waveformbased information transfer.
A. Analytical SER of RA Pattern-based Information Transfer
We commence our discussion by directly stating:
Lemma III.1. The RA pattern-based information transfer of
(8) is immune to the power conversion operation of (6) for
ρ ∈ (0, 1).
i=1
Thus, correct detection is declared when we have k̂ = k. We
will later show that the factor (1 − ρ) does not affect the detection of SD symbols and our RA pattern-based information
transfer exhibits a beneficial immunity to power conversion.
4) Waveform-based Information Transfer: After determining the RA pattern using the non-coherent detection process
of (8), we proceed with the conventional waveform-based
information transfer. After RF to BB down conversion, the
BB signal may be written as
p
p
βs /NaH P s km + w a + w b ,
(9)
yb = 1 − ρ
where w b ∈ CNr ×1 is the down-conversion induced noise,
which is modelled similarly to the RF receiver’s noise w a ,
but with a variance of σb2 . We also let σa2 = ασ 2 and σb2 =
(1 − α)σ 2 , where σ 2 represents the total noise variance at the
power-split receiver of Fig 1.
Assuming that the vi = C(k, i)th RA is activated, the
Signal-to-Interference-plus-Noise-Ratio (SINR) γvi of the
conventional modulated symbols after power conversion is
given by
γvi =
as
hvi p vi ||2
||h
,
2
[σa2 + σb /(1 − ρ)]Na /βs
(10)
where h vi is the vi th row of H representing the channel
between the vi th RA and the transmitter, while p vi is the vi th
column of P representing the vi th TPC vector.
As a subsequent stage after the RA pattern determination,
the detection of conventional modulated symbols is formulated
Proof: Firstly we note that (8) relies on the principle of
energy detection. Hence our analysis may be performed using
the equivalent BB representation of (7), as suggested in [42],
which is represented as
p
p
βs /NaH P s km + w a .
(12)
ya = 1 − ρ
Hence (8) becomes
k̂ = arg max
ℓ∈[1,|C|]
(N
a
X
i=1
|ya,C(ℓ,i) |
2
)
.
(13)
Given the values of Nr as well as Na and assuming that the
RA pattern C(k) was activated, after substituting (3) into (12),
we have:
p
p
βs /Na bmi + wa,vi ,∀vi ∈ C(k), (14)
ya,vi = (1 − ρ)
p
¯
ya,ui = (1 − ρ)wa,ui ,
∀ui ∈ C(k),
(15)
¯ denotes the complementary set of the activated RA
where C(k)
2
pattern C(k) in C. Furthermore, upon introducing σa,0
= σa2 /2,
we have:
|ya,vi |2 = R(ya,vi )2 + I(ya,vi )2
hp
i
2
∼N
(1 − ρ)βs /Na R(bmi ), (1 − ρ)σa,0
i
hp
2
, (16)
(1 − ρ)βs /Na I(bmi ), (1 − ρ)σa,0
+N
|ya,ui |2 = R(wa,ui )2 + I(wa,ui )2
2
2
,
+ N 0, (1 − ρ)σa,0
∼ N 0, (1 − ρ)σa,0
(17)
where R(·) and I(·) represent the real and imaginary operators, respectively. As a result, by normalisation with respect
2
to (1 − ρ)σa,0
, we have the following observations:
|ya,vi |2 ∼ χ22 (g; λvi ),
2
|ya,ui | ∼
χ22 (g),
∀vi ∈ C(k),
¯
∀ui ∈ C(k),
(18)
(19)
where the non-centrality parameter is given by
2
.
λvi = βs |bmi |2 /Na σa,0
(20)
Exploiting the fact that E[|bmi |2 ] = 1, ∀i or |bmi |2 = 1, ∀i for
PSK modulation, we have
2
,
λ = λvi = βs /Na σa,0
∀vi
(21)
Note that λ is also a random variable obeying the distribution
of fλ (λ), whose analytical expression will be given in Lemma
III.2.
Recall from (13) that theP
correct decision concerning the
Na
2
SD symbol occurs, when
is the maximum.
i=1 |ya,vi |
Since the non-centrality parameter given by (20) is not a
function of ρ, P
power conversion operation does not affect
a
2
the quantity of N
i=1 |ya,vi | . Hence, it becomes explicit that
the power-splitting ratio ρ does not affect the SER esant of
the SD symbol of our GPSM scheme for RA pattern-based
information transfer expressed in Lemma III.3.
Lemma III.2. (Proof see Appendix C of [43]) The distribution
fλ (λ) of the non-centrality parameter λ is given by:
fλ (λ) =
NaNt −Nr +1 σa2 /2 −λNa σa2 /2
e
(λσa2 /2)Nt −Nr .
(Nt − Nr )!
(1 − ρ)σa2 + σb2 . Thus the SER esmod may be upper bounded
by [44]:
Z ∞
p
(25)
esmod ≤ Nmin
Q dmin γ/2 fγ (γ)dγ,
0
where fγ (γ) is a scaled version of fλ (λ) given in Lemma
III.2, i.e. we have fγ (γ) = κfλ (κγ), where
κ = 2[σa2 + σb2 /(1 − ρ)]/σa2 .
(26)
Moreover, dmin is the minimum Euclidean distance in the
conventional modulated symbol constellation, Nmin is the
average number of the nearest neighbours separated by dmin
in the constellation and Q(·) denotes the Gaussian Q-function.
We then introduce ẽsmod for representing the SER of the
conventional modulated symbols in the presence of SD symbol
errors due to the detection of (8), which is formally given by
Lemma III.4. (Proof see Appendix A of [43]) Given the kth
activated RA patten, the SER of the conventional modulated
symbols for waveform-based information transfer in the presence of SD symbol errors can be calculated as:
X Nc es + Nd es
esant
o
mod
,
ẽsmod = (1 − esant )esmod + kant
− 1)
(2
Na
ℓ6=k |
{z
}
B
(27)
where Nc and Nd = (Na − Nc ) represent the number of
RAs that are common and different between C(ℓ) and C(k),
respectively. Mathematically we have:
(22)
Nc =
Na
X
I [C(ℓ, i) ∈ C(k)] .
(28)
i=1
Lemma III.3. (Proof see Theorem III.1 of [43]) The analytical
Moreover, eso is defined as the modulation-type-dependent SER.
SER esant of the SD symbol of our GPSM scheme relying on
CI TPC may be formulated as:
Finally, when CI based TPC is introduced, only random
Na
Z ∞ Z ∞
s
Nr −Na
noise
may be received by the Nd RAs in C(ℓ), thus eso simply
eant ≈ 1 −
[Fχ22 (g)]
fχ22 (g; λ)dg
fλ (λ)dλ,
represents the SER of the conventional modulated symbols as
0
0
(23) a result of a random guess. For example, for QPSK, we have
eso = 3/4. Note that, when the SER of the SD symbols esant
where Fχ22 (g) represents the Cumulative Distribution Function
is small, we have ẽsmod ≈ esmod .
(CDF) of a chi-square distribution having two degrees of
freedom, while fχ22 (g; λ) represents the Probability Distribution Function (PDF) of a non-central chi-square distribution C. Rate Energy Trade-off
having two degrees of freedom and non-centrality given by λ
1) DCMC Capacity Expression: The RE trade-off may be
with its PDF of fλ (λ).
formulated using the power conversion of (6) and comparing it directly against the Discrete-input Continuous-output
Memoryless Channel (DCMC) capacity of our GPSM scheme.
B. Analytical SER of Waveform-based Information Transfer
This is because in our GPSM scheme the SD symbols convey
We first introduce the SER esmod of the conventional modinteger values constituted by the RA pattern index, which does
ulated symbols bmi ∈ A for waveform-based information
not obey the shaping requirements of Gaussian signalling [45].
transfer in the absence of SD symbol errors. For a specific
Hence, for simplicity’s sake, we discuss the DCMC capacity of
activated RA pattern in C(k), the SINR of (10) becomes
our GPSM scheme in the context of discrete-input signalling
2
2
∀vi
(24) for both the SD symbol and for the conventional modulated
γ = γvi = βs /Na [σa + σb /(1 − ρ)],
symbols mapped to it.
¯
and for the remaining deactivated RAs in C(k)
we have only
The Mutual Information per Bit (MIB) I(z; ẑ) of our GPSM
random noise contributions of zero mean and of a variance of scheme measured between the input bits z ∈ [0, 1] and the
corresponding demodulated output bits ẑ ∈ [0, 1] is given by:
"
#
X
X
X
I(z; ẑ) = −
Pz log Pz −
Pz|ẑ log Pz|ẑ
Pẑ
z
=1+
ẑ
ebef f
log ebef f
+ (1 −
z
b
eef f ) log(1
− ebef f ), (29)
where Pz is the Probability Mass Function (PMF) of z, where
we adopt the common assumption of equi-probability bits of
Pz=0 = Pz=1 = 1/2. On the other hand, the conditional
entropy, representing the average uncertainty about z after
observing ẑ, is a function of the average Bit Error Ratio (BER)
of our GPSM scheme, denoted as ebef f . As a result, the socalled DCMC capacity becomes
R = kef f I(z; ẑ).
(30)
2) Average BER Expression: Let us now discuss the expression of ebef f for the sake of calculating (29) and (30), which
may be derived from its accurate SER expression of both
the SD symbol for the RA pattern-based information transfer
given in (23) and for the conventional modulated symbols for
waveform-based information transfer given in (27).
Let ebant and ẽbmod represent the BER of the SD symbol for
RA pattern-based information transfer and of the conventional
modulated symbols for waveform-based information transfer.
Hence, the accurate expression of the average BER of our
GPSM scheme may be written as:
ebef f
=
=
(kant ebant + Na kmod ẽbmod )/kef f
(δant esant + Na ẽsmod )/kef f ,
(31)
where the second equation of (31) obeys from the relationship
of
ẽbmod = ẽsmod /kmod ,
ebant = δkant esant /kant ,
(32)
(33)
where we formulate Lemma III.5 for the expression of δkant
acting as a correction factor in (31).
Lemma III.5. (Proof see Appendix B of [43]) The generic
expression of the correction factor δkant for kant bits of
information is given by:
2kant −1 − δkant −1
,
(34)
2kant − 1
where given δ0 = 0, we can recursively determine δkant .
δkant = δkant −1 +
D. Further Discussions
1) Robustness: The above RE trade-off is based on the
assumption of having perfect CSIT. Let us now consider the
system’s robustness to both CSIT-errors and antenna correlations, where the expression ebef f of our GPSM scheme will
be determined empirically for calculating (29) and (30).
Like in all TPC schemes, an important related aspect is
its resilience to CSIT inaccuracies. In this paper, we let
H = H t + H e , where H t represents the matrix hosting the
average CSI, with each entry obeying the complex Gaussian
distribution of ht ∼ CN (0, σt2 ) and H e is the instantaneous
CSI error matrix obeying the complex Gaussian distribution of
he ∼ CN (0, σe2 ), where we have σt2 +σe2 = 1. As a result, only
H t is available at the transmitter for pre-processing. There is
a plethora of CSIT inaccuracy counter-measures conceived for
general transmitter pre-coding schemes in the literature [46],
[47], but they are beyond the scope of our discussions in this
paper.
Another practical phenomenon is the presence of correlation
amongst the signals at the transmit and receive antennas.
The correlated MIMO channel is modelled by the widelyused Kronecker model [48], which is formulated as H =
T
R 1/2
G (R
R 1/2
(R
r ) , with G representing the original MIMO
t )G
channel imposing no correlation, while R t and R r represents
the correlations at the transmitter and receiver side, respec|i−j|
tively, with the correlation entries given by Rt (i, j) = ρt
|i−j|
and Rr (i, j) = ρr .
2) Asymptotic Insights: It is also interesting to investigate
the impact of power conversion on both the MIB as well as on
the DCMC capacity of our GPSM scheme and to contrast it to
that of the conventional CI pre-coding based MIMO scheme
for large-scale MIMO settings of Nt → ∞, Nr → ∞ and for
a fixed system load ratio of Nr /Nt .
In order to provide these asymptotic insights for these largescale MIMO settings, we have to replace the constraint of
x||2 = 1 with its relaxed version of E[||x
x ||2 ] = 1. Hence
||x
instead of (4), we have the relaxed normalisation factor of
H H H )−1 ].
βl = Nr /Tr[(H
(35)
As shown in Corollary 4 of [49] and also in Chapter 14 of [50],
under asymptotic settings, (35) tends to
βl 7−→ (Nt /Nr − 1).
(36)
By exploiting (36) and by replacing (4) with (35) in the expressions of (21) and (24), we have the following deterministic
quantity
2
λ 7−→ λd = (Nt /Nr − 1)/Na σa,0
,
γ 7−→ γd = (Nt /Nr −
1)/Na [σa2
+
(37)
σb2 /(1
− ρ)].
(38)
As a result, we have
Z ∞
Na
s
Nr −Na
eant,d = 1 −
[Fχ22 (g)]
fχ22 (g; λd )dg
, (39)
0
p
(40)
esmod,d = Nmin Q dmin γd /2 .
Noting that when esant,d is small, we arrive at the approximation ẽsmod,d ≈ esmod,d as suggested by (27), thus we may
obtain ebef f,d by replacing esant and ẽsmod in (31) with their
deterministic expressions in (39) and (40). Finally, by inserting
ebef f,d in (29) and (30) instead of ebef f , we arrive at the MIB
and DCMC capacity for both our GPSM scheme as well
as for the conventional CI pre-coding based MIMO scheme
(Na = Nr ) under the asymptotic settings of Nt → ∞ and
Nr → ∞.
IV. N UMERICAL R ESULTS
Let us now consider our numerical results for characterizing
the GPSM aided IWIPT for both RA pattern-based information
transfer and for waveform-based information transfer relying
Nt
16
16
16
16
16
16
•16
Nr
8
8
8
8
8
8
8
Na
1
2
3
4
5
6
8
M
2
2
2
2
2
2
2
kef f
5 = 3+1×2
8 = 4+2×2
11 = 5+3×2
14 = 6+4×2
15 = 5+5×2
16 = 4+6×2
16 = 0+8×2
on the CI-based precoding of (3) under {Nt , Nr } = {16, 8}.
Since our focus is on RA pattern-based information transfer,
simple QPSK was used for the conventional data modulation component of our waveform-based information transfer. Furthermore, we investigate the scenarios correspond to
Na = [1, . . . , 6] in our GPSM scheme since the setting of
Na = 7 results into higher complexity than the conventional
CI pre-coding based MIMO bench-maker as discussed in [37].
Maximum achievable throughput under MIMO settings of
{Nt , Nr } = {16, 8} and employing QPSK modulation is
shown in Table I, which may be used to compare our DCMC
capacity related investigations. Finally, the Signal-to-NoiseRatio (SNR) per bit is defined as SN Rb = 1/σ 2 (kef f /Na ).
0
Spatial SER
10
Na = 1
−2
10
Na = 2
Na = 3
−4
10
N =4
a
−10 −9
−8
−7
−6
−5
−4
−3 −2 −1
SNR [dB]
0
1
2
3
4
5
−3 −2 −1
SNR [dB]
0
1
2
3
4
5
b
0
10
GPSM BER
TABLE I
M AXIMUM ACHIEVABLE THROUGHPUT kef f OF GPSM AND OF THE
CONVENTIONAL MIMO CORRESPONDING TO Na = Nr ( IN •) UNDER
SETTINGS OF {Nt , Nr } = {16, 8} AND EMPLOYING QPSK MODULATION
M = 2, WHERE kef f = kant + Na kmod FOR GPSM AND
kef f = Nr kmod FOR CONVENTIONAL MIMO.
−2
10
N =5
a
Na = 6
−4
10
analytical
−10 −9
−8
−7
−6
−5
−4
b
Fig. 2.
Spatial SER of (23) (upper) and GPSM overall BER of (31)
(lower) using CI based TPC and a power-normalisation factor of (4) under
{Nt , Nr } = {16, 8}, where we set the power-splitting ratio to ρ = 0 and
the noise ratio to α = 1.
0
10
with WPT
no WPT
N =1
a
−1
10
N =2
a
N =4
a
N =6
a
−2
10
Fig 2 shows the spatial SER (upper) as well as the GPSM
scheme’s overall BER (lower) under the power-normalisation
factor of (4) for {Nt , Nr } = {16, 8}. Without loss of generality, we set the power-splitting ratio to ρ = 0 and the noise
ratio to α = 1.
Observe in the upper subplot of Fig 2 that our empirical
simulation based SER results recorded for the SD symbol of
the RA pattern-based information transfer accurately match
the analytical results given in (23) and form tight upper
bounds. Similarly, when the GPSM scheme’s overall BER is
considered in the lower subplot of both figures, our empirical
results accurately match the analytical results given in (31).
Fig 3 shows the GPSM scheme’s overall BER under the
power-normalisation factor of (4) for {Nt , Nr } = {16, 8},
where we set the power-splitting ratio to ρ = 0.5 and the
noise ratio to α = 0.4. As suggested by (24), the total noise at
the BB for waveform-based information transfer now becomes
1.6 times that with no WPT. Hence, we may expect to see a
BER performance degradation of 10 log10 (1.6) ≈ 2dB. This is
clearly demonstrated in Fig 3 at BER of 10−5 , which implies
that the RA pattern-based information transfer in our GPSM
scheme is immune to the RF to DC power conversion induced
performance erosion as otherwise the performance degradation
would be more than 2dB.
B. Investigation on MIB
1) Immunity to Power Conversion: Fig 4 investigates the
MIB versus energy trade-off of purely RA pattern-based information transfer for {Nt , Nr } = {16, 8} and SN Rb = 0dB,
BER
A. Investigation on Error Probability
Na = 8
−3
10
−4
10
−5
10
−10
−8
−6
−4
−2
0
2
4
SNRb [dB]
6
8
10
12
14
Fig. 3. BER of conventional CI pre-coding based MIMO bench-maker as
well as GPSM using CI based TPC and a power-normalisation factor of (4)
under {Nt , Nr } = {16, 8}, where we set the power-splitting ratio to ρ = 0.5
and the noise ratio to α = 0.4.
where we set α = 0.4 in the left subplot and α = 0.6 in the
right subplot. The results of MIB were evaluated from (29).
Observe from both subplots of Fig 4 that for all values of
Na , apart from setting ρ = 1, where the receiver acts purely
as a WPT and the normalised converted energy is unity, the
remaining settings of the power-splitting ratio ρ do not affect
the MIB of the SD symbols in our GPSM scheme, as suggested
by the horizontal lines. More explicitly, for all values of Na
seen in Fig 4, the MIB of SD symbols vs the power conversion
ratio of ρ ∈ [0, 0.1, . . . , 0.9] remains identical to that under
ρ = 0. This implies that the RA pattern-based information
transfer relying on SD symbols operates as if no WPT was
provided, which justifies our Lemma III.1. Furthermore, by
comparing the left and right subplot of Fig 4, it can be seen that
the MIB of SD symbols becomes lower, when an increased
RF receiver noise is encountered in conjunction with α = 0.6.
1
0.9
0.9
0.9
0.9
0.8
0.8
0.8
0.8
0.7
0.7
0.7
0.7
0.6
0.6
0.6
0.6
0.5
0.4
0.3
0.5
MIB
1
MIB
1
MIB
0.5
0.4
0.4
0.3
0.3
0.3
Na = 1
Na = 1
0.2
Na = 2
Na = 3
0.1
0.2
Na = 5
0.1
N =4
N =6
a
0
0
0.2 0.4 0.6 0.8
Normalised Energy
Na = 2
Na = 3
0.1
N =4
a
1
0
0
0.2 0.4 0.6 0.8
Normalised Energy
0.2
N =5
0.1
Na = 6
a
N =8
a
0
1
Fig. 4. MIB versus energy trade-off curve of RA pattern-based information
transfer under {Nt , Nr } = {16, 8} and SN Rb = 0dB with α = 0.4 (left)
and α = 0.6 (right). The MIB results were evaluated from (29).
Note that our RA pattern-based information transfer is immune
to power conversion, but naturally not to the RF receiver noise.
2) MIB versus Energy Trade-off: Fig 5 investigates the MIB
versus energy trade-off of our GPSM aided IWIPT system
supporting both RA pattern-based information transfer and
waveform-based information transfer for {Nt , Nr } = {16, 8}
and SN Rb = 0dB, where we set α = 0.4 in the left subplot
and α = 0.6 in the right subplot. The results of MIB were
evaluated from (29).
Observe from both subplots of Fig 5 that the near-constant
MIB curves of our GPSM schemes shown in Fig 4 can no
longer be maintained upon increasing the number of activated
RAs, although they exhibit a less eroded MIB than the
conventional CI pre-coding based MIMO scheme associated
with Na = 8 relying on pure waveform-based information
transfer. This is because when waveform-based information
transfer is also invoked, the resultant MIB of our GPSM
scheme becomes more sensitive to the power conversion ratio
than the purely RA pattern-based information transfer. This
is evidenced in Fig 5, where the higher the value of Na , the
more conventional modulated symbols are conveyed. When
comparing the left subplot to the right subplot, the MIB of our
GPSM scheme appears more sensitive to the value of α. In
other words, when the RF receiver’s noise is more dominant
(α = 0.6), the MIB of our GPSM schemes is reduced. On
the other hand, the conventional CI pre-coding based MIMO
scheme is less sensitive to the value of α.
C. Investigation on DCMC Capacity
1) DCMC Capacity versus Energy Trade-off: Fig 6 investigates the DCMC capacity versus energy trade-off of our
GPSM aided IWIPT system, where the rest of the settings
were kept the same as in Fig 5. We can see that although Fig
5 suggests that the MIB of our GPSM schemes is higher than
that of the conventional CI pre-coding based MIMO scheme
for all power-splitting ratios for all values of Na , when the
DCMC capacity is considered in Fig 6, the GPSM curves
0
0.2 0.4 0.6 0.8
Normalised Energy
a
0
1
0
0.2 0.4 0.6 0.8
Normalised Energy
1
Fig. 5. MIB versus energy trade-off curve of our GPSM aided IWIPT system
relying on both RA pattern-based information transfer and on waveform-based
information transfer under {Nt , Nr } = {16, 8} and SN Rb = 0dB using
α = 0.4 (left) and α = 0.6 (right). The MIB results were evaluated from
(29).
DCMC Capacity [bits/supersymbol]
0.2
0.5
0.4
14
14
12
12
DCMC Capacity [bits/supersymbol]
MIB
1
10
8
6
4
Na = 1
Na = 2
2
10
8
6
4
N =5
a
2
Na = 3
Na = 6
Na = 4
0
0
0.2 0.4 0.6 0.8
Normalised Energy
Na = 8
1
0
0
0.2 0.4 0.6 0.8
Normalised Energy
1
Fig. 6.
DCMC capacity versus energy trade-off curve of our GPSM
aided IWIPT system relying on both RA pattern-based information transfer
and waveform-based information transfer under {Nt , Nr } = {16, 8} and
SN Rb = 0dB for α = 0.4 (left) and α = 0.6 (right). The DCMC capacity
results were evaluated from (30) and these DCMC capacity results may be
compared to the maximum achievable throughput values listed in Table I.
associated with Na = 1 and Na = 2 exhibit intersections
with the curve of the conventional CI pre-coding based MIMO
scheme. By contrast, the GPSM schemes using Na ≤ 3 offer
a DCMC capacity, which is higher than that exhibited by the
conventional CI pre-coding based MIMO scheme. Finally, all
of our GPSM schemes exhibit a higher degree of immunity to
power conversion than the conventional CI pre-coding based
MIMO scheme.
2) DCMC Capacity versus SN Rb : It is thus interesting to
observe in detail the behaviour of our GPSM scheme associated with Na = 1 and Na = 2. Fig 7 compares the DCMC
capacity versus SNR per bit curve of the conventional CI precoding based MIMO scheme relying on Na = 8 to our GPSM
14
14
a
DCMC Capacity [bits/supersymbol]
DCMC Capacity [bits/supersymbol]
N =2
a
12
Na = 8
10
8
6
4
2
Na = 8
DCMC Capacity [bits/supersymbol]
N =2
12
14
14
12
12
Na = 1
10
8
6
4
2
DCMC Capacity [bits/supersymbol]
Na = 1
10
8
6
4
2
10
8
6
4
Na = 2
Na = 4
2
N =6
a
no impairments
with impairments
0
−10
−8
−6
−4
SNR [dB]
−2
b
0
0
−10
−8
−6
−4
SNR [dB]
−2
0
b
0
0
0.2 0.4 0.6 0.8
Normalised Energy
N =8
a
1
0
0
0.2 0.4 0.6 0.8
Normalised Energy
1
Fig. 7. DCMC capacity versus SNR per bit curve of our GPSM aided
IWIPT system relying on both RA pattern-based information transfer and
waveform-based information transfer under {Nt , Nr } = {16, 8} with α =
0.4 (left) and α = 0.6 (right). For each group of curves (circle, square
and no legend), the curves spanning from top to bottom correspond to ρ =
0.2, 0.4, 0.6, 0.8 in both plots. The DCMC capacity results were evaluated
from (30) and these DCMC capacity results may be compared to the maximum
achievable throughput values listed in Table I.
Fig. 8.
DCMC capacity versus energy trade-off curve for our GPSM
aided IWIPT system relying on both RA pattern-based information transfer
and waveform-based information transfer under {Nt , Nr } = {16, 8} and
SN Rb = 0dB with α = 0.4 suffering from imperfect CSIT having
a variance of σe = 0.2 (left) and antenna correlation associated with
ρt = ρr = 0.4 (right). The DCMC capacity results were evaluated from
(30) and these DCMC capacity results may be compared to the maximum
achievable throughput values listed in Table I.
schemes associated with Na = 1 and Na = 2 supporting both
RA pattern-based information transfer and waveform-based
information transfer under {Nt , Nr } = {16, 8} using α = 0.4
(left) and α = 0.6 (right). Observe for each group of curves
(circle Na = 1, square Na = 2 and no legend Na = 8) in both
subplots of Fig 7 that the curves spanning from top to bottom
correspond to power-splitting ratios of ρ = 0.2, 0.4, 0.6, 0.8.
In can also be seen in Fig 7 that our GPSM schemes using
Na = 1 and Na = 2 offer a higher DCMC capacity than that
facilitated by the conventional CI pre-coding based MIMO
scheme of Na = 8 in the low SN Rb range. Furthermore,
observe in both subplots of Fig 7 that the DCMC capacity
curves of our GPSM schemes using Na = 1 and Na = 2 are
only slightly affected upon increasing the power-splitting ratio
ρ, while we observe a dramatic difference in the DCMC capacity curves of the conventional CI pre-coding based MIMO
scheme of Na = 8. Thus, our GPSM schemes using Na = 1
and Na = 2 is significantly more immune to the performance
erosion of power conversion for a wide range of SN Rb values.
our GPSM scheme is more immune to any power conversion
induced performance erosion, which is an explicit benefit of
our RA pattern-based information transfer, as evidenced in Fig
8.
2) Asymptotic Investigation: Fig 9 characterizes the impact
of power conversion both on the MIB (left) and on the DCMC
capacity (right) for our GPSM scheme associated with Na = 1
and Na = 2 as well as for the conventional CI pre-coding
based MIMO scheme using Na = Nr under asymptotic
settings of Nt = 2048 and Nr ∈ [64, 2046]. Furthermore,
SN Rb = 0dB and α = 0.4 were set in Fig 9. For each group
of curves (Na = 1, Na = 2 and Na = Nr ) seen in both
subplots of Fig 9, the curves spanning from top to bottom
correspond to ρ = 0.2, 0.4, 0.6, 0.8.
It can be seen from the left subplot of Fig 9 that for all
values of Nr /Nt , the MIB of both of our GPSM schemes
is higher than that of the conventional CI pre-coding based
MIMO scheme. Furthermore, the common MIB trend for all
schemes is monotonically decreasing upon increasing Nr /Nt .
However, we observe in the right subplot of Fig 9 that upon
increasing Nr /Nt , the DCMC capacity of the conventional CI
pre-coding based MIMO scheme is monotonically decreasing,
while the best value of Nr /Nt may be deemed to be the one
that attains the highest DCMC capacity in our GPSM schemes.
Specifically, the DCMC capacity of the conventional CI precoding based MIMO scheme of Na = Nr is seen to be higher
than that of our GPSM schemes for small values of Nr /Nt .
Furthermore, our GPSM arrangement using Nr = 2 provides
a higher DCMC capacity than the GPSM scheme relying on
Nr = 1, when Nr /Nt is lower than about 0.5, but this trend
is reversed otherwise.
Finally, a substantial DCMC capacity penalty is observed
for the conventional CI pre-coding based MIMO regime of
Na = Nr upon increasing the power-splitting ratio according
D. Further Investigations
1) Robustness Investigation: Fig 8 investigates the DCMC
capacity versus energy trade-off curves of our GPSM aided
IWIPT system under {Nt , Nr } = {16, 8} and SN Rb = 0dB
using α = 0.4 and suffering from imperfect CSIT associated
with a variance of σe = 0.2 (left) or when experiencing an
antenna correlation associated with ρt = ρr = 0.4 (right).
For reasons of space-economy and to avoid crowded figures,
only the results of Na = {2, 4, 6, 8} are shown here. Observe
from both subplots of Fig 8 that as expected, a DCMC capacity
degradation is imposed both on our GPSM schemes and on the
conventional CI pre-coding based MIMO scheme of Na = 8.
Nonetheless, our previous conclusions still hold, namely that
1
45
0.9
40
0.8
DCMC Capacity [bits/supersymbol]
Na = 1
Na = 2
0.7
MIB
0.6
0.5
0.4
0.3
Na = Nr
0.2
Na = Nr
30
N =2
25
a
B
20
15
N =1
A
a
10
5
0.1
0
35
0
0.2
0.4 0.6
N /N
r
0.8
1
0
0
t
0.2
0.4 0.6
N /N
r
0.8
1
t
Fig. 9. The impact of power conversion on the MIB (left) and DCMC
capacity (right) of both our GPSM scheme using Na = 1 and Na = 2 as well
as the conventional CI pre-coding based MIMO scheme of Na = Nr under
the asymptotic settings of Nt = 2048 and Nr ∈ [64, 2046]. Furthermore,
we set SN Rb = 0dB and α = 0.4. For each group of curves (Na = 1,
Na = 2 and Na = Nr ), the curves spanning from top to bottom correspond
to ρ = 0.2, 0.4, 0.6, 0.8 in both subplots. The MIB and DCMC capacity
results were evaluated from (29) and (30).
to ρ = 0.2, 0.4, 0.6, 0.8, while this trend is less obvious in
both of our GPSM schemes. For example, both A and B
in the right subplot of Fig 9 show that an obvious DCMC
capacity penalty may only be imposed for ρ = 0.8. This again
implies that our GPSM aided IWIPT system is less sensitive
to the power conversion-induced performance erosion in the
asymptotic regime.
V. C ONCLUSIONS
A novel GPSM aided IWIPT system was proposed,
where both RA pattern-based information transfer as well
as waveform-based information transfer using conventional
PSK/QAM modulation were employed. The analytical SER
of the SD symbols and the BER of the overall GPSM scheme
were derived. Furthermore, the MIB vs energy trade-off and
the DCMC capacity vs energy trade-offs were discussed. Both
the analytical and simulation results demonstrate that the RA
pattern-based information transfer represented in the SD exhibits a beneficial immunity to power conversion and improves
the overall RE trade-off, when the additional waveform-based
QPSK information transfer is also taken into account. This
conclusion holds true also both in the presence of inaccurate
CSIT and of antenna correlations, even for large-scale MIMO
settings. Hence, our proposed GPSM aided IWIPT system may
be viewed as an instantiation of joint information and energy
transfer in the spirit of Varshney’s seminal concept .
VI. L IST
OF
P UBLICATIONS
R EFERENCES
[1] K. Maruyama, F. Nori, and V. Vedral, “The physics of Maxwell’s
demon and information,” Reviews of Modern Physics, vol. 81, pp. 1–23,
Jan 2009.
[2] R. Landauer, “Irreversibility and heat generation in the computing
process,” IBM Journal of Research and Development, vol. 5, no. 3,
pp. 183–191, 1961.
[3] ——, “Dissipation and noise immunity in computation and communication,” Nature, vol. 335, pp. 779–784, 1988.
[4] M. Saeedi and I. L. Markov, “Synthesis and optimization of reversible
circuits - a survey,” ACM Computing Surveys, vol. 45, no. 2, pp. 1–34,
Mar. 2013.
[5] S. Toyabe, T. Sagawa, M. Ueda, E. Muneyuki, and M. Sano, “Experimental demonstration of information-to-energy conversion and validation of the generalized Jarzynski equality,” Nature Physics, vol. 6, pp.
988–992, 2010.
[6] O. L. de Weck, D. Roos, and C. L. Magee, Engineering Systems:
Meeting Human Needs in a Complex Technological World. MIT Press,
2011.
[7] T. Nakano, M. Moore, F. Wei, A. Vasilakos, and J. Shuai, “Molecular
communication and networking: opportunities and challenges,” IEEE
Transactions on NanoBioscience, vol. 11, no. 2, pp. 135–148, 2012.
[8] I. F. Akyildiz, J. M. Jornet, and M. Pierobon, “Nanonetworks: a new
frontier in communications,” Communications of the ACM, vol. 54,
no. 11, pp. 84–89, Nov. 2011.
[9] X. Zhou, X. Zheng, R. Zhang, and L. Hanzo, “Chip-interleaved optical
code division multiple access relying on a photon-counting iterative
successive interference canceller for free-space optical channels,” Optics Express, vol. 21, no. 13, pp. 15 926–15 937, Jul 2013.
[10] L. Li, X. Zhou, R. Zhang, and L. Hanzo, “Performance and capacity
analysis of poisson photon-counting based Iter-PIC OCDMA systems,”
Optics Express, vol. 21, no. 22, pp. 25 954–25 967, Nov 2013.
[11] L. Varshney, “Transporting information and energy simultaneously,” in
2008 IEEE International Symposium on Information Theory, 2008, pp.
1612–1616.
[12] ——, “On energy/information cross-layer architectures,” in 2012 IEEE
International Symposium on Information Theory, 2012, pp. 1356–1360.
[13] P. Grover and A. Sahai, “Shannon meets Tesla: wireless information
and power transfer,” in 2010 IEEE International Symposium on Information Theory, 2010, pp. 2363–2367.
[14] N. Tesla, “The future of the wireless art,” Wireless Telegraphy &
Telephony, pp. 67–71, 1908.
[15] J. Garnica, R. Chinga, and J. Lin, “Wireless power transmission: From
far-field to near-field,” Proceedings of the IEEE, vol. 101, no. 6, pp.
1321–1331, 2013.
[16] N. Tesla, “Apparatus for transmitting electrical energy,” U.S. Patent
Patent 1 119 732, Dec, 1914.
[17] W. C. Brown, “The history of power transmission by radio waves,”
IEEE Transactions on Microwave Theory and Techniques, vol. 32,
no. 9, pp. 1230–1242, 1984.
[18] J. McSpadden and J. Mankins, “Space solar power programs and
microwave wireless power transmission technology,” IEEE Microwave
Magazine, vol. 3, no. 4, pp. 46–57, 2002.
[19] J. Lin, “Wireless power transfer for mobile applications and health
effects,” IEEE Antennas and Propagation Magazine, vol. 55, no. 2,
pp. 250–253, 2013.
[20] A. Yakovlev, S. Kim, and A. Poon, “Implantable biomedical devices:
wireless powering and communication,” IEEE Communications Magazine, vol. 50, no. 4, pp. 152–159, 2012.
[21] L. Xie, Y. Shi, Y. Hou, and A. Lou, “Wireless power transfer and
applications to sensor networks,” IEEE Wireless Communications,
vol. 20, no. 4, pp. 140–145, 2013.
[22] V. Chawla and D.-S. Ha, “An overview of passive RFID,” IEEE
Communications Magazine, vol. 45, no. 9, pp. 11–17, 2007.
[23] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Transactions on Wireless
Communications, vol. 12, no. 5, pp. 1989–2001, 2013.
[24] L. Liu, R. Zhang, and K.-C. Chua, “Wireless information transfer
with opportunistic energy harvesting,” IEEE Transactions on Wireless
Communications, vol. 12, no. 1, pp. 288–300, 2013.
[25] ——, “Wireless information and power transfer: a dynamic power
splitting approach,” IEEE Transactions on Communications, vol. 61,
no. 9, pp. 3990–4001, 2013.
[26] X. Zhou, R. Zhang, and C. K. Ho, “Wireless information and power
transfer: architecture design and rate-energy tradeoff,” accepted by
IEEE Transactions on Communications.
[27] K. Huang and E. G. Larsson, “Simultaneous information-and-power
transfer for broadband downlink systems,” accepted by IEEE Transactions on Signal Processing.
[28] H. Ju and R. Zhang, “Throughput maximization for wireless powered
communication networks,” accepted by IEEE Transactions on Wireless
Communications.
[29] P. Popovski, A. Fouladgar, and O. Simeone, “Interactive joint transfer
of energy and information,” IEEE Transactions on Communications,
vol. 61, no. 5, pp. 2086–2097, 2013.
[30] D. W. K. Ng, E. S. Lo, and R. Schober, “Wireless information and
power transfer: energy efficiency optimization in OFDMA systems,”
accepted by IEEE Transactions on Wireless Communications.
[31] I. Krikidis, S. Timotheou, and S. Sasaki, “RF energy transfer for
cooperative networks: data relaying or energy harvesting?” IEEE
Communications Letters, vol. 16, no. 11, pp. 1772–1775, 2012.
[32] J. Park and B. Clerckx, “Joint wireless information and energy transfer
in a two-user MIMO interference channel,” IEEE Transactions on
Wireless Communications, vol. 12, no. 8, pp. 4210–4221, 2013.
[33] Z. Xiang and M. Tao, “Robust beamforming for wireless information
and power transmission,” IEEE Wireless Communications Letters,
vol. 1, no. 4, pp. 372–375, 2012.
[34] X. Chen, C. Yuen, and Z. Zhang, “Wireless energy and information
transfer tradeoff for limited feedback multi-antenna systems with
energy beamforming,” accepted by IEEE Transactions on Vehicular
Technology.
[35] A. Fouladgar and O. Simeone, “On the transfer of information and
energy in multi-user systems,” IEEE Communications Letters, vol. 16,
no. 11, pp. 1733–1736, 2012.
[36] ——, “Information and energy flows in graphical networks with energy
transfer and reuse,” IEEE Wireless Communications Letters, vol. 2,
no. 4, pp. 371–374, 2013.
[37] R. Zhang, L.-L. Yang, and L. Hanzo, “Generalised pre-coding aided
spatial modulation,” IEEE Transactions on Wireless Communications,
vol. 12, no. 11, pp. 5434–5443, 2013.
[38] R. Mesleh, H. Haas, S. Sinanovic, C. W. Ahn, and S. Yun, “Spatial
modulation,” IEEE Transactions on Vehicular Technology, vol. 57,
no. 4, pp. 2228–2241, 2008.
[39] M. D. Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo,
“Spatial modulation for generalized MIMO: Challenges, opportunities
and implementation,” Proceedings of IEEE. [Online]. Available:
http://eprints.soton.ac.uk/354175/
[40] C. Peel, B. Hochwald, and A. Swindlehurst, “A vector-perturbation
technique for near-capacity multiantenna multiuser communicationPart I: channel inversion and regularization,” IEEE Transactions on
Communications, vol. 53, no. 1, pp. 195–202, 2005.
[41] Q. Spencer, A. Swindlehurst, and M. Haardt, “Zero-forcing methods
for downlink spatial multiplexing in multiuser MIMO channels,” IEEE
Transactions on Signal Processing, vol. 52, no. 2, pp. 461–471, 2004.
[42] H. Urkowitz, “Energy detection of unknown deterministic signals,”
Proceedings of the IEEE, vol. 55, no. 4, pp. 523–531, 1967.
[43] R. Zhang, L.-L. Yang, and L. Hanzo, “Error probability and
capacity analysis of generalised pre-coding aided spatial modulation,”
submitted to IEEE Transactions on Wireless Communications. [Online].
Available: http://eprints.soton.ac.uk/id/eprint/360422
[44] J. Proakis and M. Salehi, Digital Communications, 5th ed. McGrawHill Higher Education, 2008.
[45] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed.
Wiley-Interscience, 2006.
[46] D. Gesbert, “Robust linear MIMO receivers: a minimum error-rate
approach,” IEEE Transactions on Signal Processing, vol. 51, no. 11,
pp. 2863–2871, 2003.
[47] X. Zhang, D. Palomar, and B. Ottersten, “Statistically robust design of
linear MIMO transceivers,” IEEE Transactions on Signal Processing,
vol. 56, no. 8, pp. 3678–3689, 2008.
[48] J. Kermoal, L. Schumacher, K. Pedersen, P. Mogensen, and F. Frederiksen, “A stochastic MIMO radio channel model with experimental
validation,” IEEE Journal on Selected Areas in Communications,
vol. 20, no. 6, pp. 1211–1226, 2002.
[49] S. Wagner, R. Couillet, M. Debbah, and D. Slock, “Large system
analysis of linear precoding in correlated MISO broadcast channels
under limited feedback,” IEEE Transactions on Information Theory,
vol. 58, no. 7, pp. 4509–4537, 2012.
[50] R. Couillet and M. Debbah, Random Matrix Methods for Wireless
Communications. New York, NY, USA: Cambridge University Press,
2011.
[51] R. Zhang, Y. Cui, H. Claussen, H. Haas, and L. Hanzo, “Anticipatory
association for indoor visible light communications: Light, follow me
!” IEEE Transactions on Wireless Communications, submitted.
[52] R. Zhang, M. Biagi, L. Lampe, T. D. Little, S. Mangold, and Z. Xu,
“Localisation, communication and networking with VLC: Challenges
and opportunities,” IEEE Journal on Selected Areas in Communications, submitted.
[53] R. Zhang, A. F. A. Rawi, L. D. Humphrey, and L. Hanzo, “Expanded
constellation mapping for enhanced far-end-cross-talk cancellation in
G.fast,” IEEE Communications Letters, vol. 21, no. 1, pp. 56–59, Jan
2017.
[54] R. Zhang, L. L. Yang, and L. Hanzo, “Performance analysis of
non-linear generalized pre-coding aided spatial modulation,” IEEE
Transactions on Wireless Communications, vol. 15, no. 10, pp. 6731–
6741, Oct 2016.
[55] R. Zhang, H. Claussen, H. Haas, and L. Hanzo, “Energy efficient visible
light communications relying on amorphous cells,” IEEE Journal on
Selected Areas in Communications, vol. 34, no. 4, pp. 894–906, April
2016.
[56] R. Zhang, J. Wang, Z. Wang, Z. Xu, C. Zhao, and L. Hanzo, “Visible
light communications in heterogeneous networks: Paving the way for
user-centric design,” IEEE Wireless Communications, vol. 22, no. 2,
pp. 8–16, April 2015.
[57] R. Zhang, L. L. Yang, and L. Hanzo, “Energy pattern aided simultaneous wireless information and power transfer,” IEEE Journal on Selected
Areas in Communications, vol. 33, no. 8, pp. 1492–1504, Aug 2015.
[58] R. Zhang, R. G. Maunder, and L. Hanzo, “Wireless information and
power transfer: from scientific hypothesis to engineering practice,”
IEEE Communications Magazine, vol. 53, no. 8, pp. 99–105, August
2015.
[59] R. Zhang, L. L. Yang, and L. Hanzo, “Error probability and capacity
analysis of generalised pre-coding aided spatial modulation,” IEEE
Transactions on Wireless Communications, vol. 14, no. 1, pp. 364–
375, Jan 2015.
[60] R. Zhang and L. Hanzo, “Multi-layer modulation for intensitymodulated direct-detection optical OFDM,” IEEE/OSA Journal of
Optical Communications and Networking, vol. 5, no. 12, pp. 1402–
1412, Dec 2013.
[61] ——, “Advances in base- and mobile-station aided cooperative wireless
communications: An overview,” IEEE Vehicular Technology Magazine,
vol. 8, no. 1, pp. 57–69, March 2013.
[62] ——, “Cooperative downlink multicell preprocessing relying on
reduced-rate back-haul data exchange,” IEEE Transactions on Vehicular Technology, vol. 60, no. 2, pp. 539–545, 2011.
[63] ——, “Multiple-source cooperation: From code-division multiplexing
to variable-rate network coding,” IEEE Transactions on Vehicular
Technology, vol. 60, no. 3, pp. 1005–1015, March 2011.
[64] ——, “A unified treatment of superposition coding aided communications: Theory and practice,” IEEE Communications Surveys Tutorials,
vol. 13, no. 3, pp. 503–520, Third 2011.
[65] ——, “Superposition-aided delay-constrained hybrid automatic repeat
request,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4,
pp. 2109–2115, May 2010.
[66] ——, “Wireless cellular networks,” IEEE Vehicular Technology Magazine, vol. 5, no. 4, pp. 31–39, 2010.
[67] R. Zhang, L. Xu, S. Chen, and L. Hanzo, “EXIT-chart-aided hybrid
multiuser detector for multicarrier interleave-division multiple access,”
IEEE Transactions on Vehicular Technology, vol. 59, no. 3, pp. 1563–
1567, March 2010.
[68] R. Zhang and L. Hanzo, “Interleaved random space time coding for
multisource cooperation,” IEEE Transactions on Vehicular Technology,
vol. 58, no. 4, pp. 2120–2125, May 2009.
[69] ——, “Superposition-coding-aided multiplexed hybrid ARQ scheme
for improved end-to-end transmission efficiency,” IEEE Transactions
on Vehicular Technology, vol. 58, no. 8, pp. 4681–4686, Oct 2009.
[70] ——, “Coding schemes for energy efficient multi-source cooperation
aided uplink transmission,” IEEE Signal Processing Letters, vol. 16,
no. 5, pp. 438–441, May 2009.
[71] ——, “Iterative multiuser detection and channel decoding for DSCDMA using harmony search,” IEEE Signal Processing Letters,
vol. 16, no. 10, pp. 917–920, Oct 2009.
[72] ——, “Three design aspects of multicarrier interleave division multiple
access,” IEEE Transactions on Vehicular Technology, vol. 57, no. 6,
pp. 3607–3617, Nov 2008.
[73] ——, “Space-time coding for high-throughput interleave division multiplexing aided multi-source co-operation,” Electronics Letters, vol. 44,
no. 5, pp. 367–368, Feb 2008.
[74] J. Zhang, R. Zhang, R. G. Maunder, S. Chen, and L. Hanzo, “Adaptive
coding and modulation for large-scale antenna array based aeronautical
[75]
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93]
[94]
[95]
[96]
communications in the presence of co-channel interference,” IEEE
Transactions on Wireless Communications, submitted.
Q. Wang, R. Zhang, L. L. Yang, and L. Hanzo, “Non-orthogonal multiple access: A unified perspective,” IEEE Wireless Communications,
submitted.
S. Gupta, R. Zhang, and L. Hanzo, “Energy harvesting aided device-todevice communication in the heterogeneous two-tier downlink,” IEEE
Transactions on Communications, submitted.
Y. Wang, Y. Xu, Y. Yang, X. Gao, B. Zhu, W. Cai, J. Yuan, R. Zhang,
and H. Zhu, “Simultaneous light emission and detection of InGaN/GaN
multiple quantum well diodes for in-plane visible light communication,” Optics Communications, (early access), 2016.
X. Li, Y. Huo, R. Zhang, and L. Hanzo, “User-centric visible light
communications for energy-efficient scalable video streaming,” IEEE
Transactions on Green Communications and Networking, vol. 1, no. 1,
pp. 59–73, March 2017.
S. Gupta, R. Zhang, and L. Hanzo, “Energy harvesting aided deviceto-device communication underlaying the cellular downlink,” IEEE
Access, (early access), 2016.
F. Jin, X. Li, R. Zhang, C. Dong, and L. Hanzo, “Resource allocation
under delay-guarantee constraints for visible-light communication,”
IEEE Access, vol. 4, pp. 7301–7312, 2016.
J. Wang, Y. Xu, X. Ling, R. Zhang, Z. Ding, and C. Zhao, “PAPR
analysis for OFDM visible light communication,” Optics Express,
vol. 24, no. 24, pp. 27 457–27 474, Nov 2016.
B. Li, R. Zhang, W. Xu, C. Zhao, and L. Hanzo, “Joint dimming control
and transceiver design for MIMO-aided visible light communication,”
IEEE Communications Letters, vol. 20, no. 11, pp. 2193–2196, Nov
2016.
S. Gupta, S. Kumar, R. Zhang, S. Kalyani, K. Giridhar, and L. Hanzo,
“Resource allocation for D2D links in the FFR and SFR aided cellular
downlink,” IEEE Transactions on Communications, vol. 64, no. 10, pp.
4434–4448, Oct 2016.
S. Gupta, R. Zhang, and L. Hanzo, “Throughput maximization for a
buffer-aided successive relaying network employing energy harvesting,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp.
6758–6765, Aug 2016.
J. Jiang, P. Zhang, R. Zhang, S. Chen, and L. Hanzo, “Aperture
selection for ACO-OFDM in free-space optical turbulence channel,”
IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6089–
6100, Aug 2016.
S. Feng, X. Li, R. Zhang, M. Jiang, and L. Hanzo, “Hybrid positioning aided amorphous-cell assisted user-centric visible light downlink
techniques,” IEEE Access, vol. 4, pp. 2705–2713, 2016.
C. Zhu, Y. Huo, J. Jiang, H. Sun, C. Dong, R. Zhang, and L. Hanzo,
“Hierarchical colour-shift-keying aided layered video streaming for the
visible light downlink,” IEEE Access, vol. 4, pp. 3127–3152, 2016.
C. Zhu, Y. Huo, B. Zhang, R. Zhang, M. El-Hajjar, and L. Hanzo,
“Adaptive-truncated-HARQ-aided layered video streaming relying on
interlayer fec coding,” IEEE Transactions on Vehicular Technology,
vol. 65, no. 3, pp. 1506–1521, March 2016.
X. Li, F. Jin, R. Zhang, J. Wang, Z. Xu, and L. Hanzo, “Users first:
User-centric cluster formation for interference-mitigation in visiblelight networks,” IEEE Transactions on Wireless Communications,
vol. 15, no. 1, pp. 39–53, Jan 2016.
X. Li, R. Zhang, and L. Hanzo, “Cooperative load balancing in
hybrid visible light communications and WiFi,” IEEE Transactions on
Communications, vol. 63, no. 4, pp. 1319–1329, April 2015.
F. Jin, R. Zhang, and L. Hanzo, “Resource allocation under delayguarantee constraints for heterogeneous visible-light and RF femtocell,”
IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp.
1020–1034, Feb 2015.
B. Li, J. Wang, R. Zhang, H. Shen, C. Zhao, and L. Hanzo, “Multiuser
MISO transceiver design for indoor downlink visible light communication under per-LED optical power constraints,” IEEE Photonics
Journal, vol. 7, no. 4, pp. 1–15, Aug 2015.
J. Jiang, R. Zhang, and L. Hanzo, “Analysis and design of threestage concatenated color-shift keying,” IEEE Transactions on Vehicular
Technology, vol. 64, no. 11, pp. 5126–5136, Nov 2015.
F. Wu, R. Zhang, L. L. Yang, and W. Wang, “Transmitter precodingaided spatial modulation for secrecy communications,” IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 467–471, Jan 2016.
J. Feng, R. Zhang, L. Hanzo, and S. X. Ng, “Cooperative medium
access control based on spectrum leasing,” IEEE Transactions on
Vehicular Technology, vol. 63, no. 1, pp. 297–307, Jan 2014.
J. Zhang, F. Jin, R. Zhang, G. Li, and L. Hanzo, “Analysis and design
of distributed antenna-aided twin-layer femto- and macrocell networks
[97]
[98]
[99]
[100]
[101]
[102]
[103]
[104]
[105]
[106]
[107]
[108]
[109]
[110]
[111]
[112]
[113]
[114]
[115]
[116]
[117]
relying on fractional frequency reuse,” IEEE Transactions on Vehicular
Technology, vol. 63, no. 2, pp. 763–774, Feb 2014.
F. Jin, R. Zhang, and L. Hanzo, “Fractional frequency reuse aided twinlayer femtocell networks: Analysis, design and optimization,” IEEE
Transactions on Communications, vol. 61, no. 5, pp. 2074–2085, May
2013.
J. Zhang, R. Zhang, G. Li, and L. Hanzo, “Distributed antenna
systems in fractional-frequency-reuse-aided cellular networks,” IEEE
Transactions on Vehicular Technology, vol. 62, no. 3, pp. 1340–1349,
March 2013.
L. Li, X. Zhou, R. Zhang, D. Zhang, and L. Hanzo, “Performance and
capacity analysis of poisson photon-counting based iter-PIC OCDMA
systems,” Optics Express, vol. 21, no. 22, pp. 25 954–25 967, Nov 2013.
X. Zhou, X. Zheng, R. Zhang, and L. Hanzo, “Chip-interleaved optical
code division multiple access relying on a photon-counting iterative
successive interference canceller for free-space optical channels,” Optics Express, vol. 21, no. 13, pp. 15 926–15 937, Jul 2013.
X. Zhou, D. Zhang, R. Zhang, and L. Hanzo, “A photon-counting
spatial-diversity-and-multiplexing MIMO scheme for poisson atmospheric channels relying on Q-ary PPM,” Optics Express, vol. 20,
no. 24, pp. 26 379–26 393, Nov 2012.
J. Zhang, R. Zhang, G. Li, and L. Hanzo, “Remote coalition network
elements for base station cooperation aided multicell processing,” IEEE
Transactions on Vehicular Technology, vol. 61, no. 3, pp. 1406–1415,
March 2012.
J. Feng, R. Zhang, and L. Hanzo, “A spectrum leasing cooperative
medium access protocol and its stability analysis,” IEEE Transactions
on Vehicular Technology, vol. 61, no. 8, pp. 3718–3730, Oct 2012.
X. Xu, R. Zhang, S. Ghafoor, and L. Hanzo, “Imperfect digitalfiber-optic-link-based cooperative distributed antennas with fractional
frequency reuse in multicell multiuser networks,” IEEE Transactions
on Vehicular Technology, vol. 60, no. 9, pp. 4439–4449, Nov 2011.
N. Bonello, R. Zhang, S. Chen, and L. Hanzo, “Channel code-division
multiple access and its multilevel-structured LDPC-based instantiation,” IEEE Transactions on Vehicular Technology, vol. 58, no. 5, pp.
2549–2553, Jun 2009.
——, “Reconfigurable rateless codes,” IEEE Transactions on Wireless
Communications, vol. 8, no. 11, pp. 5592–5600, November 2009.
X. Li, F. Jin, R. Zhang, and L. Hanzo, “Joint cluster formation and
user association under delay guarantees in visible-light networks,” in
2016 IEEE Global Telecommunications Conference, Dec (early access)
2016.
X. Li, R. Zhang, J. Wang, and L. Hanzo, “Cell-centric and user-centric
multi-user scheduling in visible light communication aided networks,”
in 2015 IEEE International Conference on Communications, June
2015, pp. 5120–5125.
J. Zhang, R. Zhang, G. Li, and L. Hanzo, “Coalition network elements
for base station cooperation,” in 2012 IEEE Vehicular Technology
Conference Fall, Sept 2012, pp. 1–5.
F. Jin, R. Zhang, and L. Hanzo, “Frequency-swapping aided femtocells
in twin-layer cellular networks relying on fractional frequency reuse,”
in 2012 IEEE Wireless Communications and Networking Conference,
April 2012, pp. 3097–3101.
J. Zhang, R. Zhang, X. Xu, G. Li, and L. Hanzo, “Effects of practical
impairments on cooperative distributed antennas combined with fractional frequency reuse,” in 2012 IEEE Wireless Communications and
Networking Conference, April 2012, pp. 1088–1092.
X. Xu, R. Zhang, and L. Hanzo, “Digital RoF aided cooperative
distributed antennas with FFR in multicell multiuser networks,” in 2011
IEEE Vehicular Technology Conference Fall, Sept 2011, pp. 1–5.
J. Feng, R. Zhang, and L. Hanzo, “Auction-style cooperative medium
access control,” in 2011 IEEE Vehicular Technology Conference Fall,
Sept 2011, pp. 1–5.
J. Feng, R. Zhang, S. X. Ng, and L. Hanzo, “Relay selection for energyefficient cooperative media access control,” in 2011 IEEE Wireless
Communications and Networking Conference, March 2011, pp. 287–
292.
R. Zhang and L. Hanzo, “Variable-rate network coding for multi-source
cooperation,” in 2011 IEEE Wireless Communications and Networking
Conference, March 2011, pp. 1517–1522.
R. Zhang, K. Giridhar, and L. Hanzo, “Distributed downlink multi-cell
processing requiring reduced-rate back-haul data exchange,” in 2011
IEEE Wireless Communications and Networking Conference, March
2011, pp. 1277–1281.
R. Zhang, X. Xu, and L. Hanzo, “Co-channel interference mitigation
capability of fixed relays connected by optical fibre,” in 2010 IEEE
Vehicular Technology Conference Fall, Sept 2010, pp. 1–5.
[118] X. Xu, R. Zhang, and L. Hanzo, “Imperfect radio over fibre aided
distributed antennas with fractional frequency reuse,” in 2010 IEEE
Vehicular Technology Conference Fall, Sept 2010, pp. 1–5.
[119] R. Zhang and L. Hanzo, “Joint and distributed linear precoding for
centralised and decentralised multicell processing,” in 2010 IEEE
Vehicular Technology Conference Fall, Sept 2010, pp. 1–5.
[120] ——, “Harmony search aided iterative channel estimation, multiuser
detection and channel decoding for DS-CDMA,” in 2010 IEEE Vehicular Technology Conference Fall, Sept 2010, pp. 1–5.
[121] ——, “Multiplexed hybrid ARQ for energy efficient transmissions
under delay constraints,” in 2010 IEEE International Conference on
Communications, May 2010, pp. 1–5.
[122] M. F. U. Butt, R. Zhang, S. X. Ng, and L. Hanzo, “Superposition coding
aided bi-directional relay transmission employing iteratively decoded
self-concatenated convolutional codes,” in 2010 IEEE Vehicular Technology Conference Spring, May 2010, pp. 1–5.
[123] R. Zhang and L. Hanzo, “Superposition-coding aided multiplexed
hybrid ARQ scheme for improved link-layer transmission efficiency,” in
2009 IEEE International Conference on Communications, June 2009,
pp. 1–5.
[124] N. Bonello, R. Zhang, S. Chen, and L. Hanzo, “Reconfigurable rateless
codes,” in 2009 IEEE Vehicular Technology Conference Spring, April
2009, pp. 1–5.
[125] R. Zhang and L. Hanzo, “Physical-layer algebraic network coding and
superposition coding for the multi-source cooperation aided uplink,” in
2009 IEEE Vehicular Technology Conference Spring, April 2009, pp.
1–5.
[126] ——, “High-throughput non-orthogonal interleaved random space-time
coding for multi-source cooperation,” in 2008 IEEE Global Telecommunications Conference, Nov 2008, pp. 1–5.
[127] N. Bonello, R. Zhang, S. Chen, and L. Hanzo, “Channel code division
multiple access and its multilevel structured LDPC based instantiation,”
in 2008 IEEE Vehicular Technology Conference Fall, Sept 2008, pp.
1–5.
[128] R. Zhang, L. Xu, S. Chen, and L. Hanzo, “Repeat accumulate code
division multiple access and its hybrid detection,” in 2008 IEEE
International Conference on Communications, May 2008, pp. 4790–
4794.
[129] L. Xu, R. Zhang, S. Chen, and L. Hanzo, “EXIT-chart aided hybrid
multiuser detector design for frequency-domain-spread chip-interleaved
MC-CDMA,” in 2008 IEEE Vehicular Technology Conference Spring,
May 2008, pp. 1816–1820.
[130] R. Zhang and L. Hanzo, “Interleave division multiplexing aided spacetime coding for high-throughput uplink cooperative communications,”
in 2008 IEEE Wireless Communications and Networking Conference,
March 2008, pp. 465–469.
[131] ——, “EXIT chart based joint code-rate and spreading-factor optimisation of single-carrier interleave division multiple access,” in 2007
IEEE Wireless Communications and Networking Conference, March
2007, pp. 735–739.
| 7cs.IT
|
Densely Entangled Financial Systems
arXiv:1402.5208v1 [q-fin.RM] 21 Feb 2014
Bhaskar DasGupta and Lakshmi Kaligounder
Abstract In [1] Zawadoski introduces a banking network model in which the asset
and counter-party risks are treated separately and the banks hedge their assets risks
by appropriate OTC contracts. In his model, each bank has only two counter-party
neighbors, a bank fails due to the counter-party risk only if at least one of its two
neighbors default, and such a counter-party risk is a low probability event. Informally, the author shows that the banks will hedge their asset risks by appropriate
OTC contracts, and, though it may be socially optimal to insure against counterparty risk, in equilibrium banks will not choose to insure this low probability event.
In this paper, we consider the above model for more general network topologies,
namely when each node has exactly 2r counter-party neighbors for some integer
r > 0. We extend the analysis of [1] to show that as the number of counter-party
neighbors increase the probability of counter-party risk also increases, and in particular the socially optimal solution becomes privately sustainable when each bank
hedges its risk to at least n/2 banks, where n is the number of banks in the network,
i.e., when 2r is at least n/2, banks not only hedge their asset risk but also hedge its
counter-party risk.
1 Introduction
Economic stability has received special attention during the past several years
mainly because of the economic downturn experienced globally in the recent past.
This attention has generated renewed interest in evaluating how important the ecoBhaskar DasGupta
Department of Computer Science, University of Illinois at Chicago, Chicago, IL 60607-7053, email: [email protected]
Lakshmi Kaligounder
Department of Computer Science, University of Illinois at Chicago, Chicago, IL 60607-7053, email: [email protected]
1
2
Bhaskar DasGupta and Lakshmi Kaligounder
nomic stability is as having an unstable economy can pave way to an economic crisis
each time when the global markets sees a downward trend. Financial instability and
its effects on the economy can be very costly due to its contagion or spillover effects to other parts of the economy and it is fundamental to have a sound, stable and
healthy financial system to support the efficient allocation of resources and distribution of risks across the economy. Financial risk management is a critical component
of maintaining economic stability. Hedging is a risk management option that protects the owner of an asset from loss. It is the process of shifting risks to the futures
market. The risks in the market must be first identified in order to manage the risk.
To identify the risk one must examine both the immediate risk (asset risk) as well as
the risk due to indirect effects (counter-party risk). Though hedging will minimize
overall profit when markets are moving positive, it also helps in reducing risk during
undesirable market conditions. However, as the owner hedges his/her asset risk to
protect against defaults, the owner also gets exposed to the counter-party risk.
In [1] Zawadoski introduces a banking network model in which the asset and
counter-party risks are treated separately, and showed that, under certain situations,
banks do not manage counter-party risk in equilibrium. In his model, each bank has
only two counter-party neighbors, a bank fails due to the counter-party risk only if
at least one of its two neighbors default, and such a counter-party risk is an event
with low probability. Informally, the author shows that the banks will hedge their
asset risks by appropriate OTC contracts, and, though it may be socially optimal
for banks to insure against counter-party risk, in equilibrium banks will not choose
to insure this low probability event. The OTC contract not only creates a contagion
but also creates externalities which undermines the incentives of the banks to avert
contagion. The model uses short term debt to finance their real asset. The failure in
this model is from the liability side, where the investors run on the banks when they
do not trust the bank, i.e., the investors do not roll over the debts of the banks. Hence
the contagion can be avoided only by increasing the equity and not by providing
liquidity.
In this paper, we consider the above model for more general network topologies,
namely when each node has exactly 2r counter-party neighbors for some integer
r > 0. We extend the analysis of [1] to show that as the number of counter-party
neighbors increase the probability of counter-party risk also increases1 , and in particular, the socially optimal solution becomes privately sustainable when each bank
hedges its risk to a sufficiently large number of other banks. The counter-party risk
can be hedged by holding more equity, buying default insurance on their counterparties or collateralizing OTC contracts. Since holding excess capital or collateralizing OTC contracts is a wasteful use of scarce capital [1], when the banks choose
to hedge their counter-party risk they buy the default insurance on their counterparties. More precisely, our conclusions for the general case of 2r neighbors are as
follows:
• All the banks will still decide to hedge their asset risks.
1 Thus, the owners will decide to hedge their counter-party risk thereby helping to contain an
economic crisis.
Densely Entangled Financial Systems
3
• If the number of counter-party neighbors is at least n/2, then all banks will decide to insure their counter-parties, and socially optimal solution in case of two
counter-parties for each bank now becomes privately optimal solution.
• In the limit when the number of banks n in the network tend to ∞, as the number
of counter-party neighbors approach n − 1, failure of very few of its counter-party
banks will not affect a bank.
2 Related Prior Research Works
As we have already mentioned, Zawadowski [1] introduced a banking model in
which asset risk and counter-party risk are treated separately, showed that banks
always prefer to hedge their asset risk using OTC contracts and also showed that
banks do not hedge their counter-party risk even though hedging counter-party risk
is possible and socially desirable. Allen and Gale [23] showed that interbank deposits help banks share liquidity risk but expose them to asset losses if their counterparty defaults. Their model cannot be used to understand the contractual choices in
case of OTC derivatives as they modeled the liquidity risk. Babus [18] proposed
a model in which links are formed between banks which serves as an insurance
mechanism to reduce the risk of contagion. Allen and Babus [12] pointed out that
graph-theoretic concepts provide a conceptual framework used to describe and analyze the banking network, and showed that more interbank links provide banks with
a form of coinsurance against uncertain liquidity flows. Gai and Kapadi [5] showed
that more interbank links increase the opportunity for spreading failures to other
banks during crisis. Several prior researchers such as [11, 12, 17, 21] commented
that graph-theoretic frameworks may provide a powerful tool for analyzing stability
of banking and other financial networks. Kleindorfer et al. [11] argued that network
analyses can play a crucial role in understanding many important phenomena in finance. Freixas et al. [24] explored the case of banks that face liquidity fluctuations
due to the uncertainty about consumers withdrawing funds. Iazzetta and Manna [13]
analysed the monthly data on deposit exchange to understand the spread of liquidity
crisis using network topology.
Babus [20] studied how the trade-off between the benefits and the costs of being linked changes depending on the network structure and observed that, when the
network is maximal, liquidity can be redistributed in the system to make the risk of
contagion minimal. Corbo and Demange [6] explored the relationship of the structure of interbank connections to the contagion risk of defaults given the exogenous
default of set of banks. Nier et al. [17] explored the dependency of systemic risks
on the structure of the banking system via network theoretic approach and the resilience of such a system to contagious defaults. Haldane [13] suggested that contagion should be measured based on the interconnectedness of each institution within
the financial system. Liedorp et al. [8] investigated if interconnectedness in the interbank market is a channel through which banks affect each others riskiness, and
argued that both large lending and borrowing shares in interbank markets increase
4
Bhaskar DasGupta and Lakshmi Kaligounder
the riskiness of banks active in the dutch banking market. Kiyotaki and Moore [26]
studied the chain reaction caused by the shock in one firm and the financial difficulties in other firms due to this chain reaction. Acharya and Bisin [14] compared
centralized markets to OTC markets and showed that counter-party risk externalities can lead to excessive default and production of aggregate risk. Caballero and
Simsek [16] concluded that OTC derivatives are not the sole reason for the inefficiency of financial networks. Pirrong [15] argued that central counter-parties (CCP)
can also increase the systemic risk under certain circumstances and hence the introduction of CCP will not guarantee to mitigate the systemic risk. Zawadowski [7]
showed that complicated interwoven financial intermediation can be a reason for
inefficient financial networks, and hence OTC are not the only reason for financial
instability. Stulz [9] showed that exchange trading has both benefits and costs compared to OTC trading, and argued that credit default swaps (CDS) did not cause
the crisis since they worked well during much of the first year of the crisis. Zhu
and Pykhtin [19] showed that modeling credit exposures is vital for risk management application, while modelling credit value adjustment (CVA) is necessary step
for pricing and hedging counter-party credit risk. Corbo and Demange [6] showed
that introduction of central clearing house for credit default swaps will mitigate the
counter-party risk. Gandhi et al. [4] paralleled and complemented the conclusion
of [6], i.e., the creation of central clearing house for CDS contracts may not reduce
the counter-party risk.
3 The basic model
The model has n > 3 banks and three time periods t = 0, 1, 2 termed as initial, interim
and final, respectively. Each bank has exactly 2r counter-party neighbors for some
integer r > 0 (see Fig. 1 for an illustration). The unit investment of each bank in
|X
i−2r |
|X
i−r |
εk at t = 2, where R =
εk −
the long term real asset yields a return of R +
(
k = | i−1 |
k = | i−(r+1)|
RH ,
if the project succeeds
, and each εk is realized at t = 2 taking values of u
RL < RH , if the project fails
or −u each with probability 1/2. For each unit investment made by the bank at t = 0,
the investor lends D ≥ 0 as short term debt and equity 1 − D ≥ 0 is the bank’s share.
The short term debt has to be rolled over at time period t = 1 for the banks to operate
successfully. Thus the debt holders have an option to withdraw funding and force
the bank to liquidate the real project.
Let e ∈ {0, 1} be the unobservable effort choice such that a bank needs to exert
an effort of e = 1 at both time period t = 0 and t = 1 for the project to be successful
(i.e., R = RH ). At t = 1 the project can be in one of the two states: a “bad” state
with probability p or a “good” state with probability 1 − p, irrespective of the effort
exerted by the bank. At a “bad” state the project of one of the randomly chosen bank
fails and delivers RL , even if e = 1 at both time periods t = 0 and t = 1. Unless the
Densely Entangled Financial Systems
5
˜b 4
˜b 3
˜b 2
˜b 5
˜b 1
˜b 6
˜b 0
˜b 15
˜b 7
˜b 8
˜b 14
˜b 9
˜b 13
˜b 10
˜b 11
˜b 12
Fig. 1 An illustration of a network of 16 banks ˜b0 , ˜b1 , . . ., ˜b15 with r = 3. Each ˜bi is connected to
the banks ˜b i−3 (mod 16) , ˜b i−2 (mod 16) , ˜b i−1 (mod 16) , ˜b i+1 (mod 16) , ˜b i+2 (mod 16) and ˜b i+3 (mod 16) .
bank demand collateral from its counter-parties, if the bank defaults at t = 1 then all
the hedging liabilities of the defaulted bank gets cancelled, the investors liquidate
the bank and take equal share of L (the value of the bank when it is liquidated). If
the bank survives till t = 2 and the counter-party risk gets realized then, the bank has
to settle the counter-party hedging contract before paying its debt.
We use the following notations for four specific values of the probability of bad
state p:
psoc : if p < psoc , then irrespective of the number of counter-party neighbors there
is no need for counter-party insurance even from social perspective.
pind : if p > pind then the banks will not buy counter-party insurance as the private
benefits of insuring exceeds the cost.
pterm : if p < pterm then the banks will continue to prefer short term debt.
paut : if p < paut then no bank will have an incentive to hold more equity and borrow less.
Parameter Restrictions and Assumptions
The following parameter restriction are adopted from [1] to make them consistent
for a network model with 2r counter-parties. B is the banks’ private benefit with the
6
Bhaskar DasGupta and Lakshmi Kaligounder
subscript representing the specific time period and X denotes the additional nonpledgable payoff. Inequality (1) ensures that the investors will choose to roll over
the debt at t = 1 when the project is expected to succeed (i.e., R = RH ), and the
investors will decide to liquidate the bank at t = 1 if the bank’s project is expected
to fail (i.e., R = RL ). Inequality (2) implies that it is socially optimal to exert effort.
Inequality (3) ensures that banks have to keep positive equity to overcome moral
hazard. Inequality (4) ensures that, counter-party risk of the bank is large enough
to lead to contagion but small enough that the bank does not want to engage in
risk-shifting.
p
R H + X − B1
(1)
RL < L < 1 −
n
2B1
1 − np
(2)
B1 ≥ R H − 1 + X
(3)
RH − RL >
B1 − X < u <
r
X
B1 22r −
2r!
K! 2r − K !
K=0
r
X
2r − 2K
2r
K!
2r − K !
K=0
1 − 1 − p R H + X − B1 − p L
β > 1/2 and β >
1 − p B1
2u ≤ B0 < 1 − p B1
(4)
(5)
(6)
4 Our Results
Our results imply that when the number of counter-party neighbors is at least n/2,
the socially optimal outcome become privately sustainable.
n
o
Theorem 1. If the probability of bad state is p ∈ [ 0, p⋆ , where p⋆ = min pind , paut , pterm
then the followings hold.
(a) Banks endogenously enter into OTC contracts as shown by Zawadowski in [1].
(b) Banks borrow D < 1 for short term at t = 0 at an interest rate Rı,0 > 1 and Rı,1 = 1
as shown by Zawadowski in [1].
(c) In a bad state, failure of a single bank leads to run on all banks in the system
only when 2r < n/2.
(d) If a bank loses at least r counter-parties, it needs a debt reduction of I = ru −
B1 + X > 0.
(e) The contagious equilibrium stated by Zawadowski in [1] exist only if 2r < n/2.
When 2r ≥ n/2 banks insure against counter-party risk using default insurance.
Densely Entangled Financial Systems
7
(f) If p ∈ psoc , pind then the socially optimal outcome is sustainable in equilibrium.
Theorem 1(a) is proved in Lemma 5, whereas Theorem 1(c),(e),(f) are showed
in Lemma 6. Theorem 1(d) follows from the derivations of parameter values as described in Section 4.1; these derivations follow from the work in [1] and are provided
in the appendix. Theorem 1(b) uses the same proof as that in [1] and is therefore
omitted.
4.1 Proofs of Theorem 1
The derivations of the parameters and their values described in items (I) – (VIII)
below follow from the work in [1] since they are not affected by changing the number of counter-party neighbors from 2 to 2r. For the sake of completeness, these
derivations are provided in the appendix.
(I) The maximum amount of borrowing at t = 0 that can be roll over at t = 1 is
given by:
R H − B1 + X
<1
Dmax Rı,0 =
Rı,0
and the expected payoff of the above bank borrowing Dmax is B1 .
(II) In a stable system where all banks buy counter-party insurance, the price per
unit of default insurance is
ssafe =
1−β
p
−β
n
n
(where the superscript “safe” denotes the insured system).
(III) In a stable system where all banks buy counter-party insurance, the amount
borrowed by the bank for unit investment in the project is
p
p
Dsafe = 1 −
R H − B1 + X + L
n
n
(IV) In a contagious system where banks decide not to buy insurance, the amount
borrowed by the bank for unit investment in the project is
D ⋆ = 1 − p R H − B1 + X + p L
(V) In a contagious system where banks decide not to buy insurance, the interest
rate for the amount borrowed is
⋆
Rı,0
=
1
L
1− p 1−
R H − B1 + X
!
8
Bhaskar DasGupta and Lakshmi Kaligounder
n
term
(VI) p
= 1−β
n − 1
B0
.
RL + βB1 − L
R H + X − L − B1 1 − β +
n−1
1 − β R H + X − B1 − R L
f.aut
.
(VII) p
=
β
R H + X − L − B1 1 − β − R H − R L
n
n
o
(VIII) paut = min ps.aut , pr.aut , pf.aut , where the superscripts s.aut, r.aut and f.aut stand for
safe autarky, risky autarky and full autarky, respectively.
I 1−β
Lemma 1. pind =
β B1
(Informally,
Lemma 1 states that the probability of bad state must be at least pind =
I 1−β
β B1 for a bank’s benefit to outweigh the cost of its counter-party insurance).
Proof. The private incentive of a single bank to stay insured instead of deviating
from counter-party insurance is when the following holds (in the left-hand side of
the inequality, the first term is the payoff if no bank defaults, the second term is
the payoff if any of the counter-parties of the bank default, the third term is money
invested to buy the insurance on the bank’s counter-parties and the fourth term is the
bank’s equity):
≡
≡
≡
≡
benefits from all banks being insured ≥ benefits from all but one bank not being insured
!
1 + 2r p
2rp
B1 + β
B1 + I − ssafe 2rI − 1 − Dsafe
β 1−
n
!n
(1 + 2r).p
≥ β 1−
B1 − 1 − Dsafe
n
!
safe
1−β
2rp
2rp
p
β
B1 + I − s
2rI ≥ 0 ≡ β
B1 + I −
2rI ≥ 0
+β
n
n
n
n
2βrpB1 2βrpI 2rI 2rβI 2βrpI
+
−
+
−
≥ 0 ≡ βrpB1 − rI + rβI ≥ 0
n
n
n
n
n
I 1−β
I 1−β
βrpB1 ≥ rI − rβI ≡ βpB1 ≥ I − βI ≡ p ≥
=⇒ pind =
βB1
βB1
⊔
⊓
Lemma 2. psoc =
2Ir 1 − β
.
n − 1 R H + X − L − B1 1 − β
(Informally, Lemma 2 states that the probability of bad state must be at most psoc =
2Ir (1−β)
(n−1) (RH +X−L−B1 (1−β)) for the social benefits to outweigh the social cost of its counterparty insurance).
Proof. The social benefits outweigh the social cost of the counter-party insurance
of the system if and only if the following holds:
Densely Entangled Financial Systems
9
benefits from all banks being insured ≥ benefits from no bank being insured
!
1 + 2r p
2rp
≡ β 1−
B1 + β
B1 + I − ssafe 2rI − 1 − Dsafe ≥ β 1 − p B1 − 1 − D ⋆
n
n
!
pL
p
1−β βp
βB1 p 2βB1 p r 2βB1 p r 2βI p r
2rI − 1 + 1 −
R H + X − B1 +
−
+
+
−
+
≡ βB1 −
n
n
n
n
n
n
n
n
≥ β B1 1 − p − 1 + 1 − p (RH + X − B1 ) + p L
≡ βB1 −
βB1 p 2βI p r 2rI 2βrI 2βI p r
pX pB1 p L
+
−
+
−
− 1 + RH + X − B1 − pRn H −
+
+
n
n
n
n
n
n
n
n
≥ βB1 − pβB1 − 1 + RH + X − B1 − pRH − pX + pB1 + p L
βB1 p 2rI 2β r I p RH p X p B1 p L
−
+
−
−
+
+
≥ −p βB1 − p RH − p X + p B1 + p L
n
n
n
n
n
n
n
2RI 2βRI
βB1 p p RH p X p B1 p L
−
−
+
+
+ p βB1 + p RH + p X − p B1 − p L ≥
−
−
n
n
n
n
n
n
n
p − βB1 − RH − X + B1 + L − nβB1 + nRH + nX − nB1 − nL ≥ 2Ir 1 − β
p βB1 (n − 1) + RH (n − 1) + X(n − 1) − B1(n − 1) − L(n − 1) ≥ 2Ir 1 − β
2Ir 1 − β
2Ir 1 − β
p ≥
≡ p ≥
n − 1 βB1 + RH + X − B1 − L
n − 1 RH + X − L − B1(1 − β)
≡−
≡
≡
≡
≡
and thus p
soc
2Ir 1 − β
=
.
n − 1 RH + X − L − B1(1 − β)
⊔
⊓
Corollary 1. If each bank has only two counter-parties then r = 1 and thus psoc =
2I(1 − β)
.
n − 1 RH + X − L − B1(1 − β)
Lemma 3 (Probability of failure in risky autarky).
r
1
2r! X
2r
2 K=0 K! (2r − K)!
n
pr.aut = (1 − β)
X
r
n−1
(nβ − 1)X
1
2r! X
RH + X − L − B1(1 − β) −
1 − 2r
n−1
2 K=0 K! (2r − K)!
1−
(An informal explanation of Lemma 3 is as follows. If a bank has enough equity to survive even if all of its counter-parties collapse then the bank may be
forced to borrow less and this is not profitable. But, if the bank decides to deviate to risky autarky then it cannot pay back its debt if the real project delivers
RH − 2ru. The probability of failure
if the bank chooses risky autarky is given by
P
n
X
pr.aut = (1 − β) n−1
r
1
K=0 K! (2r−K)!
Pr
(nβ−1)X
1
RH +X−L−B1 (1−β)− n−1 1− 22r!
2r
K=0 K! (2r−K)!
1− 2r!
2r
2
).
Proof. For a bank to be in risky autarky, they borrow less such that it can roll over
the debt at t = 1 if its neighbors collapse but need not survive at t = 2. The relevant
incentive constraint is:
10
Bhaskar DasGupta and Lakshmi Kaligounder
RH +
r
X
1
2r! X
r.aut
− Rr.aut
≥ B1
ı,0 D
22 r K=0 K! (2r − K)!
r.aut
≡ Rr.aut
≤ R H − B1 +
ı,0 D
r
1
2r! X X
22 r K=0 K! (2r − K)!
The break-even condition for investors at t = 0 is:
p
p
Dr.aut = L + 1 − Rr.aut
Dr.aut
n
n ı,0
r
p
p
p 2r! X X
p
1
≡ Dr.aut = L + RH − B1 − RH + B1 + 1 −
n
n
n
n 22r K=0 K! (2r − K)!
A bank decides not to deviate to risky autarky in a contagious system if and only if
the following holds:
payoff in contagious system ≥ payoff in risky autarky
n−1
r.aut r.aut
≡ β (1 − p)B1 − 1 − D ⋆ ≥ β (1 − p) RH + X − Rı,0
D
+β
p B1 − 1 − Dr.aut
n
≡ βB1 − p βB1 − 1 + RH + X − B1 − p RH − p X + p B1
!
2r! X Pr
n−1
p
1
≥ β − p β RH + X − RH + B1 − 2r
+β
p B1 − 1 + L
K=0
K!
(2r
−
K)!
n
n
2
1
p
p
p 2r! X Pr
+ R H − B1 − R H + B1 + 1 −
K=0
2r
n
n
K! (2r − K)!
!n 2
2r! Pr
1
n
(1 − β)X 1 − 2r K=0
≡
n−1
K! (2r − K)!
2
"
!#
(nβ − 1)X
2r! P
1
≥ p RH + X − L − B1(1 − β) −
1 − 2r rK=0
n−1
K! (2r − K)!
2
which implies
r
1
2r! X
1 − 2r
2
K!
(2r
− K)!
n
K=0
pr.aut = (1 − β)
X
r
n−1
(nβ − 1)X
1
2r! X
RH + X − L − B1(1 − β) −
1 − 2r
n−1
2 K=0 K! (2r − K)!
⊔
⊓
Corollary 2. If the number of neighbors is 2 then r = 1 and thus
!
2 1 1
+
1−
4 2 1
n
!!
X
pr.aut = (1 − β)
n−1
2 1 1
nβ − 1
X 1−
+
RH + X − L − B1(1 − β) −
n−1
4 2 1
Densely Entangled Financial Systems
n
X
≡ pr.aut = (1 − β)
n−1
11
1−
3
4
nβ − 1
X 1 − 43
RH + X − L − B1(1 − β) −
n−1
X
n
4
!
≡ pr.aut = (1 − β)
n−1
nβ − 1 X
RH + X − L − B1(1 − β) −
n−1
4
Lemma 4 (Probability of failure in safe autarky).
n
2ru + X − B1
ps.aut = (1 − β)
1−β
n−1
RH + X − L − B1 + βB1 +
X + 2ru − B1
n−1
(An informal explanation of Lemma 4 is as follows. If a bank chooses to deviate to
safe autarky, it will survive unless it is directly affected by low return RL . It can pay
back its debt even if the real project delivers RH −2ru.
of failure if the
probability
The
2ru+X−B1
n
).
bank chooses safe autarky is given by ps.aut = (1−β) n−1
1−β
RH +X−L−B1 +βB1 + n−1 X+2ru−B1
Proof. Suppose that a bank survives at t = 2 even if all of its counter-party risks
are realized to ensure that the payoff of the real project is RH − 2ru. Since the bank
needs enough equity to survive even if real project yields RH − 2ru, we have
s.aut
s.aut
RH − 2ru − Rs.aut
≥ 0 ≡ Rs.aut
≤ RH − 2ru
ı,0 D
ı,0 D
The break-even condition for investors at t = 0 is:
p
p s.aut s.aut p
p
Rı,0 D + L ≡ Ds.aut = 1 −
Ds.aut = 1 −
RH − 2ru + L
n
n
n
n
Banks do not deviate to safe autarky from contagious system if and only if the
following holds:
payoff in contagious system ≥ payoff in safe autarky
p
≡ β 1 − p B1 − 1 − D ⋆ ≥ β 1 −
RH + X − Rs.aut
Ds.aut − 1 − Ds.aut
ı,0
n
≡ βB1 − pβB1 − 1 + RH + X − B1 − p RH − p X + p B1 + p L
p
pβ
p
p
≥ β−
RH + X − RH + 2ru − 1 + RH − 2ru − RH + 2ru + L
n
n
n
n
≡ βB1 − pβB1 + X − B1 − pRH − p X + p B1 + p L
p
pβRH pβX pβRH 2pβru
p
p
≥ βRH + βX − βRH + 2βru −
−
+
−
− 2ru − RH + 2ru + L
n
n
n
n
n
n
n
!
p
nβB1 + nRH + nX − nB1 − nL − βX − 2rβu − RH + 2ru + L
≡ βB1 + X − B1 − βX − 2βru + 2ru ≥
n
≡ (1 − β)X − (1 − β)B1 + 2ru(1 − β)
12
Bhaskar DasGupta and Lakshmi Kaligounder
!
p
nβB1 + RH (n − 1) + nX − nB1 − L(n − 1) − βX + 2ru(1 − β) + X − X + B1 − B1 + βB1 − βB1
n
≡ (1 − β) n 2ru + X − B1
!
≥ p βB1 (n − 1) + RH(n − 1) + X(n − 1) − B1(n − 1) − L(n − 1) + X(1 − β) + 2ru(1 − β) − B1(1 − β)
!
n
1−β
≡ (1 − β)
(2Ru + X − B1 ) ≥ p βB1 + RH + X − B1 − L +
(X + 2ru − B1)
n−1
n−1
n
2ru + X − B1
≡ p ≤ (1 − β)
1−β
n−1
X + 2ru − B1
RH + X − L − B1 + βB1 +
n−1
n
2ru + X − B1
This implies ps.aut = (1 − β)
.
1−β
n−1
RH + X − L − B1 + βB1 +
X + 2ru − B1
n−1
⊔
⊓
≥
Corollary 3. If the number of neighbors is 2 then r = 1 and thus
2u + X − B1
n
ps.aut = 1 − β
1−β
n−1
RH + X − L − B1 + βB1 +
X + 2u − B1
n−1
Lemma 5. In equilibrium banks hedge all of its counter-party risks i.e. banks endogenously enter into OTC contracts.
Proof. The banks hedge all of its counter-party risks if and only if
payoff from hedging in contagious equilibrium > payoff from not hedging
≡ β 1 − p B1
2r! B1 + 2ru
B
+
(2r
−
2)u
B
+
(2r
−
4)u
B
+
(2r
−
2r)u
1
1
1
!
+
+
+ ···+
> β 1 − p 2r
1! (2r − 1)!
2! (2r − 2)!
2 0! (2r − 0)!
2r
2r
!
! 2r −
2
2
B1 + (2r − 2)u B1 + (2r − 4)u
B1 + (2r − 2r)u
2r! B1 + 2ru
!
+
+
+ ···+
≡ B1 > 2r
1! (2r − 1)!
2! (2r − 2)!
2 0! (2r − 0)!
2r
2r
!
! 2r −
2
2
r
X
2r − 2K
2ur
K! (2r − K)!
K=0
≡ B1 >
r
X
2r!
22r −
K! (2r − K)!
K=0
which satisfies inequality (4), and thus banks hedge all of its counter-party risks.
Densely Entangled Financial Systems
13
Let the returns from the successful project be RH +
|X
i−r |
k = | i−1 |
|X
i−2r |
εk .
k = | i−(r+1)|
εk −
Assume
that the bank goes bankrupt at t = 2 if the counter-party realization of its unhedged
risk is −u. This is true if the bank cannot repay its debt at t = 2, i.e.,
⋆
D ⋆ ≡ R H − u < R H − B1 + X ≡ u > B1 − X
RH − u < Rı,0
if a bank fails when it loses −u on its unhedged counter-party exposure, it will fail
when the loss is greater than −u on its unhedged counter-party exposure.
⊔
⊓
Corollary 4. If number of counter-party
neighbors is 2 (i.e., r = 1), then
!
2−2
2−0
+
2u
0! (2 − 0)! 1! (2 − 1)!
! ≡ B1 > 2u
B1 >
and
u > B1 − X.
2!
2!
22 −
+
0! (2 − 0)! 1! (2 − 1)!
Lemma 6. When the number of neighboring counter-parties is less than n/2, a bank
chooses to shirk if one or more of its counter-parties default by leaving the bank
unhedged resulting in its debt not being rolled over at t = 1.
Proof. If a bank borrows Dmax (Rl,0 ) at t = 0 and if the bank has a low expected
realization of RL , then the debt financing is not rolled over at t = 1. Since RL < L,
the creditors will want to terminate the project. The bank goes bankrupt if its debt
financing is not rolled over at t = 1.
If 2r, the number of counter-party neighbors, is less than n/2, then probability of
n
failure due to counter-party risk is less than /n2 , i.e., the probability of counter-party
risk is less than 1/2. Since we assume that banks will consider a counter party risk
probability of at least 1/2 to insure against counter-party risk, banks do not insure
against counter-party risk using default insurance when 2r < n/2. When 2r ≥ n/2, the
probability of counter-party risk becomes at least 1/2 and hence banks will hedge the
counter-party risk. The counter-party insurance payoff happens with probability 2rp
n
in case of social perspecin case of private perspective and with probability (n−1)p
n
tive. Thus, as 2r increases to n − 1, the counter-party insurance payoff probability in
private perspective becomes the same as that in social perspective.
When 2r ≥ n/2, the individual banks will hedge the counter-party risk by taking
counter-party insurance. When 2r < n/2, banks will not hedge the counter-party risk
and hence failure of a counter-party will lead to the violation of its incentive constraint, thus the bank shirks and the project delivers RL . Let D1 be the amount of
debt to be rolled over at t = 1. The investors will demand higher interest rate Rı,1 in
order to break even. Let P s be the probability of a bank that do not default, P f be
the probability of a bank that defaults, and nd be the number of neighbors of any
2r − nd
nd
bank that default. Thus, P s =
and P f = . By the break even condition of
2r
2r
investors, we get
P s Rı,1 D1 + P f RL = D1 ≡ Rı,1 D1 =
D1 − P f R L
Ps
14
Bhaskar DasGupta and Lakshmi Kaligounder
The incentive constraint is
β(RH − Rı,1 D1 + X) ≥ βB1
!
D1 − P f R L
+ X ≥ βB1
≡ β RH −
Ps
≡ P s R H − D1 + P f R L + P s X ≥ B 1 P s
≡ P s R H − D1 + P f R L + P s X ≥ B 1 P s
≡ P s R H + X − B 1 + P f R L ≥ D1
If the bank had originally borrowed D0 , the amount it has to roll over at t = 1 is
Rı,0 D0 = RH + X − B1 , but the amount that is actually getting rolled over is only
P s (RH + X − B1) + P f RL .
⊔
⊓
Corollary 5. If number of counter-party neighbors is 2 (i.e., 2r = 2) and number of
nd
d
1
1
banks defaulted is 1 (i.e., nd = 1), then P s = 2r−n
2r = /2, P f = 2r = /2, and thus
1
1
P s R H + X − B 1 + P f R L ≥ D1 ≡
R H + X − B 1 + R L ≥ D1
2
2
Appendix 1: Remaining Proofs
(I) Proof of Dmax =
RH −B1+X
Rı,0
<1
The incentive constraint of a bank surviving at t = 1 and holding no risk can be
written as follows:
payoff if bank exerts effort ≥ payoff if bank does not exert effort
R H − B1 + X
R H − B1 + X
≡ β[RH − Rı,0 D + X] ≥ βB1 ≡
≥ D ≡ Dmax =
<1
Rı,0
Rı,0
|
{z
}
since Rı,0 ≥ 1
and, by inequality (3), RH + X − B1 ≤ 1
(II) Proof of ssafe =
1−β
n
− β np
Assume all counter parties are insured. The insurance company has to hold a capital
of 2RI. If all the banks insure against the failure of their counter-parties, the insurance fund breaks even if the price per unit of the default insurance s is determined
by the break even condition. Using the superscript safe to denote the insured system,
we get
Densely Entangled Financial Systems
15
expected amount that remains in the insurance fund at t = 2
= amount that insurance fund has to set aside at t = 0
1−β
p
≡ β(2rI − 2prI) = 2rI − 2nrI s ≡ β 1 − p = 1 − ns ≡ ssafe =
−β
n
n
(III) Proof of Dsafe = 1 − np (RH − B1 + X) + np L
p
p
Since the investors break even, we have 1 − Rsafe Dsafe + L = Dsafe . Combining
n
n
with the maximum amount that can be borrowed, we get
R H − B1 + X
=⇒ Rsafe Dsafe = RH − B1 + X
Rı,0
Dmax =
which proves our claim.
(IV) Proof of D⋆ = (1 − p)(RH − B1 + X) + p L
If all the banks decide not to buy insurance and hold the minimum amount of equity
to roll over debt, the system is contagious. The investors will always anticipate the
equilibrium and break even, implying
(1 − p) R⋆ı,0 D⋆ + p L = D⋆ ≡ D⋆ = (1 − p)(RH − B1 + X) + p L
|
{z
}
since by (I) R⋆ı,0 D⋆ = RH − B1 + X
(V) Proof of R⋆
ı,0 =
1
1−p 1− R
L
H −B1 +X
R H − B1 + X
R H − B1 + X
≡ R⋆ı,0 =
R⋆ı,0 D⋆ = RH − B1 + X ≡ R⋆ı,0 =
⋆
D
(1 − p)(RH − B1 + X) + pL
|
{z
}
|
{z
}
by (I)
⋆
since, by (IV), D = (1 − p)(RH − B1 + X) + p L
1
≡ R⋆ı,0 =
1 − p 1 − RH −BL 1 +X
‘
16
Bhaskar DasGupta and Lakshmi Kaligounder
(VI) Proof of
pterm
= (1 − β)
n
n−1
B0
R +βB −L
RH +X−L−B1(1−βB1)+ L n−11
!
If a bank borrows long term, the banker can borrow up to the point to make him/her
indifferent between long-term borrowing and shirking in both periods to collect
B0 + B1 . In long-term lending, investors cannot liquidate the bank under any circumstances. Since shirking in only the second period is clearly suboptimal, the banker
shirks in both periods and the expected payoff as of t = 0 is B0 + B1, and thus the
payoff in the good state must be at least B0 + B1. This implies:
p
p
RH − R term D term + X + B1 ≥ B0 + B1
1−
n
n
Considering the worst case scenario
1−
p
p
RH − R term D term + X + B1 = B0 + B1
n
n
p
B0 + B1 − B1
n
≡ R term D term = RH + X −
p
1−
n
(7)
Since the lenders break even in expectation at t = 0, we have
p
p
p
p
p
D term = 1 − R term D term + RL =⇒ D term = 1 − (X + RH ) − B0 − B1 + B1 + RL
n
n
n
n
n
|
{z
}
using (7)
p
p
p
p
≡ D term = X + RH − X − RH − B0 − B1 + B1 + RL
n
n
n
n
Banks will not decide to deviate from contagious equilibrium provided the following
holds:
payoff in contagious system ≥ payoff in long-term borrowing
≡
β(1 − p).B1 − (1 − D∗) ≥ β(B0 + B1 ) − (1 − D term)
≡
βB1 − pβB1 − 1 + RH + X − B1 − pRH − pX + pB1 + pL
p
p
p
p
≥ βB0 + βB1 − 1 + X + RH − X − RH − B0 − B1 + B1 + RL
n
n
n
n
p
B0 − βB0 ≥ nβB1 + nRH + nX − nB1 − nL − X − RH + B1 + RL + L − L + βB1 − βB1
n
nB0(1 − β) ≥ p(βB1(n − 1) + RH (n − 1) + X(n − 1) − B1(n − 1) − L(n − 1) + RL + βB1 − L)
n
RL + βB1 − L
B0 (1 − β) ≥ p βB1 + RH + X − B1 − L +
n−1
n−1
≡
≡
≡
Densely Entangled Financial Systems
17
n
p ≤ (1 − β)
n − 1
B0
≡
RL + βB1 − L
RH + X − L − B1(1 − βB1) +
n−1
n
B0
term
=⇒ p
= (1 − β)
R
+
βB
−
L
n − 1
L
1
RH + X − L − B1(1 − βB1) +
n−1
(VII) Proof of p f.aut =
(1−β)(RH +X−B1−RL )
RH +X−L−B1(1−β)− nβ (RH −RL )
Since a bank survives at t = 2 even if its real project only delivers RL , we have
payoff in contagious system ≥ payoff in full autarky
p
p
≡ β(1 − p)B1 − (1 − D⋆) ≥ β 1 − (RH + X − RL ) + β X − 1 − RL
n
n
≡ βB1 − pβB1 − 1 + RH + X − B1 − pRH − pX + pB1 + pL ≥
p
p
p
p
βRH + βX − βRL − βRH − βX + βRL + β X − 1 − RL
n
n
n
n
βRH βRL
≡ βB1 + RH + X − B1 − βX + βRL − RL − βRH ≥ p βB1 + RH + X − B1 − L −
+
n
n
β
≡ RH (1 − β) + X(1 − β) − B1(1 − β) − RL(1 − β) ≥ p RH + X − L − B1(1 − β) − (RH − RL )
n
(1 − β)(RH + X − B1 − RL )
(1
−
β)(R
+
X
−
B1 − R L )
H
≡ p≤
≡ p f.aut =
β
β
RH + X − L − B1(1 − β) − (RH − RL )
RH + X − L − B1(1 − β) − (RH − RL )
n
n
(VIII) Proof of I = ru + X − B1 > 0
The amount of debt reduction needed at time t = 1 to stabilize a bank that lost at
least r counter-parties is I = ru + X − B1 > 0. If less than r counter-party neighbors
fail, then the fraction of failed counter-parties of the bank is less than 1/2, hence bank
can survive this loss. If a bank looses at least r hedges at t = 1, it can only roll over
its debt if its incentive constraint is not violated. This can be insured by injecting
enough equity into the bank to make sure it can pay back its debt even if it loses ru
at t = 2 due to the lost hedge. Thus, we have
max
max
RH − ru − Rmax
+ I ≥ 0 ≡ Rmax
= RH + X − B1 =⇒ I = ru + X − B1
ı,1 D
ı,1 D
18
Bhaskar DasGupta and Lakshmi Kaligounder
Appendix 2: Glossary of financial terminologies
Risk: Risk is a chance that an investment’s actual return will be less than expected.
Asset: An asset is anything that is owned by an individual or business that has a
monetary value.
Counter-party Risk: Risk that one party in an agreement defaults on its obligation to repay or return securities.
Hedging: A strategy to reduce the risk by making a transaction in one market to
protect against the loss in another market.
Over The Counter (OTC): A market that is conducted between dealers by telephone and computer and not on a listed exchange. OTC stocks tend to be of those
companies that do not meet the listing requirements of an exchange, although
some companies that do meet the listing requirements choose to remain as OTC
stocks. The deals and instruments are generally not standardized and there is no
public record of the price associated with any transaction.
Equity: The amount that shareholders own, in the form of common or preferred
stock, in a publicly quoted company. Equity is the risk-bearing part of the company’s capital and contrasts with debt capital which is usually secured in some
way and which has priority over shareholders if the company becomes insolvent
and its assets are distributed.
Liquidity: The degree to which an asset or security can be bought or sold in the
market without affecting the asset’s price, i.e., the ability to convert an asset to
cash quickly.
Credit Default Swap (CDS): A specific type of counter-party agreement that allows the transfer of third party credit risk from one party to the other. One party
in the swap is a lender and faces a credit risk from a third party, and the counterparty in the swap agrees to insure this risk in exchange for regular periodic payments.
Appendix 3: List of notations and variables
n : total number of banks in the network.
t : the time variable. Three time periods t = 0, 1, 2 are considered (initial, interim
and final time period, respectively).
β : the discount factor (we assume that β < 1).
R : the borrowing rate. R0 and R1 are the borrowing rates at t = 0 and at t = 1,
respectively.
ε : an independent random variable, realized at t = 2, that takes a value of +u or
−u, each with probability 1/2.
Densely Entangled Financial Systems
19
L : the return if the investments are liquidated early at t = 1 L(< RH ).
X : Non-pledgable payoff.
r : each bank is assumed to have 2r counter-party neighbors.
D : investors share of investment in the bank at t = 0; 1 − D is the bankers share
of investment in the bank at t = 0 (D, 1 − D ≥ 1).
e : the unobservable effort choice made by the bank (e ∈ {0, 1}).
Bi : Bankers private benefit at the time period i.
p : the probability of bad state.
p
soc
: if p < psoc , then irrespective of the number of counter-party neighbors there
is no need for any counter-party insurance even from a social perspective.
pind : if p > pind then the banks will not buy any counter-party insurance as the
private benefits of insuring exceed the cost.
pterm : if p < pterm then the banks will continue to prefer short-term debt.
paut : if p < paut then no bank will have
n an incentive oto hold more equity and boraut
row less. p is equal to min ps.aut , pr.aut , pf.aut where the superscripts s.aut,
r.aut and f.aut stand for safe autarky, risky autarky and full autarky, respectively.
Dmax : The maximum amount of borrowing at t = 0 that can be rolled over at t = 1.
ssafe : The price per unit of default insurance in a stable system where all banks
buy counter-party insurance.
Dsafe : The amount borrowed by the bank for unit investment in the project in a
stable system where all banks buy counter-party insurance.
D ⋆ : The amount borrowed by the bank for unit investment in the project in a
contagious system where banks decide not to buy insurance.
References
1. A. Zawadowski, “Entangled Financial Systems” (Review of Financial Studies, 26 (5), 12911323, 2013).
2. F. Castiglionesi and N. Navarro, “Fragile Financial Networks” (Tilburg University Working
Paper, 2011).
3. H. Amini, R. Cont and A. Minca, “Resilience to contagion in financial networks”
(arXiv:1112.5687v1, December 2011).
4. P. Gandhi, F. A. Longstaff and N. Arora, “Counterparty Credit Risk and the Credit Default
Swap Market” (2012 Social Science Electronic Publishing, Inc. March 2011).
5. P. Gai and S. Kapadia, “Contagion in financial networks” (Proc. R. Soc. A, 466 (2120), 24012423, 2010).
6. J. Corbo and G. Demange, “Contagion in Financial Networks: A Random Graph Model” (3rd
financial Risks International Forum, Paris, France, 2010).
7. A. Zawadowski, “Interwoven Lending, Uncertainty, and Liquidity Hoarding” (Boston University, Working Paper, 2010).
20
Bhaskar DasGupta and Lakshmi Kaligounder
8. F. R. Liedorp, L. Medema, M. Koetter, R. H. Koning and I. van Lelyveld, “Peer monitoring or
contagion? Interbank market exposure and bank risk” (DNB working paper No. 248, 2010).
9. R. M. Stulz, “Credit Default Swaps and the Credit Crisis” (Journal of Economic Perspectives,
24 (1), 73-92, 2010).
10. D. Duffie and H. Zhu, “Does a Central Clearing Counterparty Reduce Counterparty Risk?”
(Stanford University, Working Paper, 2009).
11. P. R. Kleindorfer, Y. Wind and R. E. Gunther, “The Network Challenge: Strategy, Profit and
Risk in an Interlinked World” (Pearson Prentice Hall, 2009).
12. F. Allen and A. Babus, “Networks in Finance” (Network-based Strategies and Competencies,
P. Kleindorfer and J. Wind (eds.), 367-382, Wharton School Publishing, 2009).
13. A. Haldane, “Why Banks Failed the Stress Test” (speech given at the Marcus-Evans Conference on Stress Testing, 9-10 February 2009, available at http://www.bankofengland.co.
uk/publications/speeches/2009/speech374.pdf).
14. V. Acharya and A. Bisin, “Counterparty Risk Externality: Centralized versus Over-TheCounter Markets” (New York University, Working Paper, 2009).
15. C. Pirrong, “The Economics of Clearing in Derivatives Markets: Netting, Asymmetric Information, and the Sharing of Default Risks Through a Central Counterparty” (University of
Houston, Working Paper, 2009).
16. R. J. Caballero and A. Simsek, “Complexity and Financial Panics” (NBER Working Paper
No. 14997, 2009).
17. E. Nier, J. Yang, T. Yorulmazer and A. Alentorn, “Network models and financial stability”
(Journal of Economics Dynamics and Control, 31, 2033-2060, 2007).
18. A. Babus, “The Formation of Financial Networks” (Tinbergen Institute Discussion Paper No.
2006-093/2; FEEM Working Paper No. 69.2007, 2007).
19. S. H. Zhu and M. Pykhtin, “A Guide to Modeling Counterparty Credit Risk” (GARP Risk
Review, 16-22, July 2007).
20. A. Babus, “Contagion Risk in Financial Networks” (K. Liebscher (ed.), Financial Development, Integration and Stability, 423-440, 2006).
21. M. Eboli, “Systemic Risk in Financial Network: a Graph Theoretical Approach” (Mimeo,
Univ. di Chieti, Pescara, 2004).
22. A. Bisin and D. Guaitoli, “Moral Hazard and Nonexclusive Contracts” (The RAND Journal
of Economics, 2004, 35(2), 306-328).
23. F. Allen and D. Gale, “Financial Contagion” (Journal of Political Economy, 108 (1), 1-33,
2000).
24. X. Freixas, B. M. Parigi and J.-C. Rochet, “Systemic risk, interbank relations, and liquidity
provision by the central bank” (Journal of Money, Credit and Banking, 32(3), 611-638, 2000).
25. C. W. Calomiris, “U.S. Bank Deregulation in Historical Perspective” (Cambridge University
Press, 2000).
26. N. Kiyotaki and J. Moore, “Credit Chains” (Princeton University, Working Paper, 1997).
27. D. W. Diamond and P. H. Dybvig, “Bank runs, deposit insurance and liquidity” (Journal of
Political Economy, 91, 401-419, 1983).
| 5cs.CE
|
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
Optimizing run-length
algorithm using octonary repetition tree
Kaveh Geyratmand Haghighi1, Mir Kamal Mirnia*2, Ahmad Habibizad Navin3
1Department
of Computer ,East Azarbaijan Science and Research Branch,
Islamic Azad University,Tabriz, Iran
1 Department of Computer Engineering, Tabriz Branch,
Islamic Azad University, Tabriz, Iran.
2Department
of Computer Engineering,
University Of Tabriz, Tabriz, Iran
3Department
of Computer ,East Azarbaijan Science and Research Branch,
Islamic Azad University,Tabriz, Iran
Abstract-Compression is beneficial because it helps detract resource usage. It reduces data storage space as well as
transmission traffic and improves web pages loading. Run-length coding (RLC) is a lossless data compression algorithm.
Data are stored as a data value and counts. This is useful on data that contains many consecutive runs. This paper proposes
a compression algorithm using octonary repetition tree (ORT), based on RLC. ORT is used to overcome the duplication
problem in primary RLC algorithms, instead of using flag or codeword. It's the first method of run-length encoding which
has the compression ratio greater than one in all tested cases. Experimental results, show average improvement of roughly
3 times, 3 times and 2 times in compression ratio field of study comparing to PRLC1, PRLC2, DF-RLC respectively. By
using this approach of run-length encoding we can compress wider types of data, such as multimedia, document, executive
files, etc.
I.
INTRODUCTION
Digital image compression has become an important tool because image capturing devices, display units and social
networks are widely used. When a raw image is stored as an array, usually the volume of file will be large and variable
due to image resolution and color channel numbers. So, image compression may offer lower file size for storage and
transmission. Usually there are two main approaches to compress data, such as lossy and lossless. Lossy image
compression is irreversible, in the sense that it will lead missing details depending on the level of compression. Thus,
this approach cannot be used in medical and satellite images and high level graphic design, since the original image
should be remained with no changes. But, the original data can be reconstructed from the compressed data obtained
from compression algorithm in lossless image compression.
Run-Length Coding (RLC) or run-length encoding [1], being part of JPEG [2], is a common lossless compression
method which is used in International Telecommunication Union too. Run-length Coding is often used in other
compression algorithms. In RLC sequence of bytes with the same value, encoded to number of repetition beside of
byte value. For example, this sequence of values 338888888 is encoded to (3 2 8 7), where, 3 and 8 stands for the
value of bytes, 2 and 7 shows the repetition correspondingly. The RLC is very efficient in encoding images when long
265
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
runs of bytes appear with the same intensity value (eg., black and white images). In the other hand it is inefficient in
encoding image with different values in sequence [5]. For example, 5 9 6 1 2 is a sequence of different bytes and will
be encoded as (5 1 9 1 6 1 1 1 2 1) by RLC. In this case, adding number of repetition will increase data size (double
in this case) and this is named as duplication problem in Run-Length Coding.
A new optimizing run-length algorithm is proposed here by using ORT. An octonary tree is added to point the
sequence of bytes with the same value. The tree features is used to locate sequence of the same bytes with less
overhead. Hence, in the proposed algorithm, there is no need to use extra bytes for determining the number of the
same bytes, nor reserving a bit as a flag. The proposed approach has no duplication problem, and there is no limitation
to encode number of bytes with the same value in a sequence. Also existence of an unused byte in image is
unnecessary. To the best of our knowledge, the compression rate just in this method is greater than 1 in all tested
images. Thus it is possible to use the compressing method for wider types of data, such as multimedia, documents,
executive files, etc.
This paper is organized in five sections: Section 2 describes related works in RLC compression algorithm. Proposed
method explains in section 3. Section 4 compares the new proposed method with recent works and section 5 concludes
the paper and suggests future works.
II.
RELATED WORKS
As a solution to solve the duplication problem, [2], [5], [6] offered that RLC encoding occurs only when number of
bytes with the same value is three or more and code other cases without using RLC. In this method, it is necessary to
use unique flag bits for pointing byte intensity levels from number of occurrence in a stream of RLC encoded bytes.
Two main techniques were suggested to implement the flag bits in RLC. The first technique uses a reserved and fixed
codeword. This codeword treated as flag. The flag, locates a byte value with its count. In [6], flag is associated to a
byte intensity value that does not exist. However, this technique is not acceptable if all of 256 bytes brought in the
image. A similar approach that uses an unmatched codeword of one byte was applied in [7]. We named this technique
as primary Run-Length 1 (PRLC1). Since a byte including 8-bits has range of [0, 255], count of consecutive bytes
(with the same intensity value) that can be encoded with one run is at most 256. The main problem of PRLC1 is that,
adding extra byte for separation run from byte value causes to duplication problem when different values in sequence
appears. This approach could not Assurances that compression ratio is always greater than 1.
The second technique distinguishes count from value by defining MSB bit as a flag [8]. When MSB is set to 0, rest
of bits (7-bits) indicates byte value and MSB=1, indicates following 7-bits is the count. This technique solves the
duplication problem, but it is only acceptable when the image contains less than 128 unique values. Also, the count
of consecutive bytes that can be encoded is at most 128. We named this technique as primary Run-Length 2 (PRLC2).
Same as PRLC1, this method could not Assurances that compression ratio is always greater than 1.
Another approach in [10], named duplication free run-length coding (DF-RLC), uses rule-based generative coding
to deriving codeword. This method solves duplication problem and the count of consecutive bytes that can be encoded
is infinitive. This technique achieves better compression ratio than PRLC1 and PRLC2. But looks like other methods
in this section, compression ratio is not always greater than 1.
266
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
a
b
j
k
c
…
…
…
l
e
d
f
…
a: Root
b: 1st child (a)
c: 2nd child (a)
d: 3nd child (a)
e: 4th child (a)
f: 5th child (a)
g
h
i
g: 6th child (a)
h: 7th child (a)
i: 8th child (a)
j: 1st child (b)
k: 2nd child (b)
l: 3nd child (b)
d: 3nd child (a)
Figure 1: ORT structure
III.
PROPOSED METHOD
In the proposed method, a tree used to display duplicate bytes instead of using flag or codeword. This tree
generates dynamically while reviewing the data. Fig.1 has shown the generated tree structure Each node of this tree
includes one byte (containing 8 bit). We named this tree "octonary repetition tree". This tree has 8 childes for each
node, named k= {1,2, … ,8}.
The formula for calculating the array structure indices of the different relatives of a node are as follows:
Parent(r) =⌊(r−1)/8⌋ if r≠0.
(1)
Kth child(r) =8r+k if 8r+k≤n.
(2)
The total count of nodes in the tree is n in (1), (2). The index of the node named as r, which is in the range of 0 to
n−1. Each node in this tree has been ranged in [0-255] that represents a byte (containing 8-bits) in binary. The root
of this tree has eight childes. As the lower layers has been reached, the data is divided into eight parts for each layer.
This trend continues till leaves has reached. This method represents exact place of the duplicated byte. Each 8-bits in
non-leaves, represents existence of equality of pair bytes in sub-branches. If there is no equality in sub-branches,
Table 1
calculating the array structure indices of the different relatives of a node
Position
Parent
1st Child
2nd Child
3nd Child
4th Child
5th Child
6th Child
7th Child
8th Child
0
1
2
3
4
5
6
7
8
1
0
9
10
11
12
13
14
15
16
2
0
17
18
19
20
21
22
23
24
3
0
25
26
27
28
29
30
31
32
4
0
33
34
35
36
37
38
39
40
5
0
41
42
43
44
45
46
47
48
267
6
0
49
50
51
52
53
54
55
56
7
0
57
58
59
60
61
62
63
64
8
0
65
66
67
68
69
70
71
72
9
1
73
74
75
76
77
78
79
80
10
1
81
82
83
84
85
86
87
88
11
1
89
90
91
92
93
94
95
96
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
Figure 2. Pruned tree for assumptive file
algorithm prunes it. Fig.2 has shown pruned tree for assumptive file including 64 bytes of data. Bytes with the same
value are {(3,4,5),(7,8),(13,14,15),(51,52,53,54)}.
Actually the non-leaf nodes are in charge of dividing the file. This division continues till the eight byte blocks has
reached in data. Each 8-bits in leaves, shows equality of pair bytes in sequence. If bit value is set to 0, indicates pair
bytes is not the same; when bit value is 1, means that pair bytes are the same. So, one byte in leaf of tree, shows
similarity of 8 bytes in data. Also we defined limitation of similarity to construct leaves of tree. For example,
limitation of 2, only allows to have leaves with at least 2 bits with value=1. Levels of the tree is determined by the
size of the file. If N is the total counts of bytes in file, then we calculate the number of levels as:
Level=⌈𝑙𝑜𝑔8 (𝑁)⌉
(3)
A fixed table defined to determine the depth of the tree and as it is fixed, it is embedded in the application and
would not lead to further process. Proposed algorithm eliminates the same bytes in sequence while passes data and
locates their place in tree. When algorithm reaches to end of file, attaches generated tree to end of it. This algorithm
runs more than one time recursively to gain better results. In each run, we treat the output of algorithm as input and
encode it again. In each iteration, comparison of bytes increases by one. Fig.3 has shown these steps in flowchart. If
n is count of bytes and k is number of runs. comparison of bytes at each run is as follow:
10
10
(4)
∑ 𝑏𝑦𝑡𝑒[𝑛] = ∑ 𝑏𝑦𝑡𝑒[𝑛 + 𝑘 + 1]
𝑘=0
𝑘=0
IV. EXPERIMENTAL RESULTS
The ORT method is implemented in C# programing language software. Hardware used to run implemented program
has an intel processor with 3.2 GHz frequency containing 8 thread and 8 GB ram with 1600 MHz frequency and SSD
268
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
Figure 3. Flowchart of proposed algorithm
storage drive with reading and writing speed of 500 m/s. Windows 10 is also used as the operating system. and tested
with 12 standard images [9]. Some of the test images is shown in Fig4.
Compared with the methods used codeword for encoding, the proposed method in this article outs down the need
for a codeword table. Compared with the methods used flag bit, this method has eliminated the limits of coding
consecutive bytes (this problem exist in PRLC1, PRLC2). The proposed method in this article just as the PRLC1
does not have the duplication issue. The use of tree to display the duplicated bytes is an innovative method in this
branch of encoding and has not be seen in any other article. One of the features of this tree is pruning any extra subbranches to reach the least occupied byte. Generating individual tree (at the end of the file) also simplifies the
uncompressing task. One of the important challenges in compressing is compression ratio. Data compression ratio
(CR) is the ratio between the uncompressed and compressed size.
𝐶𝑅 =
𝑈𝑛𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑒𝑑 𝑆𝑖𝑧𝑒
𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑒𝑑 𝑆𝑖𝑧𝑒
(5)
The results of the proposed method shown in Fig.5 and Table 2. Note that this results written after 10 times of
running proposed algorithm recursively and limitation of the same bytes is >=3. In this table the comparison criterion
269
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
Figure 4. Test images
800
)CR(
600
400
200
0
General Image
TRLC1
Gray-21
TRLC2
DF-RLC
Ruler
Proposed method
Figure 5. CR comparison of recent methods with proposed method
is compression ratio. These results comprised with the PRLC1, PRLC2 and DF-RLC. If the compression ratio>1 it
means the compression resulting data has gained free spaces after encoding. if compression ratio<1 indicates the
increased size of data after encoding. Our approach has reached the CR>1 in any tested images. While in other
methods, CR<1 has shown in some of cases.
Table 2
Comparison of proposed algorithm compression ratio with other approaches
Image
Proposed method
DF-RLC
TRLC2
TRLC1
1
General Image
9.467
8.3
5.4
5.5
2
Gray-21
625.961
42.7
38.0
49.0
3
Ruler
69.866
11.1
4.6
4.4
4
Clock
1.113
1.1
0.9
0.9
5
Tank
1.009
1.1
0.9
0.9
6
APC
1.000
1.4
0.9
0.9
7
Lenna
1.000
0.9
0.9
0.9
8
Numbers
1.171
0.9
1.1
1.1
9
Airplane
1.084
2.1
1.1
1.1
10
F-16
1.021
1.0
0.9
0.9
11
Boat
1.001
0.9
0.9
0.9
12
House
1.050
0.9
0.9
0.9
270
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 8, August 2016
New approach improved the compression ratio in all cases. The previous approaches which used the RLC for
compression were limited to black and white or simple colored images due to their ineffectiveness. Hence these
methods were limited to geographical and satellite and medical image. But the proposed approach in this article, is
able to encode and compress other types of data such as multimedia files, applications, documents. In this method
instead of using flag or codeword, a tree has been used to indicate the duplicated bytes. This tree is generated while
passing the data and avoids reviewing the data repeatedly.
V.
CONCLUSION & FUTURE WORKS
In this paper run-length compression algorithm using ORT has been proposed. In this method, a tree used to display
duplicate bytes instead of using flag or codeword. This method has eliminated the limits of coding consecutive bytes.
In comparison to the traditional RLC approaches, this method overcomes to duplication problem. Our approach has
reached the CR>1 in any tested cases and considered to the test results of compressed photos, improvements have
been made in this regard. While in other methods, CR<1 has shown in some of images. It makes our algorithm
suitable to use in compression of other types of data. The generated tree is pruned which leads to decreasing the
number of bytes. We have a fixed table to determine the depth of the tree and since it is fixed it is embedded in the
application and would not lead to further process. Parallelizing the algorithm by dividing the data and pipelining the
recursive runs, speeds up compressing.
References
[1] Bentley, J. L., et al. (1986). "A locally adaptive data compression scheme." Commun. ACM 29(4): 320-330.
[2] Acharya, T. (2006). "VLSI Algorithms and architectures for JPEG2000." Ubiquity 2006(September): 1-42.
[3] Togneri, R. and J. Christopher (2003). Fundamentals of information theory and coding design, CRC Press.
[4] Zhan, W. and A. El-Maleh (2009). A new collaborative scheme of test vector compression based on equal-runlength coding (ERLC). Proceedings of the 2009 13th International Conference on Computer Supported
Cooperative Work in Design, IEEE Computer Society: 21-25.
[5] Luse, M. (1993). Bitmapped graphics programming in C++, Addison-Wesley.
[6] (2008). "Data Compression: The Complete Reference (by D. Salomon; 2007) [Book review]." IEEE Signal
Processing Magazine 25(2): 147-149.
[7] Hughes, J. F., et al. (2014). Computer graphics: principles and practice, Pearson Education.
[8] Glassner, A. (1991). "Adaptive Run-Length Encoding." Graphics Gems II 2: 89.\
[9] “USC-SIPI image
database.”
[Online].
Available http://sipi.usc.edu/services/database/
[10] Al-Wahaib, M. S. and K. Wong (2010). A Lossless Image Compression Algorithm Using Duplication Free RunLength Coding. Network Applications Protocols and Services (NETAPPS), 2010 Second International
Conference on.
271
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
| 8cs.DS
|
arXiv:1611.02187v3 [math.AT] 9 Feb 2018
Classifying spaces for the family of virtually cyclic
subgroups of braid groups
Ramón Flores and Juan González-Meneses
∗
February 7th, 2018
Abstract
We prove that, for n ≥ 3, the minimal dimension of a model of the classifying
space of the braid group Bn , and of the pure braid group Pn , with respect to the
family of virtually cyclic groups is n.
1
Introduction
In the last years, there has been a growing interest in the description of the classifying
space of a group with respect to the family of its virtually cyclic subgroups, usually
denoted EG. The main reason for this interest is that this space is the target of the
Farrell-Jones conjecture [16], which given a group G, intends to compute the (algebraic)
K-theory of the group ring ZG through an assembly map that uses as a source nonconnective (topological) K-theory of the classifying space. The conjecture has been proved
to be true for a number of groups, see [38] for an excellent survey.
The knowledge of the algebraic K-theory of ZG is based in part on finding manageable
and “small” models for EG, and in particular in understanding which is the minimal
possible dimension of such a model. Hence, this problem has been widely studied in the
last years, and computations are available for an important number of classes of groups, as
for example locally finite groups [13], polycyclic groups [39] and more generally elementary
amenable groups [14], [19], CAT(0)-groups [37], [15], linear groups [12], hyperbolic groups
[31], [35] or mapping class groups [15], [33].
We are interested in the (full) braid groups Bn , which in fact can be seen as a particular
instance of mapping class groups. These objects, aside from being interesting by their
own right, have appeared in very different fields of Mathematics, as for example algebra,
topology, physics or geometry. In our context, it has been proved by Juan-Sánchez [32]
that Farrell-Jones isomorphism holds for them, and moreover their lower algebraic Ktheory groups have been computed [26]. However, not a lot is known about concrete
The first author was supported by MEC-FEDER grant MTM2013-42293-P and the second author
was supported by MEC-FEDER grant MTM2013-44233-P. Both authors supported by MEC-FEDER
grant MTM2016-76453-C2-1-P
∗
1
models for EBn , not even the minimal dimension of these spaces. In his PhD Thesis [17],
M. Fluch (Proposition 4.16), estimated this dimension between 3 and 5 in the case of B3 .
More recently, Juan-Trujillo [33] bounded it for a general Bn with a factorial bound (more
information at the end of Section 3).
The main result of our paper (Theorem 5.1) is that the minimal dimension of a model
for EBn (and also of the pure version EPn ), for every n ≥ 3, is n. In this way, it is proved
that the equality in Question 1.2 of [37] holds for these groups, and we expect that our
result is helpful for computations of Bredon (co)homology and/or algebraic K-theory. Of
course, next challenge in this context will be to find explicit models of EBn that realize
the minimal dimension, and in this sense, a promising line of research concerns the actions
of braid groups on CAT(0)-spaces (see [27] and references there). On the other hand, our
methods strongly depend on the rich internal structure of the (full) braid groups, so it
is likely they can be applied to braid groups over other surfaces for which the virtually
cyclic subgroups are understood (see for example [20] for the case of the sphere).
The structure of the paper is the following. In Section 2 we provide the background
about classifying spaces and geometric dimensions that will be needed later, and in particular, we describe Lück-Weiermann model for the case of virtually cyclic subgroups.
Section 3 is devoted to braid groups, and in it we recall general facts about these objects,
and prove some new results that will be useful for our computations. In Section 4 we
describe the structure of the commensurators of the cyclic subgroups. Section 5 contains
the proof of our main theorem. The most difficult point of the proof is to bound the
dimensions in the reducible non-periodic case, and this goal is achieved by proving that
the quotient of certain normalizers in Bn are virtually torsion-free, and then applying an
appropriate result of C. Martı́nez (Theorem 2.5 in [42]) that only works in this case.
2
2.1
Background
Classifying space for families
In this section we review the notion of classifying space for a family of subgroups of a
group, which will be the main object of study in this note, with special emphasis in the
case of the family of virtually cyclic subgroups. We intend to give a brief survey based
on the treatment of [14], the reader interested in a more thorough approach is referred to
Lück excellent monography [36]. Moreover, we assume that the reader is familiar with the
notion of G-CW-complex and other fundamental concepts of equivariant G-homotopy; in
any case, all the necessary information can be found in [43], Part I, section 2.
Definition 2.1 Let G be a discrete group, and F a family of subgroups of G which is
closed under conjugation and passing to subgroups. Then a G-CW-complex X is a classifying space for the family F if the fixed point set X H is contractible for every H ∈ F and
empty for every H ∈
/ F.
The classifying space for the family F is always unique up to G-homotopy equivalence,
and is denoted by EF G. Observe that the definition implies that the isotropy groups of
2
the action of G over any model for EF G are in F . Moreover, as the family is closed under
passing to subgroups, the trivial group is always a member of F , and this implies that
EF G is always a contractible G-space. Remark also that if G ∈ F , the point is a model
for EF G.
Remark 2.2 Given a family F of subgroups of G closed under conjugation and subgroups
and a subgroup H < G, the family F ∩ H whose elements are the intersections of H with
the elements of F is a family of subgroups of H for which the same holds. Actually, F ∩H
is precisely the set of subgroups of H which belong to F . If we consider the action of H
over EF G by restriction, EF G becomes a model also for EF ∩H H.
Example 2.3 The following are the most important instances of classifying spaces for
families. Each one deserves its own notation:
• If F{1} is the family whose only element is the trivial subgroup, EF{1} G = EG, the
universal space for principal G-bundles.
• If FF in is the family of finite subgroups of G, then EFF in G is usually denoted EG
and called the classifying space for proper actions of G.
• If Fvc is the family of virtually cyclic subgroups of G, the space EFvc G is denoted
EG.
Observe that in a torsion-free group G, F{1} = FF in (G). In particular, in this case,
EG = EG. Also, it is well-known that in a torsion-free group G, every virtually cyclic
subgroup is cyclic ([40], Lemma 3.2), so Fvc (G) is the set of cyclic subgroups of G.
The classifying space for proper actions has been widely studied from the nineties,
as it is the target of the Baum-Connes conjecture [6], which remains unsolved in full
generality. However, although the classifying space EG is the object of study of the
Farrell-Jones conjecture [16] about the algebraic K-theory and L-theory of the group ring
of G, also unsolved in general, much less is known about this classifying space, because
a construction of a manageable model for it is usually much more difficult than the
construction of a good model for EG. In this sense, a big step forward has been the work
of Lück-Weiermann, which builds a model for EG using as building pieces models EF H,
with H ≤ G and F families of groups which are contained in the family Fvc (G). Because
of its importance in our development, we will describe now this model; details can be
found in [39].
Let G be a group. An equivalence relation in the set Fvc \FF in of infinite virtually
cyclic subgroups of G is defined by establishing that H ∼ K if and only if H ∩ K is
infinite. We will denote by [H] the equivalence class of a subgroup H by this relation.
Notice that conjugation in G preserves Fvc , FF in and the relation ∼, hence we can define
g −1 [H]g as [g −1 Hg] for any g ∈ G and any H in Fvc \FF in .
Definition 2.4 If [H] is an equivalence class by ∼, the normalizer of [H] is defined as
the subgroup
NG [H] := {g ∈ G | g −1 [H]g = [H]}.
3
It is important to observe that NG [H] contains the normalizer NG (H) for every representative H of the class [H], but in general is not equal to any of these normalizers
(Example 2.6 in [39]). However, in the groups we will be working with, there always will
be a group H0 ∈ [H] such that NG [H] = NG (H0 ). In general, we will see in Section 4
that for every group G, one has NG [H] = CommG (H), the commensurator of H in G (see
Definition 4.1).
Now a family of subgroups of NG [H] can be defined as follows:
F [H] := {K < NG [H] | K ∼ H or |K| < ∞}.
Observe that this family is closed under conjugation (in NG [H]) and taking subgroups.
Using these subgroups and families, an appropriate model for EG can be defined:
Theorem 2.5 ([39], Theorem 2.3) Let I be a complete set of representatives of the Gorbits (under conjugation) of equivalence classes [H] of infinite virtually cyclic subgroups
of G. For every [H] ∈ I, choose models for ENG [H] and EF [H] NG [H]. Choose also a
model for EG. Now consider the G-pushout:
`
[H]∈I
G ×NG [H] ENG [H]
`
[H]∈I
i
/
EG
idG ×NG [H] f[H]
`
[H]∈I
G ×NG [H] EF [H] NG [H]
/
X
where f[H] is a cellular NG [H]-map for every [H] ∈ I and i is the inclusion, or i is a
cellular G-map and f[H] is an inclusion for every [H] ∈ I. Then X is a model for EG.
In practice, this theorem implies that the existence of good models for the proper
classifying space of the commensurators and G, and also of the classifying spaces with
respect to the families F [H] will lead to the knowledge of good models for EG. Moreover,
the push-out implies the existence of a long exact sequence in Bredon homology, and
dimensional consequences that we will analyze in next section.
Although we have described here only the particular case of finite and virtually cyclic
subgroups (as it is the only one that will be needed), it is worth to point out that LückWeiermann model is defined for any two families F and G such that F ⊆ G and an
equivalence relation subject to some conditions is defined in G\F (see [39], Section 2).
2.2
Minimal dimensions for EG
In this section we will recall the results about geometric dimensions of classifying spaces
that will be necessary in the remaining of this note.
Definition 2.6 Let G a group, F a family closed under conjugation and taking subgroups.
The geometric dimension of G with respect to the family F is the minimal dimension gdF G
of a model for EF G.
4
According to the classical notation, we denote gdF G by gd G when F = F{1} ; by gd G
when F = FF in ; and by gd G when F = Fvc . We are mainly interested in the latter.
The study of the dimension of a group is a classic topic of research where group theory,
homological algebra and geometry overlap via the different geometric and (co)homological
versions of the dimension. Usually, these different versions are related, and small values
of them allow a sharp knowledge of the structure of the group. Of course, in this paper we are mainly interested in the geometric dimension with respect to the family of
virtually cyclic groups, but in our arguments we will also need to compute some proper
geometric dimensions, as well as some algebraic counterparts of it. Among them, it will
be particularly important the next one:
Definition 2.7 Given a group G and a family F of subgroups of G closed under conjugation and taking subgroups, the (Bredon) cohomological dimension of G with respect to the
family F , denoted by cdF G, is the maximal dimension of a nonzero Bredon cohomology
group with respect to F .
The main definitions about Bredon (co)homology can be found in [43] or [17]. In
particular, the following fact is described in the second reference, and it will be relevant
for our purposes:
Proposition 2.8 In the notation of the previous definition, for every G and F the equality cdF G = gdF G holds whenever gdF G 6= 3. If gdF G = 3, then 2 ≤ cdF G ≤ 3.
The question about the equality when gdF G = 3 is known as Eilenberg-Ganea conjecture, and it is yet unsolved in the case of the trivial family. The paper [10] contains an
interesting discussion about this conjecture, including examples of the strict inequality
for the family of finite groups; examples for the family of virtually cyclic groups can be
found in [18].
The key result that will lead us to identify gd Bn is a bound implied by the previously
described model of Lück-Weiermann:
Corollary 2.9 (Remark 2.5 in [39]) With the above notations, suppose there exists a
natural number k such that:
• gd G ≤ k.
• gd NG [H] ≤ k − 1, for every [H] ∈ I.
• gdF [H] NG [H] ≤ k, for every [H] ∈ I.
Then gd G ≤ k.
When applying this corollary, it is interesting to realize that according to Remark
2.2, for every H < G and every family of subgroups of G closed under conjugation and
subgroups, gdF ∩H H ≤ gdF G. Then, gd G and gd G work as upper bounds for the
corresponding minimal dimension of any of their subgroups.
We should also mention here Proposition 5.1 in [39], which establishes that an upper
bound for gd automatically gives a bound for gd:
5
Proposition 2.10 For any discrete group G, gd G ≤ gd G + 1.
Note that the equality is possible: for example, as Z is virtually cyclic, gd Z = 0,
while gd Z = 1. Usually, however, gd G ≤ gd G, and it is a question of Lück [36] to
identify families for which the inequality gd G ≤ gd G + 1 holds, and also for which this
inequality is an equality. For example, Degrijse-Petrosyan (Corollary 4.4 and Example
6.5 in [14]), prove that the inequality holds for elementary amenable groups, and also
construct Bestvina-Brady-like counterexamples for which it does not hold. While it is
easy to check that the inequality holds for braid groups (see Proposition 3.7 and the
previous discussion), to prove that it is in fact an equality has been one of the main
motivations of our paper, and is a beautiful and immediate consequence of Theorem 5.1.
3
3.1
Braid groups
A little survey
In this section we collect the basic definitions and facts about braid groups. For further
information the interested reader is referred to the more detailed treatments of [26] or [23]
Given an integer n ≥ 2, the braid group Bn on n strands can be defined in several
different ways. Algebraically, it is given by the following presentation [4, 5]:
σi σj = σj σi ,
if |i − j| > 1
Bn = σ1 , . . . , σn−1
σi σj σi = σj σi σj , if |i − j| = 1
Also, if Mn is the configuration space of n distinct points in the plane C,
Mn = {(x1 , . . . , xn ) ∈ Cn | xi 6= xj for i 6= j},
and Σn is the symmetric group on n elements, which acts on Mn by permuting coordinates,
then
Bn = π1 (Mn /Σn ).
This can be visualized by choosing n base points, say {1, . . . , n} ⊂ C, and considering a
braid as a collection of n disjoint paths in C × [0, 1], called strands, where the i-th strand
starts at (i, 0), moves monotonically on the second coordinate, and ends at (j, 1) for some
j ∈ {1, . . . , n}. This collection of strands (i.e. this braid) is considered up to isotopy
of C × [0, 1], fixing the boundary pointwise, and the multiplication of braids is given by
stacking and rescaling. The generator σj corresponds to a braid in which the strands j
and j + 1 cross, while the other n − 2 strands are constant. More precisely, σj can be
given by the paths
1 1 (1−t)iπ
1 1 −tiπ
(1, t) , . . . , (j − 1, t) , j + + e
,t , j + + e
, t , (j + 2, t) , . . . , (n, t)
2 2
2 2
for t ∈ [0, 1].
6
Each braid has a corresponding permutation, induced by the endpoints of its strands,
so there is a surjective map Bn → Σn . The kernel of this map, called the pure braid group
and denoted Pn , is the subgroup of braids in which the i-th strand starts at (i, 0) and
ends at (i, 1) for i = 1, . . . , n. Actually, Pn = π1 (Mn ). [7]
There is a third definition of Bn that will be important for us in this paper. Let Dn
be a n-times punctured disc (for instance, Dn = D\{1, . . . , n} where D is the disc in C
with diameter [0, n + 1] ⊂ R). Then a braid can be seen as an orientable homeomorphism
of Dn to itself, fixing ∂(Dn ) pointwise, up to isotopy relative to ∂(Dn ). That is, Bn is the
mapping class group of Dn [30, 7]. We remark that an automorphism corresponding to a
braid can be obtained from viewing the family of strands as a motion of the n punctures in
D, which can be extended to a continuous motion of all points of D, fixing the boundary.
The final position of the points yields the homeomorphism, which is unique up to isotopy
of Dn relative to ∂(Dn ). Conversely, if an automorphism f of Dn is given which fixes
the boundary ∂(Dn ) pointwise, it can be uniquely extended to an automorphism f of the
whole disk D. As every automorphism of D fixing the boundary is isotopic to the trivial
automorphism (Alexander’s trick), we can continuously deform idD into f . The trace of
the points 1, . . . , n under this deformation yields a family of n paths in D × [0, 1], which
can be extended to C × [0, 1] by the identity outside the cylinder. These n paths form the
braid corresponding to the isotopy class of f .
The braid group Bn is torsion-free [11]. Its center is infinite cyclic, generated by
∆2 = (σ1 (σ2 σ1 ) · · · (σn−1 σn−2 · · · σ1 ))2
This element corresponds to a Dehn-twist along a curve parallel to the the boundary of
Dn (roughly speaking, a rotation of ∂(Dn ) by 360 degrees). Hence, to quotient Bn by
its center corresponds to collapsing the boundary to a new puncture, so Bn /h∆2 i is a
subgroup (of index n + 1) of the mapping class group of the (n + 1)-times punctured
sphere Sn+1 .
This way of viewing braids as mapping classes allows to use the powerful theory of
Nielsen-Thurston [45], and to classify braids into three geometric types. In this way, a
braid α is said to be:
• Periodic, if some nontrivial power of α belongs to h∆2 i.
• Pseudo-Anosov, if there is a pair of transverse measured foliations of Dn preserved
by α, such that the action of a homeomorphism f (representing α) on one of them
scales the measure by some real number λ > 1 (called dilatation factor), and the
measure of the other one by λ−1 .
• Reducible non-periodic, if α preserves a family of isotopy classes of disjoint, essential
simple closed curves in Dn . Here essential means enclosing more than one and less
than n punctures.
Essentially, reducible braids are those which can be reduced into simpler ones. More
precisely, suppose that α is a reducible, non-periodic braid. Up to conjugacy in Bn , we can
7
assume that the family of isotopy classes of curves preserved by α can be represented by
a family of circles. Up to replacing α by a power, we can assume that α is represented by
an automorphism f which sends every circle to itself, so we can restrict the automorphism
f to the connected components obtained by removing the family of circles from Dn . As
each of these connected components is again homeomorphic to a punctured disc, each
restriction corresponds to a braid with fewer strands. Actually, there is a particular
family of isotopy classes of curves, called the canonical reduction system of α, CRS(α),
such that each of the mentioned restrictions is either periodic or pseudo-Anosov (see [8]).
The decomposition of a reducible braid into simpler ones will be used several times
in this paper, so we will make it more precise. Given a reducible, non-periodic braid α,
let Cα be the set of outermost isotopy classes of curves in the canonical reduction system
CRS(α). Notice that α preserves Cα (up to isotopy). Up to conjugacy, we can assume
that Cα can be represented by a disjoint union of unnested circles. Now recall that an
automorphism representing α can be extended to an automorphism f of D, and that there
is an isotopy from idD to f . The trace of the punctures under this isotopy represent the
strands of α, and the trace of the circles representing Cα looks like a family of tubes, each
one enclosing more than one and less than n punctures. See Figure 1.
Figure 1: A reducible braid α ∈ B8 , and the external braid αext . In this case, Cα is represented by a family of three circles. The internal braids inside each tube are, respectively,
σ1 ∈ B2 , σ1 σ2 ∈ B3 and the trivial braid in B2 . The external braid is σ1 σ2 σ3−1 σ1 σ3−1 ∈ B4 .
The decomposition of α along Cα yields an external braid αext , and some internal
braids. The external braid αext corresponds to forgetting what happens inside the tubes:
one gets a braid made of tubes and (possibly some) strands, which is transformed into a
braid by shrinking each tube to form a single strand. The internal braids are those which
are contained into each tube. Actually, as a tube does not necessarily end at the same
place it started, there is some shifting of the final points of the strands that should be
made in order to define the internal braids properly, but it is clear from the picture (see
Figure 1). See [24] for details.
A further simplification can still be done. Denote C1 , . . . , Cm the circles representing
Cα . The action of α on Cα induces a permutation on these circles. If Ci1 , . . . , Cir is a cycle
under this permutation, then we can conjugate α in such a way that all internal braids
in the tubes corresponding to Ci2 , . . . , Cir are trivial, and the only possibly nontrivial one
8
is inside the tube corresponding to Ci1 . We can do the same with all cycles, so we can
assume (up to conjugating α) that there is just one internal braid αi for each cycle of
tubes determined by α. These internal braids α1 , . . . , αk are unique up to conjugacy (see
[25]), and can be used to describe the centralizer of α:
Theorem 3.1 (Theorem 1.1 in [25]) Let α ∈ Bn . If n = 2 the centralizer Z(α) = B2 ≃ Z.
If n ≥ 3, the centralizer Z(α) is as follows:
• If α is periodic, Z(α) either is equal to Bn or is isomorphic to a subgroup of Bm
for some m < n. (Actually, in the latter case it is the braid group of an annulus on
less than n − 1 strands, which can be embedded into Bm ).
• If α is pseudo-Anosov, Z(α) ≃ Z2 , consisting of all elements having a representative
which preserves the same two foliations as α.
• If α is reducible, there is a split short exact sequence
pα
1 −→ Z(α1 ) × · · · × Z(αk ) −→ Z(α) −→ Z0 (αext ) → 1,
where α1 , . . . , αk and αext are defined as above, and Z0 (αext ) is a finite index subgroup
of Z(αext ).
The map pα : Z(α) → Z(αext ) mentioned above goes as follows: given β ∈ Z(α), one
has β −1 αβ = α. The canonical reduction system of a braid behaves in a natural way with
respect to conjugations [8], meaning that CRS(β −1αβ) is the image of CRS(α) under
the mapping class β. But CRS(β −1 αβ) = CRS(α), hence β sends CRS(α) to itself, and
then it sends Cα to itself, too. Therefore, β can be decomposed along Cα , and pα (β) is just
the external braid corresponding to this decomposition. Notice that we do not necessarily
have Cβ = Cα (actually, β could even be periodic and Cβ could be empty), so pα (β) is
not necessarily βext (which could be not defined). pα (β) is the tubular braid described by
the action of β on Dn , by looking at the motion of the circles representing Cα and of the
punctures not enclosed by Cα .
3.2
Centralizers and roots
In this section we will state some further properties of centralizers and roots in the pure
braid group Pn , that will be useful later.
Proposition 3.2 Roots in Pn are unique. That is, if α, β ∈ Pn are such that αm = β m
for some m 6= 0, then α = β.
Proof. This can be obtained from the results in [22], and can also be found in [9].
Corollary 3.3 If α ∈ Pn is a pure braid, ZBn (α) = ZBn (αm ) for every m 6= 0.
9
✷
Proof. If γ ∈ ZBn (αm ) then γαm γ −1 = αm , so γαγ −1 and α are two pure m-th roots of
the same pure braid, hence they are equal, so γ ∈ ZBn (α).
✷
Corollary 3.4 If x ∈ Pn and y ∈ Bn are such that xk = y m for some nonzero integers k
and m, then the subgroup hx, yi ⊂ Bn is cyclic.
Proof. Let z = xk = y m . Notice that y ∈ ZBn (z) = ZBn (xk ) = ZBn (x) as x is pure,
hence x and y commute. As Bn is torsion-free, then hx, yi is isomorphic to either Z2 or
Z. But since xk = y m , it must be isomorphic to Z.
✷
Proposition 3.5 Every cyclic subgroup hxi ⊂ Pn is contained in a unique maximal cyclic
subgroup.
Proof. Suppose first that x is periodic. The set of periodic pure braids is precisely the
cyclic group h∆2 i. Therefore, h∆2 i is the desired maximal cyclic subgroup. Now suppose
that x is pseudo-Anosov, with √
dilatation factor λ. A k-th root of x will then be pseudok
Anosov, with dilatation factor λ. As the set of possible dilatation factors is discrete [3],
the set of positive integers k for which x admits a k-th root in Pn is finite. The k-th root
of x for which k is maximal is then a generator for a maximal cyclic subgroup containing
hxi. Finally, suppose that x is reducible non-periodic. Then xext is either periodic or
pseudo-Anosov, and it is also a pure braid (on fewer strands). If α is a pure k-th root
of x, then αext is a pure k-th root of xext (the canonical reduction system is preserved
by taking powers, so CRS(α) = CRS(x), and the external braids are just obtained by
emptying the tubes). Hence, as there is a maximal k such that a k-th root of xext exists,
there is also a maximal k for which a k-th root of x exists. Such k-th root is a generator
of the desired cyclic subgroup containing hxi.
The uniqueness of the maximal cyclic subgroup follows from Corollary 3.4.
✷
Proposition 3.6 Let α ∈ Pn with n ≥ 2. The centralizer ZPn (α) is as follows:
• If α is periodic, ZPn (α) = ZPn (h∆2 i) = Pn .
• If α is pseudo-Anosov, ZPn (α) ≃ Z2 , consisting of all pure braids admitting a representative which preserves the same two foliations as α.
• If α is reducible, ZPn (α) ≃ ZPm1 (α1 ) × · · · × ZPmk (αk ) × ZPm (αext ), where α1 , . . . , αk
and αext are the internal and external braids, respectively, defined for α. Moreover,
m1 + · · · + mk + m = n + k.
Therefore, in any case, ZPn (α) ≃ Pt1 ×· · ·×Ptr ×Zt for some r ≥ 0, where t1 +· · ·+tr +t ≤
n + r − 1.
10
Proof. The periodic case is clear, as the only periodic pure braids are the powers of
∆2 . If α is pseudo-Anosov, it follows from Theorem 3.1 that ZPn (α) is the subgroup of
ZBn (α) ≃ Z2 consisting of pure braids admitting a representative which preserves the same
two foliations as α. Now ZPn (α) cannot be cyclic, as it contains a pseudo-Anosov braid
(α) and a periodic braid (∆2 ), which cannot have a common power. Hence ZPn (α) ≃ Z2
in this case.
Suppose finally that α is reducible. By Theorem 3.1, we have that
ZBn (α) = ZBm1 (α1 ) × · · · × ZBmk (αk ) ⋊ Z0 (αext ).
Notice that α1 , . . . , αk and αext are pure braids, and that mi is the number of strands of
the braid αi . Recall also that Z0 (αext ) ⊂ ZBm (αext ), where m is the number of strands of
αext .
Now ZPn (α) = ZBn (α) ∩ Pn , hence we need to describe the pure elements in the above
semidirect product. The left factor just becomes ZPm1 (α1 ) × · · · × ZPmk (αk ). For the
second factor, we need to describe the subgroup Z0 (αext ) with more detail, as it is done in
[25]. The group ZBm (αext ) (whose elements can be seen in Bn as braids made of strands
and tubes, with trivial braids inside the tubes) acts on ZBm1 (α1 ) × · · · × ZBmk (αk ) by
permuting coordinates (conjugating in Bn by the tubular braid, just permutes the tubes).
Then Z0 (αext ) is the subgroup formed by the elements whose induced permutation acts
as follows: if i is sent to j, then αi is conjugate to αj .
Now take a pure element in ZBm (αext ). Its induced permutation is trivial, hence it
belongs to Z0 (αext ). This means that Z0 (αext ) ∩ Pm = ZBm (αext ) ∩ Pm = ZPm (αext ).
Moreover, the action of this group on ZPm1 (α1 ) × · · · × ZPmk (αk ) is trivial. Hence the
semidirect product becomes a direct product when restricted to Pn , and hence:
ZPn (α) = ZPm1 (α1 ) × · · · × ZPmk (αk ) × ZPm (αext ).
Now recall that m1 , . . . , mk and m are, respectively, the number of strands of α1 , . . . , αk
and αext . By the decomposition of α into the internal braids α1 , . . . , αk and the external
braid αext , it follows that the punctured disc Dn is obtained from the punctured disc Dm
by replacing k punctures with the k punctured discs Dm1 , . . . , Dmk . At each replacement,
a puncture is replaced by mi punctures. Hence n = m + (m1 − 1) + · · · + (mk − 1), so
m1 + · · · + mk + m = n + k as we wanted to show. We remark that if α is not pure, this
equality becomes an inequality, m1 + · · · + mk + m ≤ n + k, as the permutation induced
by α on the tubes may contain nontrivial cycles, and there is just one internal braid for
each cycle. But in our case, as α is pure, the equality holds.
Notice that, if we define r ∗ = r − 1 for every positive integer r, the above equality
reads m∗1 + · · · + m∗k + m∗ = n∗ .
Now if some αi is reducible an not periodic, we can decompose ZPmi (αi ) into a direct
product of pure centralizers. We can keep doing this until all braids involved are either
periodic or pseudo-Anosov (recall that at every iteration the braids involved have fewer
strands, and in B2 all braids are periodic). Hence we will obtain
ZPn (α) = ZPt1 (β1 ) × · · · × ZPts (βs ),
11
where we can assume that β1 , . . . , βr are periodic, and βr+1 , . . . , βs are pseudo-Anosov.
Also, by induction on the number of strands it follows that t∗1 + · · · + t∗s = n∗ , that is,
t1 + · · · + ts = n + s − 1. But then
ZPn (α) = Pt1 × · · · × Ptr × Z2(s−r) .
Let t = 2(s − r). As every pseudo-Anosov braid has at least 3 strands, one has 3(s − r) ≤
tr+1 + · · · + ts , so t1 + · · · + tr + t = t1 + · · · + tr + 3(s − r) − (s − r) ≤ t1 + · · · + ts − (s − r) =
n + s − 1 − (s − r) = n + r − 1.
✷
Concerning the geometric dimension of Bn , the case of proper actions is well known
for mapping class groups in general: given a mapping class group Γbg,n of a connected
orientable surface of genus g, with n punctures and b boundary components, it is known
that gd Γbg,n = vcd Γbg,n , where vcd G is the virtual cohomological dimension of a group G.
This follows from Harer [28] for b > 0, has been showed by Hensel, Osajda, and Przytycki
[29] when b = 0 and n > 0, and by Aramayona and Martı́nez [1] when b = 0 and n = 0.
The virtual cohomological dimension of Γbg,n was computed by Harer in the mentioned
paper. The case we are interested in is Bn = Γ10,n , and by Harer’s formula we obtain:
gd Bn = vcd Bn = n − 1.
This equality is also consequence of the results in ([2], section 3).
In this paper we are interested in gd Bn . We can easily find a lower bound thanks to
the following result.
Proposition 3.7 The pure braid group Pn (and hence Bn ) contains a subgroup isomorphic to Zn−1 .
Proof. We define explicit generators, a1 , . . . , an−1 , as follows:
ai = (σi σi+1 · · · σn−1 )(σn−1 · · · σi+1 σi ).
One can check that these elements commute with each other just by drawing the corresponding braids, or by applying the braid relations. As Pn is torsion-free, these elements
generate a free abelian subgroup of Pn . To check that its rank is n − 1, just define a
projection π : Pn → Zn−1 which sends a pure braid α to π(α) = (x1 , . . . , xn−1 ), where xi
is the algebraic number of crossings of the strands i and n in the braid α, divided by 2.
This projection is a well defined homomorphism, and its restriction to ha1 , . . . , an−1 i is
surjective as π(ai ) = (0, . . . , 0, 1, 0, . . . , 0) with the 1 in position i.
✷
Corollary 3.8 gd B2 = gd P2 = 0, and gd Bn ≥ gd Pn ≥ n for n ≥ 3.
Proof. First, B2 ≃ P2 ≃ Z, so gd B2 = gd P2 = 0. Assume n ≥ 3. The first inequality
holds as Pn is a subgroup of Bn . Finally, as gd Zn−1 = n for n ≥ 3 (Example 5.21 in
[39]), the second inequality follows from Proposition 3.7.
✷
12
Some upper bounds for gd Bn are already known. In [33] such a bound is given for
any mapping class group Γbg,n of a compact orientable surface with punctures and negative
Euler characteristic. In the particular case of braid groups with n ≥ 2 (in order to have
negative Euler characteristic) and m ≥ 3 this bound is:
gd Bn ≤ [Bn : Bn [m]] · (vcd Bn + 1) = [Bn : Bn [m]] · n,
where Bn [m] is the m-th congruence subgroup of Bn , that is the subgroup of elements
which act trivially on H1 (Dn , Z/m).
Notice that the fundamental group of Dn is the free group Fn of rank n, hence the first
homology group is H1 (Dn , Z/m) ≃ (Z/m)n . It is well known [7] that the action of the
braid group (by automorphisms) on the fundamental group of Dn coincides with the Artin
representation Bn → Aut(Fn ), (see [5]). The action induced by this homomorphism on
the abelianization of Fn sends a braid α to the automorphism of Zn which just permutes
the coordinates in the same way as α permutes its strands. Therefore, the action of
α ∈ Bn on H1 (Dn , Z/m) is just given by permuting the coordinates in the same way as
α permutes its strands. This means that the elements which induce the trivial action are
precisely the pure braids. Hence Bn [m] = Pn for every m ≥ 2.
It follows that [Bn : Bn [m]] = [Bn : Pn ] = n! Hence, the above upper bound for gd Bn
is n! n. The goal of this paper is to show that gd Bn = n.
4
Commensurators
The main tool that we are going to use to compute geometric dimensions with respect
to the family of virtually cyclic groups is Lück-Weiermann’s Theorem 2.5, and a necessary step in our calculation will be to describe the commensurators of the virtually cyclic
subgroups generated by periodic or pseudo-Anosov braids. This task will be undertaken
in this section, while in the last one we will use different tools to compute the dimensions in the reducible non-periodic case. We start by reviewing some facts concerning
commensurators that will be needed in the rest of the paper.
Definition 4.1 Given an inclusion H < G of groups, the commensurator of H in G is
the group:
CommG (H) = {x ∈ G| [H : H ∩ H x ] < ∞ and [H x : H ∩ H x ] < ∞}.
We will be mainly interested in the case in which H is a virtually cyclic subgroup of
G. In this case, the previous definition is equivalent to:
CommG (H) = {x ∈ G| |H ∩ H x | = ∞}.
Note that this definition implies that, given the equivalence relation defined just before
Definition 2.4 over the virtually cyclic infinite subgroups of a group, and [H] an equivalence
class, NG [H] = CommG (H).
When computing the geometric dimension of Bn , we will make frequent use of the
following result of Degrijse-Petrosyan:
13
Theorem 4.2 ([14], 4.2) If H < G is virtually cyclic, and such that H ≃ Z and H ✂
CommG (H), then gdF [H] (CommG (H)) = gd (CommG (H)/H).
After these preliminaries we are ready for computing the commensurators of the virtually cyclic subgroups of Bn . Recall that, as Bn is torsion-free, any non-trivial virtually
cyclic group of Bn is infinite cyclic. The following lemma will be very useful, as it identifies
the commensurators with normalizers of subgroups, in the classic sense:
Lemma 4.3 Let H = hyi < Bn be a cyclic subgroup. Then there exists a braid x such
that:
• CommBn (H) = NBn (hxi).
• The braids x and y belong to the same cyclic group.
• The braid x is pure, and no proper root of x is pure.
Proof. This result is similar to Proposition 4.8 in [33], but we provide a proof adapted
to braid groups.
Let m be the smallest positive integer such that z = y m is a pure braid, and let x be a
generator of the maximal cyclic subgroup in Pn containing hzi (see Proposition 3.5). We
will see that x satisfies the properties in the statement. Clearly, it satisfies the third one
by construction.
Notice that xk = z = y m for some nonzero integers k and m. Hence by Corollary 3.4
hx, yi is cyclic, so the second property also holds.
Let us finally show that CommBn (hyi) = NBn (hxi). Let γ ∈ CommBn (hyi). This
means that |hγyγ −1i ∩ hyi| = ∞. As every nontrivial braid has a pure nontrivial power,
this intersection must contain an infinite number of pure braids, so |hγxγ −1 i ∩ hxi| = ∞,
hence γxp γ −1 = xq for some nonzero integers p and q. We will now show that p = ±q.
If x is periodic (and pure), xp is a nontrivial power of ∆2 , which is central. Hence
p −1
γx γ = xp , so xp = xq and, as Bn is torsion-free, p = q in this case. If x is pseudoAnosov and its dilatation factor is λ, the dilatation factor of xp is λ|p|, and the dilatation
factor of xq is λ|q| . As dilatation factors are preserved by conjugations, it follows that
|p| = |q|, as we wanted to show. (It is worth mentioning that a conjugation may transform
x into its inverse. For instance, in B3 we have ∆(σ1 σ2−1 )3 ∆−1 = (σ1 σ2−1 )−3 .) Now suppose
that x is reducible. Then xext is either periodic or pseudo-Anosov, and γ sends CRS(x)
to itself. Hence px (γ)(xext )p px (γ)−1 = (xext )q . Applying the claim to xext , it follows that
p = ±q, as desired.
If p = q then γxq γ −1 = xq , so γ ∈ ZBn (xq ) = ZBn (x) and then γ ∈ ZBn (hxi) ⊂
NBn (hxi). If p = −q then γx−q γ −1 = xq , so γx−1 γ −1 and x are two pure q-th roots of the
same pure braid, hence they coincide, and then γ ∈ NBn (hxi).
Conversely, suppose that γ ∈ NBn (hxi). This means that either γxγ −1 = x or γxγ −1 =
x−1 . Recall that y k = z = xm for some nonzero integers k and m. Then γy k γ −1 =
γxm γ −1 = x±m = y ±k ∈ hγyγ −1i ∩ hyi = H γ ∩ H, so |H γ ∩ H| = ∞. This shows that
γ ∈ CommBn (H), finishing the proof.
✷
14
We shall use the following results later. They can be deduced from the previous lemma,
but the first one can also be showed independently.
Lemma 4.4 If y ∈ Bn is periodic and nontrivial, then CommBn (hyi) = Bn .
Proof. If y is periodic, y m is central for some nonzero integer m, that is, y m = ∆2k
for some nonzero integer k. Then, for every α ∈ Bn , the conjugate αyα−1 is such that
(αyα−1)m = α∆2k α−1 = ∆2k . Hence hyi ∩ hαyα−1i ⊃ h∆2k i, so α ∈ CommBn (hyi).
✷
Corollary 4.5 If y ∈ Bn is pseudo-Anosov, then CommBn (hyi) is isomorphic to either
Z2 or an extension of Z2 by Z/2.
Proof. By Lemma 4.3, there is some x ∈ Pn such that CommBn (hyi) = NBn (hxi) As
x is a root of a power of y, it is also pseudo-Anosov, hence ZBn (hxi) ≃ Z2 . Now notice
that for any α ∈ NBn (hxi), either α−1 xα = x or α−1 xα = x−1 . If all elements are of the
first kind, then NBn (hxi) = ZBn (hxi) ≃ Z2 . Otherwise, we have the following short exact
sequence:
p
1 −→ ZBn (hxi) −→ NBn (hxi) −→ Z/2 −→ 1
where p(α) = 0 if α−1 xα = x, and p(α) = 1 if α−1 xα = x−1 . As ZBn (hxi) ≃ Z2 the result
holds.
✷
5
Classifying space for the family of virtually cyclic
groups
In this section we will compute gd Bn , which is the major achievement of this paper. Our
result is:
Theorem 5.1 The geometric dimension of Bn with respect to the family of virtually cyclic
subgroups is n, for n ≥ 3.
We devote this whole section to prove this result, and assume from now on that n ≥ 3.
According to Corollary 3.8, gd Bn ≥ n. Then, we must prove that n is also an upper
bound for this geometric dimension. As said above, we base our arguments on the main
theorem 2.5 of Lück-Weiermann, and we need to bound the three geometric dimensions
that appear Corollary 2.9. The first two bounds are quite straightforward, and we will
deal with them later. So let us concentrate in gdF [H] NBn [H], which has to be upper
bounded by n.
Recall from Lemma 4.3 that we can assume that H is generated by a pure braid x
which admits no proper roots, and that NBn [H] = CommBn (H) = NBn (H). But every
subgroup is normal in its normalizer, hence by Theorem 4.2 we have gdF [H] (NBn [H]) =
gd (NBn [H]/H). Hence we need to upper bound gd (NBn [H]/H) by n.
15
We invoke again Nielsen-Thurston theory to divide the computation in three cases.
Notice that if the original generator of y was periodic (respectively pseudo-Anosov or
reducible), then so is the pure element x given by Lemma 4.3, as it is a root of a power
of y.
1. Periodic case. Suppose that H = hxi where x is periodic. According to
Lemma 4.4, CommBn (H) = Bn , and as x is pure, periodic and has no proper roots,
x = ∆±2 . Therefore gd (NBn [H]/H) = gd (Bn /Z(Bn )), being Z(Bn ) = h∆2 i the center
of Bn . It is known that Bn /h∆2 i is a subgroup of Γ0,n+1, the mapping class group of the
sphere with n + 1 punctures, and it is a consequence of work of [29] and [28] that the
proper geometric dimension of Γ0,n+1 is n − 2. Hence, gd (NBn [H]/H) ≤ n − 2 in this
case.
2. Pseudo-Anosov case. Suppose now that x is pseudo-Anosov. By Corollary 4.5,
we know that CommBn (H) is either Z2 or an index 2 extension of Z2 . Without loss of
generality, we may assume that x is a power of one of the two generators of Z2 . Hence,
CommBn (H)/H is isomorphic to a finite extension of Z ⊕ Z/m (m = 1 is allowed). Applying Theorem 5.26 of [36], we obtain that gd CommBn (H)/H = 1, the Hirsch number,
and hence gd (NBn [H]/H) = 1 in this case.
3. Reducible, non-periodic case. Suppose finally that x is reducible and not periodic. We will find an upper bound gd (NBn (H)/H) basing our strategy in the following
result of C. Martı́nez (Theorem 2.5 in [42]):
Theorem 5.2 For any discrete group Γ, the following inequality holds:
cd Γ ≤
max {pdZWΓ F B(WΓ F ) + rk(WΓ F )}.
F ∈FFin (Γ)
Here pd is the projective dimension over the corresponding group ring, WΓ F = NΓ F/F
is the Weyl group, and B(WΓ F ) is the module of bounded functions over WΓ F (see the
mentioned paper for details about these concepts). Moreover, rk(WΓ F ) is the rank of a
maximal elementary abelian subgroup of WΓ F , as usual. Recall from Proposition 2.8 that
for any group G, cd G = gd G except possibly in the case gd G = 3. From now on we
assume Γ = NBn (H)/H, and we should bound the previous sum.
We first deal with the term pdZWΓ F B(WΓ F ). By Lemma 7.3 in [34], pdZWΓ F B(ZWΓ F ) ≤
pdZΓ B(ZΓ) for every finite F < Γ. Moreover, if we can prove that Γ is virtually torsionfree, Lemma 3.9 in [41] implies that the latter coincides with vcd(Γ), the virtual cohomological dimension of Γ, and we would have:
cdΓ ≤
max {vcd(Γ) + rk(WΓ F )}.
F ∈FFin (Γ)
Let us then show that this is true:
Lemma 5.3 The group Γ is virtually torsion-free.
p
Proof. We will use the short exact sequence 1 → Pn → Bn → Σn → 1, which we can
restrict to NBn (H):
p
1 −→ NBn (H) ∩ Pn −→ NBn (H) −→ G −→ 1,
16
where G = p(NBn (H)) ⊂ Σn is a finite group.
Recall that H = hxi where x is pure. Then H ✂ (NBn (H) ∩ Pn ) and H ✂ NBn (H), so
we can quotient the above injection by H and we obtain:
p
1 −→ (NBn (H) ∩ Pn )/H −→ Γ −→ G −→ 1.
We need to show that (NBn (H) ∩ Pn )/H is torsion-free.
Let αH ∈ (NBn (H) ∩ Pn )/H be a torsion element. That is, α ∈ NBn (H) ∩ Pn is
such that αm ∈ H for some nonzero integer m. This means that αm = xk for some
nonzero integers m and k. By Corollary 3.4, hα, xi is a cyclic subgroup, which belongs
to Pn as it is generated by pure braids. As hxi is a maximal cyclic subgroup in Pn ,
we get hα, xi = hxi = H, so α ∈ H and αH is trivial in (NBn (H) ∩ Pn )/H. Hence
(NBn (H) ∩ Pn )/H is torsion-free.
✷
Now we can obtain our bound for the projective dimension.
Lemma 5.4 The virtual cohomological dimension of Γ is bounded above by n − 2.
Proof. We saw in the previous lemma that (NBn (H) ∩ Pn )/H is a torsion-free, finite
index subgroup of Γ. Hence, we must show that cd ((NBn (H) ∩ Pn )/H) ≤ n − 2.
Notice that NBn (H)∩Pn = NPn (H). Now we point out that the pure braid group Pn is
bi-orderable [44]. This means that there is a total order of its elements which is invariant
under multiplication on the left and also on the right. In such an order, if an element is
positive (greater than the neutral element) its inverse is negative, and viceversa. Recall
that H = hxi. If x > 1, then ax > a and hence axa−1 > 1 for every a ∈ Pn . Analogously,
if x < 1 then axa−1 < 1 for every a ∈ Pn . This means that, in Pn , x cannot be conjugated
to its inverse. Therefore NPn (H) = ZPn (H).
Now recall from Proposition 3.6 that ZPn (H) = Pt1 × · · · × Ptr × Zt , where r, t ≥ 0
and t1 + · · · + tr + t ≤ n + r − 1.
Let C be the center of ZPn (H). As the center of each Pti is cyclic (generated by ∆2ti ),
it follows that C ≃ Zr+t . Denote by Gi the quotient of Pti by its center, which is a (finite
index) subgroup of the mapping class group Γ0,ti +1 of the (ti + 1)-times punctured sphere.
Then ZPn (H)/C = G1 × · · · × Gr .
We then have the following short exact sequence, which is a central extension:
1 −→ C −→ ZPn (H) −→ G1 × · · · × Gr −→ 1.
Moreover, as H is central in ZPn (H), we can quotient by H and obtain:
1 −→ C/H −→ ZPn (H)/H −→ G1 × · · · × Gr −→ 1.
Recall that we want to bound the cohomological dimension of the middle group. It is
important to remark that all groups involved in the above exact sequence are torsion-free:
First, we have shown in the previous lemma that ZPn (H)/H is torsion-free, hence so is
its subgroup C/H. On the other hand, a torsion element in Gi = Pti /h∆2ti i comes from a
17
periodic element in Pti . But the only pure braids which are periodic in Pti are the powers
of ∆2ti , hence Gi is torsion-free for every i.
Now it follows from Theorem 5.15 in [36] that gd G = gd G is subadditive for extensions of torsion-free groups. Hence
gd(ZPn (H)/H) ≤ gd(C/H) + gd(G1 ) + · · · + gd(Gr ).
Now C ≃ Zr+t , and H is a cyclic subgroup which is maximal. Hence C/H ≃ Zr+t−1 , and
gd(C/H) = r + t − 1. Also, each Gi is a subgroup of the mapping class group Γ0,ti +1 , so
gd(Gi ) = gd (Gi ) ≤ gd (Γ0,ti +1 ) = ti − 2. We then have:
gd(ZPn (H)/H) ≤ (r + t − 1) + t1 + · · · + tr − 2r ≤ r − 1 + (n + r − 1) − 2r = n − 2.
Therefore gd(ZPn (H)/H) ≤ n − 2. As cd G = gd G except in the case cd G = 2 and
gd G = 3, it follows that cd(ZPn (H)/H) ≤ n − 2.
✷
Remark 5.5 A different proof of the previous lemma follows from a direct application of
the Gysin sequence (see for example [46], 5.12), but we prefer the one we provide because
it includes an explicit description of the normalizer.
Now, in order to bound the second term of the sum in Theorem 5.2, we need to
understand the torsion of Γ.
Lemma 5.6 Any finite subgroup of Γ is cyclic.
Proof. Consider the natural projection p : NBn (H) → NBn (H)/H = Γ. Let F be a
finite subgroup of Γ, and let G = p−1 (F ). Consider the restriction of p to G. Its image is
finite, and its kernel is a subgroup of H, so is cyclic. Hence G is a virtually cyclic group.
As G ⊂ Bn , which is torsion-free, G is cyclic. Hence p(G) = F is also cyclic.
✷
We are now in a good position to deal with the rank of Weyl groups, and our bound
will be a consequence of the following lemma:
Lemma 5.7 For every finite F < Γ, every finite group of the Weyl group WΓ F is cyclic,
and in particular, rk(WΓ F ) = 1.
Proof. Let F < Γ be finite. Consider the short exact sequence:
p
1 −→ F −→ NΓ F −→ NΓ F/F −→ 1,
where p is the natural projection.
Let X be a finite subgroup of NΓ F/F = WΓ F , and let Y = p−1 (X). Then Y is an
extension of Y ∩F by X, which are both finite groups. Hence Y is finite. As Y ⊂ NΓ F ⊂ Γ,
by Lemma 5.6 Y is cyclic. Hence X = p(Y ) is also cyclic.
Observe, in particular, that this implies that rk(WΓ F ) = 1 for every finite F in Γ.
✷
Now we can join the previous information to obtain:
18
Proposition 5.8 The proper geometric dimension of Γ is smaller or equal to n−1, except
possibly in the case when gd Γ = 3, in which it can be at most n.
Proof.
By Theorem 5.2, Lemma 5.4 and Lemma 5.7, we have cd Γ ≤ n − 1. Hence by
Proposition 2.8, cd Γ = gd Γ ≤ n − 1, except possibly when cd Γ = 2 and gd Γ = 3.
✷
Proof of Theorem 5.1.
Let Bn be the full braid group, for n ≥ 3. First, as Pn < Bn , Corollary 3.8 implies
that gd Bn ≥ n.
To check the other equality, we make use of Lück-Weiermann model, and in particular
the dimensional conditions of Corollary 2.9:
• We know (by [2] or [28], see Section 3 above) that the geometric dimension gd Bn
is always n − 1, so it is smaller than n.
• As NBn [H] ⊆ Bn for every cyclic H < Bn , gd NBn [H] ≤ gd Bn ≤ n − 1.
• Let n ≥ 3 and H < Bn cyclic. If H is generated by a periodic or a pseudo-Anosov
braid, it was stated above that gdF [H] NBn [H] ≤ n − 2, and in particular smaller
than n. If H is generated by a reducible non-periodic braid, the previous proposition
states that gdF [H] NBn [H] ≤ n.
Now appealing to Corollary 2.9, gd Bn ≤ n, and thus gd Bn = n. So we are done.
✷
The same is true for pure subgroups of Bn :
Corollary 5.9 We have gd Pn = n for n ≥ 3.
Proof. The bound gd Pn ≥ n was proved in Corollary 3.8, while gd Pn ≤ n is a
consequence of Theorem 5.1, taking into account Remark 2.2.
✷
References
[1] J. Aramayona and C. Marı́nez-Pérez, The proper geometric dimension of the mapping
class group, Algebr. Geom. Topol. 14 (2014), 217–227.
[2] V. Arnold, On some topological invariants of algebraic functions, Trans. Moscow
Math. Soc. 21 (1970), 33–52.
[3] P. Arnoux, J. Yoccoz, Construction de diffeomorphismes pseudo-Anosov, C. R. Acad.
Sci. Paris 292 (1981), 75-–78.
[4] E. Artin, Theorie der Zp̈fe, Abh. Math. Sem. Univ. Hamburg 4 (1925), no. 1, 47—72.
19
[5] E. Artin, Theory of braids, Ann. of Math. (2) 48 (1947), 101-–126.
[6] P. Baum, A. Connes and N. Higson, Classifying space for proper actions and Ktheory of group C ∗ -algebras, in C ∗ -algebras: 1943-1993, 240–291, Contemp. Math.,
167, Amer. Math. Soc., Providence, RI, 1994.
[7] J. S. Birman, Braids, links, and mapping class groups, Annals of Mathematics Studies, No. 82. Princeton University Press, Princeton, N.J.; University of Tokyo Press,
Tokyo, 1974.
[8] J. S. Birman, A. Lubotzky and J. McCarthy, Abelian and solvable subgroups of the
mapping class groups, Duke Math. J. 50 (1983), 1107-–1120.
[9] C. Bonatti and L. Parı́s, Roots in the mapping class groups, Proc. Lond. Math. Soc.
98 (2009), 471–503.
[10] N. Brady, I. Leary and B. Nucinkis, On algebraic and geometric dimensions for groups
with torsion, J. London Math. Soc. 64 (2001), 489-–500.
[11] W.-L. Chow. On the algebraical braid group, Ann. of Math. (2), 49 (1948), 654-–658.
[12] D. Degrijse, R. Köhl and N. Petrosyan, Classifying spaces with virtually cyclic stabilizers for linear groups, Transformation Groups 20 (2015), 381–394.
[13] D. Degrijse and N. Petrosyan, Commensurators and classifying spaces with virtually
cyclic stabilizers, Groups Geom. Dyn. 7 (2013) 543—555.
[14] D. Degrijse and N. Petrosyan, Geometric dimension of groups for the family of virtually cyclic subgroups, J. Topol. 7 (2014) 697—724.
[15] D. Degrijse and N. Petrosyan, Bredon cohomological dimensions for groups acting on
CAT(0)-spaces, Groups Geom. Dyn. 9 (2015), 1231—1265.
[16] T. Farrell and L. Jones, Isomorphism conjectures in algebraic K-theory, J. Amer.
Math. Soc., 6 (1993), 249—297.
[17] M. Fluch, On Bredon (co-)homological dimensions of groups PhD Thesis,
arXiv:1009.4633.
[18] M. Fluch and I. Leary, An Eilenberg-Ganea phenomenon for actions with virtually
cyclic stabilisers Groups Geom. Dyn. 8 (2014), 135-–142.
[19] M. Fluch and B. Nucinkis, On the classifying space for the family of virtually cyclic
subgroups for elementary amenable groups, Proc. Amer. Math. Soc. 141 (2013), 3755–3769.
[20] D. Gonçalves and J. Guaschi, The classification of the virtually cyclic subgroups of
the sphere braid groups SpringerBriefs in Mathematics, Springer, 2013.
20
[21] J. González-Meneses, Ordering pure braid groups on compact, connected surfaces,
Pacific J. of Math. 203 (2002) 369–378.
[22] J. González-Meneses, The n-th root of a braid is unique up to conjugacy, Alg. Geom.
Top. 3 (2003), 1103–1118.
[23] J. González-Meneses, Basic results on braid groups, Annales Mathématiques Blaise
Pascal 18 (2011) 15–59.
[24] J. González-Meneses, On reduction curves and Garside properties of braids, Contemp.
Math. 538 (2011), 227–244.
[25] J. González-Meneses and B. Wiest, On the structure of the centralizer of a braid,
Ann. Sci. Éc. Norm. Sup. 37 (2004), 729–757.
[26] J. Guaschi and D. Juan-Pineda, A survey of surface braid groups and the lower algebraic K-theory of their group rings, In Handbook of Group Actions 23–76, Advanced
Lectures in Mathematics 32, International Press of Boston Inc., 2015.
[27] T. Haettel, D. Kielak and P. Schwer, The 6-strand braid group is CAT(0) Geom.
Dedicata 182 (2016), 263-–286.
[28] J. Harer, The virtual cohomological dimension of the mapping class group of an orientable surface, Invent. Math, 84 (1986), 157–176.
[29] S. Hensel, D. Osjada and P. Przytycki, Realisation and dismantlability, Preprint
arXiv:1205.0513.
[30] A. Hurwitz, Uber Riemannsche Flächen mit gegebenen Verzweigungspunkten, Math.
Ann. 39, no. 1 (1891), 1–60.
[31] D. Juan-Pineda and I. Leary, On classifying spaces for the family of virtually cyclic
subgroups Contemp. Math. 407 (2006), 135–145.
[32] D. Juan-Pineda and J. Sánchez-Saldaña, The K and L theoretic Farrell-Jones isomorphism conjecture for braid groups Preprint arXiv:1511.02737.
[33] D. Juan-Pineda and A. Trujillo-Negrete, On classifying spaces for the family of virtually cyclic subgroups in mapping class groups, Preprint arXiv:1606.00306.
[34] P. Kropholler and G. Mislin, Groups acting on finite-dimensional spaces with finite
stabilizers, Comment. Math. Helv. 73 (1998), 122—136.
[35] J. Lafont and I. Ortiz, Relative hyperbolicity, classifying spaces, and lower algebraic
K-theory Topology 46 (2007), 527–553.
[36] W. Lück, Survey on classifying spaces for families of subgroups, in Infinite groups:
geometric, combinatorial and dynamical aspects, 269—322, Progr. Math., 248,
Birkhäuser, Basel, 2005.
21
[37] W. Lück, On the classifying space of the family of finite and of virtually cyclic subgroups for CAT(0)-groups, Münster J. of Math. 2 (2009), 201–214.
[38] W. Lück and H. Reich, The Baum-Connes and the Farrell-Jones conjectures in Kand L-theory In Handbook of K-theory, 703–842, Springer.
[39] W. Lück and M. Weiermann, On the classifying space of the family of virtually cyclic
subgroups, Pure Appl. Math. Q. 8, (2012), 497–555.
[40] D. Macpherson, Permutation groups whose subgroups have just finitely many orbits,
in Ordered groups and infinite permutation groups, 221–230, Kluwer Academic Publishers, 1996.
[41] C. Martı́nez-Pérez, A bound for the Bredon cohomological dimension for groups, J.
of Group Theory 10 (2007), 731–747.
[42] C. Martı́nez-Pérez, Euler classes and Bredon cohomology for groups with restricted
families of finite subgroups, Math. Z. 275 (2013), 761—780.
[43] G. Mislin and A. Valette, Proper group actions and the Baum-Connes conjecture, in
Advanced courses in Mathematics, no. 55, CRM Barcelona, 2003.
[44] D. Rolfsen, J. Zhu, Braids, Orderings and zero divisors, J. Knot Theory Ramif. 7
(1998), no. 6, 837–ñ841.
[45] W. P. Thurston. On the geometry and dynamics of diffeomorphisms of surfaces, Bull.
Amer. Math. Soc., 19 No. 2 (1988), 417-–431.
[46] G.W. Whitehead, Elements of homotopy theory, Graduate Texts in Math., vol 61,
Springer-Verlag, 1978.
Ramón Flores:
Dpto. Geometrı́a y Topologı́a.
Facultad de Matemáticas
Instituto de Matemáticas (IMUS)
Universidad de Sevilla
Av. Reina Mercedes s/n
41012 Sevilla (SPAIN)
E-mail: [email protected]
URL: www.personal.us.es/ramonjflores
Juan González-Meneses:
Dpto. Álgebra.
Facultad de Matemáticas
Instituto de Matemáticas (IMUS)
Universidad de Sevilla.
Av. Reina Mercedes s/n
41012 Sevilla (SPAIN)
E-mail: [email protected]
URL: www.personal.us.es/meneses
22
| 4math.GR
|
Multi-Objective Event-triggered Consensus of
Linear Multi-agent Systems
Amir Amini, Student Member, IEEE, Arash Mohammadi, Member, IEEE and Amir Asif, Senior
arXiv:1702.06285v1 [cs.SY] 21 Feb 2017
Member, IEEE
Abstract
This paper proposes a distributed consensus algorithm for linear event-based heterogeneous multi-agent
systems (MAS). The proposed scheme is event-triggered in the sense that an agent selectively transmits
its information within its local neighbourhood based on a directed network topology under the fulfillment
of certain conditions. Using the Lyapunov stability theorem, the system constraints and event-triggering
condition are expressed in terms of several linear matrix inequalities (LMIs) to derive the consensus parameters. The objective is to design the transmission threshold and minimum-norm heterogeneous control gains
which collectively ensure an exponential consensus convergence rate for the closed-loop systems. The LMI
computed control gains are robust to uncertainty with some deviation from their nominal values allowed.
The practicability of the proposed event-based framework is further studied by proving the Zeno behaviour
exclusion. Numerical simulations quantify the advantages of our event-triggered consensus approach in
second-order, linear and heterogeneous multi-agent systems.
Index Terms— Multi-agent Systems, Event-based Consensus, Multi-objective Control Design,
Linear Matrix Inequalities.
I. Introduction
Among many cooperative behaviors in multi-agent systems (MAS), consensus has attracted considerable
attention due to its vast application in sensor networks, unmanned aerial vehicles (UAV), and mobile
robotic teams. Related works in this area primarily deal with the problem of distributed consensus, where
all agents constantly transmit their information within the network [1]–[4]. Although various interesting
practical features have previously been studied to solve consensus in MASs, continuous data transmission
and continuous control input update are critical restrictions in practice. Therefore, in order to preserve
the limited and valuable energy allocated to local microprocessors installed on each agent, strategies which
decrease data transmission and control input updates are of great interest [5], [6]. In this regard, periodic
time-triggered communication and control scheme were proposed in [7] and [8] to cope with consensus in
first and second-order integrators. Event-triggered broadcasting strategies, however, offer superior performance as they allow agents to transmit information, irrespective of time interval, and only if a predefined
triggering condition is satisfied. Motivated by early results in event-triggered control methods such as [9],
the authors in [10] extended the procedure to address the consensus problem of first-order integrators. More
2
recently, researchers have studied the event-based consensus problem from several aspects. For instance,
in [11] effective triggering rules are proposed to guarantee consensus of second-order agents in undirected
networks. In [12], event-based output consensus problem in heterogeneous linear MASs is investigated again
in undirected topologies. Moreover, the consensus problem of linear and nonlinear second-order MASs is
addressed in [13]. In [14], an edge event hybrid-driven rule is proposed to ensure second-order leader-following
consensus. The aforementioned methods are limited to integrators and are not capable of achieving eventbased consensus in more general linear agents with directed topologies. At the same time, most existing
event-based schemes addressing consensus, overlook control objectives and the closed-loop system is only
guaranteed to be stable [15], [16]. The use of multi-objective optimization is essential in practical applications
with multiple performance requirements [17]. Furthermore, a vast majority of the relevant works only design
a common control gain and share it among all agents to acquire consensus [15], [16], [18]. Such a design
approach is not completely distributed. In a fully distributed structure, each agent should be able to choose
a specific control gain, according to its own dynamics and connectivity within the communication network.
In addition, the aforementioned single-value control design methods are not capable of handling possible
heterogeneity among multi-agent system dynamics. As fully discussed in [19], control design problem for
consensus of heterogeneous MASs is nontrivial, and non-selection of control gains often lead to unstable
system behavior under directed networks.
As a powerful design method, linear matrix inequality (LMI) optimization guarantees system stability for
desired design objectives through convex optimization [20]. For a multi-objective problem such as minimum
gain resilient heterogeneous control design in an event-based communication scheme as is being considered
in this paper, an analytical solution to compute the design parameters is difficult (if not impossible) to
derive. As discussed earlier, analytical solutions proposed in the literature need strong assumptions on agent
dynamics or/and network topology, and no specific closed-loop performance is guaranteed. Formulating the
problem within an LMI framework is a practically feasible solution to pursue in many control applications
[21]–[25]. We note that deriving optimization matrix inequalities in a linear form is a non-trivial effort. Some
suggested consensus approaches result in bilinear matrix inequalities (BMIs) that are even more difficult to
solve [26], [27].
To address the aforementioned limitations, the paper investigates the problem of objective-based control
design for event-triggered consensus in heterogeneous linear MASs. The main contributions of the paper
are listed as follows: 1) To guarantee consensus, we couple the control gain design and event-triggering
function to benefit from multi-objective optimization. The proposed algorithm has an exponential consensus
convergence rate with robust minimum-norm control gains; 2) The proposed approach provides additional
degrees of freedom by designing heterogeneous control gains for event-triggered multi-agent networks. This is
a unique advancement over most of the existing works in event-triggered MASs where a common control gain
is used by the agents; 3) To the best of our knowledge, the event-triggered consensus problem has not been
considered previously in the context of heterogeneous second-order MASs with directed network topologies.
This is the first instance of incorporating multi-objective LMI optimization in consensus problems for second
3
order event-triggered heterogeneous MASs.
The remaining paper is organized as follows. Section 2 introduces required preliminary concepts. The
problem is stated in Section3. In Section 4, we proceed to formulate the multi-objective event-based consensus
problem. The algorithm to derive unknown design parameters within the LMI optimization is proposed in
Section 4. We provide simulation examples in Section 5 to evaluate the capability of the algorithm. Finally,
Section 6 concludes the paper.
II. Preliminaries and Graph Theory
Throughout the paper, we use normal alphabets to denote matrices or scalars, and bold letters to specify vectors. Notation Rm×n refers to (m × n) real-valued matrices. In what follows we present necessary
matrix notation and commonly-used operations for matrix A = {aij } ∈ Rm×n with real entries aij , and
B = {bij } ∈ Rm×n . |A|: Matrix with component-wise absolute value of A, i.e., { |aij | } ∈ Rm×n ; kAk: Frobenius
norm of A; AT : Transpose of A; A† : Pseudo inverse of A; λmin(max) (A): minimum (maximum) eigenvalue of A;
A > 0: A is symmetric positive definite, i.e., xT Ax > 0, ∀ x ∈ Rn ; A ≥ 0: A is symmetric semi-positive definite,
i.e., xT Ax ≥ 0, ∀ x ∈ Rn ; null(A): Null space of A, i.e., {x ∈ Rn | Ax = 0}; A⊗B: Kronecker product of A and
B; A ◦ B: Hadamard product of A and B; a(i,•) : The i-th row of matrix A, i.e., [ ai1 , . . . , ain ]. Similarly, for
vectors u ∈ Rn and v ∈ Rn , the term u ≤ v defines the component-wise inequality, i.e., ui ≤ vi , i = 1, . . . , N .
Moreover, kuk is the Euclidean norm of u, and 1n defines the (n×1) column vector with all elements equal
to one.
In symmetric block matrices, the asterisk ∗ represents the lower triangle block which is induced by
symmetry.
Lemma 1. Schur Complement [28].
Considering matrices R, Q, and S with appropriate dimensions, the following two statements are equivalent.
Q
S
> 0.
R > 0, Q − SR−1 S T > 0 ⇔
∗ R
Lemma 2. S-procedure [28].
Let T0 , T1 ∈ Rn×n be symmetric matrices. If there exists a scalar τ ≥ 0 such that T0 − τ T1 > 0, then the
following inequalities on T0 and T1 are satisfied
xT T0 x > 0,
∀x 6= 0
such that xT T1 x ≥ 0.
(1)
The communication network of a MAS consisting of N agents is modeled using a graph G = (V, E, A), where
V = {1, 2, ..., N } denotes the agent set, i.e., the i-th vertex indicates the i-th agent. The edge set E is defined
as the Cartesian product of the two sets, i.e., E ⊆ V × V. If agent j communicates its information to agent
i, then the pair (j, i) is an element of E denoted by j → i in graph representation. In a directed graph,
(j, i) ∈ E is not equivalent to (i, j) ∈ E. Term A = {aij } ∈ RN ×N denotes the weighted adjacency matrix for
graph G, where aii = 0, aij 6= 0 if (i, j) ∈ E, and aij = 0 if (i, j) ∈
/ E. The neighbor set of agent i is defined
4
by Ni = {j ∈ V | (i, j) ∈ E}. A directed graph contains a directed spanning tree if there exists a node in
the graph which has directed paths to all other nodes. The Laplacian matrix corresponding to G is defined
PN
as L = {lij } = D − A, where D = diag (deg1 , ..., degN ), with degi = j=1 aij . The Laplacian matrix has an
eigenvalue of zero if and only if the directed network contains a directed spanning tree. Under this condition,
all other eigenvalues have positive real components [29].
III. Problem Statement
Consider a multi-agent network system comprising of N agents with the general linear dynamics given by
ẋi (t) = Axi (t) + Bi ui (t),
1 ≤ i ≤ N.
(2)
where xi (t) ∈ Rn is the state vector at time instant t, and ui (t) ∈ Rm is the control input vector. Matrices
A and Bi , with appropriate dimensions, represent the system matrix and control input matrix, respectively.
Despite the common practice in event-based strategies ( [30], [16]) that assumes identical agents across the
network, we consider the input matrix Bi to be different among agents. The agent model defined in (2)
satisfies the controllability assumption for any pairs (A, Bi ). Moreover, the network configuration contains
a directed spanning tree.
Remark 1. As a large class of mechanical systems, we note that the heterogeneous second-order MASs can
be represented by (2).
A proposed distributed protocol ui (t) is said to solve the consensus problem if the following condition is
fulfilled.
Definition 1. Given any initial condition, the consensus problem is solved if and only if the state disagreement norm of any two agents in the network asymptotically converges to zero [31], i.e.,
lim k xi (t) − xj (t) k= 0,
t→∞
∀i, j ∈ V.
(3)
The agents share their information with the neighbors through a directed network to reach a common
state value. However, in order to decrease the number of transmissions in the distributed scheme, an efficient
event-triggering mechanism is of great interest. In the desired event-based strategy for data communication,
agent i observes its own state vector constantly. If a certain proposed condition with a designed threshold is
violated, it transmits the state vector to its neighboring agents. Upon receiving the data, node j, a neighbor
of agent i, updates its information regarding agent i by incorporating the newest received data. Denoting
ti0 , ti1 , . . . as the triggering time sequence of agent i, we define the most recently broadcasted information of
agent i for any interval between two consecutive triggering instants as follows
x̂i (t) = xi (tik ),
t ∈ [tik , tik+1 ).
(4)
5
In order to reach the consensus condition specified in Definition 1, the following distributed protocol for
agent i is proposed
ui (t) = ( Ki + ∆K i (t) )
X
( x̂i (t) − x̂j (t) ).
(5)
j∈Ni
Matrix Ki ∈ Rm×n is the nominal control gain to be designed for agent i, and ∆K i (t) is the additive unknown
norm-bounded, structured uncertainty in the controller parameter [32]. The control law proposed in (5)
depends only on the last transmitted states. Such a control structure leads to an event-based control input
update mechanism, meaning that the actuators receive input signals only on certain instants. Therefore,
the number of control input updates are lower [30]. Another specific characteristic of the proposed eventtriggered protocol (5) is assigning different control gains to individual agents, leading to a heterogeneous
controller design. Performance degradation due to the sensitivity of the closed-loop system to inaccuracies
in the control’s coefficients at the implementation stage is inevitable. Therefore, it is required to provide
some level of robustness in the design of the control parameters. Noting that the perturbation in control
parameters mainly happens due to inaccurate system modeling or round off errors, a practical solution
considered here is to develop resilient control design techniques. Since a rapid non-conservative convergence
rate is desirable in most applications, the control gain Ki ’s, here, are supposed to assure a sufficient fast
consensus with an exponential rate [33]. Unlike most work where convergence rate is neglected in the control
design, we are therefore interested to incorporate conditions for exponential stabilizing with other design
features. In the design of the proposed control law, we also minimize the norm of Ki ’s in order to avoid
large undesirable control inputs.
To summarize, we will design the event-triggered control law defined in (5) to reach consensus by assuring
the stability of the closed-loop system as the primitive focus while satisfying these objectives: I) Minimizing
the number of transmissions among the agents, leading to a lower number of control input updates; II)
Efficient performance by designing heterogeneous control parameters; III) Robustness to a predefined level
of uncertainty in the obtained control parameters; IV) Exponential rate of convergence, and; V) Minimizing
control gains to decrease control input effort.
IV. problem formulation
Let ei (t) = x̂i (t) − xi (t) denote the measurement error between the most recently transmitted state and
its instantaneous value for agent i. For the benefit of analyzing the MAS in a collective manner, we define
x(t) = [ xT1 (t) , . . . , xTN (t) ]T as the stacked state vector, and x̂(t) = [ x̂T1 (t) , . . . , x̂TN (t) ]T as the stacked vector
T
for the last transmitted states. We also define e(t) = [ eT1 (t) , . . . , eTN (t) ] as the stacked measurement error
vector, which is equivalent to
e(t) = x̂(t) − x(t).
(6)
Now, we combine (2) with the proposed controller (5) to obtain the following augmented closed-loop system
ẋ(t) = AhNi + B (K + ∆K (t)) Lhni x(t) + B ( K + ∆K (t) )Lhni e(t),
(7)
6
where Lhni = L ⊗ In . The new variable AhNi = IN ⊗ A is the global system matrix, and block-diagonal matrix
B = diag ( B1 , . . . , BN ) is the global control input matrix. The unknown control gains are accumulated in
matrix K = diag (K1 , . . . , KN ) and their corresponding, possibly time-variant, perturbation are denoted by
∆K (t) = diag ( ∆K 1 (t) , . . . , ∆K N (t) ). The latter matrix satisfies the following assumption.
Assumption 1. The following predefined upper bound (threshold) holds for ∆K (t) in all time instants t.
k ∆K (t) k ≤ δ.
(8)
A. System Transformation
Before we proceed to present the event-triggering scheme and control design procedure, it is necessary to
note that if A in (2) is unstable, then system matrix in (7) will be unstable since Lhni always contains a
zero eigenvalue [34]. Therefore, the goal is to reach consensus by establishing the stability of a transformed
version of the system. Another reason for using this approach is to utilize the well-developed results in the
Lyapunov method, which also provides a variety of performance indices beside ensuring the stability of the
system. Hence, we convert the consensus problem at hand, i.e., the closed-loop system defined in (7), into
an equivalent stability problem using an appropriate transformation. A proper state transformation, e.g.,
x̄(t) = T x(t), for achieving this objective needs to satisfy the following two conditions: (i) First, stability of
such a transformed system, x̄(t), must be equivalent to the consensus problem for the closed-loop system
defined by (7), and; (ii) All heterogeneous parameters Bi , and Ki should be involved in the transformed
system. It is worth mentioning that the transformations suggested in a majority of related works, such as [15]
and [34], are incapable of meeting the latter challenge and, thus, heterogeneous control gain design is not
applicable in such approaches.
In order to achieve the consensus condition defined in Definition 1, the Laplacian matrix is first nominated
as the transformation matrix, i.e., x̄(t) = L ⊗ In x(t). Using Laplacian L as the transformation matrix,
however, would result in a singular system, since L is not full ranked and thus the set of state disagreement
emerging in x̄(t) would be linearly dependent. Since dealing with singular systems brings several technical and
analytical difficulties [35], we remove one row of L to design the transformation matrix. The proposed solution
will eliminate system redundancy and provides a reduced full-rank system. Therefore, we let L̂ ∈ R(N −1)×N
denote a matrix which is obtained by removing one arbitrary row of the Laplacian matrix. The proposed
state transformation is, therefore, given by
xr (t) = L̂hni x(t),
(9)
where L̂hni = L̂ ⊗ In .
Lemma 3. It follows from (9) that xr (t) = 0 if and only if x1 (t) = · · · = xN (t). The consensus condition in
Definition 1 is satisfied when xr (t) = 0.
Proof. If xr (t) = 0, then according to (9) we have L̂hni x(t) = 0, which means x(t) belongs to the null space
of L̂hni , i.e., x(t) ∈ null (L̂hni ). Since the row sum of L, and similarly L̂, is zero, the null space of L̂hni is
7
given by 1N ⊗ xcns (t), i.e., x(t) ∈ null ⊗ (L̂hni ) = 1N ⊗ xcns (t), where xcns (t) is the consensus vector to which
all xi (t), (1 ≤ i ≤ N ), converge. Therefore, it is concluded that x1 (t) = · · · = xN (t) = xcns (t). Accordingly,
the consensus equation defined in (3) is satisfied. The statements are bidirectional in the sense that if
x1 (t) = · · · = xN (t) = xcns (t), then xr (t) = 0 holds.
According to Lemma 3, the consensus problem for system (7) is equivalent to the stability problem of the
system expressed in terms of transformation (9). It is worth mentioning that the consensus vector xcns (t)
may be constant or time-varying depending on the dynamics of the MAS.
Lemma 4. L̂hni AhNi = AhN−1i L̂hni , where AhN−1i = IN −1 ⊗ A.
Proof. L̂hni AhNi = (L̂ ⊗ In )(IN ⊗ A) = (L̂hni IN )⊗ (In A) =(IN −1 L̂)⊗ (AIn ) = (IN −1 ⊗ A)(L̂ ⊗ In ) = AhN−1i L̂hni .
Using Lemma 4, the closed-loop system given in (7) is transformed to the following reduced order structure,
ẋr (t) = ( AhN−1i + A + ∆A ) xr (t) + ( A + ∆A ) er (t),
(10)
†
where A = L̂hni BKL, ∆A = L̂hni B∆K (t)L, and er (t) = L̂hni e(t), with L = Lhni L̂hni
. The reduced measurement
error for the closed-loop system given in (10) is er (t) = x̂r (t) − xr (t), where x̂r (t) = L̂hni x̂(t).
Remark 2. Without loss of generality and for the sake of brevity in notation, we remove row N from the
Laplacian matrix L, to derive L̂.
The exponential stability for system (10) is defined below.
Definition 2. Given damping coefficient ζ > 0, system (10) is ζ-exponentially stable if there exists a positive
scalar c such that xr (t) satisfies the following condition [36]
k xr (t) k≤ ce−ζt k xr (0) k,
t ≥ 0.
(11)
In the following section, we proceed to introduce and formulate the event-triggering mechanism.
B. Event-triggering scheme
hni
hni
We define the disagreement vector for agent i as X̂i (t) = l(i,•) x̂(t), with l(i,•) = l(i,•) ⊗ In . In fact, X̂i (t)
provides the instantaneous disagreement between the last transmitted state corresponding to agent i and
T
T
the last received states from its neighbors. Let X̂(t) = [ X̂1 (t), . . . , X̂N (t) ]T denote the stacked disagreement
vector. Given tik , the next triggering instant for agent i is, therefore, determined from the following condition
tik+1 = inf { t > tik : h ( ei (t), X̂i (t), φ ) ≥ 0},
(12)
where h ( ei (t), X̂i (t), φ ) = kei (t)k−φkX̂i (t)k, and real-valued scalar φ > 0 is the transmission threshold to be
determined. Note that the triggering function given in (12) is asynchronous, i.e., each agent independently
decides on its own triggering time. The primary goal here is to determine the maximum stable value for φ,
which provides the minimum number of transmissions for a particular network configuration with guaranteed
8
control performances. Between two consecutive events for agent i, the triggering function is non-positive,
i.e., hi ≤ 0. Thus, we consider the following component-wise inequality derived based on (12)
e[Nr] ≤ φX̂
where e[Nr] = [ ke1 (t)k , . . . , keN (t)k ]T , and X̂
[Nr]
[Nr]
,
(13)
= [ kX̂1 (t)k , . . . , kX̂N (t)k ]T . In order to merge the design of
maximum possible transmission φ with desired control objectives, the event-triggering condition (13) needs
to be expressed as a function of the system’s state variables, i.e., xr (t) and er (t). In this regard, the following
two Lemmas are introduced to transform (13) into the required structure.
Lemma 5. If a certain value φ satisfies (13), the following entry-wise inequality is also satisfied
L̂e[Nr] ≤ φ |L̂| X̂
[Nr]
.
(14)
Proof. Component i in L̂e[Nr] is computed as l(i,•) e[Nr] , (1 ≤ i ≤ N − 1). Therefore, the entries of e[Nr] are
multiplied by exactly one positive and at least one negative value in a network containing a directed spanning
tree. According to the Euclidean normed-space properties, the absolute value of row vector l(i,•) lies within
an upper bound, i.e.,
l(i,•) e[Nr] ≤ φ |l(i,•) | X̂
[Nr]
1 ≤ i ≤ N − 1.
,
(15)
Expanding (15) for all rows of L̂ results in (14).
Lemma 6. Denote matrix M = { mij } = { lij + αj liN }, 1 ≤ i ≤ N −1 and 1 ≤ j ≤ N −1, as the correlation
matrix, with α = [ α1 , . . . , αN −1 ] = l(N ,•) L̂† . If a certain value φ satisfies the following entry-wise inequality
ψe ≤ ψx̂ ,
(16)
iT
h
hni
hni
e(t)k ,
it also satisfies inequality (14). The undefined vectors in (16) are ψe = kl(1,•) e(t)k , . . . , kl(N
−1,•)
iT
h
hni
hni
hni
x̂r (t)k , with m(i,•) = m(i,•) ⊗ In .
and ψx̂ = k φm(1,•) x̂r (t)k , . . . , kφm(N
−1,•)
Proof. Based on the reverse triangle inequality in the Euclidean normed-space, we conclude that
hni
l(i,•) e[Nr] ≤ k l(i,•) e(t) k,
1 ≤ i ≤ N − 1,
(17)
which is equivalent to L̂e[Nr] ≤ ψe considering all rows. On the other hand, the sub-additivity property in
the Euclidean normed-space proves that
hni
φl(i,•) X̂(t) ≤ φ |l(i,•) | X̂
[Nr]
1 ≤ i ≤ N − 1.
,
(18)
Since X̂(t) is formed by the row space of Laplacian matrix, a certain component in X̂(t), e.g., X̂N (t), is always
dependent on the other components; meaning that X̂N (t) can be written as a linear combination of X̂1 (t) to
X̂N −1 (t), i.e., X̂N (t) = α1 X̂1 (t) + · · · + αN −1 X̂N −1 (t). Thus, the coefficients αi are calculated as α = l(N ,•) L̂† . By
substituting X̂N (t) with its linear equivalent value, inequality (18) reduces to
hni
φm(i,•) x̂r (t) ≤ φ |l(i,•) | X̂
[Nr]
,
1 ≤ i ≤ N − 1.
(19)
9
We conclude from (19) that ψx̂ ≤ φ|L̂|X̂
[Nr]
. Under the assumption outlined in inequality (16), the outcome
of (17) and (19) is the following sequence of inequalities
L̂e[Nr] ≤ ψe ≤ ψx̂ ≤ φ |L̂| X̂
[Nr]
,
(20)
which complete the proof for Lemma 6.
In conclusion, Lemma 6 states that any obtained value for φ which satisfies (16), also satisfies (14). Furthermore, inequality (14) is equivalent to the triggering condition defined in (13) according to Lemma 5.
Inequality (16) is favorable in the sense that it can be expressed as a global quadratic constraint in the
T
form of eTr (t)er (t) ≤ x̂Tr (t)Mhni
Φ2 Mhni x̂r (t), where Φ = φI(N −1 )n , and Mhni =M ⊗ In . Replacing x̂r (t) with
er (t) + xr (t), the equivalent condition is given below.
T
T
eTr (t)er (t) ≤ ( er (t) + xr (t) ) Mhni
Φ2 Mhni ( er (t) + xr (t) ).
(21)
Inequality (21) represents the event-triggering constraint that is expected to appear in the convex optimization framework. Once the feasible transmission threshold φ is obtained through optimization, the desired
event condition defined in (12) is exploited to determine the triggering moments for each agent. Inequality
(21) is, therefore, guaranteed according to Lemma 5 and Lemma 6.
Remark 3. Although transmission threshold φ seems to depend only on xr (t), er (t), and Mhni from (21),
we will see that φ is also affected by other design parameters emerging in the optimization problem.
C. Main Result
The following theorem computes the minimum-norm resilient heterogeneous control gain Ki ’s and maximum
transmission threshold φ used in our event-based consensus algorithm.
Theorem 1. The optimum values for the transmission threshold φ and control gains Ki ’s (1 ≤ i ≤ N ) are
computed from
φ=
p
τ3 γ −1 ,
and Ki = Bi† P−1 Θi ,
(22)
which are conditioned on the existence of matrices Θi ∈ Rn×n (1 ≤ i ≤ N ), symmetric positive definite matrix
P ∈ Rn×n , and positive scalars τj (1 ≤ j ≤ 3). Under such conditions, the following minimization derives the
minimum-valued positive scalars γ, µ, and υi for (1 ≤ i ≤ N )
min
Θi ,γ,τj ,P,υi ,µ
subject to:
Π1 Π2
< 0,
∗ Π3
γ+µ+
N
X
υi ,
for (1 ≤ i ≤ N ),
i=1
µI
I
∗
P
> 0,
−Υ ΘT
∗
−I
< 0,
(23)
10
where
Π1 =
π11
ΞL
∗
τ2 δ 2 LT L − τ3 I
Θ = diag ( Θ1 , . . . , ΘN ),
,
Π2 =
P L̂hni B
P L̂hni B
T
τ3 Mhni
0
0
T
τ3 Mhni
Υ = diag (υ1 In , . . . , υN In ) ,
,
Π3 = diag (−τ1 I, −τ2 I, −Γ) ,
(24)
with
T
π11 = AhN−1i
P + P AhN−1i + 2ζP + τ1 δ 2 LT L + ΞL + LT ΞT ,
Ξ = L̂ ⊗ 1n 1Tn ◦ 1N −1 ⊗ [ Θ1 , . . . , ΘN ] ,
Γ = γIn(N −1 ) ,
and P = IN −1 ⊗ P.
(25)
In the above terms, parameters {δ, ζ} are constants with know positive values. The designed parameters stabiq
lizes the system defined in (10) at the ζ-exponential rate kxr (t)k < ce−ζt kxr (0)k, where c = λmax (P)λ−1
min (P)
. The control objectives defined in section III are simultaneously guaranteed.
Proof. To derive the stability conditions for the closed-loop system defined in (10), we consider the Lyapunov
function candidate
V (t) = xT
r (t)P xr (t).
(26)
V̇ (t) + 2ζV (t) < 0,
(27)
Now, consider the following inequality
where the time derivative of V (t) is defined as V̇ (t). The condition defined in (27) is equivalent to V (t) <
V (0)e−2ζt . Considering (26), we obtain λmin (P)kxr (t)k2 ≤ V (t) < V (0)e−2ζt ≤ λmax (P)e−2ζt kxr (0)k2 , which
results in kxr (t)k< ce−ζt kxr (0)k, with the c defined in Theorem 1. Therefore, the condition given in (27) is
the sufficient constraint to ensure ζ-exponential stability according to Definition 2. Now V̇ (t) is expanded
according to the reduced closed-loop system (10) as follows
V̇ (t) = ẋT
(t)P xr (t) + xT
(t)P ẋr (t)
r
r
T
(t)P Ax xr (t) + Aer (t) + L̂hni Bσ1 + L̂hni Bσ2 ,
= Ax xr (t) + Aer (t) + L̂hni Bσ1 + L̂hni Bσ2 P xr (t) + xT
r
(t), σ1T , σ2T ]T ,
(t), eT
where Ax = ( AhN−1i + A ), σ1 = ∆K (t)Lxr (t), and σ2 = ∆K (t)Ler (t). Defining Ω = [ xT
r
r
one can rearrange (27) in terms of Ω to obtain the following matrix structure
T
Ax P + P Ax + 2ζP P A P L̂hni B P L̂hni B
∗
0
0
0
Ω < 0.
ΩT
∗
∗
0
0
∗
∗
∗
(28)
0
To formulate proper quadratic conditions with respect to σ1 and σ2 , we use the upper bound norm for
control uncertainties based on Assumption 1
σ1T σ1 = xT
(t)LT ∆2K (t)Lxr (t) ≤ δ 2 xT
(t)LT Lxr (t),
r
r
(29)
11
σ2T σ2 = eT
(t)LT ∆2K (t)Ler (t) ≤ δ 2 eT
(t)LT Ler (t).
r
r
(30)
The performance-related constraints derived in (21), (29), and (30) are required to be included in the
stability constraint (28). Repeatedly using Lemma 2, the aforementioned constraints along with the new
slack variables τ1 , τ2 and τ3 appear in the
π̄11
∗
Π̄ =
∗
∗
with
following integrated matrix inequality
π̄12 P L̂hni B P L̂hni B
π̄22
0
0
< 0,
∗
−τ1 I
0
∗
∗
(31)
−τ2 I
T
π̄11 = ATx P + P Ax + 2ζP + τ1 δ 2 LT L + τ3 Mhni
Φ2 Mhni ,
T
Φ2 Mhni ,
π̄12 = P A + τ3 Mhni
and
T
Φ2 Mhni .
π̄22 = τ2 δ 2 LT L − τ3 I + τ3 Mhni
Now, we apply Lemma 1 to obtain the inequality below
AT P + P Ax + 2ζP + τ1 δ 2 LT L
PA
P L̂hni B
x
2
T
∗
−τ3 I + τ2 δ L L
0
∗
∗
−τ1 I
∗
∗
∗
∗
∗
∗
P L̂hni B
0
0
−τ2 I
∗
T
Φ
τ3 Mhni
T
Φ
τ3 Mhni
< 0.
0
0
−τ3 I
(32)
Pre and post-multiplying (32) with the positive definite matrix Q = diag (I, I, I, I, Φ−1 ) results in inequality
T
ATx P + P Ax + 2ζP + τ1 δ 2 LT L
PA
P L̂hni B P L̂hni B τ3 Mhni
T
∗
−τ3 I + τ2 δ 2 LT L
0
0
τ3 Mhni
(33)
∗
∗
−τ1 I
0
0 < 0.
∗
∗
∗
−τ2 I
0
∗
∗
∗
∗
−τ3 Φ−2
The matrix inequality derived in (33) is not linear as long as the optimization variables are multiplied by
each other or their inverse form exists. Hence, the blocks containing P Ax , P A, and τ3 Φ−2 need to be handled
in such a way that the ultimate inequality turns into a linear structure. To this end, we first expand P A
according to P defined in (25). Using Hadamard and Kronecker product, it is straightforward to derived the
equation below
P A = L̂ ⊗ 1n 1Tn ◦ 1N −1 ⊗ [ PB1 K1 , . . . , PBN KN ] L.
Defining Θi = PBi Ki , (1 ≤ i ≤ N ), as alternative variables, the inequality (33) becomes linear with respect to
Θi ’s, thus the term Ξ given in (25) is obtained. The same procedure is applicable for handling τ3 Φ−2 . Defining
Γ = τ3 Φ−2 = γIn(N −1 ) , the maximization problem over Φ is converted to an equivalent convex minimization
problem over Γ. The resulting inequality will now be a linear one with respect to Γ and τ3 . Note that τ3 is
not multiplied by any other variables except Φ. Finally, to make the obtained control gains implementable,
12
we minimize the size of Ki ’s by adding appropriate constraints. As the two components which are used to
compute control gains, we restrict the norm of Θi ’s and P−1 by setting the following minimization conditions
on µ and Υ [37]
P−1 < µI,
µ > 0,
(34)
and ΘTi Θi < υi I,
υi > 0.
(35)
The Schur complement lemma is enough to derive the two corresponding LMIs in (23). Once the optimization
problem is solved, unknown variables τ3 , P , Θi and γ are obtained. The Control gains and event-triggering
threshold coefficient are consequently derived from (22).
Remark 4. We note that, design parameters can alternatively be obtained directly from (32) by solving
BMIs. However, this approach is more computationally challenging and provides no guarantee of global
optimization.
D. Zeno Behavior Exclusion
From an implementation point of view, in an event-triggering scheme, there must always be a finite number
of triggering instants within a given finite time interval. Otherwise, the triggering mechanism would exhibit
Zeno behavior [38]. It is essential to prove that the time interval between any two events are strictly positive
for all agents. The following theorem provides the lower bound on the interval between two consecutive
triggering instants.
Theorem 2. Considering system (2), control law (5), event-triggering function (12), and design parameters
(22), the inter-event interval for agent i is strictly positive and lower bounded by the following term
!
i
1
φkAkk
X̂
(t
)k
i
k
tik+1 − tik ≥
ln
+1 ,
k
kAk
F
(36)
i
k
where F i =
max
t∈[tik ,tik+1 )
kAx̂i (t) + Bi (Ki + ∆K i (t))X̂i (t)k, and kX̂i (t)k < δc i . Positive-valued scalar δc i is the
given stopping threshold for agent i, (1 ≤ i ≤ N ).
Proof. Consider an interval t ∈ [tik , tik+1 ) for agent i. Based on the event-triggering mechanism discussed in
section IV-B, ei (tik ) = 0. Then, ei (t) evolves from zero with the following dynamics until tik+1 is determined
by (12) and φ from Theorem 1.
d
kei (t)k≤ kẋi (t)k≤ A ( x̂i (t) − ei (t) ) + Bi ( Ki + ∆K i (t) ) X̂i (t) ≤ kAk kei (t)k+Fi (t),
dt
where Fi (t) = kAx̂i (t) + Bi ( Ki + ∆K i (t) ) X̂i (t)k. One can solve (37) for ei (t) as follows
Z t
Fi (η)ekAk(t−η) dη, t ∈ [tik , tik+1 ).
kei (t)k≤
tik
(37)
13
Algorithm 1 : Proposed Event-based Consensus
Input: Adjacency Weighted Matrix A = {aij }, Agents’ dynamics given in (2).
Output: Multi-objective Event-triggered Consensus.
Parameter Design: (D1 – D5)
I. Initialization
D1. Transformation Matrix: Remove N th row of Laplacian matrix L in order to determine the reduced
Laplacian matrix, L̂.
D2. System Transformation: Derive reduced system (10).
D3. Correlation Matrix: Using Lemma 6, determine correlation matrix Mhni .
II. Optimization
D4. Solving the LMIs: Using convex optimization solvers, solve the LMIs (23) for given parameters {δ, ζ}.
D5. Feasibility Verification: If a solution exists for (23), obtain φ, and Ki ’s from (22). Otherwise, change
parameters {δ, ζ}, and repeat step D4.
Event-triggered Consensus: (C1 – C3)
C1. Initialization: Initialize consensus process by allowing all agents to transmit their initial states xi (0) to
neighbours.
C2. Execution: Using Ki ’s derived in Step D4, the states of agent i in (2) are excited by local controller given
in (5). Triggering condition (12) is responsible to determine the next state transmission to neighbours
for agent i as the states evolves to reach consensus.
C3. Consensus Achievement: Agent i repeats Step C2 until convergence is achieved for the disagreement
state vector, i.e., kX̂i (t)k< δc i .
Incorporating (37) with the event-triggering mechanism kei (t)k ≤ φkX̂i (t)k, the next triggering instant for
agent i does not happen until the right-hand side of (37) evolves from zero to reach φkX̂i (tik )k. Then it
follows from (37) that
k
d
dt kei (t)k ≤ kAk kei (t)k+F i ,
or equivalently
k
kei (t)k≤
The next event is triggered at t = tik+1 when
F i kAk(t−tik )
e
−1 .
kAk
(38)
k
kei (tik+1 )k= φ kX̂i (tik )k≤
F i kAk(tik+1 −tik )
e
−1 ,
kAk
(39)
which simplifies to (36). Observe that during the consensus process X̂i (tik ) > δc i , thus the right hand side of
(36) is strictly positive and tik+1 − tik > 0.
The event-based consensus algorithm is summarized in Algorithm 1.
14
V. Simulations
A. Deterministic example
Consider a network of six second-order heterogeneous agents with the following dynamics [39]
m̄i r̈i (t) = [ 1 + ∆ui ] ui (t),
1 ≤ i ≤ 6,
(40)
where ri (t) ∈ R and m̄i > 0 defines, respectively, the position and inertia of agent i. Inequality |∆ui | < 1
represents the uncertainty in the control input ui (t) ∈ R due to dis-adjustment of actuators. Equation (40)
can be rearranged as ( m̄i /(1 + ∆ui ) )r̈i (t) = ui (t). As suggested in [39], the term (m̄i /(1 + ∆ui )), denoted as
mi , is treated as the new inertia for agent i. The state space representation for (40) is, therefore, given by
ṙi (t) = vi (t)
mi v̇i (t) = ui (t),
1≤i≤6
(41)
where vi (t)∈R denotes the velocity of agent i. Unlike previous work where the inertia mi ’s and uncertainty
∆ui ’s in the second-order MASs are not considered separately for each agent, i.e., mi = 1 are assumed, model
(41) considers a more practical scenario with heterogeneous inertias. Among various choices suggested to
simulate heterogeneous inertias in literature, we consider mi = 0.8 + 0.1i, (1 ≤ i ≤ 6), as in [39]. The state
space representation for (41) with respect to (2) is, hence, given by xi (t) = [ ri (t), vi (t) ]T , A = [ 0, 1; 0, 0 ],
B1 = [0, 0.9]T ; B2 = [ 0, 1.0 ]T ; B3 = [ 0, 1.1 ]T ; B4 = [ 0, 1.2 ]T ; B5 = [ 0, 1.3 ]T ; and B6 = [ 0, 1.4 ]T . The
directed network configuration corresponded to the (41) is described by the asymmetric Laplacian matrix
L = [3, 0, 0, −1, −1, −1; 0, 2, 0, 0, −1, −1; 0, 0, 2, −1, 0, −1; 0, −1, 0, 2, 0, −1; −1, −1, 0, −1, 3, 0; −1, −1, −1, 0, 0, 3].
To solve the consensus problem using Theorem 1, we initialize the LMI optimization with ζ = 0.4 and
δ = 0.02. Using the YALMIP parser and SDPT3 solver, we solve (23) with the aforementioned values for the
optimization and system parameters [40]. The parameters obtained from the LMI optimization (23) are
0.0608 −0.0363
, τ3 = 0.1312, γ = 5.032.
P=
(42)
−0.0363 0.1020
Using (22), the control gains are derived as follows: K1 = [ −0.1187, −0.2952 ], K2 = [ −0.1933, −0.2953 ],
K3 = [ −0.1965, −0.4292 ], K4 = [ −0.1391, −0.2523 ], K5 = [ −0.2413, −0.3472 ], and K6 = [ −0.1842, −0.1659 ].
The maximum transmission threshold is also calculated from (22) as φ = 0.1614. In order to observe the state
trajectories of the closed-loop heterogeneous multi-agent system (40) with the designed parameters, we pick
initial values for xi (0) = [ i + 5, i − 2 ]T , (1 ≤ i ≤ 6). Moreover,the time-varying uncertainty in the control
gains is assumed to be ∆K i (t) = √12 sin(t) [ 0.02, 0.02 ] for all agents. Recall that k∆K (t)k ≤ δ. Computed
with discretization intervals Ts = 10−3 sec, the state trajectories of the six agents are shown in Figure 1(a).
We further define the convergence criteria for the consensus process as δc i = 5 × 10−3 . Figure 1(b) plots the
control inputs as defined in (5) with respect to the aforementioned free or obtained parameters. Figure 2
is included to verify that the obtained parameters, i.e., Ki ’s and φ, are capable of ensuring ζ-exponential
convergence among the agents for ζ = 0.4 and δ = 0.02.
15
(b)
(a)
25
agent 1
agent 2
agent 3
agent 4
agent 5
agent 6
4
20
3
Position, xi (t)
15
Control input
Position and Velocity Trajectories
5
Velocity, vi (t)
10
5
2
1
0
-1
-2
-3
0
-4
-5
0
2
4
6
8
10
12
-5
0
Time (sec)
2
4
6
8
10
12
Time (sec)
Fig. 1: trajectories of the multi-agent system; (a): State consensus, (b): Control inputs ui (t).
The simulation results show that it takes 12412 iterations to achieve consensus in this experiment. However,
the six agents, respectively, transmit their information on 807, 781, 317, 222, 311, and 140 occasions during
the consensus process. The average number of data transmission per agent in this configuration is, therefore,
429.67 times. We also define a criteria to measure the efficiency of the event-based method in terms of the
saved amount of transmission in percentage, denoted by ST. The ST index is expressed as a function of
the average number of transmissions per agent, defined as AT , and total number of iterations to reach
consensus, denoted by TI, i.e,
ST% = 1 − AT/TI × 100.
(43)
Using the definition given in (43), 96.54% of the total possible transmissions are saved in this example.
Another crucial performance-related factor in a comparison is the amount of control force consumption
during the process. In order to consider the effect of control input expense, we measure the well-known
R∞
P
T
input cost function Ju = N
i=1 0 ui (t) ui (t) dt in our analysis [41]. In the current experiment, the control
cost is calculated as Ju = 57.0516. We will use the value of Ju to compare the control expense in consensus
processes.
It is also interesting to study how the performance indices are affected if agents are intentionally allowed
to transmit at a higher rate. To this end, we manually reduce the initially obtained φ = 0.1614 to let agents
benefit from receiving more data from their neighbors. The results are summarized in Table I. All other
parameters remain the same as denoted previously. According to Table I, when the agents are allowed to
transmit more data with lower values of φ, the save transmission ST is reduced as a result of higher average
transmission per agent AT.
However, transmitting more information to the neighbors does not necessarily result in a faster consensus
after a certain value as illustrated by TI. Moreover, the control cost Ju constantly gets reduced as a result of
more communication. In other words, more transmission helps achieving smoother trajectories and control
16
TABLE I: Consensus performance, dicreasing φ with {δ = 0.02, ζ = 0.4}
Transmission
TI
AT
ST%
Ju
0.12
11920
461.17
96.13
50.18
0.08
12651
742.00
94.13
44.05
0.04
13272
1439.00
89.15
39.06
0.00
13586
13586
0
34.72
threshold, φ
TABLE II: Consenssus performance, increasing δ with ζ = 0.4
control
φ
TI
AT
ST%
Ju
0.010
0.1612
19184
699.83
96.35
55.26
0.020
0.1614
12412
429.67
96.54
57.05
0.030
0.1616
10400
221.33
97.87
61.81
0.040
0.1617
12438
191.67
98.45
65.81
0.050
0.1617
14369
366.50
97.44
66.78
uncertainty δ
inputs, but not necessarily at a faster convergence rate. In conclusion, once the φ is derived from (22), it is
always possible to run the algorithm at a lower φ, as a trade-off between AT and Ju .
In this part, we investigate how different choices of constraint-related values {ζ, δ}, will affect the consensus
performance. Table II shows the effect of δ being increased until the LMIs (23) become infeasible while ζ
is fixed. According to Table II, a larger uncertainty δ leads to a slightly larger threshold φ in the feasibility
region of (23). On the other hand, an increment in δ always results in relatively larger control gains. These
two contrasting outcomes, result in a parabolic trend in TI. Therefore, it is difficult to predict AT and
TI beforehand. Greater uncertainty in control gains, results in a more fluctuating control input with huge
jumps, thus Ju is ascending.
In the next experiment we focus on the effect of ζ on consensus performance. The results are summarized
in Table III. As we increase the value of the ζ, larger Ki ’s are obtained from the optimization LMI’s to
accelerate the convergence process. Consequently, the actuators are forced to implement greater control
60
ceζt kxr (0)k
Exponential Stability
50
kxr (t)||
40
30
20
10
0
0
2
4
6
8
10
Time (sec)
Fig. 2: Exponential stability for xr (t)
12
17
2.5
(a)
×104
(b)
1100
TI N=8
TI N=12
TI N=16
1000
AT N=8
AT N=12
2
AT N=16
N=8
N=16
800
1.5
N=12
700
Ju
TI & AT
900
600
1
500
400
0.5
300
200
0
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.2
0.25
0.3
Damping coefficient ζ
3.5
×104
0.35
0.4
0.45
(c)
(d)
1500
TI N=8
TI N=12
TI N=16
AT N=8
AT N=12
AT N=16
3
2.5
N=8
N=12
N=16
1000
u
2
J
TI & AT
0.5
Damping coefficient ζ
1.5
500
1
0.5
0
0.004
0.006
0.008
0.01
0.012
0.014
0.016
0.018
0.02
0
0.004
0.006
0.008
0.01
Control Uncertainty (δ)
0.012
0.014
0.016
0.018
0.02
Control Uncertainty (δ)
Fig. 3: Monte Carlo results for N = {8, 12, 16}; (a): TI and AT, varying ζ with fixed δ = 0.01, (b): Control cost Ju ,
varying ζ with fixed δ = 0.01, (c): TI and AT, varying δ with fixed δ = 0.4, (d): Control cost Ju , varying δ with fixed
δ = 0.4.
TABLE III: Consensus performance; increasing ζ with δ = 0.02
damping
φ
TI
AT
ST%
Ju
0.10
0.1601
24998
424.83
98.30
40.59
0.20
0.1607
20916
720.17
96.55
45.69
0.30
0.1611
16466
739.83
95.50
50.71
0.40
0.1614
12412
429.67
96.53
57.05
0.50
0.1616
9249
199.00
97.84
63.20
0.60
0.1617
9064
354.50
96.08
69.29
coefficient ζ
input with more fluctuation which results in more control cost. In conclusion, as ζ is increased the TI
constantly gets reduced at the expense of more Ju , while ST remains relatively the same.
B. Monte-Carlo Simulations
All scenarios in section V-A were based on a single network of six agents. As the adjacency matrix A
affects the feasibility region of (23), a Monte-Carlo simulation is included to study heterogeneous eventbased consensus in randomly generated networks including a spanning tree. The inertias are also generated
18
randomly as mi = 1 + 0.1 Xi , where Xi is a Gaussian random variable with zero mean and unit variance. In
the first Monte-Carlo experiment the control uncertainty δ = 0.01 is fixed, and ζ is gradually increased from
0.2 to 0.5 for different network sizes with N = {8, 12, 16} ( Figures 3(a) and 3(b) ). In the second scenario, δ
is gradually increased with fixed ζ = 0.4 ( Figures 3(c) and 3(d) ). The following facts are observed through
the two scenarios. (i) According to Figure 3(a), the value of save transmission ST is reduced as the network
is expanded; (ii) As shown in Figure 3(a), TI and AT are more close to each other in larger networks as
compared to smaller configurations; (iii) As observed in Figure 3(b), increasing the value of ζ results in a
faster consensus convergence rate; (iv) As shown in Figure 3(c), the parabolic patten is detectable for TI
and AT over randomly generated networks of different size; (v) As illustrated in Figure 3(d), the control
cost is raised when Ki ’s are subjected to a larger uncertainty.
VI. Conclusion
The paper addresses the problem of event-based consensus with predefined objectives for a class of
heterogeneous (multi-agent systems) MASs configured in directed networks. The augmented closed-loop
system is transformed to an equivalent reduced system. The Lyapunov stability theorem is then used to
incorporate the control objectives (exponential convergence rate, resilient control design, and minimum
gain design) within an event-triggered function. The heterogeneous control gains and the transmission
threshold are co-designed by solving an LMI-based optimization problem. It is also proved that the triggering
mechanism does not exhibit the Zeno behavior. The effectiveness of the proposed algorithm is studied through
simulations for heterogeneous second-order MASs. In future, we are interested in applying the proposed
algorithm to even-based state estimation problems in sensor networks.
References
[1] A. Amini, A. Azarbahram, and M. Sojoodi, “H∞ consensus of nonlinear multi-agent systems using dynamic output feedback
controller: an lmi approach,” Nonlinear Dynamics, vol. 85, no. 3, pp. 1865–1886, 2016.
[2] Z. Li, W. Ren, X. Liu, and M. Fu, “Consensus of multi-agent systems with general linear and lipschitz nonlinear dynamics
using distributed adaptive protocols,” IEEE Trans. Autom. Control, vol. 58, no. 7, pp. 1786–1791, 2013.
[3] A. Mohammadi and A. Asif, “Distributed consensus innovation particle filtering for bearing/range tracking with communication constraints,” IEEE Trans. Signal Process., vol. 63, no. 3, pp. 620–635, 2015.
[4] S. Zhu, C. Chen, X. Ma, B. Yang, and X. Guan, “Consensus based estimation over relay assisted sensor networks for
situation monitoring,” IEEE J. Sel. Top. Signal Process., vol. 9, no. 2, pp. 278–291, 2015.
[5] G. Battistelli, L. Chisci, and D. Selvi, “Distributed averaging of exponential-class densities with discrete-time eventtriggered consensus,” IEEE Trans. Control Network Syst., 2016.
[6] A. Amini, A. Mohammadi, and A. Asif, “Event-based consensus for a class of heterogeneous multi-agent systems: An lmi
approach,” in ICASSP, 2017.
[7] G. Xie, H. Liu, L. Wang, and Y. Jia, “Consensus in networked multi-agent systems via sampled control: fixed topology
case,” in American Control Conference, pp. 3902–3907, IEEE, 2009.
[8] W. Ren and Y. Cao, “Convergence of sampled-data consensus algorithms for double-integrator dynamics,” in CDC 2008.
47th IEEE Conference on, pp. 3965–3970, IEEE, 2008.
[9] P. Tabuada, “Event-triggered real-time scheduling of stabilizing control tasks,” IEEE Trans. Autom. Control, vol. 52, no. 9,
pp. 1680–1685, 2007.
19
[10] D. V. Dimarogonas and K. H. Johansson, “Event-triggered control for multi-agent systems,” in CDC/CCC 2009.
Proceedings of the 48th IEEE Conference on, pp. 7131–7136, IEEE, 2009.
[11] M. Cao, F. Xiao, and L. Wang, “Event-based second-order consensus control for multi-agent systems via synchronous
periodic event detection,” IEEE Trans. Autom. Control, vol. 60, no. 9, pp. 2452–2457, 2015.
[12] W. Hu, L. Liu, and G. Feng, “Output consensus of heterogeneous linear multi-agent systems by distributed eventtriggered/self-triggered strategy,” IEEE Trans. Cybern., vol. PP, no. 99, pp. 1–11, 2016.
[13] H. Li, X. Liao, T. Huang, and W. Zhu, “Event-triggering sampling based leader-following consensus in second-order multiagent systems,” IEEE Trans. Autom. Control, vol. 60, no. 7, pp. 1998–2003, 2015.
[14] M. Cao, F. Xiao, and L. Wang, “Second-order leader-following consensus based on time and event hybrid-driven control,”
Syst. Control Lett., vol. 74, pp. 90–97, 2014.
[15] N. Mu, X. Liao, and T. Huang, “Event-based consensus control for a linear directed multiagent system with time delay,”
IEEE Trans. Circuits Syst. II Express Briefs, vol. 62, no. 3, pp. 281–285, 2015.
[16] D. Yang, W. Ren, X. Liu, and W. Chen, “Decentralized event-triggered consensus for linear multi-agent systems under
general directed graphs,” Automatica, vol. 69, pp. 242–249, 2016.
[17] R. T. Marler and J. S. Arora, “Survey of multi-objective optimization methods for engineering,” Struct. Multidiscip. Optim.,
vol. 26, no. 6, pp. 369–395, 2004.
[18] X. Zhou, P. Shi, C.-C. Lim, C. Yang, and W. Gui, “Event based guaranteed cost consensus for distributed multi-agent
systems,” J. Franklin Inst., vol. 352, no. 9, pp. 3546–3563, 2015.
[19] J. Mei, W. Ren, and J. Chen, “Consensus of second-order heterogeneous multi-agent systems under a directed graph,” in
2014 ACC, pp. 802–807, IEEE, 2014.
[20] C. Scherer, P. Gahinet, and M. Chilali, “Multiobjective output-feedback control via lmi optimization,” IEEE Trans. Autom.
Control, vol. 42, no. 7, pp. 896–911, 1997.
[21] C. Wang, Z. Zuo, Z. Lin, and Z. Ding, “A truncated prediction approach to consensus control of lipschitz nonlinear multiagent systems with input delay,” IEEE Trans. Control Netw. Syst.
[22] H. Li, X. Jing, and H. R. Karimi, “Output-feedback-based control for vehicle suspension systems with control delay,” IEEE
Trans. Ind. Electron., vol. 61, no. 1, pp. 436–446, 2014.
[23] P. Badri, A. Amini, and M. Sojoodi, “Robust fixed-order dynamic output feedback controller design for nonlinear uncertain
suspension system,” Mech. Syst. Sig. Process., vol. 80, pp. 137–151, 2016.
[24] L. Jiang, W. Yao, Q. Wu, J. Wen, and S. Cheng, “Delay-dependent stability for load frequency control with constant and
time-varying delays,” IEEE Trans. Power Syst., vol. 27, no. 2, pp. 932–941, 2012.
[25] C. Wang, Z. Zuo, Z. Lin, and Z. Ding, “A truncated prediction approach to consensus control of lipschitz nonlinear multiagent systems with input delay,” IEEE Trans. Control Network Syst., 2016.
[26] H. Zhao and J. H. Park, “Dynamic output feedback consensus of continuous-time networked multiagent systems,”
Complexity, vol. 20, no. 5, pp. 35–42, 2015.
[27] X. Zhou, P. Shi, C.-C. Lim, C. Yang, and W. Gui, “Event based guaranteed cost consensus for distributed multi-agent
systems,” J. Franklin Inst., vol. 352, no. 9, pp. 3546–3563, 2015.
[28] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear matrix inequalities in system and control theory. SIAM,
1994.
[29] Z. Li, G. Wen, Z. Duan, and W. Ren, “Designing fully distributed consensus protocols for linear multi-agent systems with
directed graphs,” IEEE Trans. Autom. Control, vol. 60, no. 4, pp. 1152–1157, 2015.
[30] W. Hu, L. Liu, and G. Feng, “Consensus of linear multi-agent systems by distributed event-triggered strategy,” IEEE
Trans. Cybern., vol. 46, no. 1, pp. 148–157, 2016.
[31] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proceedings
of the IEEE, vol. 95, no. 1, pp. 215–233, 2007.
[32] M. S. Mahmoud, Resilient control of uncertain dynamical systems, vol. 303. Springer Science & Business Media, 2004.
[33] A. D. Ames, K. Galloway, K. Sreenath, and J. W. Grizzle, “Rapidly exponentially stabilizing control lyapunov functions
and hybrid zero dynamics,” IEEE Trans. Autom. Control, vol. 59, no. 4, pp. 876–891, 2014.
[34] Y. Liu and Y. Jia, “h∞ consensus control of multi-agent systems with switching topology: a dynamic output feedback
protocol,” Int. J. Control, vol. 83, no. 3, pp. 527–537, 2010.
20
[35] J. Y. Ishihara and M. H. Terra, “On the lyapunov theorem for singular systems,” IEEE Trans. Autom. Control, vol. 47,
no. 11, pp. 1926–1930, 2002.
[36] V. Phat, Y. Khongtham, and K. Ratchagit, “Lmi approach to exponential stability of linear systems with interval timevarying delays,” Linear Algebra Appl., vol. 436, no. 1, pp. 243–251, 2012.
[37] D. Šiljak and D. Stipanovic, “Robust stabilization of nonlinear systems: the lmi approach,” Mathematical problems in
Engineering, vol. 6, no. 5, pp. 461–493, 2000.
[38] V. S. Dolk, P. Tesi, C. De Persis, and W. Heemels, “Event-triggered control systems under denial-of-service attacks,” IEEE
Trans. Control Network Syst., 2016.
[39] J. Mei, W. Ren, and J. Chen, “Distributed consensus of second-order multi-agent systems with heterogeneous unknown
inertias and control gains under a directed graph,” IEEE Trans. Autom. Control, vol. 61, no. 8, pp. 2019 – 2034, 2016.
[40] J. Lofberg, “Yalmip: A toolbox for modeling and optimization in matlab,” in Computer Aided Control Systems Design,
2004 IEEE International Symposium on, pp. 284–289, IEEE, 2005.
[41] L. Yu and J. Chu, “An lmi approach to guaranteed cost control of linear uncertain time-delay systems,” Automatica, vol. 35,
no. 6, pp. 1155–1159, 1999.
| 3cs.SY
|
Fast Computation of Isochrones in Road
Networks
Moritz Baum1 , Valentin Buchhold1 , Julian Dibbelt1 and Dorothea
Wagner1
1
Karlsruhe Institute of Technology, Germany, [email protected]
November 12, 2015
Abstract
We study the problem of computing isochrones in road networks, where the objective
is to identify the region that is reachable from a given source within a certain amount
of time. While there is a wide range of practical applications for this problem (e. g.,
reachability analyses, geomarketing, visualizing the cruising range of a vehicle), there
has been little research on fast computation of isochrones on large, realistic inputs.
In this work, we formalize the notion of isochrones in road networks and present a
basic approach for the resulting problem based on Dijkstra’s algorithm. Moreover, we
consider several speedup techniques that are based on previous approaches for one-tomany shortest path computation (or similar scenarios). In contrast to such related
problems, the set of targets is not part of the input when computing isochrones. We
extend known Multilevel Dijkstra techniques (such as CRP) to the isochrone scenario,
adapting a previous technique called isoGRASP to our problem setting (thereby, enabling
faster queries). Moreover, we introduce a family of algorithms based on (single-level)
graph partitions, following different strategies to exploit the efficient access patterns of
PHAST, a well-known approach towards one-to-all queries. Our experimental study
reveals that all speedup techniques allow fast isochrone computation on input graphs
at continental scale, while providing different tradeoffs between preprocessing effort,
space consumption, and query performance. Finally, we demonstrate that all techniques
scale well when run in parallel, decreasing query times to a few milliseconds (orders of
magnitude faster than the basic approach) and enabling even interactive applications.
1. Introduction
Web-based map services, autonomous navigation systems, and other location-based applications have gained wide currency in the last decades, motivating a great deal of research
1
on practical algorithms for routing in road networks [2]. Most work focused on computing distances (or shortest paths) between pairs (or sets) of vertices. On the other hand,
isochrones (more generally, isolines) are defined as curves of constant distance (from a given
source). Thereby, isochrones represent the area that is in range for a given time limit (or
some other limited resource). Hence, rather than actual distances, information about the
subgraph within range is required. Isolines are relevant in a wide range of applications,
such as reachability analyses [3, 17, 18], geomarketing [13], range visualization for (electric)
vehicles [20], and a variety of online applications [22].
Related Work. Dijkstra’s well-known algorithm [12] computes shortest paths from a given
source to all (reachable) vertices in (almost) linear time. The MINE algorithm [17] is a
Dijkstra-based search to compute isochrones in transportation networks, using a spatial
network database. An improved variant, MIMEX [18], has reduced space requirements.
Both approaches work on databases, prohibiting interactive applications (with running
times beyond the order of minutes).
Regarding shortest-path computation, on the other hand, various speedup techniques [2]
were developed for faster queries, using an offline preprocessing phase (sometimes including
an additional customization step to incorporate, e. g., user preferences or traffic updates),
and an online query phase. Customizable Route Planning (CRP) [5] uses overlays based
on a (multilevel) graph partition to speed up queries [8, 21, 23]. Metric customization
is practical, as only shortcut costs in the overlay need to be updated. In Contraction
Hierarchies (CH) [19], vertices are contracted in increasing order of importance, creating
shortcuts between neighbors to maintain distances. A customizable variant of CH (CCH)
was introduced in [11].
Both CH and CRP were extended to related scenarios, such as one-to-many or one-to-all
queries. Delling et al. introduce PHAST [4], exploiting CH for fast one-to-all and all-pairs
shortest-path computations. Queries consist of a CH search and a linear sweep over the
vertices to obtain distances. For one-to-many scenarios, RPHAST [7] uses a target selection
phase to speed up the second phase of PHAST queries. Efentakis et al. [14] propose GRASP,
a one-to-all (and one-to-many) technique that builds upon CRP, enabling customization
in a few seconds. Many-to-many queries can be handled by bucket-based approaches [24],
storing pairs of target and distance at vertices. This generic approach can be implemented
by several speedup techniques [7]. Other related query types include point-of-interest (POI)
queries, best-via queries (shortest paths that visit certain types of POI), and k-nearest
neighbors (kNN) queries. Bucket-based approaches can be extended to such scenarios [1].
Delling et al. [9] support POI and kNN queries based on CRP. Efentakis et al. [15] extend
GRASP to cover kNN queries. All techniques exploit the fact that targets (or POIs) are
known in advance. To the best of our knowledge, the only speedup technique extended to
2
isochrone queries is GRASP [14].1 However, GRASP computes distances to all vertices in
range, which can be wasteful if only the actual isoline is required.
Our Contribution. This work studies speedup techniques for isochrone computation. Since
no canonical definition exists in the literature, we formally define the isochrone problem
(specifying the output of our algorithms) and present a variant of Dijkstra’s algorithm
to solve it. For faster queries, we propose a new variant of the CRP speedup technique
that computes isochrones. As an alternative, we also extend the existing approach of
isoGRASP [14] to our definition. Next, we introduce a family of novel approaches that
exploit different strategies to combine graph partitions and (R)PHAST. We also show how
all approaches can be parallelized for further speedup. Our experimental evaluation on
realistic, large-scale input reveals that all techniques are orders of magnitude faster than
the basic approach. Providing queries in the order of milliseconds, they enable a range
of new (e. g., interactive) applications. Since all proposed techniques differ in terms of
customization effort, memory consumption, and query time, each is suitable for certain
applications.
Outline. Section 2 introduces basic terminology and building blocks. Section 3 formally
defines the problem and provides a basic approach. Section 4 presents techniques based on
CRP and GRASP, while Section 5 introduces algorithms that combine graph partitions
and PHAST. Section 6 experimentally evaluates all approaches. Section 7 concludes with
final remarks.
2. Preliminaries
We consider road networks given as directed graph G = (V, E) with length function len : E →
R≥0 (representing, e. g., travel time). An s–t-path in G is a sequence Ps,t = [s =
v1 , v2 . . . , vk = t] of vertices, such that (vi , vi+1 ) ∈ E for 1 ≤ i ≤ k − 1. The length
of Ps,t is the sum of its edge lengths. We presume that graphs are strongly connected, i. e.,
there exists an s–t-path for each pair s, t ∈ V . The distance d(s, t) from s to t is the length
of the shortest s–t-path in G.
A (vertex) partition is a family V = {V1 , . . . , Vk } of cells Vi ⊆ V , such that Vi ∩ Vj = ∅
S
for i 6= j and ki=1 Vi = V . A (nested) multilevel partition with L levels is a family Π =
{V 1 , . . . , V L } of partitions of nested cells, i. e., for each level ` ≤ L and cell Vi` ∈ V ` , there
is a cell Vj`+1 ∈ V `+1 at level ` + 1 with Vi` ⊆ Vj`+1 . For consistency, we define V 0 := {{v} |
v ∈ V } (the trivial partition where each vertex has its own cell) and V L+1 := {V } (the
trivial single-cell partition). An edge (u, v) ∈ E is a boundary edge (u and v are boundary
vertices) on level `, if u and v are in different cells of V ` . Similar to vertex partitions, we
1
An extension of the CRP approach in [9] to isochrones is outlined in a patent description (US Patent
App. 13/649,114; http://www.google.com/patents/US20140107921), however, in a simpler than our
intended scenario. Furthermore, the approach was neither implemented nor evaluated.
3
define edge partitions E = {E1 , . . . , Ek }, with Ei ∩ Ej = ∅ for i 6= j and ki=1 Ei = E. A
vertex v ∈ V is distinct (wrt. E) if all its incident edges belong to the same cell, else v is a
boundary vertex or ambiguous.
Dijkstra’s algorithm [12] computes, for a given source s, the distances d(s, v) to all v ∈ V .
It maintains distance labels d(·) for each vertex (initially, d(s) = 0 and d(v) = ∞ for v 6= s).
In each iteration, the algorithm extracts a vertex u with minimum d(u) from a priority
queue (initialized with s) and settles it. At this point, d(u) is final, i. e., d(u) = d(s, u). It
then scans all edges (u, v), i. e., if d(u) + len(u, v) < d(v), it updates d(v) accordingly and
adds (or updates) v in the queue.
S
Speedup Techniques. The three-phase workflow of CRP [5] distinguishes preprocessing
and metric customization. First, a (multilevel) partition Π of the road network is computed,
inducing for each level ` of Π an overlay graph H ` that contains all boundary vertices and
boundary edges in V ` and shortcut edges between boundary vertices of each cell Vi` ∈ V ` .
During customization, the lengths of all shortcuts are computed (using, e. g., Dijkstra’s
algorithm). For fast integration of new length functions, previously computed overlays are
used to compute shortcuts of higher levels. For s–t-queries, Dijkstra’s algorithm is run on
the union of the top-level overlay H L and the subgraphs (of H ` for 0 ≤ ` ≤ L − 1, H 0 := G)
induced by the cells containing s or t.
In CH [19], vertices are contracted in a (heuristic) order rank : V → {1, . . . , |V |}. To
contract a vertex v, shortcut edges are added between uncontracted neighbors (if necessary)
to preserve distances. Also, levels `(·) are assigned to vertices, initially set to zero. When
contracting u ∈ V , we set `(v) = max{`(v), `(u) + 1} for each uncontracted neighbor v.
Let E + denote the set of shortcuts added during preprocessing. An s–t-query is bidirectional,
with a forward search (from s) on G↑ = (V, E ↑ ), where E ↑ = {(u, v) ∈ E ∪ E + : rank(u) <
rank(v)}, and a backward search (from t) on G↓ = (V, E ↓ ), where E ↓ = {(u, v) ∈ E ∪
E + : rank(u) > rank(v)}.
Batched Shortest Paths. Both CH and CRP compute distances between pairs of vertices.
GRASP [14] extends CRP to batched query scenarios. In addition to shortcuts between
boundary vertices (within a cell), each level-` boundary vertex (for 0 ≤ ` < L) stores
(incoming) downward shortcuts from boundary vertices of its corresponding supercell at
level ` + 1. Customization works similar to CRP, storing downward edges in a separate
downward graph H ↓ . For one-to-all queries, the upward phase runs a CRP search from the
source, obtaining distances to settled vertices. Then, the scanning phase processes cells in
descending level order, sweeping over downward edges to propagate distance labels from
boundary vertices to those at the level below.
PHAST [4] exploits CH preprocessing for fast one-to-all queries. The upward phase
runs a forward CH search, while the scanning phase processes vertices in descending order
of CH level and propagates distances by scanning incoming edges in E ↓ . Vertices are
reordered during preprocessing, so the scanning phase is a linear sweep over an edge array.
4
RPHAST [7] enables one-to-many queries by introducing an additional target selection
phase. Given a target set T , it extracts a (restricted) subgraph G↓T of the original downward
graph with a BFS in G↓ (from all t ∈ T ). Queries resemble PHAST queries, running the
scanning phase on G↓T instead of G↓ .
3. Problem Statement and Basic Approach
We formalize the notion of isochrones and describe a basic algorithm. Given a graph G =
(V, E) and a length function len on its edges, the isochrone problem takes as input a
source s ∈ V and a time limit τ ∈ R≥0 . We say that a vertex v ∈ V is in range if d(s, v) ≤ τ ,
else it is out of range. There is no canonical definition of the output of the isochrone
problem. Usually, a compact representation of all vertices in range (or edges with at least
one incident vertex in range) is required [14, 18, 25]. Therefore, we define the output of
the isochrone problem as the set of all isochrone edges that separate vertices in range from
those out of range. Observe that these are the edges (u, v) ∈ E with exactly one endpoint
in range, i. e., either d(s, u) ≤ τ, d(s, v) > τ or d(s, u) > τ, d(s, v) ≤ τ . This set of edges
compactly represents the area in range (thus, generating output is unlikely to become a
performance bottleneck). All approaches presented below can be modified to serve other
definitions (requiring, e. g., the set of vertices in range).
Next, we describe a variant of Dijkstra’s algorithm, called isoDijkstra, to compute all
isochrone edges for a given source s and time limit τ . The search runs from s as described
in Section 2, but stops once the stopping criterion is fulfilled, i. e., the distance label of
the minimum element in the queue exceeds τ . To determine isochrone edges, we then
sweep over all vertices v still contained in the queue (note that these must be out of range).
For each, we check all incoming edges (u, v) and output exactly those where u is in range.
Clearly, this way we find all isochrone edges (u, v) where u is in range (Dijkstra’s algorithm
scans exactly the vertices in range, so the out-of-range endpoints of all isochrone edges were
added to the queue, but not extracted). We make the following modification to ensure that
isochrone edges (u, v) where u is out of range are found as well. When settling a vertex u,
we also scan incoming edges (v, u). If d(v) = ∞, we insert v into the queue with a key of
infinity. Thereby, we guarantee that both types of isochrone edges are contained in the
queue when the search terminates.
4. Multilevel Dijkstra Approaches
The basic idea for Multilevel Dijkstra (MLD) approaches is to skip cells that are in range,
but descend into lower levels where necessary to determine isochrone edges. Following
this approach, we have to cope with several challenges. First, it is not sufficient to check
whether the time limit is exceeded at boundary vertices (we may miss isochrone edges
that are part of no shortcut, see Appendix A for an example). Therefore, we compute
additional data during customization. Second, when descending into lower levels, distance
5
labels must be consistent within each cell. This motivates a two-phase approach. We say
that a cell is active, if its induced subgraph contains at least one isochrone edge. The first
phase determines active cells (running a CRP query), while the second phase descends into
lower-level overlays to determine isochrone edges.
Customization. Metric customization works along the lines of plain CRP. We compute
distances of clique shortcuts by running Dijkstra searches (restricted to the respective cells).
Cliques are represented as square matrices in contiguous memory for efficiency. To improve
data locality and simplify index mapping, vertices are reordered such that boundary vertices
are pushed to the front (ordered by descending level), breaking ties by cell [5].
Given a boundary vertex u of a cell Vi` , we define its (level-`) eccentricity, denoted ecc` (u),
as the maximum (finite) distance d(u, v) to some v ∈ Vi` on the subgraph induced by Vi` .
Note that this subgraph is not strongly connected in general, but restricting eccentricites to
cells allows faster customization (see Appendix B for alternative approaches). We compute
eccentricities for all boundary vertices on each level (storing them adds a single column
to each clique matrix). To this end, we make use of the Dijkstra searches that compute
shortcut lengths. Given a boundary vertex v at level 1, we run the search from v until the
queue is empty (instead of aborting it once all boundary vertices were settled) at negligible
overhead. The distance label of the last settled vertex is the eccentricity ecc1 (v) of v. At
higher levels (1 < ` ≤ L), we compute upper bounds on eccentricities as follows. When
settling a vertex v, we check whether the sum of the label d(v) and ecc`−1 (v) exceeds the
current bound and update it if necessary. While upper bounds may lead to cells falsely
being marked active, this does not violate correctness of queries.
isoCRP. Given a source s ∈ V and a limit τ , queries run in two phases. First, the upward
phase phase is similar to a plain CRP query from s, but running isoDijkstra on the search
graph (the union of the top-level overlay and all induced subgraphs of cells containing s).
Thus, the upward phase ends when all elements in the queue have a distance label greater
than τ . Additionally, to determine active cells, we maintain two flags i(·) (initially false)
and o(·) (initially true) for each cell (per level), to indicate whether the the cell contains
at least one vertex that is in or out of range, respectively. When settling a vertex u ∈ Vi` ,
we set i(Vi` ) to true if d(u) ≤ τ . Next, we check whether d(u) + ecc` (u) ≤ τ . Observe
that this condition is not sufficient to unset o(Vi` ), because ecc` (u) was computed on the
subgraph of Vi` . If this subgraph is not strongly connected, d(u) + ecc` (u) is (in general)
not an upper bound on the distance to any vertex in Vi` (there may be shorter paths to
internal vertices of Vi` via boundary vertices that are unreachable from u in the cell-induced
subgraph). Therefore, when scanning an outgoing shortcut (u, v) with length ∞ (this
shortcut exists due to the matrix representation), we also check whether d(v) + ecc` (v) ≤ τ .
If the condition holds for u and all boundary vertices v unreachable from u (wrt. Vi` ), we
can safely unset o(Vi` ). Note that all checks are cache efficient. Toggled flags are final, so
we no longer need to perform any checks for such flags. After the upward phase finished,
6
we mark all cells Vi` that have both i(Vi` ) and o(Vi` ) set as active (since isochrone edges
can only be contained in cells having vertices both in and out of range).
The downward phase then consists of L subphases. In decreasing order of levels, and
for every active cell at the current level `, each subphase runs isoDijkstra restricted to the
respective cell in H`−1 . Initially, all boundary vertices are inserted into the queue using their
distance labels (according to the previous phase) as keys. Again, we check eccentricities
on-the-fly to mark active cells for the next phase. Isochrone edges are determined at the end
of each isoDijkstra search (see Section 3). On overlays, only boundary edges are reported
(in contrast to shortcuts).
isoGRASP. We describe a modified version of isoGRASP [14] that is more suitable for
our scenario (in [14], distances to all vertices in range are computed). Customization of
our variant is similar to isoCRP, computing eccentricities of boundary vertices as described
above. Additionally, we generate downward edges required by GRASP on-the-fly. We apply
edge reduction (removing shortcuts via other boundary vertices) [14] to downward edges,
but stick to the matrix representation for overlay edges. Queries again consist of two phases.
The upward phase is identical to the one of isoCRP. The scanning phase handles levels
from top to bottom in L subphases and processes active cells. For an active cell Vi` at
level `, isoGRASP sweeps over its internal vertices (all vertices in H`−1 that lie in Vi` and
are no boundary vertex of Vi` ). For each internal vertex v, its incoming downward edges
are scanned, obtaining the distance at v. To determine active cells for the next subphase,
we maintain flags i(·) and o(·) as described for isoCRP. This requires checks at unreachable
boundary vertices (from v within Vi` ). For speedup, we precompute these vertices and store
them in a separate adjacency array.
Similar to isoCRP, the upward phase collects all isochrone edges that are boundary edges
at level L or contained in the cell-induced subgraph of the source. For remaining isochrone
edges, we sweep over internal vertices a second time after processing a cell in the scanning
phase. To avoid duplicates and to ensure that endpoints of scanned edges have correct
distances, we skip edges leading to vertices with higher index (recall that we reorder vertices
during preprocessing). Scanned boundary edges are then added to the output if exactly
one endpoint is reachable.
Parallelization. During customization, cells of each level are processed in parallel [5]. To
avoid concurrent memory access when customizing isoGRASP, we maintain thread-local
containers for downward edges, which are concatenated at the end. Regarding queries,
the (more expensive) downward phase is parallelized in a natural way, as cells at a certain
level can be handled independently. Thus, we assign cells to threads and synchronize them
between subphases. To reduce the risk of false sharing (i. e., concurrent access to the same
cache line), we assign blocks of consecutive cells (wrt. vertex ordering) to the same thread.
Moreover, to reduce synchronization overhead, we process cells on lower levels in a top-down
fashion within the same thread.
7
5. Contraction-Based Approaches
This section introduces isoPHAST, an approach based on (R)PHAST to compute isochrones.
Since the targets are not part of the input, we make use of graph partitions to restrict
the area that is examined for isochrone edges. Queries have three phases, starting with
a forward CH search from the source. Next, active cells are determined. Finally, we use
PHAST sweeps (restricted to active cells) to compute distances to vertices of active cells.
We now describe the (generic) preprocessing of isoPHAST, before we present strategies to
determine active cells.
First, we compute a (single-level) partition V = {V1 , . . . , Vk } of the graph. Then, we use
CH to contract all cell-induced subgraphs, but leave boundary vertices of the partition
uncontracted. Afterwards, we reorder vertices in the graph such that uncontracted core
vertices are pushed to the front, breaking ties by cell (providing the same benefits as in
CRP). We order contracted vertices within cells by their CH levels (as required by PHAST,
see Section 2). As a result of preprocessing, we obtain a (single) upward graph G↑ , containing
(for all cells) edges to higher-ranked vertices, added shortcuts between core vertices, and
all boundary edges. Conversely, the downward graph G↓ stores only downward edges (i. e.,
boundary vertices have no incoming edges). Further steps of preprocessing depend on the
query strategy and are described below.
isoPHAST-CD. Our first strategy (CoreDijkstra) executes isoDijkstra on the core graph
to determine active cells. This requires eccentricities for core vertices, which are efficiently
obtained from preprocessed data. To compute ecc(u) of some vertex u, we run (as a last step
of preprocessing) Dijkstra’s algorithm on the core graph (restricted to the cell Vi containing u), followed by a PHAST sweep over the internal vertices of Vi . Whenever processing a
vertex v (of Vi ), we update the eccentricity by setting ecc(u) = max{ecc(u), d(v)}.
A query starts by running (iso)Dijkstra from the source s in G↑ . Within the cell of s, this
corresponds to an upward CH search, since G↑ stores only upward edges. At core vertices,
we update flags i(·) and o(·) to determine active cells (as described in Section 4, using
an adjacency array to store vertices required for additional checks, similar to isoGRASP).
In the special case that the core is not reached, only the cell of s is set active. Then, we
process every active cell by running PHAST on its internal vertices. Thereby, we obtain
distances to all vertices that are both in range and contained in an active cell (due to
the stopping criterion, we get upper bounds for vertices out of range, which suffices for
isochrone detection).
Regarding output, boundary (isochrone) edges are found by isoDijkstra. Isochrone
edges connecting internal vertices are obtained in linear sweeps. When settling a vertex v,
higher-ranked neighbors have final distance labels. The label of v is final after scanning
incoming edges (u, v) ∈ G↓ . Thus, looping through incoming edges a second time suffices
to find isochrone edges after a few modifications to G↓ . First, as only original edges are
relevant candidates, we indicate this with an additional flag (per edge). Second, (directed)
edges (v, u) ∈ E to vertices u of higher rank are (in general) not contained in G↓ . To ensure
8
that adjacent vertices (wrt. G) are also adjacent in G↓ , we add dummy edges (with a length
of infinity) to G↓ .
isoPHAST-CP. Instead of isoDijktra, this strategy (CorePHAST) runs PHAST within
the core. We compute eccentricities after the (generic) preprocessing (as described above).
Next, CH preprocessing is run on the core, too. We reorder core vertices according to
CH levels. Finally, we update G↑ and G↓ (obtained after cell contraction), adding core
shortcuts and removing the obsolete boundary edges of the partition (that were needed to
compute eccentricites).
Queries strictly follow the three-phase pattern discussed above. First, we perform a
forward CH search in G↑ , until the priority queue is empty. Second, we determine active
cells and compute correct distance labels for all core vertices. To achieve this, we run a
PHAST sweep over the core vertices (that were sorted accordingly), relaxing edges in G↓ to
propagate distance values to vertices of lower rank. Again, we maintain flags, i(·) and o(·),
and an adjacency array for vertex checks to determine active cells. To find isochrone edges
between boundary vertices on-the-fly, we add dummy edges and edge flags inside the core
(similar to the third phase of isoPHAST-CD). The third phase (sweeps over active cells) is
identical to isoPHAST-CD.
isoPHAST-DT. Our last strategy (DistanceTable) uses a distance (bounds) table to speed
up the second phase (determining active cells). Working with such tables (instead of a
dedicated core search) benefits from edge partitions, since the unique assignment of edges
to cells simplifies isochrone edge retrieval (we avoid checking for boundary edges in the
second phase). Given a partition E = {E1 , . . . , Ek } of the edges of G, the table stores for
each pair Ei , Ej of cells a lower bound d(Ei , Ej ) and an upper bound d(Ei , Ej ) on the
distance from Ei to Ej , i. e., d(Ei , Ej ) ≤ d(u, v) ≤ d(Ei , Ej ) for all u ∈ Ei , v ∈ Ej (we
abuse notation, saying v ∈ Ei if v is an endpoint of at least one edge e ∈ Ei ). Given a
source s ∈ Ei (if s is ambiguous, pick any cell containing s) and a limit τ , cells Ej with
d(Ei , Ej ) ≤ τ < d(Ei , Ej ) are set active.
To (quickly) compute (not necessarily tight) distance bounds, we make use of the data
computed during generic preprocessing (that is now based on an edge partition). On the
resulting core graph we run, for each cell Ei , a (multi-source) forward CH search from
all boundary vertices in Ei . Next, we perform a PHAST sweep on G↓ (i. e., the complete
downward graph), keeping track of the minimum and maximum distance label per target
cell. This yields, for all cells, lower bounds d(Ei , ·), and upper bounds on the distance from
boundary vertices of Ei to each cell. To obtain the desired bounds d(Vi , ·), we increase
these values by the (backward) boundary diameter of Ei , i. e., the maximum distance from
any vertex in Ei to a boundary vertex in Ei . To compute the diameter of a cell Ei , we
run, for each boundary vertex v ∈ Ei , Dijkstra’s algorithm on the reverse core graph (i. e.,
inverting edge directions), until all boundary vertices of Ei were scanned (this can be easily
verified using a counter). Using a PHAST sweep over the downward graph of Ei , we obtain
9
the unlimited (i. e., not limited to Ei ) backward eccentricity of v. The diameter of Vi
is the maximum eccentricity of its boundary vertices. Next, we perform the actual CH
preprocessing on G, using a purely greedy order (boundary vertices are not artificially kept
on top of the contraction order). This results in a better contraction order and sparser
graphs G↑ and G↓ , reducing preprocessing and query times. Finally, we extract (and store)
the relevant search graph G↓i for each Ei ∈ E. This requires an RPHAST selection phase
per cell, using all (ambiguous and distinct) vertices of a cell as input.
Queries start with a forward CH search on G↑ (applying no stopping criterion). Next,
active cells are determined in a linear sweep over one row (corresponding to the source cell)
of the distance table. The third phase runs an RPHAST sweep for each active cell, obtaining
distances to all its vertices [7]. Although vertices can be contained in several search graphs,
we do not reinitialize distance labels between sweeps (the source remains unchanged). To
obtain isochrone edges, we proceed as before, looping through incoming downward edges
twice (again, we add dummy edges to G↓i for correctness). To avoid duplicates in the output
(due to vertices contained in several search graphs), edges in G↓i get an additional flag to
indicate whether the edge belongs to the corresponding cell Ei . Isochrone edges are added
to the output only if this flag is set.
As mentioned above, search graphs may share some vertices (e. g., the vertex with
maximum CH rank is contained in every search graph). Vertices contained in many graphs
increase memory consumption and slow down queries. Therefore, we use search graph
compression, i. e., we store the topmost vertices of the hierarchy (and their incoming edges)
in a separate graph G↓c and remove them from all search graphs G↓i . During queries, we
first perform a linear sweep over G↓c (obtaining distances for all v ∈ G↓c ), before processing
search graphs of active cells.
Parallelization. The first steps of preprocessing are executed in parallel, namely, building
cell graphs, contracting internal vertices, inserting dummy edges, and reordering internal
vertices by level. Afterwards, threads are synchronized. The upward and downward graphs
are computed sequentially. Finally, computation of eccentricities (or cell diameters) is
parallelized again. Since threads operate on distinct vertex sets, there are no concurrent
accesses to distance labels, and we can share labels among threads. However, each thread
needs its own priority queue. All remaining steps of preprocessing (depending on the
strategy) are executed sequentially.
As for queries, the first two phases are run sequentially. Both the CH search and
isoDijkstra are difficult to parallelize. Running PHAST (on the core) in parallel does not
pay off (the core is rather dense, resulting in many CH levels). Distance table operations,
on the other hand, are very fast, so parallelization is not necessary. In the third phase,
however, active cells can be assigned to different threads. Again, we share distance labels
among threads, except for isoPHAST-DT (search spaces may overlap, so each thread uses
own labels to avoid concurrent accesses). As a result, in isoPHAST-DT each thread runs a
10
Table 1. Performance of basic one-to-all and one-to-many building blocks. Execution
times are sequential. One-to-many algorithms compute distances to all targets in a ball of
size |B| = 214 .
Algorithm
[our]
Dijkstra (1-to-all)
PHAST
GRASP
[7, 15]
2 653.18
–
144.16 136.92
171.11 169.00
Dijkstra (1-to-many)
RPHAST (selection)
RPHAST (query)
7.34
1.29
0.16
7.43
1.80
0.17
forward CH search to initialize its labels. We store a copy of the graph G↓ once per NUMA
node for faster access during queries.
Running the third phase in parallel can make the second phase of isoPHAST-CP a
bottleneck. Therefore, we alter the way of computing i(·) and o(·). When settling a
vertex v ∈ Vi , we set o(Vi ) if d(v) + ecc(v) > τ , and i(Vi ) if d(v) ≤ τ . These checks are
less accurate (marking more cells), but we no longer have to check unreachable boundary
vertices (wrt. Vi ). Observe that correctness of isoPHAST-CP is maintained (no stopping
criterion is applied and maxv∈Vi (d(v) + ecc(v)) is a valid upper bound on the distance to
each vertex in Vi , so no active cells are missed).
6. Experiments
Our code is written in C++ (using OpenMP for parallelization), compiled with g++ 4.8
(-O3). The input for all experiments is the road network of Western Europe made available
for the 9th DIMACS Implementation Challenge (|V | = 18 010 173, |E| = 42 188 664), with
travel time (in seconds) as edge lengths [10]. For isoCRP and isoGRASP, we use a 4-level
partition obtained from PUNCH [6], with maximum cell sizes of 28 , 212 , 216 , 220 , respectively.
For (single-level) vertex partitions required by isoPHAST, we used BUFFOON [27]. Edge
partitions for isoPHAST-DT were retrieved following the approach described in [26, 28].
Our CH implementation follows [19], but adopting tuning parameters (e. g. for priority
terms and staged hop limits) from [4]. Our GRASP implementation includes implicit
initialization [14] and (downward) edge reduction [16]. As opposed to [14], we resort to
a 4-level partition, with only minor effects on running times in preliminary experiments
(similar observations were made in [15]). For comparability, Table 1 shows running times of
our implementations of the basic batched query algorithms on a single core of a 4-core Intel
Xeon E5-1630v3 clocked at 3.7 GHz, with 128 GiB of DDR4-2133 RAM, 10 MiB of L3 and
256 KiB of L2 cache (chosen because it most closely resembles the machines used in [7, 15]).
We report average running time over 1 000 random one-to-all queries for Dijkstra, PHAST,
11
Table 2. Performance of sequential queries. We report customization time (excluding
metric-independent partitioning) and space requirements (space per additional metric given
in brackets, if it differs). The table shows the average number of settled vertices (# Settled,
in thousands) and running times of queries, for time limits τ = 100 and τ = 500. Best
values (except Dijkstra wrt. space) are highlighted in bold.
Custom
Queries (τ = 100 min) Queries (τ = 500 min)
Algorithm
Time [s]
Space [MiB]
# Settled
RangeDijkstra
isoCRP
isoGRASP
isoPHAST-CD
isoPHAST-CP
isoPHAST-DT
–
646
1.70
900 (138)
2.50 1 856 (1 094)
26.11
785
1 221.84 781
1 079.11 2 935
460 k
101 k
120 k
440 k
626 k
597 k
Time [ms] # Settled
68.32
15.44
10.06
6.09
15.02
9.96
7 041 k
354 k
387 k
1 501 k
2 029 k
1 793 k
Time [ms]
1 184.06
60.67
37.77
31.63
31.00
24.80
and GRASP. For one-to-many techniques (Dijkstra and RPHAST), we follow a procedure
of [7], picking a center vertex c at random and running Dijkstra’s algorithm from c until |T |
vertices were scanned, making them the target set T . Distances from a random source s ∈ T
to all vertices in T are computed. For RPHAST, we report both target selection (sel) and
query (qry) time. We also report numbers (as-is) from [7, 15] for comparison. Even when
accounting for hardware differences, we see that query times of our implementations are
similar to original publications (target selection of RPHAST is even slightly faster).
Regarding isoPHAST, we performed preliminary studies to obtain reasonable parameters
for partition sizes (k) and search graph compression (|G↓c |, denoting the number of vertices
in the search graph for isoPHAST-DT). For sequential CD (CP) queries, a value of k = 212
(211 ) yields best query times. For fewer cells (i. e., coarser partitions), the third phase
scans a large portion of the graph and becomes the bottleneck. Using a more fine-grained
partition yields a larger core graph, slowing down the second phase. Consequently, a smaller
value for k (256) becomes favorable when queries are executed in parallel (as the third
phase becomes faster). For DT, similar effects occur for different values of k. Additionally,
subgraph compression has a major effect on running times (and space consumption). For
small sizes of G↓c , high-ranked vertices occur in multiple cells, but a larger graph G↓c leads to
unnecessary vertex scans during queries. Setting k = 214 (212 ) and |G↓c | = 216 (213 ) resulted
in fastest sequential (parallel) queries for isoPHAST-DT.
Table 2 shows performance of all algorithms discussed in Sections 4 and 5, reporting
figures on customization and sequential queries. Experiments were conducted on a dual
8-core Intel Xeon E5-2670 clocked at 2.6 GHz, with 64 GiB of DDR3-1600 RAM, 20 MiB
of L3 and 256 KiB of L2 cache. Customization is executed in parallel (using all 16 cores).
Timings for PHAST include all steps of preprocessing except computing the partition (since
it is independent of the metric). For queries, we report average running times of 1 000
random queries for mid-range (τ = 100) and long-range time limits (τ = 500, this was the
12
Table 3. Performance of parallel queries. We report the same figures as in Table 2, but
queries use 16 threads. Best values (per column) are highlighted in bold.
Custom
Queries (τ = 100 min) Queries (τ = 500 min)
Algorithm
Time [s]
Space [MiB]
# Settled
isoCRP
isoGRASP
isoPHAST-CD
isoPHAST-CP
isoPHAST-DT
1.70
900 (138)
2.50 1 856 (1 094)
38.07
769
1 432.39 766
865.50 1 066
100 k
120 k
918 k
944 k
914 k
Time [ms] # Settled
2.73
2.35
1.61
4.47
1.74
354 k
387 k
4 578 k
5 460 k
2 979 k
time [ms]
7.86
5.93
8.22
7.86
3.80
hardest limit for most approaches, as it maximized the number of active cells). As expected,
techniques based on MLD provide better customization times, while isoPHAST achieves
the lowest query times (CD for mid-range and DT for long-range queries, respectively).
Customization of isoCRP and isoGRASP is very practical (below three seconds). For
isoPHAST-CD, the lightweight preprocessing pays of as well, allowing customization in less
than 30 seconds. The comparatively expensive preprocessing times of isoPHAST-CP and
DT are dominated by expensive core contraction. Still, (metric-dependent) preprocessing
is far below half an hour, which is suitable for applications that do not require realtime
metric updates. Compared to isoCRP, isoGRASP requires almost an order of magnitude
of additional space for the downward graph (having about 110 million edges). Even when
executed sequentially, all approaches take well below 100 ms, which is significantly faster
than isoDijkstra. The number of settled vertices is significantly larger for isoPHAST (but
data access is more cache friendly). Query times of isoPHAST are below MLD techniques for
both limits, with the exception of isoPHAST-CP for small ranges (because the whole core
graph is scanned). Again, the performance of isoPHAST-CD is quite noteable, providing the
fastest queries for (reasonable) mid-range limits and decent query times for the long-range
limit. Finally, query times of isoPHAST-DT show best scaling behavior, with lowest times
for harder queries.
Table 3 shows parallel times for the same set of random queries, using the same machine.
Note that preprocessing time of isoPHAST changes due to different parameter choices.
Most approaches scale very well with the number of threads, providing a speedup of
(roughly) 8 using 16 threads. Note that factors (according to tables) are much lower for
isoPHAST, since we use tailored partitions for single-thread queries. In fact, isoPHAST-DT
scales best when run on the same preprocessed data (speedup of 11), since its sequential
workflow (upward CH search, table lookups) is very fast. Considering MLD techniques,
isoGRASP scales worse than isoCRP (speedup of 6.5 compared to 7.7), probably because it
is memory bandwidth bounded (while isoCRP comes with more computational overhead).
Consequently, isoGRASP benefits greatly from storing a copy of the downward graph on
each NUMA node. As one may expect, speedups are slightly lower for mid-range queries
(τ = 100). The isoPHAST approaches yield best query times, below 2 ms for mid-range
13
70
isoDijkstra
isoCRP
isoGRASP
isoPHAST-CD
isoPHAST-CP
isoPHAST-DT
60
Query Time [ms]
50
40
30
20
10
0
10
30
100
300
1000
3000
Limit [min]
Figure 1. Sequential query times for varying time limits, ranging from 10 to (roughly)
4 700 minutes (the diameter of our input graph). Each point in the plot is the average of
1 000 random queries.
queries, and below 4 ms for the long-range limit. In summary, all algorithms enable queries
that are fast enough for practical applications, achieving speedups by more than two orders
of magnitude compared to isoDijkstra.
Figure 1 shows how (sequential) query times scale for varying time limits. Timings of all
algorithms (except isoDijkstra) follow a characteristic curve. Query times first increase with
the limit τ (the isoline is extended, cutting more active cells), before dropping again once τ
exceeds 500 (the isochrone reaches the boundary of the network, decreasing the number
of active cells). For values τ > 4 710 (minutes), all vertices are in range, making queries
very fast (as there are no active cells). For small values of τ , the MLD techniques and
isoPHAST-CD are fastest. Conversely, isoPHAST-CP is slowed down by the linear sweep
over the core graph (taking about 6 ms, independent of the value τ ), while isoPHAST-DT
suffers from distance bounds in the table that are not tight. On the other hand, the
second phase of isoPHAST-CD has no stopping criterion, making it the slowest variant for
large values of τ (while the other isoPHAST variants benefit from good scaling behavior).
Regarding MLD techniques, isoGRASP is up to almost twice as fast as isoCRP, providing a
decent trade-off between customization effort and query times. In the parallel query setting
(not reported in the figure), query times follow the same characteristic curves. The linear
sweep in the second phase of isoPHAST-CP becomes slightly faster, since the core graph
14
is smaller (due to a different partition). Also ,the performance gap between isoCRP and
isoGRASP is slightly smaller when using multiple threads.
7. Final Remarks
We proposed a formal definition of the isochrone problem, asking for a compact representation
of the region in a road network that is in range (given some resource limit). We defined
output that is reasonable, e. g., for actual visualization of isochrones. The approach of
[25] (used as state-of-the-art in recent work [13]) can be modified easily to take isochrone
edges as input. Given a (planar) graph representation of the network, this can be achieved
by traversing the faces of the graph along the border of the region in range, switching
to the corresponding twin face at isochrone edges. Preliminary experiments showed that
extracting the isochrone region (according to the definition in [25]) this way takes only tens
of milliseconds. While the desired output may differ for other applications, our algorithms
can be readily extended to most reasonable formats.
We introduced a portfolio of speedup techniques for the isochrone problem. While no
single approach is best in all criteria (preprocessing effort, space, query time, simplicity), the
right choice depends on the application and its requirements. If user-dependent metrics are
needed, the fast and lightweight customization isoCRP is helpful. Fast query times subject
to frequent updates (e. g., due to live traffic) are enabled by isoGRASP. If customization
time below a minute is acceptable and ranges are low, isoPHAST-CD is a candidate that
may achieve even faster query times. The remaining variants of isoPHAST show best
scaling behavior, making them suitable for long-range isochrones on large graphs, or if
customizability is not required.
Current and future work includes algorithms for computing actual isolines that are fast
enough for interactive applications (exploiting the techniques presented here). Moreover, we
are interested in visualizing the cruising range of electric vehicles, taking both travel time
and energy consumption into account. Finally, we investigate the possibility of customizable
isoPHAST (exploiting, e. g., CCH [11]), and variants that do not (explicitly) require a
partition of the graph.
15
References
[1] Ittai Abraham, Daniel Delling, Amos Fiat, Andrew V. Goldberg, and Renato F.
Werneck. HLDB: Location-based services in databases. In Proceedings of the 20th
ACM SIGSPATIAL International Symposium on Advances in Geographic Information
Systems (GIS’12), pages 339–348. ACM Press, 2012. Best Paper Award.
[2] Hannah Bast, Daniel Delling, Andrew V. Goldberg, Matthias Müller–Hannemann,
Thomas Pajor, Peter Sanders, Dorothea Wagner, and Renato F. Werneck. Route
planning in transportation networks. Technical Report abs/1504.05140, ArXiv e-prints,
2015.
[3] Veronika Bauer, Johann Gamper, Roberto Loperfido, Sylvia Profanter, Stefan Putzer,
and Igor Timko. Computing isochrones in multi-modal, schedule-based transport
networks. In Proceedings of the 16th ACM SIGSPATIAL international conference on
Advances in geographic information systems (GIS ’08), GIS ’08, pages 78:1–78:2. ACM
Press, 2008.
[4] Daniel Delling, Andrew V. Goldberg, Andreas Nowatzyk, and Renato F. Werneck.
PHAST: Hardware-accelerated shortest path trees. Journal of Parallel and Distributed
Computing, 73(7):940–952, 2013.
[5] Daniel Delling, Andrew V. Goldberg, Thomas Pajor, and Renato F. Werneck. Customizable route planning in road networks. Transportation Science, 2015.
[6] Daniel Delling, Andrew V. Goldberg, Ilya Razenshteyn, and Renato F. Werneck. Graph
partitioning with natural cuts. In 25th International Parallel and Distributed Processing
Symposium (IPDPS’11), pages 1135–1146. IEEE Computer Society, 2011.
[7] Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. Faster batched shortest
paths in road networks. In Proceedings of the 11th Workshop on Algorithmic Approaches
for Transportation Modeling, Optimization, and Systems (ATMOS’11), volume 20 of
OpenAccess Series in Informatics (OASIcs), pages 52–63, 2011.
[8] Daniel Delling, Martin Holzer, Kirill Müller, Frank Schulz, and Dorothea Wagner.
High-performance multi-level routing. In The Shortest Path Problem: Ninth DIMACS
Implementation Challenge, volume 74 of DIMACS Book, pages 73–92. American
Mathematical Society, 2009.
[9] Daniel Delling and Renato F. Werneck. Customizable point-of-interest queries in road
networks. IEEE Transactions on Knowledge and Data Engineering, 2014. to appear.
[10] Camil Demetrescu, Andrew V. Goldberg, and David S. Johnson, editors. The Shortest
Path Problem: Ninth DIMACS Implementation Challenge, volume 74 of DIMACS
Book. American Mathematical Society, 2009.
16
[11] Julian Dibbelt, Ben Strasser, and Dorothea Wagner. Customizable contraction hierarchies. In Proceedings of the 13th International Symposium on Experimental Algorithms
(SEA’14), volume 8504 of Lecture Notes in Computer Science, pages 271–282. Springer,
2014.
[12] Edsger W. Dijkstra. A note on two problems in connexion with graphs. Numerische
Mathematik, 1:269–271, 1959.
[13] Alexandros Efentakis, Nikos Grivas, George Lamprianidis, Georg Magenschab, and
Dieter Pfoser. Isochrones, traffic and DEMOgraphics. In Proceedings of the 21st
ACM SIGSPATIAL International Conference on Advances in Geographic Information
Systems, SIGSPATIAL’13, pages 548–551. ACM Press, 2013.
[14] Alexandros Efentakis and Dieter Pfoser. GRASP. Extending graph separators for
the single-source shortest-path problem. In Proceedings of the 22nd Annual European
Symposium on Algorithms (ESA’14), volume 8737 of Lecture Notes in Computer
Science, pages 358–370. Springer, September 2014.
[15] Alexandros Efentakis, Dieter Pfoser, and Yannis Vassiliou. SALT. A unified framework
for all shortest-path query variants on road networks. In Evripidis Bampis, editor,
Experimental Algorithms, volume 9125 of Lecture Notes in Computer Science, pages
298–311. Springer, 2015.
[16] Alexandros Efentakis, Dimitris Theodorakis, and Dieter Pfoser. Crowdsourcing computing resources for shortest-path computation. In Proceedings of the 20th ACM
SIGSPATIAL International Symposium on Advances in Geographic Information Systems (GIS’12), pages 434–437. ACM Press, 2012.
[17] Johann Gamper, Michael Böhlen, Willi Cometti, and Markus Innerebner. Defining
isochrones in multimodal spatial networks. In Proceedings of the 20th ACM International
Conference on Information and Knowledge Management, CIKM ’11, pages 2381–2384.
ACM Press, 2011.
[18] Johann Gamper, Michael Böhlen, and Markus Innerebner. Scalable computation of
isochrones with network expiration. In Proceedings of the 24th International Conference
on Scientific and Statistical Database Management, SSDBM’12, pages 526–543. Springer,
2012.
[19] Robert Geisberger, Peter Sanders, Dominik Schultes, and Christian Vetter. Exact
routing in large road networks using contraction hierarchies. Transportation Science,
46(3):388–404, August 2012.
[20] S. Grubwinkler, T. Brunner, and M. Lienkamp. Range prediction for evs via crowdsourcing. In Vehicle Power and Propulsion Conference (VPPC), 2014 IEEE, pages
1–6, Oct 2014.
17
[21] Martin Holzer, Frank Schulz, and Dorothea Wagner. Engineering multilevel overlay
graphs for shortest-path queries. ACM Journal of Experimental Algorithmics, 13(2.5):1–
26, December 2008.
[22] Markus Innerebner, Michael Böhlen, and Johann Gamper. Isoga: A system for
geographical reachability analysis. In Proceedings of the 12th International Conference
on Web and Wireless Geographical Information Systems, W2GIS’13, pages 180–189.
Springer, 2013.
[23] Sungwon Jung and Sakti Pramanik. An efficient path computation model for hierarchically structured topographical road maps. IEEE Transactions on Knowledge and
Data Engineering, 14(5):1029–1046, September 2002.
[24] Sebastian Knopp, Peter Sanders, Dominik Schultes, Frank Schulz, and Dorothea Wagner. Computing many-to-many shortest paths using highway hierarchies. In Proceedings
of the 9th Workshop on Algorithm Engineering and Experiments (ALENEX’07), pages
36–45. SIAM, 2007.
[25] Sarunas Marciuska and Johann Gamper. Determining objects within isochrones in
spatial network databases. In Proceedings of the 14th East European Conference on
Advances in Databases and Information Systems, ADBIS’10, pages 392–405. Springer,
2010.
[26] Alex Pothen, Horst D. Simon, and Kang-Pu Liou. Partitioning sparse matrices with
eigenvectors of graphs. SIAM Journal on Matrix Analysis and Applications, 11:430–452,
1990.
[27] Peter Sanders and Christian Schulz. Distributed evolutionary graph partitioning. In Proceedings of the 14th Meeting on Algorithm Engineering and Experiments (ALENEX’12),
pages 16–29. SIAM, 2012.
[28] Christian Schulz. High Quality Graph Partitioning. PhD thesis, Karlsruhe Institute of
Technology, July 2013.
18
A. Omitted Figures
Figure 2 shows two examples for which a naïve MLD approach may produce wrong outputs
(see also the challenges described in Section 4). Below, Figure 3 illustrates the work of the
isoPHAST algorithms described in Section 5.
22
1
8
v
21
7
3
6
4
1
s
2
w
3
1
u
1
Figure 2. Two examples for which a naïve approach produces wrong outputs. Gray edges
denote shortcut edges. Left: Imagine a mountain in the middle of the cell. The shortcut
edge from the left to the right boundary vertex corresponds to a fast road through a tunnel
(the green edges) and can be traversed within the time limit. However, this does not imply
that we can reach the summit of the mountain via a mountain road (the red edges). Thus,
without using eccentricites, it may happen that we do not descend into the cell and hence
miss an isochrone edge on the mountain road. Right: Assume a limit τ = 4. When we scan
u, we can traverse the shortcut edge (u, v), since the distance at u plus the shortcut length
equals the limit. Thus, we do not descend into the cell at u, but we relax the outgoing
shortcut edge (u, v). Next, scan v, where the sum of distance at v and the shortcut length
is greater than the τ . Therefore, we descend into the cell and relax the edge (v, w). Since
w has a distance label greater than τ and the queue contains no other vertices, the search
stops. Now, we erroneously report (v, w) as an isochrone edge, since the distance label
at v is below τ , while the distance label of w is greater than τ . The s − w path via u that
makes w reachable within τ is not found. This motivates out two-phase approach (which
ensures that distance labels in cells are correct).
B. Omitted Experiments
This section contains experiments omitted in the main document. Below, we present
alternative variants of isoCRP and isoGRASP, using different strategies to determine active
cells. We also include detailed experiments considering parameter tuning of isoPHAST
variants.
Alternative Multilevel Strategies. Given a boundary vertex u on some cell Vi` at level `,
we define its unrestricted (level-`) eccentricity, denoted ecc0` (u), as the maximum distance
d(u, v) to a vertex v ∈ Vi` (in G) in the same cell (i. e., distances are not restricted to
19
s
dist(s,·) ≤ x dist(s,·) > x
Figure 3. Illustration of the isoPHAST algorithms. Thick black lines denote the isoline,
which is intersected by isochrone edges (thin black lines). Cells that are colored gray denote
active cells. Note that there are cells that are marked active despite containing no isochrone
edges (however, this does not violate correctness). Also note that besides the active cells
along the primary isoline, there may be active cells in the interior of the area bounded by
the primary isoline, for example due to mountains whose summits we cannot reach within
the time limit.
cell-induced subgraphs). We compute, for every boundary vertex v, and for each level `,
the unrestricted level-` eccentricity of v. The procedure described in Section 4 yields
upper bounds on (unrestricted) eccentricities if the corresponding subgraphs are strongly
connected (otherwise, we just set the eccentricity to ∞).
During queries, we may now check for boundary vertices whether the sum of their distance
label and their eccentricity exceeds the time limit. If it does, we mark it as an active cell.
We refer to this approach (which is simpler but less accurate than the approach of Section 4)
as isoCRP (none). Since we compute upper bounds on eccentricities during customization,
this approach may falsely mark cells as active. While this does not violate correctness, it
can significantly slow down the second phase of the query. This holds in particular for
cells that induce subgraphs which are not strongly connected. Recall that eccentricities
are computed on this subgraph, and hence we assign eccentricities of ∞ to some vertices.
In other words, the corresponding cell will always be marked active if at least one of its
boundary vertices is in range. Also note that a significant number of cells induces subgraphs
that are not strongly connected (think of cuts at directed edges representing lanes of a
highway). Therefore, we present an approach to improve upper bounds on eccentricities.
We run customization as described above, but add a second sweep over all boundary vertices.
For each boundary vertex, we run another Dijkstra search, but no longer limit it to the
current cell (note that outside of cells, we can make use of all preprocessed shortcuts, even
on higher levels). This search is aborted once that all vertices of the cell were reached (we
can use a counter to easily check this condition). This yields our second approach, isoCRP
20
Table 4. Performance of (sequential) MLD query variants.
queries
custom
algorithm
isoCRP
isoCRP
isoCRP
isoCRP
time [s]
(none)
(all)
(inf)
(scc)
space [MiB]
limit τ = 100 min
limit τ = 500 min
# scans time [ms]
# scans time [ms]
1.70
8.42
4.91
2.48
900
900
900
900
(138)
(138)
(138)
(138)
200 020
122 550
133 276
140 344
26.12 1 956 102
17.33
436 301
18.48
492 876
19.34
544 784
isoCRP (updown)
1.70
900
(138)
100 789
15.44
354 291
60.67
isoGRASP
isoGRASP
isoGRASP
isoGRASP
2.50
9.65
5.85
3.26
1 856
1 856
1 856
1 856
(1 094)
(1 094)
(1 094)
(1 094)
215 302
150 079
157 614
163 483
13.99 1 846 034
10.59
499 641
10.84
543 677
11.42
588 081
123.01
40.88
43.31
48.06
2.50 1 856 (1 094)
2.50 1 856 (1 094)
2.69 1 879 (1 117)
156 766
120 327
120 327
11.38
11.56
10.06
(none)
(all)
(inf)
(scc)
isoGRASP (up)
isoGRASP (updown)
isoGRASP (sep)
547 253
387 053
387 053
267.40
69.62
77.46
85.17
44.62
45.42
37.77
(all). To speed up customization (at the cost of slightly increased query times), we only
run this search for boundary vertices that have an infinite eccentricity after the first run
(isoCRP (inf)). In fact, we can even try to make use of eccentricities previously updated
during the second run: before running a Dijkstra search for a vertex u with ecc` (u) = ∞,
we check all outgoing shortcuts (u, v) (on the current level `). If len((u, v)) + ecc` (v) 6= ∞,
we can use this sum as finite upper bound and omit the Dikstra search, yielding isoCRP
(scc).
Table 4 shows (sequential) query timings of different MLD variants (for 1 000 random
queries). The first block corresponds to isoCRP queries based on unrestricted eccentricites.
Next, isoCRP (updown) corresponds to the approach presented in the main document. For
isoGRASP, similar figures are reported. We also distinguish several variants of the approach
described in the main document. In particular, (up) uses unrestricted eccentricites only in
the second phase, (updown) uses restriced eccentricites (as described in Section 4), but does
not store vertices for additional checks in a dedicated adjacency array (instead, we scan
matrices of the overlay). Finally, (sep) is the variant described in the main text. Table 5
shows figures for parallel queries.
21
Table 5. Performance of (parallel) MLD query variants.
queries
custom
algorithm
isoCRP
isoCRP
isoCRP
isoCRP
time [s]
(none)
(all)
(inf)
(scc)
space [MiB]
limit x = 100 min
limit x = 500 min
# scans time [ms]
# scans time [ms]
1.70
8.42
4.91
2.48
900
900
900
900
(138)
(138)
(138)
(138)
200 020
122 550
133 276
140 344
3.92 1 956 102
2.84
436 301
2.99
492 876
3.02
544 784
isoCRP (updown)
1.70
900
(138)
100 789
2.73
354 291
7.86
isoGRASP
isoGRASP
isoGRASP
isoGRASP
2.50
9.65
5.85
3.26
1 856
1 856
1 856
1 856
(1 094)
(1 094)
(1 094)
(1 094)
215 302
150 079
157 614
163 483
2.73 1 846 034
2.35
499 641
2.40
543 677
2.47
588 081
13.59
6.04
6.37
6.97
2.50 1 856 (1 094)
2.50 1 856 (1 094)
2.69 1 879 (1 117)
156 766
120 327
120 327
2.37
2.50
2.35
(none)
(all)
(inf)
(scc)
isoGRASP (up)
isoGRASP (updown)
isoGRASP (sep)
22
547 253
387 053
387 053
25.02
9.08
8.87
9.36
6.39
6.19
5.93
Table 6. Performance of isoPHAST-CD and isoPHAST-CP for varying number of cells.
Queries are executed sequentially (seq.) and in parallel (par.) and given in milliseconds.
The variant with the least absolute (relative) deviations is highlighted in dark (light) gray.
# cells
algorithm
exec.
isoPHAST-CD seq.
isoPHAST-CP
τ
128
256
512
1 024
2 048
4 096
8 192 16 384
10 1.92 1.17
100 12.51 10.37
500 65.45 51.81
0.74 0.51 0.38 0.32
8.88 7.75 6.83 6.09
42.24 35.14 31.87 31.24
0.33
5.63
33.70
0.41
5.56
40.03
0.91
1.62
8.19
0.59 0.34 0.40 0.43
1.34 1.33 1.50 1.83
9.02 10.51 13.18 17.27
par.
10
100
500
1.13
2.63
23.58
2.08
4.10
38.68
seq.
10 4.36 4.50
5.08 6.35 8.25 10.86 14.56
100 15.30 14.05 13.69 13.98 14.93 16.59 19.19
500 68.26 54.21 43.40 35.41 31.10 28.44 28.41
19.30
23.21
30.64
par.
10
100
500
1.87
2.26
8.30
3.85
4.33
8.53
3.68
4.44
7.90
4.68
4.80
7.74
4.69
5.56
7.97
5.87 7.94
6.77 8.60
8.83 10.14
10.41
11.10
12.10
13.77
14.16
15.27
Parameter Tuning for isoPHAST. The following Table 6 shows running times of isoPHASTCD and isoPHAST-CP for partitions with different numbers of cells. We report sequential
and parallel running times for different time limits (given in minutes). Table 7 shows
sequential query times obtained for different choices of partition and compressed subgraph
size. Table 8 shows parallel running times for the same parameter set.
23
Table 7. Sequential query times [ms] of isoPHAST-DT for varying numbers of cells
in underlying partitions and compressed subgraph sizes |G↓c |. Query times are reported
for different time limits (given in minutes) The variant with the least absolute (relative)
deviations is highlighted in dark (light) gray.
# cells
|G↓c |
τ
128
256
512
1 024
2 048
4 096
8 192
16 384
128
10 11.23 6.50 4.14 2.88
2.40
2.42
2.80
3.32
100 28.96 23.51 21.98 22.39 26.56 37.02 56.37 85.55
500 111.79 98.99 95.56 94.05 105.11 134.85 195.08 280.13
256
10 11.13 6.39 4.04 2.77
100 28.87 23.23 21.17 21.41
500 109.61 96.93 91.62 89.42
2.29
2.23
2.49
3.07
25.19 33.99 50.37 77.16
99.34 122.52 174.39 250.95
512
10 10.97 6.50 3.86 2.60
100 28.11 22.36 19.93 19.55
500 108.24 92.88 85.50 79.81
2.09
1.95
2.13
2.63
22.26 28.78 41.79 63.52
84.85 100.98 138.64 200.31
1 024
10 10.77 5.99 3.66 2.38
100 27.44 21.16 18.45 17.16
500 104.46 87.64 77.81 68.71
1.88
18.83
70.07
1.65
22.84
75.56
1.68
2.02
29.75 44.99
94.72 132.81
2 048
10 10.62 5.85 3.52 2.27
100 26.96 20.31 17.11 15.42
500 102.93 83.64 71.59 61.26
1.73
15.61
57.49
1.47
17.41
57.40
1.41
20.76
64.10
1.54
27.35
78.22
4 096
10 10.58 5.84 3.49 2.27
100 26.73 19.77 16.23 14.49
500 100.66 81.07 67.56 55.98
1.71
14.07
49.85
1.43
14.15
46.75
1.34
15.32
46.39
1.39
18.17
51.84
8 192
10
100
500
10.72 5.96 3.61 2.40
26.46 19.50 15.75 13.42
99.99 79.52 65.14 52.90
1.82
12.31
44.87
1.53
11.83
39.33
1.42
11.79
36.61
1.43
12.68
36.31
16 384
10 11.52 6.25 3.91 2.69
100 26.33 19.56 15.70 13.37
500 101.44 79.08 63.83 50.95
2.12
11.87
42.51
1.83
10.92
35.80
1.75
10.32
32.17
1.81
10.51
29.02
32 768
10
100
500
11.96 6.84 4.46 3.26
26.94 19.94 16.05 13.50
97.85 78.36 63.57 50.28
2.69
12.03
41.49
2.39
11.17
34.30
2.28
10.09
29.35
2.62
9.72
26.66
65 536
10
100
500
12.48 7.81 5.44 4.22
27.54 21.01 17.47 14.34
98.19 79.07 63.54 50.44
3.65
12.76
41.63
3.36
11.85
34.07
3.26
10.64
28.80
3.24
10.03
25.03
24
Table 8. Parallel query times [ms] of isoPHAST-DT for varying numbers of cells in
underlying partitions and compressed subgraph sizes |G↓c |. Query times are reported
for different time limits (given in minutes) The variant with the least absolute (relative)
deviations is highlighted in dark (light) gray.
# cells
|G↓c |
τ
128
256
512 1 024 2 048
4 096
8 192 16 384
128
10 4.38 2.92 2.02
100 4.65 3.54 2.91
500 10.42 8.67 8.05
1.53
2.65
7.67
1.09 1.05 1.29
2.62 3.79 4.89
8.12 10.78 14.43
2.18
7.68
21.29
256
10 4.34 2.86 1.98
100 4.67 3.49 2.85
500 10.31 8.50 7.79
1.50
2.56
7.56
1.07
2.49
7.60
1.03 1.27
3.14 4.49
9.29 13.02
2.16
7.04
18.69
512
10 4.32 2.82 1.92
100 5.19 3.40 2.74
500 10.57 8.21 7.33
1.80
2.53
6.70
0.94
2.26
6.69
1.01 1.24
2.77 3.97
7.82 11.28
2.13
6.14
15.27
1 024
10
100
500
4.27 2.73 1.84
4.51 3.30 2.62
9.90 7.82 6.78
1.39
2.24
5.90
0.88
2.01
5.65
0.97
2.34
6.07
1.24
3.08
7.56
2.10
4.92
10.70
2 048
10
100
500
4.29 2.71 1.82
4.48 3.25 2.53
9.71 7.56 6.37
1.04
1.85
5.12
0.95
1.82
4.81
0.89
1.98
4.86
1.28
2.50
5.49
2.17
3.83
7.13
4 096
10
100
500
4.26 2.75 1.87
4.49 3.26 2.52
9.64 7.48 6.14
1.07
1.82
4.84
1.01
1.73
4.34
0.89
1.80
4.17
1.32
2.20
4.38
2.25
3.34
5.51
8 192
10
100
500
4.42 3.05 1.96
4.60 3.82 2.60
9.65 7.94 6.09
1.19
1.88
4.75
1.13
1.75
4.14
1.14
1.79
3.81
1.41
2.10
3.84
2.37
3.12
4.64
16 384
10
100
500
4.54 3.01 2.17
4.78 3.54 2.80
9.81 7.58 6.23
1.45
2.07
4.86
1.49
1.93
4.20
1.46
1.94
3.80
1.65
2.21
3.73
2.61
3.18
4.37
32 768
10 4.88 3.41 2.57
100 5.16 3.94 3.19
500 10.15 7.94 6.57
2.07
2.52
5.20
2.14
2.39
4.53
2.14
2.36
4.07
2.11
2.57
3.97
2.99
3.49
4.55
65 536
10 5.55 4.10 3.44
100 5.91 4.69 4.02
500 10.89 8.67 7.32
3.15
3.43
5.94
3.18
3.32
5.24
3.15
3.30
4.78
3.31
3.42
4.65
3.73
4.18
5.20
25
Table 9. Sequential queries of isoPHAST
prepro [s]
algorithm
isoPHAST-CD
isoPHAST-CP
isoPHAST-DT
queries
contract ecc./
contract
comp.
upward
cells diam. core/graph dist. tbl. time [ms]
17.37
19.43
13.41
0.58
0.74
5.26
–
1 171.57
672.19
–
–
307.94
scanning # active
time [ms]
cells
15.76
15.87
1.20 7.83/21.97
0.38
24.37
329
221
1 439
Table 10. Parallel queries of isoPHAST
prepro [s]
algorithm
isoPHAST-CD
isoPHAST-CP
isoPHAST-DT
queries
contract ecc./
contract
comp.
upward scanning # active
cells diam. core/graph dist. tbl. time [ms] time [ms]
cells
29.51
29.49
17.76
1.49
0.95
3.00
–
1 392.66
717.72
–
–
75.08
4.47
3.76
1.04 2.13/4.68
0.40
3.38
64
77
587
Detailed Timings for isoPHAST. Tables 9 and 10 show details about sequential and
parallel query times, respectively. We report duration of different phases of preprocessing
and queries. Moreover, we show the average number of active cells.
Scaling of Parallel Queries. Finally, Figure 4 shows parallel query times (using 16 cores)
for varying time limits for the same random queries as in Section 6. As mentioned before,
curves mainly resemble the ones in the single-core setup. For the isoPHAST-CP, the linear
sweep through the core graph is slightly faster now, since the core graph is smaller. The
isoPHAST-CD variant is the best technique for mid-range queries again, however, as before,
query performance get worse for larger time limits. Note that the performance gap between
isoCRP and isoGRASP is smaller when using multiple cores (as explained in the main text,
we conjecture that isoGRASP is limited by the memory bandwidth).
26
12
isoCRP
isoGRASP
isoPHAST-CD
isoPHAST-CP
isoPHAST-DT
11
10
9
Query Time [ms]
8
7
6
5
4
3
2
1
0
10
30
100
300
1000
3000
Limit [min]
Figure 4. Parallel query times using 16 threads for varying time limits.
27
| 8cs.DS
|
Examining the Classification Accuracy of TSVMs with Feature Selection
in Comparison with the GLAD Algorithm
Hala Helmi, Jonathan M. Garibaldi and Uwe Aickelin
Abstract- Gene expression data sets are used to classify
and predict patient diagnostic categories. As we know, it
is extremely difficult and expensive to obtain gene
expression labelled examples. Moreover, conventional
supervised approaches cannot function properly when
labelled data (training examples) are insufficient using
Support Vector Machines (SVM) algorithms. Therefore,
in this paper, we suggest Transductive Support Vector
Machines (TSVMs) as semi-supervised learning
algorithms, learning with both labelled samples data and
unlabelled samples to perform the classification of
microarray data. To prune the superfluous genes and
samples we used a feature selection method called
Recursive Feature Elimination (RFE), which is supposed
to enhance the output of classification and avoid the local
optimization problem. We examined the classification
prediction accuracy of the TSVM-RFE algorithm in
comparison with the Genetic Learning Across Datasets
(GLAD) algorithm, as both are semi-supervised learning
methods. Comparing these two methods, we found that
the TSVM-RFE surpassed both a SVM using RFE and
GLAD.
I.
INTRODUCTION
Data mining techniques have traditionally been used to
extract hidden predictive information in many diverse
contexts. Usually datasets contain thousands of examples.
Recently the growth in biology, medical science, and DNA
analysis has led to the accumulation of vast amounts of
biomedical data that require in-depth analysis.
After years of research and development, many data
mining, machine learning, statistical analysis systems and
tools are available to be used in biodata analysis.
Consequently, this paper will examine a relatively new
technique in data mining. This technique is called
Transductive Supervised Support Vector Machines [2], also
named Semi-Supervised Support Vector Machines S3VMs,
located between supervised learning with fully-labelled
training data and unsupervised learning without any labelled
training data [1]. In this method, we used both labelled and
unlabelled samples for training: a small amount of labelled
data and a large amount of unlabelled data.
Hala Helmi (PhD student), Jon Garibaldi (Assoc. Prof.) and Professor Uwe
Aickelin are with the Intelligent Modelling and Analysis (IMA) Research
Group, School of Computer Science, The University of Nottingham, Jubilee
Campus, Wollaton Road, Nottingham, NG8 1BB, U.K.
{hqh, jmg, uxa} @cs.nott.ac.uk
The purpose of this paper is to observe the performance of
Transductive SVMs combined with a feature selection
method called Recursive Feature Elimination (RFE), which
is used to select molecular descriptors for Transductive
Support Vector Machines (TSVMs).
The paper is organized as follows: section 2 provides a
literature review on Support Vector Machines, Transductive
Support Vector Machines and finally Recursive Feature
Elimination. In section 3, the TSVM algorithm combined
with RFE is detailed, as well as a brief summary of the
GLAD algorithm based on a recently published paper [3]
which aims to compare the prediction accuracy of these two
algorithms. Section 4 is dedicated to comparing and
analysing the experimental results of both algorithms
(TSVM and GLAD). Finally, a summary of the results and
discussion will be presented in section 5.
II.
BACKGROUND
A. Support Vector Machines
Support Vector Machine (SVMs), as a supervised
machine learning technique, perform well in several areas of
biological research, including evaluating microarray
expression data [4], detecting remote protein homologies [5]
and recognizing translation initiation sites [6]. SVMs have
demonstrated the ability not only to separate the entities
correctly into appropriate classes, but also to identify
instances where established classification is not supported by
the data [7]. SVMs are a technique that makes use of training
that utilizes samples to determine beforehand which data
should be clustered together [4].
B. Tranductive Support Vector Machines
Transductive learning is a method strongly connected to
semi-supervised learning, where semi-supervised learning is
intermediate between supervised and unsupervised learning.
Vapnik introduced Semi-Supervised Learning for Support
Vector Machines in the 1990s. His view was that
transduction (TSVM) is preferable to induction (SVM),
since induction needs to solve a more general problem
(inferring a function) before solving a more detailed one
(computing outputs for new cases) [8] [9].
Transductive Support Vector Machines attempt to
maximize the hyperplane classifier between two classes
using labelled training data; at the same time this forces the
hyperplane to be far away from the unlabelled samples.
TSVMs seem to be a perfect semi-supervised learning
algorithm because they combine the regularization of
Support Vector Machines with a straight forward
implementation of the clustering assumption [10].
C. Recursive Feature Elimination
Most prediction model algorithms are less effective when
the size of the data set is large. There are several methods for
decreasing the amount of the feature set. From among these
methods we selected a technique called Recursive Feature
Elimination (RFE). The basis for RFE is to begin with all the
features, select the least useful, remove this feature, and then
repeat until some stopping condition is reached.
Finding the best subset features is too expensive, so RFE
decreases the difficulty of feature selection by being
‘greedy’ [11].
III.
METHODS
This section of the paper is focused on describing TSVMRFE, the problem motivated by the task of classifying
biomedical data. The goal is to examine classifier accuracy
and classification errors using the Transductive Support
Vector Machines method, in order to determine whether this
method is an effective model when combined with Recursive
Feature Elimination (RFE) compared with the Genetic
Learning Across Datasets (GLAD) algorithm.
A. Support Vector Machines
The purpose of SVMs is to locate a classifier with the
greatest margin between the samples relating to two different
classes, where the training error is minimized. Therefore, to
achieve this we used a set of ݊-dimensional training samples
ࢄ = {ݔ}ୀଵ labelled {ࣳ}ୀଵ and their mapping { (ݔ)}ୀଵ via
kernel function:
′
ܓ൫ݔ, ݔ൯= (ईࣻ)் ൫ݔ൯
SVM has the following primal form:
Minimize over ( ܟ, ܾ, ξଵ, … , ξ )
‖‖ ܟ
+ ܥ ξ
ୀଵ
Subject to:
∀ୀଵ:ࣳ ( ܟ ( ∗ܢईࣻ)′ + ܾ) ≥ 1 − ξ, ξ ≥ 0
(1)
The SVM predictor for samples x, as shown below, was
settled on by the vector inner product between the ܟand the
mapped vector (x), plus the constant ܾ.
ࣳ = ܟ(ܖܛ (࢞)′ + ܾ)
The predictor actually corresponds to a separating
hyperplane in the mapped feature space. The prediction for
each training samples x୧ is connected with a violation term
ξ୧. The C is a user-specified constant to manage the penalty
for these violation terms.
The parameter p in the above (1) points to which kind of
norm of ܟis assessed. It is usually set to 1 or 2, resulting in
the 1-norm (lଵ-SVM) and 2-norm SVM (lଶ-SVM)
respectively. The 1-norm and 2-norm TSVMs have been
discussed in [12] and [13].
B. Transductive Support Vector Machines
In this paper, we are using the extended SVM technique
of transductive SVMs and we methodically adept the 2norm for the TSVM.
The standard setting can be illustrated as:
Minimize over (ࣳଵ∗ , … . , ࣳ ୩∗ , w, b, ξଵ, … , ξ୫ , ξଵ∗ )
୫
୩
୧ୀଵ
୨ୀଵ
1
‖w‖ଶଶ + C ξ୧ + C ∗ ξ∗୨
2
∀୫୧ୀଵ:ࣳ (w
∀୩୨ୀଵ:
ࣳ ౠ∗
subject to:
(z ∗ ईࣻ)′ + b) ≥ 1 − ξ୧, ξ୧ ≥ 0
′
ቀw ൫z ∗ x୨∗ ൯ + bቁ≥ 1 − ξ∗୨, ξ∗୨ ≥ 0
(2)
Where each ࣳ ୨∗ is the unknown label for x୨∗ which is one
of the k unlabelled samples; compared with SVM (1), the
formulation (2) of the TSVMs takes the unlabelled data into
consideration by representing the violation terms ξ∗୨ caused
by forecasting each unlabelled pattern (x୨∗ ) into ࣳ ୨∗ . The
penalty for these violation terms is controlled by a new
constant C ∗ labelled with unlabelled samples, while C
consists of labelled samples only.
Precisely solving the transductive problem needs a
search of all potential assignments of ࣳଵ∗ , … . , ࣳ ୩∗ and
identifying the various terms of ξ∗ which are regularly
intractable for large data sets. It is worth mentioning the lଶTSVM implemented in the SVMLight [18] [8].
C. Recursive Feature Elimination
Recursive Feature Elimination (RFE) has the advantage
of decreasing the number of redundant and recursive
features. RFE decreases the difficulty of feature selection by
being greedy.
To extend SVM feature selection techniques to
transductive feature selection is specifically straightforward,
as we can produce TSVM-RFE by iteratively eliminating
features with weights calculated from TSVM models. We
can explain the TSVM-RFE approach as the following
standard process.
1. Pre-process data and calculate filtering scores ̅ܛ.
Moreover, optionally further normalize data. This
approach first filters some features based on scores like
Pearson correlation coefficients.
2. Adjust ܢas an all-one input vector.
3. Set ̅ܛ ∗ܢ ← ܢ. Set part of the small entries of ܢzero
according to a proportion/threshold, and probably
discrete non-zero ܢto 1.
4. Obtain a (sub-) optimal TSVM as calculated by crossvalidation accuracy (2).
5. For RFE approaches, estimate feature weights ̅ܛfrom the
model in step 4 according to:
ଵ
J୲′ = − ∑୫୧,୨α୧ α୨ࣳ ୧ࣳ ୨ (x୧/ x୧୲) (x୨, x୨୲)′ + ∑୬୧ୀଵ α୧ (3)
ଶ
Where (x୧/x୧୲) indicates the input samples ݅with feature
ݐremoved. The weight of the ݐ-th feature can be clarified as
s୲ = ඥ|∆ J୲| = ට หJ − J୲′ ห
The following estimation suggested in [11] is easier to
measure.
s୲ଶ
୫
≈ α୧ α୨ࣳ ୧ࣳ ୨ ( x୧୲) (x୨୲)′
Step 3 comprises selecting a proportion/number of
features according to a threshold cutting the vector z. For
filtering scores and the RFE method, the vector z is changed
to a binary vector. Then the z ∗ x has the effect of pruning
or deactivating some features.
The threshold is usually found to prune a (fixed)
number/proportion of features at each iteration. The value of
the remaining features is then measured by the optimality of
the TSVM model obtained in step 4. We then apply crossvalidation accuracy as the performance measure for the
TSVM algorithm. For a subset of features selected by
choosing a threshold value, we extend the model search
upon the free parameters, such as [C, C ∗ σ (RBF), d(Poly)]
and choose the preferable parameter set which results in the
highest cross-validation accuracy.
D. Genetic Learning Across Datasets (GLAD)
The GLAD algorithm is different from prior algorithms
of semi-supervised learning. The GLAD algorithm has been
applied as a wrapper method for feature selection. A Genetic
Algorithm (GA) was implemented for generating a
population of related feature subsets. The labelled data and
the unlabelled data samples were computed separately.
Linear Discriminant Analysis (LDA) and K-means (K = 2)
for these two data forms of cluster algorithms were used
[14]. A distinctive two-term scoring function resulted to
independently score the labelled and unlabelled data
samples. Generally, the score was calculated as a weighted
average of the two terms as shown below.
(4)
As the typical leave-one-out-cross-validation accuracy
for the labelled training samples, they identified the labelled
data samples score. The unlabelled data samples score
consists of two terms: a cluster separation term and a steady
ratio term.
∑ஷหܥ − ܥห
݁ݎܿݏ௨ௗ =
−
1
∑ஷหܥ − ܥห+ ∑
∑หx − ܥห
ܰ
(5)
C୧ = centroid of cluster; π୧= ratio of data in cluster i ; πୣ୶୮ =
expected ratio in cluster i ; Nେ = number of data samples in
cluster i; nୡ = number of clusters.
IV.
୧,୨ୀଵ
Specifically, the feature weights are identical to the ܟif the
SVM is built upon a linear kernel.
Return to step 3 unless there is an acceptable number of
features/iterations. Output the closing predictor and features
highlighted by large values of z.
score = w × score୪ୟୠୣ୪୪ୣୢ + (1 − w)
× score୳୬୪ୟୠୣ୪୪ୣୢ
1
ඨ ݊ (ߨ− ߨୣ୶୮)ଶ
EXPERIMENTS AND RESULTS
This section discusses the results of the experiments
which were carried out in order to assess the effectiveness of
the classification model accuracy proposed in the previous
section.
A. Datasets
Leukaemia (AML-ALL): including 7129 probes,
two variants of leukaemia are available: acute
myeloblastic leukaemia (AML), 25 samples; and
acute lymphoblastic leukaemia (ALL), 47 samples
[15].
Lymphoma (DLBCL): consisting of 7129 genes
and 58 DLBCL samples. Diffuse large B-cell
lymphoma (DLBCL) and 19 samples of follicular
lymphoma (FL) [16].
Chronic Myeloid Leukaemia (CML): contained
30 samples (18 severe emphysema, 12 mild or no
emphysema) with 22,283 human gene probe sets
[17].
B. TSVM Recursive Feature Elimination (TSVM-RFE)
Result
Leukaemia (AML-ALL): the results for the
Leukaemia ALL/AML dataset are summarized in
Figure 1 in the diagram on the left. TSVM-RFE
gave the smallest minimal error of 3.68%, and
compassionately smaller errors compared with
SVM-RFE: 3.97% for 30, 40, ..., 70 genes.
Interestingly, in our experiments both methods gave
the lowest error when 60 genes were used. This
provided a reasonable suggestion for the number of
relevant genes that should be used for the
leukaemia data.
Lymphoma (DLBCL): the results for the
Lymphoma (DLBCL) dataset are summarized in
Figure 1 in the middle diagram. TSVM-RFE gave
the smallest minimal error of 3.89%, and quite
firmly smaller errors compared to the SVM-RFE:
4.72% for 30, 40, ..., 70 genes. For TSVM, the
methods gave the lowest error for 60 genes, while
SVM methods gave the lowest error at 50 genes
with 4.72% compared to 4.97% for 60 genes. This
could give a sensible suggestion for the number of
relevant genes that should be used for the
lymphoma (DLBCL) data.
30
40
50
60
Number of Genes
70
6.5
6
5.5
5
4.5
4
3.5
3
SVM-RFE
TSVM-RFE
Error Rate
SVM-RFE
TSVM-RFE
Error Rate
Error Rate
7.5
7
6.5
6
5.5
5
4.5
4
3.5
3
CML Dataset
DLBCL Dataset
AML/ALL Dataset
30
40
50
60
70
9
8.5
8
7.5
7
6.5
6
5.5
5
SVM-RFE
30
Number of Genes
40
50
60
70
Number of Genes
Figure 1: Testing error for three data sets. The 5-fold cross-validated pair t-test shows the SVM-RFE and the TSVM-RFE
have relative differences when comparing the two methods at the confidence rate of 95% (Linear kernel, C = 1).
Leukaemia (CML): lastly, the TSVM-RFE and
SVM-RFE results for the Leukaemia (CML) dataset
are provided in Figure 1 in the diagram on the right.
TSVM-RFE gave the smallest minimal error of
6.52%, and critically smaller errors in contrast to the
7.85% SVM-RFE for 30, 40, ..., 70 genes. Both
algorithms showed the lowest error when 50 genes
were used. This presented a sensible proposal for the
number of related genes that should be used for the
Leukaemia (CML) data.
C. Comparing the TSVM Algorithm result with the GLAD
Algorithm
Implementing Genetic Learning Across Datasets involved
conducting three experiments using previous datasets, each
addressing a different cancer diagnostic problem: ALL/AML
for disparity in diagnosis; in CML a dataset predicting the
response of imatinib; and in DLBCL for forecasting outcome.
In the AML-ALL dataset, the accuracy range using only
labelled samples was 73.46%. Combining unlabelled samples
with labelled samples increased the range to 75.14%. Adding
unlabelled samples increased the accuracy from 59.34% to
65.57% in the CML experiments. The addition of the
unlabelled samples to the unlabelled samples for DLBCL
raised the accuracy from 49.67% to 55.79%. This shows that
the GLAD algorithm outperformed the SVM-RFE and TSVMRFE in some cases when we made use of the labelled data only
without gene selection. In Table 1, for example the AML-ALL
dataset, the GLAD algorithm gives 73.46% while SVM-RFE
and TSVM-RFE accuracy are 52.8% and 55.6% respectively.
However, in the second dataset DLBCL showed that
GLAD algorithm accuracy was 49.67% and SVM-RFE 55.8%.
Furthermore, the third dataset of CML, SVM-RFE gave
59.02% without gene selection, while GLAD gave 59.34%.
On the other hand, TSVM exceeded GLAD when making use
of unlabelled data along with labelled data and selecting genes.
The results are shown in Table 1.
For instance, for the CML dataset using all the samples
without gene selection TSVM gave 72.6% when selecting
genes based on REF, TSVM exceeded 93.48%, while GLAD
gave 65.57% with gene selection. In the same vein, the
accuracy for the DLBCL dataset achieved 96.11% by TSVM
with gene selection.
On the other hand, the GLAD algorithm gave 55.79% with
gene selection. As well as this, the TSVM with the AML-ALL
dataset with gene selection gave 96.32% while the GLAD
algorithm gave 75.14%. This means that the TSVM performed
better than the GLAD algorithm, and the performance with
gene selection showed a superior result.
Table 1: Accuracy obtained with SVM-RFE,
TSVM-RFE and GLAD
Dataset
ALL-AML
Without
Selection
With
Selection
DLBCL
Without
Selection
With
Selection
CML
Without
Selection
With
Selection
7219 Genes,
72 Samples
60 Genes,
72 Samples
7219 Genes,
77 Samples
60 Genes,
77 Samples
22,283
Genes,
30 Samples
50 Genes,
30 Samples
V.
SVM-RFE
Accuracy
(labelled)
TSVMRFE
Accuracy
52.8%
55.6%
73.46%
(labelled)
96.03%
96.32%
75.14%
55.8%
57.1%
95.03%
96.11%
49.67%
(labelled)
55.79%
59.02%
72.6%
59.34%
(labelled)
92.15%
93.48%
65.57%
GLAD
Accuracy
CONCLUSION
This paper has investigated topics focused on semisupervised learning. This was achieved by comparing two
different methods for semi-supervised learning using
previously classified cancer datasets.
The results on average for semi-supervised learning
surpassed those for supervised learning. However, this shows
that the GLAD algorithm outperformed SVM-RFE when we
made use of the labelled data only. On the other hand, TSVMRFE exceeded GLAD when unlabelled data along with
labelled data were used; it performed much better with gene
selection and performed well even if the labelled dataset was
small.
On the other hand, TSVM still had some drawbacks when
increasing the size of the labelled dataset, as the performance
did not significantly improve accordingly. Moreover, when the
size of the unlabelled samples was extremely small, the time
complexity was correspondingly high.
As with almost all semi-supervised learning algorithms,
TSVM showed some instability, as some results of different
runs were not the same. This occurred because unlabelled
samples may have been wrongly labelled during the learning
process. If we find a way in future to select and eliminate the
unlabelled sample first, we can then limit the number of newlylabelled samples for re-training the classifiers.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Abney, S. "Semisupervised Learning for Computational
Linguistics" (1st ed.). Chapman & Hall/CRC, 2007.
Zhu, X., "Semi-Supervised Learning Tutorial".
Department of Computer Sciences University of
Wisconsin, Madison, USA, 2007.
Harris, C. and Ghaffari, N. "Biomarker discovery across
annotated and unannotated microarray datasets using
semi-supervised learning". BMC Genomics 9 Suppl 2:S7,
2008.
Brown, M.P., Grundy, W.N., Lin, D., Cristianini, N.,
Sugnet, C.W., Furey, T.S., Ares, M. Jr., Haussler, D.
"Knowledge-based analysis of microarray gene expression
data by using support vector machines". Proc. Natl. Acad.
Sci. USA 97:262–267. 2001.
Jaakkola, T., Haussler, D. and Diekhans, M. "Using the
Fisher kernel method to detect remote protein
homologies". In Proceedings of ISMB, 1999.
Zien, A., Ratsch, G., Mika, S., Scholkopf, B., Lemmen,
C., Smola, A., Lengauer, T., and Muller, K.-R.
"Engineering support vector machine kernels that
recognize translation initiation sites", Bioinformatics,
16:799- 807, 2000.
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
Valafar, F. "Pattern Recognition Techniques in Microarray
Data Analysis". Annals of the New York Academy of
Sciences 980(1): 41-64, 2002.
Gommerman, A., Vovk, V. and Vapnik, V. "Learning by
Transduction", In Uncertainty in Artificial Intelligence,
pp.148-155,1998.
Collobert, R., Sinz, F., Weston, J. and Bottou, L. "Large
Scale Transductive SVMs". J. Mach. Learn. Res. 7
(December 2006), 1687-1712, 2006.
Zhang, R., Wang, W. et al. "Least Square Transduction
Support Vector Machine." Neural Processing Letters
29(2): 133-142, 2009.
Guyon, I., Weston, J. et al. "Gene Selection for Cancer
Classification using Support Vector Machines Machine
Learning". 46(1): 389-422, 2002.
Bennett, K. and Demiriz, A. "Semi-supervised support
vector machines". In NIPS,1998.
Joachims, T. "Transductive inference for text classification
using support vector machines". In Proceedings of ICML99, pages 200-209, 1999.
Han, J. and Kamber, M. "Data Mining: Concepts and
Techniuqes". Morgan Kaufmann Publishers, San
Francisco, CA, 2001.
Golub, T.R. et al. “Molecular classification of cancer:
class discovery and class prediction by gene expression
monitoring”. Science, 286:531-537, 1999.
Shipp, M.A. et al. "Diffuse large B-cell lymphoma
outcome prediction by gene expression profiling and
supervised machine learning". Nature Medicine, 8:68-74.
2002.
Yong, A.S.M. et al. "Molecular profiling of CD34+ cells
identifies low expression of CD7, along with high
expression of proteinase 3 or elastase, as predictors of
longer survival in patients with CML". Blood 2006,
107:205-12, 2006.
Joachims, T. "Making large-scale support vector machine
learning practical". In Advances in Kernel Methods:
Support Vector Machines, 1999.
| 5cs.CE
|
On the Duality of Fractional Repetition Codes
arXiv:1710.07909v1 [cs.IT] 22 Oct 2017
Bing Zhu†, Kenneth W. Shum‡ , and Hui Li†
† School of Electronic and Computer Engineering, Peking University
‡ Institute of Network Coding, The Chinese University of Hong Kong
E-mail: [email protected], [email protected], [email protected]
Abstract—Erasure codes have emerged as an efficient technology for providing data redundancy in distributed storage systems.
However, it is a challenging task to repair the failed storage nodes
in erasure-coded storage systems, which requires large quantities
of network resources. In this paper, we study fractional repetition
(FR) codes, which enable the minimal repair complexity and also
minimum repair bandwidth during node repair. We focus on the
duality of FR codes, and investigate the relationship between the
supported file size of an FR code and its dual code. Furthermore,
we present a dual bound on the supported file size of FR codes.
Index Terms—Distributed storage systems, regenerating codes,
repair bandwidth, fractional repetition codes, dual code.
I. I NTRODUCTION
In the recent decades, erasure coding techniques are gaining
more and more popularity owing to the high storage efficiency.
For the same storage overhead, erasure codes can improve the
data reliability than the conventional replication-based scheme
[1]. Therefore, enterprise storage systems are also transitioning
to erasure coding techniques for better storage features [2], [3].
In an erasure coding scheme, an original data object is mapped
into n coded blocks and spread across n distinct storage nodes,
satisfying that any k out of the n nodes are sufficient to retrieve
the source file. Even though traditional erasure codes (such as
Reed-Solomon codes) are capable of reducing the data storage
overhead while preserving the fault tolerance guarantees, they
are less efficient in failure recovery as compared to replication.
When replicated data is lost, it can be simply reconstructed by
downloading copies from other surviving nodes. However, for
erasure codes, the conventional method for recovering the lost
data is to reconstruct the original file by connecting to k nodes
and then re-encode to obtain the data stored in the failed node.
In other words, repairing a single failed node requires the data
from k other nodes, resulting in a k times higher reconstruction
traffic than the replication scheme.
Regenerating codes are proposed in [4] aiming to reduce the
amount of data transmission during the node repair operation.
Specifically, an (n, k, d, M, α, β) regenerating code encodes a
data object of size M into nα coded packets, which are spread
across n storage nodes, with each node containing α packets.
The stored data can be reconstructed by contacting any subset
of k nodes. Upon failure of a storage node, it can be replaced
by a new node, whose content is generated by downloading β
packets from each of any set of d surviving nodes. Particularly,
Hui Li is also with the Shenzhen Key Lab of Information Theory and Future
Internet Architecture, Shenzhen Eng. Lab of Converged Networks Technology,
and the Future Network PKU Lab of National Major Research Infrastructure,
Shenzhen Graduate School, Peking University, China.
for the case that the total amount of network transfer (i.e., dβ)
equals to the size of lost content stored in the failed node, then
the corresponding code is referred to as a minimum-bandwidth
regenerating (MBR) code [4]. However, the reduction in repair
bandwidth is at the cost of imposing an encoding capability on
the helper nodes, i.e., the β transferred packets are obtained as
a function of the packets stored in the contacted node.
Rashmi et al. [5] introduced the notion of repair-by-transfer
for node repair, where each helper node transfers a portion of
the stored data to the replacement node without any arithmetic
operations. Such a repair model eliminates the computational
burden at the helper nodes. El Rouayheb and Ramchandran [6]
further generalized the code constructions in [5] and proposed
fractional repetition codes. The encoding process of FR codes
consists of the concatenation of two codes: an outer maximumdistance-separable (MDS) code followed by an inner fractional
repetition code. The data objects are first encoded by an MDS
code, and then the encoded packets are replicated and stored in
the system according to the FR code. The outer MDS code is
used for data reconstruction, and the inner FR code is designed
to facilitate the node recovery process. In the presence of node
failures, the replacement node simply downloads the required
data from a specific set of surviving nodes without the need of
computations. The transferred packets by the contacted helper
nodes are the same as the content of the failed storage node. In
such a sophisticated manner, FR codes achieve uncoded exact
repair at the MBR point.
El Rouayheb and Ramchandran presented in [6] two explicit
constructions of FR codes based on regular graphs and Steiner
systems. Several recent studies extend the design of FR codes
to a larger set of parameters, which are based on randomized
algorithm [7], bipartite cage graphs [8], resolvable designs [9],
incidence matrix [10], group divisible designs [11], transversal
designs [12], symmetric designs [13], Kronecker product [14],
and perfect difference families [15]. Moreover, the supported
file size of constructed FR codes are also investigated in [12],
[14] and [15].
Contributions: In this paper, we consider the duality of fractional repetition codes. Based on the relationship between the
supported file size of an FR code and its dual code, we present
a dual bound on the supported file size of the original FR code.
Organization: The rest of this paper is organized as follows.
Section II introduces the duality of fractional repetition codes.
We elaborate on the file size hierarchy of FR codes in Section
III. Section IV presents a dual bound on the supported file size
of FR codes. Finally, we conclude in Section V.
structure specified by C. Each coded packet is associated with
a certain point in P, and the storage nodes are associated with
the blocks in B. A packet is stored in a node if and only if the
corresponding point and block are incident. Hence, each node
contains α packets, and each packet is stored in ρ nodes. Fig. 1
shows the encoding process of C. Since a packet is replicated
ρ times, the system can tolerate any ρ − 1 node failures.
The dual of C is defined as the FR code (B, P, I t ), where
t
I is the subset of B × P defined by
I t := {(B, p) : (p, B) ∈ I}.
Let C t denote the dual of C. We note that the incidence matrix
of C and C t are the transpose of each other. In [6], the authors
refer to the dual FR code as the Transpose code.
Figure 1. The encoding process of an (n, α, v, ρ)-FR code. A data object of
size M is first encoded into v coded packets using an MDS code. Then each
coded packet is equally replicated ρ times and distributed to n storage nodes
N1 , N2 , . . . , Nn according to the FR code, where each node stores α packets.
II. F RACTIONAL R EPETITION C ODE
AND I TS
D UAL
An incidence structure is a triple (P, B, I), where P and B
are two finite sets, and I is a subset of P ×B. The elements in
P are called points, and the elements in B are called blocks.
A point p ∈ P is incident with a block B ∈ B if (p, B) ∈ I.
The incidence matrix of an incidence structure is a |B| × |P|
zero-one matrix, with rows indexed by the blocks and columns
indexed by the points, such that the entry corresponding to a
point p and a block B is equal to 1 if and only if p is incident
with B [16].
In this setting, it is permissible that two distinct blocks are
incident with the same set of points. We say that the incidence
structure contains repeated blocks. For the case that there are
no repeated blocks in an incidence structure (P, B, I), we say
that the incidence structure is simple, and any block is uniquely
determined by the points incident with it. In other words, each
block in B can be viewed as a subset of P.
A fractional repetition (FR) code is an incidence structure in
which each point is incident with ρ blocks, and each block is
incident with α points, for some constants ρ and α. Therefore,
the incidence matrix of an FR code has constant row sum α,
and constant column sum ρ. Notice that a fractional repetition
code is also known as a tactical configuration in the literature
of combinatorial designs. Let n denote the number of blocks,
and v be the number of points in an FR code. We refer to such
an FR code as an (n, α, v, ρ)-FR code. These code parameters
satisfy the following relationship
nα = vρ.
(1)
Example 1. When every block is incident with α = 2 points,
then the notion of an FR code coincides with a ρ-regular graph
(possibly with multiple edges).
An (n, α, v, ρ)-FR code C is used to distribute data packets
across a storage system. We encode a data object into v coded
packets by using a proper MDS code, which are then replicated
and spread across n storage nodes according to the incidence
Lemma 1. Let C be an (n, α, v, ρ)-FR code.
(i) The dual code of C is a (v, ρ, n, α)-FR code.
(ii) The double dual of C is C itself.
Example 2. Let C be the incidence structure obtained from
the line graph of the complete graph on five vertices. This gives
the (5, 4, 10, 2)-FR code with incidence matrix
1 1 1 1 0 0 0 0 0 0
1 0 0 0 1 1 1 0 0 0
0 1 0 0 1 0 0 1 1 0
0 0 1 0 0 1 0 1 0 1
0 0 0 1 0 0 1 0 1 1
as discussed in [5]. We note that this is a 5 × 10 matrix with
constant row sum α = 4 and constant column sum ρ = 2. The
dual of this FR code is a (10, 2, 5, 4)-FR code with incidence
matrix
1 1 0 0 0
1 0 1 0 0
1 0 0 1 0
1 0 0 0 1
0 1 1 0 0
0 1 0 1 0.
0 1 0 0 1
0 0 1 1 0
0 0 1 0 1
0 0 0 1 1
III. T HE H IERARCHY
OF
S UPPORTED F ILE S IZE
We now formally define the supported file size Mk (C) of an
(n, α, v, ρ)-FR code C = (P, B, I). For k = 1, 2, . . . , n, the
supported file size Mk (C) of C is defined as
Mk (C) :=
min
K⊂B,|K|=k
|{p ∈ P : ∃B ∈ K, (p, B) ∈ I}|, (2)
where the minimum is taken over all k-subsets K of the block
set B. The parameter k is called the reconstruction degree. By
definition, the value of Mk (C) essentially refers to the smallest
number of distinct packets one can download from k storage
nodes. For a fixed reconstruction degree k, we can encode the
data object by an MDS code with parameters [v, Mk (C)], such
that the original data can be recovered from any Mk (C) out of
the v coded symbols. Treating each symbol as a coded packet,
and
Nk (C) < Nk0 (C) for all k > k0 ,
Nℓ (C t ) < Nℓ0 (C t ) for all ℓ > ℓ0 .
Therefore, we obtain
v,
v − 1,
v − 2,
Nk (C) = .
..
1,
0,
for
for
for
..
.
for
for
k = 0,
0 = Nv (C t ) < k ≤ Nv−1 (C t ),
Nv−1 (C t ) < k ≤ Nv−2 (C t ),
(6)
N2 (C t ) < k ≤ N1 (C t ),
N1 (C t ) < k ≤ N0 (C t ) = n.
Based on the analysis, we obtain the following theorem.
Figure 2. The graphic illustration of (k, Nk (C)) and (Nℓ (C t ), ℓ).
we can distribute the coded packets to n storage nodes based
on the FR code C such that any k storage nodes are sufficiently
in decoding the data object.
If we increase the value of k, then the resulting supported
file size also increases, i.e.,
α = M1 (C) ≤ M2 (C) ≤ · · · ≤ Mn (C) = v.
(3)
We call the above the hierarchy of supported file size of C.
We shall also define M0 (C) := 0 by convention. Similarly, the
file size hierarchy of the dual code C t is
ρ = M1 (C t ) ≤ M2 (C t ) ≤ · · · ≤ Mv (C t ) = n.
(4)
Notice that there is a close relationship between Mk (C) and
Mℓ (C t ). This property can be seen from the fact that if we can
find an x × y all-zero submatrix in the incidence matrix of C,
then we have
Mx (C) ≤ v − y and My (C t ) ≤ n − x.
This motivates us to define
max
K⊂B,|K|=k
|{p ∈ P :6 ∃B ∈ K, (p, B) ∈ I}|
i=1
where I(P ) is the indicator function equal to 1 if the condition
P is true and 0 otherwise. In this case, the right-hand side term
of (8) counts the number of i ∈ {1, 2, . . . , v} such that Ni (C t )
is strictly less than k. Thus,
v
X
I(k > Ni (C t )) = v − ℓ for Nℓ+1 (C t ) < k ≤ Nℓ (C t ),
where k = 1, 2, . . . , n.
(5)
with the maximum taken over all subsets K ⊂ B of size k. By
definition, Nk (C) is the largest integer ℓ such that we can find
an k × ℓ all-zero submatrix in the incidence matrix of C. From
(3) and (4), we have
v = N0 (C) > N1 (C) ≥ N2 (C) ≥ · · · ≥ Nn (C) = 0,
n = N0 (C t ) > N1 (C t ) ≥ N2 (C t ) ≥ · · · ≥ Nv (C t ) = 0.
We shall plot the points (k, Nk (C)) for k = 0, 1, . . . , n, and
(Nℓ (C t ), ℓ) for ℓ = 0, 1, . . . , v in the same figure. The results
can be found in Fig. 2. A Pareto optimal point, say (k0 , ℓ0 ), is
a vertex of the graph that satisfies
ℓ0 = Nk0 (C) and k0 = Nℓ0 (C t ),
Remark 3. Note that the identities in (7) can be expressed in a
more compact way by
v
X
I(k > Ni (C t )),
(8)
Mk (C) =
i=1
Nk (C) := |P| − Mk (C)
=
Theorem 2. Let C be an (n, α, v, ρ)-FR code. With Nℓ (C t ) as
defined in (5), we have
v,
for N1 (C t ) < k ≤ n = N0 (C t ),
t
t
v − 1, for N2 (C ) < k ≤ N1 (C ),
v − 2, for N3 (C t ) < k ≤ N2 (C t ),
Mk (C) = .
..
..
.
2,
for Nv−1 (C t ) < k ≤ Nv−2 (C t ),
1,
for Nv (C t ) = 0 < k ≤ Nv−1 (C t ).
(7)
Example 2 (continued). For k = 1, 2, . . . , 5, we can compute
that the supported file size Mk (C) of the complete graph based
FR code C is
10, for k = 4, 5,
9, for k = 3,
Mk (C) =
7, for k = 2,
4, for k = 1,
and the values of Nℓ (C t ) for ℓ = 1, 2, . . . , 10 are
0 = N7 (C t ) = N8 (C t ) = N9 (C t ) = N10 (C t ),
1 = N4 (C t ) = N5 (C t ) = N6 (C t ),
2 = N2 (C t ) = N3 (C t ),
3 = N1 (C t ).
Theorem 4. ([12, Lemma 32]) If we store a data object of size
M by using an (n, α, v, ρ)-FR code C, then the reconstruction
degree k is lower bounded by
l n M−1 m
α
k≥
+ 1.
(11)
v
α
Proof: By applying the bound in (9) to the dual code of
C, we obtain
v−α
t
ℓ
,
(12)
Mℓ (C ) ≤ n 1 − v
ℓ
for ℓ = 1, 2, . . . , v. (We can remove the floor operator without
loss of generality.) Hence,
v−α
v−α
t
ℓ
ℓ
Nℓ (C ) ≥ n − n 1 − v
=n v .
(13)
ℓ
ℓ
Given an integer M between 1 and v, we let ℓ be the integer
that satisfies
M = v − ℓ + 1.
Figure 3. The relationship between Mk (C) and Mℓ (C t ).
By Theorem 2, we obtain
Furthermore, the supported file size hierarchy of C t is 5 −
Nℓ (C t ), i.e,
5 = M10 (C t ) = M9 (C t ) = M8 (C t ) = M7 (C t ),
4 = M6 (C t ) = M5 (C t ) = M4 (C t ),
3 = M3 (C t ) = M2 (C t ),
2 = M1 (C t ).
Fig. 3 illustrates the relationship between Mk (C) and Mℓ (C t ).
We can obtain the two supported file size functions if we view
the stair-case graph from two different perspectives, which are
distinguished with different colors.
IV. D UAL B OUND
ON
S UPPORTED F ILE S IZE
t
k ≥ Nℓ (C ) + 1 ≥ n
v−α
v−M+1
v
v−M+1
+1=n
M−1
α
v
α
+ 1.
(14)
The proof of this theorem is completed by taking the ceiling of
both sides.
The above proof illustrates that Theorem 4 is essentially the
same as the basic bound (9) on the supported file size. We can
obtain a slight improvement if we use the bound given in (10)
instead.
Theorem 5. Given an FR code C with parameters (n, α, v, ρ),
we define the function g ′ (ℓ) recursively by
l αg ′ (ℓ) − ℓρ m
,
g ′ (1) := ρ, g ′ (ℓ + 1) := g ′ (ℓ) + ρ −
v−ℓ
Two upper bounds on the supported file size of FR codes are
presented in [6]. Specifically, the supported file size Mk (C) of
an (n, α, v, ρ)-FR code C is upper bounded by
n−ρ k
j
k
,
(9)
Mk (C) ≤ v 1 − n
for ℓ = 1, 2, . . . , v − 1. Then, for all k = 1, 2, . . . , n, we have
Mk (C) ≤ g(k),
Mℓ (C t ) ≤ g ′ (ℓ).
(16)
Nℓ (C t ) ≥ n − g ′ (ℓ),
(17)
k
and
v
X
I(k > n − g ′ (i)).
(15)
i=1
Proof: We notice that the function g ′ (ℓ) is the counterpart
of the recursive bound (10) on the dual code. Thus,
(10)
Since
where g(k) is defined recursively by
g(1) := α, g(k + 1) := g(k) + α −
Mk (C) ≤
l ρg(k) − kα m
n−k
.
The bound in (10) is not explicit and is relatively more difficult
to compute as compared to (9). However, it can be shown that
(10) is tighter than (9) in general.
We note that Theorem 2 provides a link between an FR code
and its dual. Using the mechanism in the previous section, we
give an alternate proof of a bound on the reconstruction degree
k, which is first obtained in [12].
for all ℓ, in view of the remark after the proof of Theorem 2,
we have
v
v
X
X
Mk (C) =
I(k > Nℓ (C t )) ≤
I(k > n − g ′ (ℓ)), (18)
ℓ=1
ℓ=1
which completes the proof.
We refer to the inequality in (15) as the dual bound on the
supported file size.
Example 3. Consider an explicit FR code C with parameters
(n, α, v, ρ) = (15, 2, 10, 3). The bounds in (9) and (10) suggest
that the supported file size with reconstruction degree k = 6 is
upper bounded by
k
j
12
15
M6 (C) ≤ 10 1 −
/
= 8, and
6
6
M6 (C) ≤ g(6) = 7, respectively.
Moreover, the recursive bound applied to the dual code yields
Mℓ (C t ) ≤ g ′ (ℓ) with
g ′ (1) = 3, g ′ (2) = 5, g ′ (3) = 7, g ′ (4) = 9, g ′ (5) = 11,
g ′ (6) = 12, g ′ (7) = 13, g ′ (8) = 14, g ′ (9) = g ′ (10) = 15.
Then, the dual bound in (15) gives
M6 (C) ≤
10
X
i=1
I(6 > 15 − g ′ (i)) =
10
X
I(g ′ (i) > 9) = 6.
i=1
This bound can be achieved by the (15, 2, 10, 3)-FR code listed
in the database in [10] with the following incidence matrix:
1 1 0 0 0 0 0 0 0 0
1 0 1 0 0 0 0 0 0 0
1 0 0 1 0 0 0 0 0 0
0 1 0 0 1 0 0 0 0 0
0 1 0 0 0 1 0 0 0 0
0 0 1 0 0 0 1 0 0 0
0 0 1 0 0 0 0 1 0 0
0 0 0 1 0 0 0 0 1 0 .
0 0 0 1 0 0 0 0 0 1
0 0 0 0 1 1 0 0 0 0
0 0 0 0 1 0 1 0 0 0
0 0 0 0 0 1 0 1 0 0
0 0 0 0 0 0 1 0 1 0
0 0 0 0 0 0 0 1 0 1
0 0 0 0 0 0 0 0 1 1
We note that the six storage nodes associated to rows 1, 2, 3,
4, 5, and 10 contain precisely 6 distinct packets. Therefore, this
FR code can support a file size of M = 6 with k = 6, implying
that it is optimal by the dual bound.
V. C ONCLUSION
In this paper, we investigate fractional repetition codes with
an emphasize on the duality of FR codes. We start by studying
the relationship between the supported file size of an FR code
and its dual code. Furthermore, we present an improved upper
bound on the supported file size of FR codes, which we refer to
as the dual bound.
Even though we focus on FR codes whose incidence matrix
has constant row sum and also constant column sum, the main
Theorem 2 works for any incidence matrix based code. These
codes can be viewed as a generalization of FR codes, and are
called heterogeneous FR codes. Explicit constructions of such
codes can be found in [17]–[21]. The relationship between the
file size of a heterogeneous FR code and its dual code can be
determined following a similar procedure as in Theorem 2.
ACKNOWLEDGMENT
This work was partially supported by the National Natural
Science Foundation of China under Grant 61671001, National
Key R&D Program of China under Grant 2016YFB0800101
and 2017YFB0803204, Shenzhen Basic Research Project under Grant 20170306092030521 and 20150331100723974, and
a grant from the University Grants Committee of Hong Kong
Special Administrative Region (Project No. AoE/E-02/08).
R EFERENCES
[1] H. Weatherspoon and J. D. Kubiatowicz, “Erasure coding vs. replication:
A quantitative comparison,” in Proc. Int. Workshop on Peer-to-Peer Syst.
(IPTPS), Mar. 2002, pp. 328–338.
[2] C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li,
and S. Yekhanin, “Erasure coding in Windows Azure Storage,” in Proc.
USENIX Annu. Tech. Conf., Jun. 2012, pp. 15–26.
[3] M. Sathiamoorthy, M. Asteris, D. Papailiopoulos, A. G. Dimakis, R.
Vadali, S. Chen, and D. Borthakur, “XORing elephants: Novel erasure
codes for big data,” in Proc. 39th Int. Conf. Very Large Data Bases
(VLDB), Aug. 2013, pp. 325–336.
[4] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Trans. Inf.
Theory, vol. 56, no. 9, pp. 4539–4551, Sep. 2010.
[5] K. V. Rashmi, N. B. Shah, P. V. Kumar, and K. Ramchandran, “Explicit
construction of optimal exact regenerating codes for distributed storage,”
in Proc. 47th Annu. Allerton Conf., Sep. 2009, pp. 1243–1249.
[6] S. El Rouayheb and K. Ramchandran, “Fractional repetition codes for
repair in distributed storage systems,” in Proc. 48th Annu. Allerton Conf.,
Oct. 2010, pp. 1510–1517.
[7] S. Pawar, N. Noorshams, S. El Rouayheb, and K. Ramchandran, “Dress
codes for the storage cloud: simple randomized constructions,” in Proc.
IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2011, pp. 2338–2342.
[8] J. Koo and J. Gill, “Scalable constructions of fractional repetition codes
in distributed storage systems,” in Proc. 49th Annu. Allerton Conf., Sep.
2011, pp. 1366–1373.
[9] O. Olmez and A. Ramamoorthy, “Repairable replication-based storage
systems using resolvable designs,” in Proc. 50th Annu. Allerton Conf.,
Oct. 2012, pp. 1174–1181.
[10] S. Anil, M. K. Gupta and T. A. Gulliver, “Enumerating some fractional
repetition codes,” arXiv:1303.6801 [cs.IT], Mar. 2013.
[11] B. Zhu, K. W. Shum, H. Li, and S.-Y. R. Li, “On low repair complexity
storage codes via group divisible designs,” in Proc. 19th IEEE Symp.
Comput. Commun. (ISCC), Jun. 2014, pp. 1–5.
[12] N. Silberstein and T. Etzion, “Optimal fractional repetition codes based
on graphs and designs,” IEEE Trans. Inf. Theory, vol. 61, no. 8, pp.
4164–4180, Aug. 2015.
[13] B. Zhu and H. Li, “Adaptive fractional repetition codes for dynamic
storage systems,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2078–2081,
Dec. 2015.
[14] O. Olmez and A. Ramamoorthy, “Fractional repetition codes with
flexible repair from combinatorial designs,” IEEE Trans. Inf. Theory,
vol. 62, no. 4, pp. 1565–1591, Apr. 2016.
[15] H. Park and Y.-S. Kim, “Construction of fractional repetition codes with
variable parameters for distributed storage systems,” Entropy, vol. 18,
no. 12, pp. 1–8, Dec. 2016.
[16] E. F. Assmus and J. D. Key, Designs and Their Codes. Cambridge, U.K.:
Cambridge Univ. Press, 1992.
[17] M. K. Gupta, A. Agrawal, and D. Yadav, “On weak Dress codes for
cloud storage,” arXiv:1302.3681 [cs.IT], Feb. 2013.
[18] B. Zhu, K. W. Shum, H. Li, and H. Hou, “General fractional repetition
codes for distributed storage systems,” IEEE Commun. Lett., vol. 18,
no. 4, pp. 660–663, Apr. 2014.
[19] Q. Yu, C. W. Sung, and T. H. Chan, “Irregular fractional repetition
code optimization for heterogeneous cloud storage,” IEEE J. Sel. Areas
Commun., vol. 32, no. 5, pp. 1048–1060, May 2014.
[20] B. Zhu, K. W. Shum, and H. Li, “Heterogeneity-aware codes with
uncoded repair for distributed storage systems,” IEEE Commun. Lett.,
vol. 19, no. 6, pp. 901–904, Jun. 2015.
[21] K. G. Benerjee and M. K. Gupta, “On Dress codes with flowers,” in
Proc. Int. Workshop Signal Design Appl. Commun. (IWSDA), Sep. 2015,
pp. 108–112.
| 7cs.IT
|
Robust Stochastic Configuration Networks with
Kernel Density Estimation
arXiv:1702.04459v2 [cs.NE] 29 May 2017
Dianhui Wang∗, Ming Li
Department of Computer Science and Information Technology
La Trobe University, Melbourne, VIC 3086, Australia
Email:[email protected]
Abstract
Neural networks have been widely used as predictive models to fit data
distribution, and they could be implemented through learning a collection of
samples. In many applications, however, the given dataset may contain noisy
samples or outliers which may result in a poor learner model in terms of
generalization. This paper contributes to a development of robust stochastic
configuration networks (RSCNs) for resolving uncertain data regression problems.
RSCNs are built on original stochastic configuration networks with weighted least
squares method for evaluating the output weights, and the input weights and biases
are incrementally and randomly generated by satisfying with a set of inequality
constrains. The kernel density estimation (KDE) method is employed to set
the penalty weights for each training samples, so that some negative impacts,
caused by noisy data or outliers, on the resulting learner model can be reduced.
The alternating optimization technique is applied for updating a RSCN model
with improved penalty weights computed from the kernel density estimation
function. Performance evaluation is carried out by a function approximation, four
benchmark datasets and a case study on engineering application. Comparisons to
other robust randomised neural modelling techniques, including the probabilistic
robust learning algorithm for neural networks with random weights and improved
RVFL networks, indicate that the proposed RSCNs with KDE perform favourably
and demonstrate good potential for real-world applications.
1 Introduction
For many real-world applications, sample data collected from various sensors may be contaminated
by some noises or outliers [7], which makes troubles for building neural networks with sound
generalization. Over the past years, robust data modelling techniques have received considerable
attention in the field of applied statistics [7, 8, 11] and machine learning [2, 3, 5, 12, 19]. It is
well known that the cost function plays an important role in robust data modelling. In [2], the
M-estimator and Hampels hyperbolic tangent estimates were employed in the cost function, aiming
to alleviate the negative impacts of outliers on the modelling performance. Under an assumption that
the additive noise of the output follows Cauchy distribution, the mean log squared error was used as
a cost function in [12]. In [5], a robust learning algorithm based on the M-estimator cost function
with random sample consensus was proposed to deal with outliers, and this algorithm has been
successfully applied in computer vision and image processing [15, 20, 22]. Besides these methods
mentioned above, some results on robust data regression using support vector machine (SVM) have
been reported in [3, 19], where SVM-based approaches demonstrate some limits to handle uncertain
data regression problems with higher level outliers.
∗
Corresponding author.
Back-propagation algorithms for training neural networks suffer from many shortcomings, such
as learning parameter setting, slow convergence and local minima. Thus, it is useful to develop
advanced learning techniques for resolving data regression problems, in particular, for stream data
or online data modelling tasks. With such a background, randomized methods for training neural
networks have been developed in the last decades [9, 14, 16]. Readers may refer to a recently
published survey paper for more details about some milestones on this topic [18]. Studies on
the robust data modelling techniques based on Random Vector Functional-link (RVFL) networks
have been reported in [1, 4]. Specifically, a hybrid regularization model with assumption on the
sparsity of outliers was used in training process, and a probabilistic robust learning algorithm for
neural networks with random weights (PRNNRW) was proposed in [1]. However, some learning
parameters used in PRNNRW must be set properly and this is quite difficult to be done in practice. In
[4], an improved version of RVFL networks built by using a KDE-based weighted cost function was
suggested. Unfortunately, the significance of the scope setting of the random weights and biases for
RVFL networks has not been addressed. In [13], we looked into some practical issues and common
pitfalls of RVFL networks, and clearly revealed the impact of the scope setting on the modelling
performance of RVFL networks. Our findings reported in [13] motivates us to further investigate the
robust data regression problem using an advanced randomized learner model, termed as Stochastic
Configuration Networks (SCNs), which are built incrementally by assigning the random weights
and biases with a supervisory mechanism [21].
This paper aims to develop a robust version of SCNs for uncertain data regression. Based on the
construction process of SCNs, we utilise a weighted least squares objective function for evaluating
the output weights of SCNs, and the resulting approximation errors from the present SCN model are
used to incrementally configure the hidden nodes with constrained random parameters. During the
course of building RSCNs, the penalty weights representing the degree of contribution of individual
data samples to the objective function are updated according to a newly constructed KDE function.
In this work, an alternating optimization (AO) technique is employed to implement the RSCN model.
Our proposed algorithm, termed as RSC-KDE, is evaluated by using a function approximation, four
benchmark datasets with different levels of artificial outliers, and an engineering application [4].
Experimental results indicate that the proposed RSC-KDE outperforms other existing methods in
terms of effectiveness and robustness.
The remainder of paper is organized as follows: Section 2 briefly reviews stochastic configuration
networks and the kernel density estimation method. Section 3 details our proposed RSC-KDE
algorithm. Section 4 reports experimental results with comparisons and discussion. Section 5
concludes this paper with some remarks.
2 Revisit of Stochastic Configuration Networks
This section reviews our proposed SCN framework, in which the input weights and biases are
randomly assigned in the light of a supervisory mechanism, and the output weights are evaluated by
solving a linear least squares problem. More details about SCNs can be read in [21].
Let Γ := {g1 , g2 , g3 ...} be a set of real-valued functions, span(Γ) denote a function space spanned by
Γ; L2 (D) denote the space of all Lebesgue measurable functions f = [f1 , f2 , . . . , fm ] : Rd → Rm
defined on D ⊂ Rd , with the L2 norm defined as
!1/2
m Z
X
2
kf k :=
|fq (x)| dx
< ∞.
(1)
q=1
D
The inner product of φ = [φ1 , φ2 , . . . , φm ] : Rd → Rm and f is defined as
m
m Z
X
X
fq (x)φq (x)dx.
hf, φi :=
hfq , φq i =
q=1
q=1
(2)
D
In the special case that m = 1,R for a real-valued function ψ : Rd → R defined on D ⊂ Rd ,
its L2 normRbecomes kψk := ( D |ψ(x)|2 dx)1/2 , while the inner product of ψ1 and ψ2 becomes
hψ1 , ψ2 i = D ψ1 (x)ψ2 (x)dx.
Given a target function f : Rd → Rm , suppose that we have already built a single layer
PL−1
feed-forward network (SLFN) with L − 1 hidden nodes, i.e, fL−1 (x) = j=1 βj gj (wjT x + bj )
2
(L = 1, 2, . . ., f0 = 0), βj = [βj,1 , . . . , βj,m ]T , and the current residual error, denoted as
eL−1 = f − fL−1 = [eL−1,1 , . . . , eL−1,m], does not reach an acceptable tolerance level. The
framework of SCNs provides an effective solution for how to add βL , gL (wL and bL ) leading
to fL = fL−1 + βL gL until the residual error eL = f − fL falls into an expected tolerance ǫ.
The following Theorem 1 restates the universal approximation property of SCNs (corresponding to
Theorem 7 in [21]).
Theorem 1. Suppose that span(Γ) is dense in L2 space and ∀g ∈ Γ, 0 < kgk < bg for some
bg ∈ R+ . Given 0 < r < 1 and a nonnegative real number sequence {µL } with limL→+∞ µL = 0
and µL ≤ (1 − r). For L = 1, 2, . . ., denoted by
δL =
m
X
q=1
δL,q , δL,q = (1 − r − µL )keL−1,q k2 , q = 1, 2, . . . , m.
(3)
If the random basis function gL is generated with the following constraints:
heL−1,q , gL i2 ≥ b2g δL,q , q = 1, 2, . . . , m,
(4)
and the output weights are evaluated by
[β1∗ , β2∗ , . . . , βL∗ ] = arg min kf −
β
Then, limL→+∞ kf − fL k = 0, where fL =
PL
j=1
L
X
j=1
βj gj k.
(5)
∗
∗
βj∗ gj , βj∗ = [βj,1
, . . . , βj,m
]T .
The construction process of SCNs starts with a small sized network, then incrementally adds hidden
nodes followed by computing the output weights. This procedure keeps going on until the model
meets some certain termination criterion. Some remarkable merits of our SCNs can be summarized
as follows : (i) There is no requirement on any prior knowledge about the architecture of the
constructed network for a given task; (ii) The scope of the random weights and biases is adjustable
and automatically determined by the data rather than a fixed setting from end-users; and (iii) The
input weights and biases are randomly assigned with an inequality constraint, which can guarantee
the universal approximation property.
Remark 1: In the past two decades, randomized methods for training neural networks suffer from
some misunderstandings on the constraint of random assignment (i.e., randomly assign the input
weights and biases in a fixed interval, even any intervals, or no specification at all). Unfortunately,
in many published works the authors blindly and wrongly use the randomness in constructing
randomized learner models and mindlessly made some misleading statements without any scientific
justification [13]. It should be pointed out that the universal approximation theorems for RVFL
networks established in [9] are fundamental and significant to the randomized learning theory.
However, these theoretical results cannot provide us with practical and useful guidance on structure
and learning parameter settings, and algorithm design and implementation aspects. Our proposed
SCN framework firstly touches the base of randomized learning techniques, and draws researches
on this topic into right tracks through proper uses of constrained random parameters. Indeed,
the inequalities (4) proposed originally in [21] are essential to ensure the universal approximation
property. From algorithm implementation perspectives, a scheme to prevent SCNs from over-fitting
must in place. As usually done in machine learning, the performance over a validation set can be
used to terminate the learning process.
At the end of this section, we briefly introduce a kernel density estimation method for weighting
contributions of each training data in the learning process. Basically, a kernel density estimator
computes a smooth density estimation from data samples by placing on each sample point a function
representing its contribution to the density. Readers can refer to [10] and [17] for more details on
the kernel density estimation (KDE) method.
Based on KDE method, the underlying probability density function of a random variable η can be
estimated by
N
X
ρk K(η − ηk ),
(6)
Φ(η) =
k=1
3
where K represents a kernel function (typically a Gaussian function) centered at the data points
ηk , and ρk are weighting coefficients (uniform weights are commonly used, i.e., ρk = 1/N , k =
1, 2, . . . , N ).
3 Robust Stochastic Configuration Networks
Robust data regression seeks for a capable learner model that can successfully learn a true
distribution from uncertain data samples. This is very important for industrial applications, where
the collected data samples are always contaminated by outliers caused by the failure of measuring
or transmission devices or unusual disturbances. This section details the development of robust
stochastic configuration networks (RSCNs). For a target function f : Rd → Rm , given a
training dataset with inputs X = {x1 , x2 , . . . , xN }, xi = [xi,1 , . . . , xi,d ]T ∈ Rd and outputs
T = {t1 , t2 , . . . , tN }, where ti = [ti,1 , . . . , ti,m ]T ∈ Rm , i = 1, . . . , N , a RSCN model can
be built by solving a weighted least squares (WLS) problem, that is,
min
β,θ
N
X
i=1
θi k
L
X
j=1
βj g(wj , bj , xi ) − ti k2 ,
(7)
where θi ≥ 0 (i = 1, 2, . . . , N ) is the i-th penalty weight, representing the contribution of the
P
corresponding sample to the objective function (7). GL (x) = L
j=1 βj g(wj , bj , x) is a SCN, in
which g is the activation function and L is the number of hidden nodes, wj , bj are the input weights
and biases that are stochastically configured according to Theorem 1, and βj represents the output
weights.
Generally speaking, the penalty weights θi (i = 1, 2, . . . , N ) can be determined according to the
reliability of the sample xi . It is easy to understand that a higher reliability means more trust in the
data that correctly represents the process behavior, and a lower reliability indicates less confidence
on the sample that may be an outlier or noisy one. Thus, decreasing (increasing) the penalty weights
of training samples with lower (higher) reliability can eliminate or even remove negative impacts on
the learner model building.
A logical thinking to combine the original SCN framework with the WLS-based learning is
to use a weighted version of the model’s residual error in the process of building SCNs. In
other words, a RSCN model can be incrementally built by stochastically configuring the hidden
parameters based on a redefined constraint (4), and evaluating the output weights by using the
WLS solution of (7). Given training samples X = {x1 , x2 , . . . , xN }, xi = [xi,1 , . . . , xi,d ]T ∈
Rd , denoted by eL−1 (X) = [eL−1,1 (X), eL−1,2 (X), . . . , eL−1,m(X)]T ∈ RN ×m , where
T
eL−1,q (X) = [eL−1,q (x1 ), . . . , eL−1,q (xN )] ∈ RN , q = 1, 2, . . . , m. Let hL (X) = [gL (wL
x1 +
T
T
bL ), . . . , gL (wL xN + bL )] be the output vector of the new hidden node for each input xi ,
i = 1, 2, . . . , N . Then, we can obtain the current hidden layer output matrix, HL = [h1 , h2 , . . . , hL ].
According to (7), a weighted form of eL−1 (X) can be defined if the penalty weights are
available during the constructive process of SCNs. Denoted the weighted eL−1 (X) and hL (X)
by ẽL−1 (X) = [ẽL−1,1 (X), ẽL−1,2 (X), . . . , ẽL−1,m (X)]T = ΘeL−1 (X), and h̃L (X) = ΘhL (X),
√ √
√
P
respectively, where Θ = diag{ θ1 , θ2 , . . . , θN }. Let ξ˜L = m
q=1 ξ̃L,q and ξ̃L,q be defined as
2
ẽT
L−1,q (X) · h̃L (X)
− (1 − r − µL )ẽT
(8)
ξ˜L,q =
L−1,q (X)ẽL−1,q (X).
h̃T
(X)
·
h̃
(X)
L
L
Based on Theorem 1, the hidden parameters (w and b) can be stochastically configured by choosing
a maximum ξ˜L among multiple tests, subjected to ξ̃L,q ≥ 0, q = 1, 2, . . . , m.
Now, the remaining question is how to assign penalty weights θ1 , θ2 , . . . , θN along with the process
of building SCNs. Recall that if the probability density function of the residuals can be obtained
or estimated, the reliabilities of the samples will be determined. Inspired by the work in [25], we
construct a probability density function of the residual error eL as follows (here eL is regarded as a
random variable)
N
1 X
keL − eL (xk )k
Φ(eL ) =
,
(9)
K
τN
τ
k=1
4
where eL (xk ) = [eL−1,1 (xk ), . . . , eL−1,m (xk )]T ∈ Rm , τ = 1.06σ̂N −1/5 is an estimation window
width, σ̂ is the standard deviation of the residual errors, K is a Gaussian function defined by
1
t2
K(t) = √ exp (− ).
2
2π
(10)
With these preparation, the probability of each residual error eL (xi ) (i = 1, 2, . . . , N ) can be
obtained by calculating Φ(eL (xi )). Then, the penalty weights θi (i = 1, 2, . . . , N ) can be assigned
as
N
1 X
keL (xi ) − eL (xk )k
θi = Φ(eL (xi )) =
.
(11)
K
τN
τ
k=1
With these penalty weights, the output weights β ∗ = [β1∗ , β2∗ , . . . , βL∗ ] can be evaluated by solving
the following WLS problem:
β∗
=
arg min (HL β − T )T Λ(HL β − T )
=
(HLT ΛHL )† HLT ΛT,
β
(12)
2
where β = [β1 , β2 , . . . , βL ], HL = [h1 , h2 , . . . , hL ], Λ = Θ = diag{θ1 , θ2 , . . . , θN }.
In this paper, an alternating optimization (AO) strategy is applied for implementing RSCNs, which
includes the process of building a SCN model with a set of suitable penalty weights that control the
contribution of contaminated samples. The whole procedure begins with assigning equal penalty
weights for all samples (i.e., θi = 1, and Λ is an identity matrix) and building the SCN model,
followed by updating these penalty weights according to (11), then repeating these two steps
alternatively until some certain stopping criterion is reached. It should be clarified that the penalty
weights are updated only when a round of the process of building the SCN model is completed.
Specifically, the penalty weights θi (i = 1, 2, . . . , N ) and the output weights β can be calculated
iteratively by applying the AO procedure, that is,
!
N
(ν)
(ν)
eL (xi ) − eL (xk )
1 X
(ν+1)
=
θi
(13)
K
τN
τ
k=1
and
β (ν+1) = (HLT Λ(ν+1) HL )† HLT Λ(ν+1) T,
(14)
(ν+1)
where ν denotes the ν-th iteration of the alternating optimization process, and Λ
=
(ν+1) (ν+1)
(ν+1)
(ν)
diag{θ1
, θ2
, . . . , θN
}. Here, we use eL (xi ) to represent the residual error value for
(ν)
xi with θi used as the present penalty weights in the RSCN model.
Distinguished from the original SCN framework that all training samples contribute equally to the
objective function, our newly developed RSCNs treat individual samples differently and put more
emphasis on data samples with higher reliability, which indeed corresponds to lager values of the
penalty weights. That means if a training output yj is corrupted by outliers or noises, the sample
pair (xj , yj ) will provide less contribution to the cost function due to the relatively small value of its
corresponding penalty weight.
Remark 2: An important issue in design of RSCNs is about the termination criterion. As mentioned
in Remark 1, the performance over a validation data set can be employed as a stopping condition.
Unfortunately, this method does not make sense and cannot be applied for building RSCNs due to
the presence of uncertainties in the validation data. However, the validation testing criterion can still
be used if a clean data set extracted from the true data distribution is available. In this work, we
assume that a clean validation data set is ready to be used for this purpose. Our proposed RSC-KDE
algorithm is summarized in the following pseudo code.
4 Performance Evaluation
This section reports some simulation results on a function approximation, four benchmark datasets
from KEEL2, and an industrial application [4]. The proposed RSC-KDE algorithm is compared to
2
KEEL: http://www.keel.es/
5
RSC-KDE Algorithm
Given inputs X = {x1 , x2 , . . . , xN }, xi ∈ Rd , outputs T = {t1 , t2 , . . . , tN }, ti ∈ Rm ; Set Lmax as
the maximum number of hidden nodes, ǫ as the expected error tolerance, Pmax as the maximum times
of random configuration, Imax as the maximum number of alternating optimization; Choose a set of
positive scalars Υ = {λmin : ∆λ : λmax };
1. Initialize e0 := [t1 , . . . , tN ]T , 0 < r < 1, θi = 1, Λ = diag{θ1 , θ2 , . . . , θN }, Ω, W := [ ];
2. While ν ≤ Imax AND ke0 kF > ǫ, Do
3. While L ≤ Lmax AND ke0 kF > ǫ, Do
4.
For λ ∈ Υ, Do
5.
For k = 1, 2 . . . , Pmax , Do
6.
Randomly assign ωL and bL from [−λ, λ]d and [−λ, λ], respectively;
7.
Calculate ẽL−1 , h̃L , ξ˜L,q by Eq. (8), set µL = (1 − r)/(L + 1);
8.
If min{ξ˜L,1 , ξ̃L,2 , ..., ξ˜L,m } ≥ 0
9.
Save wL and bL in W , ξ̃L in Ω, respectively;
10.
Else Go back to Step 5
11.
End If
12.
End For (corresponds to Step 5)
13.
If W is not empty
∗
14.
Find wL
, b∗L maximizing ξ̃L in Ω, and set HL = [h∗1 , h∗2 , . . . , h∗L ];
15.
Break (go to Step 19);
16.
Else Randomly take τ ∈ (0, 1 − r), renew r := r + τ , return to Step 5;
17.
End If
18.
End For (corresponds to Step 4)
∗
19.
Calculate β ∗ = [β1∗ , β2∗ , . . . , βL
] based on Eq. (14);
∗
20.
Calculate eL = HL β − T and obtain ẽL ;
21.
Renew e0 := ẽL , L := L + 1;
22. End While
23. Update θi by Eq. (13), renew Λ = diag{θ1 , θ2 , . . . , θN } and ν := ν + 1;
24. End While
∗
∗
], ω ∗ = [ω1∗ , ω2∗ , . . . , ωL
], b∗ =
25. Return Λ = diag{θ1 , . . . , θN }, β ∗ = [β1∗ , β2∗ , . . . , βL
[b∗1 , b∗2 , . . . , b∗L ].
other three randomized algorithms: RVFL [9], improved RVFL [4], and the probabilistic learning
algorithm PRNNRW [1]. All comparisons are conducted under several scenarios with different
system settings on learning parameters and noise levels. The Root Mean Squared Error (RMSE) is
used to evaluate the generalization capability of each algorithm over the outlier-free test datasets. In
addition, a robustness analysis on the setting of ν and Lmax is given for the case study.
The input and output values are normalized into [0,1] before artificially adding certain level of
outliers. The maximum times of random configuration Tmax in RSC-KDE is set as 100, and the
sigmoidal activation function g(x) = 1/(1 + exp(−x)) is used in all simulations.
4.1 Function Approximation
Consider the following function approximation problem [6]:
2
2
2
y = 0.2e−(10x−4) + 0.5e−(80x−40) + 0.3e−(80x−20) , x ∈ [−1, 1].
The training dataset contains 600 points which are randomly generated from the uniform distribution
[-1,1]. The test dataset, of size 600, is generated from a regularly spaced grid on [-1,1]. We purposely
introduce outliers into the training dataset: A variable percentage ξ of the data points is selected
randomly and their corresponding function values (y) are substituted by background noises with
values uniformly distributed over [-0.2, 0.8]. To show the advantage of RSC-KDE in uncertain data
modelling, we make comparisons on the performance among these four algorithms at each outlier
percentage, i.e., ζ = {0%, 5%, 10%, 15%, 20%, 25%, 30%}.
Figure 1 (a) depicts the training samples with the outlier percentage at ξ = 25%, Figure 1
(b) shows the learners’ performance on the test dataset from the four algorithms, in which the
proposed RSC-KDE exhibits the best performance compared with the other three methods. For
RVFL, Improved RVFL and PRNNRW, we examined different scope settings for the random
6
0.6
0.5
0.6
Training Samples
Target Function
0.5
0.4
0.4
Test Samples
Improved RVFL
PRNNRW
RVFL
RSC-KDE
0.3
Y
y
0.3
0.2
0.2
0.1
0.1
0
0
-0.1
-0.2
-1
-0.5
0
x
0.5
1
(a)
-0.1
-1
-0.5
0
x
0.5
1
(b)
Figure 1: (a) 600 training samples used for function approximation at ζ = 25%, along with target
function shown in red line; (b) Approximation performance on the test dataset by four learning
algorithms at ζ = 25%.
parameters, i.e., w, b ∈ [−λ, λ], λ = 1, 10, 30, 50, 100, 150, to demonstrate its significant impact
on the randomized learners’ performance. For each λ, different network architectures (e.g. L =
40, 60, 100, 120, 150, 200) are used to find the pair (λ, L) leading to the most favorable performance.
For λ = 1, 30, 50, 100, we demonstrate the test results of the four algorithms in Figure 2, where the
average errors and standard deviations of RMSE (based on 100 trials) are plotted for each outlier
percentage. It is clear that our proposed RSC-KDE algorithm outperforms the other methods for
each case. In particular, for λ = 1, the approximation performance of all other three algorithms
are far worse than an acceptable level. Obviously, if the scope setting is improper, the randomized
learner models can not be expected to perform at all, as reported in [13, 21]. As the outlier percentage
becomes very low, RSCN outperforms other randomized learner models, which aligns well with the
consequence reported in [21]. Given a relatively higher outlier percentage, for example ζ = 30%,
RSC-KDE produces a promising result with RMSE of 0.0138 ± 0.0027, that is much better than
the other three algorithms. More results for λ = 1, 30, 50, 100 at ζ = 10%, 15%, 20%, 25% are
reported in Table 1.
Table 1: Performance comparisons on the function approximation
Scope Setting
λ=1
λ = 30
λ = 50
λ = 150
Algorithm
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
Test Performance at Different Outlier Percentage (MEAN, STD)
10%
15%
20%
25%
0.0463,2.0e-05 0.0464,2.0e-05 0.0469,2.0e-05 0.0478,2.0e-05
0.0556,5.1e-05 0.0555,3.0e-05 0.0560,4.0e-05 0.0563,3.3e-05
0.0781,6.6e-06 0.0781,7.3e-06 0.0781,7.3e-06 0.0781,6.8e-06
0.0090,0.0016
0.0098,0.0022
0.0104,0.0035
0.0117,0.0022
0.0225,0.0037
0.0249,0.0039
0.0264,0.0033
0.0326,0.0032
0.0344,0.0030
0.0326,0.0036
0.0319,0.0034
0.0322,0.0028
0.0491,0.0029
0.0490,0.0013
0.0490,0.0017
0.0492,0.0010
0.0090,0.0016
0.0098,0.0022
0.0104,0.0035
0.0117,0.0022
0.0248,0.0042
0.0274,0.0079
0.0288,0.0062
0.0343,0.0065
0.0247,0.0056
0.0229,0.0047
0.0218,0.0041
0.0240,0.0038
0.0498,0.0014
0.0497,0.0020
0.0496,0.0024
0.0494,0.0015
0.0090,0.0016
0.0098,0.0022
0.0104,0.0035
0.0117,0.0022
0.0345,0.0166
0.0353,0.0062
0.0380,0.0099
0.0386,0.0086
0.0229,0.0082
0.0214,0.0074
0.0228,0.0084
0.0284,0.0076
0.0445,0.0031
0.0439,0.0032
0.0438,0.0030
0.0441,0.0037
0.0090,0.0016
0.0098,0.0022
0.0104,0.0035
0.0117,0.0022
4.2 Benchmark Datasets
Table 2 gives some statistics on the four datasets used in our simulations. We randomly chose
75% of the whole samples as the training dataset while take the remainders as the test dataset. A
7
0.08
0.055
Improved RVFL
PRNNRW
RVFL
RSC-KDE
0.07
0.05
0.045
0.06
0.04
0.05
0.035
0.04
0.03
0.025
0.03
0.02
0.02
0.015
0.01
0.01
0
0.005
0
5%
10%
15%
20%
25%
30%
0
5%
10%
(a) λ = 1
15%
20%
25%
30%
20%
25%
30%
(b) λ = 30
0.06
0.055
0.05
0.05
0.045
0.04
0.04
0.035
0.03
0.03
0.025
0.02
0.02
0.015
0.01
0.01
0.005
0
0
5%
10%
15%
20%
25%
30%
0
5%
10%
(c) λ = 50
15%
(d) λ = 100
Figure 2: Test RMSE comparison on the function approximation among the four algorithms with
different outlier percentage ζ. λ = 1, 10, 50, 100 and L = 100 are used in RVFL, Improved RVFL
and PRNNRW.
similar strategy as done in the function approximation problem is applied to introduce different
percentages of outliers into the training dataset. That is, for each normalized training dataset, a
variable percentage ζ of the data points are selected at random and the associated output values are
substituted with background noises that are uniformly distributed on the range [-0.5,0.5]. Finally,
the contaminated output values are distributed over [-0.5,1.5] instead of [0,1], while the test dataset
is outlier-free for the assessment purpose.
Table 2: Statistics of the benchmark datasets
No.
Name
Instances
Features
1
2
3
4
stock
laser
concrete
treasury
950
993
1030
1049
9
4
8
15
For each benchmark dataset, we evaluate the performance of RVFL, Improved RVFL and
PRNNRW with different settings of λ and L, for example, λ = {0.1, 0.5, 1, 3, 5} and L =
{30, 50, 100, 150, 200}, respectively. We conduct 50 independent trials for each case (λ and
L) and calculate their mean values and standard deviations of RMSE at different percentage of
outliers. In Figure 3, we plot the comparison results for RVFL, Improved RVFL, and PRNNRW
with λ = 1, and it shows that our proposed RSC-KDE algorithm outperforms the others at each
outlier percentage. From the results reported in Table 3, it is observed that our proposed RSC-KDE
algorithm outperform the others for all these four datasets at each outlier percentage, despite that the
results obtained by other three algorithms are the ‘best’ ones selected from all results with various
8
settings of λ and L. Specifically in Figure 3, PRNNRW (with λ = 1) exhibits the worst accuracy on
stock, laser, concrete, but performs better than RVFL and Improved RVFL on treasury. Also in Table
3, the results from PRNNRW, as obtained by the most appropriate combination of λ and L from the
set {0.1, 0.5, 1, 3, 5} and {30, 50, 100, 150, 200}, respectively, are much better than that shown in
Figure 3. Indeed, for RVFL, Improved RVFL and PRNNRW, a common practice to determine a
suitable scope setting and a reasonable network architecture is based on the trial-and-error method,
while the proposed RSC-KDE works robustly with much less human intervention on the parameter
setting.
0.09
0.08
0.08
0.07
0.07
0.06
0.06
0.05
0.05
0.04
0.04
0.03
0.03
0.02
0.02
0.01
0
5%
10%
15%
20%
25%
30%
0
5%
10%
(a) stock
15%
20%
25%
30%
20%
25%
30%
(b) laser
0.14
0.04
0.13
0.035
0.12
Improved RVFL
PRNNRW
RVFL
RSC-KDE
0.03
0.11
0.025
0.1
0.02
0.09
0.015
0.08
0.01
0.07
0.06
0.005
0
5%
10%
15%
20%
25%
30%
(c) concrete
0
5%
10%
15%
(d) treasury
Figure 3: Test RMSE comparison on four benchmark datasets among four algorithms with different
outlier percentage ζ. λ = 1 and L = 150 are used in RVFL, Improved RVFL, and PRNNRW.
4.3 Particle Size Estimation of Mineral Grinding Process: A Case Study
In this section, we make a further investigation on the merits of our proposed RSC-KDE algorithm
by using a dataset from process industry [4]. Figure 4 depicts the grinding process where the
coarse fresh ore OF is fed into the ball mill through the conveyor. Meanwhile, a certain amount
of mill water QF is added through a pipe to maintain a proper pulp density. At this stage, the
steel balls within the mill crush the coarse ore to a finer size alone with the knocking and tumbling
actions. After grinding, the mixed ore pulp that includes both coarser and finer particles is discharged
continuously from the mill into the spiral selector for further classification with assistance of dilution
water QD mixed to the ore pulp. Next, the pulp is separated into the overflow and underflow pulp.
Finally, the underflow pulp with coarser particles is recycled back to the mill for re-grinding, whilst
the overflow pulp with finer particles (as product) is further proceeded. As can be seen that the
particle size estimation plays an important role in this circling procedure.
Particle size estimation of mineral grinding process can be formulated as a regression problem, with
three input variables including the fresh ore feed rate OF , the mill water flow rate QF , and the
dilution water flow rate QD , and with a single output of the unmodelled dynamics, namely △r.
Denoted by x = [OF , QF , QD ]T and y as the input vector and the output (refers to the estimation
of the unmodelled dynamics △r̃), respectively. Let r̃ represent an estimate of the particle size from
9
Table 3: Performance comparisons on the benchmark datasets
Dataset
stock
laser
concrete
treasury
Algorithm
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
Test Performance at Different Outlier Percentage (MEAN,STD)
10%
15%
20%
25%
0.0495,0.0024 0.0531,0.0027 0.0554,0.0032 0.0590,0.0036
0.0373,0.0023 0.0404,0.0022 0.0425,0.0014 0.0456,0.0023
0.0378,0.0014 0.0387,0.0014 0.0388,0.0011 0.0392,0.0017
0.0317,0.0014 0.0322,0.0016 0.0328,0.0012 0.0342,0.0012
0.0318,0.0033 0.0323,0.0029 0.0343,0.0030 0.0359,0.0038
0.0239,0.0023 0.0260,0.0024 0.0264,0.0021 0.0277,0.0039
0.0424,0.0022 0.0424,0.0024 0.0421,0.0026 0.0428,0.0027
0.0161,0.0013 0.0202,0.0020 0.0195,0.0027 0.0233,0.0014
0.0975,0.0039 0.1038,0.0047 0.1068,0.0047 0.1092,0.0037
0.0903,0.0070 0.0967,0.0064 0.0991,0.0043 0.1022,0.0032
0.1019,0.0029 0.1008,0.0030 0.1013,0.0025 0.1034,0.0031
0.0749,0.0016 0.0773,0.0014 0.0805,0.0026 0.0812,0.0025
0.0231,0.0012 0.0253,0.0011 0.0265,0.0013 0.0325,0.0016
0.0135,0.0005 0.0145,0.0004 0.0145,0.0005 0.0166,0.0005
0.0130,0.0004 0.0130,0.0004 0.0131,0.0002 0.0131,0.0002
0.0084,0.0002 0.0086,0.0002 0.0093,0.0003 0.0109,0.0004
a mathematical (mechanism) model. Thus, the final estimated value of the particle size r̃ can be
evaluated by r̃ := r̃ + △r̃.
Figure 4: Flow chart of mineral grinding process [4].
In this case study, 300 training samples and 300 test samples were collected from a
hardware-in-the-loop (HIL) platform [4], which is composed of the following five subsystems: an
optimal setting control subsystem, a human supervision subsystem, a DCS control subsystem, a
virtual actuator and sensors subsystem, and a virtual operation process subsystem. For detailed
descriptions on the operational functionalities of these subsystems, readers can refer to [4]. Both the
input and output values are normalized into [0,1]. Then, different levels of outliers are added into
the normalized training dataset in the similar way as done in the previous simulations, i.e, a variable
percentage ζ of data points are selected randomly and the corresponding output values are corrupted
by background noises followed the uniform distribution [-0.5,0.5]. As a result, the output values are
distributed in the range [-0.5,1.5], while the test samples are outlier-free.
The performance of these four algorithms are evaluated at several outlier percentages, i.e., ζ =
{0%, 5%, 10%, 15%, 20%, 25%, 30%}. Specifically, for RVFL, Improved RVFL, and PRNNRW,
different settings of λ and L are used in this study. Each comparison is based on 50 independent
trials, the mean value and standard deviation of RMSE are recorded at each outlier percentage. The
10
test performance of the four algorithms are depicted in Figure 5, where the presented results for
RVFL, Improved RVFL and PRNNRW with each scope setting (λ = 0.1, 0.5, 1, 5) correspond to
the ‘best’ records among the trails using different L (L = 10, 30, 50, 100, 150). It can be easily
found that our proposed RSC-KDE algorithm outperforms the other three methods in most cases.
Although the Improved RVFLN exhibits very close performance when the outlier percentage is
relatively lower, RSC-KDE algorithm has demonstrated the best at robustness even at high outlier
contamination rate. When λ = 0.5 and λ = 1, the performance of PRNNRW has been improved
a lot compared with λ = 0.1, but are still unacceptable in comparison with Improved RVFL and
RSC-KDE. For both RVFL and Improved RVFLN, there is no remarkable difference between the
results with λ = 0.5 and λ = 1. Interestingly, Figure 5 (d) shows that results from PRNNRW
(with λ = 5) at relatively higher outlier percentages (e.g. ζ = 20%, 25%, 30%) are slightly
better than RSC-KDE. However, this result needs a suitable scope setting (i.e. λ = 5), which is
time-consuming in practice. In contrast, the proposed RSC-KDE can lead to good performance than
the others without any user-oriented trials for parameter setting. Table 4 summarizes the records
of our proposed RSC-KDE algorithm as well as the ‘best’ results obtained from RVFL, Improved
RVFL and PRNNRW with the ‘most appropriate’ parameter setting on L for each λ. The impact
of the scope setting for the other three randomized algorithms can be seen through comparing their
records at each outlier percentage. Specifically for λ = 1, the test results from the four algorithms
are shown in Figure 6, where both the real and estimated values of the normalized particle size (of
the whole test samples) are plotted.
0.16
0.04
0.14
0.035
0.12
0.03
0.1
0.025
0.08
0.02
0.06
0.015
0.04
0.01
0.02
0.005
0
Improved RVFL
PRNNRW
RVFL
RSC-KDE
0
0
5%
10%
15%
20%
25%
30%
0
5%
(a) λ = 0.1
10%
15%
20%
25%
30%
20%
25%
30%
(b) λ = 0.5
0.04
0.07
0.035
0.06
0.03
0.05
0.025
0.04
0.02
0.03
0.015
0.02
0.01
0.01
0.005
0
0
0
5%
10%
15%
20%
25%
30%
(c) λ = 1
0
5%
10%
15%
(d) λ = 5
Figure 5: Test RMSE comparisons on the case study between four algorithms with different outlier
percentage ζ. λ = 0.1, 0.5, 1, 5 and L = 50 are used in RVFL, Improved RVFL, and PRNNRW.
Before ending up this work, we conduct a robustness analysis on the key parameters (L and ν) to
investigate their impacts on the performance of our proposed RSC-KDE algorithm. The test results
for different combination of L and ν are reported in Table 5 with ζ = 0%, ζ = 10% and ζ = 30%,
respectively. For ζ = 0%, there is no much difference among the results with different ν for each
setting of L, implying that the AO process is not necessary. In this case, RSC-KDE is identical
to the original SC algorithm (SC-III in [21]). When ζ = 10%, the most appropriate setting of the
11
3.5
1.2
Real
Estimation
Real
Estimation
3
2.5
Normalized Particle Size
Normalized Particle Size
1
2
1.5
1
0.5
0.8
0.6
0.4
0.2
0
-0.5
0
0
50
100
150
200
Sample Sequence Number
250
300
0
50
(a) RVFL
100
150
200
Sample Sequence Number
250
300
250
300
(b) Improved RVFL
1.2
1
Real
Estimation
Real
Estimation
1
Normalized Particle Size
Normalized Particle Size
0.8
0.8
0.6
0.4
0.2
0.6
0.4
0.2
0
-0.2
0
0
50
100
150
200
Sample Sequence Number
250
300
(c) PRNNRW
0
50
100
150
200
Sample Sequence Number
(d) RSC-KDE
Figure 6: Test results of the four algorithms at ζ = 30% on the case study. λ = 1 and L = 50 are
used in RVFL (a), Improved RVFL (b), and PRNNRW (c).
Table 4: Performance comparisons on the case study
Scope Setting
λ = 0.1
λ = 0.5
λ=1
λ=5
Algorithm
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
RVFL
Improved RVFL
PRNNRW
RSC-KDE
Test Performance at Different Outlier Percentage (MEAN,STD)
10%
15%
20%
25%
0.0213,0.0027 0.0279,0.0025 0.0274,0.0025 0.0288,0.0030
0.0018,0.0003 0.0033,0.0003 0.0066,0.0006 0.0097,0.0010
0.1437,0.0063 0.1451,0.0053 0.1469,0.0053 0.1465,0.0048
0.0006,0.0003 0.0020,0.0007 0.0026,0.0006 0.0028,0.0004
0.0217,0.0026 0.0278,0.0024 0.0274,0.0022 0.0295,0.0035
0.0023,0.0003 0.0064,0.0011 0.0078,0.0010 0.0103,0.0032
0.0238,0.0005 0.0238,0.0005 0.0234,0.0006 0.0230,0.0005
0.0006,0.0003 0.0020,0.0007 0.0026,0.0006 0.0028,0.0004
0.0213,0.0024 0.0275,0.0020 0.0269,0.0016 0.0292,0.0029
0.0025,0.0003 0.0069,0.0013 0.0085,0.0035 0.0106,0.0044
0.0145,0.0014 0.0153,0.0014 0.0150,0.0015 0.0148,0.0014
0.0006,0.0003 0.0020,0.0007 0.0026,0.0006 0.0028,0.0004
0.0305,0.0039 0.0463,0.0126 0.0429,0.0100 0.0468,0.0144
0.0050,0.0021 0.0100,0.0049 0.0123,0.0043 0.0169,0.0087
0.0017,0.0007 0.0021,0.0009 0.0023,0.0009 0.0022,0.0007
0.0006,0.0003 0.0020,0.0007 0.0026,0.0006 0.0028,0.0004
architecture is L = 20 while the iteration times in AO can be selected as ν = 3, 5, 8, 10, 12. At this
percentage of outliers, it is fair to say that the accuracy of RSC-KDE with L = 20 is preferable and
stay within a stable level (i.e. RMSE is around 0.0010) provided that ν is set equal or larger than
3. Similar to the case of ζ = 30%, the most appropriate setting of the architecture is L = 10 while
the value of ν can be selected from the set {5, 8, 10, 12}. All these records suggest that RSC-KDE
performs robustly for uncertain data modelling with smaller iteration times in AO (between 5 and 12).
These empirical results offer us some information on the setting of ν, although it is data dependent.
12
Table 5: Robustness analysis of ν and L with different outlier percentage ζ on the case study
Outlier Percentage
ζ = 0%
ζ = 10%
ζ = 30%
Number of AO
ν=2
ν=3
ν=5
ν=8
ν = 10
ν = 12
ν=2
ν=3
ν=5
ν=8
ν = 10
ν = 12
ν=2
ν=3
ν=5
ν=8
ν = 10
ν = 12
Test Performance with Different Setting of L (Mean RMSE)
L = 10 L = 20 L = 30 L = 50 L = 60 L = 80
0.0025
0.0003
0.0003
0.0002
0.0002
0.0002
0.0025
0.0003
0.0003
0.0002
0.0002
0.0002
0.0025
0.0003
0.0003
0.0002
0.0002
0.0002
0.0026
0.0003
0.0003
0.0002
0.0002
0.0002
0.0026
0.0003
0.0003
0.0002
0.0002
0.0002
0.0028
0.0003
0.0003
0.0002
0.0002
0.0002
0.0026
0.0030
0.0072
0.0216
0.0334
0.0501
0.0024
0.0010
0.0024
0.0100
0.0200
0.0444
0.0024
0.0009
0.0012
0.0076
0.0128
0.0290
0.0022
0.0010
0.0012
0.0055
0.0091
0.0228
0.0023
0.0010
0.0012
0.0060
0.0094
0.0194
0.0025
0.0009
0.0012
0.0057
0.0088
0.0244
0.0101
0.0173
0.0544
0.0950
0.1315
0.2322
0.0051
0.0081
0.0347
0.0932
0.1493
0.2057
0.0040
0.0056
0.0161
0.0966
0.1574
0.2182
0.0039
0.0051
0.0102
0.0870
0.1604
0.2326
0.0038
0.0053
0.0095
0.1017
0.1688
0.2366
0.0041
0.0050
0.0099
0.0959
0.1621
0.2308
5 Concluding Remarks
Uncertain data modelling problems appear in many real-world applications, it is significant to
develop advanced machine learning techniques to achieve better modelling performance. This paper
proposes a robust version of stochastic configuration networks for problem solving. Empirical
results reported in this work clearly indicate that the proposed RSCNs, as one of the extensions of
our recently developed SCN framework in [21], have great potential in dealing with robust data
regression problems. From the implementation perspective, our design methodology needs an
assumption on the availability of a clean validation dataset, which helps to prevent the learner from
over-fitting during the course of incrementally constructing stochastic configuration networks. In
practice, however, such a hypothesis is not always applicable. Thus, further research on this topic is
necessary. A plenty of explorations are being expected, such as the use of various cost functions for
evaluating the output weights, development of online version of RSCNs, and distributed RSCNs for
large-scale data modelling.
Acknowledgment
The authors would like to thank Dr Wei Dai from China University of Mining Technology for his
sharing the data used in the case study.
References
[1] F. Cao, H. Ye, D. Wang, A probabilistic learning algorithm for robust modeling using neural networks with
random weights, Information Sciences 313 (2015) 62–78.
[2] D. S. Chen, R. C. Jain, A robust backpropagation learning algorithm for function approximation, IEEE
Transactions on Neural Networks, 5 (3) (1994) 467–479.
[3] C. C. Chuang, S. F. Su, J. Tsong, C. C. Hsiao, Robust support vector regression networks for function
approximation with outliers, IEEE Transactions on Neural Networks, 13 (6) (2002) 1322–1330.
[4] W. Dai, Q. Liu, T. Y. Chai, Particle size estimate of grinding processes using random vector functional link
networks with improved robustness, Neurocomputing, 169 (2015) 361–372.
[5] M. T. El-Melegy, Random sampler M-estimator algorithm with sequential probability ratio test for robust
function approximation via feed-forward neural networks, IEEE Transactions on Neural Networks and
Learning Systems, 24 (7) (2013) 1074–1085.
13
[6] A. N. Gorban, I. Tyukin, D. V. Prokhorov, K. Sofeikov, Approximation with random bases: Pro et contra,
Information Sciences 364–365 (2016) 129–145.
[7] F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw, W. A. Stahel, Robust Statistics: The Approach Based on
Influence Functions, John Wiley & Sons, 2011.
[8] P. Huber, Robust Statistics, Wiley Series in Probability and Mathematical Statistics, Wiley, 1981.
[9] B. Igelnik, Y. H. Pao, Stochastic choice of basis functions in adaptive function approximation and the
functional-link net, IEEE Transactions on Neural Networks, 6 (6) (1995) 1320–1329.
[10] L. J. Latecki, A. Lazarevic, D. Pokrajac, Outlier detection with kernel density functions, in: Proceedings
of the 5th International Conference on Machine Learning and Data Mining in Pattern Recognition, Berlin,
Heidelberg, (2007) 61–75.
[11] A. M. Leroy, P. J. Rousseeuw, Robust Regression and Outlier Detection, Wiley Series in Probability and
Mathematical Statistics, Wiley, 1987.
[12] K. Liano, Robust error measure for supervised neural network learning with outliers, IEEE Transactions
on Neural Networks, 7 (1) (1996) 246–250.
[13] M. Li, D. Wang, Insights into randomized algorithms for neural networks: practical issues and common
pitfalls, Information Sciences 382-383 (2017) 170-178.
[14] D. Lowe, Multi-variable functional interpolation and adaptive networks, Complex Systems 2 (1988)
321–355.
[15] P. Meer, D. Mintz, A. Rosenfeld, D. Y. Kim, Robust regression methods for computer vision: A review,
International Journal of Computer Vision 6 (1) (1991) 59–70.
[16] Y. H. Pao, Y. Takefji, Functional-link net computing, IEEE Computer Journal 25 (5) (1992) 76–79.
[17] P. Ramsay, D. Scott, Multivariate Density Estimation, Theory, Practice, and Visualization, Wiley, 1993.
[18] S. Scardapane, D. Wang, Randomness in neural networks: an overview, Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery 7 (2) (2017) e1200. doi:10.1002/widm.1200.
[19] J. A. Suykens, J. De Brabanter, L. Lukas, J. Vandewalle, Weighted least squares support vector machines:
robustness and sparse approximation, Neurocomputing 48 (1) (2002) 85–105.
[20] P. H. Torr, A. Zisserman, MLESAC: A new robust estimator with application to estimating image
geometry, Computer Vision and Image Understanding 78 (1) (2000) 138–156.
[21] D. Wang, M. Li, Stochastic configuration networks: Fundamentals and algorithms, arXiv:1702.03180
[cs.NE], 10 Feb, 2017.
[22] X. Zhuang, T. Wang, P. Zhang, A highly robust estimator through partially likelihood function modeling
and its application in computer vision, IEEE Transactions on Pattern Analysis and Machine Intelligence
14 (1) (1992) 19–35.
14
| 9cs.NE
|
1
Distributed Multi-Relay Selection in
Accumulate-then-Forward Energy Harvesting Relay
Networks
arXiv:1602.00339v3 [cs.IT] 8 Oct 2017
Yifan Gu, He Chen, Yonghui Li, Ying-Chang Liang and Branka Vucetic
Abstract—This paper investigates a wireless-powered cooperative network (WPCN) consisting of one source-destination pair
and multiple decode-and-forward (DF) relays. We develop an
energy threshold based multi-relay selection (ETMRS) scheme
for the considered WPCN. The proposed ETMRS scheme can be
implemented in a fully distributed manner as the relays only need
local information to switch between energy harvesting and information forwarding modes. By modeling the charging/discharging
behaviours of the finite-capacity battery at each relay as a finitestate Markov Chain (MC), we derive an analytical expression for
the system outage probability of the proposed ETMRS scheme
over mixed Nakagami-m and Rayleigh fading channels. Based on
the derived expression, the optimal energy thresholds for all the
relays corresponding to the minimum system outage probability
can be obtained via an exhaustive search. However, this approach
becomes computationally prohibitive when the number of relays
and the associated number of battery energy levels is large. To
resolve this issue, we propose a heuristic approach to optimize
the energy threshold for each relay. To gain some useful insights
for practical relay design, we also derive the upper bound for
system outage probability corresponding to the case that all
relays are equipped with infinite-capacity batteries. Numerical
results validate our theoretical analysis. It is shown that the
proposed heuristic approach can achieve a near-optimal system
performance and our ETMRS scheme outperforms the existing
single-relay selection scheme and common energy threshold
scheme.
Index Terms—Wireless energy harvesting, cooperative communications, relay selection, accumulate-then-forward, Markov
Chain, outage probability.
I. I NTRODUCTION
The performance of many wireless communication networks
in practice is largely confined by the energy constrained
devices that require replenishment periodically. Recently, a
novel radio-frequency (RF) energy transfer and harvesting
technique has been proposed as a new viable and promising
solution to prolong the lifetime of energy constrained wireless
networks [1]. RF energy transfer and harvesting enables wireless devices to harvest energy from RF signals broadcast by
ambient/dedicated energy transmitters to charge their batteries
[2], [3]. This technique has opened a new research paradigm,
termed wireless-powered communication (WPC), which has
Y. Gu, H. Chen, Y. Li, Y.-C. Liang and B. Vucetic are with
School of Electrical and Information Engineering, The University of
Sydney, Sydney, NSW 2006, Australia (email: [email protected],
[email protected],
[email protected],
[email protected],
[email protected]).
The material in this paper was presented in part at the IEEE International
Conference on Communications, Kuala Lumpur, Malaysia, in May 2016.
become a hot research topic recently (see, e.g., [4], [5] and
references therein).
The WPC technique has brought new research opportunities to cooperative communications, which have attracted
an upsurge of interest during the past decade due to its
various advantages [6]. In this paper, we refer to a cooperative
communication network with wireless-powered1 relay(s) as a
wireless-powered cooperative network (WPCN). In [7], Nasir
et. al first investigated a classical three-node WPCN consisting of one source-destination pair and one energy harvesting amplify-and-forward (AF) relay. Two practical relaying
protocols, namely time switching-based relaying and power
splitting-based relaying, were proposed and analyzed in [7].
Inspired by this seminal work, a plenty of works focusing on
the design and/or analysis of WPCNs have published in open
literature very recently (see [8]–[22] and references therein).
All aforementioned works on WPCNs assumed that the
wireless-powered node(s) exhausts the harvested energy
in the current time slot to perform information transmission/forwarding straight away. Equipping each wirelesspowered node with an energy storage (e.g., a rechargeable
battery) such that they can accumulate the harvested energy
and then perform information tranmission/forwarding in an
appropriate time slot can improve the system performance
significantly. The energy accumulation process of the classical
three-node WPCNs with a single wireless-powered relay was
modeled and the resulting network performance was analyzed
in [23], [24] for finite and infinite storage scenario, respectively. [25] studied a multi-user network where all the users
can harvest and accumulate energy from the base station
simultaneously. Based on the considered system, the authors
derived the transmission probability, the signal-to-interference
ratio coverage probability and the overall success probability.
It is also of great importance to investigate the network setup
with multiple wireless-powered relays. Specifically, the relay
selection problem was studied in [26] for a time-division and
full-duplex block structure. Inspired by the max-max relay
selection strategy, a new relay selection scheme is proposed
that the relay with the best source-to-relay link is selected to
receive information and store it in its buffer while the relay
with the best relay-to-destination link is selected to transmit information. The corresponding outage probability and
throughput were then analyzed. Inspired by the opportunistic
1 Throughout this paper, we use the terms “wireless-powered” and “energy
harvesting” interchangeably.
2
2 For more information about CSI acquisition for energy harvesting devices,
interested readers could see [29] and [30].
݄ଵ
S
݄ଷ
݄ଶ
݄ே
ࡾ
ࡾ
ࡾ
……
relaying (OR) originally proposed in [27], a battery-aware
relay selection (BARS) scheme was proposed and analyzed.
In the BARS, the relays with accumulated energy exceeding a
predetermined threshold will first form a subset, which need to
feedback their channel state information (CSI) to the source.
Then, the “best” relay among the subset with maximum endto-end signal-to-noise ratio (SNR) is selected by the source to
forward its information, while other relays harvest energy in
the first hop. [28] studied a WPCN with multiple randomly
distributed relays. A distributed beamforming (DB) scheme
was proposed that all relay nodes which are fully charged at
the beginning of the transmission block form a forwarding
subset. Among this subset of relays, the relays that are able
to decode the source’s signal create a virtual multiple antenna
array and transmit source’s signal to destination coherently.
In this paper we develop an efficient energy threshold
based multi-relay selection (ETMRS) scheme with energy
accumulation capability at each relay for WPCNs. In the
proposed ETMRS, each relay can flexibly switch between
energy harvesting and information forwarding modes in each
transmission block. It should be noted that the proposed
scheme is purely distributed and only the local battery status
and local channel state information2 (CSI) are required at each
relay to perform mode selection, thus not involving extensive
inter-relay information exchanges as in existing schemes. We
also consider a practical and more general channel fading than
[28], [31], where source-relay links and relay-destination links
are assumed to experience independent but not necessarily
identical distributed (i.n.i.d.) channel fading. Different from
[28], we adopt a multiple-level battery model to characterize
the charging/discharging behavior at relay batteries. In this
case, the amount of harvested energy available at relays could
be different. As such, to adequately exploit the relays, in
our ETMRS scheme we set an individual energy threshold
for each relay. This is in contrast to the existing schemes
that considered independent and identical distributed channel
fading and adopted a common energy threshold for all relays
[28], [31]. The performance of the proposed ETMRS scheme
can be further improved by jointly optimizing the energy
thresholds of all relays. Moreover, compared with the DB
scheme in which the weights in distributed beamforming for
the relays within the forwarding set are obtained based on full
CSI of the whole forwarding subset, the weight at each relay
in the proposed ETMRS approach is calculated based only
on the local CSI such that it can be implemented in a fully
distributed manner. This can effectively reduce the network
overhead and latency. Note that in our ERMRS scheme the
relays that are selected to forward source’s information to
destination in each transmission block can be any combination
of all relays, which depends on not only the instantaneous
CSI but also the long-term evolution of all relay batteries.
This makes the performance analysis and system design of
the considered network a non-trivial task since we need to
develop a systematic approach to characterize the probability
of different relay combinations as well as the statistics of the
ࡾࡺ
݃ଵ
݃ଶ
݃ଷ
݃ே
D
Fig. 1. The considered WPCN with one source-destination pair and N
wireless-powered relays.
corresponding end-to-end SNR as a sum of i.n.i.d random
variables. Furthermore, the energy threshold of each relay that
determines its long-term energy evolution should be jointly
designed to boost the system performance.
Notation: Throughout this paper, we use fX (x) and FX (x) to
denote the probability density function (PDF) and cumulative
distribution function (CDF) of a random variable X. Γ (·) is
the Gamma function [32, Eq. (8.310)], γ (·, ·) is the lower
incomplete gamma function [32, Eq. (8.350.1)] and ⌈·⌉ is the
ceiling function. We use (·)∗ and (·)T to represent the complex
conjugate and the transpose of a matrix or vector, respectively.
E [·] is the expectation operator and I denotes the identity
matrix. P { A |B } is the conditional probability of A under a
given condition B.
II. S YSTEM M ODEL AND S CHEME D ESIGN
A. System Model
As depicted in Fig. 1, in this paper we investigate a WPCN
consisting of one source-destination pair and N decode-andforward (DF) relays, which are deployed to assist the source’s
information transmission. We assume that there is no direct
link between source and destination due to obstacles or severe
attenuation. Also, all nodes are equipped with single antenna
and work in half-duplex mode. As in [28], we consider the
scenario that all DF relays are wireless-powered devices and
purely rely on the energy harvested from RF signals broadcast
by source to perform information forwarding. Moreover, these
relays are equipped with separate energy and information receivers [33]. As such, they can flexibly switch between energy
harvesting (EH) mode and information forwarding (IF) mode
at the beginning of each transmission block. We also assume
that each relay is equipped with a finite-capacity rechargeable
battery such that it can perform energy accumulation and
scheduling across different transmission blocks. Specifically,
they can accumulate the harvested energy to a certain amount
before assisting the source’s information transmission.
We denote by T the duration of each transmission block,
which is further divided into two time slots with equal length
T /2. During the first time slot, the source broadcasts its
signal to all relays. At each relay operating in EH mode,
the received signal is delivered to the energy receiver to
convert to direct current and charge the battery. In contrast,
the received signal at each relay in IF mode is connected to
its information receiver to decode the information sent by the
source. All relays that operate in IF mode and decode the
source’s information correclty form a decoding set. In the
second time slot, all relays in the decoding set will jointly
3
forward the source’s information to destination by consuming
part of the accumulated energy from their batteries. On the
other hand, other relays outside the decoding set keep in
silence during the second time slot3 .
We hereafter use subscript-S and subscript-D to denote
the source and destination respectively. We denote by Ru ,
u ∈ {1, 2, · · · , N }, the u-th wireless-powered relay. Among
existing fading models, Rician fading would be the most
appropriate one to characterize the channel fading of S-Ru
links. This is mainly motivated by the fact that the up-to-date
wireless energy transfer techniques could only be operated
within a relatively short communication range such that the
line-of-sight (LoS) path is very likely to exist in these links.
However, the statistical functions (e.g., cumulative density
function (CDF) and probability density function (PDF)) of
Rician fading are very complicated, which would make the
analysis extremely difficult [34]. Fortunately, the Rician distribution could be well approximated by the more tractable
Nakagami-m fading model. Thus, in this paper we adopt an
asymmetric scenario for the fading distributions of sourceto-relay links and relay-to-destination links. Specifically, the
S-Ru link is assumed to be subject to Nakagami-m fading
with fading severity parameter mu and average power gain
λSRu , while the Ru -D link suffers from Rayleigh fading with
average power gain λRu D as the distance between them may
be much further. Besides, all channels in the considered system
experience slow, independent, and frequency-flat fading such
that instantaneous channel gains remain unchanged within
each transmission block but change independently from one
block to the other. It is worth mentioning that we do not require
the channel fading parameters to be identical or non-identical
for both hops. That is, we investigate a general independent
but not necessarily identical fading model, which includes the
independent and identical one as well as the independent and
non-identical one for special cases. Without loss of generality,
we consider a normalized transmission block (i.e., T = 1)
hereafter.
Let P denote the source transmit
power and x denote the
transmitted symbol with E | x| 2 = 1. The received signal at
the u-th relay during the first time slot is thus given by
√
(1)
yu = Phu x + n,
where hu is the channel coefficient between S and Ru , and n
denotes the additive white Gaussian noise (AWGN) with zero
mean and variance N0 at the receiver side.
When the u-th relay works in EH mode, the received signal
yu will be delivered to its energy receiver and converted to
direct current to charge the battery. The amount of harvested
energy at Ru during the first time slot can thus be expressed
as
1
E˜u = ηPHu,
(2)
2
where 0 < η < 1 is the energy conversion efficiency and
Hu = |hu | 2 is the channel power gain between S and Ru . Note
3 For simplicity, we consider that the relays out of the decoding set will not
harvest energy in the second time slot since the amount of energy harvested
from the forwarded signals would be negligible compared with the energy
harvested from the source.
that in (2), we ignore the amount of energy harvested from the
noise since the noise power is normally very small and below
the sensitivity of the energy receiver. On the other hand, if Ru
opts to decode information in the first time slot, it will harvest
zero energy.
Let Φ denote the current decoding set. In the second time
slot, all relays in the decoding set Φ will jointly forward
the source’s information to the destination by implementing
the distributed beamforming technique [35]. Specifically, the
transmitted signal at Ru ∈ Φ is given by
p
xu = wu Pu x,
(3)
where wu is the weight of Ru in distributed beamforming and
Pu is the transmit power of Ru . In the considered WPCN, we
assume that each relay only knows its local CSI of the second
hop. In this case, the optimal weight for the u-th relay that
maximizes the overall end-to-end SNR can be expressed as
wu = gu∗ /|gu | [35], where gu is the complex channel coefficient
between Ru -D. We define gˆu = |gu | for notation simplicity.
The received signal at the destination can thus be expressed
as
Õ
p
yd =
gˆu Pu x + n.
(4)
u:Ru ∈Φ
As a result, the conditional end-to-end SNR for a given
decoding set Φ can be written as
2
Í √
Pu gˆu
γΦ =
u:Ru ∈Φ
N0
.
(5)
B. Energy Threshold Based Multi-Relay Selection
In this paper we develop an energy threshold based
multi-relay selection (ETMRS) framework for the considered
WPCN. In our ETMRS scheme, each relay Ru determines
its individual energy threshold, denoted by χ̃u . This energy
threshold includes two parts: the first part is the energy
consumption for circuit operation (e.g., information decoding),
denoted by α̃ for all the relays; the second part is the energy
consumption for information forwarding, denoted by β̃u for
relay Ru . Each relay decides to operate in EH mode or IF
mode based on its own battery status at the beginning of each
transmission block. Specifically, relay Ru will perform the IF
operation only when its accumulated energy is not less than
its associated energy threshold χ̃u . Otherwise, it will opt EH
mode to further accumulate energy in its battery. Moreover,
if Ru works in the IF mode and falls in the decoding set, it
will decode and forward the source signal to destination by
consuming the amount of energy β˜u from its battery in the
second time slot. The conditional end-to-end SNR given in
(5) can now be updated by substituting Pu = β˜u /(1/2) = 2 β˜u .
That is,
2
Í p ˜
2 βu gˆu
u:Ru ∈Φ
.
(6)
γΦ =
N0
Note that we are investigating a distributed scheme such
that each relay only requires local CSI and battery status to
4
determine its operation modes. In this case, the optimal transmit power for each transmission block cannot be obtained as
it requires global CSI and battery status. As a result, the fixed
transmit power strategy is still preferable in our considered
case and we can thus set fixed energy thresholds to each
relay, χ̃u, u = 1, 2, · · · , N. Moreover, the energy thresholds for
all the relays should be different in order to achieve the best
system performance when the relays are in different locations.
For the special case that all the relays are co-located in a
cluster, the channels of each hop are now independent and
identically distributed (i.i.d.). In this sense, all relays can adopt
the same energy threshold χ̃ = χ̃1 = χ̃2 = · · · = χ̃N and
consume the same power to forward information, denoted by
β̃ = β̃1 = β̃2 = · · · = β̃ N . We then have the conditional endto-end SNR of this i.i.d. case given by
2
Í
2 β̃
gˆu
will also be verified later in the simulation section. For each
relay node, we define state Si as the relay residual energy in
i, j
the battery being εi . The transition probability Tu is defined
as the probability of transition from state Si to state S j at the
u-th relay. With the adopted discrete-level battery model, the
amount of harvested energy can only be one of the discrete
energy level. Thus, the discretized amount of harvested energy
at the u-th relay during an EH operation is defined as
∆
˜
(8)
εi : εi ≤ E u .
Eu = ε j , j = arg max
III. P ERFORMANCE A NALAYSIS
The energy consumption for information forwarding β̃u and
the energy threshold for each relay χ̃u should be chosen from
one of the energy levels of the battery excluding the empty
level. The descretized energy consumption for information
forwarding βu and discretized energy threshold for each
relay χu can be defined as βu ∈ {ε1, ε2, · · · , ε L − α} and
χu = α+ βu ∈ {α + ε1, α + ε2, · · · , ε L }, respectively. Note that
the system will work properly only when α < ε L , otherwise
when α ≥ ε L , the fully charged battery even cannot support
the circuit energy consumption of the relay and βu does not
exist.
We now evaluate the state transition probabilities of the MC
for each relay Ru , u ∈ {1, 2, · · · , N }. Different from [23] that
summarizes all the transition probabilities into eight general
cases, we propose a compact mode-based approch which
summarizes all the transition probabilities into the following
two cases.
1) The relay Ru operates in EH mode (Si to S j with
0 ≤ i < χεu1 ≤ L and ∀ j): When the relay Ru operates in
the EH mode, it harvests energy from the source during the
first time slot while remains in silence during the second time
slot. Due to the fact that the relay battery is not discharged
in the transition, the transition probability is none-zero only
when the end state falls into the set S j ∈ {Si, Si+1, · · · , SL }.
Specifically, S j = Si indicates that the battery level of the
relay remains unchanged and the harvested energy during the
transition E˜u is discretized to zero (i.e., Eu = 0). S j = SL
denotes the case that the battery is fully charged during the
transition and the harvested energy should be larger than ε L−i .
From the definition of discretization given in (8), the transition
probabilities for Ru operates in EH mode can be summarized
in (10) on top of the next page.
Recall that the channels between source and relays are
assumed to suffer from Nakagami-m fading. As such, the
PDF and CDF of Hu are given by [37, eq.2.21] fHu (x) =
bu mu mu −1
u ,bu x)
exp(−bu x), FHu (x) = γ(mΓ(m
, where bu =
Γ(mu ) x
u)
mu /λSRu . With the CDF, the transition probabilities for this
case can now be expressed as
⌢
γΦ =
u:Ru ∈Φ
N0
.
(7)
To analyze the performance of the proposed ETMRS
scheme, in this section we first characterize the dynamic charging/discharging behaviors of the relay batteries. We consider
a discrete-level and finite-capacity battery model. Thus, it is
natural to use a finite-state Markov chain (MC) to model the
dynamic behaviors of relays’ batteries. From the MC model
and the derived stationary distribution of the battery, we then
derive an approximate analytical expression of the system
outage probability for our ETMRS scheme. Based on the
derived analytical expression, we subsequently discuss how
to optimize the energy threshold of the relays to reduce the
system outage probability.
A. Markov Chain of Relay Batteries
Thanks to the fact that our ETMRS scheme is a decentralized relay selection approach and the relays make decisions of
their operation modes based only on their local CSI and battery
status, we thus can evaluate the steady state distributions of
all relays’ batteries separately as they are independent to
each other. In [23], the authors investigated a single relay
WPCN and proposed an adaptive information forwarding
scheme such that the relay forwards the source information
only when its residual energy can guarantee an outage-free
transmission in the second hop. The transition probabilities of
the relay battery was summarized into eight general cases.
Recall that our ETMRS scheme implements fixed transmit
powers for multiple relays. By adequately using this feature, a
compact mode-based method is used to evaluate the transition
probabilities of the MC for each relay.
Let C denote the capacity of all relays’ batteries and L
denote the number of discrete levels excluding the empty level
in each battery. Then, the i-th energy level of the relay battery
can be expressed as εi = iC/L, i ∈ {0, 1, 2 · · · L}. It is worth
pointing out that as shown in [36], the adopted discrete battery
model can tightly approximate its continuous counterpart when
the number of energy levels (i.e., L) is sufficiently large, which
i ∈{0,1, ··· , L }
Moreover, for relays operating in the IF operation mode, the
energy consumption for decoding operation α should also be
discretized to one specific energy level of the battery with the
definition give by
ε
:
ε
≥
α
, if α̃ ≤ ε L
arg
min
i
i
∆
i ∈{0,1, ··· , L }
(9)
α = ε j, j =
∞, if α̃ > ε
L
5
Tui, j
Tui, j
2 ( j − i) C
2 ( j − i + 1) C
,
≤ Hu <
Pr
˜
ηPL
ηPL
Pr ε j−i ≤ Eu < ε j−i+1 , if i ≤ j < L
2 (L − i) C
=
= Pr E˜u ≥ ε L−i , if i ≤ j = L
, if i ≤ j = L
Pr Hu ≥
0, if i > j
ηPL
0, if i > j
2( j − i + 1)C
FHu
ηPL , if i ≤ j < L
− FH 2( j − i)C
u
.
=
ηPL
2(L
−
i)C
1 − FHu
, if i ≤ j = L
ηPL
0, if i > j
(11)
2) The relay Ru operates in IF mode (Si to S j with
≤ i ≤ L and ∀ j): In this case, the relay Ru will try
to decode the received signal and forward it to destination
if the decoding is successful. In the first time slot, the relay
consumes energy α to decode the received signal from S. If
the decoding is unsuccessful, it remains in silence during the
second time slot. On the other hand, if the relay Ru decodes the
information successfully, it forwards the decoded information
to the destination by further consuming βu from its battery
during the second time slot. We can now conclude that after
the transition, the end state is none-zero only when j = i − εα1
or j = i − χεu1 . Recall that ϕu is the decoding indicator of relay
Ru and the transition probabilities for Ru operating in IF mode
can be summarized as
α
Pr {ϕu = 0} , if j = i −
ε1
i, j
Tu = 1 − Pr {ϕu = 0} , if i ≤ j = i − χu .
(12)
ε1
0, Otherwise
χu
ε1
We now analyze the term Pr {ϕu = 0} for the u-th relay. Let
u
γu = PH
N0 denote the received SNR at relay Ru . The channel
capacity of the S-Ru link is given by Θu = 21 log2 (1 + γu ).
According to the channel capacity, the term Pr {ϕu = 0} can
be evaluated as
vN0
,
(13)
Pr {ϕu = 0} = Pr {Θu < κ} = FHu
P
where κ is the system transmission rate and v = 22κ − 1 is the
SNR threshold for system outage.
Based on the above analysis, the transition probabilities can
be re-written as
vN0
α
, if j = i −
FHu
P
ε
1
vN0
χu .
Tui, j =
(14)
1 − FHu
, if i ≤ j = i −
P
ε
1
0, Otherwise
i, j
We now define Zu = (Tu ) to denote the (L + 1) × (L +
1) state transition matrix of the MC for each relay Ru , u ∈
{1, 2, · · · , N }. By using similar method in [23], we can easily
verify that the MC transition matrix Zu derived from the above
if i ≤ j < L
.
(10)
MC model is irreducible and row stochastic. Thus for each
relay Ru , there must exist a unique stationary distribution π u
that satisfies the following equation
T
π u = πu,0, πu,1, · · · , πu, L = (Zu )T π u,
(15)
where πu,i , i ∈ {0, 1, · · · , L}, is the i-th component of π u
representing the stationary distribution of the i-th energy level
at relay Ru . The battery stationary distribution of relay Ru can
be solved from (15) and expressed as [23]
−1
π u = (Zu )T − I + B b,
(16)
where Bi, j = 1, ∀i, j and b = (1, 1, · · · , 1)T .
Moreover, when it comes to the i.i.d. channel model, all
relays are equipped with an identical energy threshold and they
have the same transition matrix. The corresponding identical
stationary distribution of all relays can be similarly obtained
as (16) and denoted by π 1 = π 2 = · · · = π N = π =
(π0, π1, · · · , π L )T .
B. System Outage Probability
With the above derived stationary distribution of the relay
batteries, we now characterize the system outage probability of
the proposed ETMRS scheme. Let O denote the outage event
of the considered system employing our ETMRS scheme.
According to the full probability theory, we can express the
system outage probability as
Õ
Pout = Pr {O} =
Pr {Φ} Pr {O |Φ } ,
(17)
Φ∈Λ
where Λ = {R1, R2 · · · , RN } denotes the set of all relays in
the considered network and incorporates the decoding set Φ
as its subset, Pr {Φ} denotes the probability that the current
decoding set is Φ, and Pr {O |Φ } denotes the probability that
system outage occurs under the decoding set Φ. In order to
further expand (17), we define Φk,n to denote the n-th k-subset
of Λ (i.e., the n-th k-subset of Λ contains exactly k elements,
k = 1, 2, · · · , N, n = 1, 2, · · · , Nk ). Then the outage probability
of the ETMRS scheme can be further expanded as
(k )
N Õ
Õ
N
Pout = Pr {∅} +
k=1 n=1
Pr Φk,n Pr O Φk,n ,
(18)
by realizing that the system outage probability equals to one
when the decoding set is an empty set ∅. The empty decoding
set can be caused by two kinds of event: One is that none
of the relays working in IF mode decodes the received signal
from source correctly. The other is that all relays operate in
EH mode and no relay performs IF. Based on the derived
6
Pr Φk,n =
Ö
u:Ru ∈Φk, n
=
Ö
u:Ru ∈Φk, n
Pr {ζu = ζI , ϕu = 1}
Ö
u:Ru <Φk, n
u:Ru ∈Λ
L
Ö ©
Õ
ª
=
πu,i +
πu,i ®.
Pr {ϕu = 0}
u:Ru ∈Λ «
i=0
i=χu /ε1
¬
Similarly, the term Pr Φk,n can be computed as (20) on top
of the next page.
To evaluate the third probability term in (18), we first
characterize the distribution of the conditional end-to-end SNR
for a given decoding set. For notation simplicity, we use
γk,n to denote the received SNR at the destination when the
decoding set is Φn,k . Recall that the conditional end-to-end
SNR for a certain decoding set is given in (6), which includes
a weighted sum of Rayleigh random variables. However, to
the best knowledge of authors, the exact distribution of a
weighted sum of Rayleigh random variables does not exist in
open literature. As a result, we cannot further characterize the
exact distribution of γk,n . Fortunately, with the aid of a tight
approximation for the CDF of a weighted sum of Rayleigh
random variables derived in [38], the CDF of γk,n can be
approximated as a gamma distribution and expressed as
!
χÕ
u /ε1
γ k,
Fγk, n (x) ≈
4
Í
N0
u:R u ∈Φk, n
Γ (k)
βu σu2
(19)
x
,
(21)
p
where σu = λRu D /2 is the scale parameter of the Rayleigh
fading channel between Ru and D.
In order to further expand the summation term in (21), we
use a similar method
we
adopted in [39]–[41]. To this end,
√
βu σu : Ru ∈ Λ, u ∈ {1, 2, · · · , N } with
define a set A =
the same cardinality as the set Λ (i.e., |A| = |Λ| ). Similarly,
let Ak,n denote the n-th k-subset of A. The j-th element of the
subset Ak,n are denoted by φk,n, j ∈ Ak,n , j = 1, 2, · · · , k. To
be more clear,
√ we list the corresponding relationship between
φk,n, j and βu σu in Table I.
√
With the corresponding relation between φk,n, j and βu σu ,
(21) can now be expressed as
i
k−1
Õ
ak,n x
γ k, ak,n x
= 1 − exp(−ak,n x)
, (22)
Fγk, n (x) ≈
Γ (k)
i!
i=0
where ak,n =
4
k
Í
N0
j=1
Pr {ζu = ζI , ϕu = 0} ∪ ζu = ζE
L
Õ
(1 − Pr {ϕu = 0})
π
u,i
i=χ
/ε
u 1
stationary discrete distribution of relay batteries given in (16),
we can calculate the first probability term in (18) as follows
Ö
Pr {∅} =
Pr {ζu = ζI , ϕu = 0} ∪ ζu = ζE
and the last equality in (22) holds
2
φk,
n, j
according to [32, Eq. (8.352.6)] with integer k. Based on the
Ö
χÕ
L
u /ε1
Õ
©
ª
πu,i +
πu,i ®.
Pr {ϕu = 0}
u:Ru <Φk, n «
i=0
i=χu /ε1
¬
Ȁ
ൌͳ
ൌʹ
ǥ
ൌǦͳ
ൌ
ൌͳ
ൌʹ
ߚଶ ɐଶ
ࣘଵǡଵǡଵ ൌ
ߚଵ ɐଵ
ࣘଵǡଶǡଵ ൌ
ࣘଶǡଵǡଵ ൌ
ࣘଶǡଵǡଶ ൌ
ߚଵ ɐଵ
ߚଶ ɐଶ
ࣘଶǡଶǡଵ ൌ ߚଵ ɐଵ
ࣘଶǡଶǡଶ ൌ ߚଷ ɐଷ
ǥ
ࣘேିଵǡଵǡଵ ൌ ߚଵ ɐଵ
ࣘேିଵǡଵǡଶ ൌ ߚଶ ɐଶ
ǥ
ࣘேିଵǡଵǡேିଵ ൌ
ࣘேǡଵǡଵ ൌ
ࣘேǡଵǡଶ ൌ
ǥ
ࣘேǡଵǡேିଵ ൌ
ߚேିଵ ɐேିଵ
ߚଵ ɐଵ
ߚଶ ɐଶ
ߚே ɐே
ǥ
ࣘேିଵǡଶǡଵ ൌ
ࣘேିଵǡଶǡଶ ൌ
ǥ
ߚଵ ɐଵ
ߚଶ ɐଶ
ࣘேିଵǡଶǡேିଶ ൌ ߚேିଶ ɐேିଶ
ࣘேିଵǡଶǡேିଵ ൌ ߚே ɐே
െ
ǥ
ǥ
ǥ
ǥ
ǥ
ǥ
(20)
ൌ
ࣘଵǡேǡଵ ൌ
ࣘ
ே ேǦଵ
ଶǡ ଶ ǡଵ
ࣘ
ൌ
ߚே ɐே
ߚேିଵ ɐேିଵ
ൌ
ߚே ɐே
ࣘேିଵǡேǡଵ ൌ
ࣘேିଵǡேǡଶ ൌ
ߚଶ ɐଶ
ߚଷ ɐଷ
ே ேିଵ
ଶǡ
ǡଶ
ଶ
ǥ
ǥ
ࣘேିଵǡேǡேିଶ ൌ ߚேିଵ ɐேିଵ
ࣘேିଵǡேǡேିଵ ൌ ߚே ɐே
െ
TABLE I√
T HE RELATION BETWEEN φ k, n, j AND βu σu , u = 1, 2, · · · , N , FOR
k = 1, · · · , N , n = 1, 2, · · · , N
k AND j = 1, 2, · · · , k.
distribution of γk,n , the third probability term in (18) can now
be further expanded as
Pr O Φk,n = Pr γk,n < v = Fγk, n (v)
i
k−1
Õ
(23)
ak,n v
,
≈ 1 − exp(−ak,n v)
i!
i=0
where v = 22κ − 1 is the SNR threshold for system outage and
κ is the system transmission rate. By substituting (19), (20)
and (23) into (18), we have derived an approximate analytical
expression of the outage probability for the proposed ETMRS
scheme.
In terms of the i.i.d channel fading case where the relays
have the same energy threshold, the number of different
decoding sets reduces to N + 1 and the expression of system
outage probability can be simplified to
N
n⌢o Õ
n⌢ o n ⌢ o
Pout = Pr {O} = Pr ∅ +
Pr Φk Pr O Φk ,
⌢
k=1
(24)
n⌢o
where Pr ∅ is the probability that the decoding set is empty
n⌢ o
for the i.i.d. case, Pr Φk is the probability that the decoding
n ⌢ o
set contains k relays, and Pr O Φk is the conditional outage
probability when k relays falls in the decoding set. Similar to
7
the analysis of the general case, the first and second probability
terms in (24) can be expressed as
χ/ε
L
n⌢ o
Õ
Õ1 ª
©
πi +
Pr ∅ = Pr {ϕ = 0}
πi ® ,
i=0
i=χ/ε
1
¬
«
k
L
n ⌢ o N
Õ
(1 − Pr {ϕ = 0})
π
Pr Φk =
i ×
k
i=χ/ε
1
N
L
Õ
χ/ε
Õ1
N−k
(25)
(26)
©
ª
πi +
πi ®
,
Pr {ϕ = 0}
i=0
i=χ/ε
1
«
¬
where χ = α + β is the identical energy threshold for all the
relays and Pr {ϕ = 0} is the outage probability of the relays
for the special i.i.d. channel fading case, which can be derived
from that for the
case given in (13) and written as
general
mv N0
P
γ m, λ
SR
, where m is the identical severity
Pr {ϕ = 0} =
Γ(m)
parameter of the Nakagami-m fading channels between source
and relays and λSR is the identical channel power gain of the
first hop.
The third probability term in (24) can be deduced from (23)
as
i
N0 v
k−1
n ⌢ o
Õ
2
4kβσ
N0 v
,
(27)
Pr O Φk ≈ 1 − exp(−
)
i!
4k βσ 2 i=0
p
where σ = λRD /2 is the identical scale parameter for the
Rayleigh fading channels between relays and destination. Note
that different from (23), the expression of the conditional
system outage probability given in (27) does not require the
parameters defined in Table I. The outage probability for
the special i.i.d. channel fading case can be obtained by
substituting (25), (26) and (27) into (24).
C. Energy Threshold Optimization
We first consider the special i.i.d. channel fading case where
the associated energy thresholds for all the relays is identical,
denoted by χ = α + β. When the energy used for information
forwarding β grows, the conditional outage probability derived
in (27) reduces and the overall system outage probability correspondingly decreases. On the other hand, increasing of β will
lead to an increase of χ. According to (26), it decreases the
probability of each relay working in IF mode and the number
of relays falling into the decoding set. This will increase the
overall system outage probability. In simple words, when the
designed energy threshold χ for the relays is small, most of
relays could fall into the decoding set but their transmit power
is low. When the energy threshold is large, only a few relays
fall into the decoding set but their associated transmit power
is high. As χ = α + β ≥ α + ε1 , we can now infer that for the
special i.i.d. channel fading case, there should exist an optimal
energy threshold χ ∈ {α + ε1, α + ε2, · · · , ε L } that minimize
the system outage probability of the proposed ETMRS scheme.
Similarly, for the general i.n.i.d. channel fading case where
the relays may be located dispersively. There should also
exist an optimal energy threshold set { χ1, χ2, · · · , χN } , χu ∈
{α + ε1, α + ε2, · · · , ε L } , ∀u = 1, 2, · · · , N, for all relays that
minimize the overall system outage probability.
Due to the complexity of the adopted MC model, it is
difficult to derive an analytical expression for the optimal
energy threshold of each relay. However, for the special i.i.d.
channel fading case, the optimal energy threshold can be easily
achieved by performing a one-dimensional exhaustive search
from all the possible energy levels with the derived analytical
outage probability given in (24). The computation complexity
of this search is given by O (L).
When it comes to the general i.n.i.d. case, the optimal
set of energy thresholds can be found by a N-dimension
exhaustive search from all the possible combinations of energy
thresholds with the analytical expression
derived in (18). The
computation complexity is O L N , which grows exponentially
with the number of relays N. Thus, finding the optimal set of
energy thresholds becomes computationally prohibitive when
the number of relays N and the level of batteries L are large.
To overcome this problem, in the following subsection, we
provide a heuristic approach to design the energy thresholds
for the general i.n.i.d. case.
D. A Heuristic Approach for i.n.i.d Scenario
Intuitively, a higher energy threshold and forwarding transmit power should be set for those relays closer to the source
node. This is because that the average amount of harvested
energy is higher for those relays compared to the ones far away
from the source node. On the other hand, relays closer to the
source are relatively further away from the destination node
such that the associated second hop channels are relatively
weaker, a larger transmit power should be used to overcome
the higher path loss. On the other hand, for the relays near to
the destination node, smaller forwarding transmit power can
be adopted due to their limited harvested energy and stronger
second hop channels. Inspired by this fact, we set the energy
consumption for information forwarding at each relay Ru as
β̃u = zλSRu /λRu D,
(28)
where z is a scalar factor to adjust the overall transmit power
of all the relays. For the considered discrete-battery model,
the designed energy consumption for information forwarding
β̃u should be discretized to one specific energy level of
the battery. Note that the definition of discretization given
below (9) no longer holds as we cannot simply choose
βu ∈ {ε1, ε2, · · · , ε L − α}. We now define the discretized value
∆
of β̃u for the u-th relay as βu = ε j ,
˜
εi : εi ≥ βu , if β˜u ≤ ε L − α
min
arg i ∈{0,1,
··· , L }
. (29)
j=
α
L − , if β˜u > ε L − α
ε1
Based on the above definitions, the discretized energy threshold for relay Ru can be further expressed as
zλSRu
,C − α .
(30)
χu = α + βu = α + min ε1
λ R u D ε1
Similar to the analysis given in the previous subsection,
we can deduce that there should exist an optimal value of
8
z that minimizes the system outage probability. To find the
optimal value of z, we first define λmax and λmin as the
maximum and minimum value of the term λSRu /λRu D , among
all relays, respectively. The optimal z should exist within
the interval [ε1 /λmax, ε L /λmin ], where z = ε1 /λmax could
make all relays choose ε1 + α as their energy thresholds
and z = ε L /λmin will force all relays to adopt energy
level L as their energy thresholds. The optimal z thus can
now be achieved by performing a one-dimension exhaustive
search from this interval over the derived outage probability
expression. In order to capture all the possible combinations,
we search z with an increment of ε1 /λmax each time and the
computation complexity for the proposed heuristic approach
can be expressed by O (Lλmax /λmin ). Note that the complexity
of the heuristic approach is obviously much
lower than that
of the exhaustive search given by O L N .
1
ηPλSRu .
(32)
2
With the fact that relay Ru falls in the decoding set only
when it performs IF operation and decodes the source’s
information correctly, we thus have
IV. P ERFORMANCE U PPER B OUND
qu = (1 − pu ) (1 − Pr {ϕu = 0}) ,
As described in Section III, we adopt a practical finitecapacity battery model in this paper. With this model, it can
be readily deduced that the system performance could be
improved when we increase the battery capacity (i.e., C). This
is because a larger battery capacity can reduce the energy loss
caused by energy overflow (i.e., the battery cannot be charged
when it is full) and thus the relays have more available energy
to support their information forwarding operation. On the other
hand, we can infer that the system performance improvement
speed actually decreases as the battery capacity increases since
the energy overflow happens more rarely when the battery
capacity keeps increasing. A natural question that comes up
here is “For a given network setup, how large of the battery
capacity C will be sufficient?” This question is particularly
important for the considered system as one of its potential
applications will be low-cost and lower-power networks (e.g.,
wireless sensor networks), in which the network deployment
cost should be kept as low as possible by carefully selecting
the battery capacity. However, it is hard to find the answer of
this question based on the derived expressions in the previous
section due to their complexity. We are thus motivated to
adopt an indirect way: We first derive performance upper
bounds of the considered system and the sufficient battery
capacity will then be obtained when a certain value of C can
make the performance expressions derived in previous sections
approach their corresponding upper bounds. In this sense, in
this section we analyze the performance upper bounds of the
considered system with infinite battery capacity (i.e., C → ∞
and implicitly L → ∞).
When the relay batteries are infinite, there will be no energy
overflow. As such, we can implement the well-known flow
conservation law to evaluate the system outage probability.
Specifically, in our ETMRS scheme, the relay battery is
charged if operated in EH mode and discharged if operated
in IF mode. In this sense, for each relay, the total amount
of harvested energy in a long term should equal to the total
amount of energy consumed for information decoding and
forwarding. Mathematically, we have the following formula
for the u-th relay
pu Ēu = (1 − pu ) [(1 − qu ) α + qu (α + βu )] ,
(31)
where pu denotes the probability that relay Ru performs EH
operation, qu denotes the probability that the u-th relay falls in
the decoding set, Ēu is the average amount of harvested energy
during each EH operation, α is the circuit energy consumption
for each decoding operation and βu is the energy consumption
for information forwarding of Ru adopted in the finite-capacity
case. Since both C and L are infinity, the term Ēu can be
obtained from (2) given by
Ēu =
(33)
where the term Pr {ϕu = 0} has been derived in (13). By
jointly considering (31)-(33), we can now obtain qu expressed
as
1
.
(34)
qu =
2α+2β
1
u (1−Pr{ϕu =0})
1−Pr{ϕu =0} + η Pλ S R (1−Pr{ϕu =0})
u
The first and second probability terms in the system outage
probability defined in (18) can now be evaluated by qu as
Ö
Pr {∅} =
(1 − qu ) ,
(35)
Ö
u:Ru ∈Λ
Pr Φk,n =
qu
u:Ru ∈Φk, n
Ö
u:Ru <Φk, n
(1 − qu ) .
(36)
The third probability term in (18) is independent of C and
L, and only depends on the energy threshold of the relays.
In this sense, the third probability term in (18) remains the
same as the finite-capacity case, which has been derived in
(23). We thus can express the upper bound of system outage
probability for the proposed ETMRS scheme corresponding to
infinite battery capacity as (37) on top of the next page.
When the special i.i.d. channel fading case is considered,
similar to the above analysis, the system outage probability is
upper bounded by (38) on top of the next page.
where q is the probability of each relay falling in the
decoding set when the channels are i.i.d. and it can be easily
derived based on (34) and expressed as
q=
1
1
1−Pr{ϕ=0}
+
2α+2β(1−Pr{ϕ=0})
η Pλ S R (1−Pr{ϕ=0})
.
(39)
Remark 1: By substituting (13) into (34), we can see that the
probability for the u-th relay falling in the decoding set (i.e.,
qu ) is proportional to the term PλSRu . This is understandable
since as the value of PλSRu increases, the u-th relay harvests
more energy on average and is more likely to decode the
source signal successfully in the first hop. Moreover, as
expected, the value of qu is inversely proportional to that
of the energy threshold βu . Furthermore, using the above
performance upper bounds of system outage probability, we
9
ub
Pout
i #
"
( Nk ) Ö
k−1
N Õ
Ö
Õ
Õ
ak,n v
qu
(1 − qu ) 1 − exp(−ak,n v)
≈
(1 − qu ) +
.
i!
u:Ru <Φk, n
u:Ru ∈Λ
i=0
k=1 n=1 u:Ru ∈Φk, n
Ö
⌢ ub
P out ≈ (1 − q) N +
N
Õ
N
k
k=1
q k (1 − q) N−k
(37)
i
N0 v
k−1
Õ
2
4kβσ
N0 v
)
,
1 − exp(−
i!
4k βσ 2 i=0
(38)
N=8
0
1
10
0.9
L = 20
Outage Probability
Outage Probability Ratio
0.8
−1
10
L = 40
−2
10
L = 200
−3
10
Finite−Capacity Battery, Analytical Eq. (18)
Infinite−Capacity Battery, Analytical Eq. (37)
Monte Carlo Simulation
0.7
0.6
0.5
0.4
P = 34dBm, dSR = 4, ∀u
0.3
P = 34dBm, dSR = 5, ∀u
0.2
P = 35dBm, dSR = 4, ∀u
u
u
u
P = 35dBm, dSR = 5, ∀u
0.1
0
u
1
−4
15
20
25
30
Source Transmit Power P (dBm)
35
Fig. 2. The outage probability of the proposed ETMRS scheme versus the
source transmit power for different battery levels L, where transmission bit
rate κ = 1, C = 2 × 10−5 , α = 10−7 , dS R = {5, 5.5, 6, 6, 6, 6, 6.5, 7} and
χ = {3, 3, 3, 3, 3, 3, 4, 4} × 10−6 .
are able to judge whether a certain value of battery capacity
C is sufficiently large for a given network setup via numerical
results as shown in next section.
AND
2.5
3
−5
x 10
(a) Combinations of P and dS R u
P = 35dBm
1
0.9
0.8
0.7
0.6
0.5
0.4
N = 6, dSR = 4, ∀u
0.3
N = 6, dSR = 5, ∀u
0.2
N = 9, dSR = 4, ∀u
0.1
N = 9, dSR = 5, ∀u
u
u
0
V. S IMULATIONS
1.5
2
Battery Capacity C
40
Outage Probability Ratio
10
D ISCUSSIONS
In this section, we present some simulation and numerical
results to validate and illustrate the above theoretical analysis.
In order to capture the effect of path-loss, we use the model
10−3
that λXY = 1+d
ω , where λ XY is the average channel power
XY
gain between node X and Y, dXY denotes the distance between
node X and Y, and ω ∈ [2, 5] is the path-loss factor. Note that
a 30 dB average signal power attenuation is assumed at a
reference distance of 1 meter (m) in the above channel model
[19]. For simplicity, we consider a linear topology that the
relays are located on a straight line
between the source and
destination and denote by dSR = dSR1 , dSR2 , · · · , dSR N the
set of distances between source and all relays. We use χ =
{ χ1, χ2, · · · , χN } to represent the energy threshold set for all
the relays. In all the following simulations, we set the distance
between the source and destination dSD = 20m, the path-loss
factor ω = 3, the severity parameter mu = 2, ∀u, the noise
power N0 = −90dBm, and the energy conversion efficiency
η = 0.5.
We first compare the analytical system outage probability
with its Monte Carlo simulation, which corresponds to the
case that the charging of the relay batteries is continuous (i.e.,
L → ∞). To this end, we plot the system outage probability
u
u
1
1.5
2
Battery Capacity C
2.5
3
−5
x 10
(b) Combinations of N and dS R u
Fig. 3. The ratio between the upper bound outage probability of the ETMRS
scheme with infinite battery capacity and the outage probability with finite
battery capacity versus battery capacity C for different source transmit power
and relay topologies, where κ = 1, α = 10−7 , χu = 4×10−6 , ∀u and L = 600.
of our ETMRS scheme versus the source transmit power for
different battery levels L in Fig. 2. We can see that the derived
analytical expression of outage probability approaches the
corresponding Monte Carlo simulation result as the discrete
battery level L increases. Specifically, when L = 200, the
analytical expression coincides well with the simulation result,
which verifies the effectiveness of the adopted MC model and
the correctness of our theoretical analysis presented in Sec.
II-IV. Moreover, as expected, the performance of the ETMRS
scheme with finite-capacity battery is bounded by the one with
infinite-capacity battery. As the analytical results agree well
with the simulation results and for the purpose of simplicity,
in the following, we will only plot the analytical results of the
ETMRS scheme.
Recall that we derived system performance upper bound in
10
⌢ ub
N=8
0
10
−3
10
Optimal χ
−1
10
Outage Probability
Section IV, which can be used to judge whether a certain
value of C is sufficiently large via numerical results. To
show this, we now plot the outage probability ratio of the
proposed ETMRS scheme with finite battery capacity over its
upper bound with infinite battery capacity versus relay battery
capacity C in Fig. 3. For simplicity, we consider the special
i.i.d. case where the relays are located in a cluster. The outage
−4
10
0.5
1
1.5
2
−6
−2
x 10
10
P = 37dBm, dSR = 4, ∀u
u
P = 37dBm, dSR = 6, ∀u
−3
u
10
⌢
P = 40dBm, dSR = 4, ∀u
probability ratio is formally defined as Pout /Pout ∈ (0, 1],
u
P = 40dBm, dSR = 6, ∀u
⌢ ub
u
10
0.2
0.4
0.6
0.8
1
1.2
1.4
Identical Energy Threshold χ
1.6
1.8
2
−5
x 10
(a) Combinations of P and dS R u
P = 40dBm
0
10
N = 6, dSR = 4
Optimal χ
u
N = 6, dSR = 6
−1
u
10
N = 9, dSR = 4
Outage Probability
u
N = 9, dSR = 6
u
−2
10
−3
10
−4
10
1
−5
10
0.2
0.4
0.6
0.8
1
1.2
1.4
Identical Energy Threshold χ
2
3
−6
1.6x 10 1.8
2
−5
x 10
(b) Combinations of N and dS R u
Fig. 4. The outage probability of the proposed ETMRS scheme versus the
identical energy threshold for different source transmit power, relay topologies
where κ = 1, C = 2 × 10−5 , α = 10−7 and L = 200.
1
0.9
0.8
dSR = {2, 4, 6, 8}
0.7
Outage Probability
where Pout derived in (38) is the system outage probability
⌢
for infinite-capacity battery case and Pout given in (24) is
the system outage probability for finite-capacity battery case.
From Fig. 3, we can first observe that the outage probability
ratio monotonically increases as the battery capacity C grows
and gradually converges to 1 when the value of C is large
enough. This indicates that the performance gap between the
finite-capacity battery and infinite-capacity battery decays to
0 as C increases. However, the convergence speed varies for
different network setups. Specifically, from Fig. 3(a), we can
see that the outage probability ratio converges to 1 slower
with either higher source transmit power or shorter distances
between source and relays. This can be understood as follows.
The amount of harvested energy at relays increases when
the source transmit power increases or the distances between
source and relays reduce. In this case, a larger battery capacity
is required to avoid the potential energy overflow (i.e., the
battery cannot be charged when it is full). From Fig. 3(b),
we find out that as the number of relays N increases, the
convergence speed is also reduced. This is understandable
since energy overflow happens in a higher probability as N
grows. Similarly, larger value of C is required to make the
outage probability ratio close to 1. We can now summarize
that larger capacity batteries should be equipped at energy
harvesting relays for those network setups with higher source
transmit power, shorter distances between source and relays
or larger number of relays.
In Fig. 4, we plot the outage probability versus the energy
threshold of the i.i.d. channel fading case for different source
transmit power and relay location. Recall that the energy
threshold χ is discretized to one of the L + 1 energy levels of
the battery excluding the empty level. Thus, the outage probability is plotted in stair curve in the figure. First of all, Fig.
4 demonstrates that there exists an optimal energy threshold
that minimizes the outage probability in all considered cases,
which validates our deduction in Remark 1. Moreover, we
can see from Fig. 4(a) that the higher the transmit power at
the source, the larger the value of optimal energy threshold.
This is because the relays can harvest more energy when
the transmit power of the source increases and thus a larger
energy threshold can be supported. We can also see from Fig.
4(a) that a smaller energy threshold should be chosen when
the relays are located away from the source. This can be
explained as two folds. Firstly, the harvested energy at the
relays is limited when they are far away from the source.
Secondly, the second hop channel condition becomes better
when the relays are away from the source (i.e., close to the
destination) and a small energy threshold is enough to avoid
system outage. The number of the relays N also affects the
−4
0.6
dSR = {4, 5, 5, 5, 6}
0.5
0.4
0.3
0.2
Exhaustive Search Approach
Proposed Heuristic Approach
Common Energy Threshold Approach [29]
0.1
0
10
12
14
16
18
20
22
24
Source Transmit Power P (dBm)
26
28
30
Fig. 5. Outage probability of the proposed ETMRS scheme and the common
energy threshold scheme for different relay locations, where κ = 1, C =
2 × 10−5 , α = 10−7 and L = 20.
optimal energy threshold. From Fig. 4(b) we can see that as the
number N increases, the optimal energy threshold decreases.
This is understandable since in cooperative relay networks, a
decoding set with more relays can achieve the same outage
probability with less transmit power. Note that similar results
can be observed for the general i.n.i.d case, which are not
provided here due to space limitation..
We then compare the system performance of the proposed
ETMRS scheme with optimized energy threshold and the common energy threshold scheme in Fig. 5. The optimal energy
threshold of the ETMRS is obtained by the exhaustive search
based approach and the proposed heuristic one. As the optimal
energy threshold for the i.i.d. case can be easily obtained
11
0
10
−1
Outage Probability
10
−2
10
−3
10
ETMRS Analytical, κ = 1
BARS Simulation, κ = 1
ETMRS Analytical, κ = 1.5
BARS Simulation, κ = 1.5
−4
10
15
20
25
30
Source Transmit Power P (dBm)
35
40
Fig. 6. The outage probability of the proposed ETMRS scheme and the
existing BARS scheme with optimal settings versus source transmit power for
different transmission bit rate, where N = 8, dS R u = 3, ∀u, C = 2 × 10−5 ,
α = 10−7 and L = 200.
via a one-dimension exhaustive search, we only consider the
general i.n.i.d. case where the optimal energy thresholds for
the relays could be different. In Fig. 5, we plot the system
outage probability for these two approaches versus the source
transmit power for two different relay topologies. The outage
probability of exhaustive search approach is obtained via a
N-dimension exhaustive search from all the possible combinations of energy thresholds. Due to the intense computation
complexity mentioned before, we consider the case that each
relay only has 20 energy levels. For the proposed heuristic
approach, the computation complexity can be dramatically
reduced and it is thus particularly suitable to those networks
with large number of relays and energy levels. From Fig. 5,
we can observe that the proposed heuristic approach with
reduced complexity can achieve the near optimal system
performance in both simulated scenarios. We also can see
that our proposed scheme outperforms the common-energy
strategy for all simulated cases. For the case that the relays
are located closely, our proposed scheme and the one in [28]
performs similarly. When the relays are located differently,
our proposed scheme improves the performance significantly
by using different energy thresholds for each relay.
Finally, we compare the proposed ETMRS scheme with the
existing BARS scheme [31] in Fig. 6. As the BARS scheme
proposed in [31] only considers a clustered topology, we thus
compared BARS scheme with the special i.i.d. case of the
proposed ETMRS scheme. In Fig. 6, we plot the optimal
outage probabilities of the ETMRS and BARS schemes versus
source transmit power for different transmission rate. It can
be observed that the proposed ETMRS scheme can achieve
a lower outage probability than the BARS scheme. And their
performance gap is enlarged as the transmission rate grows.
VI. C ONCLUSIONS
In this paper, we proposed an energy threshold based multirelay selection (ETMRS) scheme for accumulate-then-forward
energy harvesting relay networks. We modeled the finitecapacity battery of the relays by a finite-state Markov Chain
(MC) in order to evaluate their stationary distribution. We
then derived an approximate analytical expression for system
outage probability of the proposed ETMRS scheme over
independent but not necessarily identical mixed Nakagami-m
and Rayleigh fading channels. A heuristic approach was then
designed to minimize the system outage probability, which was
shown to achieve near-optimal performance with reduced computational complexity. Moreover, we derived upper bounds for
the concerned system performance corresponding to the case
that all relays are equipped with infinite-capacity batteries.
Numerical simulations validated the accuracy of the analytical
results, demonstrated the impact of various system parameters
and provided some insights of practical relay battery design.
Numerical results showed that larger capacity battery should
be equipped at energy harvesting relays for those network
setups with higher transmit power, shorter distance in the first
hop or larger number of relays. Furthermore, the proposed
ETMRS scheme can considerably outperform the existing single relay selection scheme and the common energy threshold
scheme.
R EFERENCES
[1] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks
with RF energy harvesting: A contemporary survey,” IEEE Communications Surveys Tutorials, vol. 17, no. 2, pp. 757–789, 2015.
[2] T. Paing, J. Shin, R. Zane, and Z. Popovic, “Resistor emulation approach
to low-power RF energy harvesting,” IEEE Trans. on Power Electronics,,
vol. 23, no. 3, pp. 1494–1501, May 2008.
[3] C. Mikeka and H. Arai, “Design of a cellular energy-harvesting radio,”
in Wireless Technology Conference, 2009. EuWIT 2009. European, Sept
2009, pp. 73–76.
[4] S. Bi, C. Ho, and R. Zhang, “Wireless powered communication: opportunities and challenges,” IEEE Communications Magazine, vol. 53,
no. 4, pp. 117–125, 2015.
[5] S. Bi, Y. Zeng, and R. Zhang, “Wireless Powered Communication
Networks: An Overview,” ArXiv e-prints, 2015.
[6] M. Dohler and Y. Li, Cooperative communications: hardware, channel
and PHY. John Wiley & Sons, 2010.
[7] A. Nasir, X. Zhou, S. Durrani, and R. Kennedy, “Relaying protocols for
wireless energy harvesting and information processing,” IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp. 3622–3636, 2013.
[8] Z. Chen, B. Xia, and H. Liu, “Wireless information and power transfer in
two-way amplify-and-forward relaying channels,” in 2014 IEEE Global
Conference on Signal and Information Processing (GlobalSIP), Dec
2014, pp. 168–172.
[9] Z. Ding, S. Perlaza, I. Esnaola, and H. Poor, “Power allocation strategies
in energy harvesting wireless cooperative networks,” IEEE Transactions
on Wireless Communications, vol. 13, no. 2, pp. 846–860, 2014.
[10] Z. Fang, X. Yuan, and X. Wang, “Distributed energy beamforming for
simultaneous wireless information and power transfer in the two-way
relay channel,” IEEE Signal Process. Lett., vol. 22, no. 6, pp. 656–660,
June 2015.
[11] C. Zhong, H. Suraweera, G. Zheng, I. Krikidis, and Z. Zhang, “Wireless
information and power transfer with full duplex relaying,” IEEE Trans.
Commun., vol. 62, no. 10, pp. 3447–3461, Oct 2014.
[12] Y. Zeng and R. Zhang, “Full-duplex wireless-powered relay with selfenergy recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2, pp. 201–
204, April 2015.
[13] I. Krikidis, S. Sasaki, S. Timotheou, and Z. Ding, “A low complexity
antenna switching for joint wireless information and energy transfer in
MIMO relay channels,” IEEE Trans. Commun., vol. 62, no. 5, pp. 1577–
1587, May 2014.
[14] Z. Zhou, M. Peng, Z. Zhao, and Y. Li, “Joint power splitting and antenna
selection in energy harvesting relay channels,” IEEE Signal Process.
Lett., vol. 22, no. 7, pp. 823–827, July 2015.
[15] G. Zhu, C. Zhong, H. Suraweera, G. Karagiannidis, Z. Zhang, and
T. Tsiftsis, “Wireless information and power transfer in relay systems
with multiple antennas and interference,” IEEE Trans. Commun., vol. 63,
no. 4, pp. 1400–1418, April 2015.
[16] K. Xiong, P. Fan, C. Zhang, and K. Letaief, “Wireless information
and energy transfer for two-hop non-regenerative MIMO-OFDM relay
networks,” Accepted to appear in IEEE J. Sel. Areas Commun., 2015.
12
[17] M. Mohammadi, H. Suraweera, G. Zheng, C. Zhong, and I. Krikidis,
“Full-duplex MIMO relaying powered by wireless energy transfer,” in
2015 IEEE 16th International Workshop on Signal Processing Advances
in Wireless Communications (SPAWC), 2015, pp. 296–300.
[18] Z. Ding, I. Krikidis, B. Sharif, and H. Poor, “Wireless information and
power transfer in cooperative networks with spatially random relays,”
IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp.
4440–4453, 2014.
[19] H. Chen, Y. Li, J. Luiz Rebelatto, B. F. Uchoa-Filho, and B. Vucetic,
“Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications,” IEEE Trans. on Signal Processing, vol. 63, pp. 1700–1711, Apr.
2015.
[20] H. Chen, Y. Li, Y. Jiang, Y. Ma, and B. Vucetic, “Distributed power
splitting for SWIPT in relay interference channels using game theory,”
IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 410–420, Jan 2015.
[21] D. S. Michalopoulos, H. A. Suraweera, and R. Schober, “Relay selection
for simultaneous information transmission and wireless energy transfer:
A tradeoff perspective,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 8, pp. 1578–1594, 2015.
[22] B. K. Chalise, W. K. Ma, Y. D. Zhang, H. A. Suraweera, and M. G.
Amin, “Optimum performance boundaries of ostbc based AF-MIMO
relay system with energy harvesting receiver,” IEEE Transactions on
Signal Processing, vol. 61, no. 17, pp. 4199–4213, 2013.
[23] I. Krikidis, S. Timotheou, and S. Sasaki, “RF energy transfer for
cooperative networks: Data relaying or energy harvesting?” IEEE Communications Letters, vol. 16, no. 11, pp. 1772–1775, November 2012.
[24] A. Nasir, X. Zhou, S. Durrani, and R. Kennedy, “Wireless-powered relays in cooperative communications: Time-switching relaying protocols
and throughput analysis,” IEEE Trans. Commun., vol. 63, no. 5, pp.
1607–1622, May 2015.
[25] A. H. Sakr and E. Hossain, “Analysis of k-tier uplink cellular networks
with ambient rf energy harvesting,” IEEE Journal on Selected Areas in
Communications, vol. 33, no. 10, pp. 2226–2238, 2015.
[26] K. H. Liu and T. L. Kung, “Performance improvement for RF energyharvesting relays via relay selection,” IEEE Transactions on Vehicular
Technology, vol. PP, no. 99, pp. 1–1, 2017.
[27] A. Bletsas, A. Khisti, D. Reed, and A. Lippman, “A simple cooperative
diversity method based on network path selection,” IEEE Journal on
Selected Areas in Communications, vol. 24, no. 3, pp. 659–672, 2006.
[28] I. Krikidis, “Relay selection in wireless powered cooperative networks
with energy storage,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 12, pp. 2596–2610, 2015.
[29] J. Zhang and G. Pan, “Outage analysis of wireless-powered relaying
mimo systems with non-linear energy harvesters and imperfect csi,”
IEEE Access, vol. 4, pp. 7046–7053, 2016.
[30] M. Haghifam, B. Makki, M. Nasiri-Kenari, and T. Svensson, “On
Wireless Energy and Information Transfer in Relay Networks,” ArXiv
e-prints, 2016.
[31] K. Liu, “Performance analysis of relay selection for cooperative relays
based on wireless power transfer with finite energy storage,” IEEE Trans.
on Vehicular Technology, vol. PP, no. 99, pp. 1–1, 2015.
[32] A. Jeffrey and D. Zwillinger, Table of Integrals, Series, and Products,
ser. Table of Integrals, Series, and Products Series. Elsevier Science,
2007.
[33] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless
information and power transfer,” IEEE Trans. on Wireless Communications, vol. 12, no. 5, pp. 1989–2001, May 2013.
[34] C. Zhong, X. Chen, Z. Zhang, and G. Karagiannidis, “Wireless powered
communications: Performance analysis and optimization,” To appear in
IEEE Trans. Commun., 2015.
[35] J.-B. Kim and D. Kim, “Cooperative system with distributed beamforming and its outage probability,” in Vehicular Technology Conference,
2007. VTC2007-Spring. IEEE 65th, 2007, pp. 1638–1641.
[36] W.-J. Huang, Y.-W. Hong, and C.-C. Kuo, “Lifetime maximization
for amplify-and-forward cooperative networks,” IEEE Trans. Wireless
Commun., vol. 7, no. 5, pp. 1800–1805, May 2008.
[37] M. Simon and M. Alouini, Digital Communication over Fading Channels, ser. Wiley Series in Telecommunications and Signal Processing.
Wiley, 2005.
[38] M. Hanif, N. Beaulieu, and D. Young, “Two useful bounds related
to weighted sums of rayleigh random variables with applications to
interference systems,” IEEE Trans. on Communications, vol. 60, no. 7,
pp. 1788–1792, 2012.
[39] D. Michalopoulos and G. Karagiannidis, “Performance analysis of
single relay selection in rayleigh fading,” IEEE Trans. on Wireless
Communications, vol. 7, no. 10, pp. 3718–3724, 2008.
[40] H. Chen, J. Liu, L. Zheng, C. Zhai, and Y. Zhou, “An improved selection
cooperation scheme for decode-and-forward relaying,” IEEE Commun.
Lett., vol. 14, no. 12, pp. 1143–1145, December 2010.
[41] H. Chen, J. Liu, Z. Dong, Y. Zhou, and W. Guo, “Exact capacity
analysis of partial relay selection under outdated CSI over rayleigh
fading channels,” IEEE Trans. on Vehicular Technology, vol. 60, no. 8,
pp. 4014–4018, Oct 2011.
| 7cs.IT
|
MD. ABDUL LATIF SARKER, CHONBUK NATIONAL UNIVERSITY, KOREA
1
Distortion-free Golden Precoded Alamouti for
MISO Systems
arXiv:1710.09142v2 [cs.IT] 15 Mar 2018
Md. Abdul Latif Sarker
Abstract—Although the discrete Fourier transform (DFT)
precoded Alamouti (DPA) scheme with limited feedback offers
numerous benefits in the Rayleigh fading channel, this scheme
inherently generates geometric mean distortion due to the error exponential of the DFT precoding (DP). Consequently, the
receiver suddenly losses the average received channel power.
Instead of the conventional DPA scheme, we propose a Golden
precoded Alamouti (GPA) scheme to construct a distortion-free
codeword generator that can be used in multiple-input and singleoutput (MISO) systems. The Golden section with continuous
geometric proportion and the Golden precoding (GP) pattern can
be used to construct some good space-time block codes (STBCs)
with orthogonal properties and simple inverse computation for
use in future wireless communications. In this paper, we overcome
the Grassmannian subspace packing problem and compute the
pairwise error probability (PEP) to verify the bit-error-rate
(BER) performance. Our Monte Carlo simulations show that
the proposed GPA scheme performs better than the conventional
DPA scheme.
Index Terms—MISO systems, Alamouti code, the DPA and
GPA scheme, subspace packing problem, BER performance.
I. I NTRODUCTION
T
HE use of orthogonal space-time block codes (OSTBCs)
is an important technique in wireless communications
to improve the network reliability and offer a high data rate
and diversity gain [1]. A well-known space-time block code
(STBC) is the Alamouti code, which is a complex orthogonal
space-time code specialized for the use with two transmission
antennas to achieve full diversity [1]. In addition, OSTBCs
provide the benefit of low-complexity symbol-wise decoding
[2].
An open loop is generally used in STBCs because they operate
without the benefit of channel state information (CSI) at the
transmitter [3] and because of the results of studies on closed
loops with STBCs to improve the performance of MIMO
systems [4]. Closed-loop schemes are based on the type of
CSI that is available at the transmitter, such as quantized CSI,
although occasionally only statistical CSI may be available on
the channel. However, we assume that the channel is known at
both the transmitter and the receiver. The CSI is estimated at
the receiver and is returned to the transmitter with limited
feedback [3], [5]. Thus, in this study, we consider limited
feedback with updated CSI, where the precoder index can be
given based on the CSI. Instead of full CSI, the corresponding
index can be given as feedback to the transmitter.
The discrete Fourier transform precoding (DP) codebook was
first proposed in [3], [5], where the authors used the optimal
codebook selection criterion to drive a criterion for finding
codebooks with low average distortion. Hai et al. [6] showed
that the performance of discrete fractional sine transform
(DFRST) is equivalent to that of DFT precoding, although they
attempted to reduce the hardware complexity. Unfortunately,
most existing works have not completely removed the mean
distortion from the codeword generator. Thus, in this work,
we design a distortion-free Golden precoding codebook (GPC)
that constructs an error-free codeword generator.
STBCs with Golden numbers were proposed in [7], [8]. In
[7], the authors showed that the Golden code satisfies the
properties of full-rank, full-rate, and non-vanishing determinants, which increase the minimum determinants. The Golden
and Silver code were compared with diagonal precoding for
non-OSTBCs to evaluate the pairwise error probability [8].
Many existing works have introduced a Golden number for
STBCs, but Golden precoding has not yet been introduced for
OSTBCs. Thus, this paper designs a Hadamard-based GPC
scheme to produce a distortion-free codeword generator that
measures the minimum chordal distance and computes the
pairwise error probability to verify the system bit-error-rate
(BER) performance. The rest of this paper is organized as
follows. First, we investigate the system model in Section II.
Second, we describe the conventional DFT precoded Alamouti
(DPA) scheme in Section III. We then propose the Golden
precoded Alamouti (GPA) scheme and compute the pairwise
error probability (PEP) in Section IV and Section V, respectively. Finally, the Monte Carlo simulations and conclusions
are presented in Sections VI and VII, respectively.
II. S YSTEM M ODEL
We consider multiple-input and single-output (MISO) systems with a flat Rayleigh fading channel hC1×NT that is
employed with multiple transmit antennas NT and a single
receive antenna NR = 1. The receive signal yC1×T at a
period T can be modeled as
y = hX + z,
(1)
where XCNT ×T is a transmit codeword structure of the
STBCs and zC1×T is a circularly symmetric complex Gaussian with zero mean and unit variance.
III. DPA S CHEME
Md. Abdul Latif Sarker is with the Department of Electronics and Information Engineering, Chonbuk National University, Jeonju 54896, Republic of
Korea. e-mail: ([email protected]).
Manuscript received xxx, 2017; revised xxx, 2017.
The DPA codeword generator X is given by [3]
X = WD S,
(2)
MD. ABDUL LATIF SARKER, CHONBUK NATIONAL UNIVERSITY, KOREA
2
where the M × T complex Alamouti code with a length of
M ≤ NT is
s −s∗
Sk = 11 ∗21 , k = 1, 2, .., T,
(3)
s21 s11
where WD CNT ×M is the NT × M DFT precoding matrix
j2πkl
1
given in [3] with √N
e NT at entry (k, l), which is chosen
T
from the codebook generator in [3], [5-6]:
0.8
0.8
0.6
0.6
0.4
0.4
0.2
0.2
0
0
-0.2
-0.4
-0.2
-0.6
-0.4
-0.8
-0.6
i−1
FD = {θD
WD }, i = 1, 2, ..., L − 1.
(4)
The NT × M remaining DFT precoding matrices are given by
i−1
WD,i = θD
WD,1 , i = 2, ..., L,
(5)
where L is the size of the codebook; WD,1 is an NT × M
DFT-based first precoding matrix, the (k, l) of which is given
j2π(k−1)(l−1)
1
NT
as √N
e
; and θD is the diagonal matrix with the
T
NT
free variable {ui }i=1 to be determined in [3].
Problem statement: The given DPA scheme has two main
problems. The first problem is the geometric mean distortion
of the DPA scheme due to the error exponential of the DP
matrix, and the second problem is the minimum chordal
distance problem.
A. Geometric mean distortion of the DPA scheme
The DP matrix contains an error exponential that produces
a slight distortion at a low-order DPA scheme, although this
problem gradually arises at a high-order DPA scheme. Consequently, codeword matrix suffers a spectral leakage problem;
for example, the 2 × 2 DPA third codeword matrix is given
by (2)-(5) as follows:
θ2 h 1 1 i s11 −s∗21
[X3 ] = √D
jπ
s21 s∗11
2 1 e
h
i
0.0000 + 0.0000i 0.8315 − 0.5556i
=
, (6)
0.1379 + 0.6935i 0.1379 + 0.6935i
where i = 3, s11 = 0.7071 + 0.7071i and s21 = −0.7071 −
0.7071i are accounted for by the quadrature amplitude modulation (QAM) constellation, and (·)∗ is the complex conjugate
operator. Now, we increase the size of the DP matrix in (6).
For example, we set i = 3,M = 2, and NT = 4 in (6), and
we obtain the 4 × 2 DPA third codeword matrix in (7):
1 1
2
jπ
θ 1 e
s11 −s∗21
[X3 ] = √D
∗
j2π s
21 s11
4 1 e
j3π
1 e
0.0000 + 0.0000i 0.8315 − 0.5556i
0.1379 + 0.6935i 0.1379 + 0.6935i
=
. (7)
0.0000 − 1.0000i −0.0000 − 0.0000i
0.7071 − 0.0000i −0.7071 + 0.0000i
Using (6) and (7), we draw Fig. 1, which depicts the mean
distortion with the DPA generator. We observe in (6) and Fig.
1 (a) that the DPA generator contains a very small distortion,
which has gradually increased in the high-order DP matrix in
Fig. 1 (b). Hence, the codeword generator cannot be generated
as anti-diagonal blocks in the DPA matrix, and consequently,
the decoder requires more frequent CSI feedback to meet the
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
0.8
1
(a) Mean distortion with a 2 × 2(b) Mean distortion with a 4 × 2
DPA generator obtained using (6). DPA generator obtained using (7).
Fig. 1: Mean distortion of the DPA scheme. (a) Mean distortion with a 2 × 2 DPA generator obtained using (6). (b) Mean
distortion with a 4 × 2 DPA generator obtained using (7).
constraint. This problem arises from the error exponential of
the DP matrix, which degrades the BER performance by at
least 10−1 steps. However, we solve this problem in Section
IV.
B. Minimum chordal distance problem
The minimum chordal distance is the major issued for
packing subspaces in the Grassmann manifold. We formulate
the minimum chordal distance problem as follows:
The optimal DP matrix, Wopt , is given by
Wopt = argmaxWD,i F k HWD,i S̄ k2F ,
(8)
where the error matrix S̄ = Si − Sj and S̄S̄H = αI with a
constant α. When WD,i F is not imposed, the above optimum
solution Wopt is not unique. Thus, the average loss in the
received channel power is
E minW F (k HWopt k2F − k HW k2F )
2
1
H
H 2
≤ E λ1 (H) E minWF (k V̄V̄ − WW kF ) , (9)
2
where the singular value decomposition (SVD) technique
of channel H = UΣVH , the diagonal entry of Σ, is in
descending order; V̄ is unitary; λ21 (Wopt ) = 1; and E [·] is
called the expectation with regard to the random channel H.
Hence, the optimum codebook is designed to maximize the
minimum chordal distance [3], [5-6], [9]:
i−1
δmin,D = min2≤i≤L d(WD,1 , θD
WD,1 ).
(10)
IV. P ROPOSED GPA S CHEME
In this section, we will design a distortion-free GPA scheme.
For this purpose, we first design a Golden Hadamard precoding
matrix. Let NT = 2q and a 2q × M precoding matrix, W(2q ),
is constructed by M columns of the 2q × 2q recursive Golden
Hadamard precoding matrices:
1 θG WG (2q−1 )
θG WG (2q−1 )
, (11)
WG (2q ) = √
−1
q−1
q−1
ξ θG WG (2 ) θG (θG − θG )WG (2 )
for 2 ≤ qNT in [10], where W(1) = [1], ξ = n{(1 + n)q −
(1 − n)q }/2q , n indicates the root of the geometric number,
MD. ABDUL LATIF SARKER, CHONBUK NATIONAL UNIVERSITY, KOREA
−1
θG is the Golden number in [11] that satisfies θG θG
= 1,
−1
(θG − θG ) = −1, and its continuous geometric proportion
is θG : 1 : 1/θG , which indicates that the geometric mean
between θG and 1/θG is unity. Thus, we incorporate (11)
in(5)and construct the remaining Hadamard-based Golden
precoding (GP) matrices as follows:
WG,i (2q ) = (−1)i−1 WG,1 (2q ), i = 2, ..., L,
(13)
−1
where (θG
− θGr ) = −1 , WGr ,2 (4) = (−1)WGr ,1 (4), and
r
1 1 1 1
θG 1 −1 1 −1
(14)
WGr ,1 (4) = √ r
.
5 1 1 −1 −1
1 −1 −1 1
Case II (Complex Golden Number): Let θGc √
be the realj+ 3
2
valued root of µθGc (X) = X −jX −1; θGc = 2 is known
as the complex Golden
√ number, and its algebraic conjugate is
¯ = j− 3 . Similarly, we incorporate i = 3, q =
obtained√as θG
c
2
2, n = 3, and θGc values in (11-12) to obtain the 4 × 4
complex Golden Hadamard matrices as
WGc ,3 (4) = (−j)2 WGc ,2 (4), i = 2, ..., L,
(15)
−1
(θG
c
− θGc ) = −j , WGc ,2 (4) = (−j)WGc ,1 (4), and
1 1 1 1
θG 1 −1 1 −1
WGc ,1 (4) = √ c
(16)
.
3 1 1 −1 −1
1 −1 −1 1
Thus, we observe that (14) and (16) are the exact real and
complex Golden Hadamard matrix, respectively. Finally, our
designed GPC matrices are given by
where
(2q )},f or−case I,
{(−1)i−1 W
,i
FG = {(−j)i−1 WGG,ir(2
q )},f or−case II,
c
1.5
1.2
1
1
0.8
0.5
0.6
0
0.4
0.2
-0.5
0
(12)
where WG,1 (2q ) is an NT × M Hadamard-based first Golden
precoding matrix. Now, we state Theorem 1 as follows.
Theorem 1: The DPA codeword generator X becomes
distortion-free if the precoding matrix WG (2q ) is a Golden
Hadamard.
Proof of Theorem 1:
A. Golden Hadamard Precoding
Case I (Real Golden Number): We consider that θGr is
√ the
real-valued root of µθGr (X) = X 2 − X − 1; θGr = 1+2 5 is
known as the real Golden number [7,11], and its algebraic
√
¯ = 1 − θG = 1− 5 . We
conjugate is obtained as θG
r
r
2
√
incorporate i = 3, q = 2, n = 5, and θGr values in (1112) to obtain the 4 × 4 real Golden Hadamard matrices as
WGr ,3 (4) = (−1)2 WGr ,2 (4), i = 2, ..., L,
3
(17)
where i=1,2,...,L-1.
B. Distortion-free DPA Generator
Matrix: Let i = 3, q =
√
2, NT = 4, M = 2, and n = 5. Then, by substituting (14) in
(7), we obtain the 4 × 2 GPA third codeword generator matrix
by using case I as
0.0000 + 0.0000i 1.0233 − 1.0233i
1.0233 + 1.0233i 0.0000 + 0.0000i
[X3 ] =
(18)
,
0.0000 + 0.0000i 1.0233 − 1.0233i
1.0233 + 1.0233i 0.0000 + 0.0000i
-1
-0.2
-1.5
-0.4
0
0.2
0.4
0.6
0.8
1
1.2
(a) Case I
0
0.2
0.4
0.6
0.8
1
1.2
(b) Case II
Fig. 2: Distortion-free GPA scheme: (a) case I (18) and (b)
case II (19).
where s11 = 0.7071 + 0.7071i and s21 = −0.7071 − 0.7071i.
Similarly, by substituting (16) in (7), we obtain the 4 × 2 GPA
third codeword generator matrix by using case II as
0.0000 + 0.0000i 1.1153 − 0.2988i
0.2988 + 1.1153i 0.0000 + 0.0000i
[X3 ] =
(19)
.
0.0000 + 0.0000i 1.1153 − 0.2988i
0.2988 + 1.1153i 0.0000 + 0.0000i
Using (18) and (19), we draw Fig. 2 against Fig. 1 and observe that the proposed GPA scheme is completely distortionfree. Thus, Theorem 1 is proved.
V. PAIRWISE E RROR P ROBABILITY (PEP)
Let Si and Sj be the transmitted and decoded space-time
codewords, respectively, where j 6= i. Thus, the codeword PEP
is Pr (Si − Sj |H), where h is the given channel and WG,i (2q )
is the precoding matrix. An upper bound of the total PEP can
be given via the union bound in [12, Sec 5.2], and the average
error rate [13, Eq.4.2.2] is upper bounded by
1 X X
Pr,tot ≤
Pr (Si −→ Sj ) ,
(20)
|χ|
Si χ Sj χ,j6=i
where | χ | is the number of elements in the matrix constellation χ. The PEP depends upon the product distance S̄S̄H ,
where the error matrix S̄ = Si − Sj for the STBC scheme and
(·)H represents the Hermitian. The upper bound of the PEP is
!
r
γ0 kHWG,i (2q )S̄k2F
Pr (Si −→ Sj |H) = Q
2 · 2q
!
r
γ0 kHWG,i (2q )S̄k2F
≤ exp
, (21)
4 · 2q
where γ0 is the signal-to-noise ratio (SNR)and Q(·) is the
Gaussian Q-function. Thus, the proposed performance measures of the packing minimum chordal distance for both real
and complex cases are as follows:
δmin,Gr = min2≤i≤L d WGr ,1 (2q ), (−1)i−1 WGr ,1 (2q ) , (22)
and
δmin,Gc = min2≤i≤L d WGc ,1 (2q ), (−j)i−1 WGc ,1 (2q ) . (23)
MD. ABDUL LATIF SARKER, CHONBUK NATIONAL UNIVERSITY, KOREA
4
TABLE I: Computation of Minimum Chordal Distance
0
10
Minimum chordal distance (δmin )
when i = 2, q = 2, NT = 4, and M = 2
−1
10
Proposed GPC Scheme
Case I(22)
Case II(23)
DPC Scheme(10)
DPA(64−QAM)[3,5−6]
Proposed GPAc(64−QAM)
Proposed GPAr(64−QAM)
−2
10
1.0000
1.0000
BER
0.8392
−3
10
0
10
−4
DPA(16−QAM)[3,5−6]
Proposed GPAc(16−QAM)
Proposed GPAr(16−QAM)
10
−5
10
−1
10
−6
BER
10
−2
0
5
10
15
SNR[dB]
20
25
30
10
Fig. 4: BER performance of GPA scheme against DPA with
64-QAM, when q = 2, NT = 4,M = 2,L = 64, and γ =
30dBs.
−3
10
−4
10
0
5
10
SNR[dB]
15
20
Fig. 3: BER performance of GPA scheme against DPA with
16-QAM, when q = 2, NT = 4,M = 2,L = 64, and γ =
20dBs.
VI. S IMULATION R ESULTS
We compare our designed GPC scheme in (17) with the
conventional DPA scheme in (4) for a MISO flat block
fading Rayleigh channel. Our designed GPC matrix leads to
the minimal chordal distance δmin,G = 1 = sin(900 ); in
comparison, the minimal chordal distance of the DPC matrix
is δmin,D = 0.8392 = sin(57.050 ) in Table I. Thus, the
resulting GPC provides distortion-free performance, as shown
in Fig. 3 and Fig. 4. We apply two different codebook schemes,
16-QAM and 64-QAM, at SNR values of 20 and 30 dB,
respectively. In both the low- and high-SNR regimes, in Case I
(the real case), the GPA scheme performs significantly better
than DPA. In contrast, in Case II (the complex case), the
performance of the GPA scheme is lower because of the
reduction of the Golden ratio. However, the average array
gains of both the real (Case I) and complex (Case II)
GPA schemes are increased by almost 1.0 ∼ 3.0 dB with
log2 L = log2 26 = 6-bit feedback.
VII. C ONCLUSIONS
We investigated the problem of geometric mean distortion
of the DPA scheme due to the error exponential of the DP
matrix and proposed the GPC approach, which is achieved
with a distortion-free codeword. We addressed the problem
of the packing minimum chordal distance and demonstrated
the distortion-free performance of our proposed GPA scheme.
We may further deal with the presented results in multiuser
systems. In future work, we will investigate multi-layer GPC
scheme to further improve the sum-rate performance.
R EFERENCES
[1] S. M. Alamouti, A Simple Transmit Diversity Scheme for Wireless
Communication, IEEE J. Sel. Areas Commun., vol. 16, no. 8, pp. 14511458, Oct. 1998.
[2] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, Space-time Block Codes
from Orthogonal Designs, IEEE Trans. Inf. Theory, vol. 45, no. 5, pp.
1456-1467, Jul. 1999.
[3] D. J. Love and R. W. Heath, Limited Feedback Unitary Precoding for
Orthogonal Space-time Block Codes, IEEE Trans. Signal Process., vol.
53, no. 1, pp. 64-73, Jan. 2005.
[4] M. Vu and A. Paulraj, Optimal Linear Precoders for MIMO Wireless
Correlated Channels with Non-zero Mean in Space-time Coded Systems,
IEEE Trans. Signal Process., vol. 54, no. 6, pp. 2318-2332, Jun. 2006.
[5] B. M. Hochwald, T. L. Marzetta, T. J. Richardson, W. Sweldens, and
R. Urbanke, Systematic Design of Unitary Space-time Constellations,
IEEE Trans. Inf. Theory, vol. 46, pp. 1962-1973, Sep. 2000.
[6] H. Hai, X. Q. Jiang, Y. Jeong and M. H. Lee, Low complexity Precoding
Codebook Design Based on DFRST for Limited Feedback Precoded
OSTBCs System, EURASHIP J. Wireless Commun. Netw., vol. 103,
pp. 1-6, Jun 2017.
[7] J. C. Belfiore, G. Rekaya, and E. Viterbo, The Golden Code: A 2 ×
2 Full-rate Space-time Code with Nonvanishing Determinants, IEEE
Trans. Inf. Theory, vol. 51, no. 4, pp. 1432-1436, Apr. 2005.
[8] A. Garg, V. Venu, and M. R. Bhatnagar, One Bit Feedback Based
Diagonal Precoding for Non-Orthogonal Space-Time Block Codes, IEEE
Wireless Commun. Lett., vol. 5. no. 5, Oct. 2015.
[9] D. J. Love, R. W. Heath, and T. Strohmer, Grassmannian Beamforming
for Multiple-Input Multiple-Output Wireless Systems, IEEE Trans. Inf.
Theory, vol. 49, no. 10, pp.2735-2747, Oct. 2003.
[10] H. Seleem, I.S. Ahmed, and A. Alsanie, Hybrid Precoding-Beamforming
Design with Hadamard RF Codebook for mmWave Large-Scale MIMO
Systems, IEEE Access, vol. 5, pp. 6813-6823, June 2017.
[11] S. Olsen,The Golden Section, Bloomsbury, New York, USA, 2006.
[12] J. G. Proakis, Digital Communications, 4/E, McGraw-Hill, New York,
USA, 2001.
[13] E. G. Larsson and P. Stoica, Space-Time Block Coding for Wireless
Communications, Cambridge University Press, Cambridge, UK, 2003.
| 7cs.IT
|
arXiv:1502.04365v3 [math.LO] 20 Dec 2017
Definably amenable NIP groups
Artem Chernikov∗†and Pierre Simon∗‡
December 21, 2017
Abstract
We study definably amenable NIP groups. We develop a theory of
generics showing that various definitions considered previously coincide, and study invariant measures. As applications, we characterize
ergodic measures, give a proof of the conjecture of Petrykowski connecting existence of bounded orbits with definable amenability in the
NIP case, and prove the Ellis group conjecture of Newelski and Pillay
connecting the model-theoretic connected component of an NIP group
with the ideal subgroup of its Ellis enveloping semigroup.
1
Introduction
In the same way as algebraic or Lie groups are important in algebraic or
differential geometry, the understanding of groups definable in a given firstorder structure (or in certain classes of first-order structures) is important
for model theory, as well as its applications. On the one hand, even if one
is only interested in abstract classification of first-order structures (i.e. in
understanding combinatorial complexity of definable sets), unavoidably one
is forced to study definable groups. (This realization probably started with
∗
The research leading to this paper has been partially supported by the European Research Council under the European Union’s Seventh Framework Programme (FP7/20072013)/ERC Grant Agreement No. 291111 and by ValCoMo (ANR-13-BS01-0006).
†
Partially supported by the Fondation Sciences Mathematiques de Paris (ANR-10LABX-0098), by NSF (grants DMS-1600796 and DMS-1651321) and by the Sloan foundation
‡
Partially supported by NSF (grant DMS-1665491), and by the Sloan foundation.
1
Zilber’s work on totally categorical structures [Zil], and later it was made
clear by Hrushovski’s theorem on unidimensional theories [Hru90].) On the
other hand, some of the most striking applications of model theory are based
on a detailed understanding of definable groups in certain structures. The
class of stable groups is at the core of model theory, and the corresponding theory was developed in the 1970s-1980s borrowing many ideas from the
study of algebraic groups over algebraically closed fields (with corresponding
notions of connected components, stabilizers, generics, etc., see e.g. [Poi01]).
In particular, this general theory was applied to groups definable in differentially closed and separably closed fields, and was used by Hrushovski to
prove the Mordell-Lang conjecture for function fields [Hru96] . The theory of
stable groups was generalized in the 90s to groups definable in a larger class
of simple theories, centered around the model-theoretic notion of forking
(see [Wag00]) and led to a number of results including Hrushovski’s proof
of the Manin-Mumford conjecture [Hru01] and other applications to algebraic dynamics (e.g. [MS14]). More recently, inspired by the ideas of stable
and simple group theory, Hrushovski has obtained a general stabilizer-type
theorem and found striking applications to approximate subgroups [Hru12],
which led to a complete classification by Breuillard, Green and Tao [BGT12].
On the other hand, groups definable in o-minimal structures were studied extensively, generalizing the theory of real Lie groups. This study culminated
in a recent resolution of Pillay’s conjecture for compact o-minimal groups
[HPP08], and the proof has brought to light the importance of the general
theory of groups definable in NIP structures (a common generalization of
stable and o-minimal structures, see below) and the study of invariant measures on definable subsets of the group. In parallel, methods and objects of
topological dynamics were introduced into the picture by Newelski [New09]
and gave rise to some new invariants coming from topological dynamics and
conjectures concerning their relationship to the more familiar model-theoretic
invariants. This circle of ideas has rapidly become a very active research area.
The present paper contributes to this direction and, continuing the work in
[HPP08], develops the theory of groups definable in NIP structures which
admit a translation invariant probability measure on the boolean algebra of
definable subsets.
The NIP condition (the negation of the Independence Property) is a combinatorial tameness assumption on a first-order structure M which says, in
modern terms, that if D ⊆ Mm+n is a definable set, then the family {D(a),
a ∈ Mm } of its fibers has finite VC-dimension (see Section 2.1). Roughly
2
speaking, it says that the collection of definable subsets of M is very structured. One can think of NIP as capturing the notion of a geometric structure — as opposed to say arithmetic or random-like — and of NIP groups
as groups arising in geometric settings. This condition was introduced by
Shelah [She71], and the connection to VC-dimension was discovered later in
[Las92]. In the past ten or fifteen years, the role of NIP theories has grown to
become a central notion in model theory thanks to applications to o-minimal
structures, valued fields and combinatorics (see e.g. [Sim15a] or [Sta16] for
a survey). Typical examples of NIP structures are given by stable structures
(such as algebraically closed fields), o-minimal structures (such as real closed
fields) and many Henselian valued fields. On the other hand, an ultraproduct of finite fields is an example of a structure which is not NIP, essentially
because of arithmetic phenomena that enter the picture.
Let now G be a group definable in an NIP structure M (i.e. both the
underlying set and multiplication are definable by formulas with parameters
in M). Such a group comes equipped with a collection of definable subsets of
cartesian powers of G which is closed under boolean combinations, projection
and cartesian products. For example, if M = (R, +, ×, 0, 1) is the field of
reals, then G is a real semi-algebraic group and definable sets are all semialgebraic subsets. As it is typical in model theory, we prefer to work in
a saturated model of our group (which in the case of an algebraic group
corresponds to working in the universal domain in the sense of Weil). More
precisely, let U M be a sufficiently saturated and homogeneous elementary
extension of M, a “monster model” for the first-order theory of M. We write
G(U) to denote the group obtained by evaluating in U the formulas used to
define G in M (and G(M) will refer to the set of the M-points of G). So
e.g. if we start with M the field of reals, and G(M) its additive group, then
G(U) is the additive group of a large real closed field extending R which
now contains infinitesimals, infinitesimals relatively to those infinitesimals,
etc. — i.e., it satisfies a saturation condition: every small enough finitely
consistent family of definable sets has non-empty intersection.
It was shown by Shelah [She08] that any NIP group G(U) admits a unique
maximal compact quotient denoted G/G00 , which plays an important role in
this theory and for which we will give a dynamical interpretation below.
Our goal in this paper is to adapt techniques from stable group theory to
the NIP context in order to have tools at our disposal potentially as useful as
those for stable groups. However, one main difference with the stable case is
that we cannot deal with all groups any more. As we show, to have any hope
3
of having well-behaved notions of generic types and large subsets, the group
must be definably amenable (this strengthens results of Hrushovski, Peterzil
and Pillay [HP11] who first observed this).
We say that a definable group G is definably amenable if there is a finitelyadditive probability measure on the boolean algebra of definable subsets of G
which is moreover invariant under the group action (this property holds for
G(U) if and only if it holds for G(M), see the remark after Definition 3.1).
This notion has been introduced and studied in [HPP08] and [HP11]. The
emphasis in those papers is on the special case of the so-called fsg groups,
which will not be relevant to us here. Of course, if G(M) is amenable as a
discrete group, then it is definably amenable since we have such a measure
on all subsets, not just the definable ones, but the converse need not hold
(e.g. deep work of Sela [Sel13] demonstrates that any non-commutative free
group, viewed as a first-order structure in the group language, is stable,
hence definably amenable; but of course it is not amenable). Here are some
important examples of definably amenable NIP groups:
• stable groups;
• definable compact groups in o-minimal theories or in p-adics (e.g.
SO3 (R));
• solvable NIP groups, or more generally, any NIP group G such that
G(M) is amenable as a discrete group.
Examples of definable NIP groups which are not definably amenable are
SL2(R) or SL2 (Qp ) (see [HPP08]).
It is classical in topological dynamics to consider the action of a discrete
group G on the compact space of ultrafilters on G, or in other words ultrafilters on the boolean algebra of all subsets of G. In the definable setting, given
a definable group G(M), we let SG (M) denote the space of ultrafilters on the
boolean algebra of definable subsets of G(M), hence the space SG (M) (called
the space of types of G(M)) is a “tame” analogue of the Stone-Čech compactification of the discrete group G. Then G(M) acts on SG (M) by homeomorphisms. The same construction applies to G(U) giving the space SG (U)
of ultrafilters on the definable subsets of G(U). Our main object of study
in this paper are the dynamical systems (SG (M), G(M)) and (SG (U), G(U))
and related objects. In this context, we classify regular ergodic measures
and show in particular that minimal flows are uniquely ergodic. We also
give various characterizations of definable subsets of G which have positive
measure for some (resp. for all) invariant measures, connecting topological
dynamics of the system with Shelah’s model-theoretic notion of forking.
4
A starting point of this theory is a theorem of Shelah stating that any
NIP group G(U) admits a maximal compact quotient G/G00 (the kernel G00
is characterized as the smallest subgroup of G(U) which is an intersection
of definable subsets and has small index in G(U)). We give a dynamical
interpretation of this compact quotient by establishing an isomorphism between the ideal subgroup of the Ellis semigroup of a certain extension of
(SG (M), G(M)) and G/G00 . Those results settle several questions in the
area.
Now we state the main results more precisely. In the case of stable groups,
a natural notion of a generic set (or type) was given by Poizat (generalizing
the notion of a generic point in an algebraic group), and a very satisfactory
theory of such generics was developed in [Poi87]. In a non-stable group,
however, generic types need not exist, and several substitutes were suggested
in the literature, either motivated by the theory of forking as in simple groups
([HPP08, HP11]), or by topological dynamics ([NP06]). First we show that
in a definably amenable NIP group all these notions coincide, and that in
fact nice behaviour of these notions characterizes definable amenability.
Theorem 1.1. Let G = G(U) be a definable NIP group, with U a sufficiently
saturated model. Then the following are equivalent:
1. G is definably amenable (i.e. admits a G-invariant measure on its
definable subsets).
2. The action of G on SG (U) admits a small orbit.
The proof is contained in Theorem 3.12. It confirms a conjecture of
Petrykowski in the case of NIP groups [New12, Conjecture 0.1] and solves
Conjecture 4.13 of [CP12].
Theorem 1.2. Let G = G(U) be a definably amenable NIP group. Then the
following are equivalent for a definable set φ(x):
1. φ(x) does not G-divide (i.e. there is no infinite sequence (gi )i<ω of
elements of G and natural number k such that any k sets in {gi φ(x)}i<ω
have empty intersection, see Definition 3.2);
2. φ(x) is weakly generic (i.e. there is some non-generic ψ(x) such that
φ(x) ∨ ψ(x) is generic, see Definition 3.28);
5
3. µ(φ(x)) > 0 for some G-invariant measure µ;
4. φ(x) is f-generic (meaning that for any small model M over which
φ(x) is defined, no G-translate of φ(x) forks over M, see Definition
3.2);
Moreover, for a global type p ∈ SG (U) the following are equivalent:
1. p is f-generic (i.e. every formula in p is f-generic);
2. p has a small G-orbit;
3. Stab(p) = G00 .
This is given by Theorem 3.35 and Proposition 3.8, and combined with
Theorem 1.1 solves in particular [CP12, Problem 4.13].
We continue by studying the space of G-invariant measures using VCtheory, culminating with a characterization of regular ergodic measures (Section 4) and unique ergodicity (Section 3.4). Generalizing slightly a construction from [HP11], we associate to every generic type p ∈ SG (U) a measure µp ,
which is a lifting of the Haar measure on the compact group G/G00 via p (see
Definition 3.16). It follows from Theorem 1.2 that the supports of the measures µp are exactly the minimal subflows of (SG (U), G(U)) (see Proposition
3.31).
Theorem 1.3. Let G = G(U) be a definably amenable, NIP group. Then
regular ergodic measures on SG (U) are precisely the measures of the form
µp , for p an f-generic type in SG (U). If two such measures have the same
support, then they are equal (i.e., minimal subflows of (SG (U), G(U)) are
uniquely ergodic).
The first statement is Theorem 4.5 and the second follows from Proposition 3.24. The following is Theorem 3.36.
Theorem 1.4. Let G = G(U) be a definably amenable, NIP group. Then
G has a unique invariant measure if and only if it admits a unique minimal
subflow if and only if it admits a global generic type. Moreover, in such a
group all the notions in Theorem 1.2 coincide with “φ(x) is generic”, and in
the moreover part we can add “p is almost periodic”.
6
Next we study enveloping semigroups. This notion from topological dynamics (see [Gla07a]) was introduced in model theory by Newelski [New09].
He observed that it behaved better when one replaced the dynamical system
(SG (M), G(M)) with an extension of it: The set G(M) embeds into SG (U)
as realized types and we let SG (Mext ) be its closure. Then G(M) acts on
SG (Mext ) and this flow admits SG (M) as a factor. We consider the enveloping semigroup E of the dynamical system (SG (Mext ), G(M)). In view of the
results in [CPS14], E can be identified with (SG (Mext ), ·), where · is a naturally defined operation extending multiplication on G(M) (see Section 5.3
for details).
Fix a minimal flow M in (SG (Mext ), G(M)) (i.e. a closed G(M)-invariant
set), and an idempotent u ∈ M. Then general theory of Ellis semigroups implies that uM is a subgroup of E, which we call the Ellis group. The canonical
surjective homomorphism G → G/G00 factors naturally through the space
SG (Mext ), so we have a well-defined continuous surjection π : SG (Mext ) →
G/G00 , tp(g/M) 7→ gG00 , and the restriction of π to the group uM is a
surjective homomorphism. Newelski asked if under certain model-theoretic
assumptions this map could be shown to be an isomorphism. Pillay later
formulated a precise conjecture which we are able to prove here.
Theorem 1.5 (Ellis group conjecture). Let G be definably amenable and
NIP. Then π : uM → G/G00 is an isomorphism.
In particular, this demonstrates that the Ellis group is indeed a model
theoretic object, i.e. it only depends on the first-order theory of the group
and does not depend on the choice of a small model M over which it is
computed. Some special cases of the conjecture were previously known (see
[CPS14]). For the proof, we establish a form of generic compact domination
for minimal flows in definably amenable groups with respect to the Baire
ideal — Theorem 5.3.
Remark 1.6. We remark that the study of NIP definably amenable groups
can be thought of as a model-theoretic version of tame dynamics as studied
by Glasner, Megrelishvili and others, see [Gla07b] (in fact, we discovered
the connection only after having essentially completed this work). The NIP
assumption implies that the dynamical system (SG (M), G(M)) is tame—
and even null—in the sense of [Gla07b], [KL07], but it is not equivalent to
it. Nullness of this system is equivalent to the fact that the definable family
of translates of any given definable set has finite VC-dimension (see [KL07,
7
Proposition 5.4(2)]), whereas the NIP condition implies that any uniformly
defined family of sets has finite VC-dimension.
Acknowledgements
We are grateful to the referees for pointing out a mistake in the previous
version of the article (see Question 3.18) and for other numerous suggestions
on improving the presentation.
2
Preliminaries
In this section we summarize some of the context for our results including the
theory of forking and groups in NIP, along with some general results about
families of sets of finite VC-dimension.
2.1
Combinatorics of VC-families
Let X be a set, finite or infinite, and let F be a family of subsets of X. Given
A ⊆ X, we say that it is shattered by F if for every A ′ ⊆ A there is some
S ∈ F such that A ∩ S = A ′. A family F is said to have finite VC-dimension
if there is some n < ω such that no subset of X of size n is shattered by
F. If this is the case, we let VC(F) be the largest integer n such that some
subset of X of size n is shattered by it.
If S ⊆ X is a subset and x1 , . . . , xn ∈ X, we let Av(x1 , . . . , xn ; S) =
1
|{i
≤ n : xi ∈ S}|. Similarly, if (ti )i<n is a set of truth values, we let
n
Av(ti ) = n1 |{i < n : ti = True}.
Later in the paper, we will often write a ≈ǫ b for |a − b| ≤ ǫ.
A fundamental fact about families of finite VC-dimension is the following
uniform version of the weak law of large numbers ([VC71], see also [HP11,
Section 4] for a discussion).
Fact 2.1. For any k > 0 and ε > 0 there is N < ω satisfying the following.
Let (X, µ) be a probability space, and let F be a family of subsets of X of
VC-dimension ≤ k such that:
1. every set from F is measurable;
8
2. for each n, the function fn : Xn → [0, 1] given by
(x1 , . . . , xn ) 7→ sup | Av(x1 , . . . , xn ; S) − µ(S)|
S∈F
is measurable;
3. for each n, the function gn : X2n → [0, 1]
(x1 , . . . , xn , y1, . . . , yn ) 7→ sup | Av(x1 , . . . , xn ; S) − Av(y1 , . . . , yn ; S)|
S∈F
is measurable.
Then there is some tuple (x1 , . . . , xN ) ∈ XN such that for any S ∈ F we have
|µ(S) − Av(x1 , . . . , xN ; S)| ≤ ε.
The assumptions (2) and (3) are necessary in general (but follow from (1)
if the family F is countable).
Another fundamental fact about VC-families that we will need is the
following theorem about transversal sets due to Matousek. It uses the following definition: a family G of subsets of some set X has the (p, k)- property
if among any p sets in G, some k have non-empty intersection.
Fact 2.2 ([Mat04]). Let F be a family of subsets of some set X. Assume that
F has finite VC-dimension. Then there is some k < ω such that for every
p ≥ k, there is an integer N such that: for every finite subfamily G ⊆ F, if G
has the (p, k)-property, then there is an N-point set intersecting all members
of G.
2.2
Forking in NIP theories
We will use standard notation. We work with a complete theory T in a
language L. We fix a monster model U |= T which is κ-saturated and κstrongly homogeneous for κ a sufficiently large strong limit cardinal.
Recall that a formula φ(x, y) is NIP if the family of subsets {φ(x, a) :
a ∈ U} has finite VC-dimension. The theory T is NIP if all formulas are
NIP. In this paper, we always assume that T is NIP unless explicitly stated
otherwise.
We summarize some facts about forking in NIP theories. Recall that a
set A is an extension base if every type p ∈ S(A) has a global extension
9
non-forking over A. In particular, any model of an arbitrary theory is an
extension base, and every set is an extension base in o-minimal theories,
algebraically closed valued fields or p-adics.
Definition 2.3 ([CK12]).
1. A global type q ∈ S(U) is strictly non-forking
over a small model M if q does not fork over M, and for every B ⊇ M
and a |= q|B , tp(B/aM) does not fork over M.
2. Given q ∈ S(M), we say that (bi : i < κ) is a strict Morley sequence in
q if there is some global extension q ′ ∈ S(U) of q strictly non-forking
over M satisfying bi |= q ′ |Mb<i for all i < κ.
Fact 2.4 ([CK12]). Assume that T is NIP and let A be an extension base.
1. A formula φ(x, a) ∈ L(U) forks over A if and only if it divides over A,
i.e., the set of formulas dividing over A forms an ideal.
2. Every q(y) ∈ S(M) admits a global extension strictly non-forking over
M.
3. Assume that φ(x, b) ∈ L(U) forks (equivalently, divides) over M, and
let (bi : i < κ) in U be an infinite strict Morley sequence in tp(b/M).
Then {φ(x, bi ) : i < κ} is inconsistent.
From now on, we will freely use the equivalence of forking and dividing
over models in NIP theories.
Fact 2.5. (See e.g. [HP11, Proposition].) Assume that T is NIP and M |= T .
A global type p(x) does not fork (equivalently, does not divide) over M if and
only if it is M-invariant. This is, for every φ(x, a) and a ′ ≡M a, we have
p ⊢ φ(x, a) ⇔ p ⊢ φ(x, a ′ ).
Remark 2.6. In particular, in view of Fact 2.4, if π(x) is a partial type that
does not divide over M (e.g. if π(x) is M-invariant), then it extends to a
global M-invariant type.
Let now p(x), q(y) be global types invariant over M. For any set D ⊇ M,
let b |= q|D , a |= p|Db . Then by invariance of p and q, the type tp(ab/D)
does not S
depend on the choice of a, b. Call this type (p ⊗ q)D , and let
p ⊗ q = {(p ⊗ q)D : M ⊆ D ⊆ U small}. Then (p ⊗ q)(x, y) is a welldefined, global invariant type over M.
10
Let p(x) be a global type invariant over M. Then one defines
p(n) (x0 , . . . , xn−1 ) = p(xn−1 ) ⊗ · · · ⊗ p(x0 ),
[
p(ω) (x0 , x1 , . . .) =
p(n) (x0 , . . . , xn−1 ).
n<ω
For any small set D ⊇ M and (ai )i<ω |= p(ω) |D , the sequence (ai )i<ω is
indiscernible over D.
We now discuss Borel-definability. Let p(x) be a global M-invariant type,
pick a formula φ(x, y) ∈ L, and consider the set Sp,φ = {a ∈ U : φ(x, a) ∈ p}.
By invariance, this set is a union of types over M. In fact, it can be written as
a finite boolean combination
V of M-type-definable sets ([HP11]). Specifically,
let Altn (x0 , . . . , xn−1 ) = i<n−1 ¬ (φ(xi , y) ↔ φ(xi+1 , y)) and let An (y) and
Bn (y) be the type-definable subsets of U defined by
∃x0 . . . xn−1 p(n) |M (x0 , . . . , xn−1 ) ∧ Altn (x0 , . . . , xn−1 ) ∧ φ (xn−1 , y)
and
∃x0 . . . xn−1 p(n) |M (x0 , . . . , xn−1 ) ∧ Altn (x0 , . . . , xn−1 ) ∧ ¬φ (xn−1 , y)
respectively.
S
Then for some N < ω, Sp,φ = n<N (An ∧ ¬Bn+1 ).
Note that the set of all global M-invariant types is a closed subset of S(U).
We now consider the local situation. Let φ(x, y) ∈ L be a fixed formula
and let Sφ (U) be the space of all global φ-types (i.e., maximal consistent
collections of formulas of the form φ(x, b), ¬φ(x, b), b ∈ U). Let Invφ (M)
be the set of all global M-invariant φ-types—a closed subset of Sφ (U), which
we equip with the induced topology.
Fact 2.7 ([Sim15b]). Let M be a countable model and let φ(x, y) be NIP.
For any set Z ⊆ Invφ (M) and p ∈ Invφ (M), if p ∈ Z (i.e., in the topological
closure of Z), then p is the limit of a countable sequence of elements of Z.
2.3
Keisler measures
Now we introduce some terminology and basic results around the study of
measures in model theory. A Keisler measure µ(x) (or µx ) over a set of
parameters A is a finitely additive probability measure on the boolean algebra
11
Def x (A) of A-definable subsets of U in the variable x. Alternatively, a Keisler
measure µ(x) may be viewed as assigning a measure to the clopen basis of the
space of types Sx (U). A standard argument shows that it can be extended
in a unique way to a countably-additive regular probability measure on all
Borel subsets of Sx (U) (see e.g. [Sim15a, Chapter 7] for details). From now
on we will just say “measure” unless it could create some confusion.
For a measure µ over A we denote by S(µ) its support: the set of types
weakly random for µ, i.e., the closed set of all p ∈ S(A) such that for any
φ(x), φ(x) ∈ p implies µ(φ(x)) > 0.
Remark 2.8. Let Mx (A) denote the set of measures over A in variable x, it is
naturally equipped with a compact topology as a closed subset of [0, 1]Lx(A)
with the product topology. Every type over A can be identified with the
{0, 1}-measure concentrating on it, thus Sx (A) is identified with a closed subset of Mx (A).
The following implication of Fact 2.1 was observed in [HP11, Section 4].
Fact 2.9. Let T be NIP. Let µ(x) a measure over A, ∆ = {φi (x, yi )}i<m a
finite set of L-formulas, and ε > 0 be arbitrary. Then there are some types
p0 , . . . , pn−1 ∈ Sx (A) such that for every a ∈ A and φ (x, y) ∈ ∆, we have
|µ (φ (x, a)) − Av (p0 , . . . , pn−1 ; φ (x, a))| ≤ ε.
Furthermore, we may assume that pi ∈ S (µ), the support of µ, for all i < n.
Corollary 2.10. Let T be an NIP theory in a countable language L, and
let µ be a measure. Then the support S(µ) is separable (with respect to the
topology induced from S(U)).
Proof. By Fact 2.9, for any finite ∆ ⊆ L and k < ω, we can find some
p∆0 , . . . , p∆n∆ −1 ∈ S(µ) such that for any φ(x, y) ∈ ∆ and any a ∈ U we have
k
S
1
µ(φ(x, a)) ≈ k Av(p∆0 , . . . , p∆n∆−1 ; φ(x, a)). Let S0 = k<ω,∆⊆L finite {p∆i : i <
k
n∆k }. Then S0 is a countable subset of S(µ), and we claim that it is dense.
Let U be a non-empty open subset of S(µ). Then there is some formula
φ(x) ∈ L(U) such that ∅ =
6 φ(x) ∩ S(µ) ⊆ U. In particular µ(φ(x)) > 0,
hence for some k and ∆ large enough we have by the construction of S0 that
necessarily φ(x) ∈ p∆i for at least one i < n∆k .
A measure µ ∈ Mx (U) is non-forking over a small model M if for every
formula φ(x) ∈ L(U) with µ(φ(x)) > 0, φ(x) does not fork over M. A
12
theory of forking for measures in NIP generalizing the previous section from
types to measures is developed in [HP11, HPS13]. In particular, a global
measure non-forking over a small model M is in fact Aut(U/M)-invariant.
Moreover, using Fact 2.9 along with results in Section 2.2 one shows that a
global measure µ invariant over M is Borel definable over M, i.e., for any
φ(x, y) ∈ L the map fφ : Sy (M) → [0, 1], q 7→ µ(φ(x, b)), b |= q is Borel
(and it is well defined by M-invariance of µ). This allows to define a tensor
product of M-invariant measures: given µ ∈ Mx (U), ν ∈ My (U) M-invariant
and φ(x, y) ∈ L(U), let N ⊇ M be some
small model over which φ is defined.
R
We define µ ⊗ ν(φ(x, y)) by taking q∈Sy (N) fφ (q)dν ′ , where ν ′ = ν|N viewed
as a Borel measure on Sy (N). Then µ ⊗ ν is a global M-invariant measure.
We will need the following basic combinatorial fact about measures (see
[HPP08] or [Sim15a, Lemma 7.5]).
Fact 2.11. Let µ be a Keisler measure, φ(x, y) a formula and (bi )i<ω an
indiscernible sequence. Assume that for some ǫ > 0 we have µ(φ(x, bi )) ≥ ǫ
for every i < ω. Then the partial type {φ(x, bi ) : i < ω} is consistent.
2.4
Model-theoretic connected components
Now let G = G(U) be a definable group. Let A be a small subset of U. We
say that H ≤ G has bounded index if |G : H| is smaller than the saturation
of U, and define:
T
• G0A = {H ≤ G : H is A-definable, of finite index}.
T
• G00
{H ≤ G : H is type-definable over A, of bounded index}.
A =
T
• G∞
{H ≤ G : H is Aut (U/A)-invariant, of bounded index}.
A =
∞
Of course G0A ⊇ G00
A ⊇ GA for any A and these are all normal A-invariant
subgroups of G.
Fact 2.12 (see e.g. [Sim15a, Chapter 8] and references therein). Let T be
∞
∞
00
NIP. Then for every small set A we have G0A = G0∅ , G00
A = G∅ , GA = G∅ .
∞
|T |
Moreover, |G/G | ≤ 2 .
We will be omitting ∅ in the subscript and write for instance G00 for G00
∅ .
13
Remark 2.13. It follows that G∞ is equal to the subgroup of G generated by
the set {g−1 h : g ≡M h}, for any small model M.
Let π : G → G/G00 be the canonical projection map.
The quotient G/G00 can be equipped with a natural “logic” topology: a
set S ⊆ G/G00 is closed iff π−1 (S) is type-definable over some (equivalently,
any) small model M.
Fact 2.14 (see [Pil04]). The group G/G00 equipped with the logic topology is
a compact topological group.
Remark 2.15. If L is countable then G/G00 is a Polish space with respect to
the logic topology. Indeed, there is a countable model M such that every
closed set is a projection of a partial type over M, and {π(φ(U))c : φ(x) ∈
L(M)} is a countable basis of the topology.
In particular, G/G00 admits an invariant normalized Haar probability
measure h0 . Furthermore h0 is the unique left-G/G00 -invariant Borel probability measure on G/G00 (see e.g. [Hal50, Section 60]), as well as simultaneously the unique right-G/G00 -invariant Borel probability measure on G/G00 .
The usual completion procedure for a measure preserves G-invariance, so
we may take h0 to be complete.
3
3.1
Generic sets and measures
G-dividing, bounded orbits and definable amenability
Context: We work in an NIP theory T , and let G = G(U) be an ∅-definable
group.
We will consider G as acting on itself on the left. For any model M, this
action extends to an action of G(M) on the space SG (M) of types concentrating on G. Hence if p ∈ SG (M) and g ∈ G(M) we have g·p = tp(g·a/M)
where a |= p. The group G(M) also acts on M-definable subsets of G by
(g · φ)(x) = φ(g−1 · x) and on measures by (g · µ)(φ(x)) = µ(φ(g · x)).
One could also consider the right action of G on itself and obtain corresponding notions. Contrary to the theory of stable groups, this would not
yield equivalent definitions (see Section 6.1 for a discussion).
14
Definition 3.1. The group G is definably amenable if it admits a global
Keisler measure µ on definable subsets of G(U) which is invariant under
(left-) translation by elements of G(U).
As explained for example in [Sim15a, 8.2], if for some model M, there
is a G(M)-invariant Keisler measure on M-definable subsets of G, then G
is definably amenable (it can be seen by taking an elementary extension M
expanded by predicates for the invariant measure).
Definition 3.2.
1. Let φ(x) be a subset of G defined over some model
M. We say that φ(x) (left-)G-divides if there is an M-indiscernible
sequence (gi : i < ω) such that {gi · φ(x) : i < ω} is inconsistent.
2. The formula φ(x) is (left-)f-generic over M if no translate of φ(x)
forks over M. We say that φ(x) is f-generic if it is f-generic over some
small M. A (partial) type is f-generic if every formula implied by it is
f-generic.
3. A global type p is called (left-)strongly f-generic over M if no G(U)translate of p forks over M. A global type p is strongly f-generic if it
is strongly f-generic over some small model M.
Note that we change the usual terminology: our notion of strongly fgeneric corresponds to what was previously called f-generic in the literature
(see e.g. [HP11]). We feel that this change is justified by the development of
the theory presented here.
Note that if µ is a global G-invariant and M-invariant measure and p ∈
S(µ), then p is strongly f-generic over M since all its translates are weaklyrandom for µ. It is shown in [HP11] how to conversely obtain a measure µp
from a strongly f-generic type p. We summarize some of the results from
[HP11] in the following fact.
Recall that the stabilizer of p is StabG (p) = {g ∈ G : g · p = p}.
Fact 3.3.
1. If G admits a strongly f-generic type over some small model
M, then it admits a strongly f-generic type over any model M0 .
2. If p is strongly f-generic then StabG (p) = G00 = G∞ (= h{g−1h : g ≡M
h}i for any small model M).
3. The group G admits a G-invariant measure if and only if there is a
global strongly f-generic type in SG (U).
15
Our first task is to understand basic properties of f-generic formulas and
types.
Proposition 3.4. Let G be a definably amenable group, and let φ(x) ∈
LG (M). Let also p(x) ∈ SG (U) be strongly f-generic, M-invariant and take
g |= p|M . Then the following are equivalent:
1. φ(x) is f-generic over M;
2. φ(x) does not G-divide;
3. g−1 · φ(x) does not fork over M.
Proof. (2) ⇒ (1): Assume that some translate h · φ(x) forks over M. Then
it divides over M, and as φ(x) is over M, we obtain an M-indiscernible
sequence (hi : i < ω) such that {hi · φ(x) : i < ω} is inconsistent. This shows
that φ(x) G-divides.
(1) ⇒ (3): Clear.
(3) ⇒ (2): Assume that φ(x) does G-divide and let (gi : i < ω) be an Mindiscernible sequence witnessing it, i.e., {gi · φ(x) : i < ω} is k-inconsistent
for some k < ω. By indiscernibility, all of gi ’s are in the same G00 -coset, and
00
replacing gi by g−1
for all i.
0 gi+1 , we may assume that gi ∈ G
−1
Let h realize p over (gi )i<ω M. Then gi · h |= p|M by G00 -invariance of
p. As the set {gi · φ(x) : i < ω} is inconsistent, so is {h−1 gi · φ(x) : i < ω}.
Then the sequence (g−1
i · h : i < ω) is an M-indiscernible sequence in p|M =
tp(g/M) (as tp(h/(gi )i<ω M) is M-invariant). Therefore g−1 · φ(x) divides
over M.
Note that we do not say “G-divides over M”, because the model M does
not matter in the definition: for any M ≺ N, an M-definable φ(x) G-divides
over M if and only if it G-divides over N. Therefore the same is true for
f-genericity (i.e. if φ(x) is both M-definable and N-definable, then it is fgeneric over M if and only if it is f-generic over N) and from now on we will
just say f-generic, without specifying the base.
Corollary 3.5. Let G be definably amenable. The family of non-f-generic
formulas (equivalently, G-dividing formulas) forms an ideal. In particular,
every partial f-generic type extends to a global one.
Proof. Assume that φ(x), ψ(x) are not f-generic, and let M be some small
model over which both formulas are defined. Let also p be a global type
strongly f-generic over M (exists by Fact 3.3) and take g |= p|M . Then by
Fact 3.4(3) we have that both g−1 · φ(x), g−1 · ψ(x) fork over M, in which
16
case g−1 · (φ(x) ∨ ψ(x)) = g−1 · φ(x) ∨ g−1 · ψ(x) also forks over M. Applying
Fact 3.4(3) again it follows that φ(x) ∨ ψ(x) is not f-generic.
The “in particular” statement follows by compactness.
Lemma 3.6. Let G be definably amenable, let φ(x) ∈ LG (U) be a formula
and g ∈ G00 . Then φ(x)△g · φ(x) is not f-generic (and hence it G-divides
by Proposition 3.4).
Proof. Let M be a model over which φ(x) and g are defined. Let p ∈
SG (U) be a global strongly f-generic type which is M-invariant (exists by
Fact 3.3(1)) and let h realize p over Mg. Then h−1 · (φ(x)△g · φ(x)) =
(h−1 · φ(x))△(h−1 g · φ(x)). Since h ≡M g−1 h (as g−1 ∈ StabG (p) by Fact
3.3(2)), the latter formula cannot belong to any global M-invariant type,
and so it must fork over M by Remark 2.6. Hence φ(x)△g · φ(x) is not
f-generic.
Definition 3.7. A global type p(x) ∈ SG (U) has a bounded orbit if |G·p| < κ
for some strong limit cardinal κ such that U is κ-saturated.
Proposition 3.8. Let G be definably amenable. For p ∈ SG (U), the following
are equivalent:
1. p is f-generic,
2. p is G00 -invariant (and StabG (p) = G00 ),
3. p has a bounded orbit.
Proof. (1) ⇒ (2): If p is not G00 -invariant then φ(x)△gφ(x) ∈ p for some
g ∈ G00 , φ(x) ∈ LG (U), and so p is not f-generic by Lemma 3.6. Hence
G00 ⊆ StabG (p). Given an arbitrary a ∈ StabG (p), let M be a small model
containing a and let b |= p|M . Then a · b |= p|M , hence a = (a · b) · b−1 and
a · b ≡M b. By Fact 3.3(2) it follows that a ∈ G00 , hence StabG (p) = G00 .
(2) ⇒ (3): If p is G00 -invariant, then the size of its orbit is bounded by
the index of G00 (which is ≤ 2|T | ).
(3) ⇒ (1): If p is not f-generic, then some φ(x) ∈ p must G-divide (by
Proposition 3.4). Then, as in the proof of Proposition 3.4, we can find an
arbitrarily long indiscernible sequence (gi )i<λ in G00 such that {gi φ(x) : i < λ}
is k-inconsistent for some k < ω, which implies that the G-orbit of p is
unbounded.
17
Next we clarify the relationship between f-generic and strongly f-generic
types in definably amenable groups.
Proposition 3.9. Let G be definably amenable. A type p ∈ SG (U) is strongly
f-generic if and only if it is f-generic and M-invariant over some small model
M.
Proof. Strongly f-generic implies f-generic is clear.
Conversely, assume that p is M-invariant, but not strongly f-generic over
M. Then g · p divides over M for some g ∈ G. It follows that there is some
φ (x, a) ∈ p such that for any κ there is some M-indiscernible sequence
(gi^ai )i<κ with g0^a0 = g^a and such that {gi · φ (x, ai )}i<κ is k-inconsistent
for some k < ω. By M-invariance of p we have that φ (x, ai ) ∈ p, so
{gi · p (x)}i<κ is k-inconsistent. This implies that the orbit of p is unbounded,
and that p is not f-generic in view of Proposition 3.8.
Example 3.10. There are f-generic types which are not strongly f-generic.
Let R be a saturated model of RCF. We give an example of a G-invariant (and
so f-generic by Proposition 3.8) type in G = (R2 ; +) which is not invariant
over any small model (and so not strongly f-generic by Proposition 3.9).
Let p(x) ∈ S1 (R) denote the definable 1-type at +∞ and q(y) ∈ S1 (R) a
global 1-type which is not invariant over any small model (hence corresponds
to a cut of maximal cofinality from both sides). Then p and q are weakly
orthogonal types. Let (a, b) |= p × q (in some bigger model) and consider
r := tp(a, a + b/R). Then r ∈ SG (R) is a G-invariant type which is not
invariant over any small model.
The following lemma is standard.
Lemma 3.11. Let N ≻ M be |M|+ -saturated, and let p ∈ SG (N) be such
that g · p does not fork over M for every g ∈ G(N). Then p extends to a
global type strongly f-generic over M.
Proof. It is enough to show that
p(x) ∪ {¬(g · φ(x, a)) : g ∈ G(U), φ(x, a) ∈ L(U) forks over M}
W
is consistent. Assume not, then p(x) ⊢ i<n gi · φi (x, ai ) for some gi ∈ G(U),
φi (x, y) ∈ L and ai ∈ U such that φi (x, ai ) forks over M. By |M|+ -saturation
of N and compactness we can find some (gi′ , ai′)i<n ≡M (gi , ai )i<n in N such
18
W
that p(x) ⊢ i<n gi′ · φi (x, ai′), which implies that gi′ · φi (x, ai′) ∈ p for some
i < n, i.e., (gi′)−1 · p forks over M. But this contradicts the assumption on
p.
Finally for this subsection, we prove Theorem 1.1: for NIP groups, definable amenability is characterized by the existence of a type with a bounded
orbit, proving Petrykowski’s conjecture for NIP theories (see [New12, Conjecture 0.1]). In fact, existence of a measure with a bounded orbit is sufficient.
Theorem 3.12. Let T be NIP, U |= T and G = G(U) a definable group.
Then the following are equivalent:
1. G is definably amenable;
2. |G · p| ≤ 2|T | for some p ∈ SG (U);
3. some measure µ ∈ MG (U) has a bounded G-orbit.
Proof. (1) ⇒ (2): If G is definably amenable, then it has a strongly f-generic
type p ∈ SG (U) by Fact 3.3 and such a type is G00 -invariant. In particular
its orbit has size at most |G/G00 | ≤ 2|T | .
(2) ⇒ (3) is obvious.
(3) ⇒ (1): Assume that |Gµ| < κ, with κ strong limit and U is κsaturated. Let M be a model with |M| = |T |, let N0 ≻ M be an |M|+ saturated submodel of U of size 2|M| < κ (exists as κ is a strong limit cardinal),
and let (Ni )i<κ be a strict Morley sequence in tp (N0 /M) contained in U
(exists by κ-saturation of U and Fact 2.4(2)). In particular Ni is an |M|+ saturated extension of M for all i < κ.
Let µi = µ|Ni . It is enough to show that for some i < κ, the measure gµi
does not fork over M for any g ∈ G(Ni ), as then any type in the support of
µi extends to a global type strongly f-generic over M by Lemma 3.11, and
we can conclude by Fact 3.3.
Assume not, then for each i < κ we have some gi ∈ G (Ni ) and some
φi (x, ci ) ∈ L(Ni ) such that gi µi (φ(x, ci )) > 0 but φi (x, ci ) forks over M.
As the orbit of µ is bounded, by throwing away some i’s we may assume
that there is some g ∈ G such that gi µ = gµ for all i < κ, in particular
(gµ)|Ni = gi µi . By pigeonhole and the assumption on κ we may assume also
that there are some φ(x, y) ∈ L and ε > 0 such that φi (x, yi ) = φ(x, y)
and gµ(φ(x, ci)) > ε for all i < κ, and that the sequence (ci : i < κ) is
indiscernible (i.e. the ci ’s occupy the same place in the enumeration of Ni ,
19
for all i, and the sequence (Ni )i<κ is indiscernible by construction). Applying
Fact 2.11 to the measure gµ we conclude that {φ(x, ci ) : i < κ} is consistent.
But as (ci ) is a strict Morley sequence, this contradicts the assumption that
φ(x, ci ) divides over M for all i, in view of Fact 2.4(3).
Remark 3.13.
1. In the special case of types in o-minimal expansions of
real closed fields this was proved in [CP12, Corollary 4.12].
2. Theorem 3.12 also shows that the issues with absoluteness of the existence of a bounded orbit considered in [New12] do not arise when one
restricts to NIP groups.
3.2
3.2.1
Measures in definably amenable groups
Construction
Again, we are assuming throughout this section that G = G(U) is an NIP
group. We generalize the connection between G-invariant measures and
strongly f-generic types from Fact 3.3 to f-generic types in definably amenable
groups.
First we generalize Proposition 3.8 to measures.
Proposition 3.14. Let G be definably amenable, and let µ be a Keisler
measure on G. The following are equivalent:
1. The measure µ is f-generic, that is µ(φ(x)) > 0 implies φ(x) is fgeneric for all φ(x) ∈ LG (U).
2. All types in the support S(µ) are f-generic.
3. The measure µ is G00 -invariant.
4. The orbit of µ is bounded.
Proof. The equivalence of (1) and (2) is clear by compactness, (1) implies
(3) is immediate by Lemma 3.6, and (3) implies (4) as the size of the orbit
of a G00 -invariant measure is bounded by |G/G00 |.
(4) ⇒ (1): Assume that we have some G-dividing φ(x) with µ(φ(x)) >
ε > 0. As in the proof of Proposition 3.4, (3) ⇒ (2) we can find an arbitrarily
long indiscernible sequence (gi )i∈λ with gi ∈ G00 such that {gi φ(x)} is kinconsistent, for some fixed k < ω.
20
In view of Fact 2.11 for any fixed i < λ there can be only finitely many
j < λ such that gi µ(gj φ(x)) > ε. But gi µ(gjφ(x)) = g−1
j gi µ(φ(x)). This
implies that gi µ 6= gj µ for all but finitely many j < λ, which then implies
that the orbit of µ is unbounded.
In [HP11, Proposition 5.6] it is shown that one can lift the Haar measure
on G/G00 to a global G-invariant measure on all definable subsets of an NIP
group G using a strongly f-generic type. We point out that in a definably
amenable NIP group, an f-generic type works just as well. For this we need
a local version of the argument used there.
Fix a small model M, and let FM be the set of formulas of the form
g · φ (x) or ¬g · φ(x), for g ∈ G (U) , φ (x) ∈ LG (M).
Proposition 3.15. Let G be definably amenable, and let p be a maximal
finitely consistent set of formulas in FM . Then p is f-generic if and only if
g · p is M-invariant for every g ∈ G.
Proof. Notice that g·p(x) is also a set of formulas in FM . Assume that g·p (x)
is not M-invariant. Then gp ⊢ g0 φ (x) △g1 φ (x) for some φ (x) ∈ L (M)
−1
−1
00
(by Fact
and g0 ≡M g1 . Hence g−1
1 gp ⊢ g1 g0 φ(x)∆φ(x) and g1 g0 ∈ G
−1
3.3(2)). Then (g1 g0 )φ(x)△φ(x) is not f-generic by Lemma 3.6, and so p is
not f-generic — a contradiction.
Conversely, assume that some formula ψ(x) implied by p(x) is not fgeneric. Let N ⊇ M contain the parameters of ψ. Then there is some
(hi )i<ω indiscernible over N such that {hi ψ(x)}i<ω is k-inconsistent. Then
h0 ψ(x) ∈ h0 p, but hi ψ(x) ∈
/ h0 (p) for some i < ω. So h0 p is not Ninvariant, and thus also not M-invariant.
Definition 3.16. Let G = G(U) be definably amenable, and let p ∈ SG (U)
be f-generic. Keeping in mind that p (as well as all its translates) is G00 invariant (by Proposition 3.8), we define a measure µp on G by:
µp (φ(x)) = h0 ({ḡ ∈ G/G00 : φ(x) ∈ g · p}),
where h0 is the normalized Haar measure on the compact group G/G00 and
ḡ = g/G00 .
We have to check that this definition makes sense, that is that the set
we take the measure of is indeed measurable. Let M be a small model over
which φ(x) is defined. Let pM be the restriction of p to formulas from FM (as
21
defined above). By Proposition 3.15, pM is M-invariant. It follows that pM
extends to some complete M-invariant type (by Remark 2.6). Then we can
use Borel-definability of invariant types (applied to the family of all translates
of φ(x)) exactly as in [HP11, Proposition 5.6] to conclude.
Remark 3.17.
1. The measure µp that we just constructed is clearly Ginvariant and G00 -strongly invariant (that is, µp(φ(x)△g · φ(x)) = 0
for g ∈ G00 ). Besides µp = µgp for any g, p.
2. We have S(µp) ⊆ G · p. Indeed, if q ∈ S(µp) and φ(x) ∈ q arbitrary,
then µp (φ(x)) > 0, which by the definition of µp implies that g · p ⊢
φ(x) for some g ∈ G.
Question 3.18. 1 Let G = G(U) be an NIP group. Are the following two
properties equivalent?
1. G is definably amenable.
2. G admits a global f-generic type (equivalently, the family of all non-fgeneric subsets of G is an ideal).
3.2.2
Approximation lemmas
Throughout this section, G = G(U) is a definably amenable NIP group.
Given a G00 -invariant type p(x) ∈ SG (U) and a formula φ(x) ∈ LG (U), let
Aφ,p := {ḡ ∈ G/G00 : φ(x) ∈ ḡ · p}.
Note that Ag·φ,p = ḡ · Aφ,p and Aφ,g·p = Aφ,p · ḡ−1 , where ḡ is the image
of g in G/G00 .
Lemma 3.19. For a fixed formula φ(x, y), let Aφ ⊆ P(G/G00 ) be the family
of all Aφ(x,b),p where b varies over U and p varies over all f-generic types on
G. Then Aφ has finite VC-dimension.
Proof. Let ḡ0 , . . . , ḡn−1 be shattered by Aφ . Then for any I ⊆ n there is some
Aφ(x,bI ),pI which cuts out that subset. Take representatives g0 , . . . , gn−1 ∈ G
of the ḡi ’s. Let aI |= pI |g0 ,...,gn−1 bI , then we have φ(gi aI , bI) if and only if i ∈ I.
Hence the VC-dimension of Aφ is at most that of ψ(u; x, y) = φ(ux, y), so
finite by NIP.
1
We have claimed an affirmative answer in an earlier version of this article, however a
mistake in our argument was pointed out by the referees.
22
Replacing the formula φ(x; y) by φ ′ (x; y, u) := φ(u−1 · x; y), we may
assume that any translate of an instance of φ is again an instance of φ. Note
also that then for any parameters a, b we have
ḡ1 Aφ ′ (x;a,b),p ḡ2 = Ag1 φ ′ (x;a,b),g−1 p = Aφ ′ (x;a ′ ,b ′ ),g−1 p
2
2
for some a ′ , b ′. Using this and applying Lemma 3.19 to φ ′ (x; y, u), we get
the following corollary.
Corollary 3.20. For any φ(x, y) ∈ LG (U), the family
Fφ = {ḡ1 · Aφ(x,b),p · ḡ2 : ḡ1 , ḡ2 ∈ G/G00 , b ∈ U, p ∈ SG (U) f-generic}
has finite VC-dimension.
We would now like to apply the VC-theorem to Fφ . This requires verifying an additional technical hypothesis (assumptions (2) and (3) in Fact
2.1), which we are only able to show for certain (sufficiently representative)
subfamilies of Fφ .
Fix φ(x) ∈ LG (U) and let S be a set of global f-generic types. Let
Fφ,S := ḡ1 · Aφ(x),p · ḡ2 : ḡ1 , ḡ2 ∈ G/G00 , p ∈ S .
Lemma 3.21. If S is countable and L is countable, then Fφ,S satisfies all of
the assumptions of Fact 2.1 with respect to the measure h0 .
Proof. First of all, the family of sets Fφ,S has finite VC-dimension by Corollary 3.20 and the obvious inclusion Fφ,S ⊆ Fφ .
Next, (1) is satisfied by the assumption that S consists of f-generic types
and an argument as in the discussion after Definition 3.16 (using countability
of the language).
For a set S ′ of global f-generic types, let
fS ′ ,n (x0 , . . . , xn−1 ) := sup {| Av(x0 , . . . , xn−1 ; Y) − h0 (Y)|},
Y∈Fφ,S ′
gS ′ ,n (x0 , . . . , xn−1 , y0, . . . , yn−1 ) := sup {| Av(x0 , . . . , xn−1 ; Y)−
Y∈Fφ,S ′
− Av(y0 , . . . , yn−1 ; Y)|}.
For (2) and (3) we need to show that fS,n and gS,n are measurable for
all n < ω. Note that fS,n = supp∈S f{p},n and gS,n = supp∈S g{p},n . Since S is
23
countable, it is enough to show that for a fixed f-generic type p the functions
fn := f{p},n and gn := g{p},n are measurable.
Let A = Aφ,p . By G/G00 -invariance of h0 both on the left and on the
right, we have:
fn (x0 , . . . , xn−1 ) =
max
ḡ1 ,ḡ2 ∈G/G00
| Av(x0 , . . . , xn−1 ; ḡ1 · A · ḡ2 ) − h0 (A)|
and
gn (x0 , . . . , xn−1 , y0 , . . . , yn−1 ) =
max
ḡ1 ,ḡ2 ∈G/G00
| Av(x0 , . . . , xn−1 ; ḡ1 · A · ḡ2 )−
− Av(y0 , . . . , yn−1 ; ḡ1 · A · ḡ2 )|.
Then it is enough to show that for a fixed I ⊆ n, the set
AI = {(x0 , . . . , xn−1 ) ∈ (G/G00 )n : for some ḡ1 , ḡ2 ∈ G/G00 ,
xi ∈ ḡ1 · A · ḡ2 ⇐⇒ i ∈ I}
is measurable. But we can write AI as the projection of AI′ ⊆ (G/G00 )n+2
−1
where AI′ is the intersection of {(ḡ1 , ḡ2, x0 , . . . , xn−1 ) : ḡ−1
1 xi ḡ2 ∈ A} for i ∈ I
−1
−1
/ A} for i ∈
/ I. As group multiplication
and {(ḡ1 , ḡ2, x0 , . . . , xn−1 ) : ḡ1 xi ḡ2 ∈
is continuous and A is Borel, those sets are Borel as well. Hence AI is
analytic. Now G/G00 is a Polish space (as L is countable, by Remark 2.15)
and analytic subsets of Polish spaces are universally measurable (see e.g.
[Kec95, Theorem 29(7)]). In particular they are measurable with respect to
the complete Haar measure h0 .
The next lemma will allow us to reduce to a countable sublanguage.
Lemma 3.22. Let L0 be a sublanguage of L, T0 the L0 -reduct of T , G an L0 definable group definably amenable (in the sense of T ) and φ(x) a formula
from L0 (U). Let p ∈ SG (U) be a global L-type which is f-generic, and let
p0 = p|L0 .
1. In the sense of T0 , the group G is definably amenable NIP and p0 is an
f-generic type.
2. Let G00
L0 be the connected component computed in T0 , and let µp0 (µp )
be the G-invariant measure on L0 -definable (resp., L-definable) subsets
of G given by Definition 3.16 in T0 (resp., in T ). Then µp (φ(x)) =
µp0 (φ(x)).
24
Proof. (1) The first assertion is clear. Similarly, it is easy to see that if
ψ(x) ∈ L0 is G-dividing in T0 , then it is G-dividing in T (by extracting
an L-indiscernible sequence from an L0 indiscernible sequence). Then p0 is
f-generic by Fact 3.4 applied in T0 .
(2) Let A = {ḡ ∈ G/G00 : g · p ⊢ φ(x)} and A0 = {ḡ ∈ G/G00
L0 : g ·
p0 ⊢ φ(x)}, then by definition µp (φ(x)) = h0 (A) and µp0 (φ(x)) = h0′ (A0 ),
where h0 is the Haar measure on G/G00 and h0′ is the Haar measure on
00
00
G/G00
→ G/G00
7→ g/G00
L0 . The map f : G/G
L0 , g/G
L0 is a surjective group
homomorphism, and it is continuous with respect to the logic topology. Note
that for any g ∈ G we have g · p0 ⊢ φ(x) ⇐⇒ g · p ⊢ φ(x), so A = f−1 (A0 ).
Let h∗0 = f∗ (h0 ) be the push-forward measure, it is an invariant measure on
∗
′
G/G00
L0 . But by the uniqueness of the Haar measure, it follows that h0 = h0 ,
∗
′
and so h0 (A) = h0 (A0 ) = h0 (A0 ), i.e., µp (φ(x)) = µp0 (φ(x)) as wanted.
Proposition 3.23. For any φ(x) ∈ LG (U), ε > 0 and a countable set of
f-generic types S ⊆ SG (U) there are some g0 , . . . , gn−1 ∈ G such that: for
any g, g ′ ∈ G and p ∈ S we have µgp (g ′φ(x)) ≈ε Av(gj g ′ φ(x) ∈ gp).
Proof. First assume that the language L is countable. Using Lemma 3.21, we
can apply the VC-theorem (Fact 2.1) to the family F ′ = Fφ,S and find some
g0 , . . . , gn−1 ∈ G/G00 such that for any Y ∈ F ′ we have Av(g0 , . . . , gn−1 ; Y) ≈ε
h0 (Y). Let gi ∈ G be some representative of gi , for i < n. Let g, g ′ ∈ G and
p ∈ S be arbitrary. Recall that µgp(g ′ φ(x)) = h0 (Ag ′ φ,gp ) and that Ag ′ φ,gp =
g ′ Aφ,p g−1 , where g = g/G00 , g ′ = g ′ /G00 . Then Ag ′ φ,gp ∈ F ′ and we have
−1
′
′
µgp(g ′ φ(x)) ≈ε Av(g0 , . . . , gn−1 ; Ag ′φ,gp ) = Av(g−1
0 g φ(x), . . . , gn−1 g φ(x); gp).
Now let L be an arbitrary language, and let L0 be an arbitrary countable
sublanguage such that φ(x) ∈ L0 and G is L0 -definable, let T0 be the corresponding reduct. Let S0 = {p|L0 : p ∈ S}, by Lemma 3.22 it is a countable
set of f-generic types in the sense of T0 . Applying the countable case with
respect to S0 inside T0 , we find some g0 , . . . , gn−1 ∈ G such that for any
g, g ′ ∈ G and p0 ∈ S0 we have µgp0 (g ′ φ(x)) ≈ε Av(gjg ′ φ(x) ∈ gp0 ). Let
p ∈ S be arbitrary, and take p0 = p|L0 . On the one hand, the right hand
side is equal to Av(gj g ′ φ(x) ∈ gp). On the other hand, as g ′ φ(x) ∈ L0 (U)
and gp0 = gp|L0 is f-generic, by Lemma 3.22 the left hand side is equal to
µgp(g ′ φ(x)), as wanted.
Proposition 3.24. Let p be an f-generic type, and assume that q ∈ G · p.
Then q is f-generic and µp = µq .
25
Proof. First of all, q is f-generic because the orbit of p consists of f-generic
types and the set of f-generic types is closed.
Take a formula φ(x) ∈ LG (U) and ε > 0, and let g0 , . . . , gn−1 be as given
by Proposition 3.23 for S = {p, q}. Then we have µq (φ(x)) ≈ε Av(gi φ(x); q).
As q ∈ G · p, there is some g ∈ G such that for each i < n we have gi φ(x) ∈
q ⇐⇒ gi φ(x) ∈ gp. But we also have µgp (φ(x)) ≈ε Av(gi φ(x); gp), which
together with µgp = µp implies µp (φ(x)) ≈2ε µq (φ(x)). As φ(x) and ε were
arbitrary, we conclude.
Proposition 3.25. Let p be an f-generic type. Then for any definable set
φ(x), if µp (φ(x)) > 0, then there is a finite union of translates of φ(x) which
covers the support S(µp) (so in particular has µp-measure 1).
Proof. As S(µp) ⊆ G · p (Remark 3.17), any type q weakly random for µp is
f-generic and satisfies µq = µp by Proposition 3.24. Hence µq (φ(x)) > 0, so
some translate of φ(x) must be in q. It follows that the closed compact set
S(µp) can be covered by translates of φ, so by finitely many of them.
Lemma 3.26. Let µ be G-invariant. Then for any ε > 0 and φ(x, y), there
are some f-generic p0 , . . . , pn−1 ∈ S(µ) such that
µ(φ(x, b)) ≈ε
1X
µp (φ(x, b))
n i<n i
for any b ∈ U.
Proof. As before, we may assume that every translate of an instance of
φ(x, y) is an instance of φ(x, y). Fix ε > 0.
By Fact 2.9 there are some p0 , . . . , pn−1 ∈ S(µ) such that µ(φ(x, b)) ≈ε
Av(φ(x, b) ∈ pi ) for all b ∈ U. It follows by G-invariance of µ and the
assumption on φ that for any g ∈ G and b ∈ U, Av(gφ(x, b) ∈ pi ) ≈ε
µ(φ(x, b)).
By Proposition 3.14, all of the pi ’s are f-generic. By Proposition 3.23
with S = {p0 , . . . , pn−1 }, for every b ∈ U there are some g0 , . . . , gm−1 ∈ G
such that for any i < n, µpi (φ(x, b)) ≈ε Av(gj φ(x, b) ∈ pi ).
So let b ∈ U be arbitrary, and choose the corresponding g0 , . . . , gm−1 for
it. By the previous remarks we have
1X
1X
µpi (φ(x, b)) ≈ε
Av(gjφ(x, b) ∈ pi ) =
n i<n
n i<n
26
1X
=
n i<n
!
1 X
1 X
"gj φ(x, b) ∈ pi " =
m j<m
m j<m
!
1X
"gj φ(x, b) ∈ pi " =
n i<n
1 X
1 X
Av(gj φ(x, b) ∈ pi ) ≈ε
µ(φ(x, b)) = µ(φ(x, b)).
m j<m
m j<m
P
Thus µ(φ(x, b)) ≈2ε n1 i<n µpi (φ(x, b)).
=
Corollary 3.27. Let µ be a G-invariant measure and assume that S(µ) ⊆
G · p for some f-generic p. Then µ = µp .
Proof. Let φ(x) ∈ LG (U) and ε > 0 be arbitrary. By Lemma 3.26 we can find
some f-generic p0 , . . . , pn−1 ∈ S(µ) such that µ(φ(x)) ≈ε Av(µpi (φ(x)) : i <
n). But as pi ∈ S(µ) ⊆ G · p, it follows by Proposition 3.24 that µpi = µp
for all i < n, so µ(φ(x)) ≈ε µp (φ(x)).
3.3
Weak genericity and almost periodic types
Now we return to the notions of genericity for definable subsets of definable groups and add to the picture another one motivated by topological
dynamics, due to Newelski.
We will be using the standard terminology from topological dynamics:
Given a group G, a G-flow is a compact space X equipped with an action
of G such that every x 7→ g · x, g ∈ G is a homeomorphism of X. We will
usually write a G-flow X as a pair (G, X). A set Y ⊆ X is said to be a subflow
if Y is closed and G-invariant. The flows relevant to us are (SG (U), G(U))
and (SG (M), G(M)) for a small model M.
Definition 3.28 ([New09, Poi87]).
1. A formula φ(x) ∈ LG (U) is (left)generic
S if there are some finitely many g0 , . . . , gn−1 ∈ G such that
G = i<n gi φ(x).
2. A formula φ(x) ∈ LG (U) is (left-)weakly generic if there is formula ψ(x)
which is not generic, but such that φ(x) ∨ ψ(x) is generic.
3. A (partial) type is (weakly) generic if it only contains (weakly) generic
formulas.
4. A type p ∈ SG (U) is called almost periodic if it belongs to a minimal
flow in (SG (U), G(U)) (i.e., a minimal G-invariant closed set), equivalently if for any q ∈ G · p we have G · p = G · q.
27
Fact 3.29 ([New09], Section 1). The following hold, in an arbitrary theory:
1. The formula φ(x) is weakly generic if and only if for some finite A ⊆ G,
X \ (A · φ(x)) is not generic.
2. The set of non weakly generic formulas forms a G-invariant ideal. In
particular, there are always global weakly generic types by compactness.
3. The set of all weakly generic types is exactly the closure of the set of
all almost periodic types in SG (U).
4. Every generic type is weakly generic. Moreover, if there is a global
generic type then every weakly generic type is generic, and the set of
generic types is the unique minimal flow in (SG (U), G(U)).
5. A type p(x) is almost periodic if and only if for every φ(x) ∈ p, the set
G · p is covered by finitely many left translates of φ(x).
We connect these definitions to the notions of genericity from the previous
sections. As before, we always assume that G = G(U) is NIP.
Proposition 3.30. Let G be definably amenable and let φ(x) ∈ LG (M) be a
weakly generic formula. Then it is f-generic.
Proof. We adapt the argument from [NP06, Lemma 1.8]. As φ(x) is weakly
generic, let ψ(x) be non-generic and A ⊂ G a finite set such that A · (φ(x) ∨
ψ(x)) = X. We may assume that A ⊂ M and that ψ(x) is defined over M.
Assume that φ(x) is not f-generic over M. The set of formulas which are not
f-generic is G-invariant, and moreover it is an ideal by Corollary 3.5. Thus
A · φ(x) is not f-generic, which implies that there is some g ∈ G such that
g · A · φ(x) divides
T over M. That is, there is an M-indiscernible sequence
(gi )i<k such that i<k gi · A · φ(x) = ∅.
As A · φ(x) ∪ A · ψ(x) S
= G, we also have gTi · A · φ(x) ∪ gi · A · ψ(x) = G
for every i < k. Thus G \ i<k gi · A · ψ(x) ⊆ i<k gi · A · φ(x) = ∅. But this
means that ψ(x) is generic, a contradiction.
Proposition 3.31. Assume that G is definably amenable.
1. If p is almost periodic then it is f-generic and G · p = S(µp ).
2. Minimal flows in SG (U) are exactly the sets of the form S(µp) for some
f-generic p.
28
3. If p, q are almost periodic and µp = µq then G · p = G · q.
Proof. (1) An almost periodic type p contains only weakly generic formulas
and hence is f-generic by Proposition 3.30. As S(µp) ⊆ G · p (see Remark
3.17), it follows by minimality that S(µp) = G · p.
(2) For an f-generic p, the set S(µp) is a subflow by G-invariance of µp .
If q ∈ S(µp ) and φ(x) ∈ q, then µp (φ(x)) > 0 and by Proposition 3.25 there
are finitely many translates of φ(x) which cover S(µp), so in particular they
cover G · q ⊆ S(µp). Thus q is almost periodic (by the usual characterization
of almost periodic types from Fact 3.29(5)).
(3) is clear.
In particular, for any f-generic type p there is some almost periodic type
q with µp = µq . However, the following question remains open 2 .
Question 3.32. Is every f-generic type almost periodic? Equivalently, does
p ∈ S(µp) always hold?
Now towards the converse.
Proposition 3.33. Let G be definably amenable. Assume that φ (x) does
not G-divide. Then there are some global almost periodic types p0 , . . . , pn−1 ∈
SG (U) such that for any g ∈ G there is some i < n such that gφ(x) ∈ pi
holds.
Proof. Let k ∈ ω be as given by Fact 2.2 for the VC-family F = {gφ (x) :
g ∈ G}. We claim that F satisfies the (p, k)-property for some p < ω. If not,
then by compactness we can find an infinite indiscernible sequence (gi )i<ω in
G such that {gi φ(x) : i < ω} is k-inconsistent, and so G-divides.
By Fact 2.2 and compactness it follows that there are some p0 , . . . , pN−1 ∈
SG (U) which satisfy:
(∗) for every g ∈ G, for some i < N, we have gφ (x) ∈ pi .
Now consider the action of G on (SG (U))N with the product topology, and
let
F = {g · (p0 , . . . , pN−1 ) : g ∈ G}.
It is a subflow, and besides every (q0 , . . . , qN−1 ) ∈ F satisfies
V (∗) (it is clear for
translates of (p0 , . . . , pN−1 ); if for some g ∈ G we have i<N ¬g · φ (xi ) ∈ qi ,
2
While this paper was under review, a negative answer was obtained in [PY16].
29
V
then since i<N ¬g · φ (xi ) is an open subset of (SG (U))N with respect to the
product topology containing (q0 , . . . , qN−1 ), it follows that h · (p0 , . . . , pN−1 )
belongs to it for some h ∈ G, which is impossible). Let F ′ be a minimal
subflow of F, and notice that the projection of F ′ on any coordinate is a
minimal subflow of (G, SG (U)). Thus, taking (q0 , . . . , qN−1 ) ∈ F ′ , it follows
that qi is almost periodic for every i < N, and every translate of φ (x)
belongs to one of the qi , i < N.
Corollary 3.34. Let G be definably amenable. If φ(x) is f-generic, then
µq (φ(x)) > 0 for some global f-generic type q.
Proof. Let p0 , . . . , pn−1 be some global almost periodic types given by Propo00
sition 3.33, they are
S also f-generic00by Proposition 3.31. Let Yi = {ḡ ∈ G/G :
gφ(x) ∈ pi }. As i<n Yi = G/G and each of Yi ’s is measurable, it follows
that h0 (Yi ) ≥ n1 for some i < n. But then µpi (φ(x)) ≥ n1 .
Summarizing, we have demonstrated that all notions of genericity that
we have considered coincide in definable amenable NIP groups.
Theorem 3.35. Let G be definably amenable, NIP. Let φ(x) be a definable
subset of G. Then the following are equivalent:
1. φ(x) is f-generic;
2. φ(x) is not G-dividing;
3. φ(x) is weakly-generic;
4. µ(φ(x)) > 0 for some G-invariant measure µ;
5. µp (φ(x)) > 0 for some global f-generic type p.
Proof. (1) and (2) are equivalent by Proposition 3.4, (1) implies (3) by Proposition 3.33 and (3) implies (1) by Proposition 3.30. Finally, (1) implies (5)
by Corollary 3.34, (5) implies (4) is obvious and (4) implies (1) by Lemma
3.14.
30
3.4
Unique ergodicity
We now characterize the case when G admits a unique G-invariant measure. Following standard terminology in topological dynamics, we call such
a G uniquely ergodic (indeed, it will follow from the next section that this
condition is equivalent to SG (U) having a unique regular ergodic measure).
Recall that a G-invariant measure µ is called generic if for any definable
set φ(x), µ(φ(x)) > 0 implies that φ(x) is generic. It follows that any
p ∈ S(µ) is generic.
Theorem 3.36. A definably amenable NIP group G is uniquely ergodic if
and only if it admits a generic type (in which case it has a unique minimal
flow — the support of the unique measure).
Proof. If G admits a generic type p, then
S for any type q, p belongs to the
closure G · q (if φ(x) ∈ p then X = i<n gi · φ(x) for some gi ∈ G, so
φ(x) ∈ g−1
i q for some i < n). In particular, for an arbitrary f-generic type
q we have µq = µp (by Proposition 3.24). By Lemma 3.26, this implies that
any invariant measure µ is equal to µp , hence there is a unique invariant
measure.
Conversely, assume that G admits a unique G-invariant measure µ. We
claim that µ is generic. Assume not, and let φ(x) be a definable set of positive
µ-measure and
W assume that φ(x) is not generic. Then for any g1 , . . . , gn ∈ G,
the union i<n gi · φ(x) is not generic. Hence its complement is weakly
generic. By Theorem 3.35 we conclude that the partial type {¬g · φ(x) :
g ∈ G(U)} is f-generic and hence extends to a complete f-generic type p.
The measure µp associated to p gives φ(x) measure 0, so µp 6= µ, which
contradicts unique ergodicity.
Remark 3.37. In particular, in a uniquely ergodic group every f-generic type
is almost periodic and generic.
Recall from [HP11] that an NIP group G is fsg if it admits a global type
p such that for some small model M, all translates of p are finitely satisfiable
over M. It is proved that an fsg group admits a unique invariant measure
and that this measure is generic. So the previous proposition was known in
this special case. We now give an example (pointed out to us by Hrushovski)
of a uniquely ergodic group which is not fsg.
Remark 3.38. Let Kv be a model of ACVF and consider G = (Kv , +) the
additive group. By C-minimality, the partial type p concentrating on the
31
complement of all balls is a complete type and is G-invariant. There can be
no other G-invariant measure since any non-trivial ball in (Kv , +) G-divides,
hence cannot have positive measure for any G-invariant measure. Finally,
the group G is not fsg since p is not finitely satisfiable.
4
Regular ergodic measures
In this section, we are going to characterize regular ergodic measures on
SG (U) for a definably amenable NIP group G = G(U), but first we recall
some general notions and facts from functional analysis and ergodic theory
(see e.g. [Wal00]). As we are going to deal with more delicate measuretheoretic issues here, we will be specific about our measures being regular
or not. The reader should keep in mind that all the results in the previous
sections only apply to regular measures on SG (U).
The set of all regular (Borel, probability) measures on SG (U) can be
naturally viewed as a subset of C∗ (SG (U)), the dual space of the topological
∗
vector space of continuous functions on
R SG (U), Rwith the weak topology of
pointwise convergence (i.e., µi → µ if fdµi → fdµ for all f ∈ C(SG (U))).
It is easy to check that this topology coincides with the logic topology on the
space of measures (Remark 2.8). This space carries a natural structure of a
real topological vector space containing a compact convex set of G-invariant
measures.
We will need the following version of a “converse” to the Krein-Milman
Theorem (see e.g. [Jer54, Theorem 1]. We refer to e.g. [Sim11, Chapter 8]
for a discussion of convexity in topological spaces).
Fact 4.1. Let E be a real, locally convex, Hausdorff topological vector space.
Let C be a compact convex subset of E, and let S be a subset of C. Then the
following are equivalent:
1. C = convS, the closed convex hull of S.
2. The closure of S includes all extreme points of C.
Now we recall the definition of an ergodic measure.
Fact 4.2 ([Phe01, Proposition 12.4]). Let G be a group acting on a topological
space X with x 7→ gx a Borel map for each g ∈ G, and let µ be a G-invariant
Borel probability measure on X. Then the following are equivalent:
32
1. The measure µ is an extreme point of the convex set of G-invariant
measures on X.
2. For every Borel set Y such that µ(gY△Y) = 0 for all g ∈ G, we have
that either µ(Y) = 0 or µ(Y) = 1.
A G-invariant measure is ergodic if it satisfies any of the equivalent conditions above. Under many natural conditions on G and X the two notions
above are equivalent to the following property of µ: for every G-invariant
Borel set Y, either µ(Y) = 0 or µ(Y) = 1. However this is not the case in
general.
Proposition 4.3. The map p 7→ µp from the (closed) set of global f-generic
types to the (closed) set of global G-invariant measures on SG (U) is continuous.
Proof. Fix φ (x) ∈ LG (U) and r ∈ [0, 1], and let Y be the set of all global
f-generic p ∈ SG (U) with µp (φ (x)) ≥ r. It is enough to show that Y is
closed. Let q belong to the closure of Y, in particular q is f-generic. Let L0
be some countable language such that G is L0 -definable and φ(x) ∈ L0 (U),
and let T0 = T |L0 .
Now let M be some countable model of T0 over which φ(x) is defined,
and let ψ(x, y) = φ(y−1 x). Let q ′ (x) = q|ψ , i.e., the restriction of q to all
formulas of the form g · φ(x), ¬g · φ(x), g ∈ G, and let Y ′ = {p|ψ : p ∈ Y}.
By Lemma 3.22, q ′ and all elements of Y ′ are f-generic in the sense of T0 .
By Lemma 3.15 applied in T0 we know that q ′ and all elements of Y ′ are
M-invariant. Working in T0 , let Invψ (M) be the space of all global ψ-types
invariant over M. It follows from the assumption that q ′ ∈ Y ′ (i.e., the
closure of Y ′ in the sense of the topology on Invψ (M)).
By Fact 2.7 we know that q ′ is a limit of a countable sequence (pi′ : i < ω)
of types from Y ′ . Each of pi′ is f-generic in T0 , so in T as well (easy to verify
using equivalence to G-dividing both in T and T0 ), and extends to some global
f-generic L-type pi ∈ Y by Corollary 3.5.
Now work in T , and let ε > 0 be arbitrary. By Proposition 3.23, with
S = {q} ∪ {pi : i < ω}, there are some g0 , . . . , gm ∈ G such that µpi (φ(x)) ≈ε
Av(gjφ(x) ∈ pi ) for all i < ω, as well as µq (φ(x)) ≈ε Av(gjφ(x) ∈ q). As
for any g ∈ G, gφ(x) ∈ pi ⇐⇒ gφ(x) V
∈ pi′ , and the same for q, q ′ , it follows
that for all i < ω large enough we have j<m (gjφ(x) ∈ q ⇐⇒ gj φ(x) ∈ pi ).
But this implies that for any ε > 0, µq (φ (x)) ≥ r − ε, and so µq (φ (x)) ≥ r
and q ∈ Y.
33
Corollary 4.4.
1. The set {µp : p is f-generic} is closed in the set of all
G-invariant measures.
2. Given a G-invariant measure µ, the set of f-generic types p for which
µp = µ is a subflow.
Proof. This follows from Proposition 4.3.
Theorem 4.5. Let G be definably amenable. Then regular ergodic measures
on SG (U) are exactly the measures of the form µp for some f-generic p ∈
SG (U).
Proof. Fix a global f-generic type p, and assume that µp is not an extreme
point. Then there is some 0 < t < 1 and some G-invariant measures µ1 6= µ2
such that µp = tµ1 + (1 − t)µ2. First, it is easy to verify using regularity of
µp that both µ1 and µ2 are regular. Second, it follows that S(µ1), S(µ2) ⊆
S(µp) ⊆ Gp. By Corollary 3.27 which we may apply as µ1 , µ2 are regular, it
follows that µ1 = µp = µ2, a contradiction.
Now for the converse, let µ be an arbitrary regular G-invariant measure
which is an extreme point, and let S = {µp : p ∈ SG (U) is f-generic}. Let
convS be the closed convex hull of S. By Lemma 3.26, µ is a limit of the
averages of measures from S, so µ ∈ convS and it is still an extreme point
of convS. Then we actually have µ ∈ S (by Fact 4.1, as (1) is automatically
satisfied for C = convS, then (2) holds as well). But S = S by Corollary
4.4(1).
Corollary 4.6. The set of all regular ergodic measures in SG (U) is closed.
Let FGen denote the closed G-invariant set of all f-generic types in SG (U).
By Proposition 3.8 we have a well-defined action of G/G00 on FGen (not
necessarily continuous, or even measurable). If ν is an arbitrary regular
G-invariant measure, then S(ν) ⊆ FGen by Proposition 3.14, and we can
naturally view ν as a G/G00 -invariant measure on Borel subsets of FGen.
Question 4.7. Consider the action f : G/G00 × FGen → FGen, (g, p) 7→
g · p. Is it measurable? It is easy to see that f is continuous for a fixed g
and measurable for a fixed p. In many situations this is sufficient for joint
measurability of the map, but our case does not seem to be covered by any
result in the literature.
34
5
Generic compact domination and the Ellis
group conjecture
5.1
Baire-generic compact domination
Let G = G(U) be a definably amenable NIP group, and let M be a small
model of T . Let p ∈ SG (U) be a global type strongly f-generic over M. Let
π : G → G/G00 be the canonical projection. It naturally lifts to a continuous
map π : SG (U) → G/G00 . Fix a formula φ (x) ∈ LG (U), and we define
Uφ(x) = g/G00 : g · p ⊢ φ (x) ⊆ G/G00 .
Proposition 5.1. The set U = Uφ(x) is a constructible subset of G/G00
(namely, a Boolean combination of closed sets).
Proof. Note that U = π (S) with S = {g ∈ G : φ
S(gx) ∈ p}.
As explained in Section 2.2 we have S = n<N (An ∧ ¬Bn+1 ) for some
N < ω, where:
^
Altn (x0 , . . . , xn−1 ) =
¬ (φ(gxi ) ↔ φ(gxi+1 )) ,
i<n−1
An = {g ∈ G : ∃x0 . . . xn−1 (p(n) |M (x0 , . . . , xn−1 ) ∧ Altn (x0 , . . . , xn−1 )∧
∧φ (gxn−1 ))},
Bn = {g ∈ G : ∃x0 . . . xn−1 (p(n) |M (x0 , . . . , xn−1 ) ∧ Altn (x0 , . . . , xn−1 )∧
∧¬φ (gxn−1 ))}.
Note that An , Bn are type definable (over M and the parameters of φ(x)).
Define
An′ := g ∈ G : ∃h ∈ G g−1 h ∈ G00 ∧ h ∈ An ,
Bn′ := g ∈ G : ∃h ∈ G g−1 h ∈ G00 ∧ h ∈ Bn .
S
′
These are also type-definable sets. Let S ′ = n<N An′ ∧ ¬Bn+1
. We
′
check that S = S. Note:
1. S is G00 -invariant (because p is),
2. all of An′ , Bn′ , S ′ are G00 -invariant (by definition),
35
3. An ⊆ An′ , Bn ⊆ Bn′ .
′
First, if g ∈ S ′, say g ∈ An′ ∧ ¬Bn+1
, then there is h ∈ G such that
−1
00
′
′
hg ∈ G and h ∈ An . As g ∈ ¬Bn+1 , also h ∈ ¬Bn+1
, and so h ∈ ¬Bn+1
(by (2) and (3)). Hence h ∈ S, and by (1) also g ∈ S. So S ′ ⊆ S.
Assume that g ∈ S \ S ′, and let n < N be maximal for which there is
h ∈ gG00 such that h ∈ An ∧¬Bn+1 . Then for a corresponding h, we still have
′
h ∈ S \ S ′ by (1) and (2). In particular, h ∈
/ An′ ∧ ¬Bn+1
. As h ∈ An ⊆ An′ ,
′
necessarily h ∈ Bn+1
. This means that there is some h ′ ∈ hG00 = gG00 such
′
that h ∈ Bn+1 . As h ′ is still in S by (1), it follows that h ′ ∈ Am ∧ ¬Bm+1 for
some m, but by the definition of the Bn ’s this is only possible if m+1 > n+1,
contradicting the choice of n. Thus
S = S ′.
S
′
Now, we have π(S ′) = π(S) = n<N π(An′ ) ∧ ¬π(Bn+1
) since An′ and Bn′
are all G00 -invariant. As π(An′ ), π(Bn′ ) are closed, we conclude that π(S) is
constructible.
Let C := G · p ⊆ SG (U), and we define
Eφ(x) = h̄ ∈ G/G00 : π−1 h̄ ∩ φ (x) ∩ C 6= ∅ and π−1 h̄ ∩ ¬φ (x) ∩ C 6= ∅ .
Remark 5.2. Let X be an arbitrary topological space, and let Y ⊆ X be a
constructible set. Then the boundary ∂Y has empty interior.
Proof. This is easily verified as Y is a Boolean combination of closed sets,
∂(Y1 ∪ Y2 ) ⊆ ∂Y1 ∪ ∂Y2 for any sets Y1 , Y2 ⊆ X, and ∂Y has empty interior if
Y is either closed or open.
Theorem 5.3. (Baire-generic compact domination) The set Eφ(x) is closed
and has empty interior. In particular it is meagre.
Proof. We have Eφ(x) = π(φ(x) ∩ C) ∩ π(¬φ(x) ∩ C) and φ(x) ∩ C, ¬φ(x) ∩ C
are closed subsets of SG (U), hence Eφ(x) is closed.
We may assume that p concentrates on G00 , as replacing p by g · p for
some g ∈ G(U) does not change C, and thus does not change Eφ(x) .
Let ḡ ∈ Eφ(x) be given, and let V be an arbitrary open subset of G/G00
containing ḡ. As the map π is continuous, the set S = π−1 (V) is an open
subset of SG (U). By the definition of Eφ(x) , there must exist q, q ′ ∈ C such
that π(q) = π(q ′ ) = ḡ and q ∈ S ∩ φ(x), q ′ ∈ S ∩ ¬φ(x). As C = G · p,
it follows that there are some h, h ′ ∈ G(U) such that h · p ∈ S ∩ φ(x) and
h ′ ·p ∈ S∩¬φ(x). But then, as p concentrates on G00 , π(h) = π(h·p) ∈ V ∩U
36
and π(h ′) = π(h ′ · p) ∈ V ∩ Uc (where U = Uφ(x) is as defined before
Proposition 5.1). As V was an arbitrary neigbourhood of ḡ, it follows that
ḡ ∈ ∂U, hence Eφ(x) ⊆ ∂U. By Proposition 5.1, U is constructible. Hence
∂U has empty interior by Remark 5.2, and so Eφ(x) has empty interior as
well.
5.2
Connected components in an expansion by externally definable sets
Given a small model M of T , an externally definable subset of M is an intersection of an L(U)-definable subset of U with M. One defines an expansion
Mext in a language L ′ by adding a new predicate symbol for every externally
definable subset of Mn , for all n. Recall that a global type p ∈ S(U) is
finitely satisfiable in M if p lies in the topological closure of M, where M
is identified with its image in S(U) under the map sending a ∈ M to the
type x = a. There is a canonical bijection (even homeomorphism) between
S(Mext ) and the subspace of types in S(U) finitely satisfiable in M. Recall
also that a coheir of a type p ∈ S(M) is a type over a larger model N which
extends p and is finitely satisfiable in M.
Let T ′ = ThL ′ (Mext ). Note that automatically any quantifier-free L ′ -type
over Mext is definable (using L ′-formulas). The following is a fundamental
theorem of Shelah [She09] (see also [CS13] for a refined version).
Fact 5.4. Let T be NIP, and let M be a model of T . Then T ′ eliminates
quantifiers.
It follows that T ′ is NIP and that all (L ′-)types over Mext are definable.
Assume now that G is an L-definable group, and let U ′ be a monster
model for T ′ such that U ↾ L is a monster for T . In general there will be
many new L ′ -definable subsets and subgroups of G(U ′ ) which are not Ldefinable. In [CPS14] it is demonstrated however that many properties of
definable groups are preserved when passing to T ′ .
Fact 5.5. Let T be NIP and let M be a small model of T . Let G be an
L-definable group.
1. If G is definably amenable in the sense of T , then it is definably amenable
in the sense of T ′ as well.
37
2. The group G00 (U) computed in T coincides with G00 (U ′ ) computed in
T ′.
In particular this implies that G/G00 is the same group when computed
in T or in T ′ . Note also that the logic topology on G/G00 computed in T
coincides with the logic topology computed in T ′ : any open set in the sense of
T is also open in the sense of T ′ and both are compact Hausdorff topologies,
therefore they must coincide.
Remark 5.6. In view of Remark 2.15, if L is countable then G/G00 is still a
Polish space with respect to the L ′-induced logic topology.
5.3
Ellis group conjecture
We recall the setting of definable topological dynamics and enveloping semigroups (originally from [New09, Section 4], but we are following the notation
from [CPS14]).
Let M0 be a small model of a theory T , and assume that all types over
M0 are definable. Then G(M0 ) acts on SG (M0 ) by homeomorphisms, and
the identity element 1 has a dense orbit. The set SG (M0 ) admits a natural
semigroup structure · extending the group operation on G(M0 ) and continuous in the first coordinate: for p, q ∈ SG (M0 ), p · q is tp(a · b/M0 ) where
b realizes q and a realizes the unique coheir of p over M0 b. This semigroup is precisely the enveloping Ellis semigroup of (SG (M0 ), G(M0 )) (see
e.g. [Gla07a]). In particular left ideals of (SG (M0 ), ·) are precisely the closed
G(M0 )-invariant subflows of G(M0 ) y SG (M0 ), there is a minimal subflow
M and there is an idempotent u ∈ M. Moreover, u · M is a subgroup of
the semigroup (SG (M0 ), ·) whose isomorphism type does not depend on the
choice of M and u ∈ M. It is called the Ellis group (attached to the data).
The quotient map from G = G(U) to G/G00
M0 factors through the tautological
map g 7→ tp(g/M0) from G to SG (M0 ), and we let π denote the resulting
map from SG (M0 ) → G/G00
M0 . It is a surjective semigroup homomorphism,
and for any minimal subflow M of SG (M0 ) and u ∈ M, the restriction of π
to u · M is a surjective group homomorphism.
Now, let T be NIP, and let M be an arbitrary model. Then we consider
M0 := Mext , an expansion of M by naming all externally definable subsets
of Mn for all n ∈ N, in a new language L ′ extending L. Then T ′ = ThL ′ (M0 )
is still NIP, and all L ′ -types over M0 are definable (by Fact 5.4), so the
construction from the previous paragraph applies to (SG (M0 ), G(M0 )). Let
38
U ′ be a monster model for T ′ , so that U = U ′ ↾ L is a monster model for T .
By Fact 5.5, if G(U ′ ) is definably amenable in the sense of T , then it remains
definably amenable in the sense of T ′ , and G00 (U) = G00 (U ′ ) (the first one
is computed in T with respect to L-definable subgroups, while the second
one is computed in T ′ with respect to L ′-definable subgroups). Newelski
asked in [New09] if the Ellis group was equal to G/G00 for some nice classes
of groups. Gismatullin, Penazzi and Pillay [GPP15] show that this is not
always the case for NIP groups (SL2 (R) is a counterexample). The following
modified conjecture was then suggested by Pillay (see [CPS14]):
Ellis group conjecture: Suppose G is a definably amenable NIP group.
Then the restriction of π : SG (M0 ) → G/G00 to u · M is an isomorphism, for
some/any minimal subflow M of SG (M0 ) and idempotent u ∈ M (i.e., π is
injective).
Theorem 5.7. The Ellis group conjecture is true, i.e., π : u · M → G/G00
is an isomorphism.
Proof. Fix notations as above. Throughout this proof, we work in T ′ . Let
p ∈ SG (U ′ ) be strongly f-generic over M0 . Let C := G · p, and let V :=
{p|M0 : p ∈ C}. Note that V is a subflow of G (M0 ) y SG (M0 ): it is closed
as a continuous image of a compact set C into a Hausdorff space, and it is
G (M0 )-invariant as C is G (U ′ )-invariant. Let M be a minimal subflow of
V. It has to be of the form G (M0 ) · (p ′ |M0 ) for some p ′ ∈ C. So replacing
p by p ′ (which is still strongly f-generic over M0 ) we may assume that
M = G (M0 ) · (p|M0 ) is minimal.
Let u ∈ M be an idempotent. We will show that if p1 , p2 ∈ u · M and
π (p1 ) = π (p2 ), i.e., they determine the same coset of G00 , then there is some
r ∈ M such that r · p1 = r · p2 . By the general theory of Ellis semigroups (see
e.g. [Gla07a, Proposition 2.5(5)]) this will imply that p1 = p2 , as wanted.
Let F be the filter of comeagre subsets of G/G00 , and let F ′ be some
ultrafilter extending it. Let q1 , q2 ∈ C be some global types extending p1 , p2
respectively. For each ḡ ∈ G/G00 , let rḡ ∈ SG (M0 ) be a type in M with
π (rḡ ) = ḡ. Let r = limF ′ rḡ . Note that r ∈ M.
Let U∗ ≻ U ′ be a larger monster of T ′ . Let ai ∈ U∗ be such that ai |= qi
for i = 1, 2. For each ḡ ∈ G/G00 let rḡ′ be the unique coheir of rḡ over U∗ ,
and let bḡ |= rḡ′ |U ′ a1 a2 . Finally, let r ′ = limF ′ rḡ′ , the unique coheir of r over
U∗ , and let b ∈ U∗ realize r ′ |U ′ a1 a2 .
Claim 1. limF ′ tp (bḡ · ai /U ′ ) = tp (b · ai /U ′ ) for i = 1, 2.
39
This follows by left continuity of the semigroup operation, but we give
the details. Let φ (x) ∈ L ′ (U ′ ) be arbitrary, and let ai′ ∈ U ′ be such that
ai′ |= qi |N , where N M0 is some small model over which φ (x) is defined.
Then we have:
′
φ(x) ∈ lim
(tp(b
·
a
/U
))
⇔
ḡ ∈ G/G00 :|= φ(bḡ · ai ) ∈ F ′ ⇔
ḡ
i
′
F
⇔ ḡ ∈ G/G00 :|= φ(bḡ · ai′ ) ∈ F ′ ⇔ φ(x · ai′ ) ∈ lim
(tp(bḡ /U ′ )) ⊆ r ′ ⇔
′
F
⇔ φ(x · ai ) ∈ r ′ ⇔|= φ(b · ai ).
The second equivalence is by M0 -invariance of rḡ′ , and the fourth one is
by M0 -invariance of r ′ .
Claim 2. r · p1 = r · p2 .
Assume not, say there exists some φ (x) ∈ L ′ (U ′ ) such that φ (x) ∈ r · p1 ,
¬φ (x) ∈ r · p2 , so |= φ (b · a1 ) ∧ ¬φ (b · a2 ) (according to the choice of
a1 , a2, b and the definition of the semigroup operation on SG (M0 )). We
may
assume that both q1 and q2 concentrate on G00 . By Claim 1 we have
ḡ ∈ G/G00 :|= φ (bḡ · a1 ) ∧ ¬φ (bḡ · a2 ) ∈ F ′ . As Eφ(x) ⊆ G/G00 is meagre
c
by Theorem 5.3, we have Eφ(x) ∈ F ′ , and so there is some ḡ ∈
/ Eφ(x) such
that |= φ (bḡ · a1 ) ∧ ¬φ (bḡ · a2 ).
For an arbitrary open set V ⊆ G/G00 containing ḡ, we can choose h ∈
G(U ′ ) such that π(h) ∈ V and φ (h · a1 ) ∧ ¬φ (h · a2 ) holds. Indeed, let
S = π−1 (V) ⊆ SG (U ′ ), which is open by continuity of π. Then there is an
L ′ (U ′ )-definable set ψ(x) ⊆ S such that π(ψ(x)) ⊆ V and |= ψ(bḡ ). By finite
satisfiability of rḡ′ , take h ∈ G(U ′ ) satisfying φ (x · a1 ) ∧ ¬φ (x · a2 ) ∧ ψ(x).
As ḡ ∈
/ Eφ(x) and Eφ(x) is closed by Theorem 5.3, we find such an h with
π(h) ∈
/ Eφ(x) .
Note that π (h · a1 ) = π (h) = π (h · a2 ) as q1 , q2 concentrate on G00 ,
and that tp(h · a1 /U ′ ) = h · q1 ∈ C, tp(h · a2 /U ′ ) = h · q2 ∈ C. It follows
that π(h) ∈ Eφ(x) — a contradiction.
Corollary 5.8. In a definably amenable NIP group, the Ellis group of the
dynamical system (SG (Mext ), G(M)) is independent of the model M.
40
6
Further remarks
6.1
Left vs. right actions
Until now, we have only considered the action of the group G on itself by
left-translations. One could also let G act on the right and define analogous
notions of right-f-generic, right-invariant measure etc. In a stable group, a
type is left-generic if and only if it is right-generic so we obtain nothing new.
However, in general, left and right notions may differ.
We start with an example of a left-invariant measure which is not rightinvariant.
Example 6.1. Let G = (R, +) ⋊ {±1}, where the two-element group {±1}
acts on R by multiplication. Consider G as a group defined in a model R
of RCF with universe R × {−1, 1} and multiplication defined by (x0 , ǫ0 ) ·
(x1 , ǫ1 ) = (x0 + ǫ0 x1 , ǫ0 ǫ1 ). Let p+
+∞ (x, y) be the type whose restriction to
x is the type at +∞ and which implies y = 1. Define similarly p−
−∞ . Then
1
+
−
µ = 2 (p+∞ + p−∞ ) is left-invariant, but not right-invariant.
However, some things can be said.
Lemma 6.2. Let G = G(U) be definably amenable, then there is always a
measure on G which is both left and right invariant.
Proof. Let µ be a left invariant measure on G which is also invariant over
some small model M (always exists in a definably amenable NIP group, e.g.
by [HP11, Lemma 5.8]).
Let µ−1 be defined by µ−1 (X) := µ(X−1 ) for every definable set X ⊆ G,
where X−1 := {a−1 : a ∈ X}. Then µ−1 is also a measure, M-invariant (as
µ−1 (σ(X)) = µ(σ(X)−1 ) = µ(σ(X−1 )) = µ(X−1 ) = µ−1 (X) for any automorphism σ ∈ Aut(U/M)) and right invariant (as µ−1 (X · g) = µ(g−1 · X−1 ) =
µ(X−1 ) = µ−1 (X) for any g ∈ G).
For any φ(x) ∈ LG (U), we define ν(φ(x)) := µ ⊗ µ−1 (φ(x · u)). That is,
for any definable set X ⊆ G and Ra model N containing M and such that X
is N-definable, we have ν(X) = SG (N) fX dµ−1 , where for every q ∈ SG (N),
fX (q) = µ(X · h−1 ) for some/any h |= q (well-defined by M-invariance of µ,
see Section 2.3). Then ν is an M-invariant measure, and given any g ∈ G
and N such that g and X are N-definable, for any q ∈ SG (N) and h |= q we
have:
41
1. fg·X(q) = µ((g · X) · h−1) = µ(g · (X · h−1)) = µ(X · h−1) = fX (q), by left
invariance of µ.
R
R
2. fX·g (q) = µ((X·g)·h−1) = fX (q·g−1 ), and SG (N) fX (q)dµ−1 = SG (N) fX (q·
R
g−1 )d(µ−1 · g) = SG (N) fX (q · g−1 )d(µ−1) as µ−1 = µ−1 · g by right invariance.
Hence ν is both left and right invariant.
Proposition 6.3. Let G be definably amenable and let φ(x) ∈ LG (U). If
φ(x) is left-generic, then it is right-f-generic.
Proof. By the previous lemma, let µ(x) be a left and right invariant measure
on G. Then as φ(x) is left-generic, we must have µ(φ(x)) > 0. But as µ
is also right-invariant, this implies that φ(x) is right-f-generic (by the “right
hand side” counterpart of Proposition 3.14).
As the following example shows, no other implication holds.
Example 6.4. Let R be a saturated real closed field and let G = (R2 , +) ⋊
SO(2) with the canonical action, seen as a definable group in R. For 0 < a <
1 let Ca ⊂ R2 be the angular region defined by {(x, y) : x ≥ 0 & |y| ≤ a · x}.
Finally, let Xa = Ca × SO(2) ⊆ G.
Note that any two translates of Ca intersect. Hence any two
S right translates of Xa intersect: let g = (xg , σg ) ∈ G, then Xa · g = τ∈SO(2) (Ca +
τ(xg )) × {τ · σg }; hence Xa · g ∩ Xa is non-empty and in fact has surjective
projection on SO(2). This shows that Xa is right-f-generic.
On the other hand, multiplying Xa on the left has the effect of turning it:
g · Xa = (xg + σg (Ca )) × SO(2). If a is infinitesimal, then there are infinitely
many pairwise disjoint left-translates of Xa , hence Xa is not left-f-generic. If
however a is not infinitesimal, then we can cover R2 by finitely many SO(2)conjugates of Ca , and hence cover G by finitely many left-translates of Xa .
We conclude that if a is infinitesimal, then Xa is right-f-generic but not
left-f-generic, and if a is not infinitesimal, then Xa is left-generic but not
right-generic.
6.2
Actions on definable homogeneous spaces
While the theory above was developed for the action of a definably amenable
group G on SG (U), we remark that (with obvious rephrasements) it works
42
just as well for a definably amenable group G = G(U) acting on SX (U) for X
a definable homogeneous G-space (i.e. X is a definable set, the graph of the
action map G × X → X is definable and the action is transitive). We show
that given a definable homogeneous space X for a definably amenable group
G, every G-invariant measure on G pushes forward to a G-invariant measure
on X, and conversely any G-invariant measure on X lifts to a G-invariant
measure on G, possibly non-uniquely.
Lemma 6.5. Let B0 ⊆ Def(U) be a Boolean algebra and let I ⊆ Def(U) be
an ideal such that I ∩ B0 is contained in the zero-ideal of ν0 , a measure on
B0 .
Let B be the collection of all sets U ∈ Def(U) for which there is some
V ∈ B0 such that U△V ∈ I. Then B is a Boolean algebra with B0 , I ⊆ B.
Moreover, ν0 extends to a global measure ν on Def(U) such that all sets from
I have ν-measure 0.
Proof. It can be checked straightforwardly that B is a Boolean algebra containing B0 and I. Now for U ∈ B, let ν ′ (U) = ν0 (V) where V is some set in
B0 with U△V ∈ I.
1. ν ′ is well-defined. If we have some V ′ ∈ B0 with U△V ′ ∈ I, then
V△V ′ ⊆ (U△V) ∪ (U△V ′ ) ∈ I, so V△V ′ ∈ I; but by assumption this
implies that ν0 (V△V ′ ) = 0, so ν0 (V) = ν0 (V ′ ).
2. ν ′ is a measure on B extending ν0 . Given Ui ∈ B, i ≤ 2, let Vi ∈ B0
be such that Ui △Vi ∈ I, i ≤ 2. Then ν ′ (U1 ∪ U2 ) = ν(V1 ∪ V2 ) =
ν(V1 ) + ν(V2 ) − ν(V1 ∩ V2 ) = ν ′ (U1 ) + ν ′ (U2 ) − ν ′ (U1 ∩ U2 ), as wanted.
Now ν ′ extends to a global measure ν by compactness, see e.g. [Sim15a,
Lemma 7.3].
Proposition 6.6. Let X be a definable homogeneous G-space, and let x0 be
an arbitrary point in X.
1. Let µ̃ be a measure on G. For every definable subset φ(x) of X, let
µ(φ(x)) = µ̃(φ(u · x0 )). Then µ is a measure on X. Moreover, if µ̃ is
G-invariant, then µ is G-invariant as well. If µ̃ is also right-invariant,
then µ does not depend on the choice of x0 .
43
2. Assume moreover that G is definably amenable, NIP. Let µ be a Ginvariant measure on X. Then there is some (possibly non-unique)
G-invariant measure µ̃ on G such that the procedure from (1) induces
µ.
Proof. (1) It is clearly a measure as µ(∅) = µ̃(∅), µ(X) = µ̃(G) and if
φi (x), i < n are disjoint subsets of X, then φi (u · x0 ), i < n are disjoint
subsets of G. If µ̃ is G-invariant then for any g ∈ G we have µ(φ(g−1 · x)) =
µ̃(φ(g−1 · u · x0 )) = µ̃(φ(u · x0 )) = µ(φ(x)).
Finally, assume that µ̃ is also right invariant. Let x1 ∈ X and φ(x) be
arbitrary, then by transitivity of the action there is some g ∈ G such that
x1 = g · x0 . We have µ̃(φ(u · x1 )) = µ̃(φ(u · (g · x0 ))) = µ̃(φ((u · g) · x0 )) =
µ̃(φ(u · x0 ) · g−1 ) = µ̃(φ(u · x0 )), as wanted.
(2) Now let µ be a G-invariant measure on X, and fix x0 ∈ X. Let
B0 ⊆ Def G (U) be the family of subsets of G of the form {g ∈ G : g · x0 ∈ Y},
where Y is a definable subset of X. For U ∈ B0 , define ν0 (U) = µ(Y). The
following can be easily verified using that µ is a G-invariant measure:
Claim. The family B0 is a Boolean algebra closed under G-translates
and ν0 is a G-invariant measure on B0 .
Next, let I ⊆ Def G (U) be the collection of all non-f-generic definable
subsets of G. We know by Corollary 3.5 that it is an ideal. As in Proposition
3.14, B0 ∩ I is contained in the zero-ideal of ν0 . Then, applying Lemma
6.5, we obtain a global measure ν on Def G (U) extending ν0 and such that
all types in its support are f-generic. Note that ν is G00 -invariant: for any
φ(x) ∈ L(U) and ε > 0 there are some p0 , . . . , pn−1 ∈ S(ν) such that for any
g ∈ G, ν(gφ(x)) ≈ε Av(p0 , . . . , pn−1 ; gφ(x)) (by Fact 2.9), and each pi is
G00 -invariant (by Proposition 3.8). Consider the map fφ : G/G00 → R, g 7→
ν(gφ(x)). It is well-defined and h0 -measurable (using an
R argument as in the
proof of Lemma 3.21). Finally, we define µ̃(φ(x)) = g∈G/G00 fφ (g)dh0 . It
is easy to check that µ̃ is a G-invariant measure on Def G (U) (and that the
procedure from (1) applied to µ̃ returns µ).
References
[BGT12] Emmanuel Breuillard, Ben Green, and Terence Tao. The structure of approximate groups. Publications mathématiques de l’IHÉS,
116(1):115–221, Nov 2012.
44
[CK12]
Artem Chernikov and Itay Kaplan. Forking and dividing in NTP2
theories. J. Symbolic Logic, 77(1):1–20, 2012.
[CP12]
Annalisa Conversano and Anand Pillay. Connected components of
definable groups and o-minimality I. Adv. Math., 231(2):605–623,
2012.
[CPS14] Artem Chernikov, Anand Pillay, and Pierre Simon. External definability and groups in NIP theories. Journal of the London Mathematical Society, 90(1):213–240, 2014.
[CS13]
Artem Chernikov and Pierre Simon. Externally definable sets and
dependent pairs. Israel Journal of Mathematics, 194(1):409–425,
2013.
[Gla07a] Eli Glasner. Enveloping semigroups in topological dynamics. Topology and its Applications, 154(11):2344 – 2363, 2007.
[Gla07b] Eli Glasner. The structure of tame minimal dynamical systems.
Ergodic Theory and Dynamical Systems, 27(06):1819–1837, 2007.
[GPP15] Jakub Gismatullin, Davide Penazzi, and Anand Pillay. Some model
theory of SL(2, R). Fundamenta Mathematicae, 229(2):117–128,
2015.
[Hal50]
Paul Richard Halmos. Measure theory, volume 2. van Nostrand
New York, 1950.
[HP11]
Ehud Hrushovski and Anand Pillay. On NIP and invariant measures. J. Eur. Math. Soc. (JEMS), 13(4):1005–1061, 2011.
[HPP08] Ehud Hrushovski, Ya’acov Peterzil, and Anand Pillay. Groups,
measures, and the NIP. J. Amer. Math. Soc., 21(2):563–596, 2008.
[HPS13] Ehud Hrushovski, Anand Pillay, and Pierre Simon. Generically
stable and smooth measures in NIP theories. Trans. Amer. Math.
Soc., 365(5):2341–2366, 2013.
[Hru90]
Ehud Hrushovski. Unidimensional theories are superstable. Annals
of Pure and Applied Logic, 50(2):117 – 137, 1990.
45
[Hru96]
Ehud Hrushovski. The Mordell-Lang conjecture for function fields.
J. Amer. Math. Soc, 9:667–690, 1996.
[Hru01]
Ehud Hrushovski. The manin–mumford conjecture and the model
theory of difference fields. Annals of Pure and Applied Logic,
112(1):43–115, 2001.
[Hru12]
Ehud Hrushovski. Stable group theory and approximate subgroups.
J. Amer. Math. Soc., 25(1):189–243, 2012.
[Jer54]
Meyer Jerison. A property of extreme points of compact convex
sets. Proceedings of the American Mathematical Society, 5(5):782–
783, 1954.
[Kec95]
Alexander S Kechris. Classical descriptive set theory, volume 156.
Springer-Verlag New York, 1995.
[KL07]
David Kerr and Hanfeng Li. Independence in topological and c*dynamics. Mathematische Annalen, 338(4):869–926, 2007.
[Las92]
Michael C. Laskowski. Vapnik-Chervonenkis classes of definable
sets. J. London Math. Soc. (2), 45(2):377–384, 1992.
[Mat04] Jiřı́ Matoušek. Bounded VC-dimension implies a fractional Helly
theorem. Discrete Comput. Geom., 31(2):251–255, 2004.
[MS14]
Alice Medvedev and Thomas Scanlon. Invariant varieties for polynomial dynamical systems. Annals of Mathematics, 179(1):81–177,
2014.
[New09] Ludomir Newelski. Topological dynamics of definable group actions. J. Symbolic Logic, 74(1):50–72, 2009.
[New12] Ludomir Newelski. Bounded orbits and measures on a group. Israel
J. Math., 187:209–229, 2012.
[NP06]
Ludomir Newelski and Marcin Petrykowski. Weak generic types
and coverings of groups. I. Fund. Math., 191(3):201–225, 2006.
[Phe01]
Robert R Phelps. Lectures on Choquet’s theorem, volume 1757.
Springer, 2001.
46
[Pil04]
Anand Pillay. Type-definability, compact Lie groups, and ominimality. Journal of Mathematical Logic, 4(02):147–162, 2004.
[Poi87]
Bruno Poizat. Groupes stables: une tentative de conciliation entre la géométrie algébrique et la logique mathématique, volume 2.
Launay, 1987.
[Poi01]
Bruno Poizat. Stable groups, volume 87 of Mathematical Surveys
and Monographs. American Mathematical Society, Providence, RI,
2001. Translated from the 1987 French original by Moses Gabriel
Klein.
[PY16]
Anand Pillay and Ningyuan Yao. On minimal flows, definably
amenable groups, and o-minimality. Advances in Mathematics,
290:483–502, 2016.
[Sel13]
Zlil Sela. Diophantine geometry over groups viii: Stability. Annals
of Mathematics, 177(3):787–868, 2013.
[She71]
Saharon Shelah. Stability, the f.c.p., and superstability; model
theoretic properties of formulas in first order theory. Ann. Math.
Logic, 3(3):271–362, 1971.
[She08]
Saharon Shelah. Minimal bounded index subgroup for dependent theories. Proceedings of the American Mathematical Society,
136(3):1087–1091, 2008.
[She09]
Saharon Shelah. Dependent first order theories, continued. Israel
Journal of Mathematics, 173(1):1–60, 2009.
[Sim11]
Barry Simon. Convexity: An analytic viewpoint, volume 187. Cambridge University Press, 2011.
[Sim15a] Pierre Simon. A guide to NIP theories. Cambridge University
Press, 2015.
[Sim15b] Pierre Simon. Rosenthal compacta and NIP formulas. Fundamenta
Mathematicae, 231(1):81–92, 2015.
[Sta16]
Sergei Starchenko. NIP, Keisler measures and combinatorics.
Séminaire BOURBAKI, page 68, 2016.
47
[VC71]
Vladimir N Vapnik and A Ya Chervonenkis. On the uniform convergence of relative frequencies of events to their probabilities. Theory
of Probability & Its Applications, 16(2):264–280, 1971.
[Wag00] Frank O. Wagner. Simple theories, volume 503 of Mathematics and
its Applications. Kluwer Academic Publishers, Dordrecht, 2000.
[Wal00] Peter Walters.
Springer, 2000.
[Zil]
An introduction to ergodic theory, volume 79.
B. Zilber. Uncountably Categorical Theories. Translations of mathematical monographs. American Mathematical Society.
48
| 4math.GR
|
JMLR: Workshop and Conference Proceedings vol 49:1–30, 2016
Optimal Best Arm Identification with Fixed Confidence
Aurélien Garivier
AURELIEN . GARIVIER @ MATH . UNIV- TOULOUSE . FR
arXiv:1602.04589v2 [math.ST] 1 Jun 2016
Institut de Mathématiques de Toulouse; UMR5219
Université de Toulouse; CNRS
UPS IMT, F-31062 Toulouse Cedex 9, France
Emilie Kaufmann
EMILIE . KAUFMANN @ INRIA . FR
Univ. Lille, CNRS, UMR 9189
CRIStAL - Centre de Recherche en Informatique Signal et Automatique de Lille
F-59000 Lille, France
Abstract
We give a complete characterization of the complexity of best-arm identification in one-parameter
bandit problems. We prove a new, tight lower bound on the sample complexity. We propose
the ‘Track-and-Stop’ strategy, which we prove to be asymptotically optimal. It consists in a new
sampling rule (which tracks the optimal proportions of arm draws highlighted by the lower bound)
and in a stopping rule named after Chernoff, for which we give a new analysis.
Keywords: multi-armed bandits, best arm identification, MDL.
1. Introduction
A multi-armed bandit model is a paradigmatic framework of sequential statistics made of K probability distributions ν1 , . . . , νK with respective means µ1 , . . . , µK : at every time step t = 1, 2, . . .
one arm At ∈ A = {1, . . . , K} is chosen and a new, independent reward Xt is drawn from νAt .
Introduced in the 1930s with motivations originally from clinical trials, bandit models have raised a
large interest recently as relevant models for interactive learning schemes or recommender systems.
A large part of these works consisted in defining efficient strategies for maximizing the expected cumulated reward E[X1 + · · · + Xt ]; see for instance Bubeck and Cesa-Bianchi (2012) for a survey. A
good understanding of this simple model has allowed for efficient strategies in much more elaborate
settings, for example including side information (Abbasi-Yadkori et al., 2011; Agrawal and Goyal,
2013), infinitely many arms (Srinivas et al., 2010; Bubeck et al., 2011), or for the search of optimal
strategies in games (Munos, 2014), to name just a few.
In some of these applications, the real objective is not to maximize the cumulated reward, but
rather to identify the arm that yields the largest mean reward µ∗ = max1≤a≤K µa , as fast and
accurately as possible, regardless of the number of bad arm draws. Let Ft = σ(X1 , . . . , Xt ) be the
sigma-field generated by the observations up to time t. A strategy is then defined by:
• a sampling rule (At )t , where At is Ft−1 -measurable;
• a stopping rule τ , which is a stopping time with respect to Ft ;
• and a Fτ -measurable decision rule âτ .
The goal is to guarantee that âτ ∈ argmax µa with the highest possible probability while minimizing
the number τ of draws. Two settings have been considered in the literature. In the fixed-budget
setting, the number of draws is fixed in advance, and one aims at minimizing the probability of
c 2016 A. Garivier & E. Kaufmann.
G ARIVIER K AUFMANN
error P(âτ ∈
/ argmax µa ). In the fixed-confidence setting a maximal risk δ is fixed, and one looks
for a strategy guaranteeing that P(âτ ∈
/ argmax µa ) ≤ δ (such a strategy is called δ-PAC) while
minimizing the sample complexity E[τ ].
The aim of this paper is to propose an analysis of the best arm identification problem in the fixedconfidence setting. For the sake of clarity and simplicity, we suppose that there is a single arm with
highest expectation, and without loss of generality that µ1 > µ2 ≥ · · · ≥ µK . We also focus on the
simple case where the distributions are parameterized by their means, as in one-parameter exponential families, and we index probabilities and expectations by the parameter µ = (µ1 , . . . , µK ). The
Kullback-Leibler divergence of two distributions of means µ1 and µ2 is a function d : (µ1 , µ2 ) →
R+ . Two cases are of particular interest: the Gaussian case, with d(x, y) = (x − y)2 /(2σ 2 ), and
binary rewards with d(x, y) = kl(x, y) := x log(x/y) + (1 − x) log((1 − x)/(1 − y)).
Several strategies have been proposed to minimize Eµ [τ ]. While racing strategies are based on
successive eliminations of apparently sub-optimal arms (Even-Dar et al. (2006); Kaufmann and Kalyanakrishnan
(2013)), another family of strategies exploits the use of upper and lower confidence bounds on the
means of the arms (Kalyanakrishnan et al. (2012); Gabillon et al. (2012); Kaufmann and Kalyanakrishnan
(2013); Jamieson et al. (2014)). They reflect some aspects of the difficulty of the problem, but are
not proved to satisfy any optimality property1 . In particular, there was still a gap between the lower
bounds, involving complexity terms reflecting only partially the structure of the problem, and the
upper bounds on Eµ [τ ] for these particular algorithms, even from an asymptotic point of view. For
the particular case K = 2, this gap was closed in Kaufmann et al. (2014). The tools used there,
however, where specific to the two-arm case and cannot be extended easily.
The first result of this paper is a tight, non-asymptotic lower bound on Eµ [τ ]. This bound
involves a ‘characteristic time’ for the problem, depending on the parameters of the arms, which
does not take a simple form like for example a sum of squared inverse gaps. Instead, it appears as
the solution of an optimization problem, in the spirit of the bounds given by Graves and Lai (1997)
in the context of regret minimization. We give a brief analysis of this optimization problem, and we
provide an efficient numerical solution as well as elements of interpretation.
The second contribution is a new δ-PAC algorithm that asymptotically achieves this lower
bound, that we call the Track-and-Stop strategy. In a nutshell, the idea is to sample so as to equalize
the probability of all possible wrong decisions, and to stop as soon as possible. The stopping rule,
which we name after Chernoff, can be interpreted in three equivalent ways: in statistical terms, as
a generalized likelihood ratio test; in information-theoretic terms, as an application of the Minimal
Description Length principle; and in terms of optimal transportation, in light of the lower bound.
The sampling rule is a by-product of the lower bound analysis, which reveals the existence of optimal proportions of draws for each arm. By estimating and tracking these proportions, our algorithm
asymptotically reaches the optimal sample complexity as δ goes to 0.
The paper is organized as follows. In Section 2, the lower bound is given with a short proof.
Section 3 contains a commented description of our stopping and sampling rules. The analysis of the
resulting algorithm is sketched in Sections 4 (validity of the stopping rule) and 5 (sample complexity
analysis), establishing its asymptotic optimality. Section 6 contains practical comments and results
of numerical experiments, in order to show the efficiency of our strategy even for moderate values
1. Optimality is mentioned in several articles, with different and sometimes weak meanings (minimax, rate-optimal,...).
In our view, BAI algorithms for which there exists a model with a sample complexity bounded, up to a multiplicative
constant, by some quantity related to some lower bound, may not be called optimal.
2
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
of δ. We also briefly comment on the gain over racing strategies, which can be explained in light of
Theorem 1. Most proofs and technical details are postponed to the Appendix.
2. Lower Bounds on the sample complexity
The pioneering work of Lai and Robbins (1985) has popularized the use of changes of distributions
to show problem-dependent lower bounds in bandit problems: the idea is to move the parameters
of the arms until a completely different behavior of the algorithm is expected on this alternative
bandit model. The cost of such a transportation is induced by the deviations of the arm distributions: by choosing the most economical move, one can prove that the alternative behavior is not
too rare in the original model. Recently, Kaufmann et al. (2014) and Combes and Proutière (2014)
have independently introduced a new way of writing such a change of measure, which relies on
a transportation lemma that encapsulates the change of measure and permits to use it at a higher
level. Here we go one step further by combining several changes of measures at the same time, in
the spirit of Graves and Lai (1997). This allows us to prove a non-asymptotic lower bound on the
sample complexity valid for any δ-PAC algorithm on any bandit model with a unique optimal arm.
We present this result in the particular case of arms that belong to a canonical exponential family,
dνθ
= exp θx − b(θ) ,
P = (νθ )θ∈Θ :
dξ
where Θ ⊂ R, ξ is some reference measure on R and b : Θ → R is a convex, twice differentiable
function. A distribution νθ ∈ P can be parameterized by its mean ḃ(θ), and for every µ ∈ ḃ(Θ) we
denote by ν µ be the unique distribution in P with expectation µ. Unfamiliar readers may simply
think of Bernoulli laws, or Gaussian distributions with known variance. As explained in Cappé et al.
(2013, see also references therein), the Kullback-Leibler divergence from νθ to νθ′ induces a divergence function d on ḃ(Θ) defined, if ḃ(θ) = µ and ḃ(θ ′ ) = µ′ , by
′
d(µ, µ′ ) = KL(ν µ , ν µ ) = KL(νθ , νθ′ ) = b(θ ′ ) − b(θ) − ḃ(θ)(θ ′ − θ) .
With some abuse of notation, an exponential family bandit model ν = (ν µ1 , . . . , ν µK ) is identified
with the means of its arms µ = (µ1 , . . . , µK ).
2.1. General Lower Bound
Denote by S a set of exponential bandit models such that each bandit model µ = (µ1 , . . . , µK ) in S
has a unique optimal arm: for each µ ∈ S, there exists an arm a∗ (µ) such that µa∗ (µ) > max{µa :
a 6= a∗ (µ)}. Fixed-confidence strategies depend on the risk level and we subscript stopping rules
by δ. A strategy is called δ-PAC if for every µ ∈ S, Pµ (τδ < ∞) = 1 and Pµ (âτδ 6= a∗ ) ≤ δ. We
introduce
Alt(µ) := {λ ∈ S : a∗ (λ) 6= a∗ (µ)} ,
the set of problems where the optimal arm is not the same as in µ, and ΣK = {ω ∈ Rk+ : ω1 + · · · +
ωK = 1} the set of probability distributions on A.
Theorem 1 Let δ ∈ (0, 1). For any δ-PAC strategy and any bandit model µ ∈ S,
Eµ [τδ ] ≥ T ∗ (µ) kl(δ, 1 − δ),
3
G ARIVIER K AUFMANN
where
∗
−1
T (µ)
:= sup
inf
w∈ΣK λ∈Alt(µ)
K
X
!
wa d(µa , λa )
a=1
.
(1)
Remark 2 As kl(δ, 1 − δ) ∼ log(1/δ) when δ goes to zero, Theorem 1 yields the asymptotic lower
bound
Eµ [τδ ]
≥ T ∗ (µ).
lim inf
δ→0 log(1/δ)
A non-asymptotic version can be obtained for example from the inequality kl(δ, 1−δ) ≥ log(1/(2.4δ))
that holds for all δ ∈ (0, 1), given in Kaufmann et al. (2015).
We will see that the supremum in Equation (1) is indeed a maximum, and we call
!
K
X
∗
w (µ) := argmax inf
wa d(µa , λa )
w∈ΣK
λ∈Alt(µ)
a=1
the corresponding distribution on the arms. The proof of Theorem 1 shows that w∗ is the proportion
of arm draws of any strategy matching this lower bound.
The particular case where S is the class of bandit models with Poisson rewards in which all
suboptimal arms are equal is considered in the very insightful paper by Vaidhyan and Sundaresan
(2015), where a closed-form formula is given for both T ∗ (µ) and w∗ (µ). In this paper, we consider
best arm identification in all possible bandit models with a single best arm, and in the rest of the
paper we fix
S :=
µ : ∃a ∈ A : µa > max µi .
i6=a
Proof of Theorem 1. Let δ ∈ (0, 1), µ ∈ S, and consider a δ-PAC strategy. For every t ≥ 1,
denote by Na (t) the (random) number of draws of arm a up to time t. The ‘transportation’ Lemma
1 of Kaufmann et al. (2015) relates the expected number of draws of each arm and the KullbackLeibler divergence of two bandit models with different optimal arms to the probability of error δ:
∗
∗
∀λ ∈ S : a (λ) 6= a (µ),
K
X
a=1
d(µa , λa )Eµ [Na (τδ )] ≥ kl(δ, 1 − δ).
(2)
Instead of choosing for each arm a a specific instance of λ that yields a lower bound on Eµ [Na (τδ )],
we combine here the inequalities given by all alternatives λ:
!
!
K
K
X
X
Eµ [Na ]
Eµ [Na ]
kl(δ, 1 − δ) ≤ inf Eµ [τδ ]
d(µa , λa ) = Eµ [τδ ] inf
d(µa , λa )
Eµ [τδ ]
Eµ [τδ ]
λ∈Alt(µ)
λ∈Alt(µ)
a=1
a=1
!
K
X
wa d(µa , λa ) ,
≤ Eµ [τδ ] sup inf
w∈ΣK λ∈Alt(µ)
as Eµ [τδ ] =
a=1
PK
a=1 Eµ [Na (τδ )].
In the last inequality, the strategy-dependent proportions of arm draws are replaced by their supremum so as to obtain a bound valid for any δ-PAC algorithm; one can see that a strategy may reach
this bound only if it meets the w∗ (µ). To make this bound useful, it remains to study T ∗ and w∗ .
4
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
2.2. About the Characteristic Time and the Optimal Proportions
We study here the optimization problem (1), so as to better understand the function T ∗ and w∗
(Proposition 6), and in order to provide an efficient algorithm for computing first w∗ (µ) (Theorem 5), then T ∗ (µ) (Lemma 3). The main ideas are outlined here, while all technical details are
postponed to Appendix A. Simplifying T ∗ (µ) requires the introduction of the following parameterized version of the Jensen-Shannon divergence (which corresponds to α = 1/2): for every
α ∈ [0, 1], let
Iα (µ1 , µ2 ) := αd µ1 , αµ1 + (1 − α)µ2 + (1 − α)d µ2 , αµ1 + (1 − α)µ2 .
(3)
The first step is, for any w, to identify the minimizer of the transportation cost:
Lemma 3 For every w ∈ ΣK ,
inf
λ∈Alt(µ)
K
X
!
wa d(µa , λa )
a=1
= min (w1 + wa )I
a6=1
w1
w1 +wa
(µ1 , µa ) .
It follows that
T ∗ (µ)−1 =
sup min (w1 + wa )I
w∈ΣK a6=1
w1
w1 +wa
w∗ (µ) = argmax min (w1 + wa )I
w∈ΣK
a6=1
(µ1 , µa ) , and
w1
w1 +wa
(µ1 , µa ) .
It is easy to see that, at the optimum, the quantities (w1 + wa )Iw1 /(w1 +wa ) (µ1 , µa ) are all equal.
Lemma 4 For all a, b ∈ {2, . . . , K},
(w1∗ + wa∗ )I
∗
w1
∗ +w∗
w1
a
(µ1 , µa ) = (w1∗ + wb∗ )I
∗
w1
∗ +w∗
w1
b
(µ1 , µb ) .
This permits to obtain a more explicit formula for w∗ (µ) involving only a single real parameter.
Indeed, for every a ∈ {2, . . . K} let
ga (x) = (1 + x)I
1
1+x
(µ1 , µa ) .
(4)
The function ga is a strictly increasing one-to-one mapping from [0, +∞[ onto [0, d(µ1 , µa )[. We
define xa : [0, d(µ1 , µa )[→ [0, +∞[ as its inverse function: xa (y) = ga−1 (y). Denoting x1 the
function constantly equal to 1, one obtains the following characterization of w∗ (µ):
Theorem 5 For every a ∈ A,
xa (y ∗ )
wa∗ (µ) = PK
,
∗
a=1 xa (y )
where y ∗ is the unique solution of the equation Fµ (y) = 1, and where
K d µ1 , µ1 +xa (y)µa
X
1+xa (y)
Fµ : y 7→
µ1 +xa (y)µa
a=2 d µa , 1+xa (y)
(5)
(6)
is a continuous, increasing function on [0, d(µ1 , µ2 )[ such that Fµ (0) = 0 and Fµ (y) → ∞ when
y → d(µ1 , µ2 )).
5
G ARIVIER K AUFMANN
Thus, w∗ can be simply computed by applying (for example) the bisection method to a function
whose evaluations requires the resolution of K smooth scalar equations. By using efficient numerical solvers, we obtain a fast algorithm of complexity, roughly speaking, proportional to the number
of arms. This characterization of w∗ (µ) also permits to obtain a few sanity-check properties, like
for example:
Proposition 6
1. For all µ ∈ S, for all a, wa∗ (µ) 6= 0.
2. w∗ is continuous in every µ ∈ S.
∗ (µ).
3. If µ1 > µ2 ≥ · · · ≥ µK , one has w2∗ (µ) ≥ · · · ≥ wK
Observe that one may have2 w2 > w1 . In general, it is not possible to give closed-form formulas
for T ∗ (µ) and w∗ (µ). In particular, T ∗ (µ) cannot be written as a sum over the arms of individual
complexity terms as in previous works (Mannor and Tsitsiklis (2004); Kaufmann et al. (2015)). But
the following particular cases can be mentioned.
Two-armed bandits. For a two-armed bandit model µ = (µ1 , µ2 ), T ∗ (µ) and w∗ (µ) can be
computed algebraically. Lemma 3 and the fact that w2 = 1 − w1 imply that
T ∗ (µ)−1 =
sup Iα (µ1 , µa ),
α∈(0,1)
Some algebra shows that the maximum is reached at α = α∗ (µ1 , µ2 ) defined by the equation
d(µ1 , µ∗ ) = d(µ2 , µ∗ ), where µ∗ = α∗ (µ1 , µ2 )µ1 +(1−α∗ (µ1 , µ2 ))µ2 . The value of the maximum
is then the ‘reversed’ Chernoff information d∗ (µ1 , µ2 ) := d(µ1 , µ∗ ) = d(µ2 , µ∗ ). This permits to
recover the bound already given in Kaufmann et al. (2014):
Eµ [τδ ] ≥
kl(δ, 1 − δ)
.
d∗ (µ1 , µ2 )
The Gaussian case. When d(x, y) = (x − y)2 /(2σ 2 ), T ∗ (µ) and w∗ (µ) can be computed by
solving a rational equation. Indeed, Equation (6) and Lemma 4 imply that
K
X
a=2
x2a = 1 and
K
X
λ2
xa
λ
=
,
thus
=1
2−λ 2
1 + xa
(µ1 − µa )2
(µ
−
µ
)
1
a
a=2
for some λ ∈ (0, (µ1 − µ2 )2 ). For K = 3, λ is the solution of a polynomial equation of degree
4 and has therefore an (obscure) algebraic expression. The following inequalities, established in
Appendix A.4 give a better insight of the order of magnitude of T ∗ (µ): if ∆1 = ∆2 and ∆a =
µ1 − µa for a ≥ 2, then
K
K
X
X
2σ 2
2σ 2
∗
≤
T
(µ)
≤
2
.
∆2a
∆2a
a=1
a=1
2. This can happen when the right-deviations of ν µ2 are smaller than the left-deviations of ν µ1 ; for example, with
Bernoulli arms of parameters µ = (0.5, 0.1, 0.02), ν ∗ (µ) ≈ (39%, 42%, 19%).
6
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
3. The Track-and-Stop Strategy
We now describe a new strategy which is the first (as far as we know) to asymptotically match the
lower bound of Theorem 1. Denote by µ̂(t) =
P(µ̂1 (t), . . . , µ̂K (t)) the current maximum likelihood
estimate of µ at time t: µ̂a (t) = Na (t)−1 s≤t Xs 1{As = a}. As seen in Section 2, a good
sampling rule should respect the optimal proportions of arm draws given by w∗ (µ). There are
several ways to ensure this, and we present two of them in Section 3.1. A good stopping rule should
determine the earliest moment when sufficient statistical evidence has been gathered for identifying
the best arm: we propose one (with several interpretations) in Section 3.2, showing in Section 4
how to tune it in order to ensure the δ-PAC property. As for the decision rule, we simply choose
âτδ = argmax µ̂a (τδ ). The optimality of the Track-and-Stop strategy is shown in Section 5.
a∈A
3.1. Sampling Rule: Tracking the Optimal Proportions
The first idea for matching the proportions w∗ (µ) is to track the plug-in estimates w∗ (µ̂(t)). In
bandit settings, using plug-in estimates is always hazardous, because bad initial estimate may lead
to abandon an arm and to prevent further observations that would correct the initial error. Indeed,
one may see (both theoretically and in numerical experiments) that a naive plug-in sampling rule
sometimes fails. But there is a very simple fix, which consists in forcing sufficient exploration of
each arm to ensure a (sufficiently fast) convergence of µ̂(t).
The shortest way to do this (which we term C-Tracking) is to slightly alter the optimization
solu
tion: for every ǫ ∈ (0, 1/K], let wǫ (µ) be a L∞ projection of w∗ (µ) onto ΣǫK = (w1 , . . . , wK ) ∈
[ǫ, 1] : w1 + · · · + wK = 1 . Choosing ǫt = (K 2 + t)−1/2 /2 and
t
X
waǫs (µ̂(s)) − Na (t) ,
At+1 ∈ argmax
1≤a≤K s=0
we prove in Appendix B that:
Lemma 7 For all t ≥ 1 and a ∈ A, the C-Tracking rule ensures that Na (t) ≥
and that
t−1
X
√
wa∗ (µ̂(s)) ≤ K(1 + t) .
max Na (t) −
1≤a≤K
√
t + K 2 − 2K
s=0
It is slightly more efficient in practice to target directly w∗ (µ̂(t)),
√ and to force exploration steps
whenever an arm is in deficit. Introducing Ut = {a : Na (t) < t − K/2}, the D-Tracking rule
(At ) is sequentially defined as
At+1 ∈
argmin Na (t) if Ut 6= ∅
(forced exploration)
a∈Ut
argmax t wa∗ (µ̂(t)) − Na (t) (direct tracking)
1≤a≤K
√
Lemma 8 The D-Tracking rule ensures that Na (t) ≥ ( t − K/2)+ − 1 and that for all ǫ > 0, for
all t0 , there exists tǫ ≥ t0 such that
sup max |wa∗ (µ̂(t)) − wa∗ (µ)| ≤ ǫ
t≥t0
a
⇒
sup max
t≥tǫ
7
a
Na (t)
− wa∗ (µ) ≤ 3(K − 1)ǫ .
t
G ARIVIER K AUFMANN
It is guaranteed under all these sampling rules that the empirical proportion of draws of each arm
converges to the optimal proportion, as proved in Appendix B.3.
Proposition 9 The C-Tracking and D-Tracking sampling rules both satisfy
Na (t)
∗
= wa (µ) = 1 .
Pw lim
t→∞
t
We actually have a little more: a minimal convergence speed of µ̂ to µ, which proves useful in
the analysis of the expected sample complexity. Of course, other tracking strategies are possible,
like for example the one introduced in Antos et al. (2008) for the uniform estimation of all arms’
expectations.
3.2. Chernoff’s Stopping Rule
From a statistical point of view, the question of stopping at time t is a more or less classical statistical
test: do the past observations allow to assess, with a risk at most δ, that one arm is larger than the
others? For all arms a, b ∈ A, we consider the Generalized Likelihood Ratio statistic
maxµ′a ≥µ′b pµ′a X aNa (t) pµ′b X bNb (t)
,
Za,b (t) := log
maxµ′a ≤µ′b pµ′a X aNa (t) pµ′b X bNb (t)
where X aNa (t) = (Xs : As = a, s ≤ t) is a vector that contains the observations of arm a available
at time t, and where pµ (Z1 , . . . , Zn ) is the likelihood of n i.i.d. observations from wµ :
pµ (Z1 , . . . , Zn ) =
n
Y
k=1
exp(ḃ−1 (µ)Zk − b(ḃ−1 (µ))) .
This statistic has a convenient closed-form expression for exponential family bandit models. Introducing for all arms a, b a weighted average of their empirical mean:
µ̂a,b (t) :=
Na (t)
Nb (t)
µ̂a (t) +
µ̂b (t) ,
Na (t) + Nb (t)
Na (t) + Nb (t)
it is well known and easy to see that if µ̂a (t) ≥ µ̂b (t),
Za,b (t) = Na (t) d µ̂a (t), µ̂a,b (t) + Nb (t) d µ̂b (t), µ̂a,b (t) ,
(7)
τδ = inf {t ∈ N : ∃a ∈ A, ∀b ∈ A \ {a}, Za,b (t) > β(t, δ)}
= inf t ∈ N : Z(t) := max min Za,b (t) > β(t, δ) ,
(8)
and that Za,b (t) = −Zb,a (t). The testing intuition thus suggests the following stopping rule:
a∈A b∈A\{a}
where β(t, δ) is an exploration rate to be tuned appropriately. The form of this stopping rule can
be traced back to Chernoff (1959)3 . As minb∈A\a Za,b (t) is non-negative if and only if µ̂a (t) ≥
3. The stopping rule τδ was proposed under equivalent form (with a different threshold) in the context of adaptive sequential hypothesis testing. Best arm identification in a bandit model can be viewed as a particular instance in which
we test K hypotheses, Ha : (µa = maxi∈A µi ), based on adaptively sampling the marginal of ν = (ν µ1 , . . . , ν µK ).
However, Chernoff (1959) considers a different performance criterion, and its analysis holds when each of the hypotheses consists in a finite set of parameters, unlike the bandit setting.
8
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
µ̂b (t) for all b 6= a, Z(t) = minb∈A\ât Zât ,b (t) whenever
there is a unique best empirical arm
ât = argmaxa∈A µ̂a (t) at time t. Obviously, µ̂a (τδ ) a has a unique maximizer, which is the final
decision.
In addition to the testing interpretation given above, the stopping rule can be explained in light
of the lower bound Eµ [τδ /T ∗ (µ)] ≥ kl(δ, 1 − δ). Indeed, one may write
Z(t) = t
min
λ∈Alt(µ̂(t))
K
X
Na (t)
a=1
t
d(µ̂a (t), λa ) ≤
T∗
t
.
µ̂(t)
Theorem 1 suggests that a δ-PAC strategy cannot stop (at least in expectation) before t/T ∗ µ̂(t) is
larger than kl(δ, 1 − δ) ∼ log(1/δ), which suggests to stop when Z(t) ≥ log(1/δ). In Section 4,
we prove that a slightly more prudent choice of the threshold β(t, δ) does lead to a PAC algorithm
(whatever the sampling rule, even if the proportions of draws are sub-optimal). And it is shown in
Section 5 that, using our sampling rule, E[τδ ] is indeed of order T ∗ (µ) log(1/δ).
It is also possible to give a Minimum Description Length (MDL) interpretation of the stopping
rule. It is well known that choosing the model that gives the shortest description of the data is
a provably efficient heuristic (see Rissanen (1978), and Grünwald (2007) for a survey). In some
sense, the stopping rule presented above follows the same principle. In fact, elementary algebra
shows that
Za,b (t) = (Na (t) + Nb (t))h (µ̂a,b (t)) − [Na (t)h(µ̂a (t)) + Nb (t)h(µ̂b (t))] ,
where h(µ) = EX∼ν µ [− log pµ (X)] = b(ḃ−1 (µ)) − ḃ−1 (µ)µ. In the Bernoulli case, the Shannon
entropy h(µ) = −µ log(µ) − (1 − µ) log(1 − µ) is well-known to represent an ideal code length per
character for binary compression. Thus, Za,b (t) appears as the difference between the ideal code
length for the rewards of arms a and b coded together, and the sum of the ideal code lengths for the
rewards coded separately. If this difference is sufficiently large4 , the shortest description of the data
is to separate arms a and b. The stopping rule (8) thus consists in waiting for the moment when it
becomes cheaper to code the rewards of the best empirical arm separately from each of the others.
It is no surprise that the proof of Proposition 10 below is based on a classical information-theoretic
argument.
4. Choosing the Threshold in the Stopping Rule
We now explain how to choose the threshold β(t, δ) so as to ensure the δ-PAC property: with
probability larger than 1 − δ, any algorithm based on the stopping rule (8) outputs the optimal arm,
provided that it stops. The interpretations of the stopping rule presented in the last section suggest
the presence of two ingredients: log(1/δ) for the risk, and log(t) for the fluctuations of the counts.
We present here two results: one is based on an information-theoretic argument used for consistency
proofs of MDL estimators, and the second is based on the probabilistic control of self-normalized
averages taken from Magureanu et al. (2014). To keep things simple, the first argument is detailed
only for the case of Bernoulli rewards (the standard framework of coding theory). The second
argument is more general, but a little less tight.
4. Universal coding theory would suggest a threshold of order log(t)/2, a term that will appear in Section 4.
9
G ARIVIER K AUFMANN
The Informational Threshold.
Theorem 10 Let δ ∈ (0, 1). Whatever the sampling strategy, using Chernoff’s stopping rule (8)
on Bernoulli bandits with threshold
2t(K − 1)
β(t, δ) = log
δ
ensures that for all µ ∈ S, Pµ (τδ < ∞, âτδ 6= a∗ ) ≤ δ.
Proof sketch. A more detailed proof is given in Appendix C.1. We proceed here similarly to Vaidhyan and Sundaresan
(2015), employing an argument used for MDL consistency proofs (see Garivier (2006) and references therein). Introducing, for a, b ∈ A, Ta,b := inf{t ∈ N : Za,b (t) > β(t, δ)}, one has
Pµ (τδ < ∞, âτδ 6= a∗ ) ≤ Pµ (∃a ∈ A \ a∗ , ∃t ∈ N : Za,a∗ (t) > β(t, δ))
X
≤
Pµ (Ta,a∗ < ∞) .
a∈A\{a∗ }
It is thus sufficient to show that if β(t, δ) = log(2t/δ),
and if µa < µb , then Pµ (Ta,b < ∞) ≤ δ.
For such a pair of arms, observe that on the event Ta,b = t time t is the first moment when Za,b
exceeds the threshold β(t, δ), which implies by definition that
1 ≤ e−β(t,δ)
maxµ′a ≥µ′b pµ′a (X at )pµ′b (X bt )
maxµ′a ≤µ′b pµ′a (X at )pµ′b (X bt )
.
It thus holds that
Pµ (Ta,b < ∞) =
≤
≤
=
∞
X
t=1
∞
X
t=1
∞
X
t=1
∞
X
Pµ (Ta,b = t) =
t=1
t=1
"
e−β(t,δ) Eµ 1(Ta,b =t)
−β(t,δ)
"
e
Eµ 1(Ta,b =t)
e−β(t,δ)
Z
{0,1}t
∞
X
i
h
Eµ 1(Ta,b =t)
maxµ′a ≥µ′b pµ′a (X at )pµ′b (X bt )
#
maxµ′a ≥µ′b pµ′a (X at )pµ′b (X bt )
#
maxµ′a ≤µ′b pµ′a (X at )pµ′b (X bt )
pµa (X at )pµb (X bt )
1(Ta,b =t) (x1 , . . . , xt ) max′ pµ′a (xat )pµ′b (xbt )
µ′a ≥µb
|
Y
pµi (xit ) dx1 . . . dxt .
i∈A\{a,b}
{z
(∗)
}
Of course the maximum likelihood (∗) is not a probability density. A possible workaround (sometimes referred to as Barron’s lemma, see Barron et al. (1998) and references therein) is to use a
universal distribution like Krichevsky and Trofimov (1981), which is known to provide a tight uniform approximation:
Lemma 11 [Willems et al. (1995)] Let pu (x) be the likelihood of successive observations x ∈
{0, 1}n of a Bernoulli random variable with mean u. Then the Krichevsky-Trofimov distribution
Z 1
1
p
pu (x)du
kt(x) =
0 π u(1 − u)
10
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
is a probability law on {0, 1}n that satisfies
√
pu (x)
≤2 n.
x∈{0,1}n u∈[0,1] kt(x)
sup
Together with the inequality
is upper-bounded by
∞
X
ab ≤ (a+b)/2, this property permits to conclude that Pµ (Ta,b < ∞)
:=I(x1 ,...,xt )
−β(t,δ)
2te
t=1
=
√
sup
∞
X
t=1
Z
{0,1}t
}| Y
z
a
b
1(Ta,b =t) (x1 , . . . , xt ) kt(xt )kt(xt )
h
i∈A\{a,b}
{
pµi (xit ) dx1 . . . dxt
i
2te−β(t,δ) Ẽ 1(Ta,b =t) ≤ δ P̃(Ta,b < ∞) ≤ δ,
using that the partially integrated likelihood I(x1 , . . . , xt ) is the density of a probability measure P̃
(we denote the corresponding expectation by Ẽ).
The Deviational Threshold. The universal coding argument above can be adapted to other distributions, as shown for example in Chambaz et al. (2009). It is also possible to make use of a
deviation result like Magureanu et al. (2014) in order to prove PAC guarantees in any exponential
family bandit model. The exploration rate involved are slightly larger and less explicit.
Proposition 12 Let µ be an exponential family bandit model. Let δ ∈ (0, 1) and α > 1. There
exists a constant C = C(α, K) such that whatever the sampling strategy, using Chernoff’s stopping
rule (8) with the threshold
α
Ct
β(t, δ) = log
δ
ensures that for all µ ∈ S, Pµ τδ < ∞, âτδ 6= a∗ ≤ δ.
The proof of Proposition 12 is given in Appendix C.2.
5. Sample Complexity Analysis
Combining Chernoff’s stopping rule and an optimal-tracking sampling rule permits to approach the
lower bound of Theorem 1 for sufficiently small values of the risk δ. We first state a simple almostsure convergence result and give its short proof. Then, we sketch the (somewhat more technical)
analysis controlling the expectation of τδ .
5.1. Almost-sure Upper Bound
Proposition 13 Let α ∈ [1, e/2] and r(t) = O(tα ). Using Chernoff’s stopping rule with β(t, δ) =
log(r(t)/δ), and any sampling rule ensuring that for every arm a ∈ A, Na (t)/t converges almostsurely to wa∗ guarantees that for all δ ∈ (0, 1), Pµ (τδ < +∞) = 1 and
τδ
∗
≤ αT (µ) = 1.
Pµ lim sup
δ→0 log(1/δ)
11
G ARIVIER K AUFMANN
Proof.
Let E be the event
Na (t)
∗
→ w and µ̂(t) → µ .
E = ∀a ∈ A,
t→∞
t t→∞ a
From the assumption on the sampling strategy and the law of large number, E is of probability 1.
On E, there exists t0 such that for all t ≥ t0 , µ̂1 (t) > maxa6=1 µ̂a (t) and
Z(t) = min Z1,a (t) = min N1 (t)d(µ̂1 (t), µ̂1,a (t)) + Na (t)d(µ̂a (t), µ̂1,a (t))
a6=1
a6=1
N1 (t) Na (t)
= t min
+
I
(µ̂
(t),
µ̂
(t))
.
N1 (t)/t
1
a
a6=1
t
t
N1 (t)/t+Na (t)/t
For all a ≥ 2, the mapping (w, λ) → (w1 + wa )Iw1 /(w1 +wa ) (λ1 , λa ) is continuous at (w∗ (µ), µ).
Therefore, for all ǫ > 0 there exists t1 ≥ t0 such that for all t ≥ t1 and all a ∈ {2, . . . , K},
w∗ + wa∗
N1 (t) Na (t)
(µ̂1 (t), µ̂a (t)) ≥ 1
+
I w1∗ (µ1 , µa ) .
I
N1 (t)/t
t
t
1 + ǫ w∗ +w
∗
N1 (t)/t+Na (t)/t
a
1
Hence, for t ≥ t1 ,
Z(t) ≥
t
t
min (w1∗ + wa∗ ) I w1∗ (µ1 , µa ) =
.
1 + ǫ a6=1
(1 + ǫ)T ∗ (µ)
∗ +w∗
w1
a
Consequently,
τδ = inf{t ∈ N : Z(t) ≥ β(t, δ)}
≤ t1 ∨ inf{t ∈ N : t(1 + ǫ)−1 T ∗ (µ)−1 ≥ log(r(t)/δ)}
≤ t1 ∨ inf{t ∈ N : t(1 + ǫ)−1 T ∗ (µ)−1 ≥ log(Ctα /δ)},
for some positive constant C. Using the technical Lemma 18 in the Appendix, it follows that on E,
as α ∈ [1, e/2],
Ce((1 + ǫ)T ∗ (µ))α
C((1 + ǫ)T ∗ (µ))α
∗
τδ ≤ t1 ∨ α(1 + ǫ)T (µ) log
+ log log
.
δ
δ
Thus τδ is finite on E for every δ ∈ (0, 1), and
lim sup
δ→0
τδ
≤ (1 + ǫ) α T ∗ (µ) .
log(1/δ)
Letting ǫ go to zero concludes the proof.
5.2. Asymptotic Optimality in Expectation
In order to prove that the lower bound of Theorem 1 is matched, we now give an upper bound on
the expectation of the stopping time τδ . The proof of this result is to be found in Appendix D.
12
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
Theorem 14 Let µ be an exponential family bandit model. Let α ∈ [1, e/2] and r(t) = O(tα ).
Using Chernoff’s stopping rule with β(t, δ) = log(r(t)/δ), and the sampling rule C-Tracking or
D-Tracking,
Eµ [τδ ]
≤ αT ∗ (µ) .
lim sup
log(1/δ)
δ→0
To summarize, for every Bernoulli bandit µ, the choice β(t, δ) = log(2(K − 1)t/δ) in Chernoff’s
stopping rule is δ-PAC (by Theorem 10); with one of the sampling rules given above, the stopping
time τδ is almost surely finite (by Proposition 13) and when δ is small enough its expectation is
close to T ∗ (µ) log(1/δ) by Theorem 14, an optimal sample complexity after Theorem 1.
More generally, for exponential family bandit models, combining Proposition 12 and Theorem 14, one obtains for every α > 1 the existence of an exploration rate for which Chernoff’s
stopping rule combined with a tracking sampling rule is δ-PAC and satisfies
lim sup
δ→0
Eµ [τδ ]
≤ αT ∗ (µ) .
log(1/δ)
6. Discussion and Numerical Experiments
We give here a few comments on the practical behaviour of the Track-and-Stop (T-a-S) strategy.
Let us first emphasize that the forced exploration step are rarely useful, but in some cases really
necessary and not only for the theorems: when µ2 and µ3 are equal, they prevent the probability
that the strategy never ends from being strictly positive. Second, our simulation study suggests that
the exploration rate β(t, δ) = log((log(t) + 1)/δ), though not (yet) allowed by theory, is still overconservative in practice. Further, even though any sampling strategy ensuring that Na (t)/t → wa∗
satisfies the optimality theorems above, we propose (without formal justification) an experimentally
more efficient sampling rule: after t observations, let
ĉt = argmin Zât ,c (t)
c∈A\{ât }
be the ’best challenger’ of the empirical champion ât . We choose At+1 = ât if
wâ∗t (µ̂(t))
Nât (t)
< ∗
∗ (µ̂(t))
Nât (t) + Nĉt (t)
wât (µ̂(t)) + wĉ(t)
and At+1 = ĉt otherwise (with forced explorations steps as in the D-Tracking rule).
We consider two sample scenarios µ1 = [0.5 0.45 0.43 0.4] and µ2 = [0.3 0.21 0.2 0.19 0.18],
and we choose δ = 0.1. This choice is meant to illustrate that our algorithm performs well even for
relatively high risk values (so far, optimality is proved only for small risks). We compare the Trackand-Stop algorithm based on D-Tracking and BestChallenger to algorithms from the literature designed for Bernoulli bandit models, namely KL-LUCB and KL-Racing (Kaufmann and Kalyanakrishnan,
2013). Racing algorithms proceed in rounds: at start, all arms are active; at each round, all active
arms are drawn once; at the end of a round, a rule determines if the empirically worst arm should
be eliminated. Call âr the empirically best arm after r rounds. In KL-Racing, arm b is eliminated if
its upper confidence bound max{q ∈ [0, 1] : rd(µ̂b,r , q) ≤ β(r, δ)} is smaller than the best arm’s
13
G ARIVIER K AUFMANN
lower bound min{q ∈ [0, 1] : rd(µ̂âr ,r , q) ≤ β(r, δ)}. We also introduced in the competition the
‘hybrid’ Chernoff-Racing strategy, which eliminates b if
µ̂â ,r + µ̂b,r
µ̂â ,r + µ̂b,r
+ rd µ̂b,r , r
> β(r, δ).
Zâr ,b = rd µ̂âr ,r , r
2
2
Table 1 presents the estimated average number of draws of the five algorithms in the two scenarios.
Our (Julia) code will be available online. We see that the use of the MDL stopping rule leads to
a clear improvement. Moreover, Chernoff-Racing significantly improves over KL-Racing, and its
performance is even close to that of our optimal algorithms.
µ1
µ2
T-a-S (BC)
3968
1370
T-a-S (D-Tracking)
4052
1406
Chernoff-Racing
4516
3078
KL-LUCB
8437
2716
KL-Racing
9590
3334
Table 1: Expected number of draws Eµ [τδ ] for δ = 0.1, averaged over N = 3000 experiments: µ1 = [0.5 0.45 0.43 0.4], w∗ (µ1 ) = [0.417 0.390 0.136 0.057]; µ2 =
[0.3 0.21 0.2 0.19 0.18], w∗ (µ2 ) = [0.336 0.251 0.177 0.132 0.104].
It should be emphasized that a Racing-type algorithm cannot reach the lower bound in general:
by construction, it forces the last two arms in the race (hopefully µ1 and µ2 ) to be drawn equally
often, which is sub-optimal unless w1∗ (µ) = w∗ (µ2 ) (a condition approximately matched only if
there is a large gap between the second and the third best arms). This is illustrated in the second
scenario µ2 of Table 1, where the ratio w1∗ /w2∗ is larger.
7. Conclusion
We gave a characterization of the complexity of best arm identification in the fixed confidencesetting, for a large class of bandit models with arms parameterized by their means. Our new lower
bound reveals the existence of optimal proportions of draws of the arms that can be computed efficiently. Our Track-and-Stop strategy, by combining a track of these optimal proportions with
Chernoff’s stopping rule, asymptotically matches the lower bound. In future work, instead of using
forced exploration steps within a plugin procedure, we will investigate optimistic (or robust-tonoise) sampling strategies in order to optimize the exploration and to obtain non-asymptotic sample
complexity bounds. Furthermore, we will
investigate the fixed-budget setting, for which we conjecture that P (ât 6= 1) & exp − t/T∗ (µ) with
T∗ (µ)−1 = sup
min
inf
w∈ΣK a∈{2,...,K} µa <ma <µ1
w1 d(ma , µ1 ) + wa d(ma , µa ) .
Acknowledgments
This work was partially supported by the CIMI (Centre International de Mathématiques et d’Informatique) Excellence program while Emilie Kaufmann visited Toulouse in November 2015. The
authors acknowledge the support of the French Agence Nationale de la Recherche (ANR), under
grants ANR-13-BS01-0005 (project SPADRO) and ANR-13-CORD-0020 (project ALICIA). They
thank Sébastien Gerchinovitz for stimulating discussions and comments.
14
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
References
Y. Abbasi-Yadkori, D.Pál, and C.Szepesvári. Improved Algorithms for Linear Stochastic Bandits.
In Advances in Neural Information Processing Systems, 2011.
S. Agrawal and N. Goyal. Thompson Sampling for Contextual Bandits with Linear Payoffs. In
International Conference on Machine Learning (ICML), 2013.
A. Antos, V. Grover, and C. Szepesvári. Active learning in multi-armed bandits. In Algorithmic
Learning Theory, 2008.
A. Barron, J. Rissanen, and Bin Yu. The minimum description length principle in coding and
modeling. Information Theory, IEEE Transactions on, 44(6):2743–2760, Oct 1998. ISSN 00189448. doi: 10.1109/18.720554.
S. Bubeck and N. Cesa-Bianchi. Regret analysis of stochastic and nonstochastic multi-armed bandit
problems. Fondations and Trends in Machine Learning, 5(1):1–122, 2012.
S. Bubeck, R. Munos, G. Stoltz, and C. Szepesvári. X-armed bandits. Journal of Machine Learning
Research, 12:1587–1627, 2011.
O. Cappé, A. Garivier, O-A. Maillard, R. Munos, and G. Stoltz. Kullback-Leibler upper confidence
bounds for optimal sequential allocation. Annals of Statistics, 41(3):1516–1541, 2013.
Antoine Chambaz, Aurélien Garivier, and Elisabeth Gassiat. A MDL approach to HMM with poisson and gaussian emissions. application to order identification. Journal of Statistical Planning
and Inference, 139(3):962–977, 2009.
H. Chernoff. Sequential design of Experiments. The Annals of Mathematical Statistics, 30(3):
755–770, 1959.
R. Combes and A. Proutière. Unimodal Bandits without Smoothness. Technical report, 2014.
E. Even-Dar, S. Mannor, and Y. Mansour. Action Elimination and Stopping Conditions for the
Multi-Armed Bandit and Reinforcement Learning Problems. Journal of Machine Learning Research, 7:1079–1105, 2006.
V. Gabillon, M. Ghavamzadeh, and A. Lazaric. Best Arm Identification: A Unified Approach to
Fixed Budget and Fixed Confidence. In Advances in Neural Information Processing Systems,
2012.
Aurlien Garivier. Consistency of the unlimited BIC context tree estimator. IEEE Transactions on
Information Theory, 52(10):4630–4635, 2006.
T.L. Graves and T.L. Lai. Asymptotically Efficient adaptive choice of control laws in controlled
markov chains. SIAM Journal on Control and Optimization, 35(3):715–743, 1997.
Peter D. Grünwald. The Minimum Description Length Principle (Adaptive Computation and Machine Learning). The MIT Press, 2007. ISBN 0262072815.
15
G ARIVIER K AUFMANN
K. Jamieson, M. Malloy, R. Nowak, and S. Bubeck. lil’UCB: an Optimal Exploration Algorithm
for Multi-Armed Bandits. In Proceedings of the 27th Conference on Learning Theory, 2014.
S. Kalyanakrishnan, A. Tewari, P. Auer, and P. Stone. PAC subset selection in stochastic multiarmed bandits. In International Conference on Machine Learning (ICML), 2012.
E. Kaufmann and S. Kalyanakrishnan. Information complexity in bandit subset selection. In Proceeding of the 26th Conference On Learning Theory., 2013.
E. Kaufmann, O. Cappé, and A. Garivier. On the Complexity of A/B Testing. In Proceedings of the
27th Conference On Learning Theory, 2014.
E. Kaufmann, O. Cappé, and A. Garivier. On the Complexity of Best Arm Identification in MultiArmed Bandit Models. Journal of Machine Learning Research (to appear), 2015.
Raphail E. Krichevsky and Victor K. Trofimov. The performance of universal encoding. IEEE
Transactions on Information Theory, 27(2):199–206, 1981. doi: 10.1109/TIT.1981.1056331.
URL http://dx.doi.org/10.1109/TIT.1981.1056331.
T.L. Lai and H. Robbins. Asymptotically efficient adaptive allocation rules. Advances in Applied
Mathematics, 6(1):4–22, 1985.
S. Magureanu, R. Combes, and A. Proutière. Lipschitz Bandits: Regret lower bounds and optimal
algorithms. In Proceedings on the 27th Conference On Learning Theory, 2014.
S. Mannor and J. Tsitsiklis. The Sample Complexity of Exploration in the Multi-Armed Bandit
Problem. Journal of Machine Learning Research, pages 623–648, 2004.
R. Munos. From bandits to Monte-Carlo Tree Search: The optimistic principle applied to optimization and planning., volume 7. Foundations and Trends in Machine Learning, 2014.
J. Rissanen.
Modeling by shortest data description.
Automatica, 14(5):465 – 471,
1978.
ISSN 0005-1098.
doi: http://dx.doi.org/10.1016/0005-1098(78)90005-5.
URL
http://www.sciencedirect.com/science/article/pii/0005109878900055.
N. Srinivas, A. Krause, S. Kakade, and M. Seeger. Gaussian Process Optimization in the Bandit
Setting : No Regret and Experimental Design. In Proceedings of the International Conference
on Machine Learning, 2010.
N.K. Vaidhyan and R. Sundaresan. Learning to detect an oddball target. arXiv:1508.05572, 2015.
Frans M. J. Willems, Yuri M. Shtarkov, and Tjalling J. Tjalkens. The context tree weighting method:
Basic properties. IEEE Transactions on Information Theory, 41:653–664, 1995.
16
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
Appendix A. Characterization of the optimal proportion of draws
A.1. Proof of Lemma 3
Let µ such that µ1 > µ2 ≥ · · · ≥ µK . Using the fact that
[
Alt(µ) =
{λ ∈ S : λa > λ1 } ,
a6=1
one has
T ∗ (µ)−1 =
=
sup min
inf
K
X
w∈ΣK a6=1 λ∈S:λa >λ1 a=1
sup min
inf
w∈ΣK a6=1 λ:λa ≥λ1
wa d(µa , λa )
[w1 d(µ1 , λ1 ) + wa d(µa , λa )] .
Minimizing
f (λ1 , λa ) = w1 d(µ1 , λ1 ) + wa d(µa , λa )
under the constraint λa ≥ λ1 is a convex optimization problem that can be solved analytically. The
minimum is obtained for
wa
w1
µ1 +
µa
λ1 = λa =
w1 + wa
w1 + wa
and its value can be rewritten (w1 + wa )I
w1
w1 +wa
(µ1 , µa ), using the function Iα defined in (3).
A.2. Proof of Theorem 5
The function ga introduced in (4) rewrites
ga (x) = d (µ1 , ma (x)) + xd(µa , ma (x)), with ma (x) =
µ1 + xµa
.
1+x
d
Using that m′a (x) = (µa − µ1 )/(1 + x)2 and dy
d(x, y) = (y − x)/b̈(b−1 (y)) one can show that ga
is strictly increasing, since ga′ (x) = d(µa , ma (x)) > 0. As ga (x) tends to d(µ1 , µa ) when x goes
to infinity, the inverse function xa (y) = ga−1 (y) is defined on [0, d(µ1 , µa )[ and satisfies
x′a (y) =
1
>0.
d(µa , ma (xa (y)))
Let w ∗ be an element in
argmax min (w1 + wa )I
w∈ΣK
a6=1
w1
w1 +wa
(µ1 , µa ) = argmax w1 min ga
a6=1
w∈ΣK
wa
w1
.
The equality uses that w1∗ 6= 0 (since if w1 = 0, the value of the objective is zero). Introducing
wa∗
x∗a = w
∗ for all a 6= 1, one has
1
w1∗ =
1+
1
PK
∗
a=2 xa
and, for a ≥ 2, wa∗ =
17
1+
x∗a
PK
∗
a=2 xa
G ARIVIER K AUFMANN
and (x∗2 , . . . , x∗K ) ∈ RK−1 belongs to
argmax
(x2 ,...,xK )∈RK−1
mina6=1 ga (xa )
.
1 + x2 + · · · + xK
(9)
We now show that all the ga (x∗a ) have to be equal (Lemma 4). Let
∗
∗
B = b ∈ {2, . . . , K} : gb (xb ) = min ga (xa )
a6=1
and A = {2, . . . , K}\B. Assume that A =
6 ∅. For all a ∈ A and b ∈ B, one has ga (x∗a ) > gb (x∗b ).
Using the continuity of the g functions and the fact that they are strictly increasing, there exists
ǫ > 0 such that
∀a ∈ A, b ∈ B, ga (x∗a − ǫ/|A|)) > gb (x∗b + ǫ/|B|) > gb (x∗b ) .
Introducing xa = x∗a − ǫ/|A| for all a ∈ A and xb = x∗b + ǫ/|B| for all b ∈ B, there exists b ∈ B:
gb (x∗b + ǫ/|B|)
gb (x∗b )
mina6=1 ga (x∗a )
mina6=1 ga (xa )
=
>
=
,
1 + x2 + . . . xK
1 + x∗2 + · · · + x∗K
1 + x∗2 + · · · + x∗K
1 + x∗2 + · · · + x∗K
which contradicts the fact that x∗ belongs to (9). Hence A = ∅ and there exists y ∗ ∈ [0, d(µ1 , µ2 )[
such that
∀a ∈ {2, . . . , K}, ga (x∗a ) = y ∗ ⇔ x∗a = xa (y ∗ ),
with the function xa introduced above. From (9), y ∗ belongs to
G(y) with G(y) =
argmax
y∈[0,d(µ1 ,µ2 )[
y
.
1 + x2 (y) + · · · + xK (y)
G is differentiable and, using the derivative of the xa given above, G′ (y) = 0 is equivalent to
K
X
y
d(µa , ma (xa (y))
= 1 + x2 (y) + · · · + xK (y)
K
X
d(µ1 , ma (xa (y))) + xa (y)d(µa , ma (xa (y))
= 1 + x2 (y) + · · · + xK (y)
a=2
a=2
d(µa , ma (xa (y))
K
X
d(µ1 , ma (xa (y)))
a=2
d(µa , ma (xa (y))
= 1.
(10)
For the the second equality, we use that ∀a, d(µ1 , ma (xa (y))) + xa (y)d(µa , ma (xa (y)) = y. Thus
y ∗ is solution of the equation (10). This equation has a unique solution since
Fµ (y) =
K
X
d(µ1 , ma (xa (y)))
a=2
d(µa , ma (xa (y))
(11)
is strictly increasing and satisfies Fµ (0) = 0 and limy→d(µ1 ,µ2 ) Fµ (y) = +∞. As G is positive and
satisfies G(0) = 0, limy→d(µ1 ,µ2 ) G(y) = 0, the unique local extrema obtained in y ∗ is a maximum.
18
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
A.3. Proof of Proposition 6
Let µ ∈ S, and re-label its arms in decreasing order. From Theorem 5, w1 (µ) 6= 0 and for a ≥ 2,
wa∗ (µ) = 0 ⇔ xa (y ∗ ) = 0 ⇒ y ∗ = 0 where y ∗ is the solution of (10). But 0 is not solution of (10),
since the value of the left-hand side is 0. This proves that for all a, wa∗ (µ) 6= 0. For a given µ, y ∗ is
defined by
Fµ (y ∗ ) − 1 = 0 ,
where Fµ is defined in (11). For all µ ∈ S and every y ∈ [0, d(µ1 , µ2 )[, it can be shown that
d
d
∗
∗
dy Fµ (y) 6= 0, in particular dy Fµ (y ) 6= 0. Thus y is a function of µ that is continuous in every
∗
µ ∈ S, denoted by y (µ). By composition, the function µ 7→ xa (y ∗ (µ)) are continuous in µ ∈ S,
and so does w∗ .
The proof of Statement 3 relies on the fact that if a and b are such that µ1 > µa ≥ µb , ga (x) ≤
gb (x) for all x. Thus, for all y ∈ [0, d(µ1 , µ2 )[, xa (y) ≥ xb (y) and particularizing for y ∗ (µ) yields
the result.
A.4. Bounds on the characteristic time in the Gaussian case
In the Gaussian case, with d(x, y) = (x − y)2 /(2σ 2 ), the expression in Lemma 3 can be made more
explicit and yields
w1 wa ∆2a
T ∗ (µ)−1 = sup inf
.
2
w∈ΣK a6=1 w1 + wa 2σ
Introducing w̃ ∈ ΣK defined by
1/∆2
,
∀a = 1 . . . K, w̃a = PK a
2
i=1 1/∆i
it holds that
w̃1 w̃a ∆2a
1
= PK
a6=1 w̃1 + w̃a 2σ 2
i=1
T ∗ (µ)−1 ≥ inf
inf
2σ2 a6=1
∆2i
1
1+
∆21
∆2a
.
The infimum is obtained for a = 2, and using that ∆2 = ∆1 leads to the upper bound
!
K
2
X
2σ
T ∗ (µ) ≤ 2
.
∆2i
i=1
The following lower bound was obtained by Kaufmann et al. (2015) for every PAC strategy:
K
lim inf
δ→0
X 2σ 2
E[τδ ]
≥
.
log(1/δ)
∆2i
i=1
Combining this inequality with the upper bound on lim inf δ→0 E[τδ ]/log(1/δ) obtained in Theorem 14 for the δ-PAC Track-and-Stop algorithm shows that
T ∗ (µ) ≥
K
X
2σ 2
i=1
which concludes the proof.
19
∆2i
,
G ARIVIER K AUFMANN
Appendix B. Tracking results
Lemma 7 and 8 both follow from deterministic results that we can give for procedures tracking any
cumulated sums of proportions (Lemma 15) or any changing sequence of proportions that concentrates (Lemma 17). We state and prove theses two results in this section, and also explain how they
lead to Lemma 7 and 8. We then provide a proof of Proposition 9.
B.1. Tracking a cumulated sum of proportions
Lemma 15 Let K be a positive integer, let ΣK be the simplex of dimension K − 1, and for every
i ∈ {1, . . . , K}, let δi be the vertex of ΣK with a 1 on coordinate i. For a positive integer n, let
p(1), p(2), . . . , p(n) ∈ ΣK and for every k ≤ n let P (k) = p(1) + · · · + p(k). Define N (0) = 0,
for every k ∈ {0, . . . , n − 1}
Ik+1 ∈ argmax [Pi (k + 1) − Ni (k)]
1≤i≤K
and N (k + 1) = N (k) + δIk+1 . Then
max Ni (n) − Pi (n) ≤ K − 1 .
1≤i≤K
ǫk−1 (µ̂(k − 1)), so that
To obtain Lemma
Pk 7,ǫswe start by applying Lemma 15 with p(k) = w
P (k + 1) = s=0 w (µ̂(s)). One obtains
max Na (t) −
1≤a≤K
t−1
X
s=0
waǫs (µ̂(s)) ≤ K − 1 .
(12)
Moreover, by definition of wǫ (s),
max
1≤a≤K
t−1
X
waǫs (µ̂(s))
s=0
−
t−1
X
wa∗ (µ̂(s))
s=0
≤
t−1
X
Kǫs .
s=0
Now, with the choice ǫt = (K 2 + t)−1/2 /2, one has
p
t+
K2
−K =
Z
t−1
t
X
ds
√
ǫs ≤
≤
2 K 2 + s s=0
0
Z
t−1
−1
p
p
ds
√
= t + K2 − 1 − K2 − 1 ,
2 K2 + s
which yields
max Na (t) −
1≤a≤K
t−1
X
s=0
wa∗ (µ̂(s)) ≤ K − 1 + K
p
t + K2 − 1 −
p
√
K 2 − 1 ≤ K(1 + t) .
From (12), it also follows that
Na (t) ≥
t−1
X
s=0
ǫs − (K − 1) ≥
p
t + K 2 − K − (K − 1) ≥
which concludes the proof of Lemma 7.
20
p
t + K 2 − 2K,
O PTIMAL B EST A RM I DENTIFICATION
Proof of Lemma 15.
WITH
F IXED C ONFIDENCE
First, we prove by induction on k that
max Ni (k) − Pi (k) ≤ 1.
1≤i≤K
The statement is obviously true for k = 0. Assume that it holds for some k ≥ 0. For i 6= Ik+1 one
has Ni (k + 1) − Pi (k + 1) = Ni (k) − Pi (k) − pi (k) ≤ 1 − pP
i (k) ≤ 1, whereas NIk+1 (k + 1) −
PIk+1 (k + 1) = 1 + (NIk+1 (k) − PIk+1 (k + 1) ≤ 1, using that i (Pi (k + 1) − Ni (k)) = 0, hence
the largest term in this sum (which is for i = Ik+1 by definition) is positive.
It follows that, for all k,
max Ni (k) − Pi (k) = max max Pi (k) − Ni (k), max Ni (k) − Pi (k)
1≤i≤K
1≤i≤K
1≤i≤K
X
Pi (k) − Ni (k) + , 1} .
≤ max{
1≤i≤K
Introducing, for every k ∈ {1, . . . , n}
rk =
K
X
i=1
Pi (k) − Ni (k) + ,
Lemma 15 follow from the following bound on rk , that we prove by induction on k:
rk ≤ K − 1.
Observe that r0 = 0. For every k ≥ 0, one can write
rk+1 = rk +
K
X
i=1
pi (k + 1)1(Pi (k+1)≥Ni (k+1)) − 1(PI
k+1
(k+1)≥NIk+1 (k+1)) .
We distinguish two cases. If (PIk+1 (k + 1) ≥ NIk+1 (k + 1)) one has
rk+1 ≤ rk +
K
X
i=1
pi (k + 1) − 1 = rk ≤ K − 1.
If (PIk+1 (k + 1) < NIk+1 (k + 1)), which implies PIk+1 (k + 1) − NIk+1 (k) ≤ 1, one has
rk+1 =
K
X
i=1
i6=Ik+1
=
(Pi (k + 1) − Ni (k + 1))+ ≤
K
X
i=1
i6=Ik+1
K
X
i=1
i6=Ik+1
max (Pj (k + 1) − Nj (k))
j
PIk+1 (k + 1) − NIk+1 (k) ≤ (K − 1) ,
which concludes the proof.
Remark 16 This result is probably overly pessimistic, but one cannot hope for an upper bound
independent of K: for pi (k) = 1{i ≥ k}/(K −k+1), by choosing at each step K the smallest index
in the argmax defining Ik , one gets NK (K−1) = 0 and PK (K−1) = 1/K+1/(K−1)+...+1/2 ∼
log(K).
21
G ARIVIER K AUFMANN
B.2. Tracking a changing sequence that concentrates
Lemma 17 Let K be a positive integer and let ΣK be the simplex of dimension K − 1. Let
g : N → R be a non-decreasing function such that g(0) = 0, g(n)/n → 0 when n tends to infinity
and for all k ≥ 1 and ∀m ≥ 1,
inf{k ∈ N : g(k) ≥ m} > inf{k ∈ N : g(k) ≥ m − 1} + K.
Let λ̂(k) be a sequence of elements in ΣK such that there exists λ∗ ∈ ΣK , there exists ǫ > 0 and an
integer n0 (ǫ) such that
∀n ≥ n0 , sup |λ̂i (k) − λ∗i | ≤ ǫ .
1≤i≤K
Define N (0) = 0, and for every k ∈ {0, . . . , n − 1}, Uk = {i : Ni (k) < g(k)} and
Ni (k) if Uk 6= ∅,
argmin
i∈Uk
h
i
Ik+1 ∈
argmax
k
λ̂
(k)
−
N
(k)
else,
i
i
i∈{1,...,K}
and for all i Ni (k + 1) = Ni (k) + 1(Ik+1 =i) . Then for all i ∈ {1, . . . , K}, Ni (n) > g(n) − 1 and
there exists n1 ≥ n0 (that depends on ǫ) such that for all n ≥ n1 ,
Nn (i)
− λ∗i ≤ 3(K − 1)ǫ .
n
√
First it is easy to check that g(k) = ( k − K/2)+ satisfies the assumptions of Lemma 17.
Lemma 8 then follows by choosing λ̂(k) = w∗ (µ̂(k)) and λ∗ = w∗ (µ). The constant n1 in
Lemma 17 depends on ǫ, hence the notation tǫ .
The proof of this Lemma 17 is inspired by the proof of Lemma 3 in Antos et al. (2008), although
a different tracking procedure is analyzed.
max
1≤i≤K
Proof of Lemma 17. First, we justify that Ni (n) > g(n) − 1. For this purpose, we introduce for
all m ∈ N the integer nm = inf{k ∈ N : g(k) ≥ m}. We also let Im = {nm , . . . , nm+1 −1}. From
our assumption on g, it follows that |Im | > K and by definition, for all k ∈ Im , m ≤ g(k) < m+1.
We prove by induction that the following statement holds for all m:
∀k ∈ Im , ∀i, Ni (k) ≥ m. Moreover for k ≥ nm + K, Uk = ∅ and Ni (k) ≥ m + 1 .
(13)
First, for all k ∈ I0 , one has Uk = {i : Ni (k) = 0}. Therefore (I1 , . . . , IK ) is a permutation of
(1, . . . , K), thus for k ≥ K = n0 + K, Ni (k) ≥ 1, and Uk = ∅, and the statement holds for m = 0.
Now let m ≥ 0 such that the statement is true. From the inductive hypothesis, one has
∀k ∈ Im+1 , ∀i, Ni (k) ≥ Ni (nm+1 − 1) ≥ m + 1 .
Besides, as g(k) < m + 2 for k ∈ Im+1 , one has Uk = {i : Ni (k) = m + 1} and Ik is chosen
among this set while it is non empty. For k ≥ nm+1 + K, it holds that Uk = ∅ and Ni (k) ≥ m + 2
for all i. Thus the statement holds for m + 1.
From the fact that (13) holds for all m, using that for k ∈ Im , m > g(k) − 1, it follows that for
all k, for all i, Ni (k) > g(k) − 1.
22
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
Now for all i ∈ {1, . . . , K}, we introduce Ei,n = Ni (n) − nλ∗i . Using that
K
X
Ei,n = 0,
(14)
i=1
leads to
sup |Ei,n | ≤ (K − 1) sup Ei,n .
i
i
Indeed, for every i, one has Ei,n ≤ supk Ek,n and
X
X
Ei,n = −
Ej,n ≥ −
sup Ek,n = −(K − 1) sup Ek,n .
j6=i
j6=i
k
k
To conclude the proof, we give an upper bound on supi Ei,n , for n large enough. Let n′0 ≥ n0
such that
∀n ≥ n′0 , g(n) ≤ 2nǫ and 1/n ≤ ǫ .
We first show that for n ≥ n′0 ,
(In+1 = i) ⊆ (Ei,n ≤ 2nǫ)
(15)
To prove this, we write
(In+1 = i) ⊆
Ni (n) ≤ g(n) or i = argmin Nj (n) − nλ̂j (n)
1≤j≤K
!
.
Now if Ni (n) ≤ g(n), one has Ei,n ≤ g(n) − nλ∗i ≤ g(n) ≤ 2nǫ, by definition of n′0 . In the
second case, one has
Ni (n) − nλ̂i (n) = min Nj (n) − nλ̂j (n)
j
Ei,n + n(λ∗i − λ̂i (n)) = min Ej,n + n(λ∗j − λ̂j (n)
j
Using the closeness of each λ̂j (n) to the corresponding λ∗j , as n ≥ n0 , yields
Ei,n + n(λ∗i − λ̂n (i)) ≤ min (Ej,n + nǫ) ≤ nǫ,
j
where we use that minj Ej,n ≤ 0 by (14). Using that |λ∗i − λ̂i (n)| ≤ ǫ as well, one obtains
Ei,n ≤ 2nǫ .
This proves (15).
Ei,n satisfies Ei,n+1 = Ei,n + 1(In+1 =i) − λ∗i , therefore, if n ≥ n′0 ,
Ei,n+1 ≤ Ei,n + 1(Ei,n ≤2nǫ) − λ∗i .
We now prove by induction that for every n ≥ n′0 , one has
Ei,n ≤ max(Ei,n′0 , 2nǫ + 1).
23
G ARIVIER K AUFMANN
For n = n′0 , this statement clearly holds. Let n ≥ n′0 such that the statement holds. If Ei,n ≤ 2nǫ,
one has
Ei,n+1 ≤ 2nǫ + 1 − λ∗i ≤ 2nǫ + 1 ≤ max(Ei,n′0 , 2(n)ǫ + 1)
≤ max(Ei,n′0 , 2(n + 1)ǫ + 1).
If Ei,n > 2nǫ, the indicator is zero and
Ei,n+1 ≤ max(Ei,n′0 , 2nǫ + 1) − λ∗i ≤ max(Ei,n′0 , 2(n + 1)ǫ + 1) ,
which concludes the induction.
For all n ≥ n′0 , using that Ei,n′0 ≤ n′0 and 1/n ≤ ǫ, it follows that
1 n′0
n′0
Ei,n
≤ (K − 1) max 2ǫ + ,
≤ (K − 1) max 3ǫ,
.
sup
n
n n
n
i
Hence there exists n1 ≥ n′0 such that, for all n ≥ n1 ,
sup
i
Ei,n
≤ 3(K − 1)ǫ ,
n
which concludes the proof.
B.3. Proof of Proposition 9
Because of the forced-exploration step, both tracking strategies satisfy ∀a, Na (t) → ∞. Thus, from
the law of large number, the event
E = µ̂(t) → µ
t→∞
is of probability one. For C-Tracking, it follows from Lemma 7 that
√
t−1
Na (t) 1 X ∗
K( t + 1)
−
.
wa (µ(s)) ≤
t
t
t
s=0
By continuity of w∗ in µ, for all a, wa∗ (µ̂(t)) → wa∗ (µ). Using moreover the Cesaro lemma, one
obtains that, on E, Na (t)/t → wa∗ (µ). For D-Tracking, we first use that for ω ∈ E, there exists
t0 (ǫ) such that
ǫ
,
sup max |wa∗ (µ̂(t)) − wa∗ (µ)| ≤
3(K − 1)
t≥t0 (ǫ) a
by continuity of the function λ 7→ w∗ (λ) in µ. Hence, using Lemma 8, there exists tǫ ≥ t0 such
that for all t ≥ tǫ ,
Na (t)
− wa∗ (µ) ≤ ǫ .
max
a
t
Hence, for this ω ∈ E, Na (t)/t(ω) → wa∗ (µ) for all a.
24
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
Appendix C. PAC guarantees
C.1. Proof of Proposition 10.
Recall that
Pµ (τδ < ∞, âτδ 6= a∗ ) ≤ Pµ (∃a ∈ A \ a∗ , ∃t ∈ N : Za,a∗ (t) > β(t, δ))
X
≤
Pµ (Ta,a∗ < ∞) ,
a∈A\A∗
where Ta,b := inf{t ∈ N : Za,b (t) > β(t, δ)}. To conclude the proof, we now show that for β(t, δ)
as in Proposition 10, for any a, b such that µa < µb , one has
δ
.
K −1
Pµ (Ta,b < ∞) ≤
Let a,b be such that µa < µb . One introduces fµ (xt , at ) the likelihood of observing the sequence
of rewards xt = (x1 , . . . , xt ) and sequence of actions at = (a1 , . . . , at ). One has
"
#
t
K
Y
Y
fµ (xt , at ) =
p(as |xs−1 , as−1 ) ,
pµi xit × p(a1 )
s=2
i=1
where xit is a vector that gathers the sequence of successive rewards from arm i up to time t (that
is a function of both xt and at ). fµ (xt , at ) is a probability density on X t × At . For any density h
supported on I, the (partially) integrated likelihood
#
"
Z
Z
t
Y
Y
i
a
b
p(as |xs−1 , as−1 )
pu xt h(u)du × p(a1 )
pu (xt ) h(u)du
Ih (xt , at ) =
pµi xt
R
R
i∈A\{a,b}
s=2
is also a probability distribution.
On the event (Ta,b = t), Za,b (t) exceeds for the first time the threshold β(t, δ), which implies
in particular (from the definition of Za,b (t)) that
−β(t,δ)
1≤e
maxµ′a ≥µ′b pµ′a (X at )pµ′b (X bt )
maxµ′a ≤µ′b pµ′a (X at )pµ′b (X bt )
.
We use this fact in the first inequality below, whereas the second inequality is based on the fact that
µ satisfies µa < µb :
Pµ (Ta,b < ∞) =
≤
≤
∞
X
Pµ (Ta,b = t) =
t=1
t=1
∞
X
t=1
∞
X
t=1
∞
X
"
i
h
Eµ 1(Ta,b =t)
e−β(t,δ) Eµ 1(Ta,b =t)
−β(t,δ)
e
"
maxµ′a ≥µ′b pµ′a (X at )pµ′b (X bt )
maxµ′a ≤µ′b pµ′a (X at )pµ′b (X bt )
Eµ 1(Ta,b =t)
|
maxµ′a ≥µ′b pµ′a (X at )pµ′b (X bt )
pµa (X at )pµb (X bt )
{z
(∗)
25
#
#
}
.
G ARIVIER K AUFMANN
We now explicit the expectation (∗) for Bernoulli distributions.
(∗) =
X
X
1(Ta,b =t) (xt , at ) max′
µ′a ≥µb
at ∈At xt ∈{0,1}t
pµ′a (xat )pµ′b (xbt )
Y
pµi (xit )
i∈A\{a,b}
"
p(a1 )
t
Y
s=2
p(as |xs−1 , as−1 )
Introducing, for a vector x,
kt(x) =
Z
0
we have that
1
1
p
πu(1 − u)
pu (x)du ,
max pµ′a (xat )pµ′b (xbt ) ≤ 2t × kt(xat )kt(xbt ),
µ′a ≥µ′b
which follows from Lemma 11 stated in the main text and the fact that for na , nb are such that
√ √
na + nb ≤ t, 4 na nb ≤ 2(na + nb ) ≤ 2t. Using this inequality to upper bound (∗), one
1[0,1] (u):
recognize the integrated likelihood associated to the density h(u) = √ 1
πu(1−u)
(∗) ≤ 2t
X
at
∈At
xt
X
1(Ta,b =t) (xt , at )Ih (xt , at ) = 2tP̃(Ta,b = t) ,
∈{0,1}t
where P̃ is an alternative probabilistic model, under which µa and µb are drawn from a Beta(1/2, 1/2)
(prior) distribution at the beginning of the bandit game. Finally, using the explicit expression of
β(t, δ),
Pµ (Ta,b < ∞) ≤
=
∞
X
t=1
2te−β(t,δ) P̃(Ta,b = t) ≤
∞
δ X
P̃(Ta,b = t)
K − 1 t=1
δ
δ
,
P̃(Ta,b < ∞) ≤
K −1
K −1
which concludes the proof.
C.2. Proof of Proposition 12.
The proof relies on the fact that Za,b (t) can be expressed using function Iα introduced in Definition 3. An interesting property of this function, that we use below, is the following. It can be
checked that if x > y,
Iα (x, y) = inf
αd(x, x′ ) + (1 − α)d(y, y ′ ) .
′
′
x <y
For every a, b that are such that µa < µb and µ̂a (t) > µ̂b (t), one has the following inequality:
Za,b (t) = (Na (t) + Nb (t))I
=
Na (t)
Na (t)+Nb (t)
(µ̂a (t), µ̂b (t))
inf Na (t)d(µ̂a (t), µ′a ) + Nb (t)d(µ̂b (t), µ′b )
µ′a <µ′b
≤ Na (t)d (µ̂a (t), µa ) + Nb (t)d(µ̂b (t), µb ) .
26
#
O PTIMAL B EST A RM I DENTIFICATION
WITH
F IXED C ONFIDENCE
One has
Pµ (τδ < ∞, âτδ 6= a∗ ) ≤ Pµ (∃a ∈ A \ a∗ , ∃t ∈ N : µ̂a (t) > µ̂a∗ (t), Za,a∗ (t) > β(t, δ))
≤ Pµ ∃t ∈ N : ∃a ∈ A \ a∗ : Na (t)d (µ̂a (t), µa ) + Na∗ (t)d(µ̂a∗ (t), µa∗ ) ≥ β(t, δ)
!
K
X
Na (t)d(µ̂a (t), µa ) ≥ β(t, δ)
≤ Pµ ∃t ∈ N :
a=1
≤
∞
X
t=1
eK+1
β(t, δ)2 log(t)
K
K
e−β(t,δ) .
The last inequality follows from a union bound and Theorem 2 of Magureanu et al. (2014), originally stated for Bernoulli distributions but whose generalization to one-parameter exponential families is straightforward. Hence, with an exploration rate of the form β(t, δ) = log(Ctα /δ), for
α > 1, choosing C satisfying
∞ K+1
X
e
(log2 (Ctα ) log t)K
t=1
KK
tα
≤C
yields a probability of error upper bounded by δ.
Appendix D. Expected sample complexity analysis
The proof of Theorem 14 relies on two ingredients: a concentration result for the empirical mean
µ̂(t), that follows from the forced exploration (Lemma 19) and the tracking lemma associated to
the sampling strategy used (Lemma 7, Lemma 8). We start with a small technical lemma that can
be checked directly, or that can be seen as a by-product of well-known bounds on the Lambert W
function.
Lemma 18 For every α ∈ [1, e/2], for any two constants c1 , c2 > 0,
c2 e
c2
α
log
+ log log α
x=
α
c1
c1
c1
is such that c1 x ≥ log(c2 xα ).
D.1. Proof of Theorem 14
To ease the notation, we assume that the bandit model µ is such that µ1 > µ2 ≥ · · · ≥ µK . Let
ǫ > 0. From the continuity of w∗ in µ, there exists ξ = ξ(ǫ) ≤ (µ1 − µ2 )/4 such that
Iǫ := [µ1 − ξ, µ1 + ξ] × · · · × [µK − ξ, µK + ξ]
is such that for all µ′ ∈ Iǫ ,
max |wa∗ (µ′ ) − wa∗ (µ)| ≤ ǫ.
a
In particular, whenever µ̂(t) ∈ Iǫ , the empirical best arm is ât = 1.
27
G ARIVIER K AUFMANN
Let T ∈ N and define h(T ) := T 1/4 and the event
ET (ǫ) =
T
\
t=h(T )
(µ̂(t) ∈ Iǫ ) .
The following lemma is a consequence of the “forced
exploration” performed by the algorithm, that
√
ensures that each arm is drawn at least of order t times at round t.
Lemma 19 There exist two constants B, C (that depend on µ and ǫ) such that
Pµ (ETc ) ≤ BT exp(−CT 1/8 ).
Then, exploiting the corresponding tracking Lemma, one can prove the following
Lemma 20 There exists a constant Tǫ such that for T ≥ Tǫ , it holds that on ET , for either CTracking or D-Tracking,
∀t ≥
√
T , max
a
Na (t)
− wa∗ (µ) ≤ 3(K − 1)ǫ
t
Proof. This statement is
√ obvious for D-Tracking, just by definition of Iǫ and by Lemma 8. For
C-Tracking, for any t ≥ T = h(T )2 , using Lemma 7, one can write, for all a,
Na (t)
− wa∗ (µ)
t
≤
≤
≤
t−1
t−1
1X ∗
Na (t) 1 X ∗
−
wa (µ̂(s)) +
w (µ̂(s)) − wa∗ (µ)
t
t s=0
t s=0 a
√
t−1
K( t + 1) h(T ) 1 X
+
+
|wa∗ (µ̂(s)) − wa∗ (µ)|
t
t
t
t=h(T )
2K
1
2K + 1
+
+ ǫ ≤ 3ǫ ,
+ǫ=
1/4
h(T )
T
T 1/4
whenever T ≥ ((2K + 1)/2ǫ)4 .
On the event ET , it holds for t ≥ h(T ) that ât = 1 and the Chernoff stopping statistic rewrites
max min Za,b (t) = min Z1,a (t) = min N1 (t)d(µ̂1 (t), µ̂1,a (t)) + Na (t)d(µ̂a (t), µ1,a (t))
a b6=a
a6=1
a6=1
N1 (t) Na (t)
(µ̂1 (t), µ̂a (t))
= t min
+
I
N1 (t)/t
a6=1
t
t
N1 (t)/t+Na (t)/t
!
Na (t) K
= tg µ̂(t),
,
t
a=1
where we introduce the function
g(µ′ , w ′ ) = min(w1′ + wa′ )I
a6=1
28
′
w1
′
w′ +wa
1
(µ′1 , µ′a ).
O PTIMAL B EST A RM I DENTIFICATION
F IXED C ONFIDENCE
WITH
Using Lemma 20, for T ≥ Tǫ , introducing
Cǫ∗ (µ) =
inf
µ′ :||µ′ −µ||≤α(ǫ)
w ′ :||w ′ −w ∗ (µ)||≤2(K−1)ǫ
g(µ′ , w ′ ) ,
√
on the event ET it holds that for every t ≥ T ,
∗
max min Za,b (t) ≥ tCǫ (µ) .
a
b6=a
Let T ≥ Tǫ . On ET ,
min(τδ , T ) ≤
≤
Introducing
√
T+
T
X
√
t= T
√
T+
T
X
√
t= T
1(τδ >t) ≤
√
T+
T
X
√
1(maxa minb6=a
Za,b (t)≤β(t,δ))
t= T
1(tCǫ∗ (µ)≤β(T,δ)) ≤
√
T+
β(T, δ)
.
Cǫ∗ (µ)
√
β(T, δ)
T0 (δ) = inf T ∈ N : T + ∗
≤T ,
Cǫ (µ)
for every T ≥ max(T0 (δ), Tǫ ), one has ET ⊆ (τδ ≤ T ), therefore
Pµ (τδ > T ) ≤ P(ETc ) ≤ BT exp(−CT 1/8 )
and
Eµ [τδ ] ≤ T0 (δ) + Tǫ +
∞
X
BT exp(−CT 1/8 ) .
T =1
We now provide an upper bound on T0 (δ). Letting η > 0 and introducing the constant
√
C(η) = inf{T ∈ N : T − T ≥ T /(1 + η)}
one has
r(T )
1
T
log
T0 (δ) ≤ C(η) + inf T ∈ N : ∗
≤
Cǫ (µ)
δ
1+η
1+α
∗
Dt
Cǫ (µ)
T ≥ log
,
≤ C(η) + inf T ∈ N :
1+η
δ
where the constant D is such that r(T ) ≤ DT α . Using again the technical Lemma 18, one obtains,
for α ∈ [1, e/2],
α(1 + η)
D(1 + η)α
De(1 + η)α
T0 (δ) ≤ C(η) +
+ log log
.
log
Cǫ (µ)
δ(Cǫ∗ (µ))α
δ(Cǫ∗ (µ))α
This last upper bound yields, for every η > 0 and ǫ > 0,
lim inf
δ→0
α(1 + η)
Eµ [τδ ]
≤
.
log(1/δ)
Cǫ∗ (µ)
29
G ARIVIER K AUFMANN
Letting η and ǫ go to zero and using that, by continuity of g and by definition of w∗ ,
lim Cǫ∗ (µ) = T ∗ (µ)−1
ǫ→0
yields
lim inf
δ→0
Eµ [τδ ]
≤ αT ∗ (µ) .
log(1/δ)
D.2. Proof of Lemma 19.
P (ETc )
≤
T
X
t=h(T )
P (µ̂(t) ∈
/ Iǫ ) =
K
T
X
X
t=h(T ) a=1
[P (µ̂a (t) ≤ µa − ξ) + P (µ̂a (t) ≥ µa + ξ)] .
√
√
Let T be such that h(T ) ≥ K 2 . Then for t ≥ h(T ) one has Na (t) ≥ ( t − K/2)+ − 1 ≥ t − K
for every arm a. Let µ̂a,s be the empirical mean of the first s rewards from arm a (such that
µ̂a (t) = µ̂a,Na (t) ). Using a union bound and Chernoff inequality, one can write
√
P (µ̂a (t) ≤ µa − ξ) = P µ̂a (t) ≤ µa − ξ, Na (t) ≥ t ≤
≤
t
X
√
s= t−K
exp(−sd(µa − ξ, µa )) ≤
t
X
√
P (µ̂a,s ≤ µa − ξ)
s= t−K
√
t−K)d(µa −ξ,µa )
−(
e
1 − e−d(µa −ξ,µa )
.
Similarly, one can prove that
√
e−( t−K)d(µa +ξ,µa )
.
P (µ̂a (t) ≥ µa + ξ) ≤
1 − e−d(µa +ξ,µa )
Finally, letting
C = min (d(µa − ξ, µa ) ∧ d(µa + ξ, µa )) and B =
a
K
X
a=1
eKd(µa −ξ,µa )
eKd(µa +ξ,µa )
+
1 − e−d(µa −ξ,µa ) 1 − e−d(µa +ξ,µa )
one obtains
P (ETc )
≤
T
X
t=h(T )
p
√
B exp(− tC) ≤ BT exp(− h(T )C) = BT exp(−CT 1/8 ) .
30
!
,
| 10math.ST
|
1
Online Thevenin Equivalent Parameter Estimation using
Nonlinear and Linear Recursive Least Square Algorithm
Md. Umar Hashmi
Department of Energy Science & Engineering
IIT Bombay
Bombay, Maharashtra
[email protected]
Rahul Choudhary
Department of Systems and Control
IIT Bombay
Bombay, Maharashtra
[email protected]
Abstract—This paper proposes method for detection, estimation of
Thevenin equivalent parameters to describe power system behavior.
Thevenin equivalent estimation is a challenge due to variation in
system states caused by power flow in the network. Thevenin
equivalent calculation based on changes in system with multiple
sources integrated with grid, isolated distributed generator system is
analysed and nonlinear least square fit estimation technique for
algorithm is adopted. Linear least square fit is used with a linearized
model. Performance evaluation of proposed method is carried out
through mathematical model, nonlinear and linear least square fit
based
algorithm
technique
and
simulation
through
MATLAB/SIMULINK package. Accurate grid and source side
impedance estimation technique is applicable for distributed
generation sources interfaced with grid to improve dynamic response,
stability, reliability when subjected to faults or any other
disturbances in network. Algorithm can accurately estimate Thevenin
equivalent of multiple sources connected in parallel simultaneously
with voltage and current phasor measurements at point of common
coupling. Mathematical analysis and simulation results validate the
effectiveness of proposed method.
Index Terms—Adaptive controller, Impedance, Least square fit
estimation, Point of common coupling, Thevenin equivalent.
I. INTRODUCTION
W
ith integration of large number of distributed generation
sources (DG) into distribution network has raised concerns
related to stability, power quality and reliability of the
supply [1-3]. Distributed power generation sources depending
upon their mode of operation affects line impedance of distributed
electricity network. Performance of grid connected converter
depends upon line impedance [4]. Islanding operation due to
faults or grid disturbances due to voltage or frequency sag if not
detected properly leads to poor power quality at point of common
coupling (PCC).Online measurement due its numerous advantages
is preferred to fulfill anti islanding requirement. The distortion in
network caused due to electrical loads and distributed generation
sources strongly depends upon grid impedance and amount of
apparent power connected [5].To optimize the operation and
performance of distributed generation sources in microgrid
network, time and frequency dependent grid parameter estimation/
calculation is key [5].
In literature several methods are proposed for impedance
estimation. Estimation based on control loop variations which
include new values of inductance and resistance in control loop to
improve performance of system is proposed in [6]. Grid
impedance estimation based on use of extra devices is proposed in
[7]. Injection of harmonics signal into the grid and use of
mathematical models to obtain new impedance parameters are
Jayesh G. Priolkar
Department of Electrical Engineering
Goa College of Engineering
Farmagudi, Ponda Goa
[email protected]
addressed in [8-10].Grid impedance using controlled excitation
based on frequency characteristics of inductance -capacitance–
inductance (LCL) filter resonance is reported in [3]. The various
methods used to determine grid impedance characteristics offline
by means of frequency response analysis is reported in [11-13].
The methods of equivalent impedance estimation can be
broadly classified as active and passive type [14]. Passive
methods utilize the existing disturbance present in power
networks, for example detection of low order harmonic frequency
impedance. In active methods in addition to regular operation,
forced disturbance is injected into the grid or distributed
generation network for parameter estimation. Regression analysis
is used to extract parameters from measured data to define
physical characteristics of system. Thevenin equivalent estimation
based on concept of regression is also reported in literature.
Recursive least square estimation technique based on varying
system states to determine Thevenin equivalent is proposed in
[15].
Detection and estimation of Thevenin equivalent impedance for
different application is reported in literature. For example, power
system fault detection, load matching for maximum power
transfer, state of charge estimation for battery bank [16],
simultaneous estimation of Thevenin equivalent of multiple
sources, for load management by load shedding in power system
network based on detection of undervoltage [17], voltage stability
margin adjustment and analysis for prevention of voltage collapse
by a real time voltage instability identification algorithm based on
local phasor measurements [18].
The main aim of our work is to develop the algorithm for
online Thevenin equivalent parameter estimation. It is active
method which is available to estimate Thevenin equivalent
voltage and current. To evaluate the performance of proposed
method, mathematical model, nonlinear least square fit based
algorithm
technique
and
simulation
through
MATLAB/SIMULINK package are done.
Paper is organized as follows, Introduction of paper is given in
section I, section II discusses in brief applications of online
Thevenin equivalent estimation algorithm, section III presents
parameter estimation for isolated power system, and section IV
discusses the parameter estimation for grid connected system.
Simulation results are discussed in section V. Section VI
concludes the paper.
II. APPLICATIONS OF THEVENIN EQUIVALENT ESTIMATION
Online Thevenin equivalent estimation algorithm finds
application in adaptive control of electrical processes for
performance improvement and preemptive corrective action can be
taken for safe system operation. Some of the applications have
been discussed in this section.
2
i) Power system fault detection: - The Thevennin equivalent of
power system will indicate the change of estimatedd parameters due
to fault in power system. The relationships betweeen the real fault
distance and the varying Thevenin equivalennt impedance is
presented in paper [19]. The proposed Thevvenin equivalent
estimation algorithm in our work uses balancced symmetrical
components for correct estimation. Balanced ground faults,
balanced short circuits and balanced impedancee change can be
identified using the presented algorithm.
ii) Load matching for maximizing power transsfer: - Maximum
power is transferred to a load resistor (RL) when the value of the
load resistor is selected to match the value oof the Thevenin
resistance (Rth) of the power source. Figure 1 dem
monstrates this for
a value of Rth of 10 ohms.
Load Power Response to Changes in Load Resistance forr Rth = 10 ohms
1000
Power (Watts)
800
600
iii) State of charge estimation of battery or battery bank: A
6] between the open circuit
linear relationship is presented in [16
voltage (VOC) and SOC
)
%) =
The values of a and b are found experrimentally [16]. Open circuit
voltage is the Thevenin equivalent voltage of a battery under no
load condition.
ustment and analysis for
iv) Voltage stability margin adju
prevention of voltage collapse: Voltage instability is a major
concern for power systems operatiion. A Real-Time voltage
instability identification algorithm Based on Local Phasor
Measurements is proposed in [18] which recognize instabilities in
voltage. The power transferred to the bus reaches its voltage
stability limit when that Thevenin impedance has the same
magnitude as the load impedance at the bus [18].
The apparent power supplied is S, Y = 1/ZL, than
400
=
200
0
0
10
20
30
Load Resistance(Ohms)
40
50
Figure 1: Maximum Power Transfer at Zload=
=Zsource
Maximum Power Transfer with Complex Impedance
)
))^
(2)
The condition for maximum load ap
pparent power is dS/dY =0,
hence the critical point of voltage insstability is Zth = ZL. Hence
maximum loading point can be accurrately monitored online by
calculating dS/dY. The value of dS/d
dY close to zero indicates
proximity to voltage collapse point [20]].
The proposed algorithm assumes no simplification in system for
estimating Thevenin equivalent parameters.
Power Transfer (Watts)
1000
III. PARAMETER ESTIMATION FOR ISOLATED
M
SYSTEM
800
600
400
200
0
5
20
15
0
Description of the Proposed Algorith
hm:
Consider a voltage source feeding a lo
oad which has an impedance
of itself, line and filter impedance befo
ore it’s actually connected to
the load. The Thevenin equivalent of the
t circuit is shown adjacent
to it in the figure below.
10
Impedance (Ohms)
5
-5
Resiistance (Ohms)
0
Figure 2: Maximum Power Transfer with complexx impedance
2
P = I R, PL = [Vth/ (Rth+ RL)]2(RL)
(1)
One example is load matching is for wirelesss power transfer
circuitry design using inductive coils. Four coill wireless power
transfer simulation diagram along with the matcching network is
shown in Figure 3. Parameter values of the matchhing network are
dependent on the Thevenin equivalent impedancee of the four coil
system.
Matching network shown in figure 3 is one of thhe many possible
architectures of a matching network.
Figure 3: Matching network design for 4 coil wireless pow
wer transfer circuit
Figure 4: Isolated system with itss Thevenin equivalent
Using Kirchhoff’s Voltage Law we can write the voltage loop
equation as:
VT
cos θ j sin θ) = VPCC cos
j sin ) IPCC cos φ
j sin φ) × R T
jXT
)
(3)
We can separate the real and imaaginary component of the
equation as,
VT
cos θ = VPCC cos
IPCC cos φ × R T
sin φ ×
XT
)
(4)
VT
sin θ = VPCC sin
IPCC co
os φ × XT
RT
× sin φ)
(5)
3
The algorithm will be able to estimate the Theevenin equivalent
voltage and current. The point of common coupliing is the point at
which the load is connected. The known and unkn
known parameters
are shown below in table 1:
Table 1: State of Parameters
Known Parameters
Voltage Magnitude at PCC (VPCC)
Start
Unknown P
Parameters
Thevenin Voltage (VThevenin) ( 1)
Voltage Angle at PCC ( )
Thevenin Voltagee Angle (θ) (
Current Magnitude at PCC (IPCC)
Thevenin Resistancee (RThevenin) ( 3)
Current Angles at PCC (φ)
Thevenin Inductancee (XThevenin)(
VPCC cos = VT
XT
)
cos θ
IPCC cos φ × R T
VPCC sin = VT
RThevenin×sinφ)
sin θ
IPCC cos φ × XT
Equation (6) and (7) are non-linear in nature.
cos )
=
sin )
Where, y = VPCC cos , = VPCC sin , a = IPCC cos φ,
b = IPCC sin φ are known parameters and = VT
,
= RT
, = XT
are unknown param
meters.
=
Where
, , )
=
Estimation of Thevenin equivalent uses local measurements of at
least two different voltage and curreent vectors (magnitude and
phase) pairs measured at different time with different values
nin equivalent parameters.
associated with same reference Theven
Initialize Simulation
Variables
2)
For i = 1: number of iterations
s
4)
1. Define Load
2. Run Simulation
p
3. Get Voltage and Current (both phase
& magnitude ) at PCC
sin φ ×
(6)
Yes
(7)
No
Initial Guess for unknown
parameters X
Use
U
previous value of
unknown
u
parameter X
No
(8)
= ,
1. Minimize the error function E 2 for X
[E2 = f(Vpcc,Ipcc, load, Vsourse
e)]
2. Get X using least square meth
hod
Store
unknown
parameter X
Display X
(9)
and
If i = 1
If i = iteration limit
=
Yes
end
= min ∑
)
(10)
It is intended to solve these equations to obtaain the values X
which satisfy the system of equations describedd in equation 10.
Initial guess values are random numbers. Equattion 10 has to be
minimized for optimal values of unknown param
meters. Ideally β
has to be zero but since the algorithm recursiveely optimizes the
unknown parameters, there is a residual error w
which has to be
maintained as low as possible for accurate ressults. Residual is
defined by equation (11).
=
(11)
Nonlinear Recursive algorithm needs two Phasoor measurements
of voltage and current at the point of commoon coupling. The
figure below shows the circuit diagram for two different loading
scenarios. Phasor measurements are done at steaddy state.
Figure 7: Flow chart for the proposed algorithm
Parameters Estimation using linear regression
Non-linearity of the Equation (8) can be
b taken care by eliminating
the trigonometric variables.
=
=
(12)
1
0
0
1
×
(13)
Where, y = VPCC cos , = VPCC sin , a = IPCC cos φ, b =
IPCCsinφ are known parameters and 1=VThevenincosθ,
= VT
sin θ,
= RT
, = XT
are unknown
parameters.
a
Additional variable can be calculated as
(14)
VT
=
)
= tan
(15)
For n different loads, Equation (13) caan be written in following
structures (augmentation of matrix),
Figure 5: Circuit description of two data set coollection
=
(16)
Where dimension of the matrices are as,
a
For given initial estimate of
Figure 6: Phasor diagram of at least two different measurem
ments is required for
operation of estimation algorithm.
=
Estimation error
=
=
=
=
×
=
×
×
= ,
(17)
(18)
(19)
4
Error between actual and estimate will be minimuum for
)
=0
=0
)
=
Vector
(20)
(21)
(22)
provides good estimate of unknown paraameters.
IV. PARAMETER ESTIMATION FO
OR GRID
CONNECTED SYSTEM
Consider DG source connected to grid as shown in figure 8.
The total impedance of network includes line,, filter and load
impedance.
Thevenin Estimation Results:
Positive sequence voltage and current angle annd magnitude are
measured. It is assumed that the input voltagee magnitude and
angle and the Thevenin impedance as seen from
m the load side is
constant while the algorithm is in operation. A
As the estimation
gives an output which is within ±1% error wiith just one load
change; and hence it does not take more than a few seconds for
accurate prediction.
The positive sequence extraction is done too eliminate the
unbalanced components in voltage and currentt. The impact of
negative sequence is in terms of losses or heeating caused by
unbalances, for this case it’s not that relevant.
The results of the estimation with multiple numbbers of iterations
are tabulated below table.
Table 2: Estimation of Parameters for Isolatedd system
No. of Phasor
Generator
Voltage
Resistaance
Inductance
Measurements
Voltage
angle
Actual
70.7107
1
0.377
2 Phasor
70.642
1.98E-05
0.984442
0.3747
Error %
0.09706
1.557333
0.5993
3 Phasor
70.642
2.98E-05
0.9843399
0.374741
Error %
0.09715
1.56001
0.5992
5 Phasor
70.6254
1.11E-05
0.978555
0.373026
Error %
0.12057
2.144227
1.05397
10 Phasor
70.576
2.76E-05
0.96009
0.3691
Error %
0.1905
3.911
2.0955
100 Phasor
70.5762
1.34E-06
0.961
0.3691
Error %
0.19015
3.899449
2.09503
The estimated values tabulated in Table 2 shows accurate
prediction with just two Phasor measurem
ments of known
parameters at point of common coupling.
•
Current from individual so
ources (Igen and Igrid in the
figure above) is needed
Equivalent Thevenin voltage (maagnitude and angle) and
impedance can be estimated. The resullts of estimation are listed in
Table 4 and 6. Generator Side Estim
mation known and unknown
parameters are listed in table 3. A hypothetical scenario is
simulated in which voltage levels off two sources connected in
parallel are drastically different. The
T
generator side voltage
magnitude is set at 70.7 V and the grid is assumed at 49.5 V. The
algorithm accurately estimates the volttage level difference.
Table 3: State of Parameters on Generator sid
de
Known Parameters
Unknown Parameters
Voltage Magnitude at PCC
Generator Voltage
Voltage Angle at PCC
Generator Voltage Angle
Current Magnitude of generator
Generator resistance
Current Angles
Generator Inductance
Parameter Estimated with their errors percentages
p
for generator
side parameter estimation is tabulated in Table 4.
Table 4: Estimation of Parameters with error on Generator side
No. of Phasor
Generator
Voltage
Resistance
Measurements
Voltage
angle
Actual
70.7107
1
2 Phasor
70.70932
-6.285
0.999933
Error %
0.00195
0.0067
3 Phasor
70.70948
-6.279
0.999942
Error %
0.00172
0.00577
5 Phasor
70.71005
-6.290
0.999971
Error %
0.00092
0.00289
0.377
0.376977
0.0061
0.376974
0.007004
0.376978
0.0059
Grid Side Estimation known and unkn
nown parameters are listed in
table 5.
Table 5: State of Parameters on grid side
Known Parameters
Voltage Magnitude at PCC
Voltage Angle at PCC
Current Magnitude from grid
Current Angles
Unknown Parameters
Grid Voltage
Grid Voltage Angle
Grid Resistance
Grid Inductance
Parameter Estimated with their errors:
Table 6: Estimation of parameters with errors on grid side
No. of Phasor Grid Voltage
Voltagee
Grid
Measurements
angle
Resistance
Actual
49.4975
0.5
2 Phasor
49.4973
-0.0019
9
0.5
Error %
0.0004
0
3 Phasor
49.49726
-6.29
0.500017
Error %
0.000483
-0.00334
5 Phasor
49.49754
-6.29
0.499
Error %
-8.26E-05
0.00112
Grid
Inductance
0.0377
0.0377
0
0.037699
0.00285
0.03769
0.00157
'n' number of Power Sources co
onnected in Parallel
Superposition theorem implementation of proposeed algorithm:
140
Known Parameters for Parame
eter Estimation
Unknown Parameters Estimat ed
120
Number of Parameters
The algorithm can be used for multiple soources parameter
estimation simultaneously. The information nneeded from the
system is that we should know the currents cominng out of each of
the sources and the common voltage vector at ppoint of common
coupling.
Inductance
100
80
60
40
20
0
Figure 8: Generator and grid connected in parallel tto feed a load
For parameter estimation for a system with multipple sources:
• Voltage magnitude and angle at PCC is needed.
0
5
10
15
20
0
25
Number of Sources in
n Parallel
30
35
Figure 9: Known & Unknown parameters forr ‘n’ sources connected in parallel
5
Generator
Voltage
70.711
15.395
78.228
47.984
32.140
70.602
0.154
70.651
0.084
70.599
0.158
70.583
0.181
70.636
0.105
Voltage
angle
39.479
-30.161
-0.151
-0.112
-0.143
-0.151
-0.110
Resistance
1.000
-8.829
982.878
-1.342
234.184
1.005
-0.483
1.006
-0.557
0.999
0.091
0.996
0.374
0.998
0.219
Inductance
0.377
-3.351
988.831
-6.005
1692.739
0.390
-3.496
0.392
-4.019
0.374
0.665
0.367
2.730
0.371
1.603
Linear recursive least square method derived for thevenin
equivalent estimation requires at least three phasor measurements
for accurate prediction of unknown parameters. The result for
linear recursive least square estimation is listed in table 7. The
results with 1st and 2ndphasor measurements are not reliable,
however the results converge with 3 phasor measurements and
own wards.
Compared to linear recursive fit, nonlinear recursive fit is better as
the error percentages are much lower as per results tabulated in
table 4, 6 and 7.
Nonlinear recursive method uses exact equation, therefore
computationally exhaustive, for estimation and hence the overall
accuracy of estimation is higher. Furthermore nonlinear recursion
estimation converges with 2 phasor measurement data but linear
method takes at least 3 phasor measurements for convergence.
The results generated using proposed algorithms has an upper
bound of 5000 as maximum function evaluations and maximum
number of iterations as 8000.
Power System Grid Impedance Change Detection
Power system undergoes various kinds of faults which lead to
overall impedance change of the system. Simulations are
conducted in MATLAB Simulink for isolated system to verify the
capability of proposed algorithm to detect impedance change in
Volts
70.711
70.7105
70.71
70.7095
0
2
4
6
8
10
Time(s)
Figure10: Voltage magnitude estimation
The voltage magnitude from source side is unchanged and only
line impedance is changed. Therefore the Thevenin voltage
magnitude and phase estimated value remains fairly stable.
-4
-9
Voltage Angle
x 10
-9.2
-9.4
-9.6
-9.8
-10
0
2
4
6
8
10
Figure 11: Voltage Phase estimation
Resitance
2.2
2
1.8
Ohms
No. of Phasor
Measurements
Actual
1 Phasor
Error %
2 Phasor
Error %
3 Phasor
Error %
4Phasor
Error %
5 Phasor
Error %
6 Phasor
Error %
10 Phasor
Error %
RMS Voltage Magnitude
70.7115
Angle
Table 7: Parameter Estimation with linear regression
power system. Single source simulations with impedance change
from 1+0.377j to 2+0.755jat 5 second in a 9.6 second simulation
is conducted. The algorithm is capable to detect the impedance
change very accurately. As the source voltage and phase remains
unchanged, the estimation remains fairly stable at its initial
values.
1.6
1.4
1.2
1
0.8
0
2
4
6
8
10
Time(s)
Figure12: Power source Resistance estimation
Reactance
0.8
0.7
Ohms
The results of estimation indicate accurate prediction of both
generator and grid side parameters simultaneously. This algorithm
can be extrapolated to ‘n’ number of parallel sources feeding a
load. The algorithm uses the shared current from the source and
voltage at point of common coupling for estimating Thevenin
equivalent parameters. Figure 9 shows the number of estimated
parameters and number of known parameters used for estimating
the unknown values using the proposed algorithm. For very large
number of sources connected in parallel, the algorithm proposed
estimates twice the number of unknown parameters. This aspect
of the proposed algorithm can help in controller design and tuning
for multiple sources i.e. inverters and/or UPS to be connected in
parallel. Virtual impedance design requires equivalent Thevenin
impedance seen at from load side for proper compensation of
parameter mismatches (Line and/or filter parameters).
Simultaneous estimation of multiple sources Thevenin’s
equivalent will help in proper selection of virtual impedance for
minimizing circulating current flowing among power sources.
0.6
0.5
0.4
0
1
2
3
4
5
Time(s)
6
7
Figure 13: Power System reactance
8
9
10
6
As the resistance and reactance values are doubled at 5sec, the
estimated values changes level around 5 sec. The error % for the
estimated quantities is well below 0.5% under steady state. The
positive sequence voltage and current angle and magnitude are
measured. It is assumed that the input voltage magnitude and
angle and the Thevenin impedance as seen from the load side is
constant while the algorithm is in operation. The positive
sequence extraction is done to eliminate the unbalanced
components in voltage and current. Proposed algorithm can be
used for detection of balanced power system faults using the
proposed parameter estimation algorithm using linearized and
nonlinear recursive least square algorithms evaluated through
simulation results shown from Figure 10 to 13.
VI. CONCLUSION
Online Thevenin equivalent parameter estimation using
nonlinear and linear recursive least square algorithm are proposed
and evaluated in this paper. Simultaneous parameter estimation of
‘n’ parallel source with known parameters at point of common
coupling i.e. current and voltage phasor are evaluated and
analysed. The proposed algorithms require at least two phasor
measurements for accurate prediction. The robustness of the
algorithms has also been tested and verified. Fault in power
system leads to impedance change. The Thevenin equivalent
estimation proposed in the paper can help to determine power
system behavior and adopt the corrective actions to improve
response of system network and stability. Simulation results
validating the performance of the proposed algorithms have also
been verified for power system impedance change detection.
From the analysis carried out it is found that nonlinear recursion is
comparatively better than linear recursion in terms of error
percentage of the estimation. However linear method is
computationally less exhaustive, more viable for online controller
implementation.
REFERENCES
[1]A. Azmy and I. Erlich, “Impact of distributed generation on the stability of
electrical power systems,” in proc. power engineering society general meeting,
IEEE 2005, pp. 1056-1063, 2005.
[2]S. Jian, “Small signal methods for AC distributed power system – A
Review,” IEEE Trans. on Power Electronics, vol.24, no.11, pp.2545-2554,
Nov.2009.
[3] M. Liserre, R. Teodorescu and F. Blaabjerg, “Stability of photovoltaic and
wind turbine grid connected inverters for large set of grid impedance values,”
IEEE Trans.on Power Electronics, vol.21, no.1, pp.263-272, Jan.2006.
[4] M.Liserre, F. Blaabjerg, and R.Teodorescu, “Grid Impedance estimation
via excitation of LCL filter resonance,” IEEE Trans. on Industry applications,
vol.43, no.5, Oct.2007.
[5] N. Hoffmann, and F. Fuchs , “Online grid estimation for control of grid
connected converters in inductive –resistive distributed power networks using
extended Kalmann filter,” IEEE conference ,pp.922-929, 2012.
[6] J. Vasquez, J. Gurerreo, A. Luna, P. Rodriguez, and R. Teoderscu,
“Adaptive control applied to voltage source inverters operating in grid
connected and islanded modes,” IEEE Transactions on Industrial Electronics,
Vol. 56 , No. 10, pp. 4088-4096, Oct. 2009.
[7] J. Huang, K. Corzine, M. Belkhyat, “ Small signal Impedance measurement
of power electronics based AC power systems using line to line current
injection,” IEEE Transactions on Power Electronics,vol.56, pp.4088-4096,
2009.
[8] M. Ciobotaru, R. Teodorescu and F. Blaabjberg, “On line grid
estimation based on harmonic injection for grid connected PV inverter,” In
proc. IEEE International Symposium on Industrial electronics, ISIE 2007.
[9]A. Timbus , P. Roriguez, R. Teodorescu, M. Ciobotaru, “Line Impedance
estimation using active and reactive power variations,” In proc. IEEE , PESC
,pp.1273-1279, 2007.
[10]L. Siminoaei, R. Teodorescu, F. Blaabjerg, U. Borup, “ A digital
controlled PV inverter with grid impedance estimation for ENS detection ,”
IEEE Trans. on Power Electronics, vol.20, no.6, pp. 1480-1490, Nov.2005.
[11]Z. Straozcyzk, “A method for real time wide identification of the source
impedance in power system,” IEEE Trans. on Instrumentation measurement,
vol.54,no.1,pp.377-385, Feb. 2005.
[12] M. Sumner, B. Palethorpe, D. Thomas,P. Zanchetta, and M. Piazza, “ A
Technique for power supply harmonic impedance estimation using controlled
voltage disturbance,” IEEE Trans. Power Electronics,vo.17,no.2, pp.207-212,
Mar.2002.
[13] M. Sumner, B. Palethorpe, and D. Thomas, “Impedance measurement
for improved power quality- part 1: the measurement technique,” IEEE Trans.
on Power Electronics, vol.19,no.3, pp.1442-1448, July 2004.
[14] S. Cobaceus, E. Bueno, D. Pizzrro,F. Rodriguez, and F.Huerta, “ Grid
Impedance monitoring system for distributed power generation electronic
interfaces,” IEEE Trans. on Instrumentation and Measurement, vol.58, no.9,
pp.3112-3121, Sept.2009.
[15] K. Vu, M. Begovic, D. Novosel, and M. Saha, “Use of local
measurements to estimate voltage stability margin,” IEEE Trans. on Power
systems, vol.14, pp.1029-1034, 1999.
[16] Vairamohan Bhaskar, “State of charge estimation for batteries,” Masters
Thesis, University of Tenesse, 2002.
[17]S. Tsai, K. Wong , “Adaptive undervoltage load shedding relay design
using Thevenin equivalent estimation”, in Proc. Power and energy society
general meeting, IEEE, 2008.
[18] S. Corsi, and G. Taranto, “A real time voltage instability identification
algorithm on local Phasor measurement,” IEEE Trans. on Power systems,
vol.23, no.3, Aug. 2008.
[19]C. Tsai, C. Chiachu, “Fault locating estimation using Thevenin equivalent
in power systems,” in proc. IPEC,IEEE conference, 2010.
[20] A. R. Phadke, M. Fozdar, K. R. Niazi, “A New Technique for on-line
monitoring of voltage Stability margin using local signals”, Fifteenth National
Power Systems Conference (NPSC), IIT Bombay, December 2008.
| 3cs.SY
|
1
Primary frequency regulation with load-side
participation: stability and optimality
arXiv:1602.02800v1 [math.OC] 8 Feb 2016
Andreas Kasis, Eoin Devane, and Ioannis Lestas
Abstract—We present a method to design distributed generation and demand control schemes for primary frequency
regulation in power networks that guarantee asymptotic stability
and ensure fairness of allocation. We impose a passivity condition
on net power supply variables and provide explicit steady state
conditions on a general class of generation and demand control
dynamics that ensure convergence of solutions to equilibria
that solve an appropriately constructed network optimization
problem. We also show that the inclusion of controllable demand
results in a drop in steady state frequency deviations. We discuss
how various classes of dynamics used in recent studies fit within
our framework and show that this allows for less conservative
stability and optimality conditions. We illustrate our results with
simulations on the IEEE 68 bus system and observe that both
static and dynamic demand response schemes that fit within our
framework offer improved transient and steady state behavior
compared with control of generation alone. The dynamic scheme
is also seen to enhance the robustness of the system to time-delays.
I. I NTRODUCTION
Large scale integration of renewable sources of energy
within the power grid is expected to cause fast changes in
generation, making power imbalances increasingly frequent
due to the inability of conventional means of generation
to counter-balance them. Load participation is considered
to be one potential solution to this problem, providing fast
response to power changes. Household appliances like air
conditioning units, heaters, and refrigerators can be controlled
to adjust frequency and regulate power imbalances. Although
the idea dates back to the 1970s [1], research attention has
recently increasingly focused on the concept of controllable
demand [2], with particular consideration given to its use for
primary control [3], [4]. Primary or droop control operates on
a timescale of tens of seconds and is responsible for ensuring
that generation and demand are always balanced [5]. It functions by adjusting governor set-points based on local frequency
deviations and is completely decentralized. Simulation studies
and field tests (e.g. [6], [7]) have shown the feasibility of
including controllable demand in the droop control process.
Furthermore, they have shown that local frequency measurements are sufficient as a control signal for load participation
in primary control.
An issue of fairness is raised if appliances are to be used as a
means of controllable demand. Recent studies have attempted
to address this issue by devising control schemes which solve
Andreas Kasis and Ioannis Lestas are with the Department of Engineering,
University of Cambridge, Trumpington Street, Cambridge, CB2 1PZ, United
Kingdom; e-mails: [email protected], [email protected]
Eoin Devane is with the Cambridge Centre for Analysis, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge,
CB3 0WA, United Kingdom; e-mail: [email protected]
an optimization problem guaranteeing fair allocation between
them. This approach has been studied for primary and also for
secondary control. We consider here primary rather than secondary control in order to avoid the additional communication
that would be necessary to get a fair allocation if controllable
demand were used in the latter case. This is because it is
evident that a synchronizing variable is necessary to achieve
optimality, allowing all nodes to adapt their generation and
controllable demand so as to attain equal marginal costs. In
primary control, frequency deviation from the nominal value
can be used for this purpose, allowing decentralized control to
be achieved [8], [9]. In [8] only primary control in loads and
linearised power flows are considered while in [9] these assumptions are waived, considering also generation control and
non-linear power flows. In secondary control, where frequency
deviations return to zero, a different variable needs to be
used for synchronization. A common approach is to introduce
additional information exchange between neighbouring buses
in order to achieve this [10], [11], [12], [13] or have special
network structures like star topology, as in [14].
In this paper, we consider a network model described by
nonlinear swing equations. We consider a general class of
dynamics for power generation and controllable demand, on
which we impose appropriate conditions so as to achieve
stability of the equilibrium points and an optimization interpretation of those. This allows us to guarantee, for a wide variety
of possible generation and demand dynamics, convergence to a
power allocation that solves an appropriately constructed optimization problem, thus ensuring fairness in this allocation. The
class of dynamics considered incorporates control schemes
using only local frequency measurements as input signals, and
we demonstrate that this is sufficient to enable them to take the
right decisions so as to converge to a global optimum, thus
allowing distributed control. Further, we also prove that the
inclusion of controllable demand can aid in frequency control
by reducing the steady state frequency error. We illustrate the
applicability of our approach by demonstrating that various
dynamics that have been used in recent interesting studies,
such as [8] and [9], can be incorporated within our framework,
and we show that the analysis presented in the paper allows
for less conservative stability and optimality conditions.
It should be noted that one of the distinctive features of our
analysis is that optimality of the power allocation is provided
via appropriate conditions on the input/output properties of the
systems considered. In our companion paper [16] we show
how additional local information can be exploited to relax a
passivity condition used in this paper to deduce convergence.
The paper is organized as follows. In Sections II and III
we start with some basic notation and definitions that are
2
used in the rest of the paper. In Section IV, we present the
power network model and introduce the class of generation and
load dynamics that will be considered. Section IV introduces
the optimization problem that we consider and Section V
presents our main results, which are proved in Appendix
A. In Section VI, we discuss how our analysis relates to
other important studies. Section VII illustrates our results
through simulations on the IEEE 68 bus system. Finally,
conclusions are drawn in Section VIII. In Appendix B we
present a generalization of the optimality results in the paper
whereby the cost functions considered are allowed to have
discontinuous derivatives, which, as discussed in the paper,
can be important in practical implementations.
0. The region of attraction1 of x̄ is denoted by X0 . We also
define the static input-state characteristic map kx : R → Rm ,
kx (ū) := x̄.
(2)
Based on this, we can also define the static input-output
characteristic map ky : R → R,
ky (ū) := g(kx (ū), ū).
(3)
The requirement that for any constant input to (1) there exists
a unique equilibrium point, could be relaxed to require only
isolated equilibrium points, however, we assume it here to
simplify the presentation.
IV. P ROBLEM FORMULATION
II. N OTATION
A. Network model
Real numbers are denoted by R, and the set of ndimensional vectors with real entries is denoted by Rn . For a
d
f (q).
function f (q), we denote its first derivative by f 0 (q) = dq
−1
The expression f (w) represents the preimage of the point w
under the function f , i.e. f −1 (w) = {q : f (q) = w}. When the
function f is invertible, f −1 then defines the inverse function
of f . A function f : Rn → R is said to be positive definite
on a neighbourhood D around the origin if f (0) = 0 and
f (x) > 0 for every non-zero x ∈ D. It is positive semidefinite
if the inequality > 0 is replaced by ≥ 0. Furthermore, for
a, b ∈ R, a ≤ b, the expression [q]ba will be used to denote
max{min{q, b}, a}. The indicator function 1S : Rn → {0, 1}
of a set S ⊆ Rn takes the value 1 if its argument belongs to
the set S and 0 otherwise.
For a function of time q(t), we denote its derivative with
respect
R ∞ −stto time by q̇ and its Laplace transform by q̂ =
e q(t) dt. We use L2 to denote the Hilbert
0
qR space of
∞ 2
functions f : R → R with finite norm kf k2 =
f (t)dt.
0
For a system as in (1) where x = x̄, u = y = 0 is an
equilibrium point, its L2 -gain is defined as the supremum of
the ratio of the L2 -norms of the output y and the input u,
kyk
i.e. supkuk2 6=0 kuk2 , with x(0) = x̄. For a stable linear system
2
with transfer function T (s) it is known that its L2 -gain is
given by its ∞-norm kT k∞ := sup |T (jω)|.
ω
III. P RELIMINARIES
Throughout the paper we will consider dynamical systems
with input u(t) ∈ R, state x(t) ∈ Rm , and output y(t) ∈ R
with a state space realization of the form
ẋ = f (x, u),
y = g(x, u),
The power network model is described by a graph (N, E)
where N = {1, 2, . . . , |N |} is the set of buses and E ⊆ N ×N
the set of transmission lines connecting the buses. There are
two types of buses in the network, generation and load buses.
Their main difference is that generation buses have non-zero
generation inertia in contrast with load buses. Correspondingly,
only generation buses have nontrivial generation dynamics.
Let G = {1, 2, . . . , |G|} and L = {|G| + 1, . . . , |N |} be the
sets of generation and load buses such that |G| + |L| = |N |.
Furthermore, we use (i, j) to denote the link connecting buses
i and j and assume that the graph (N, E) is directed with
arbitrary direction, so that if (i, j) ∈ E then (j, i) ∈
/ E.
For each j ∈ N , we use i : i → j and k : j → k to
denote the sets of buses that are predecessors and successors of
bus j respectively. It is important to note that the form of the
dynamics in (4)–(5) below is unaltered by any change in the
graph ordering, and all of our results are independent of the
choice of direction. We also assume that (N, E) is connected.
The following assumptions are made for the network:
1) Bus voltage magnitudes are |Vj | = 1 p.u. for all j ∈ N .
2) Lines (i, j) ∈ E are lossless and characterized by their
susceptances Bij = Bji > 0.
3) Reactive power flows do not affect bus voltage phase angles
and frequencies.
The rate of change of frequency at the generation buses can
then be represented using swing equations, while power must
be conserved at each of the load buses. This motivates the
following system dynamics (e.g. [5])
η̇ij = ωi − ωj , (i, j) ∈ E,
(4a)
X
X
M
c
u
Mj ω̇j = −pL
pjk +
pij , j ∈ G,
j +pj −(dj +dj )−
0=
(1)
−pL
j
−
(dcj
+
duj )
−
m
pjk +
k:j→k
pij = Bij sin ηij −
m
i:i→j
k:j→k
X
pnom
ij ,
X
(4b)
pij , j ∈ L, (4c)
i:i→j
(i, j) ∈ E.
(4d)
m
where f : R × R → R is locally Lipschitz and g : R ×
R → R is continuous. We assume in system (1) that given
any constant input u(t) ≡ ū ∈ R, there exists a unique locally
asymptotically stable equilibrium point x̄ ∈ Rm , i.e. f (x̄, ū) =
1 That is, for the constant input u = ū, any solution x(t) of (1) with initial
condition x(0) ∈ X0 must satisfy x(t) → x̄ as t → ∞. The definition
of local asymptotic stability also implies that this region X0 has nonempty
interior.
3
u
c
In system (4) the quantities pM
j , ωj , dj and dj are timedependent variables representing, respectively, deviations from
a nominal value2 for the mechanical power injection to the
generator bus j, and the frequency, controllable load and
uncontrollable frequency-dependent load present at any bus j.
The variables ηij and pij represent, respectively, the power
angle difference3 and the deviation from nominal value pnom
ij
for the power transmitted from bus i to bus j. The constant
Mj > 0 denotes the generator inertia. We shall study the
response of system (4) to a step change pL
j in the uncontrollable demand at each bus j. To investigate decentralized
control schemes for generation and controllable load based
upon local measurements of the frequency alone, we close
c
u
the loop in (4) by determining each of pM
j , dj , and dj as
outputs from independent systems of the form in Section III
with inputs given by the negative of the local frequency,
ẋM,j = f M,j (xM,j , −ωj ),
M,j
pM
(xM,j , −ωj ),
j =g
ẋ
c,j
dcj
ẋ
=g
u,j
duj
=f
c,j
=f
=g
c,j
(x
u,j
u,j
(x
c,j
c,j
(x
(x
, −ωj ),
, −ωj ),
u,j
u,j
, −ωj ),
, −ωj ),
j ∈ G,
j ∈ N,
j ∈ N.
X
p∗jk +
p∗ij , j ∈ G,
i:i→j
k:j→k
(6b)
0=
c,∗
u,∗
−pL
j − (dj + dj ) −
X
k:j→k
p∗jk
+
X
p∗ij ,
j ∈ L, (6c)
i:i→j
xM,j,∗ = kxM,j (−ωj∗ ), j ∈ G,
(6d)
xc,j,∗ = kxc,j (−ωj∗ ), j ∈ N,
(6e)
xu,j,∗ = kxu,j (−ωj∗ ), j ∈ N,
(6f)
where the quantities in (6b) and (6c) are given by
∗
p∗ij = Bij sin ηij
− pnom
ij , (i, j) ∈ E,
(6g)
pM,∗
= k pM
(−ωj∗ ), j ∈ G,
j
j
(6h)
∗
c
dc,∗
j = kdj (−ωj ), j ∈ N,
(6i)
du,∗
= kduj (−ωj∗ ), j ∈ N.
j
(6j)
(5a)
(5b)
(5c)
For convenience in the notation, we collect4 the variables
in (5) into the vectors xM = [xM,j ]j∈G , xc = [xc,j ]j∈N , and
xu = [xu,j ]j∈N . These quantities represent the internal states
of the dynamical systems used to update the desired outputs
c
u
M
c
pM
j , dj , and dj . The variables pj and dj are controllable, so
we have freedom in our analysis to design certain properties
of the dynamics in (5a) and (5b). By contrast, duj represents
uncontrollable load and the dynamics in (5c) are thus fixed. It
should be noted that the systems in (5) can be heterogeneous
and of arbitrary dimension.
Throughout the paper we aim to characterize broad classes
of dynamics associated with generation and demand, so that
stability and optimality can be guaranteed for the equilibrium
points of the overall interconnected system (4)–(5). Various
examples of those will be discussed in Section VI, with
simulations also provided in section VII.
B. Equilibrium analysis
We now quantify what is meant by an equilibrium of the
interconnected system (4)–(5).
Definition 1: The constants5 (η ∗ , ω ∗ , xM,∗ , xc,∗ , xu,∗ ) define an equilibrium of the system (4)–(5) if the following hold
0 = ωi∗ − ωj∗ , (i, j) ∈ E,
X
M,∗
u,∗
0 = −pL
−(dc,∗
j +pj
j +dj )−
(6a)
2 A nominal value of a variable is defined as its value at an equilibrium of
(4) with frequency equal to the nominal value of 50Hz (or 60Hz).
3 The quantities η
ij represent the phase differences between buses i and j,
given by θi − θj . The angles themselves must also satisfy θ̇j = ωj at all
j ∈ N , however, we omit this equation in (4) since the power transfers p are
functions only of the phase differences.
4 Note that each local variable (e.g. xM,j ) is a vector with multiple
components.
5 By constant we mean a variable independent of time.
We call (6) the equilibrium conditions for the system (4)–(5).
Remark 1: For any equilibrium with a given frequency
value ω ∗ , the uniqueness in the definition of the static inputstate characteristic in Section III immediately shows that the
values of pM,∗ , dc,∗ , and dc,∗ are all guaranteed to be unique.
By contrast, there can in general be multiple choices of η ∗
and p∗ such that the equilibrium equations (6) remain valid,
and thus it follows that the equilibrium power transfers p∗ij
between regions need not be unique. It can be shown that they
become unique under prescribed conditions on the network
structure, such as when (N, E) has tree topology.
Note that the static input-output characteristic maps kpM
,
j
kdcj , and kduj , relating power generation/demand with frequency, as defined in (3), completely characterize the effect
of the dynamics (5) on the behavior of the power system (4)
at equilibrium. In our analysis, we will consider a class of
dynamics within (5) for which the set of equilibrium points in
Definition 1 that satisfy Assumption 1 below is asymptotically
stable. Within this class, we then consider appropriate conditions on these characteristic maps such that the values of the
variables defined in (6h)–(6j) are optimal for an appropriately
constructed network optimization problem.
Throughout the remainder of the paper we suppose that
there exists some equilibrium of (4)–(5) as defined in Definition 1. We let (η ∗ , ω ∗ , xM,∗ , xc,∗ , xu,∗ ) denote any such
equilibrium and use (p∗ , pM,∗ , dc,∗ , du,∗ ) to represent the
corresponding quantities defined in (6g)–(6j). We now impose
an assumption on the equilibrium, which can be interpreted as
a security constraint for the power flows generated.
∗
Assumption 1: |ηij
| < π2 for all (i, j) ∈ E.
The stability and optimality properties of such an equilibrium
point will now be studied in the sections that follow.
4
C. Combined passive dynamics from generation and load
dynamics
In terms of the outputs from (5), define the net supply
variables
M
c
u
sG
(7a)
j = pj − (dj + dj ), j ∈ G,
c
u
sL
j = −(dj + dj ), j ∈ L.
(7b)
Correspondingly, their values at equilibrium can be written as
u,∗
L,∗
u,∗
sG,∗
= pM,∗
− (dc,∗
= −(dc,∗
j
j
j + dj ) and sj
j + dj ).
The variables defined in (7) evolve according to the dyL
namics described in (5). Consequently, sG
j and sj can be
viewed as outputs from these combined dynamical systems
with inputs −ωj .
We now introduce a notion of passivity for systems of the
form (1) which we will use for the dynamics of the supply
variables defined in (7) to prove our main stability results.
Definition 2: The system (1) is said to be locally input
strictly passive about the constant input values ū and the
constant state values x̄ if there exist open neighbourhoods U
of ū and X of x̄ and a continuously differentiable, positive
semidefinite function V (x) (called the storage function) such
that, for all u ∈ U and all x ∈ X,
T
V̇ (x) ≤ (u − ū) (y − ȳ) − φ(u − ū)
(8)
where φ is a positive definite function and ȳ = ky (ū).
We now suppose that the maps from negative frequency
to supply satisfy this condition of input strict passivity about
equilibrium. Note that this is a decentralized condition.
Assumption 2: Each of the systems defined in (5) with inputs
−ωj and outputs given by (7a) and (7b) respectively are locally
input strictly passive about their equilibrium values −ωj∗ and
(xM,j,∗ , xc,j,∗ , xu,j,∗ ), in the sense described in Definition 2.
Remark 2: Note that, in Assumption 2, we assume only a
passivity property for the systems (5) without specifying the
precise form of the systems, which permits the inclusion of a
broad class of generation and load dynamics. Moreover, the
fact that passivity is assumed only for the net supply dynamics,
rather than for the generation and load dynamics individually,
can permit the analysis of systems incorporating dynamics that
are not individually passive. We will see in Section VI that
various classes of generation and load dynamics that have been
investigated in the literature fit within the present framework.
It should be noted that for linear systems input strict passivity can easily be checked from strict positive realness of the
transfer function or numerically using the KYP Lemma [17]. It
holds for sign preserving static nonlinearities, first-order linear
dynamics, and also higher-order generation/load dynamics
with sufficiently large damping, as it will be discussed in
Section VI.
D. Optimal supply and load control
We aim to explore how the generated power and controllable loads may be adjusted to meet the step change pL
in frequency-independent load in a way that minimizes the
total cost that comes from the extra power generated and the
disutility of loads. We now introduce an optimization problem,
which we call the optimal supply and load control problem
(OSLC), that can be used to achieve this goal.
c
Suppose that costs Cj (pM
j ) and Cdj (dj ) are incurred for
M
c
deviations pj and dj in generation and controllable load
respectively. Furthermore, some additional cost is incurred due
to any change in frequency which alters the demand from
uncontrollable frequency-dependent loads. We represent this
by an integral cost in terms of a function hj which is explicitly
determined by the dynamics in (5c) as
hj (z) = kduj (−z) for all z̄ ∈ R.
(9)
The total cost within OSLC then sums all the above costs,
and the problem is to choose the vectors pM , dc , and du
that minimize this total cost and simultaneously achieve power
balance, while satisfying physical saturation constraints.
OSLC:
Z
X
X
c
min
Cj (pM
)
+
C
(d
)
+
dj j
j
pM ,dc ,du
j∈G
subject to
X
=
X
(dcj
j∈G
j∈N
M,min
M,max
M
pj
≤ pj ≤ pj
,
c,min
c,max
c
dj
≤ dj ≤ dj
, ∀j
h−1
j (z) dz
0
j∈N
pM
j
du
j
+
duj
+
pL
j ),
(10)
∀j ∈ G,
∈ N,
where pM,min
, pM,max
, dc,min
, and dc,max
are the bounds for
j
j
j
j
generation and controllable demand respectively at bus j. The
equality constraint in (10) represents conservation of power
by specifying that all the extra frequency-independent load
is matched by the total additional generation plus all the
deviations in frequency-dependent loads.
Remark 3: The variables pM and dc within (10) represent
the variables that can be directly controlled (generation and
controllable demand), while the variable du can be controlled
only indirectly by effecting changes in the system frequencies
(uncontrollable frequency-dependent demand). Therefore, we
aim to specify properties of the control dynamics in (5a)–
(5b) that ensure that the quantities pM and dc , along with the
system frequencies, converge to values at which optimality
in (10) can be guaranteed.
E. Additional conditions
To guarantee convergence and optimality, we will require
additional conditions on the behavior of the systems (4)–
(5) and the structure of the optimization problem (10). The
assumptions introduced are all of practical relevance, and
we will see in Section VI that the framework considered
encompasses a number of important examples that have been
investigated within the literature.
The first two of these conditions are needed for our proof
of the convergence result in Theorem 1. Within the second of
these we will denote ω G = [ωj ]j∈G and ω L = [ωj ]j∈L .
Assumption 3: The storage functions in Assumption 2 have
strict local minima at the points (xM,j,∗ , xc,j,∗ , xu,j,∗ ) and
(xc,j,∗ , xu,j,∗ ) respectively.
Remark 4: In practice, Assumption 3 is often trivially
satisfied. For instance, whenever the vector fields in (5) are
5
continuously differentiable, then by considering a linearization
about equilibrium, the KYP Lemma can be seen to generate a
storage function satisfying Assumption 3, when the linearized
system is controllable and observable.
Assumption 4: There exists an open neighbourhood T
of (η ∗ , ω G,∗ , xM,∗ , xc,∗ , xu,∗ ) such that at any time instant t, ω L (t) is uniquely determined by the system states
(η(t), ω G (t), xM (t), xc (t), xu (t)) ∈ T and equations (4)–(5).
Remark 5: Assumption 4 is a technical assumption that is
required in order for the system (4)–(5) to have a locally
well-defined state space realization. This is needed in order
to apply Lasalle’s Theorem to analyze stability in the proof
of Theorem 1 below. Without Assumption 4, stability could
be analyzed through more technical approaches such as the
singular perturbation analysis discussed in [18, Section 6.4].
Remark 6: Assumption 4 can often be verified by using the
Implicit Function Theorem to generate decentralized algebraic
conditions under which it is guaranteed to hold. For instance,
Assumption 4 always holds if in (5) we have for all j ∈ L
∂g u,j
∂g c,j
+
6= 0,
∂ωj
∂ωj
(11)
at the equilibrium point. If the functions g c,j and g u,j have no
explicit dependence on ωj satisfying the following condition
at the equilibrium point is also sufficient
Theorem 1 (Stability): Suppose that Assumptions 1–4 are
all satisfied. Then there exists an open neighbourhood S of
the equilibrium (η ∗ , ω G,∗ , xM,∗ , xc,∗ , xu,∗ ) such that whenever
the initial conditions (η(0), ω G (0), xM (0), xc (0), xu (0)) ∈ S,
then the solutions of the system (4)–(5) converge to an
equilibrium as defined in Definition 1.
Remark 8: It will be seen within the proof of Theorem 1 that
ω, xM , xc , xu converge to ω ∗ , xM,∗ , xc,∗ , xu,∗ respectively.
The phase differences η also converge to a fixed point,
however, this can be different from η ∗ .
Theorem 2 (Optimality): Suppose that Assumption 5 is satisfied. If the control dynamics in (5a) and (5b) are chosen such
pM,max
(−ωj∗ ) = [(Cj0 )−1 (−ωj∗ )]pjM,min and kdcj (−ωj∗ ) =
that kpM
j
dc,max
0 −1
[(Cdj
) (ωj∗ )]djc,min ,
j
then the values pM,∗ , dc,∗ , and du,∗ are
optimal for the OSLC problem (10).
From Theorems 1 and 2, we immediately deduce the
following result guaranteeing convergence to optimality.
Theorem 3 (Convergence to optimality): Consider equilibria
of (4)–(5) with respect to which Assumptions 1–5 are all
satisfied. If the control dynamics in (5a) and (5b) are chosen
such that
pM,max
j
0 −1
kpM
(ū)
=
[(C
)
(ū)]
j
j
pM,min
j
(13)
dc,max
0
−1
kdcj (ū) = [(Cdj ) (−ū)]djc,min
j
j
X ∂g c,j ∂f c,j X ∂g u,j ∂f u,j
i
i
+
> 0.
c,j ∂ω
u,j ∂ω
∂x
∂x
j
j
i
i
i
i
(12)
These conditions are, for example, satisfied by the demand
dynamics considered in Section VII.
In addition, we impose an assumption concerning the form
of the cost functions in the OSLC problem (10).
Assumption 5: The cost functions Cj and Cdj are continuously differentiable and strictly convex. Moreover, the first
derivative of h−1
j (z) is nonnegative for all z ∈ R.
Remark 7: The convexity and continuous differentiability
of the cost functions given by Assumption 5 are sufficient to
allow the use of the KKT conditions to prove the optimality
result in Theorem 2. We demonstrate in Appendix B how the
condition of continuity in the derivatives may be relaxed by
by means of subgradient methods.
We will explicitly state within each of our results which of
these conditions are required.
V. M AIN RESULTS
In this section we state our main results, with their proofs
provided in Appendix A. Our first result shows that the set
of equilibria of the system (4)–(5) for which the assumptions
stated are satisfied is asymptotically attracting, while our second result demonstrates sufficient conditions for equilibrium
points to be optimal for the OSLC problem (10). Based on
these results, we can guarantee convergence to optimality of
all solutions starting in the vicinity of an equilibrium. Finally,
we show that the inclusion of controllable demand in our
model reduces steady state frequency deviation, thereby aiding
in frequency control.
hold for all ū ∈ R, then there exists an open neighbourhood
of initial conditions about any such equilibrium such that the
solutions of (4)–(5) are guaranteed to converge to a global
minimum of the OSLC problem (10).
Remark 9: Theorem 3 states that if the system (4)–(5)
starts sufficiently close to any of its equilibria with respect
to which Assumptions 1 - 5 are satisfied, then the system
is guaranteed to converge to an equilibrium point which will
be optimal for the desired OSLC problem (10). The fact that
pM and dc represent controllable quantities means that we
are free to design the dynamics in (5a) and (5b) in order
that the conditions (13) are satisfied. Thus, knowledge of
the cost functions in the optimization problem we want to
solve explicitly determines classes of dynamics which are
guaranteed to yield convergence to optimal solutions.
Theorem 4 (Reduction in steady state error): Suppose that
Assumptions 1–5 are all satisfied with respect to all equilibria
of (4)–(5). If the control dynamics in (5a) and (5b) are chosen
such that (13) hold for all ū ∈ R, then the addition of
controllable demand in primary control results in a drop in
steady state frequency deviation from its nominal value.
VI. D ISCUSSION
We now discuss various examples of generation and load
dynamics that can fit within our framework.
As a first example, consider the model in [8], which
investigates a linearized version of the system (4) coupled with
0 −1
the static nonlinearities dcj = (Cdj
) (ωj ) for the controllable
demand, and with uncontrollable loads of the form duj =
Dj ωj . The damping constants Dj were assumed positive,
the cost functions Cdj were taken to be strictly convex, and
6
As shown in Corollary 1 below, under (16), the overall
M
u
system relating −ωj with6 sG
j = pj − dj becomes input
strictly passive about any equilibrium point. This follows
from a more general result which we now state describing
the connection between the L2 -gain of general generation
dynamics and the passivity of the supply dynamics. The proofs
of Proposition 1 and Corollary 1 can be found in Appendix A.
ˆ
Fig. 1. Nyquist plot for the transfer function relating p̃ˆM
j with −ω̃j when a
linearization of (14) about equilibrium is considered. A transfer function with
a Nyquist plot within the circle satisfies the gain condition (16). Our approach
allows the Nyquist plot to extend within the entire striped region.
the mechanical power injection pM was also assumed to be
constant after a step change. It is easy to see that for such a
system Assumptions 1–5 are all satisfied. Hence, this model
can be analyzed in the framework introduced above, thus
implying optimality and stability of the equilibrium points.
The present framework can also include systems in which
the generated powers satisfy any first-order dynamics, since
such schemes are passive about their equilibria for arbitrary gains. For higher-order schemes, however, the dynamics
for pM are not necessarily passive, so some additional conditions are needed to ensure stability. Second-order generation
dynamics are often considered in the literature to model
turbine-governor dynamics (e.g. [5]). These can be described
by the system
α̇j = −
ṗM
j
1
αj +
1
pcj ,
τg,j
τg,j
1
1 M
p +
αj ,
=−
τb,j j
τb,j
j∈G
(14)
where αj is the valve position of the turbine, the constants τg,j
and τb,j represent lags in the dynamics of the governor and
turbine respectively, and pcj is a static function of frequency,
corresponding to droop control. Consider the case where
generator damping and uncontrollable frequency-dependent
loads are modeled by
duj = Dj ωj , ∀j ∈ N,
(15)
and there is no controllable demand. In [9], the gain condition
|pcj (ωj ) − pcj (ωj∗ )| ≤ Kj |ωj − ωj∗ |, j ∈ G
(16)
with Kj < Dj was imposed to ensure stability of the network
when the generations dynamics are given by (14)–(15).
Proposition 1: Let equation (15) hold and consider any
generation dynamics from −ωj to pM
j of the form (5a). Given
M,∗
)
any equilibrium, if the L2 -gain from (ωj −ωj∗ ) to (pM
j −pj
is strictly less than Dj , then the system with input −ωj and
M
u
output sG
j = pj − dj is input strictly passive about the
equilibrium considered.
It easy to show that, for the dynamics (14)–(15), condition (16) is sufficient to satisfy the L2 -gain condition in
Proposition 1. Applying Proposition 1 on the system (14)–
(16) results in the following corollary.
Corollary 1: Let equation (15) hold and consider the generation dynamics in (14). Then, for any equilibrium where (16)
M
u
holds, the system with input −ωj and output sG
j = p j − dj
is input strictly passive about this equilibrium.
Our framework can allow us to include also more general
dynamics and to deduce asymptotic stability under weaker
conditions. To see this, we consider a linearization of the
system (14) about equilibrium and let q̃ denote the deviation
of any quantity q from its equilibrium value q ∗ . Expressing
1
ˆc
ˆM
p̃M
j in the Laplace domain gives p̃j = (τg,j s+1)(τb,j s+1) p̃j .
Therefore,
1
ˆj )
p̃ˆc + Dj (−ω̃
(τg,j s + 1)(τb,j s + 1) j
ˆ j ], j ∈ G,
=: Hj (s)[−ω̃
(17)
ˆ˜u
ˆM
s̃ˆG
j = p̃j − dj =
ˆ j and
where Hj (s) denotes the transfer function relating −ω̃
G
ˆ
s̃j . Since the maximum gain of the transfer function from
p̃cj to p̃M
is 1 at s = 0, the condition in (16) constrains
j
the Nyquist diagram of Hj to lie inside a ball with centre
(Dj , 0) and radius Kj < Dj . This is contained strictly within
the right half-plane, implying the required passivity condition
in Assumption 2. For instance, the Nyquist plot from input
ˆ j to output p̃ˆM
−ω̃
can be as shown by the solid line in
j
Fig. 1. However, according to our analysis any dynamics for
the command signal can be permitted provided that the supply
dynamics in (17) remain input-strictly passive. This can permit
any frequency response within the striped region in Fig. 1,
for example allowing the larger Nyquist locus shown with a
dashed line. In fact, under the reasonable assumption that pcj
has the same sign as −ωj (i.e. negative feedback is used), it
can easily be verified that the transfer function from p̃cj to p̃M
j
6 Note that this example could also include passive controllable demand
dcj (−ωj ), since showing input strict passivity about equilibrium of the system
M
u
with input −ωj and output sG
j = pj − dj is sufficient to ensure also that
M
u
c
the system with the same input and output sG
j = pj − dj − dj is input
strictly passive.
7
Maximum allowable value of ratio K/D vs. value of α
Generation system dynamics with a deadband
60
pmax
c
Deviation in power command
Maximum value of ratio K/D
50
40
30
20
0
10
max
−pc
0
0
0.5
1
1.5
Ratio of time constants, α
2
Fig. 2. Maximum value of the ratio Kj /Dj under which the passivity
property is maintained for the linearized dynamics of system (14)–(16) against
the ratio of time constants a = τb,j /τg,j . The figure demonstrates that
the maximum value for Kj that ensures passivity is allowed to be much
higher than Dj .
given by Tj (s) =
1
(τg,j s+1)(τb,j s+1)
has a minimum real value
−τg,j τb,j
√
(τg,j + τb,j )2 + 2(τg,j + τb,j ) τg,j τb,j
(18)
q
√
(τg,j +τb,j )+ τb,j τg,j
.
Thus,
the
at frequency ωj,M AX =
(τb,j τg,j )3/2
required passivity property will be maintained provided Kj
multiplied by the quantity in (18) is strictly greater than −Dj .
The maximum values of Kj for which this is satisfied are
τb,j
. We
shown in Fig. 2, where a is defined as the ratio τg,j
see that the maximum allowable value for Kj is always at
least 8Dj (obtained at a = 1) and tends to infinity as a → 0
(which corresponds to a first order system). This shows that the
stability guarantees can be preserved under significantly larger
gains Kj than those indicated in Corollary 1. Therefore, our
approach allows for a less conservative stability condition for
equilibrium points where a linearization is feasible, while also
allowing to consider a wider class of generation dynamics. It
is worth noting, however, that the use of the more conservative
L2 -gain condition described in Proposition 1 would generally
be expected to yield better robustness properties. Such tradeoffs between feedback gain and stability margin need to be
taken into account in the design of control systems.
Remark 10: The assumption of small power angles differences η is widely used in the literature. Under such an assumption the stability results stated in the paper hold globally
for the other system states if assumptions 2-4 hold globally7 .
It should be noted though that in general the system (4)–(5)
is not globally asymptotically stable due to the fact that the
sinusoids in (4d) are only locally passive. Finding the region
of attraction is an interesting problem (associated with what is
know as transient stability) which is not explicitly addressed
within this paper.
< (T j (jωj,M AX )) =
7 In particular, system (4)–(5) with the sinusoids in (4d) linearized about
about η ∗ (as in e.g. [9]), would be globally asymptotically stable if in
assumption 2 the systems are globally passive about the equilibrium point
considered, and in assumption 3 the storage functions are radially unbounded
with a minimum at the equilibrium point. For example, cases where the input
strict passivity property is satisfied globally include the class of dynamics
considered in Proposition 1 (and Corollary 1), or the dynamics in (19)–(20).
−ω1
0
−ω0
ω0
Frequency Deviation
ω1
Fig. 3. Power command signal against frequency deviations for a system with
deadband and saturation bounds.
Another class of droop control schemes used in practice
incorporates a deadband which prevents unneeded adjustments
for small variations in frequency about its nominal value. An
example of this is shown in Fig. 3. The response profile of a
static controllable load with deadband and saturation bounds is
analogous. For these systems, a minimum frequency deviation
ωj0 is required to trigger a frequency-dependent deviation. The
system then reaches its physical limits at a higher frequency
deviation ωj1 .
While the stability of these systems can be shown by
Theorem 1, provided8 Assumptions 1–4 hold, Theorem 2
cannot be applied, since the deadband makes the cost functions fail to satisfy continuously differentiability, therefore
not meeting the conditions of Assumption 5. Theorem 5 in
Appendix B shows how Theorem 2 can be generalized to
include non-continuously differentiable cost functions, thereby
permitting the application of our results to analyze systems
with such dynamics.
VII. S IMULATION ON THE IEEE 68 BUS SYSTEM
In this section we illustrate our stability and optimality
results through applications on the IEEE New York / New
England 68 bus interconnection system [20], simulated using
the Power System Toolbox [21]. This model is more detailed
and realistic than our analytical model, including line resistances, a DC12 exciter model, power system stabilizer (PSS),
and a subtransient reactance generator model. A similar model
with no PSS was used for comparison9 .
The test system contains 52 load buses serving different
types of loads including constant active and reactive loads.
The overall system has a total real power of 16.41GW. For
our simulation, we have added three loads on units 2, 9, and
17, each having a step increase of magnitude 1 p.u. (base
100MVA) at t = 1 second. We allow controllable demand
on buses 1-30. The disutility function for the aggregate load
at each bus is dcj is Cdj (dcj ) = 21 αj dcj 2 , where αj are cost
8 Although the nonlinearity depicted in Fig. 3 is itself not input strictly
passive about its equilibria, the presence of any frequency-dependent damping
of the form (15) will be sufficient to ensure that Assumption 2 holds.
9 The details of the simulation models with or without PSS can be found
in the Power System Toolbox data files data16m and data16em respectively.
8
Frequency at bus 63
Allocation of demand in controllable loads
0
60
−0.01
59.9
−0.02
59.8
59.7
No OSLC − No PSS
Static OSLC − No PSS
Dyn. OSLC − No PSS
No OSLC − PSS
Static OSLC − PSS
Dyn. OSLC − PSS
59.6
59.5
59.4
59.3
0
5
10
15
20
25
30
Allocation (p.u.)
Frequency (Hz)
60.1
Static OSLC − α = 10
Dynamic OSLC − α = 10
Static OSLC − α = 5
Dynamic OSLC − α = 5
−0.03
−0.04
−0.05
−0.06
−0.07
−0.08
0
35
5
10
Time (s)
15
20
25
30
35
Time (s)
coefficients. The cost coefficients were selected such that for
a step change in demand, the power allocated between total
generation and controllable demand would be roughly equal,
as suggested in [19]. The selected values were αj = 5 for
load buses 1-10 and αj = 10 for the rest. The loads were
controlled every 10ms.
Consider the static and dynamic control schemes given by10
0 −1
dcj = (Cdj
) (ωj ), j ∈ N,
(19)
d˙cj = −(Cj0 (dcj ) − ωj ), j ∈ N.
(20)
Fig. 5. Power allocation among controllable loads with non-equal cost
coefficients for 2 cases: (i) Static OSLC (ii) Dynamic OSLC.
Marginal Cost of OSLC
0.4
0.35
0.3
Marginal Cost
Fig. 4. Frequency at bus 63 in six cases: (i) no OSLC, no PSS, (ii) Static
OSLC, no PSS, (iii) Dynamic OSLC, no PSS, (iv) no OSLC, with PSS, (v)
Static OSLC, with PSS, (vi) Dynamic OSLC, with PSS.
Static OSLC
Dynamic OSLC
0.25
0.2
0.15
0.1
We refer to the resulting dynamics as Static OSLC and Dynamic OSLC respectively. We investigate the behavior in the
following six cases: (i) no OSLC, no PSS, (ii) Static OSLC,
no PSS, (iii) Dynamic OSLC, no PSS, (iv) no OSLC, with
PSS, (v) Static OSLC, with PSS, (vi) Dynamic OSLC, with
PSS. The frequency dynamics for bus 63 are shown in Fig. 4.
From Fig. 4, we observe that whether or not PSS is used, the
presence of OSLC results in a drop in steady state frequency
deviations, as expected due to Theorem 4. Furthermore, we
can see that the overshoot is significantly less when OSLC is
used. The responses for Static and Dynamic OSLC have no
significant differences and converge to the same exact value
at steady state. However, Dynamic OSLC appears to give a
larger overshoot than Static OSLC. In all cases, the voltage
deviation was less than 0.01 p.u., showing that the constant
voltage assumption is reasonable.
In Fig. 5 we also observe a higher power allocation at the
load buses whose cost coefficients take the lower value αj = 5
than at those with αj = 10. This demonstrates that the power
allocation among controllable loads depends upon the loads’
respective cost coefficients of demand response. This behavior
could be beneficial if a prescribed allocation were desirable,
as then the load dynamics could be designed such that the cost
coefficients chosen yield the desired allocation. Furthermore,
as shown in Fig. 6, the marginal costs at each controlled load
converge to the same value. This illustrates the optimality in
the power allocation among the loads, as equality of marginal
10 Note that both (19) and (20) are input strictly passive about the equilibria,
and both satisfy Assumption 4 (using the conditions in equations (11) and (12)
respectively).
0.05
0
0
5
10
15
20
25
30
35
Time (s)
0
Fig. 6. Marginal costs Cdj
of controllable loads with non-equal cost
coefficients for 2 cases: (i) Static OSLC (ii) Dynamic OSLC.
costs is the optimality condition for (10) when the allocations
do not saturate.
Finally, to investigate the system’s robustness, we then
introduced delays to account for the time between the arrival
of the frequency signal and the response of the controllable
demand. The simulation was repeated with 0.1 pu loads and a
delay of 0.05 seconds. Furthermore, all cost coefficients were
set to αj = 1. Dynamic OSLC was seen to offer improved
robustness to the time-delay relative to Static OSLC, since the
first converged both with and without PSS whereas the latter
became unstable in both cases. This illustrates how appropriate higher order dynamics can have improved robustness
properties. The simulation results for Dynamic OSLC are
depicted in Fig. 7. This enhanced robustness to delays can
be explained with the help of Fig. 8. The figure shows the
Nyquist plots of the transfer functions relating the increments
from equilibrium of dcj and −ωj for the systems (19) and (20)
respectively linearized about equilibrium, with an input delay
included and also both multiplied by a positive gain K > Dj ,
where Dj is the damping coefficient at bus j, as in (15). The
delayed Dynamic OSLC (dashed line) maintains the passivity
property of the bus dynamics (since the Nyquist plot remains
to right side of −Dj , as was previously discussed in section
VI). On the other hand, the delayed Static OSLC (solid line)
does not, explaining why the latter might be expected to
9
potential extensions to our analysis include incorporating
voltage dynamics as well as more advanced models for the
loads where their switching behavior is taken into account.
Frequency at bus 63
60
Frequency (Hz)
Dynamic OSLC − No PSS
Dynamic OSLC − PSS
59.95
59.9
59.85
0
5
10
15
20
Time(s)
25
30
35
Fig. 7. Frequency at bus 63 for Dynamic OSLC with time-delays in two
cases: (i) no PSS (ii) with PSS.
A PPENDIX A
P ROOFS OF OUR MAIN RESULTS
In this appendix we prove our main results, Theorems 1–4,
and we also provide proofs of Proposition 1 and Corollary 1.
Proof of Theorem 1: We will use the dynamics in (4)
together with the passivity conditions in Assumption 2 to
define a Lyapunov function for the system (4)–(5), similarly
to [9], [13].
P
Firstly, we introduce VF (ω G ) = 12 j∈G Mj (ωj − ωj∗ )2 .
The time-derivative along the trajectories of (4)–(5) is then
!
X
X
X
∗
L
G
V̇F =
(ωj − ωj ) − pj + sj −
pjk +
pij
j∈G
i:i→j
k:j→k
!
+
X
(ωj − ωj∗ )
X
L
− pL
j + sj −
j∈L
X
pjk +
k:j→k
pij ,
i:i→j
by substituting (4b) for ω̇j for j ∈ G and adding the final
term, which is equal to zero by (4c). Subtracting the product
of (ωj − ωj∗ ) with each term in (6b) and (6c), this becomes
X
X
G,∗
L,∗
V̇F =
(ωj − ωj∗ )(sG
(ωj − ωj∗ )(sL
j − sj ) +
j − sj )
j∈G
j∈L
+
X
(pij − p∗ij )(ωj − ωi ),
(21)
(i,j)∈E
Fig. 8. Nyquist plot of the transfer functions relating the deviations from
equilibrium of dc and −ω, for the systems (19) and (20) linearized about
equilibrium, multiplied by a constant K > Dj and with an input delay also
included. The figure shows that only the Dynamic delayed system (dashed
line) remains on the right of −Dj , maintaining the passivity property of the
bus dynamics when the damping coefficient is Dj as in (15). The Static
system (solid line) extends to the left of −Dj , hence the passivity property
is lost.
become unstable.
VIII. C ONCLUSION
Within the paper, we have considered the problem of
designing distributed generation and demand control schemes
for primary frequency regulation in power networks such that
asymptotic stability is guaranteed while ensuring optimality
of power allocation. We have presented a network passivity
framework which provides a systematic method to show
stability over a broad class of generation and load dynamics.
Furthermore, we have derived steady state conditions for the
generation and controllable demand control schemes that
ensure that the power generated/consumed is the solution to
an appropriately constructed network optimization problem,
thus allowing fairness in power allocation to be guaranteed.
In addition, under some minor assumptions, we have shown
that the inclusion within the model of controllable demand
has a positive effect also on secondary control, decreasing
the steady state deviation in frequency. A simulation on
the IEEE 68 bus system verifies our results. Interesting
using in the final term the equilibrium
P condition R(6a).
η
Additionally, consider VP (η) = (i,j)∈E Bij η∗ij (sin φ −
ij
∗
sin ηij
) dφ. Using (4a) and (4d), the time-derivative equals
X
∗
V̇P =
Bij (sin ηij − sin ηij
)(ωi − ωj )
(i,j)∈E
=
X
(pij − p∗ij )(ωi − ωj ).
(22)
(i,j)∈E
Furthermore, from the passivity conditions in Assumption 2
and the definition of input strict passivity from Section III, it
follows that the following hold:
1) For each j ∈ G, there exist open neighbourhoods UjG
of ωj∗ and XjG of (xM,j,∗ , xc,j,∗ , xu,j,∗ ) and a continuously differentiable, positive semidefinite function11
VjG (xM,j , xc,j , xu,j ) such that
G,∗
V̇jG ≤ ((−ωj ) − (−ωj∗ ))(sG
j − sj )
∗
− φG
j ((−ωj ) − (−ωj ))
(23)
for all ωj ∈ UjG and all (xM,j , xc,j , xu,j ) ∈ XjG ,
2) For each j ∈ L, there exist open neighbourhoods UjL
of ωj∗ and XjL of (xc,j,∗ , xu,j,∗ ) and a continuously differentiable, positive semidefinite function VjL (xc,j , xu,j )
such that
L,∗
V̇jL ≤ ((−ωj ) − (−ωj∗ ))(sL
j − sj )
∗
− φL
j ((−ωj ) − (−ωj )) (24)
11 The
time-derivates of VjG and VjL are evaluated using the dynamics (5).
10
for all ωj ∈ UjL and all (xc,j , xu,j ) ∈ XjL ,
L
where φG
j and φj are positive definite functions.
Based on the above, we define the function
V (η, ω G , xM , xc , xu ) = VF (ω G ) + VP (η)
X
X
+
VjG (xM,j , xc,j , xu,j ) +
VjL (xc,j , xu,j ),
j∈G
j∈L
which we aim to use in Lasalle’s theorem. By (21) and (22),
i
Xh
G,∗
G
(ωj − ωj∗ )(sG
V̇ =
j − sj ) + V̇j
j∈G
+
i
Xh
L,∗
L
.
(ωj − ωj∗ )(sL
j − sj ) + V̇j
j∈L
Using (23) and (24) it therefore holds that
V̇ ≤ −
X
j∈G
≤0
∗
φG
j ((−ωj ) − (−ωj )) −
X
∗
φL
j ((−ωj ) − (−ωj ))
j∈L
(25)
whenever ωj ∈ UjG and (xM,j , xc,j , xu,j ) ∈ XjG for all j ∈ G
and ωj ∈ UjL and (xc,j , xu,j ) ∈ XjL for all j ∈ L.
Clearly VF has a strict global minimum at ω G,∗ , and
G
Vj , VjL have strict local minima at (xM,j,∗ , xc,j,∗ , xu,j,∗ ),
(xc,j,∗ , xu,j,∗ ) by Assumption 3. Additionally, note that Assumption 1 guarantees the existence of some neighbourhood
∗
of each ηij
on which the respective integrand in the definition
of VP is increasing. Since the integrand is zero at the lower
∗
limit of the integration, ηij
, this immediately implies that
VP has a strict local minimum at η ∗ . Thus, V has a strict
local minimum at the point Q∗ := (η ∗ , ω G,∗ , xM,∗ , xc,∗ , xu,∗ ).
We now recall Assumption 4. This tells us that, provided
(η, ω G , xM , xc , xu ) ∈ T , ω L can be uniquely determined
from these quantities. Therefore, the states of the differential
equation system (4)–(5) within the region T can be expressed
as (η, ω G , xM , xc , xu ). Let us now choose a neighbourhood
in the coordinates (η, ω G , xM , xc , xu ) about Q∗ on which the
following all hold:
1) Q∗ is a strict minimum of V ,
2) (η, ω G , xM , xc , xu ) ∈ T ,
3) ωj ∈ UjG and (xM,j , xc,j , xu,j ) ∈ XjG for all j ∈ G and
ωj ∈ UjL and (xc,j , xu,j ) ∈ XjL for all j ∈ L 12 ,
4) xM,j , xc,j , and xu,j all lie within their respective
neighbourhoods X0 as defined in Section III.
Recalling now (25), we thus see that within this neighbourhood, V is a nonincreasing function of all the system states and
has a strict local minimum at Q∗ . Consequently, the connected
component of the level set {(η, ω G , xM , xc , xu ) : V ≤ }
containing Q∗ is guaranteed to be both compact and positively
invariant with respect to the system (4)–(5) for all sufficiently
small > 0. Therefore, there exists a compact positively
invariant set Ξ for (4)–(5) containing Q∗ .
Lasalle’s Invariance Principle can now be applied with the
function V on the compact positively invariant set Ξ. This
is possible because the requirement ωj ∈ UjL for all j ∈ L
corresponds, by Assumption 4 and the continuity of the equations in (4)–(5), to
requiring the states (η, ω G , xM , xc , xu ) to lie in some open neighbourhood
about Q∗ .
12 This
guarantees that all solutions of (4)–(5) with initial conditions (η(0), ω G (0), xM (0), xc (0), xu (0)) ∈ Ξ converge to the
largest invariant set within Ξ ∩ {(η, ω G , xM , xc , xu ) : V̇ = 0}.
We now consider this invariant set. If V̇ = 0 holds at a point
within Ξ, then (25) holds with equality, whence by Assumption 2 we must have ω = ω ∗ . Moreover, on any invariant set
on which ω = ω ∗ , the system equations (4) apply and give
precisely the equilibrium conditions (6a), (6b), (6c), and (6g).
Furthermore, if V̇ = 0, it follows from (21), (22), (23),
and (24) that all V̇jG = 0 and V̇jL = 0. But ω = ω ∗ implies
by the definitions in Section III that (xM , xc , xu ) converge
to the point (xM,∗ , xc,∗ , xu,∗ ), at which Assumption 3 states
that VjG and VjL take strict local minima. Therefore the
values of VjG and VjL must decrease along all nontrivial
trajectories within the invariant set, contradicting V̇jG = 0
and V̇jL = 0. Consequently, at all points of any invariant
set within Ξ ∩ {(η, ω G , xM , xc , xu ) : V̇ = 0}, we must also
have (xM , xc , xu ) = (xM,∗ , xc,∗ , xu,∗ ). Thus, the remaining
equilibrium conditions (6d), (6e), (6f), (6h), (6i), and (6j) are
also satisfied. Therefore, we conclude by Lasalle’s Invariance
Principle that all solutions of (4)–(5) with initial conditions
(η(0), ω G (0), xM (0), xc (0), xu (0)) ∈ Ξ converge to the set of
equilibrium points as defined in Definition 1. Finally, choosing
for S any open neighbourhood of Q∗ within Ξ completes the
proof.
0
Proof of Theorem 2: Due to Assumption 5, Cj0 and Cdj
are
strictly increasing and hence invertible. Therefore
pM,max
kpM
(−ωj∗ ) = [(Cj0 )−1 (−ωj∗ )]pjM,min
j
j
kdcj (−ωj∗ )
=
dc,max
0 −1
[(Cdj
) (ωj∗ )]djc,min
(26)
j
are well-defined. Furthermore, Assumption 5 also ensures that
the OSLC problem (10) is a convex optimization problem
with a continuously differentiable cost function. Thus, a point
(p̄M , d¯c , d¯u ) is a global minimum for (10) if and only if it
satisfies the KKT conditions [22]
+
−
Cj0 (p̄M
j ) = −ν − λj + λj , j ∈ G,
(27a)
−
0 ¯c
Cdj
(dj ) = ν − µ+
j + µj , j ∈ N,
(27b)
¯u
h−1
j (dj ) = ν, j ∈ N,
X
X
p̄M
(d¯cj + d¯uj + pL
j =
j ),
(27c)
j∈G
(27d)
j∈N
M,max
pM,min
≤ p̄M
, j ∈ G,
j ≤ pj
j
(27e)
dc,min
≤ d¯cj ≤ dc,max
, j ∈ N,
j
j
(27f)
M,max
M,min
M
M
λ+
) = 0, λ−
) = 0, j ∈ G,
j (pj − pj
j (pj − pj
(27g)
c,min
− c
µ+ (dcj − dc,max
)
=
0,
µ
(d
−
d
)
=
0,
j
∈
G,
(27h)
j
j
j
−
+
−
for some constants ν ∈ R and λ+
j , λj , µj , µj ≥ 0. We
will now show that these conditions are satisfied by the
equilibrium values (p̄M , d¯c , d¯u ) = (pM,∗ , dc,∗ , du,∗ ) defined
by equations (6h), (6i), and (6j).
11
0
are both strictly increasBy Assumption 5, Cj0 and Cdj
ing, so we can uniquely define13 frequencies ωjM,max :=
−Cj0 (pM,max
), ωjM,min := −Cj0 (pM,min
), ωjc,max :=
j
j
0
0
). Letting ω0∗ denote
(dc,min
), and ωjc,min := Cdj
Cdj
(dc,max
j
j
∗
the common value of all ωj due to (6a), we can, in terms of
these quantities, define the nonnegative constants
M,max
− ω0∗ ) 1{q : q≤ωM,max } (ω0∗ ),
λ+
j := (ωj
j
M,min
∗
λ−
) 1{q : q≥ωM,min } (ω0∗ ),
j := (ω0 − ωj
j
(28)
c,max
∗
µ+
) 1{q : q≥ωjc,max } (ω0∗ ),
j := (ω0 − ωj
c,min
µ−
− ω0∗ ) 1{q : q≤ωc,min } (ω0∗ ).
j := (ωj
j
Then, since (Cj0 )−1 (−ω0∗ ) ≥ pM,max
⇔ ω0∗ ≤ ωjM,max ,
j
M,min
M,min
0 −1
(Cj0 )−1 (−ω0∗ ) ≤ pj
⇔ ω0∗ ≥ ωj
, (Cdj
) (ω0∗ ) ≥
c,max
c,max
c,min
∗
0 −1
∗
dj
⇔ ω0 ≥ ωj
, and (Cdj ) (ω0 ) ≤ dj
⇔ ω0∗ ≤
c,min
, it follows by (6h), (6i), and (26) that the complemenωj
tary slackness conditions (27g) and (27h) are satisfied with the
choices (28).
Let us also define ν = ω0∗ . Then
M,max
−
0 −1
∗ −ωj
(Cj0 )−1 (−ν − λ+
+
λ
)
=
(C
)
[−ω
]
j
0 −ω M,min
j
j
j
=
pM,max
[(Cj0 )−1 (−ω0∗ )]pjM,min
j
= pM,∗
,
j
by the above definitions and equations (6h) and (26). Therefore, the optimality condition (27a) holds. Analogously,
ω c,max
0 −1
0 −1
(Cdj
) (ν − µ+ + µ− ) = (Cdj
)
[ω0∗ ]ωjc,min
j
=
dc,max
0 −1
[(Cdj
) (ω0∗ )]djc,min
j
= dc,∗
j ,
by (6i) and (26), satisfying (27b). Additionally, (27c) holds
because hj (ν) = duj follows from (6j) and (9).
Furthermore, summing the equilibrium conditions (6b) over
all j ∈ G and (6c) over all j ∈ L shows that (27d) is satisfied.
Finally, the saturation constrains in (26) ensure that (27e)
and (27f) are also satisfied.
Thus, we see that the values (p̄M , d¯c , d¯u )
=
M,∗ c,∗ u,∗
(p , d , d ) satisfy the KKT conditions (27) with
ν = ω0∗ . Therefore, the equilibrium values pM,∗ , dc,∗ ,
and du,∗ define a global minimum for the problem (10).
Proof of Theorem 3: If Assumptions 1–5 all hold and (13)
is true, then all of the assumptions in both Theorems 1 and 2
are satisfied, and thus the result follows.
Proof of Theorem 4: Recalling the proof of Theorem 2, we
know from (27d) and the equalities (26) that at any equilibrium
of (4)–(5) the power balance equation
X
X
X
0 −1
(Cj0 )−1 (ω0∗ ) +
((Cdj
) (ω0∗ ) + hj (ω0∗ )) = −
pL
j
j∈G
j∈N
j∈N
(29)
13 If any of these quantities do not exist, then we can just take
ωjM,max , ωjc,min := −∞ or ωjM,min , ωjc,max := ∞ as appropriate, and
the following arguments still apply.
is satisfied, where ω0∗ denotes the common steady state value
of frequency due to (6a). Now note that, because the nominal
frequency defines an equilibrium frequency prior to the step
change in load and all quantities in (4) denote deviations
from their respective values at this nominal equilibrium, the
equalities (9) and (13) imply that each term on the lefthand side in (29) must take the value zero at ω0∗ = 0.
Furthermore, Assumption 5 implies that the terms (Cj0 )−1 (ω0∗ )
0 −1
and (Cdj
) (ω0∗ ) are all strictly increasing in ω0∗ , while each
term hj (ω0∗ ) is nondecreasing in ω0∗ . Thus both the added term
due to load control and the entire left-hand side in (29) have
the same sign as ω0∗ and are strictly increasing in ω0∗ . It follows
that the presence of this load control term results in a decrease
in the value of ω0∗ , the steady state frequency deviation from
its nominal value.
Proof of Proposition 1: The L2 -gain condition implies14
s
s
Z t1
Z t1
2 dt ≤ K
)
(30)
(p̃M
ω̃j2 (t) dt.
j
j
0
0
where Kj < Dj and t1 is any positive constant. Then, input
strict passivity can be shown as follows.
s
Z t1
2
Z t1
M
M
p̃j (t)ω̃j (t) dt ≤
|p̃j (t)||ω̃j (t)| dt
(31a)
0
0
s
Z t1
Z t1
M
2
≤
|p̃j (t)| dt
|ω̃j (t)|2 dt (31b)
Z
≤
0
0
t1
Kj ω̃j (t)2 dt <
0
Z
t1
Dj ω̃j (t)2 dt,
0
(31c)
where inequality (31b) follows from the Cauchy-Schwarz
inequality and (31c) from inequality (30) and Kj < Dj ,
j ∈ G. Using (31), it is straightforward to show that
Z t1
Z t1
Dj ω̃j (t)2 dt −
p̃M
j (t)ω̃j (t)dt
0
0
Z t1
Z t1
G
=
s̃j (t)(−ω̃j (t))dt ≥ (Dj − Kj )
ω̃j (t)2 dt> 0
0
0
(32)
holds for all j ∈ G. Inequality (32) implies input strict
M
˜u
passivity of the system with output s̃G
j = p̃j − dj and
input −ω̃j , about the equilibrium point considered, since
(32) implies from [24, Lemma 1] the existence of a positive
definite storage function V satisfying the input strict passivity
condition in Definition 2.
Proof of Corollary 1: Let T j (s) be the transfer function
relating p̃ˆcj (s) and p̃ˆM
j (s) in (14), given by
T j (s) =
1
, j ∈ G.
(τg,j s + 1)(τb,j s + 1)
It is easy to show that kT j (s)k∞ = 1, hence the system from
p̃cj to p̃M
j has L2 -gain less than or equal to 1 (e.g. [25, p.18]).
Using also equation (16) we thus have
c
kp̃M
j k2 ≤ kp̃j k2 < Dj kω̃j k2 .
(33)
14 As in the main text, for a variable x that depends on time we use the
notation x̃ to denote deviations from equilibrium, i.e. x̃ := x − x∗ , where
x∗ is the value of x at the equilibrium point mentioned in the proposition.
12
It follows from (33) that the L2 -gain condition in Proposition 1 holds, therefore Proposition 1 can be used to deduce
input strict passivity of the system.
Remark 11: It can be verified that a possible choice of storage function for the input strictly passive system considered
in Corollary 1 is
X 1
1
M,∗ 2
∗ 2
V (pM , α) =
βj (pM
)
γ
(α
−
α
−
p
+
)
j
j
j
j
j
2
2
j∈G
0 −1
are therefore equal to (Cj0 )−1 and (Cdj
)
respectively in
0
0
the regime where Cj and Cdj are continuous, and otherwise
remain constant. They are thus continuous non decreasing
0 −1
functions analogous to (Cj0 )−1 and (Cdj
)
and are well
defined at all points.
Theorem 5: Suppose that Assumption 6 is satisfied. If the
control dynamics in (5a) and (5b) are chosen such that
pM,max
(−ωj∗ ) = [Dj (−ωj∗ )]pjM,min ,
k pM
j
j
τ
2(D −K )
j
j
b,j
and γj <
τg,j .
with coefficients 0 < βj < γj τg,j
Kj2
Note that this has a strict minimum at the equilibrium point
and hence also satisfies Assumption 3.
A PPENDIX B
E XTENSION TO NON -C 1 COST FUNCTIONS
In this appendix we show how our main results can be
extended to apply also to systems in which the cost functions
within the OSLC problem (10) may not be continuously differentiable. We demonstrate this by formulating a relaxed version
of Assumption 5, which we use to to prove a generalization
of our optimality result Theorem 2. Since Theorem 1 is
independent of Assumption 5 and so remains true also in this
extended case, a corresponding generalization of Theorem 3
will then follow immediately.
We weaken Assumption 5 to the following condition.
Assumption 6: The cost functions Cj and Cdj are continuous and strictly convex. Furthermore, they are continuously
differentiable except on respective sets Λj and Λdj of isolated
points. Moreover, the first derivative of h−1
j (z) is nonnegative
for all z ∈ R.
Assumption 6 therefore relaxes the conditions imposed in
the main paper by allowing the cost functions to be nondifferentiable at a discrete set of points. This permits classes of
hybrid cost functions and more involved control dynamics. To
overcome the issue of nondifferentiability within the proof of
the optimality result that follows, we will consider the notions
of subgradient and the subdifferential (e.g. [26]), defined as
follows.
Definition 3: Given a convex function f : I → R, a
subgradient of f at a point x ∈ I ⊆ R is any v ∈ R such
that f (y) − f (x) ≥ v(y − x) for all y ∈ I. The set of all
subgradients of f at x is called the subdifferential of f at x
and is denoted by ∂f (x).
As in the main text, the analysis needs to make use of the
0
inverse of Cj0 and Cdj
. Since, however, these derivatives are
allowed to be discontinuous, their inverses are not well defined
at points of discontinuity, and we hence need to define the
following functions which can be seen as generalized inverses
0
of Cj0 and Cdj
respectively. In particular, we define
(
(Cj0 )−1 (x), x ∈ Cj0 (R \ Λj ),
Dj (x) :=
γ,
x ∈ [Cj0 (γ−), Cj0 (γ+)], γ ∈ Λj ,
(
(34)
0 −1
0
(Cdj
) (x), x ∈ Cdj
(R \ Λdj ),
Ddj (x) :=
0
0
γ,
x ∈ [Cdj
(γ−), Cdj
(γ+)], γ ∈ Λdj ,
where the quantities γ± respectively denote the limits
lim↓0 (γ ± ). The functions Dj and Ddj defined in (34)
kdcj (−ωj∗ )
M,∗
=
c,∗
dc,max
[Ddj (ωj∗ )]djc,min ,
(35)
j
u,∗
then the values p , d , and d are optimal for the OSLC
problem (10).
Proof of Lemma 5: The optimality proof for non-zero values
of generation or controllable demand is similar to that of
Theorem 2. We will make use of subgradient techniques [26,
Section 23] to show that the discontinuity in the cost function’s
derivative does not affect the optimality result.
Firstly we note that strict convexity implies both that Cj0 and
0
Cdj are strictly increasing on R \ Λj and R \ Λdj respectively,
and that their jumps on Λj and Λdj are nonnegative. Therefore,
0
Cj0 and Cdj
are invertible on R \ Λj and R \ Λdj , and
0
0
0
Cj (γ−) < Cj0 (γ+) for all γ ∈ Λj and Cdj
(γ−) < Cdj
(γ+)
for all γ ∈ Λdj . Moreover, continuous differentiability on the
sets R \ Λj and R \ Λdj ensures that the relevant limits γ−
and γ+ here all exist. Consequently, the functions in (34) and
hence the controls in (35) are well-defined.
Now, since OSLC (10) is a convex optimization problem, a
point (p̄M , d¯c , d¯u ) is globally optimal if and only if it satisfies
the subgradient KKT conditions. As only Cj and Cdj are
non-continuously differentiable, these are identical to those
used in the proof of Theorem 2, with the exception that (27a)
and (27b) are replaced by the subdifferential optimality conditions
−
M
− ν − λ+
j + λj ∈ ∂Cj (p̄j ), j ∈ G,
(36a)
−
¯c
ν − µ+
j + µj ∈ ∂Cdj (dj ), j ∈ N.
(36b)
We will thus seek to show that the arguments for demonstrating (27c)–(27h) easily carry over to the present setting,
and then prove that (36a) and (36b) are also satisfied by the
equilibrium quantities, thereby guaranteeing optimality.
Due to the discontinuities in the cost function derivatives,
we slightly redefine the quantities introduced in the proof of
Theorem 2 as
ωjM,max := sup{ωj : Dj (−ωj ) ≥ pM,max
},
j
ωjM,min := inf{ωj : Dj (−ωj ) ≤ pM,min
},
j
ωjc,max := inf{ωj : Ddj (ωj ) ≥ dc,max
},
j
(37)
ωjc,min := sup{ωj : Ddj (ωj ) ≤ dc,max
}.
j
It is easy to see that these quantities reduce to those considered
in the proof of Theorem 2 in the case of continuously
differentiable cost functions.
The definitions in (37) imply that Dj (−ω0∗ ) ≥ pM,max
⇔
j
M,min
∗
ω0∗ ≤ ωjM,max , Dj (−ω0∗ ) ≤ pM,min
⇔
ω
≥
ω
,
0
j
j
c,max
∗
∗
Ddj (ω0∗ ) ≥ dc,max
⇔
ω
≥
ω
,
and
D
(ω
)
≤
dj
0
0
j
j
13
⇔ ω0∗ ≤ ωjc,min . Therefore, the exact arguments in the
dc,min
j
proof of Theorem 2 also apply here and guarantee that (27c)–
(27h) all hold with the choices (28).
Finally, let ν = ω0∗ . Then
M,max
−
∗ −ωj
Dj (−ν − λ+
+
λ
)
=
D
[−ω
]
j
0 −ω M,min
j
j
j
=
pM,max
[Dj (−ω0∗ )]pjM,min
j
= pM,∗
,
j
(38a)
by the above equivalences and equations (6h) and (35). Therefore, the optimality condition (27a) holds. Analogously,
ω c,max
Ddj (ν − µ+ + µ− ) = Ddj [ω0∗ ]ωjc,min
j
=
dc,max
[Ddj (ω0∗ )]djc,min
j
= dc,∗
j .
(38b)
We now note that the preimages of any point x ∈ R under Dj
and Ddj can be determined from the definitions (34) as
(
Cj0 (x),
x ∈ R \ Λj ,
−1
Dj (x) =
0
0
[Cj (γ−), Cj (γ+)], x = γ ∈ Λj ,
(
(39)
0
Cdj
(x),
x ∈ R \ Λdj ,
−1
Ddj (x) =
0
0
[Cdj
(γ−), Cdj
(γ+)], x = γ ∈ Λdj ,
0
It then follows from (39), the fact that Cj0 and Cdj
are strictly
increasing, and Definition 3 that, for all x ∈ R,
−1
Dj−1 (x) = ∂Cj (x) and Ddj
(x) = ∂Cdj (x).
(40)
Then, taking the preimages of (38a) and (38b) under Dj and
−
−1 M,∗
Ddj respectively yields −ν − λ+
) and ν −
j + λj ∈ Dj (pj
−
−1 c,∗
µ+
+
µ
∈
D
(d
),
whence
we
deduce
by
(40)
that
(36a)
j
j
j
dj
M,∗
¯c = dc,∗ .
and (36b) are both satisfied by p̄M
=
p
and
d
j
j
j
j
Therefore, all of the subgradient KKT conditions (36a), (36b), and (27c)–(27h) are satisfied, and so
(pM,∗ , dc,∗ , du,∗ ) defines a global optimum for the OSLC
problem (10).
Remark 12: Theorem 5 shows that the optimality result
given in Theorem 2 extends to situations in which the cost
functions are not required to be differentiable at all points.
Such non-differentiable cost functions can describe important
classes of droop control schemes, such ones involving deadbands, as discussed in Section VI.
R EFERENCES
[1] F. C. Schweppe, R. D. Tabors, J. L. Kirtley, H. R. Outhred, F. H.
Pickel, and A. J. Cox, “Homeostatic utility control,” IEEE Trans. Power
App. Syst., vol. PAS-99, no. 3, pp. 1151–1163, May 1980.
[2] J. A. Short, D. G. Infield, and L. L. Freris, “Stabilization of grid
frequency through dynamic demand control,” IEEE Trans. Power Syst.,
vol. 22, no. 3, pp. 1284–1293, Aug. 2007.
[3] D. Trudnowski, M. Donnelly, and E. Lightner, “Power-system frequency
and stability control using decentralized intelligent loads,” IEEE PES
T&D Conf. Exhib., pp. 1453–1459, May 2006.
[4] A. Molina-Garciá, F. Bouffard, and D. S. Kirschen, “Decentralized
demand-side contribution to primary frequency control,” IEEE Trans.
Power Syst., vol. 26, no. 1, pp. 411–419, May 2010.
[5] A. R. Bergen and V. Vittal, Power Systems Analysis. Prentice Hall, 1999.
[6] D. J. Hammerstrom et al., “Pacific Northwest GridWise testbed demonstration projects, part II: grid friendly appliance project,” Pacific Northwest Nat. Lab., Tech. Rep. PNNL-17079, Oct. 2007.
[7] B. J. Kirby, Spinning reserve from responsive loads. United States
Department of Energy, 2003.
[8] C. Zhao, U. Topcu, N. Li, and S. Low, “Design and stability of loadside primary frequency control in power systems,” IEEE Trans. Autom.
Control, vol. 59, no. 5, pp.1177–1189, 2014.
[9] C. Zhao, and S. Low, “Optimal decentralized primary frequency control
in power networks,” Proc. 53rd IEEE Conf. Decision Control, pp 2467–
2473, Dec. 2014.
[10] J. W. Simpson-Porco, F. Dörfler, and F. Bullo, “Synchronization and
power sharing for droop-controlled inverters in islanded microgrids,”
Automatica, vol. 49, no. 9, pp. 2603–2611, Sep. 2013.
[11] Q. Shafiee, J. M. Guerrero, and J. C. Vasquez, “Distributed secondary
control for islanded microgrids – a novel approach,” IEEE Trans. Power
Electron., vol. 29, no. 2, pp. 1018–1031, Apr. 2013.
[12] M. Andreasson, H. Sandberg, D. V. Dimarogonas, and K. H. Johansson,
“Distributed integral action: stability analysis and frequency control of
power systems,” Proc. 51st IEEE Conf. Decision Control, pp. 2077–
2083, Dec. 2012.
[13] S. Trip, M. Bürger, and C. De Persis. “An internal model approach to
frequency regulation in inverter-based microgrids with time-varying voltages,” Proc. 53rd IEEE Conf. Decision Control, pp 223–228, Dec. 2014.
[14] X. Zhang and A. Papachristodoulou, “A real-time control framework
for smart power networks with star topology,” Proc. American Control
Conf., 2013.
[15] H. Miyagi and A. R. Bergen, “Stability studies of multimachine power
systems with the effects of automatic voltage regulators,” IEEE Trans.
Autom. Control, vol. 31, no. 3, pp. 210–215, 1986.
[16] E. Devane, A. Kasis and I. Lestas, “Primary frequency regulation with
load-side participation Part II: beyond passivity approaches,” (under
review for publication) Feb. 2016.
[17] H. K. Khalil and J. W. Grizzle. Nonlinear systems, vol. 3, Prentice Hall
New Jersey, 1996.
[18] S. Sastry, Nonlinear systems: analysis, stability and control. SpringerVerlag New York, 1999.
[19] A. Molina-Garcia, F Bouffard, and D. S. Kirschen, “Decentralized
demand-side contribution to primary frequency control,” IEEE Trans.
Power Syst., vol. 26, no. 1, pp. 411–419, 2011.
[20] G. Rogers, Power System Oscillations. Kluwer Academic Publishers, 2000.
[21] K. W. Cheung, J. Chow, and G. Rogers, Power System Toolbox,
v. 3.0. Rensselaer Polytechnic Institute and Cherry Tree Scientific
Software, 2009.
[22] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge University Press, 2004.
[23] M. J. Steele. The Cauchy-Schwarz master class: an introduction to the
art of mathematical inequalities, Cambridge University Press, 2004.
[24] P. Moylan and D. Hill, “Stability criteria for large-scale systems,” IEEE
Trans. Autom. Control, vol. 23, no. 2, pp. 143–149, 1978.
[25] J. C. Doyle, B. A. Francis, and A. Tannenbaum. Feedback control theory,
vol. 1, Macmillan Publishing Company New York, 1992.
[26] R. T. Rockafellar. Convex analysis. Princeton University Press, 1970.
| 3cs.SY
|
1
Product Matrix MSR Codes with Bandwidth
Adaptive Exact Repair
arXiv:1708.03402v2 [cs.IT] 28 Dec 2017
Kaveh Mahdaviani∗, Soheil Mohajer† , and Ashish Khisti∗
∗ ECE Dept., University of Toronto, Toronto, ON M5S3G4, Canada
† ECE Dept., University of Minnesota, Minneapolis, MN 55455, USA
Email: {kaveh, akhisti}@comm.utoronto.ca, [email protected]
Abstract
In a distributed storage systems (DSS) with k systematic nodes, robustness against node failure is commonly provided by
storing redundancy in a number of other nodes and performing repair mechanism to reproduce the content of the failed nodes.
Efficiency is then achieved by minimizing the storage overhead and the amount of data transmission required for data reconstruction
and repair, provided by coding solutions such as regenerating codes [1]. Common explicit regenerating code constructions enable
efficient repair through accessing a predefined number, d, of arbitrary chosen available nodes, namely helpers. In practice, however,
the state of the system dynamically changes based on the request load, the link traffic, etc., and the parameters which optimize
system’s performance vary accordingly. It is then desirable to have coding schemes which are able to operate optimally under
a range of different parameters simultaneously. Specifically, adaptivity in the number of helper nodes for repair is of interest.
While robustness requires capability of performing repair with small number of helpers, it is desirable to use as many helpers as
available to reduce the transmission delay and total repair traffic.
In this work we focus on the minimum storage regenerating (MSR) codes, where each of the n nodes in the network is
supposed to store α information units, and the source data of size kα could be recovered from any arbitrary set of k nodes. We
introduce a class of MSR codes that realize optimal repair bandwidth simultaneously with a set of different choices for the number
of helpers, namely D = {d1 , · · · , dδ }. Our coding scheme follows the Product Matrix (PM) framework introduced in [2], and
could be considered as a generalization of the PM MSR code presented in [2], such that any di = (i + 1)(k − 1) helpers can
perform an optimal repair. As a result, the coding rate in our construction is limited by nk ≤ 12 . However, similar to the original
design of PM MSR codes, our solution can realize practical values of the parameter α. Recently [3] has presented another explicit
MSR coding scheme which is capable of performing optimal repair for various number of helpers. The solution presented in [3]
works for any arbitrary set of parameters k, D and can achieve high coding rates, but the required α for this code is exponentially
large. We show that the required value for α in the coding scheme presented in this work is exponentially smaller when compared
to [3] for the same set of other parameters. Particularly, for a DSS with n nodes, and k systematic nodes, the required value for
α is reduced from sn to sk, where s = lcm (d1 − k + 1, · · · , dδ − k + 1). We also show the required field size in the presented
coding scheme is equal to n1 .
I. I NTRODUCTION
Distributed storage systems (DSS) are compelling solutions to the fast growth of the demand in storage and accessibility of
digital content. The main feature of such systems is to provide accessibility and durability for the stored data by introducing
redundancy. In parallel, the number of storage components as well as the number of users connecting to these servers are
dramatically increasing. These increase the chance of failures in the system, due to storage device failures or inaccessible
nodes with overloaded traffic. Replication is the simplest approach to make the distributed storage system robust against such
failures, which is implemented in systems such as [5], [6], [6]. This approach however, provides simplicity in the cost of huge
storage overhead.
In the literature of erasure codes, there exists solutions, such as the Reed-Solomon (RS) code [7], which offer similar faulttolerance level as the replication does, with significantly less storage overhead. For instance, a 3-replication based DSS needs
to accommodate two mirrors for every single storage node in order to achieve reliability guarantee against any simultaneous
two node failure, which arises 200% storage overhead, while maximum distance separable (MDS) codes, such as RS code,
achieve the same level of fault-tolerance guarantee by adding only two redundant storage nodes for the whole system. In other
words, an erasure code with MDS property can guarantee to recover the whole source data from any subset of stored encoded
segments of collective size equal to the source data size.
On the other hand, when a node fails in a DSS, it needs to be replaced by a new node in order to maintain the system’s
performance. Such procedure is referred to as a repair. To perform a repair, the system downloads some data from a subset of
the surviving nodes, called helper nodes. The amount of data downloaded for a repair is referred to as the repair bandwidth.
In conventional MDS erasure codes, such as the RS codes, one has to reconstruct the entire source data and re-encode it to
recover a single lost segment. Hence, the repair bandwidth of these codes is at least as large as the size of the whole source
data.
Considering both storage overhead and repair bandwidth simultaneously, the family of regenerating codes [1], [8] offers
a very efficient coding mechanism for distributed storage systems. More precisely, a regenerating code on a Galois field Fq
1 This
work was presented in part at the 2017 IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan [4].
2
for a DSS with n storage nodes, maps the source data of size F symbols into n pieces of size α symbols each, and stores
them in n separate nodes, such that any k out of n nodes suffice to recover the data. Such a system is capable of tolerating
up to (n − k) node failures. Moreover, upon failure of one node, it can be replaced by a new node whose content of size α
symbols is determined by connecting to an arbitrary set of d (where d ≥ k) helper nodes, and downloading β symbols form
each (where β ≤ α). Hence, the total repair bandwidth in regenerating codes is dβ, which is denoted by γ. The parameter α
is also referred to as the subpacketization level.
Ideally, one would like to minimize the storage overhead, and repair bandwidth simultaneously. It turns out that for a given
file size F , there is a trade-off between the subpacketization level α and the repair bandwidth γ, and one can be minimized
only at the cost of a penalty for the other [1]. In particular, at one extreme point of this trade-off, one could first minimize
the subpacketization level, α, and then minimize the per-node repair bandwidth, β, to obtain a minimum storage regenerating
(MSR) code. As a result, MSR codes have the MDS property, and also minimize the repair bandwidth for the given α [1],
which means for an MSR code we have F = kα, and
F
.
(1)
β=
k(d − k + 1)
The total repair bandwidth (dβ) of an MSR code is then upper-bounded by that of RS code, and only coincides with that when
d = k. In other word, the total repair bandwidth is decreasing super-linearly as d grows in MSR codes.
Reversing the order of minimization between α, and β results in another extreme point of the trade-off. Such codes are
not MDS and hence have more storage overhead but provide the smallest possible repair bandwidth and are referred to as
minimum repair bandwidth (MBR) codes. Our focus in this work is on MSR codes as they minimize the storage cost.
In general, two distinct types of repair can be identified: in an exact repair scenario the replacement generated node will
contain the same data as stored in the failed node. In the so called functional repair, however, the replacement node may store
a different content, provided that the entire new system maintain the same properties as of the original one. In practice, exact
repair regenerating codes are much more appealing, mainly due to the fact that they could provide systematic encoding, which
is a significant advantage in practice.
It is shown that for functional repair MSR code design could be translated into a linear network coding problem [1]. Design
of such codes with exact repair property is more challenging, due to a large number of constraints that should be simultaneously
satisfied. Various constructions for exact repair MSR codes have been proposed for various sets of parameters [2], [3], [9]–[18].
Among the numerous available regenerating code designs, the common adopted model considers a rigid predetermined
number d (where k ≤ d ≤ n − 1) of helpers required for any repair procedure. Each of these helpers is also assumed to provide
β = γ/d repair symbols. This sets a single threshold for the system’s capability to perform the repair. On the other hand, in
practice the state of the system dynamically changes as a function of various factors including availability of nodes, traffic load,
available bandwidth, etc. It has been shown that when such characteristics change in the system the optimal number of helper
nodes for minimizing the cost of repair changes [19]. Therefore, runtime adaptation would be of great value towards optimizing
the performance. For instance, when the system is heavily loaded by many read requests, many nodes in the network might
not be capable to provide the required repair bandwidth and hence would be considered unavailable for the repair. This may
result in system’s failure to perform the repair, while there might be a few nodes, less than d, which are capable of providing
even more than β repair symbols. A natural question is whether one can download more data from the available helpers, and
accomplish the repair without the struggler helpers. Besides, from (1) it is clear that in optimal repair of MSR codes, increasing
the number of helpers reduces both β, and γ = dβ. One could consider a situation in which there are many nodes, more than
d, which are capable of contributing to the repair. It would be of great practical value then if the system could increase the
number of helpers and reduce both the per-node and total repair traffic. Note that this will also reduce the transmission delay,
which is one of the main bottlenecks in the DSS’s performance. We refer to such property as bandwidth adaptivity. Note that
the dynamic capability of service for storage nodes is a well-known characteristic for many practical distributed systems such
as peer-to-peer systems or heterogeneous network topologies [20]–[25].
The design of such codes has been of interest and the significance of bandwidth adaptivity in the performance of the system
has been emphasised in [9], [26]–[30]. However, these works mainly focus on the study of fundamental limits and appealing
properties of regenerating codes with bandwidth adaptivity, such as the significant improvement in the mean-time-to-data-loss
(MTTDL), and the coding schemes presented in these works either only provide functional repair [26]–[29], or relax some of
the constraints and consequently yield to a sub-optimum trade-of [9], [30].
When considering the optimal exact repair, it is a challenging problem to design such coding scheme with a large flexibility
degree since it needs to satisfy many optimality conditions simultaneously. As a result, this problem has only been considered
for the MSR [3], [9], and MBR [31] extreme points of the trade-off. For the MBR case, [31] provides an exact repair bandwidth
adaptive solution for a wide range of practical parameters based on the Product Matrix framework introduced in [2]. In [9]
a bandwidth adaptive code is provided based on interference alignment, which only achieves the MSR characteristics when
both α and β tend to infinity. The first explicit exact repair MSR code constructions which satisfy the bandwidth adaptivity
for finite values of α and β are introduced in [3]. These constructions work for any parameters k, n, and all values of d
such that k < d < n. However, the required values for the parameters α, and β in these constructions are still very huge
3
(i.e. exponentially large in n), and hence they only achieve optimality for extremely large contents. Recently, [17] introduced
a modified version of the code constructions in [3] which achieves MSR optimality for much lower values of α, at the cost
of losing bandwidth adaptivity. Indeed the MSR code in [17] works only for d = n − 1. We will review the related works in
more details in Section III.
In this work we will address the design problem of MSR codes with bandwidth adaptive exact repair for small α, and β,
following the Product Matrix framework [2]. For any positive integer design parameter δ, the presented coding scheme allows
us to choose the number of helper nodes for each repair scenario from the set {2(k − 1), · · · , (δ + 1)(k − 1)}, based on
availability of the nodes, network traffic and load state of the nodes. For any choice of the number of helpers, the per-node
repair bandwidth, β, takes its optimum value based on (1). To this end we change the design of the “message matrix” for the
PM MSR codes introduced in [2] to enable its partitioning into smaller symmetric submatices in many different ways. We then
also design appropriate repair and reconstruction schemes using a successive cancellation mechanism, to enable performing
repair based on different choices for the number of helpers, while keeping the required contribution of each helper at the
optimal value.
Product Matrix codes are practical regenerating codes due to their small subpacketization and repair bandwidth requirements.
Our focus in this work is to generalize the PM MSR codes to enable bandwidth adaptive repair, while keeping small practical
values for the parameters α, and β. For the construction presented in this work the required values for α and β are linear in
terms of the number of nodes in the DSS, which results in an exponential reduction compared to the constructions proposed
in [3]. However, unlike the constructions in [3] which achieve any coding rate k/n, it should be mentioned that the coding
rate in our construction is limited to k/n ≤ 1/2. The main contributions of this work are explained in the next section, after
formally defining the problem setup.
The rest of this paper is organized as follows: The following section formally introduced the problem setup and summarizes
the main contributions. Section III briefly reviews the most relevant works in the literature. Coding scheme and examples
are presented in Section IV, which is followed by a discussion on the properties of the code in Section V. Conclusion and
appendix are provided at the end.
II. M ODEL AND M AIN R ESULTS
A. Model
In this section we will briefly introduce a setup for the distributed storage system and the coding scheme of our interest.
This model is a modified version of the original setup considered in [1], and is very similar to the model considered in [31].
The first element we consider for the model of our bandwidth adaptive distributed storage system is a predefined Galois
filed alphabet, Fq of size q. Hereafter we assume all the symbols stored or transmitted through the network are elements of
Fq . Besides, we consider a homogeneous group of n storage nodes, each capable of storing α symbols.
Definition 1 (Bandwidth Adaptive Regenerating Code). Consider parameters α, n, k, δ, a set D = {d1 , · · · , dδ }, with
d1 < · · · < dδ , and a total repair bandwidth function γ : D → [α, ∞). A bandwidth adaptive regenerating code C(n, k, D, α,
γ) is a regenerating code with subpacketization level α, such that following mechanisms are guaranteed.
• Repair: In each repair process the number of helpers, d, can be chosen arbitrarily from the set D. The choice of helper
nodes is also arbitrary, and each of the chosen helpers then provides β(d) = γ(d)/d repair symbols.
• Data Reconstruction: The data collector recovers the whole source data by accessing any arbitrary set of k nodes.
Note that the flexibility of the repair procedure depends on the parameter δ, such that for a larger δ, there are more options
to select the number of helpers. In general, it is appealing to have small choices such as d1 , to guarantee the capability of code
to perform repair when the number of available helpers is small, and also large choices such as dδ , to provide the capability
of reducing the total as well as per-node repair bandwidth, and hence the transmission delay, whenever a larger number of
helpers are available. The coding scheme we present in this work allows to design such a range for the elements in D.
Definition 2 (Total Storage Capacity). For a set of parameters α, n, k, δ, a set D = {d1 , · · · , dδ }, and a given function
γ : D → [α, ∞), the total storage capacity of a bandwidth adaptive regenerating code, C(n, k, D, α, γ), is the maximum
size of a file that could be stored in a network of n storage nodes with subpacketization level α, using a bandwidth adaptive
regenerating code C(n, k, D, α, γ). We will denote the storage capacity of such a system by F (n, k, D, α, γ), or simply F ,
when the parameters could be inferred from the context.
Definition 3 (Bandwidth Adaptive MSR Codes, and Flexibility Degree). For any choice of parameters α, n, k, δ, and set
D = {d1 , · · · , dδ }, the bandwidth adaptive regenerating codes that realize both the MDS property defined by
F (n, k, D, α, γ) = kα,
(2)
as well as the the MSR characteristic equation simultaneously for all d ∈ D, given as
α = (d − k + 1)β(d), ∀d ∈ D,
(3)
4
are referred to as bandwidth adaptive MSR codes. Moreover, the number of elements in the set D is referred to as flexibility
degree of the code, and is denoted by δ.
Remark 1. It is worth mentioning that in a bandwidth adaptive MSR code, the total repair bandwidth,
dα
,
d−k+1
is a decreasing function of d. As a result, naive time-sharing between multiple MSR code components fails to satisfy optimality
in a bandwidth adaptive setting.
dβ(d) =
B. Main Results
The main contribution of this work is to provide a bandwidth adaptive MSR coding scheme with small subpacketization
level, and field size requirement. This coding scheme also guarantees exact repair of any failed node with many different
choices of the number of helpers. This result is formally stated in the following theorem. In this paper lcm() denotes the least
common multiple.
Theorem 1. For arbitrary positive integers n, k, and δ, there exists an adaptive bandwidth MSR code over a Galois field Fq
of size q ≥ n, with subpacketization level α and total storage capacity F , satisfying
α = (k − 1)lcm (1, 2, · · · , δ) ,
F = kα,
(4)
which is capable of performing exact repair using any di helpers, for
di = (i + 1)(k − 1), i ∈ {1, · · · , δ},
and simultaneously satisfies the MSR characteristic equation (3) for all di . i.e.,
α
, i ∈ {1, · · · , δ}.
β(di ) =
(di − k + 1)
We provide a constructive proof for this theorem based on introducing an explicit construction for a bandwidth adaptive
MSR coding scheme in Section IV.
III. R ELATED W ORKS
The property of bandwidth adaptivity has been of interest in the literature of regenerating codes for the last few years.
There has been a number of researchers who have addressed this problem under different settings. Some, such as [26]–[29],
have considered functional repair, in which code design problem reduces to linear network coding, and mainly focused on the
theoretical limitations and properties of a bandwidth adaptive regenerating codes. There are, however, a few other works which
have considered exact repair as well [3], [9], [31], [32]. In this section we briefly review these works and their relevance to
the problem setup introduced in the previous section.
In the MBR case, [31], [32] addressed a similar setup. For given integers dmin , dmax , authors presented a bandwidth adaptive
exact repair MBR regenerating code with D = {dmin , dmin + 1, · · · , dmax }, which is simultaneously error resilient against up
to a certain number of erroneous nodes in the network.
For the case of MSR, it was first in [26] that Shah et. al. extended the original problem of regenerating code design,
introduced in [1], [8], to provide flexibility. In [26] the authors consider the number of participating helpers to be selected
independently in each repair or data reconstruction procedure. Moreover, they also allow asymmetric participation of helpers,
as long as the per-node repair bandwidth of each helper, namely βi , i ∈ {1, · · · , d}, is less than a fixed upper bound, βmax .
While the setting considered by Shah et. al. provides much more flexibility in repair and reconstruction, they show that the
total repair bandwidth, γ, in their setting should satisfy
F
βmax ,
γ ≥ max{α − βmax , F mod α} +
α
which is always larger than that of the original regenerating codes formulations, except for the MSR case, i.e., F = kα, where
both settings achieve the same total repair bandwidth. However, the coding scheme presented in [26] only guarantees functional
repair.
in [27] Wang et. al. considered a functional repair coding scheme with symmetric per-node repair bandwidth, which supports
bandwidth adaptivity. Later [28] also considered a similar setup, while in both these works the main focus is on derivation
of the optimal trade-off between the storage overhead and repair bandwidth for the functional repair in a coordinated setting,
where more than one node failure is considered to be repaired together. Note, however, that none of these works address the
exact repair with bandwidth adaptivity in regenerating codes.
Aggrawal et. al. [29] also considered a functional repair setup to achieve bandwidth adaptivity in regenerating codes. They
analysed the mean-time-to-Data-Loss (MTTDL) in the regenerating codes with and without bandwidth adaptivity. Their analysis
5
is based on a birth-death process model in which the population of available storage node randomly changes with appropriately
chosen rates. They showed that bandwidth adaptivity provides a significant gain in terms of MTTDL.
When considering exact repair regenerating codes, Cadambe et. al. were the first to address the bandwidth adaptivity [9].
They present an interference alignment based regenerating coding scheme which is capable of performing exact repair with
bandwidth adaptivity in the repair procedure. The code presented by Cadambe et. al. is the first exact repair regenerating code
with bandwidth adaptivity, however, their coding scheme only asymptotically achieves the MSR optimality, when α and β tend
to infinity with proper ratio. The importance of this result, however, is to show that bandwidth adaptivity could be implemented
without extra cost in the optimal trade-off between the storage overhear and repair bandwidth, at least for the MSR codes,
even when the exact repair is required.
In [30], a similar setup, referred to as progressive engagement, is considered for regenerating codes with bandwidth adaptive
exact repair, and two coding schemes are provided. While the two coding schemes both preserve the MDS property, none of
them satisfy the MSR characteristic equation (3) simultaneously for different choices of d. Another main difference between
the progressive engagement setup and the one considered in this work is that the authors in [30] relax the property that any
subset of surviving nodes could be considered as helpers by assuming that all the remaining systematic nodes are always
participating as helpers. Moreover, they require the set of available choices for the number of helpers, namely D, to be
D = {k, k + 1, · · · , n − 1}, while in our formulation, D does not include all integers between k and n − 1.
The first explicit constructions for exact repair MSR codes with bandwidth adaptivity and finite subpacketization level were
introduced in [3]. These constructions work for any arbitrary values of k and n, and the set of choices for the number of helpers,
D, could be designed to contain any value di such that k < di < n. However, the required value for the subpacketization level,
α, in both constructions is still considerably huge. In particular, for a DSS with n storage nodes, and the set D = {d1 , · · · , dδ },
constructions in [3] require
n
α = (lcm (d1 − k + 1, · · · , dδ − k + 1)) .
(5)
Therefore, these constructions only achieve optimality for storage of contents which are exponentially large in terms of the
number of storage nodes in the system.
In coding schemes suggested for practical networks, the number of nodes, n, is usually larger than 10 [33], [34], and the
required per-node storage should not exceed a few hundreds of megabytes. Indeed at the scale of multiple megabytes, the
performance of the system is already limited by bandwidth of the network link and disk I/O [6], [33]. Unfortunately, the
constructions presented in [3] still struggle to satisfy such choices. For instance the smallest realization of these codes for the
setting n = 14, and k = 10 suggested for Facebook [33] requires storing more than 1015 encoded symbols in each storage node,
which translates to several peta-bytes per node. Hence the problem of designing exact repair bandwidth adaptive regenerating
code remains yet open for practical range of parameters.
In this work, as presented in Theorem 1, we address the exact repair bandwidth adaptive MSR code design problem with
small subpacketization level. While both [30] and [3] follow the approach introduced in [10], which is based on the design of
parity check equations, in this work we follow the product matrix (PM) framework introduced in [2]. Comparing (5) with (4),
one could see that the presented scheme exponentially reduces the required values of α (and β). However, this scheme works
only for 2k − 2 ≤ di , ∀di ∈ D. As a result, the construction presented in this work only solves the problem in low coding
rates. It is worth mentioning that in applications such as general-purpose storage arrays, providing high reliability and fast
degraded reads are more important than maximizing the coding rate [35]. However, the design of high-rate bandwidth adaptive
MSR codes with small α and β still remains a challenging important problem for big data storage systems such as Hadoop.
IV. C ODING S CHEME
In this section we introduce a bandwidth adaptive exact repair MSR coding scheme, which could be designed to provide
any required flexibility degree with elements of the set D evenly located between the smallest and the largest element, namely
d1 and dδ . We describe the encoding and decoding schemes for storage, repair, and data reconstruction procedures for the
adaptive bandwidth MSR code in the following subsections. This coding scheme is closely related to the product matrix MSR
code introduced in [2], and could be considered as an extension of the product matrix code that achieves bandwidth adaptivity.
As mentioned in the previous section, we will assume all the source and encoded symbols, are elements of a Galois field of an
appropriately large field size q ≥ n, denoted by Fq . Moreover, all the operations hereafter are considered to be filed operations
of Fq . We will refer to Fq as the code alphabet.
In the design of the proposed coding scheme, we chose the design parameters, namely k, and the required flexibility degree
δ. All the other parameters of the code, including α, F , D = {d1 , · · · , dδ }, and β(di ) will be then determined based on k,
and δ as follows. The subpacketization level is
α = (k − 1) · lcm (1, 2, · · · , δ) .
(6)
Moreover, we have F = kα, which satisfies the MDS property. Finally, for D we have
D = {d1 , · · · , dδ }, di = (i + 1)(k − 1), i ∈ {1, · · · , δ}.
(7)
6
and for any di ∈ D, the associated per-node and total repair bandwidths denoted by β(di ), and γ(di ) respectively are
β(di ) =
α
α
=
,
di − k + 1
i(k − 1)
γ(di )
= di β(di ) =
(i + 1)α
.
i
(8)
A. Coding for Storage
We begin the introduction of the coding scheme by describing the process of encoding the source symbols and deriving the
encoded symbols to be stored in the storage nodes. Similar to the product matrix codes, the first step in encoding for storage
in this scheme is to arrange the information symbols in a matrix, denoted by M , which we refer to hereafter as the message
matrix. Let
zδ = lcm (1, 2, · · · , δ) .
The message matrix in our coding scheme is structured as
S1 S2 O O O
S2 S3 S4 O O
O S4 S5 S6 O
O O S6 S7 S8
M = .
..
O
···
O
···
O
···
(9)
follows,
O
O
O
O
···
···
···
···
O
O
O
O
..
.
,
..
.
O S2zδ −4 S2zδ −3 S2zδ −2
O O S2zδ −2 S2zδ −1
O O
O
S2zδ
(10)
where, each Si , i ∈ {1, · · · , 2zδ } is a symmetric (k − 1) × (k − 1) matrix filled with k(k − 1)/2 source symbols, and O is a
(k − 1) × (k − 1) zero matrix. Therefore, M has (zδ + 1)(k − 1) rows and zδ (k − 1) columns. Note that the total number of
distinct source symbols in the message matrix M is
F = k(k − 1)zδ = kα.
(11)
Example 1. Consider the design parameters k = 3, and δ = 2. Therefore, from (9) we have zδ = 2, and using (11), the
maximum number of source symbols that we can arrange in the message matrix M is 12. Denoting the source symbols by
s1 , · · · , s12 , then we have
s1 s2
s4 s5
s5 s6
s2 s3
S1 S2
s4 s5
s7 s8
.
M = S2 S3 =
(12)
s5 s6
s8 s9
O S4
0
0
s10 s11
0
0
s11 s12
△
Once the message matrix is ready, the source encoder creates the vector of coded symbols for each of the n storage nodes,
by calculating the product of a node-specific coefficient vector and the message matrix. To describe this process, we first need
the following definition.
Definition 4. [Generalized Vandermonde Matrix] For distinct and non-zero elements e1 , · · · , em of Fq , and some integer
c ≥ 0, a matrix Am×ℓ with entries
Ai,j = eic+j−1 , for i ∈ {1, · · · , m}, j ∈ {1, · · · , ℓ},
is referred to as a generalized Vandermonde matrix.
The following lemma about these matrices will be used in the proofs of the following theorems,
Lemma 1. Consider distinct and non-zero elements e1 , · · · , eℓ in Fq , and an integer c ≥ 0. Then a square ℓ × ℓ generalized
Vandermonde matrix, A, as defined in Definition 4, is invertible in Fq .
The proof of the above lemma, simply follows from the fact that,
c
1 e1 e21 · · · eℓ−1
e1 0 · · · 0
1
0 ec2 · · · 0 1 e2 e22 · · · eℓ−1
2
A= .
,
..
. . ..
..
. .
.
c
ℓ−1
2
0 0 · · · eℓ
1 eℓ eℓ · · · eℓ
7
and the two matrices on the right hand side are both full-rank, as one of them is diagonal with non-zero diagonal elements
and the other one is a square Vandermonde matrix.
Back to the description of our coding scheme, for distinct and non-zero elements ei ’s in Fq , with i ∈ {1, · · · , n} we set
c = 0, and define a generalized Vandermonde matrix of size n × (zδ + 1)(k − 1) as
(z +1)(k−1)−1
1 e1 e21 · · · e1 δ
(z +1)(k−1)−1
1 e2 e22 · · · e2 δ
.
Ψ=
..
.
(z +1)(k−1)−1
1 en e2n · · · en δ
Note that all of the submatrices of Ψ are also generalized Vandermonde matrices. We refer to Ψ as the coefficient matrix and
denote the j th row of Ψ by ψ j . The vector of encoded symbols to be stored on node j, j ∈ {1, · · · , n}, denoted by xj , is
calculated as
xj = ψ j M.
(13)
The vector ψ j is the node-specific coefficient vector for storage node j. Note that the per-node storage capacity requirement
for this coding scheme is then zδ (k − 1) as given by (6).
Example 2. Let’s consider the setting in Example 1 again, and assume we have n = 7 nodes in the network. Assume that
the code alphabet is the Galois field F11 . The coefficient matrix could be formed based on (e1 , e2 , · · · , e7 ) = (1, 2, · · · , 7) as
follows,
1 1 1 1 1 1
1 2 4 8 5 10
1 3 9 5 4 1
Ψ=
(14)
1 4 5 9 3 1 .
1 5 3 4 9 1
1 6 3 7 9 10
1 7 5 2 3 10
The encoded content of nodes 1 to 7 can be calculated using (12) and (13). For instance, for node 1 we have
x1 = [x1,1 , x1,2 , x1,3 , x1,4 ] = [1, 1, 1, 1, 1, 1]M,
which gives
x1,1 = s1 + s2 + s4 + s5 ,
x1,2 = s2 + s3 + s5 + s6 ,
x1,3 = s4 + s5 + s7 + s8 + s10 + s11 ,
x1,4 = s5 + s6 + s8 + s9 + s11 + s12 ,
and similarly for node 7 we have
x7 = [x7,1 , x7,2 , x7,3 , x7,4 ] = [1, 7, 5, 2, 3, 10]M,
which gives
x7,1 = s1 + 7s2 + 5s4 + 2s5 ,
x7,2 = s2 + 7s3 + 5s5 + 2s6 ,
x7,3 = s4 + 7s5 + 5s7 + 2s8 + 3s10 + 10s11 ,
x7,4 = s5 + 7s6 + 5s8 + 2s9 + 3s11 + 10s12 .
△
B. Data Reconstruction
In order to reconstruct all the information stored in the system, the data collector accesses k arbitrary nodes in the network
and downloads all their contents. To describe the details of the decoding we use the following lemma.
Lemma 2. Let X and Φ be two known matrices of size k × (k − 1), such that Φ is a generalized Vandermonde matrix, and
assume ∆ is a known diagonal matrix of size k × k, with distinct and non-zero diagonal elements. Then the equation
X = ΦA + ∆ΦB,
(15)
8
is uniquely solvable for unknown (k − 1) × (k − 1) symmetric matrices A and B.
The proof of this lemma is based on the data reconstruction scheme of the product matrix MSR codes, introduced in [2], and
is provided in Appendix A to help keeping this paper self-contained. The following theorem explains the data reconstruction
procedure in this coding scheme.
Theorem 2. For the coding scheme presented in subsection IV-A, there exists a decoding scheme to reconstruct all the source
symbols arranged in the message matrix M from the encoded content of any arbitrary group of k storage nodes.
Proof. Let’s assume the set of accessed nodes is {ℓ1 , · · · , ℓk }. Moreover, let’s denote the k × (zδ + 1)(k − 1) submatrix
of Ψ associated with the nodes ℓ1 , · · · , ℓk , by ΨDC . We will further denote the submatrix of ΨDC consisting of columns
(i − 1)(k − 1) + 1 through i(k − 1), by ΨDC (i). In other words, we have a partitioning of ΨDC ’s columns as
ψℓ
1
(16)
ΨDC = ... = [ΨDC (1), · · · , ΨDC (zδ + 1)] .
ψℓ
k
As a result, defining the diagonal matrix
ΛDC
(k−1)
eℓ
1
0
=
..
.
0
0
(k−1)
e ℓ2
0
0 ···
0 ···
..
.
0
0
..
.
(k−1)
0 · · · e ℓk
,
for each k × (k − 1) submatrix ΨDC (i) we have
ΨDC (i + 1) = ΛDC ΨDC (i).
(17)
Similarly, let’s denote the matrix consisting of the collected encoded vectors by XDC , and its partitioning to k × (k − 1)
submatrices XDC (i), i ∈ {1, · · · , zδ } as follows
xℓ1
XDC = ... = [XDC (1), · · · , XDC (zδ )] .
(18)
xℓk
The decoding procedure for data reconstruction consists of zδ consecutive steps. The first step uses only the submatrix
XDC (1). Using (17) we have,
S
XDC (1) = [ΨDC (1), ΨDC (2)] 1
S2
= ΨDC (1)S1 + ΛDC ΨDC (1)S2 .
Using Lemma 2, the decoder recovers both S1 , and S2 , using XDC (1), in step one. Then, for i ∈ {2, · · · , zδ }, the decoder
performs step i by using submatrix XDC (i), and decodes submatrices S2i−1 , and S2i , as follows.
In step i, i ∈ {2, · · · , zδ }, of the data reconstruction decoding, the decoder uses the submatrix XDC (i). Note that
S2(i−1)
XDC (i) = [ΨDC (i − 1), ΨDC (i), ΨDC (i + 1)] S2i−1
S2i
S
= ΨDC (i − 1)S2(i−1) + [ΨDC (i), ΨDC (i + 1)] 2i−1 .
S2i
Having the submatrix S2(i−1) already recovered from step i − 1, the decoder first calculates
X̂DC (i) = XDC (i) − ΨDC (i − 1)S2(i−1) .
S
= [ΨDC (i), ΨDC (i + 1)] 2i−1 .
S2i
(19)
Then from (17), and (19), we have
X̂DC (i) = ΨDC (i)S2i−1 + ΛDC ΨDC (i)S2i .
Again using Lemma 2, decoder recovers S2i−1 , and S2i at the end of the step i of the decoding. Therefore, by finishing step zδ ,
the decoder reconstructs all the submatrices in the message matrix M , and recovers the whole data stored in the network.
9
Example 3. Following the setting described in Example 1 and Example 2, we have k = 3, and the coefficient matrix Ψ is
given in (14). Let’s assume the data collector accesses the storage nodes 1, 2, and 4. Then, with zδ = 2, we have,
1 1 1 1 1 1
ΨDC = [ΨDC (1), ΨDC (2), ΨDC (3)] = 1 2 4 8 5 10 ,
1 4 5 9 3 1
and,
1 1
1 1
1 1
ΨDC (1) = 1 2 , ΨDC (2) = 4 8 , ΨDC (3) = 5 10 .
1 4
5 9
3 1
Moreover, we have
ΛDC
12 0 0
1 0 0
= 0 22 0 = 0 4 0 ,
0 0 42
0 0 5
(20)
and
XDC
x1
x1,1 x1,2 x1,3 x1,4
= [XDC (1), XDC (2)] = x2 = x2,1 x2,2 x2,3 x2,4 ,
x4
x4,1 x4,2 x4,3 x4,4
and finally,
x1,1 x1,2
x1,3 x1,4
XDC (1) = x2,1 x2,2 , XDC (2) = x2,3 x2,4 .
x4,1 x4,2
x4,3 x4,4
(21)
The first step of decoding in the data reconstruction process based on the encoded data stored in nodes 1, 2 and 4, starts
by using only XDC (1), as given in (21). Using Lemma 2, The decoder then recovers S1 , and S2 submatrices of the message
matrix M .
In the second step then the decoder first calculates
X̂DC (2) = XDC (2) − ΨDC (1)S2 ,
which is equal to
X̂DC (2) = ΨDC (2)S3 + ΛDC ΨDC (2)S4 ,
and hence is of the desired form of (15). Therefore, again using lemma 2, the decoder recovers S3 , and S4 , which completes
the data reconstruction.
△
Algorithm IV-B summarizes the data reconstruction mechanism in this coding scheme.
Algorithm 1 Data Reconstruction
1: Input: k, zδ , xℓi , ψ , and eℓi for i ∈ {1, · · · , k}.
ℓi
2: Output: Submatrices S1 , · · · , S2zδ .
3: Form matrices ΨDC (i), for i ∈ {1, · · · , zδ + 1}, using (16).
4: Form matrices XDC (i), for i ∈ {1, · · · , zδ }, using (18).
5: Form matrix ΛDC , using (20).
6: Recover submatrices S1 , S2 from XDC (1), ΨDC (1), and ΛDC , using Lemma 2.
7: for i = 2 to zδ do
8:
Calculate X̂DC (i) = XDC (i) − ΨDC (i − 1)S2(i−1) .
9:
Recover submatrices S2i−1 , S2i from X̂DC (i), ΨDC (i), and ΛDC , using Lemma 2.
10: end for
10
C. Bandwidth Adaptive Exact Repair
We now describe the bandwidth adaptive repair procedure, by assuming that node f is failed and the set of helpers selected
for the repair are H = {h1 , · · · , hd }, for some d ∈ D. The following theorem describes the repair procedure in this bandwidth
adaptive MSR code.
Theorem 3. Consider the coding scheme presented in subsection IV-A, with design parameters k, and δ, and D as defined
in (7). For any arbitrary failed node f , and any arbitrary set of helpers H = {h1 , · · · , hd }, for some d ∈ D, there exists a
repair scheme for recovering the content of node f with per-node repair bandwidth,
α
.
(22)
β(d) =
d−k+1
Remark 2. Note that (7) and (22) are consistent with (8), which satisfies the MSR characteristic equation (3) for any d ∈ D.
Proof. Without loss of generality let d = (m+1)(k −1), for some m ∈ {1, · · · , δ}. Note that (6), and (7) guarantee that for any
d ∈ D, α is an integer multiple of d − k + 1, hence β(d) is an integer. Each helper node h ∈ H, creates β(d) = α/(d − k + 1)
repair symbols to repair node f as follows. First helper node h partitions its encoded content into β(d) equal segments, such that
for i ∈ {1, · · · , β(d)}, the segment xh (i) is of size α/β(d) = d − k + 1 = m(k − 1), and contains elements xh,(i−1)m(k−1)+1
through xh,im(k−1) . Then we have
xh = [xh (1), · · · , xh (β(d))] .
(23)
Similarly, for any node ℓ, we split the first α entries of a coefficient vector assigned to node ℓ, namely ψ ℓ , into β(d) equal
segments as
h
i
(24)
ψ ℓ (1 : α) = ψ ℓ (1), · · · , ψ ℓ (β(d)) ,
where each segment ψ ℓ (i) is of size d − k + 1 = m(k − 1).
Now each helper node h ∈ H, creates its β(d) repair symbols as
r(h, f ) = r1 (h, f ), · · · , rβ(d) (h, f )
h
⊺
⊺ i
= xh (1) ψ f (1) , · · · , xh (β(d)) ψ f (β(d))
.
The repair decoder then stacks d repair vectors r(h, f ), for h ∈ H, into a d × β(d) matrix
r(ℓ1 , f )
..
ΥH =
.
.
(25)
(26)
r(ℓd , f )
We then introduce the following partitioning of the matrix ΥH , into β(d) submatrices, as follows
ΥH = [ΥH (1), · · · , ΥH (β(d))] ,
th
(27)
where ΥH (i), i ∈ {1, · · · , β} is the i column in ΥH , of size d × 1.
Before starting to describe the repair decoding procedure, we need to introduce some notations associated to a given
repair scenario. Consider a repair procedure with d = (m + 1)(k − 1). For the corresponding β(d) = α/(d − k + 1), we
will partition matrix M as depicted in Fig. 1, and equation (28). Note that this results in β(d) non-overlapping diagonal
submatices Mi , i ∈ {1, · · · , β(d)}, each of size m(k − 1) × m(k − 1), along with (k − 1) × (k − 1) symmetric submatrices
S2m , S4m , · · · , S2β(d)m = S2zδ as shown in the figure. It is worth mentioning that the general pattern of the partitioning
shown in figure 1 is preserved the same for all d ∈ D, and only the size, and number of the Mi diagonal blocks changes
for different choices of the parameter d. From the construction of the message matrix, introduced in (10), each Mi submatrix
will be symmetric. As a result, the message matrix M could be interpreted in terms of the submatrices Mi , and S2i for
i ∈ {1, · · · , β(d)}, associated to a repair procedure with d = (m + 1)(k − 1), d ∈ D.
Finally the last notations we use to describe the adaptive repair decoding scheme, using a given set of helpers H =
{h1 , · · · , hd }, is,
(im+1)(k−1)−1
(i−1)m(k−1)+1
(i−1)m(k−1)
· · · e h1
e h1
e h1
..
, i ∈ {1, · · · , β(d)}.
(29)
ΩH (i) =
.
(i−1)m(k−1)
(i−1)m(k−1)+1
(im+1)(k−1)−1
e hd
e hd
· · · e hd
11
m(k − 1) m(k − 1)
m(k − 1)
S2m
M1
S2m
m(k − 1)
M2
S2(i−1)m
S4m
M =
0
S4m
S2im
Mi
S2(i−1)m
S2(β−1)m
S2im
0
S2(β−1)m
Mβ
S2zδ
Fig. 1. In the above figure β represents β(d), for some chosen d ∈ D, such that, d = (m + 1)(k − 1). Moreover, the white area is filled by zeros, and each
coloured square represent a non-zero symmetric submatrix of M .
S2(i−1)m+1 S2(i−1)m+2
O
O
O
···
O
S2(i−1)m+2 S2(i−1)m+3 S2(i−1)m+4
O
O
···
O
O
S2(i−1)m+4 S2(i−1)m+5 S2(i−1)m+6 O
···
O
..
..
..
Mi =
.
.
.
.
O
···
O S2im−4 S2im−3 S2im−2
O
···
O
O
(28)
S2im−2 S2im−1
Note that, ΩH (i), i ∈ {1, · · · , β(d)}, is a d × d generalized Vandermonde matrix and hence is invertible as shown in Lemma
−1
1. We denote the upper (d − k + 1) × d submatrix of (ΩH (i)) by ΘH (i), and the lower (k − 1) × d submatrix by ΞH (i).
Then we have,
ΘH (i)
−1
(ΩH (i)) =
.
(30)
ΞH (i)
The decoding procedure for the repair of node f is performed in β(d) sequential steps as will be described in the following.
Let’s begin with the first step.
For the failed node f , let φf denote the 1 × (k − 1) vector ,
h
i
(31)
φf = 1 , ef , · · · , efk−2 .
Using a partitioning similar to (23) for xf , then we have,
xf (1) = ψ f
O
M1
· · · O S2m
i
h
m(k−1)
= ψ f (1)M1 + O, · · · , O, ef
φf S2m
(k−1)×m(k−1)
.
(32)
In the first step, the decoder recovers the two terms on the right in the above equation to reconstruct xf (1) using only the first
repair symbol received from each of the helpers, namely r1 (hi , f ), for i ∈ {1, · · · , d}, as follows.
12
Using (23) to (27), and the partitioning denoted in Fig. 1, the submatrix ΥH (1), introduced in (27) can be written as,
⊺
xh1 (1) ψ f (1)
xh1 (1)
⊺
..
..
ΥH (1) =
(1)
ψ
=
.
f
.
⊺
x
(1)
hd
xhd (1) ψ f (1)
(m+1)(k−1)−1
2
1 e h1 e h1 · · · e h1
⊺
M1
..
=
(33)
.
ψ f (1) .
(m+1)(k−1)−1
1 ehd e2hd · · · ehd
O · · · O S2m
Then using (29), we have,
ΥH (1) = ΩH (1)
O
M1
···
O S2m
⊺
ψ
(1)
.
f
(34)
Multiplying the inverse of ΩH (1) from right to the both sides of (34), and using (30) the decoder derives
That gives,
O
M1
···
O S2m
⊺ Θ (i)
H
ψ
(1)
=
ΥH (1)
f
Ξ
(i)
H
⊺
M1 ψ f (1) = ΘH (1)ΥH (1),
(35)
⊺
(m−1)(k−1)
φf
S2m ef
= ΞH (1)ΥH (1).
(36)
and similarly, using (31),
Since both M1 , and S2m are symmetric, from (35) we have,
⊺
ψ f (1)M1 = (ΘH (1)ΥH (1)) ,
(k−1)
and from (36), by multiplying the scalar ef
(37)
, we get
m(k−1)
ef
φf S2m
(k−1)
= ef
⊺
(ΞH (1)ΥH (1)) .
From (37), and (38), and using (32) the decoder then recovers xf (1) as,
h
i
m(k−1)
xf (1) = ψ f (1)M1 + O, · · · , O, ef
φf S2m
(k−1)×m(k−1)
(38)
,
(39)
where, the rightmost term in the above expression is derived by padding m − 1, (k − 1) × (k − 1) zero matrices, O, to the left
of the matrix calculated in (38).
In step i for i = 2 through β(d) of the repair decoding, the decoder then recovers xf (i), using ΥH (i) received from the
(i−1)m(k−1)
helpers, along with ef
φf S2(i−1)m , recovered from the step i − 1 of decoding. To this end, first note that similar to
(33) the repair symbols in ΥH (i) can be written as,
⊺
xh1 (i) ψ f (i)
xh1 (i)
⊺
..
..
(i)
ψ
=
ΥH (i) =
.
f
.
⊺
(i)
x
h
d
xhd (i) ψ f (i)
S2(i−1)m O · · · O
(im+1)(k−1)−1
(i−1)m(k−1)+1
(i−1)m(k−1)
· · · e h1
e h1
e h1
⊺
.
ψ (i) .
.
=
M
i
.
f
(i−1)m(k−1)
(i−1)m(k−1)+1
(im+1)(k−1)−1
e hd
e hd
· · · e hd
O
· · · O S2m
13
Using (29) we can rewrite the above equation as,
(i−1)m(k−1)−µ
φℓ
e ℓ1
1
⊺
(i−1)m(k−1)
.
.
φf + ΩH (i)
ΥH (i) =
.
S2(i−1)m ef
(i−1)m(k−1)−µ
e ℓd
φℓ
d
O
⊺
ψ f (i) .
Mi
···
O S2im
The decoder first removes the contribution of the S2(i−1)m submatrix in the repair symbols in ΥH (i) by calculating
(i−1)m(k−1)−(k−1)
φℓ
e ℓ1
1
⊺
..
S2(i−1)m e(i−1)m(k−1) φ
Υ̂H (i)=ΥH (i)−
.
(40)
f
.
f
(i−1)m(k−1)−(k−1)
e ℓd
φℓ
d
⊺
(i−1)m(k−1)
(i−1)m(k−1)
In the above expression, S2(i−1)m ef
φf
is itself derived by transposing ef
φf S2(i−1)m . As a result we
have,
Υ̂H (i) = ΩH (i)
O
⊺
ψ
(i)
.
f
Mi
···
O S2im
Therefore, similar to (35) through (38) the decoder derives,
ψ f (i)Mi = (ΘH (i)ΥH (i))⊺ ,
(41)
and
im(k−1)
ef
(k−1)
φf S2im = ef
⊺
(ΞH (i)ΥH (i)) .
(42)
Finally, using (41) and (42), we have
i
h
im(k−1)
φf S2im
xf (i) = ψ f (i)Mi + O, · · · , O, ef
(k−1)×m(k−1)
.
(43)
The following algorithm summarizes the bandwidth adaptive repair procedure.
Algorithm 2 Bandwidth Adaptive Repair
1: Input: f , ef , β, m, k and r(h, f ), ψ , eh , for h ∈ H.
h
2: Form matrices ΥH (i), for i ∈ {1, · · · , β}, using (26), and (27).
3: Form vectors φ using (31).
f
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
−1
Calculate matrices ΩH (i), and (ΩH (i)) , for i ∈ {1, · · · , β}, using (29).
Calculate matrices ψ f (1)M1 using (37).
Calculate matrices ema
f φf S2m using (38).
Recover xf (1) using (39).
for i = 2 to β do
Calculate Υ̂H (i) using (40).
Calculate ψ f (i)Mi using (35).
im(k−1)
Calculate ef
φf S2im using (42).
Recover xf (i) using (43).
end for
Form xf = [xf (1), · · · , xf (β)].
−1
Remark 3. Note that calculating the inverse matrices (ΩH (i)) , for i ∈ {1, · · · , β}, can be carried out recursively since
from (29) we have,
(i−1)m(k−1)
0
···
0
e h1
(i−1)m(k−1)
···
0
0
e h2
ΩH (i) =
..
..
..
ΩH (1)
.
.
.
(i−1)m(k−1)
0
0
· · · e hd
14
Remark 4. In a DSS with n nodes, for D = {d1 , · · · , dδ }, the bandwidth adaptive MSR codes presented in [3] require
n
α = (lcm (d1 − k + 1, · · · , dδ − k + 1)) .
(44)
Comparing (44) with (6), one could see that the presented scheme reduces the required α (and β) values exponentially. However,
this scheme works only for 2k − 2 ≤ di , ∀di ∈ D. Hence, the design of high-rate bandwidth adaptive MSR codes with small
α and β still remains an open problem.
The following example provides a detailed illustration of the MSR bandwidth adaptive exact repair procedure in the same
setup as described in Examples 1 to 3.
Example 4. As in the previous examples we will consider k = 3, and δ = 2, and using (6), α = 4. The code alphabet is
F11 , and the message matrix M as given in (12). As a result, using (7), we have D = {d1 , d2 } = {4, 6}, and from (22) their
associated per-node repair bandwidths are β1 = 2, and β2 = 1. Without loss of generality, let’s assume node 7 is failed, i.e.
f = 7. In this setup, the following two repair scenarios are then possible.
A: One option is to use d = d2 = 6 helpers, and download only β2 = 1 repair symbol from each of them, which means
d = (m + 1)(k − 1) for m = 2. Consider H = {1, 2, · · · , 6}. In this case, using the coefficient matrix Ψ for this setup, which
is given in (14), from (24), with α = 4, β = 1, for any node ℓ we have
ψ ℓ (1) = ψ ℓ (1 : 4),
which is a row vector consisting of the first α = 4 elements of the coefficient vector assigned to node ℓ. As a result, using
(23), each helper node h ∈ H will use all of its encoded content xh to create a single repair symbol as
h
⊺ i
r(h, f ) = [r1 (h, f )] = xh (1) · ψ f (1)
= [xh · [1, 7, 5, 2]⊺] .
The repair decoder will then receive
ΥH = [ΥH (1)]
x1,1 + 7x1,2 + 5x1,3 + 2x1,4
r(1, f )
x2,1 + 7x2,2 + 5x2,3 + 2x2,4
x3,1 + 7x3,2 + 5x3,3 + 2x3,4
= ... =
x4,1 + 7x4,2 + 5x4,3 + 2x4,4 .
r(6, f )
x5,1 + 7x5,2 + 5x5,3 + 2x5,4
x6,1 + 7x6,2 + 5x6,3 + 2x6,4
Moreover, using (31), and with ef = 7 from (14) as also used in all previous examples, for f = 7 we get
φf = [1, 7] .
Finally notice that in this case the repair decoding will only
im(k−1)
and k = 3 we get eℓ
= e4ℓ , and hence,
1 1
1 2
1 3
ΩH (1) =
1 4
1 5
1 6
have one single step. Therefore, for step i = 1, with m = 2,
1
4
9
5
3
3
1
8
5
9
4
7
1 1
5 10
4 1
.
3 1
9 1
9 10
Then, based on the partition represented in Fing. (1), for
M1 =
S1 S2
,
S2 S3
(45)
15
the decoder has access to
⊺
M1
ψ (1)
ΥH = ΩH (1)
f
O S4
s1 s2 s4 s5
s2 s3 s5 s6
⊺
s4 s5 s7 s8
ψ (1) .
= ΩH (1)
f
s5 s6 s8 s9
0 0 s10 s11
0 0 s11 s12
Note that the ΩH (1), given in (45) is an invertible matrix in the code
6 7
10
10
3 6
ΘH (1)
−1
(ΩH (1)) =
=
1 8
ΞH (1)
2 7
1 6
(k−1)
The decoder then calculates the lost data xf , using (39), with ef
alphabet F11 , and we have
9 7 6 10
9 0 3 1
9 1 9 5
0 8 2 3 .
7 5 8 4
10 1 5 10
= 72 = 5 in F11 , as follows
⊺
⊺
xf = (ΘH (1)ΥH ) + [0, 0, 5 (ΞH (1)ΥH ) ] .
B: The second option is to use d = d1 = 4 helpers. With k = 3 we have d = (m + 1)(k − 1) for m = 1. In this case,
using (22) we will have β1 = 4/(4 − 2) = 2 repair symbols per helper node. Let’s without loss of generality assume node 7 is
failed, i.e. f = 7, and H = {1, 2, 3, 4} is the set of helper nodes chosen to perform the repair. As a result, using the coefficient
matrix in the code alphabet F11 , given in (14), from equation (24) for the helper nodes we have
ψ 1 (1) = [1, 1], ψ 1 (2) = [1, 1],
ψ 2 (1) = [1, 2], ψ 2 (2) = [4, 8],
ψ 3 (1) = [1, 3], ψ 3 (2) = [9, 5],
ψ 4 (1) = [1, 4], ψ 4 (2) = [5, 9],
and for the failed node f = 7,
ψ f (1) = [1, 7], ψ f (2) = [5, 2].
Similarly, for the coded content of each of these nodes we consider the following partition
xℓ = [xℓ (1), xℓ (2)]
= [[xℓ,1 , xℓ,2 ], [xℓ,3 , xℓ,4 ]], for ℓ ∈ {1, 2, 3, 4, 7}.
Each helper node h ∈ H then creates two repair symbols
r(h, f ) = [r1 (h, f ), r2 (h, f )]
h
⊺
⊺ i
= xℓ (1) ψ f (1) , xℓ (2) ψ f (2)
= [xh,1 + 7xh,2 , 5xh,3 + 2xh,4 ],
and the repair decoder receives
ΥH = [ΥH (1), ΥH (2)]
r1 (1, f )
r2 (1, f )
..
..
=
.
.
r1 (4, f )
r2 (4, f )
5x1,3 + 2x1,4
x1,1 + 7x1,2
x2,1 + 7x2,2 5x2,3 + 2x2,4
=
x3,1 + 7x3,2 5x3,3 + 2x3,4 .
5x4,3 + 2x4,4
x4,1 + 7x4,2
16
Moreover, using (31), and with ef = 7 from (14) as also used in all previous examples, for f = 7 we get
φf = [1, 7] .
Finally notice that in this case the repair decoding will have two steps. Therefore, for step i = 1, with m = 1, and k = 3
im(k−1)
we get eℓ
= e2ℓ , and hence, using equation (29), we have
1 1 1 1
1 2 4 8
ΩH (1) =
(46)
1 3 9 5 .
1 4 5 9
Then, according to the partition represented in Fig. (1), for
M 1 = S1 , M 2 = S3 ,
the repair decoder has access to
⊺
M1
ψ f (1)
ΥH (1) = ΩH (1)
S2
s1 s2
s2 s3 1
= ΩH (1)
s4 s5 7 .
s5 s6
As expected ΩH (1) is an invertible matrix in the code alphabet F11 , and we have
4 5 4 10
ΘH (1)
3 4 4 0
−1
(ΩH (1)) =
= 7 7 9 10 .
ΞH (1)
9 6 5 2
m(k−1)
The decoder then calculates the lost data xf (1), using (39), with ef
= 72 = 5 in F11 , as follows
⊺
⊺
xf (1) = ΘH (1)ΥH(1) + 5 (ΞH (1)ΥH (1)) .
(i−1)m(k−1)
To start the second step, i = 2, of the repair decoding, then the repair decoder first uses ef
⊺
(i−1)m(k−1)
φf
S2 e f
= 5 (ΞH (1)ΥH (1)) ,
= 72 = 5, to calculate
where 5 (ΞH (1)ΥH (1)) is already derived in the step 1. Then the decoder calculates Υ̂H (2) using equation (40) as,
((2−1)m−1)(k−1)
e1
φ1
(2−1)m(k−1) ⊺
.
S2 e
..
Υ̂H (2) = ΥH (2) −
φf
f
((2−1)m−1)(k−1)
e4
φ4
1 1
r2 (1, f )
r2 (2, f ) 1 2
=
r2 (3, f ) − 1 3 S2 (5 (ΞH (1)ΥH (1))) .
1 4
r2 (4, f )
From (41), with
the repair decoder then has access to
1
4
ΩH (2) =
9
5
1
8
5
9
1 1
5 10
,
4 1
3 1
⊺
M2
ψ f (2)
Υ̂H (2) = ΩH (2)
S4
s7 s8
s8 s9 5
.
= ΩH (2)
s10 s11 2
s11 s12
17
As expected ΩH (2) is also an invertible matrix in the code alphabet F11 ,
4 4
ΘH (2)
3 1
−1
(ΩH (2)) =
= 7 10
ΞH (2)
9 7
and we have
9 2
9 0
.
1 2
3 7
2m(k−1)
Finally, the decoder calculates the lost data xf (2), using (39), with ef
= 74 = 3 in F11 , as follows
⊺
xf (2) = ΘH (2)ΥH(2) + 3 (ΞH (2)ΥH (2))⊺ .
V. D ISCUSSION
△
AND PROPERTIES
In this section we will briefly review some of the technical requirements and properties of the coding scheme presented in
this work. Particularly, we will show that the field size and subpacketization level requirements of the presented coding scheme
are not significantly limiting factors in the practical implementations.
A. Field Size Requirement
The only factor that influences the choice of the code alphabet Fq in the presented coding scheme is the existence coefficient
matrix Ψ, and all the inverses of its square submatrices. To satisfy this requirement for a network with n storage nodes, it
is enough to have q ≥ n [36], which is the same as the field size requirement of many other coding schemes such as the
Product Matrix codes [2] or the commonly used Reed-Solomon codes [7]. Hence, the presented coding scheme in this work
is providing the bandwidth adaptivity property at no extra cost in the field size requirements, and any field of size larger
than n could be used as the code alphabet. It worth mentioning that the field size requirement of the only other bandwidth
adaptive exact repair MSR constructions, introduced in [3] is lower bounded by n2 − kn which is significantly larger for large
distributed storage networks n. Moreover, techniques such as those presented in [37] could easily be applied in the presented
coding scheme to reduce the field size to any arbitrary (e.g. binary) small field. However, this discussion is out of the scope
of this work.
B. Subpacketization Level
The requirement for the subpacketization level α for the presented coding scheme is given in by (6). A natural question that
arises is how fast does α grow as a function of the code design parameters, k, and δ. From (6) it is clear that α is proportional
to the design parameter k. Regarding the dependency of α on δ, from [38] we have,
lcm (1, 2, · · · , δ) ≤ 4δ ,
and, recently [39] showed that
lcm (1, 2, · · · , δ) ≥ 2δ , for δ ≥ 7.
As a result, for the presented coding scheme, we have
(k − 1)2δ ≤ α ≤ (k − 1)4δ , for δ ≥ 7.
VI. C ONCLUSION
We presented an alternative solution for exact repair MSR codes in which optimal exact repair is guaranteed simultaneously
with a range of choices, D = {d1 , · · · , dδ }, for the number of helpers. The introduced coding scheme is based on the Product
Matrix framework, introduced first in [2]. The repair mechanism in this framework is based on specific symmetries in the
structure of the message matrix. We proposed a novel structure for the message matrix, which preserves the required symmetries
in many different submatrices. Corresponding repair mechanisms are also introduced to utilise these symmetries to perform
optimal repair, whit different choices for the number of helpers, namely di = (i + 1)(k − 1), i ∈ {1, · · · , δ}. In addition, the
data reconstruction procedure is enhanced based on a novel successive interference cancellation scheme to perform optimally
under the new design of message matrix. Comparing to the only other explicit constructions with exact optimal bandwidth
adaptive repair, presented in [3], we showed that when di ≥ 2k − 2, ∀di ∈ D, the required values for α, is reduced from zδn
to kzδ for a DSS with n nodes, and k systematic nodes, which also reduces β exponentially.
18
A PPENDIX A
P ROOF OF L EMMA 2
Multiplying both sides of (15) by Φ⊺ from right we get
XΦ⊺ = ΦAΦ⊺ + ∆ΦBΦ⊺ .
(47)
Following the notation in [2], we introduce
P = ΦAΦ⊺ , Q = ΦBΦ⊺ .
Then using (47) and the above equations we have
XΦ⊺ = P + ∆Q.
(48)
Note that both P and Q are symmetric k × k matrices. Recall that ∆ is a diagonal matrix, with non-zero and distinct diagonal
elements. Hence, for any 1 ≤ i < j ≤ k, we now have both
(XΦ⊺ )i,j = Pi,j + ∆i,i Qi,j ,
(49)
and
(XΦ⊺ )j,i = Pj,i + ∆j,j Qj,i
= Pi,j + ∆j,j Qi,j .
(50)
Then using (49) and (50), we recover all the non-diagonal elements of P and Q. Now, let p̂i , and q̂ i denote the ith row of
matrices P and Q excluding their diagonal elements. Moreover, let Φ̂i denote the submatrix of Φ derived by removing the ith
row, and finally let’s denote the ith row of Φ by φi . Then for all i ∈ {1, · · · , k} we have
⊺
p̂i = φi A Φ̂i ,
⊺
q̂ i = φi B Φ̂i ,
⊺
and using Lemma 1, Φ̂i is an invertible matrix, as it is a transposed generalized Vandermonde matrix. Then we calculate
the following two matrices using the above equations for i ∈ {1, · · · , k − 1},
φ1
φ1
..
.
. A = Φ̂k A, .. B = Φ̂k B.
φ(k−1)
φ(k−1)
Now since Φ̂k is invertible we have both A, and B.
R EFERENCES
[1] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Transactions
on Information Theory, vol. 56, no. 9, pp. 4539–4551, Sep. 2010.
[2] K. V. Rashmi, N. B. Shah, and P. V. Kumar, “Optimal exact regenerating codes for distributed storage at the MSR and MBR points via a product-matrix
construction,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 5227–5239, August 2011.
[3] M. Ye and A. Barg, “Explicit constructions of high-rate MDS array codes with optimal repair bandwidth,” IEEE Transactions on Information Theory,
vol. 63, no. 4, pp. 2001–2014, April 2017.
[4] K. Mahdaviani, S. Mohajer, and A. Khisti, “Product matrix minimum storage regenerating codes with flexible number of helpers,” in Proc. IEEE
Information Theory Workshop (ITW), Kaohsiung, Taiwan, Nov. 2017.
[5] K. Shvachko, H. Kuang, S. Radia, and R. Chansler, “The Hadoop distributed file system,” in Proc. of IEEE Symposium on Mass Storage Systems and
Technologies (MSST), Lake Tahoe Incline Villiage, NV, USA, May 2010.
[6] “HDFS architecture guide,” Available online: https://hadoop.apache.org/docs/r1.2.1/hdfs design.html#Data+Blocks, 2013.
[7] I. S. Reed and G. Solomon, “Polynomial codes over certain finite fields,” Journal of the Society for Industrial and Applied Mathematics (SIAM), vol. 8,
no. 2, pp. 300—-304, Feb. 1960.
[8] A. G. Dimakis, P. B. Godfrey, M. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” in Proc. IEEE International
Conference on Computer Communications (INFOCOM), Anchorage, Alaska, USA, May 2007, pp. 2000–2008.
[9] V. Cadambe, S. Jafar, H. Maleki, K. Ramchandran, and C. Suh, “Asymptotic interference alignment for optimal repair of MDS codes in distributed
storage,” IEEE Transactions on Information Theory, vol. 59, no. 5, pp. 2974–2987, May 2013.
[10] V. Cadambe, C. Huang, and J. Li, “Permutation code: optimal exact-repair of a single failed node in MDS code based distributed storage systems,” in
Proc. IEEE International Symposium on Information Theory (ISIT), Saint Petersburg, Russia, Aug. 2011, pp. 1225–1229.
[11] I. Tamo, Z. Wang, and J. Bruck, “Zigzag codes: MDS array codes with optimal rebuilding,” IEEE Transactions on Information Theory, vol. 59, no. 3,
pp. 1597–1616, March 2013.
[12] B. Sasidharan, G. K. Agarwal, and P. V. Kumar, “A high-rate MSR code with polynomial sub-packetization level,” in Proc. IEEE International Symposium
on Information Theory (ISIT), Hong Kong, June 2015, pp. 2051–2055.
[13] V. Cadambe, C. Huang, and J. Li, “An alternate construction of an access-optimal regenerating code with optimal sub-packetization level,” in Proc. 21st
Nat. Conf. Commun. (NCC), Bombay, India, Feb. 2015, pp. 1–6.
19
[14] K. Kralevska, D. Gligoroski, and H. Øverby, “General sub-packetized access-optimal regenerating codes,” IEEE Communication Letters, vol. 20, no. 7,
pp. 1281–1284, July 2016.
[15] N. Raviv, N. Silberstein, and T. Etzion, “Constructions of high-rate minimum storage regenerating codes over small fields,” IEEE Transactions on
Information Theory, vol. 63, no. 4, pp. 2015–2038, April 2017.
[16] Z. Wang, I. Tamo, and J. Bruck, “Explicit minimum storage regenerating codes,” IEEE Transactions on Information Theory, vol. 62, no. 8, pp. 4466–4480,
Aug. 2016.
[17] M. Ye and A. Barg, “Explicit constructions of optimal-access MDS codes with nearly optimal sub-packetization,” IEEE Transactions on Information
Theory, vol. 63, no. 10, pp. 6307–6317, Oct. 2017.
[18] B. Sasidharan, M. Vajha, and P. V. Kumar, “An explicit, coupled-layer construction of a high-rate MSR code with low sub-packetization level, small
field size and d < (n − 1),” in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017, pp. 2048–2052.
[19] S. Jiekak, A.-M. Kermarrec, N. L. Scouarnec, G. Straub, and A. V. Kempen, “Regenerating codes: A system perspective,” Proc. ACM SIGOPS Oper.
Syst. Rev., vol. 47, no. 2, pp. 23–32, July 2013.
[20] “Spacemonkey project,” http://www.spacemonkey.com.
[21] “Tahoe: The least-authority file system,” http://www.tahoe-lafs.org/trac/tahoe-lafs.
[22] F. Dabek, F. Kaashoek, D. Karger, R. Morris, and I. Stoica, “Wide-area cooperative storage with CFS,” in Proc. ACM Symposium on Operating Systems
Principles (SOSP), Chateau Lake Louise, Banff, Canada, October 2001, pp. 202–215.
[23] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The Google file system,” in Proc. ACM Symposium on Operating Systems Principles (SOSP), NewYork,
USA, October 2003.
[24] S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz, “Pond: The OceanStore prototype,” in Proc. USENIX Conference on File
and Storage Technologies (FAST), San Francisco, USA, March-April 2003.
[25] R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G. M. Voelker, “Total recall: System support for automated availability management,” in Proc. USENIX
Conference on Networked System Design and Implementation (NSDI), San Francisco, USA, March 2004.
[26] N. B. Shah, K. V. Rashmi, and P. V. Kumar, “A flexible class of regenerating codes for distributed storage,” in Proc. IEEE International Symposium on
Information Theory (ISIT), Austin, Texas, USA, June 2010, pp. 1943–1947.
[27] X. Wang, Y. Xu, Y. Hu, and K. Ou, “MFR: Multi-loss flexible recovery in distributed storage systems,” in Proc. IEEE International Conference on
Communications (ICC), Cape Town, South Africa, May 2010, pp. 1–5.
[28] A.-M. Kermarrec, N. L. Scouarnec, and G. Straub, “Repairing multiple failures with coordinated and adaptive regenerating codes,” in Proc. IEEE
International Symposium on Network Coding (NetCod), Beijing, China, July 2011, pp. 1–6.
[29] V. Aggarwal, C. Tian, V. A. Vaishampayan, and Y.-F. R. Chen, “Distributed data storage systems with opportunistic repair,” in Proc. IEEE International
Conference on Computer Communications (INFOCOM), Toronto, Canada, April–May 2014, pp. 1833–1841.
[30] M. Hajiaghayi and H. Jafarkhani, “MDS codes with progressive engagement property for cloud storage systems,” Available online: https://arxiv.org/abs
/1605.06927, 2016.
[31] K. Mahdaviani, A. Khisti, and S. Mohajer, “Bandwidth adaptive & error resilient regenerating codes with minimum repair bandwidth,” in Proc. IEEE
International Symposium on Information Theory (ISIT), Barcelona, Spain, July 2016, pp. 235–239.
[32] ——, “Bandwidth adaptive & error resilient MBR exact repair regenerating codes,” Available online: https://arxiv.org/pdf/1711.02770.pdf, 2017.
[33] K. V. Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur, and K. Ramchandran, “A solution to the network challenges of data recovery in erasure-coded
distributed storage systems: A study on the facebook warehouse cluster,” in Proc. 5th USENIX Workshop Hot Topics Storage File Syst. (HotStorage),
San Jose, USA, June 2013.
[34] C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin, “Erasure coding in windows azure storage,” in Proc. of the USENIX
Annual Technical Conference (ATC), Boston, USA, June 2012.
[35] S. Narayanamurthy, “Modern erasure codes for distributed storage systems,” in Storage Developer Conference (SDC), SNIA, Santa Clara, 2016.
[36] H. Althaus and R. Leake, “Inverse of a finite-field vandermonde matrix,” IEEE Transactions on Information Theory, vol. 15, no. 1, pp. 173–173, Jan.
1969.
[37] N. Raviv, “Asymptotically optimal regenerating codes over any field,” in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen,
Germany, June 2017, pp. 1416–1420.
[38] M. Nair, “On chebyshev-type inequalities for primes,” The American Mathematical Monthly, vol. 88, no. 2, pp. 126–129, Feb. 1982.
[39] V. Diekert, M. Kufleitner, G. Rosenberger, and U. Hertrampf, Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups. Walter
de Gruyter GmbH & Co KG., 2016.
| 7cs.IT
|
ADA: A Game-Theoretic Perspective on Data Augmentation for Object Detection
Sima Behpour
University of Illinois at Chicago
Kris M. Kitani
Carnegie Mellon University
arXiv:1710.07735v2 [cs.CV] 12 Dec 2017
[email protected]
[email protected]
Brian D. Ziebart
University of Illinois at Chicago
[email protected]
Abstract
The use of random perturbations of ground truth data,
such as random translation or scaling of bounding boxes,
is a common heuristic used for data augmentation that
has been shown to prevent overfitting and improve generalization. Since the design of data augmentation is largely
guided by reported best practices, it is difficult to understand if those design choices are optimal. To provide a more
principled perspective, we develop a game-theoretic interpretation of data augmentation in the context of object detection. We aim to find an optimal adversarial perturbations
of the ground truth data (i.e., the worst case perturbations)
that forces the object bounding box predictor to learn from
the hardest distribution of perturbed examples for better
test-time performance. We establish that the game theoretic
solution, the Nash equilibrium, provides both an optimal
predictor and optimal data augmentation distribution. We
show that our adversarial method of training a predictor
can significantly improve test time performance for the task
of object detection. On the ImageNet object detection task,
our adversarial approach improves performance by over
16% compared to the best performing data augmentation
method.
Figure 1. Tiger localization example with three different bounding
box annotations illustrates ambiguity in ‘ground truth’ labels.
tics for augmenting the ground truth through consensus
[30, 23, 35, 22]. Despite these efforts, it is not clear if there
is a principled approach for identifying the optimal ground
truth distribution in the context of supervised learning.
To address in part the uncertainty of the ‘ground truth’
annotations, dataset augmentation methods can be used to
synthesize new annotations of images by perturbing annotations. In fact, heuristic data augmentation preprocessing
such as random translation, flipping or scaling, has been
shown to be essential for many modern visual learning tasks
using deep networks. However, manually choosing perturbations to improve performance can be an error-prone process. While increasing the modes of data perturbations may
effectively increase the amount of training data, it can also
cause the learned predictor to drift. In this way, current techniques for data augmentation are more of an art than a science.
Towards a more principled approach to data augmentation, we propose to integrate annotation perturbations directly into the learning process. We do this by introducing
an adversarial function that generates maximally perturbed
version of the ground truth, which makes it as hard as possible for the predictor to learn. The adversary, however, is not
completely free to perturb the data. It must retain certain
1. Introduction
There is no guarantee that human-labeled ‘ground-truth’
annotations of an image dataset are error free. Consider the
bounding box annotations of three annotators of the image
in Figure 1. Do all boxes contain the object? Are all three
bounding boxes equally correct? Is there one bounding
box which is most helpful for learning a detection model?
These questions highlight the ambiguity in the annotation
task. In response, many helpful heuristics have been utilized in the literature to obtain more consistent annotations.
To deal with inter-annotator disagreement [33, 19, 27],
previous work has relied primarily on reasonable heuris1
feature statistics (e.g., the features of the new bounding box
distribution should still be close to the features of the original bounding box). Formally, we pose the data augmentation problem as a zero-sum game between a player (the
predictor model) seeking to maximize performance and a
constrained adversary (augmented data distribution) seeking to minimize expected performance [8, 1, 32].
To the best of our knowledge, this is the first work to provide a theoretic basis for data augmentation in terms of an
adversarial two player zero-sum game. As a consequence
of our game-theoretic formulation, we develop a novel adversarial loss function that identifies the optimal data augmentation strategy which leads to the most robust predictor possible (i.e., trained for the worst case perturbation
of data). In our experiments, we focus on the task of object detection and show that our proposed adversarial data
augmentation technique consistently improves performance
over various competing loss functions, data augmentation
levels, and deep network architectures.
2. Related Work
It is common to assume that the ground truth is singular and error-free. However, disagreement between annotators is a widely-known problem for many computer vision
tasks [33], as well as a major concern [19] when constructing an annotated computer vision corpora. In large part, the
difficulty arises because the set of possible “ground truth”
annotations is typically extremely large for vision tasks. It
is a powerset of possible descriptions (e.g., words, noun
phrases) in annotation tasks, multi-partitions of the pixels
(exponential in the number of pixels) in segmentation tasks,
and the possible bounding boxes (quadratic in the number
of pixels) for localization tasks.
Methods to form a “consensus” annotation and to improve the annotation process through crowd-sourcing have
been developed by averaging or combining together different independent annotations [30], verifying annotations
with other independent annotators [23], and other strategies [35, 22]. For example, the ILSVRC2012 image dataset
employs boundary box drawing, quality verification, and
coverage verification as three separate subtasks [25] in a
crowd-sourcing pipeline. In the construction of that dataset,
proposed bounding boxes are rejected 37.8% of the time
[25], illustrating the inherent disagreement between annotators and the uncertainty of the task. Despite the added safeguards of the verification process, recent evaluations have
also been performed by removing a substantial fraction of
the training examples that are considered to have poor quality bounding boxes [27, 6, 34, 26, 21].
Many state-of-the-art methods for object detection [14]
are based on CNN, and incorporate other improvements
such as the use of very large scale datasets, more efficient
GPU computation, and data augmentation [3]. Recently,
most of the literature on data augmentation studies effective data augmentation methods for CNN features that increases the performance of different tasks (e.g., classification, object recognition) [28, 20, 16, 11]. Chatfield [3] applies the data augmentation techniques commonly applied
to CNN-based methods to shallow methods and shows an
analogous performance boost [3]. Paulin et al. [20] claim
that given a large set of possible transformations, all transformations are not equally informative and adding uninformative transformations increases training time with no gain
in accuracy. They propose Image Transformation Pursuit
(ITP) algorithm for the automatic selection of a compact
set of transformations.
Complementary to our work, data augmentation can also
be used to guard against adversarial attacks [7, 18, 9, 13,
29]. Total variance minimization and image quilting are presented as very effective defenses adversarial-example attacks on image-classification systems [9]. The strength of
these data augmentation lies in their non-differentiable nature and their inherent randomness resulting difficult defenses for an adversary. Our work is different in that we
seek to optimize the data augmentation process as part of a
supervised learning problem.
3. Problem Formulation
In order to understand the underlying theory of adversarial data augmentation proposed in this work, we must first
understand the role of the annotation distribution, p(y|x),
which describes the distribution over labels y (e.g., a bounding box annotation) given a feature vector x (e.g., an RGB
image). Note that a training dataset D = {yn , xn }N
n=1 ,
induces an annotation distribution p(y|x). In other words,
each label yn in the training set can be interpreted to be
a sample from the annotation distribution which is conditioned on a feature vector x ∈ RD . When there is absolute
certainty in the ground truth annotation, the annotation distribution p(y|x) is an indicator function where it is one for
the true label y ∗ and zero otherwise.
3.1. Data Augmentation
The process of data augmentation is a method of altering the annotation distribution. A typical method for data
augmentation generates new examples D̃ by perturbing the
training data D. For example, if the label is a structured output like a bounding box (i.e., a vector of four values), we
can generate a new structured label ỹ for the same image by
slightly perturbing the original ‘ground truth’ bounding box
y ∗ . This data augmentation process creates a new underlying annotation distribution p̃(y|x). Since data augmentation
can be used to generate multiple new labels for the same
feature vector x, the annotation probability p(y|x) becomes
a soft distribution over labels.
Now if we are given a loss function `(ŷ, y) describing the
distance between an estimated label ŷ and annotation label
y, we can compute the expected loss of the estimated label
under the annotation distribution as:
X
P (y|x)`(ŷ, y).
(1)
y∈Y
Notice that the expected loss is the smallest when the
estimated label matches the annotation distribution. Conversely, the expected loss grows larger when the estimated
label is far from the annotation distribution. It is important
to note here that this marginalization over the annotation
distribution is rarely made explicit in the loss function in
most modern supervised learning objective functions because the distribution is assumed to be an indicator function
at the ‘ground truth’ label.
Now consider the probabilistic predictor f (y|x) which
maps a feature vector x to a distribution over labels y. The
expected loss over the entire dataset D under the predictor
distribution and annotation distribution is defined as:
expected loss for input x
}|
{
X
X zX
0
0
f (y |x)
P (y|x)`(y , y) .
(2)
min
f ∈Γ
x∈D y 0
y
The goal of supervised learning is to find the optimal predictor f (from some set of predictors Γ), that minimizes the
above expected loss over the labeled training data. Understanding this verbose form of the supervised learning objective function is critical for the formulation that follows.
3.2. Adversarial Data Augmentation
If we adopt a pessimistic view of the annotated data
and assume uncertainty in the ‘ground truth’ annotations,
we can use data augmentation to perturb the ‘ground truth’
annotations to reflect this uncertainty. We can go further
and assume the worst case: that the quality of the annotation distribution is maximally perturbed. In other words, we
make a strong pessimistic assumption that the annotation
distribution was generated by an adversary. By making this
worst case assumption, we hypothesize that we can train a
more robust predictor that is resilient to large perturbations
it might encounter at test time. Figure 2 illustrates the three
possible choices of annotation distributions for a single image.
More formally, instead of the common Empirical Risk
Minimization (ERM) objective of Eq. (2), we aim to learn a
predictor f that optimizes the following adversarial objective function:
XX
X
min
f (y 0 |x) max
P (y|x)`(y 0 , y). (3)
f ∈Γ
x∈D y 0
P (y|x)
y
Notice that the maximization sub-problem has been inserted
into the objective function which reflects our assumption
Figure 2. Types of annotation distributions. Adversarial augmentation selects bounding boxes that are maximally different from the
ground truth but still contain important object features.
that the annotation distribution is adversarial (i.e., the worst
case distribution). One might quickly notice that this is an
unreasonable objective function without some additional
constraints because the adversarial annotation distribution
can be arbitrarily bad. In the next section we will incorporate constraints that limit the adversary from deviating very
far from the original ground truth annotations.
3.3. Game Formulation
Our claim is that data augmentation should be included
in the learning problem instead of being an independent
data pre-processing step. By incorporating data augmentation into the predictor learning problem, we obtain a saddle
point optimization problem where we pit a predictor trying
to minimize the loss, against an adversarial annotation distribution that is trying to maximize the loss. In this form,
the optimization can be seen as a minimax problem over a
zero-sum two-player game.
In the language of game theory, the player (predictor)
selects a label from a mixed strategy y 0 ∼ f (y 0 |x) to
minimize the loss, while the opponent (annotation distribution) selects an annotation from the adversarial distribution
y ∼ P (y|x) to maximize the loss. The equilibrium point of
the game yields both the optimal predictor and an optimal
data annotation distribution. The game is zero-sum because
the negative loss of the player (predictor) is exactly the gain
of the adversary (annotation distribution).
The value or payoff of the game for a particular feature
vector x is the expected loss of the predictor distribution
against the adversary’s annotation distribution:
X
E y0 |x ∼f [`(y 0 , y)] =
f (y 0 |x)`(y 0 , y)P (y|x) (4)
y|x ∼P
y 0 ,y
= f > Gp.
(5)
The expected loss of the game can also be written in matrix
form, where f is the vector of probabilities obtained from
the predictor over all labels, G is the game matrix where
each element contains the loss between two labels, and p is
the annotation distribution vector.
The adversarial objective function, Eq. (3) in its current
form is problematic because the adversarial annotation distribution is free to perturb the ground truth annotations in
arbitrary ways that have no similarity to the original annotations. This can be prevented by constraining the adversarial annotation distribution to choose label distributions in a
way that retains feature statistics of the original ground truth
annotation. For example, we may want the mean of a set of
augmented bounding box annotations to be the same as the
mean of the original bounding box annotation. Formally, we
can define the first-order statistic of the ground truth data as:
Ey,x∼D [φ(y, x)] =
N
1 X
φ(yn , xn ),
N n=1
(6)
where (yn , xn ) is the nth training example in D. We are
now ready to define the constrained adversarial optimization problem.
Definition 1. The Primal Adversarial Data Augmentation (ADA-P) game is:
min max Ex ∼ D, [`(y 0 , y)] such that:
f
P
y 0 |x ∼ f,
y|x ∼ P
(7)
Ex ∼ D, [φ(y, x)] = Ey,x∼D [φ(y, x)]
y|x ∼ P
where f (y 0 |x) and P (y|x) are distributions over all potential predicted labels for each feature vector x.
Due to strong Lagrangian duality [2], a dual problem
with an equivalent solution can be formulated by including the constraint in the objective function using a vector of
Lagrangian multipliers, θ. This resulting Lagrangian potential θ> φ(·, ·) links together a set of otherwise independent
zero-sum games.
Definition 2. The Dual Adversarial Data Augmentation
(ADA-D) game is:
h
h
min Ex,y∗ ∼D min max Ey0 ∼ f, `(y 0 , y)
(8)
P
θ
f
y ∼ P
i
+ θ> {φ(y, x) − φ(y ∗ , x)} .
We make two important observations based on this dual
optimization perspective. First, since P is adversarially chosen, there is no need to restrict or parameterize f to avoid
overfitting to P as is typically done in supervised learning.
Instead, the feature potential based on θ is learned to provide constraints on the adversary that make prediction easier. Further, since P is chosen after f in Eq. (8), the predictor is incentivized to randomize.
4. Adversarial Object Localization
Up to this point, we have described our proposed adversarial data augmentation learning approach in general
terms, as it can apply to many structured output tasks. Now,
we shift our focus to the concrete problem of object detection. This explicit focus will help us to describe our approach in concrete terms.
Label Space. Each structured output label y is represented
by the four coordinates of a bounding box. The domain of
a label is denoted Y. The set of all possible bounding boxes
Y is very large for an image of modest size and therefore it
is rarely practical to evaluate all possible bounding boxes.
This means that the sums over labels used in the formulation above (Section 3) are not tractable and that some form
of distribution approximation is needed. To discretize the
label space Y, we use a bounding box proposal algorithm,
Edgebox [15], to generate a set of k bounding boxes to define the label space Y.
Feature Statistics. To represent the feature statistics
φ(y, x) of a bounding box y over an image x, we use
the FC7 features of the VGG16 [24] network. Concretely,
it is a 4096 dimensional vector over a sub-image defined
by the bounding box y. The feature statistic constraint
{φ(y 0 , x) − φ(y ∗ , x)} described in the ADA-D definition
represents the difference between the FC7 features of an arbitrary bounding box y 0 and the FC7 features of the ground
truth bounding box y ∗ . Also known as the perceptual loss,
this quantity ensures that the adversarial bounding box label
remains perceptually similar to the ground truth bounding
box label.
Loss Function. The loss function used for object localization is based on the classical intersection over union
(IoU) score, IoU (y, y 0 ) = area(y ∩ y 0 )/area(y ∪ y 0 ). Here,
y and y 0 are two bounding boxes. In this work, we focus
on losses defined in terms of the amount of non-overlap,
`(y, y 0 ) = 1 − IoU(y, y 0 ), which equals to one when y and
y 0 are disjoint, zero when they are identical, and smoothly
transitions in between those extremes. Another loss function we use is the overlap loss with a threshold:
(
1 IoU(y, y 0 ) < α
`tα (y, y 0 ) =
(9)
0 IoU(y, y 0 ) ≥ α,
which assigns binary loss to bounding boxes depending on
the overlap threshold.
4.1. Game Matrix
As noted in Eq. (5), the expected loss of the adversarial
game can be written in matrix form, f > Gp. The game (or
payoff) matrix G for ADA-D can be constructed from Eq.
(8) as an |Y| × |Y| matrix, where each element is defined
as:
G(y 0 , y) = `(y 0 , y) + θ> {φ(y, x) − φ(y ∗ , x)},
(10)
where is the first term `(·, ·) is the IoU based loss and the
second term is the weighted difference between FC7 features of the annotation distribution label y and the ground
Algorithm 1 ADA Equilibrium Computation
Figure 3. Example Game Matrix for a duck image with three
bounding boxes. Each black bounding box is a potential label for
the same duck image.
truth y ∗ label. To better understand the structure of the game
GΦ . The elements
matrix, we can decompose it as G = G` +G
of each matrix are illustrated for a toy example in Figure 3.
The first matrix G ` contains the pairwise loss between the
label of the predictor and the label of the adversary, `(y 0 , y).
The second matrix G Φ contains the difference in feature
statistics between the adversarial label and the ground truth
label, θ> {φ(y, x) − φ(y ∗ , x)}. Since the constraint matrix
G Φ does not depend on the predictor label y 0 , each row is
identical. The elements of the last column are all −1 in this
example because the feature statistic of the bounding box y3
are very different from the ground truth bounding box y ∗ ,
whereas the first two columns are zero because the content
of their bounding boxes are similar.
4.2. Nash Equilibria
The solution of the game, the Nash equilibrium pair
(f , p), is defined as the optimal strategy for each player such
that:
>
f 0 G p.
max
f >G p0 ≤ f >G p ≤ min
0
0
p
f
(11)
For the example in Figure 3, the lower potential for the
third bounding box in G Φ offsets the larger loss that might
be produced in G ` by having p(y3 ) > 0. Due to the
symmetries in G , the equilibrium solution is then simply:
P (y1 |x) = P (y2 |x) = f (y10 |x) = f (y20 |x) = 0.5 and
P (y3 |x) = f (y3 |x) = 0.
In general, this equilibrium solution pair can be obtained
efficiently using a pair of linear programs:
min v such that: f >G ≤ v1 and f > 1 = 1; and
v,f ≥0
(12)
max v such that: G p ≥ v1> and p> 1 = 1,
v,p≥0
where v is the value of the game (i.e., the expected loss).
This first linear program finds f that produces the maximum
value against the worst choice of p0 using the left-hand side
of Eq. (11) via constraints for each deterministic choice of
p0 (i.e., the 1 vector). The second linear program is constructed in a likewise manner to obtain p.
Input: Image x; Parameters θ; Ground Truth y ∗
Output: Nash equilibrium, (f , p)
1: Y ← EdgeBox(x)
2: Φ = CNN(Y, x)
3: ψ ← θ > (Φ − Φ(y ∗ ))
4: Sp ← Sf ← argmaxy ψ(y)
5: repeat
6:
(f , p, vp ) ← solveGame(ψ(Sp ), loss(Sf , Sp ))
7:
(ynew , vmax ) ← maxy Ey0 ∼f [loss(y, y 0 )+ ψ(y)]
8:
if (vp 6= vmax ) then
9:
Sp ← Sp ∪ ynew
10:
end if
11:
(f , p, vf ) ← solveGame(ψ(Sp ), loss(Sf , Sp ))
12:
(y 0 new , vmin ) ← minŷ Ey∼p [loss(y, y 0 )]
13:
if (vf 6= vmin ) then
14:
Sf ← Sf ∪ y 0 new
15:
end if
16: until vp = vmax = vf = vmin
17: return (f , p)
4.3. Constraint Generation for Large Games
In practice, forming and solving a zero-sum adversarial
game over a very large set of labels (e.g., the set of all possible bounding boxes in an image) for each image is computationally expensive. To obtain the same result more efficiently, we employ a constraint-generation method [17, 32]
to solve ADA-D without explicitly constructing the entire
payoff matrix G . It is based on the key insight that the
equilibrium distributions, f and p, both assign zero probabilities to many bounding boxes and those bounding boxes
can then be effectively removed from the game matrix without changing the solution. The basic strategy of constraintgeneration is to use a set of the most violated constraints to
grow a game matrix that supports the equilibrium distribution, but is much smaller than the full game matrix.
The approach works by iteratively obtaining a Nash
equilibrium for a game defined over a subset of the possible labels (not all of them), finding a player’s best response
strategy (either the predictor or the annotation distribution)
to that equilibrium distribution. Then the best response to
the set of opponent strategies defining the game is added as
a new strategy. When additional best responses no longer
improve either player’s game value, the subgame equilibrium is guaranteed to be an equilibrium to the larger game
[17].
4.4. Algorithm Details
Algorithm 1 details the ADA equilibrium computation
structure. The pre-processing step, extracting the image box
proposals (EdgeBox) and their CNN features, is addressed
in Lines 1-4. The CNN features are extracted from the last
convolutional layer of the deep networks in respect with the
related experiments. Sp and Sf stand for strategies(chosen
box proposals) of p and f game players. The algorithm
presents the main structure in lines 5-16. solveGame is
the process of obtaining a Nash equilibrium using linear
programming. Gurobi LP solver [10] is used to solve the
linear programming. The constraint generation is presented
with max and min operations in lines 7,12. After reaching
the loop termination condition (line 16), the f and p distributions are returned.
Model parameters θ are obtained using convex optimization (gradient-based methods [4]) that reach convergence
exactly when the data augmentations match the features
of the training data: Ex ∼ D, [φ(y, x)] = Ey,x∼D [φ(y, x)].
y|x ∼ P
The gradient is simply the difference between these two expectations.
At testing time, we employ a similar inference procedure. It likewise uses constraint generation—in the form
of best responses to equilibria using sets of strategies—to
find a set of strategies supporting the equilibrium of the
full game. A final prediction is produced by taking the most
probable predictor strategy under the equilibrium distribution, ŷ = argmaxy P (y|x), as the predicted bounding box.
5. Experiments
In the following experiments, our aim is to show that
our proposed adversarial optimization for data augmentation will provide meaningful improvements in test time prediction performance. We first compare our adversarial data
augmentation (ADA) objective function against baselines
models with no data augmentation on the task of localization in Section 5.1. Second, we compare our approach to
baseline models with varying levels of data augmentation
in Section 5.2. Third, we evaluate our approach on the task
of detection (joint recognition and localization) in Section
5.3. Finally, we use our adversarial optimization over various deep features to show consistent improvements across
networks in Section 5.4.
Baselines. To analyze the performance of our adversarial
objective function (ADA) for object detection, we benchmark it against two classical objective functions.
(1) SSVM: The structured output support vector machine
(SSVM)[31] is a large margin classifier with a variable margin depending on a structured loss function `. The objective
function is defined as:
X
θ̂ = argmin λ||θ||2 +
ξn
(13)
θ
s.t.
n
>
θ (φ(yn∗ , xn ) − φ(y, xn )) ≥ `(yn∗ , y) − ξn ∀ y
where θ is the weight vector, φ is the feature function (image feature statistic), ` is the loss function and ξ is the slack
variable. To solve the SSVM objective function, we employ an iterative constraint generation strategy to accelerate
Table 1. No augmentation baseline comparison (IoU>0.5)
Model
Plane
ADA+VGG (Ours) 92.0
Softmax+VGG
84.0
SSVM+VGG
90.0
Bird
93.5
86.5
82.5
ImageNet Object Categories
Bus Car Cat Cow Dog Hors
92.0 100.0 89.1 100.0 93.0 96.4
84.0 87.0 70.9 77.5 62.0 72.7
82.0 82.0 40.0 87.5 72.0 72.7
Moni
96.0
72.0
90.0
Sofa mAP
90.0 94.2
80.0 77.7
78.0 77.7
Table 2. No augmentation baseline comparison (IoU>0.7)
Model
Plane
ADA+VGG (Ours) 58.0
Softmax+VGG
47.6
SSVM+VGG
51.8
Bird
61.5
45.7
55.5
ImageNet Object Categories
Bus Car Cat Cow Dog Hors
64.0 91.0 30.9 77.4 58.0 58.2
40.0 62.8 20.0 42.5 25.1 25.4
44.0 61.7 21.8 54.7 31.6 43.6
Moni
61.8
31.4
56.0
Sofa mAP
61.9 62.3
44.2 38.5
57.3 47.8
the learning process by adding a few constraints per iteration (instead of the entire constraint set defined by each
label y ∈ Y). At test time, we generate a set of bounding box proposals (EdgeBox) and take the bounding box
with the highest potential using the learned weight vector,
ŷ = argmaxy θ> φ(y, x) to identify the predicted structured output.
(2) Softmax: The soft maximum (logistic regression) objective function is a probabilistic predictor. For the softmax objective function, we estimate a distribution over all
proposed bounding boxes y that maximizes the conditional
likelihood of proposed bounding boxes with an IoU above
a given threshold.
Y
θ̂ = argmax
P (yn |xn ; θ),
(14)
θ
n
Y eθ> φ(yn ,xn )
P θ> φ(y,x )
= argmax
n
θ
ye
n
(15)
where θ is the weight vector, φ is the potential function (FC7
feature) and ` is the loss function. At test time, we compute
the Bayesian optimal decision to identify the most likely
bounding box from a set of proposed bounding boxes according to:
X
ŷ = argmin
P (y 0 |x; θ)`(y, y 0 ),
(16)
y
y 0 ∈Y
where P (y|x; θ) is the learned conditional distribution parameterized by θ and ` is the loss function.
5.1. Baseline Comparisons with No Augmentation
We begin with the simplest evaluation, where we compare our proposed adversarial data augmentation approach
with two baseline method that use only the ground truth
annotation, without augmenting the training data, to learn
a predictor. We compare our method ADA+VGG against
SSVM+VGG and Softmax+VGG. The suffix +VGG for
each objective function specifies the deep network from
which the features are used, in this case VGG16 [24]. We
compute the mean Average Precision (mAP) score for several classes in ImageNet dataset for each of the competing
methods. We train a bounding box predictor for each object
category, and consider an object to be correctly detected
when the IoU is greater than a threshold. We emphasize
here that we are decoupling the recognition task from the
localization task by learning class specific bounding box regressor and testing only on images that contain the target
class. Later experiments will evaluate on both recognition
and localization. For this experiment, we give results for
two thresholds, 50% IoU and 70% IoU for each object category. Since our method explicitly augments the dataset as
part of the optimization process whereas the two baselines
have no data augmentation, we expect our approach will
outperform the two baselines.
The test time localization accuracy at 50% IoU on object 10 classes from ImageNet are given in Table 1. As expected, we observed significant test time improvement in
bounding box regression accuracy for every object category.
On average, our proposed adversarial data augmentation approach improved mean average precision by 17% percentage points.
We repeated the same experiment for a more strict loss,
a 0.7 thresholded IOU loss function. The mean average precision of the predicted bounding boxes are given in Table 2.
Since we are evaluating performance with a more strict loss
function, the absolute mAP values decrease as expected.
However, notice that our proposed approach still obtains a
significant improvement over the baseline algorithms improving mAP by 15% percentage points over the strongest
baseline SSVM+VGG.
5.2. Baseline Comparisons with Augmentation
We now compare the performance of our approach to
the strongest baseline model, SSVM+VGG, trained with
different levels of data augmentation. As mention earlier,
data augmentation such as random translations of bounding
boxes, is a common heuristic used to help supervised learning methods avoid overfitting. We prepare five levels of data
augmentation to train the SSVM+VGG baseline. Instead of
using random translations within a range of the ground truth
bounding box annotation, which can contain many similar
bounding boxes, we use the EdgeBox proposal network to
generate a diverse set of bounding boxes. We keep the top
250 EdgeBox proposals with the highest scores and filter
them according to 5 thresholds with respect to the original
ground truth bounding box: (1) IoU>50%; (2) IoU>60%;
(3) IoU>70%; (4) IoU>75%; and (5) IoU>80%. We denote the experiment using the subscript t50 to represent
a model trained on a collection of bounding boxes with
IoU>50%. We consider the bounding boxes that pass the
threshold test, as new ‘ground truth’ and use them as the
training set. We note here again that our proposed method
automatically selects (gives weights to) the bounding box
proposals during the learning process and does not require
a separate augmentation step.
Table 3. Effect of Data Augmentation (IoU > 70%)
Augmentation
Plane
SSVMt50 +VGG
53.8
SSVMt60 +VGG
54.7
SSVMt70 +VGG
56.4
SSVMt75 +VGG
52.6
SSVMt80 +VGG
49.8
ADA+VGG (Ours) 58.0
Bird
57.9
58.9
61.6
61.0
52.0
61.5
AlexNet Object Category
Bus Car Cat Cow Dog Hors
49.7 64.0 22.6 59.9 37.5 45.5
52.7 67.7 23.7 64.9 42.0 48.6
56.8 70.8 25.4 67.3 49.1 51.9
51.7 64.4 20.2 61.2 42.6 44.0
44.9 60.3 20.2 55.8 33.1 41.4
64.0 91.0 30.9 77.4 58.0 58.2
Moni
56.7
57.3
58.6
57.3
55.8
61.8
Sofa
57.8
58.4
58.8
56.0
52.7
61.9
Avg
50.5
52.9
55.7
51.1
46.6
62.3
Table 4. Effect of Number of Augmented Data Annotations. ADA
outperforms best configuration SSVM+VGG baseline by 12%.
SSVM+VGG k=1 k=2 k=4 k=6 k=8 k=10 k=12 ADA+VGG
mAP
77.6 79.7 81.4 83.8 83.7 79.8 75.3
94.2
Table 5. Detection Performance Comparison (IoU > 70%).
Model
Plane
ADA+VGG (Ours) 46.0
SSVM+VGG
42.0
Softmax+VGG
40.0
Bird
55.5
46.0
42.5
Image Net Object Category
Bus Car Cat Cow Dog Hors
60.0 86.0 25.4 70.0 47.0 52.7
38.0 53.0 16.4 52.5 25.0 36.4
42.0 55.0 16.4 32.5 16.0 29.1
Moni
60.0
42.0
22.0
Sofa
48.0
42.0
34.0
Avg
55.1
39.3
33.0
The results of this experiment are shown in Table 3. We
note that augmenting SSVM in this manner improves test
performance compared to the model without data augmentation (Table 2). We also observe that the performance gain
is maximized around the 70% overlap threshold. However,
we find that with the exception of the Bird class, the performance gains of data augmentation do not reach the performance of our ADA approach. Our proposed approach still
outperforms the model with the best level data augmentation by 6.4% percentage points.
We also performed a second data augmentation experiments by only varying the number of bounding boxes with
top the EdgeBox scores (instead of using IoU) for every image label to understand how the amount of augmented data
affects test time performance. At test time, we use the 50%
overlap criteria for successful localization. Table 4 shows
the mAP performance over same 10 object categories in
ImageNet as a function of the number of augmented data
annotations per image. The augmented data annotations are
selected from a rank list of EdgeBox proposals from each
image. The performance of the SSVM+VGG tops out at 8
augmented data annotations and is still 12% points below
our propose approach (94.2% mAP).
5.3. Detection Performance Comparison
We now address the object detection task of jointly locating and recognizing the category an unknown object, to
evaluate the performance of our approach on a harder task.
In order for a model to obtain a correct result, the predictor
must output the correct category label and also generate a
bounding box that overlaps with the ground truth by at least
70% IoU. For our baseline models, SSVM+VGG and Softmax+VGG, we use the best performing data augmentation
scheme from Table 3 that includes EdgeBox proposals that
have 70% IoU threshold with the original ground truth annotation.
Adversarial Boxes (proposed)
Top-K EdgeBoxes by score
Top-K EdgeBoxes by IoU
Figure 4. The top five augmented bounding boxes (left to right) under the different augmentation strategies. Our adversarial augmentation
approach generates much more diverse bounding boxes to augment the training data than choosing solely based on IoU yet the boxes are
at the same time still relevant to the target object unlike general EdgeBoxes.
Table 6. ADA Generalization Across Deep Architectures. VOC2007 mAP for IoU>0.5.
Model
Aero
ADA+VGG16
68.5
SSVM+VGG16
73.6
SVM+VGG16 [5]
73.4
ADA+AlexNet fc7
62.4
SSVM+AlexNet fc7
68.2
SVM+AlexNet fc7 [5] 68.1
ADA+ResNet101
76.4
SSVM+ResNet101
68.0
Bike
71.5
76.4
77.0
70.0
72.9
72.8
74.8
70.2
Bird
67.8
63.7
63.4
63.6
57.3
56.8
72.4
69.3
Boat
63.3
46.1
45.4
63.0
44.2
43.0
64.0
54.3
Bott
48.6
44.0
44.6
44.8
41.8
36.8
52.5
46.5
Bus
76.5
76.0
75.1
72.2
66.0
66.3
84.0
76.2
Car
78.8
78.4
78.1
75.5
74.3
74.2
81.9
78.8
Cat
80.9
80.0
79.8
79.5
69.2
67.6
86.0
85.0
VOC 2007 Object Category
Chair Cow DinT Dog Horse mbike person Plant Sheep Sofa Train TV mAP
50.9 78.5 64.5 79.6 71.8 73.2 66.4 30.2 70.6 72.6 80.8 62.8 67.9
41.6 74.2 62.8 79.8 78.0 72.5 64.3 35.0 67.2 67.2 70.8 71.4 66.1
40.5 73.7 62.2 79.4 78.1 73.1 64.2 35.6 66.8 67.2 70.4 71.1 66.0
44.6 81.6 64.0 81.5 70.2 68.5 71.4 69.5 65.0 71.2 81.4 59.8 68.0
34.6 54.7 54.3 61.3 69.8 68.7 58.5 34.6 63.6 52.5 62.6 63.5 58.6
34.4 63.5 54.5 61.2 69.1 68.6 58.7 33.4 62.9 51.1 62.5 64.8 58.5
48.5 83.5 64.8 82.0 73.5 77.0 72.4 36.6 74.4 74.8 81.4 65.6 71.3
46.8 80.2 63.2 78.1 69.5 71.4 61.8 36.8 68.1 69.1 73.6 64.5 66.5
Table 5 shows the object detection performance when
evaluated at the 70% IoU threshold for correctness. We
again find strong support for our adversarial approach to
dealing with uncertainty. Specifically, we find that ADA70
provides the best performance for all object classes. Though
the relative performance advantage differs by object type,
for classes like Dog, the improvement over the other approaches is nearly double. On average, ADA provides a
significant performance improvement of 15.8% percentage points on this task over the strongest performing
SSVM+VGG baseline.
proccessing step of theses experiments, the box proposals
of every image are extracted using EdgeBox. These box
proposals are employed as input to the respective deep networks. The CNN features are extracted from the last convolutional layer of the respective deep network and these
box proposals and their CNN features are employed in
training the respective classifier. We report the generalized
version of ADA and SSVM with Alexnet[14], VGG, and
ResNet101[12]. For the VOC 2007 dataset, we use 5000
training images and 4952 testing images.
5.4. Generalization Across Deep Features
6. Conclusions
To understand how our proposed adversarial loss function, ADA, generalizes across various deep architectures,
we compare mAP over 20 categories from the VOC2007
dataset for several combinations of deep architecture using our proposed adversarial loss function. In the pre-
In this paper, we have developed a game-theoretic formulation for data augmentation that perturbs image annotations adversarially. This provides robustness in the learned
predictor that is achieved by training from a number of
augmentations that are adaptively selected to be difficult,
while still approximating the ground truth annotation. We
demonstrated the benefits for object localization and detection using experiments over ten different object classes
for the ILSVRC2012 dataset and twenty different object
classes for the VOC2007 dataset, showing significant improvements for our approach under 50% and 70% thresholded IoU evaluation measures.
References
[1] K. Asif, W. Xing, S. Behpour, and B. D. Ziebart. Adversarial
cost-sensitive classification. In Proceedings of the Conference on UAI, 2015. 2
[2] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press, 2004. 4
[3] K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman.
Return of the devil in the details: Delving deep into convolutional nets. arXiv preprint arXiv:1405.3531, 2014. 2
[4] J. Duchi, E. Hazan, and Y. Singer. Adaptive subgradient methods for online learning and stochastic optimization.
Journal of Machine Learning Research, 12(Jul):2121–2159,
2011. 6
[5] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic
segmentation tr. In arXiv:1311.2524, 2014. 8
[6] R. Gokberk Cinbis, J. Verbeek, and C. Schmid. Multi-fold
mil training for weakly supervised object localization. In
Proceedings of the IEEE conference on computer vision and
pattern recognition, pages 2409–2416, 2014. 2
[7] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu,
D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in Neural Information
Processing Systems, pages 2672–2680, 2014. 2
[8] P. D. Grünwald and A. P. Dawid. Game theory, maximum entropy, minimum discrepancy, and robust Bayesian decision
theory. Annals of Statistics, 32:1367–1433, 2004. 2
[9] C. Guo, M. Rana, M. Cisse, and L. van der Maaten. Countering adversarial images using input transformations. arXiv
preprint arXiv:1711.00117, 2017. 2
[10] I. Gurobi Optimization. Gurobi optimizer reference manual,
2016. 5
[11] K. He, X. Zhang, S. Ren, and J. Sun. Spatial pyramid pooling
in deep convolutional networks for visual recognition. IEEE
transactions on pattern analysis and machine intelligence,
37(9):1904–1916, 2015. 2
[12] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages
770–778, 2016. 8
[13] S. Joon Oh, M. Fritz, and B. Schiele. Adversarial image perturbation for privacy protection–a game theory perspective.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 1482–1491, 2017. 2
[14] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
Advances in neural information processing systems, pages
1097–1105, 2012. 2, 8
[15] P. D. Larry Zitnick. Edge boxes: Locating object proposals
from edges. In ECCV. European Conference on Computer
Vision, September 2014. 4
[16] I. Masi, A. T. Trn, T. Hassner, J. T. Leksut, and G. Medioni.
Do we really need to collect millions of faces for effective
face recognition? In European Conference on Computer Vision, pages 579–596. Springer, 2016. 2
[17] H. B. McMahan, G. J. Gordon, and A. Blum. Planning in
the presence of cost functions controlled by an adversary.
In Proceedings of the International Conference on Machine
Learning, pages 536–543, 2003. 5
[18] S.-M. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and
P. Frossard. Universal adversarial perturbations. arXiv
preprint arXiv:1610.08401, 2016. 2
[19] S. Nowak and S. Rüger. How reliable are annotations via
crowdsourcing: a study about inter-annotator agreement for
multi-label image annotation. In Proceedings of the international conference on Multimedia information retrieval, pages
557–566. ACM, 2010. 1, 2
[20] M. Paulin, J. Revaud, Z. Harchaoui, F. Perronnin, and
C. Schmid. Transformation pursuit for image classification.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 3646–3653, 2014. 2
[21] S. Reed, H. Lee, D. Anguelov, C. Szegedy, D. Erhan, and
A. Rabinovich. Training deep neural networks on noisy labels with bootstrapping. arXiv preprint arXiv:1412.6596,
2014. 2
[22] C. Sagonas, G. Tzimiropoulos, S. Zafeiriou, and M. Pantic.
A semi-automatic methodology for facial landmark annotation. In The IEEE Conference on CVPR Workshops, June
2013. 1, 2
[23] J. M. Saragih, S. Lucey, and J. F. Cohn. Deformable model
fitting by regularized landmark mean-shift. International
Journal of Computer Vision, 91(2):200–215, 2011. 1, 2
[24] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. arXiv preprint
arXiv:1409.1556, 2014. 4, 6
[25] H. Su, J. Deng, and L. Fei-Fei. Crowdsourcing annotations
for visual object detection. In Workshops at the Twenty-Sixth
AAAI Conference on Artificial Intelligence, 2012. 2
[26] S. Sukhbaatar and R. Fergus. Learning from noisy labels
with deep neural networks. arXiv preprint arXiv:1406.2080,
2(3):4, 2014. 2
[27] C. Szegedy, S. Ioffe, and V. Vanhoucke. Inception-v4,
inception-resnet and the impact of residual connections on
learning. arXiv preprint arXiv:1602.07261, 2016. 1, 2
[28] L. Taylor and G. Nitschke.
Improving deep learning using generic data augmentation.
arXiv preprint
arXiv:1708.06020, 2017. 2
[29] F. Tramèr, A. Kurakin, N. Papernot, D. Boneh, and P. McDaniel. Ensemble adversarial training: Attacks and defenses.
arXiv preprint arXiv:1705.07204, 2017. 2
[30] P. Upchurch, D. Sedra, A. Mullen, H. Hirsh, and K. Bala.
Interactive consensus agreement games for labeling images.
In Fourth AAAI Conference on Human Computation and
Crowdsourcing, 2016. 1, 2
[31] A. Vedaldi.
A MATLAB wrapper of SVMstruct .
http://www.vlfeat.org/˜vedaldi/code/
svm-struct-matlab, 2011. 6
[32] H. Wang, W. Xing, K. Asif, and B. Ziebart. Adversarial prediction games for multivariate losses. In Advances in Neural
Information Processing Systems, pages 2710–2718, 2015. 2,
5
[33] P. Welinder, S. Branson, P. Perona, and S. J. Belongie. The
multidimensional wisdom of crowds. In Advances in neural
information processing systems, pages 2424–2432, 2010. 1,
2
[34] T. Xiao, T. Xia, Y. Yang, C. Huang, and X. Wang. Learning from massive noisy labeled data for image classification.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 2691–2699, 2015. 2
[35] X. Zhu and D. Ramanan. Face detection, pose estimation,
and landmark localization in the wild. In CVPR, 2012 IEEE
Conference on, pages 2879–2886. IEEE, 2012. 1, 2
| 2cs.AI
|
arXiv:1703.07458v1 [math.GR] 21 Mar 2017
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
G. CHRISTOPHER HRUSKA AND HOANG THANH NGUYEN
Abstract. Let S # N be an immersed horizontal surface in a 3–
dimensional graph manifold. We show that the fundamental group of
the surface S is quadratically distorted whenever the surface is virtually embedded (i.e., separable) and is exponentially distorted when the
surface is not virtually embedded.
1. Introduction
In the study of 3–manifolds, much attention has focused on the distinction
between surfaces that lift to an embedding in a finite cover and those that
do not. A π1 –injective immersion S # N of a surface S into a 3–manifold
N is virtually embedded if (after applying a homotopy) the immersion lifts
to an embedding of S into a finite cover of N .
A major part of the solution of the virtual Haken conjecture is Agol’s theorem that every immersed surface in a closed hyperbolic 3–manifold is virtually embedded [Ago13]. In contrast, Rubinstein–Wang [RW98] constructed
non–virtually embedded surfaces g : S # N in many 3–dimensional graph
manifolds N . The examples of Rubinstein–Wang are horizontal in the sense
that in each Seifert component M of N , the intersection g(S) ∩ M is transverse to the Seifert fibration. Furthermore, they introduced a combinatorial
invariant of horizontal surfaces called the dilation and proved that dilation
is the obstruction to a surface being virtually embedded.
If G and H are groups with finite generating sets S and T , the distortion
of H in G is given by
∆G
h ∈ H and |h|S ≤ n .
H (n) = max |h|T
Distortion does not depend on the choice of finite generating sets S and
T (up to a natural equivalence relation). The purpose of this article is to
address the following question of Dani Wise:
Question 1.1. Given a 3–dimensional graph manifold N , which surfaces in
N have nontrivial distortion?
Question 1.1 arises naturally in the study of cubulations of 3–manifold
groups. The typical strategy for constructing an action of the fundamental
group on a CAT(0) cube complex is to find a suitable collection of immersed
Date: March 23, 2017.
2010 Mathematics Subject Classification. 57M50, 20F65, 20F67.
Key words and phrases. graph manifold, separable subgroup, distortion.
1
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
2
surfaces and then to consider the CAT(0) cube complex dual to that collection of surfaces (see for instance [Wis12]).
Whenever a group G acts properly and cocompactly on a CAT(0) cube
complex X, the stabilizer of each hyperplane must be an undistorted subgroup of G, since hyperplanes are convex. Hagen–Przytycki [HP15] show
that chargeless graph manifolds do act cocompactly on CAT(0) cube complexes. It is clear from their construction that many surfaces in graph manifolds are undistorted.
However the situation for horizontal surfaces turns out to be quite different. Our main result states that horizontal surfaces in graph manifolds
always have a nontrivial distortion, and this distortion is directly related to
virtual embedding in the following sense:
Theorem 1.2. Let S # N be a horizontal surface immersed in a graph
manifold N . The distortion of π1 (S) in π1 (N ) is quadratic if S is virtually
embedded, and exponential if S is not virtually embedded.
The main tool used in the proof of this theorem is a simple geometric
interpretation of Rubinstein–Wang’s dilation in terms of slopes of lines in
the JSJ planes of the universal cover.
We note that, throughout this paper, the term “graph manifold” specifically excludes two trivial cases: Seifert manifolds and Sol manifolds. By
Proposition 6.7 horizontal surfaces in Seifert manifolds are always undistorted. Distortion of surfaces in Sol manifolds is not addressed in this article.
Although Theorem 1.2 deals only with horizontal surfaces, understanding these is the key to a general understanding of all π1 –injective surfaces
in graph manifolds in the following sense. It was shown by Rubinstein–
Wang that in a graph manifold, every π1 –injective, properly immersed, orientable surface can be homotoped to a properly immersed surface g′ : S # N
such that for each Seifert component M each component of the intersection
g′ (S) ∩ M is either vertical (i.e., a union of fibers) or horizontal [RW98].
While vertical surfaces in Seifert components are easy to understand, most
complications appear to arise from the horizontal part of an immersed surface.
We note the following corollary about surfaces in 3–manifolds of mixed
type, i.e., those whose geometric decomposition contains at least one JSJ
torus and at least one hyperbolic component. (For clarity, we remind the
reader of our convention that Seifert manifolds are not considered to be
“graph manifolds.”)
Corollary 1.3. Let g : S # M be a π1 –injective immersed surface in a
mixed 3–manifold M . If π1 (S) is undistorted in π1 (M ), then the pieces of
S have the following simple form.
(1) For each hyperbolic block N of M , the components of g(S) ∩ N are
all geometrically finite.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
3
(2) For each maximal graph manifold block (or isolated Seifert component) N of M , the components of g(S)∩N correspond to undistorted
subgroups of π1 (N ).
In particular, the intersection of g(S) with a graph manifold component N
cannot be a horizontal surface.
Indeed, by [KL95, DS05] the group π1 (M ) is relatively hyperbolic with
respect to the fundmental groups of maximal graph manifold components,
isolated Seifert components, and isolated JSJ tori (see [BW13] for an elementary proof of this fact). Corollary 1.3 can now be deduced from this
relative hyperbolicity using results of [Hru10] as follows. The undistorted
subgroup π1 (S) is relatively quasiconvex. Since the hyperbolic blocks of M
are also relatively quasiconvex in M and the intersection of two relatively
quasiconvex subgroups is relatively quasiconvex [Hru10], we obtain assertion (1). On the other hand, assertion (2) follows immediately from [Hru10,
Theorem 1.4].
Hagen–Przytycki [HP15] and Tidmore [Tid] have shown that chargeless
graph manifolds and chargeless mixed manifolds act cocompactly on CAT(0)
cube complexes. The cubulations they construct are each dual to a family
of immersed surfaces, none of which is entirely horizontal. The following
corollary of Theorem 1.2 shows that in order to obtain a proper, cocompact
cubulation one is required to avoid horizontal surfaces. Thus, in a sense,
the cocompact cubulations of Hagen–Przytycki are canonical, and could not
have been constructed using different surfaces.
Corollary 1.4. Let G be the fundamental group of a graph manifold. Let
{H1 , . . . , Hk } be a collection of codimension–1 subgroups of G. Let X be
the corresponding dual CAT(0) cube complex. If at least one Hi is the fundamental group of a horizontal surface, then the action of G on X is not
proper and cocompact.
An analogous result could also be obtained in the setting of mixed manifolds using Corollary 1.3.
After seeing an early version of this paper, Hung Cong Tran discovered
an alternate proof of the quadratic distortion of certain horizontal surfaces
whose fundamental groups can also be regarded as Bestvina–Brady kernels.
This observation is part of a broader study by Tran of the distortion of
Bestvina–Brady kernels in right-angled Artin groups [Tra].
1.1. Connections to previous work. In [Woo16], Woodhouse exploited
strong parallels between graph manifolds and tubular spaces to study actions of tubular groups on CAT(0) cube complexes. In the tubular setting,
immersed hyperplanes play the role of immersed surfaces in graph manifolds
Woodhouse extended the Rubinstein–Wang theory of dilation and found a
connection between dilation and distortion. In particular, he proves that
if an immersed hyperplane in a tubular group has nontrivial dilation then
its distortion is at least quadratic. Inspired by Woodhouse’s work, we use
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
4
analogous techniques in the cleaner geometric setting of graph manifolds to
obtain Theorem 1.2.
We remark that the main proof of Theorem 1.2 in Sections 5 and 6 includes both virtually embedded and non–virtually embedded surfaces in a
unified treatment that prominently uses a simple geometric interpretation
of dilation in terms of “slopes of lines” in the Euclidean geometry of JSJ
planes. This interpretation was inspired by Woodhouse’s earlier work on
tubular groups. It seems likely that the main proofs here could be translated back to the tubular setting, where they may lead to new advances in
that setting as well.
However there is an alternate (shorter) proof of the quadratic distortion
of virtually embedded horizontal surfaces using the following result, which
combines work of Gersten and Kapovich–Leeb. This alternate approach,
while more direct, does not give any information about the structure of
non–virtually embedded surfaces.
Theorem 1.5 (Gersten, Kapovich–Leeb). Let N be a graph manifold that
fibers over the circle with fiber surface S. Then π1 (S) is quadratically distorted in π1 (N ).
Kapovich–Leeb implicitly use the quadratic upper bound (without stating
it explicitly) in [KL95], where they attribute it to Gersten [Ger94]. The quadratic lower bound also follows easily from results of Gersten and Kapovich–
Leeb [Ger94, KL95], but was not specifically mentioned by them. The discussion of Theorem 1.5 in [KL95] and its precise derivation from [Ger94] is
brief and was not the main purpose of either article. For the benefit of the
reader we have included a more detailed exposition of Kapovich–Leeb’s elegant proof of Theorem 1.5 in Section 7, which relies on Thurston’s geometric
classification of 3–manifolds that fiber over the circle.
The virtually embedded case of Theorem 1.2 can be derived as a corollary
of Theorem 1.5 as follows. If a horizontal surface g : S # N is virtually
embedded then there exist finite covers Ŝ → S and N̂ → N such that N̂
is an Ŝ–bundle over S 1 (see for instance [WY97]). By Theorem 1.5, the
distortion of π1 (Ŝ) in π1 (N̂ ) is quadratic. Distortion is unchanged when
passing to subgroups of finite index, so the distortion of π1 (S) in π1 (N ) is
also quadratic.
1.2. Overview. In Section 2 we review some concepts in geometric group
theory. In Section 3 we give several lemmas about curves on hyperbolic
surfaces that will be used in Section 5. Section 4 is a review background
about graph manifolds and horizontal surfaces. A convenient metric on a
graph manifold that will use in this paper will be discussed.
In Section 5 we prove the distortion of a horizontal surface in a graph
manifold is at least quadratic. We also show that if the horizontal surface
is not virtually embedded then the distortion is at least exponential. The
strategy in this proof was inspired by the work of Woodhouse (see Section 6
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
5
in [Woo16]). In Section 6 we prove that distortion of a horizontal surface
in a graph manifold is at most exponential. Furthermore, if the horizontal
surface is virtually embedded then the distortion is at most quadratic.
Section 7 contains a detailed exposition of the proof of Theorem 1.5.
1.3. Acknowledgments. The authors benefited from conversations with
Daniel Woodhouse about the connection between distortion and dilation
in the setting of tubular groups. The authors are grateful to Hung Cong
Tran for suggesting the possibility of a connection between the virtually
embedded case of Theorem 1.2 and the earlier work of Gersten on quadratic
divergence.
The first author wishes to thank Noel Brady for many conversations about
distortion of subgroups and divergence of 3–manifold groups. In particular
the present article would not exist without the influence of Noel Brady’s
courses on geometric group theory when the first author was a graduate
student. The first author also thanks Dani Wise for many discussions about
distortion and cubulating graph manifolds, which motivated the work in this
paper, and Becca Winarski for discussions about curves and surfaces. The
second author would like to thank Joseph Tidmore for useful discussions
about graph manifolds, and Boris Okun for useful comments.
This work was partially supported by a grant from the Simons Foundation
(#318815 to G. Christopher Hruska).
2. Preliminaries
In this section, we review some concepts in geometric group theory: quasi–
isometry, distortion of a subgroup and the notions of domination and equivalence.
Definition 2.1. Let (X, d) be a metric space. A path γ : [a, b] → X is a
geodesic if d(γ(s), γ(t)) = |s − t| for all s, t ∈ [a, b]. A simple loop f : S 1 → X
is a geodesic loop if f is an isometric embedding with respect to some length
metric on S 1 .
Definition 2.2 (quasi-isometry). Let (X1 , d1 ) and (X2 , d2 ) be metric spaces.
A (not necessarily continuous) map f : X1 → X2 is an (L, C)–quasi-isometric
embedding if there exist constants L ≥ 1 and C ≥ 0 such that for all
x, y ∈ X1 we have
1
d1 (x, y) − C ≤ d2 f (x), f (y) ≤ L d1 (x, y) + C.
L
If, in addition, there exits a constant D ≥ 0 such that every point of X2 lies
in the D–neighborhood of the image of f , then f is an (L, C)–quasi-isometry.
When such a map exists, X1 and X2 are quasi-isometric.
Let (X, d) be a metric space, and γ a path in X. We denote the length
of γ by |γ|.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
6
Definition 2.3 (quasigeodesic). A path γ in a metric space (X, d) is an
(L, C)–quasigeodesic with respect to constants L ≥ 1 and C ≥ 0 if |γ[x,y] | ≤
L d(x, y) + C for all x, y ∈ γ. A quasigeodesic is a path that is (L, C)–
quasigeodesic for some L and C.
Definition 2.4. A geodesic space (X, d) is δ–hyperbolic if every geodesic
triangle with vertices in X is δ–thin in the sense that each side lies in the
δ–neighborhood of the union of the other two sides.
Definition 2.5 (deviation). Let (X, d) be a geodesic space and c ≥ 0 be a
fixed number. Consider a pair of geodesic segments [x, y] and [z, t] such that
d(y, z) ≤ c. The c–deviation of [x, y] and [z, t], denoted devc [x, y], [z, t] , is
the quantity
sup max{d(u, y), d(v, z)} u ∈ [x, y],v ∈ [z, t],d(u, v) ≤ c .
The following theorem gives a criterion for determining that a piecewise
geodesic in a δ–hyperbolic space is a quasigeodesic. The proof, which is very
similar to the proof of Lemma 19 of [GH90, Chapter 5], is left as an exercise
to the reader.
Theorem 2.6. Let (X, d) be a δ–hyperbolic space. For any κ ≥ 0 and
D ≥ 0, there exist constants L = L(δ, κ, D), and C = C(δ, κ, D) such that
the following holds: Suppose a piecewise geodesic
c = [x1 , x2 ] ∪ [x2 , x3 ] ∪ · · · ∪ [x2m−1 , x2m ]
satisfies
(1) d(x2i , x2i+1 ) ≤ κ
(2) d(x2i−1 , x2i ) ≥ 11κ + 25δ + 2D,
and
(3) devQ [x2i−1 , x2i ], [x2i+1 , x2i+2 ] ≤ D, where Q = 4δ + κ.
Then c is an (L, C)–quasigeodesic.
Definition 2.7. Let f, g be functions from positive reals to positive reals.
The function f is dominated by g, denoted f g, if there are positive
constants A, B, C, D and E such that
f (x) ≤ A g(Bx + C) + Dx + E
for all x.
The functions f and g are equivalent, denoted f ∼ g, if f g and g f .
The relation is an equivalence relation. Polynomial functions with
degree at least one are equivalent if and only if they have the same degree.
Furthermore, all exponential functions are equivalent.
Definition 2.8 (Subgroup distortion). Let H ≤ G be a pair of groups with
finite generating sets T and S respectively. The distortion of (H, T ) in
(G, S) is the function
∆G
h ∈ H and |h|S ≤ n
H (n) = max |h|T
Up to equivalence, the function ∆G
H does not depend on the choice of finite
generating sets S and A.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
7
Let H ≤ G be a pair of finitely generated groups. We say that the distortion ∆G
H is at least quadratic [exponential] if it dominates a quadratic
polynomial [exponential function]. The distortion ∆G
H is at most quadratic
[exponential] if it is dominated by a quadratic polynomial [exponential function].
The following proposition is routine, and we leave the proof as an exercise
for the reader.
Proposition 2.9. Let G, H, K be finitely generated groups with K ≤ H ≤
G.
G
(1) If H is a finite index subgroup of G then ∆H
K ∼ ∆K .
G
(2) If K is a finite index subgroup of H then ∆G
K ∼ ∆H .
It is well known that a group acting properly, cocompactly, and isometrically on a geodesic space is quasi-isometric to the space. The following
corollary of this fact allows us to compute distortion using the geometries
of spaces in place of word metrics.
Corollary 2.10. Let X and Y be compact geodesic spaces, and let g : (Y, y0 ) →
(X, x0 ) be π1 –injective. We lift the metrics on X and Y to geodesic metrics on the universal
covers X̃ and Ỹ respectively. Let G = π1 (X, x0 ) and
H = g∗ π1 (Y, y0 ) . Then the distortion ∆G
H is equivalent to the function
f (n) = max dỸ (ỹ0 , h(ỹ0 )) h ∈ H and dX̃ (x̃0 , h(x̃0 )) ≤ n .
3. Curves in hyperbolic surfaces
In this section, we will give some results about curves on surfaces that
will play an essential role in the proof of Theorem 5.1.
Definition 3.1 (Multicurves). A closed curve in a surface S is essential if it
is not freely homotopic to a point or a boundary component. A multicurve
in S is a finite collection of disjoint, essential simple closed curves such that
no two are freely homotopic. If S has a metric, a multicurve is geodesic if
each member of the family is a geodesic loop.
Lemma 3.2. Let S be a compact surface with negative Euler characteristic.
Let C be a multicurve in S. Let L be the family of lines that are lifts of
loops of C or boundary loops of S. Equip S with any length metric dS . Let
d be the induced metric on the universal cover S̃. For any r > 0 there exists
D = D(r) < ∞ such that for any two disjoint lines ℓ1 and ℓ2 of L we have
diam Nr (ℓ1 ) ∩ Nr (ℓ2 ) ≤ D
Proof. Since H = π1 (S) acts cocompactly on the universal cover S̃, there
exists a closed ball B(x0 , R) whose H–translates cover S̃. Note that L
is locally finite in the sense that only finitely many lines of L intersect the
closed ball B = B(x0 , R+2r). Since distinct lines of L are not parallel, there
exists a finite upper bound D = D(r) on the diameter of the intersection
Nr (ℓ) ∩ Nr (ℓ′ ) for all lines ℓ 6= ℓ′ ∈ L that intersect B.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
8
Consider ℓ1 6= ℓ2 ∈ L. If d(ℓ1 , ℓ2 ) ≥ 2r then their r–neighborhoods have
empty intersection, and the result is vacuously true. Thus it suffices to
assume that d(ℓ1 , ℓ2 ) < 2r. By cocompactness, there exists h ∈ H so that
h(ℓ1 ) intersects B(x0 , R). But then h(ℓ1 ) and h(ℓ2 ) both intersect B, so that
diam Nr (ℓ1 ) ∩ Nr (ℓ2 ) ≤ D,
as desired.
Lemma 3.3. Let S be a compact hyperbolic surface with totally geodesic
(possibly empty) boundary, and let C be a nonempty geodesic multicurve.
Then there exists a geodesic loop γ in S such that γ and C have nonempty
intersection.
Proof. Choose any loop c ∈ C. Cutting S along c produces a surface each of
whose components has negative Euler characteristic since each of its components is a union of blocks of S joined along circles. For any such simple
closed curve c in a compact surface S, we claim that there exists another
closed curve γ whose geometric intersection number with c is nonzero. We
leave the proof of this claim as an easy exercise for the reader (using, for
example, the techniques in Sections 1.2.4 and 1.3 of [FM12]). After applying
a homotopy, we can assume that γ is a geodesic loop.
Lemma 3.4. Let S be a compact hyperbolic surface with totally geodesic
(possibly empty) boundary, and let C be a nonempty geodesic multicurve.
Let L be the family of lines that are lifts of loops of C or boundary loops of
S. For any κ > 0, there exist numbers µ, L, and C such that the following
holds.
Consider a piecewise geodesic c = α1 β1 · · · αn βn in the universal cover S̃.
Suppose each segment αj is contained in a line of L, and each segment βj
meets the lines of L only at its endpoints. If |βj | ≤ κ and |αj | ≥ µ for all j,
then c is an (L, C)–quasigeodesic.
Proof. In order to show that the piecewise geodesic c in the δ–hyperbolic
space S̃ is uniformly quasigeodesic, we will show that there exists a constant
D such that whenever µ is sufficiently large, c satisfies the hypotheses of
Theorem 2.6. Thus c is (L, C)–quasigeodesic for constants L and C not
depending on c.
Let Q = 4δ + κ. Let D = D(Q) be the constant given by applying
Lemma 3.2 to the hyperbolic surface S and the multicurve C. Let L =
L(δ, κ, D) and C = C(δ, κ, D) be the constants given by Theorem 2.6. We
define µ = 11κ + 25δ + 2D. It follows that c satisfies Conditions (1) and (2)
of Theorem 2.6.
In order to to
verify Condition (3) of Theorem 2.6, we need to show that
devQ αj , αj+1 ≤ D. Let u ∈ αj and v ∈ αj+1 such that d(u, v) ≤ Q. Let
u′ andv ′ be the initial and terminal points of βj . We need to show that
d u, u′ ≤ D and d v, v ′ ≤ D. It is easy to see the elements u, v, u′ , and
v ′ belong to NQ αj ∩ NQ αj+1 because |βj | ≤ κ ≤ Q. We have αj+1 and
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
9
αj do not belong to the same line of L because any two distinct geodesics
in S̃ intersect at most one point. Hence
diam NQ (αj ) ∩ NQ (αj+1 ) ≤ D
by Lemma 3.2. It follows that d u, u′ ≤ D and d v, v ′ ≤ D. It follows
immediately from the definition of the deviation that devQ αj , αj+1 ≤
D.
4. Graph manifolds and horizontal surfaces
In this section, we review background about graph manifolds and horizontal surfaces. In addition, we discuss a convenient metric for a graph
manifold that will be used in next sections. We refer the reader to [RW98],
[BS04] and [KL98] for more details.
Definition 4.1. A graph manifold is a compact, irreducible, connected,
orientable 3-manifold N that can be decomposed along embedded incompressible tori T into finitely many Seifert manifolds. We specifically exclude
Sol and Seifert manifolds from the class of graph manifolds. Up to isotopy,
each graph manifold has a unique minimal collection of tori T as above
[JS79, Joh79]. This minimal collection is the JSJ decomposition of N , and
each torus of T is a JSJ torus.
Throughout this paper, a graph consists of a set V of vertices and a set of
E of edges, each edge being associated to an unordered pair of vertices by a
function ends : ends(e) = {v, v ′ } where v, v ′ ∈ V. In this case we call v and
v ′ the endpoints of the edge e and we also say v and v ′ are adjacent.
Definition 4.2. A simple graph manifold N is a graph manifold with the
following properties:
(1) Each Seifert component is a trivial circle bundle over an orientable
surface of genus at least 2.
(2) The intersection numbers of fibers of adjacent Seifert components
have absolute value 1.
Theorem 4.3 ([KL98]). Any graph manifold N has a finite cover N̂ that
is a simple graph manifold.
Definition 4.4. Let M be a Seifert manifold with boundary. A horizontal
surface in M is an immersion g : B # M where B is a compact surface with
boundary such that the image g(B) is transverse to the Seifert fibration.
We also require that g is properly immersed, ie, g(B) ∩ ∂M = g(∂B).
A horizontal surface in a graph manifold N is a properly immersed surface
g : S # N such that for each Seifert component M , the intersection g(S)∩M
is a horizontal surface in M . A horizontal surface g in a graph manifold N
is always π1 –injective and lifts to an embedding
of S in the cover of N
corresponding to the subgroup g∗ π1 (S) by [RW98]. Consequently, g also
lifts to an embedding S̃ → Ñ of universal covers.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
10
Definition 4.5. A horizontal surface g : S # N in a graph manifold N is
virtually embedded if g lifts to an embedding of S in some finite cover of N .
By a theorem
of Scott [Sco78], a horizontal surface is virtually embedded if
g∗ π1 (S) is a separable subgroup of π1 (N ), i.e., it is equal to an intersection
of finite index subgroups. Przytycki–Wise have shown that the converse
holds as well [PW14].
The following result about separability allows one to pass to finite covers
in the study of horizontal surfaces, as explained in Corollary 4.7.
Proposition 4.6 ([Sco78], Lemma 1.1). Let G0 be a finite index subgroup
of G. A subgroup H ≤ G is separable in G if and only if H ∩ G0 is separable
in G0 .
Corollary 4.7. Let q : (N̂ , x̂0 ) → (N, x0 ) be a finite covering of graph manifolds. Let g : (S, s0 ) # (N, x0 ) be a horizontal surface. Let p : (Ŝ, ŝ0 ) →
(S, s0 ) be the finite cover corresponding to the subgroup g∗−1 q∗ π1 (N̂ , x̂0 ).
Then g lifts to a horizontal surface ĝ : (Ŝ, ŝ0 ) → (N̂ , x̂0 ). Furthermore g
is a virtual embedding if and only if ĝ is a virtual embedding.
Definition 4.8. Suppose g : S # N is a horizontal surface in a graph
manifold N with JSJ decomposition T . Let Tg denote the collection of
components of g−1 (T ) in S. After applying a homotopy to g, we may
assume that the image g(c) of each curve c ∈ Tg is a multiple of a simple
closed curve on the corresponding JSJ torus. The connected components of
the splitting S|g −1 (T ) are the blocks B of S.
Remark 4.9. If g : S # N is a horizontal surface then Tg is always nonempty.
Indeed, g(S) has nonempty intersection with each JSJ torus of N because
a properly immersed horizontal surface in a connected graph manifold must
intersect every fiber of every Seifert component (see Lemma 6.3 for details).
In [RW98], Rubinstein–Wang introduced the dilation of a horizontal surface, and proved that dilation is the obstruction to a surface being virtually
embedded (see Theorem 4.11).
Definition 4.10 (Dilation). Let g : (S, s0 ) # (N, x0 ) be a horizontal surface
in a simple graph manifold N . Choose an orientation for the graph manifold
N , an orientation for the fiber of each Seifert component, and an orientation
for each curve c ∈ Tg .
The dilation of a horizontal surface S in N is a homomorphism w : π1 (S, s0 ) →
∗
Q+ defined as follows. Choose [γ] ∈ π1 (S, s0 ) such that γ is transverse to Tg .
In the trivial case that γ is disjoint from the curves of the collection Tg , we
set w(γ) = 1. Let us assume now that this intersection is nonempty. Then
Tg subdivides γ into a concatenation γ1 · · · γm with the following properties.
Each path γi starts on a circle ci ∈ Tg and ends on the circle ci+1 . The
image g(γi ) of this path in N lies in a Seifert component Mi . The image of
the circle g(ci ) in N lies in a JSJ torus Ti obtained by gluing a boundary
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
11
←
−
→
−
←
−
→
−
torus Ti of Mi−1 to a boundary torus Ti of Mi . Let fi and fi be fibers of
←
−
→
−
Mi−1 and Mi in the torus Ti . By Definition 4.2, the 1–cycles [ fi ] and [ fi ]
generate the integral homology group H1 (Ti ) ∼
= Z2 , so there exist integers
ai and bi such that
←
−
→
−
g(ci ) = ai [ fi ] + bi [ fi ] in H1 (Ti ).
Since the immersion is horizontal, these coefficients
ai and bi must be nonzero.
Q
b
/a
The dilation w(γ) is the rational number m
i
i . Note that w(γ) dei=1
pends only on the homotopy class of γ, since crossings of γ with a curve
c ∈ Tg in opposite directions contribute terms to the dilation that cancel
each other. For the rest of this paper we write wγ instead of w(γ).
The following result is a special case of [RW98, Theorem 2.3].
Theorem 4.11. A horizontal surface g : S # N in a simple graph manifold
is virtually embedded if and only if the dilation w is the trivial homomorphism.
Remark 4.12. Let g : S # N be a horizontal surface in a simple graph manifold M , then each block B is a connected surface with non-empty boundary
and negative Euler characteristic. Indeed, the immersion g : S # N maps
B to the corresponding Seifert component M with base surface F . The
composition of g|B with the projection of M to F yields a finite covering
map from B to F . Since χ(F ) < 0, it follows that χ(B) < 0 as well.
We note that the collection Tg is always a non-empty multicurve. Indeed,
Tg is nonempty by Remark 4.9. Since the blocks of S have negative Euler
characteristic, it follows that Tg is a multicurve.
Remark 4.13. We now are going to describe a convenient metric on a
simple graph manifold N introduced by Kapovich–Leeb [KL98]. For each
Seifert component Mi = Fi × S 1 of N , we choose a hyperbolic metric on
the base surface Fi so that all boundary components are totally geodesic
of unit length, and then equip each Seifert component Mi = Fi × S 1 with
the product metric di such that the fibers have length one. Metrics di on
Mi induce the product metrics on M̃i which by abuse of notations is also
denoted by di .
Let Mi and Mj be adjacent Seifert components in the simple graph manifold N , and let T ⊂ Mi ∩ Mj be a JSJ torus. Each metric space (T̃ , di )
and (T̃ , dj ) is a Euclidean plane. After applying a homotopy to the gluing
map, we may assume that at each JSJ torus T , the gluing map φ from the
←
−
→
−
boundary torus T ⊂ Mi to the boundary torus T ⊂ Mj is affine in the
sense that the identity map (T̃ , di ) → (T̃ , dj ) is affine. We now have a product metric on each Seifert component Mi = Fi × S 1 . These metrics may
not agree on the JSJ tori but the gluing maps are bilipschitz (since they
are affine). The product metrics on the Seifert components induce a length
metric on the graph manifold N denoted by d (see Section 3.1 of [BBI01]
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
12
for details). Moreover, there exists a positive constant K such that on each
Seifert component Mi = Fi × S 1 we have
1
di (x, y) ≤ d(x, y) ≤ K di (x, y)
K
for all x and y in Mi . (See Lemma 1.8 of [Pau05] for a detailed proof of the
last claim.) Metric d on N induces metric on Ñ , which is also denoted by
d (by abuse of notations). Then for all x and y in M̃i we have
1
di (x, y) ≤ d(x, y) ≤ K di (x, y)
K
The following remark introduces certain invariants of a horizontal surface
g that will be used in the proof of Theorem 6.1.
Remark 4.14.
(1) Since N is compact, there exists a positive lower bound ρ for the
distance between any two distinct JSJ planes in Ñ .
(2) We recall that for each curve ci in Tg , there exist non-zero integers
ai and bi such that
←
−
→
−
g(ci ) = ai [ fi ] + bi [ fi ] in H1 (Ti ).
The governor of a horizontal surface
g : S # N in a graph manifold
is the quantity ǫ = ǫ(g) = max ai /bi , bi /ai ci ∈ Tg .
Proposition 4.15. For each [γ] ∈ π1 (S, s0 ) as in Definition 4.10, we define
Λγ = max
k
Y
bi /ai
1≤j≤k≤m
i=j
If the horizontal surface g is a virtual embedding, then there exists a positive
constant Λ such that Λγ ≤ Λ for all [γ] ∈ π1 (S, s0 ).
Proof. Let Γg be the graph dual to Tg . Since the graph Γg is finite, it follows
that the set of non backtracking paths in Γg is finite. We denote this set
by {β1 , · · · , βm }. Let ni be the number of edges in βi with i = 1, . . . , m,
and let n = max ni i = 1, . . . , m . Let ǫ = ǫ(g) be the governor of the
horizontal surface g and let Λ = ǫn . Since the horizontal surface g is virtually
embedded, it follows that the dilation function is trivial by Theorem 4.11.
In other words, every loop α in S based at s0 has the dilation wα = 1.
Therefore, it follows that Λγ ≤ ǫn = Λ.
Remark 4.16. Let g : S # N be a horizontal surface in a simple graph
manifold. Equip N with the metric d described in Remark 4.13. By [Neu01,
Lemma 3.1] the surface g can be homotoped to another horizontal surface
g′ : S # N such that the following holds: For each curve c in g ′−1 (T ), let T
be the JSJ torus in N such that g′ (c) ⊂ T . Then g′ (c) is straight in T in the
sense that lifts of g′ (c) to Ñ are straight lines in the JSJ planes containing
it.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
13
Remark 4.17. Let f : S 1 # T = S 1 × S 1 be a horizontal immersion. Then
every fiber {x} × S 1 in the torus T has non-empty intersection with f (S 1 ).
Indeed, this follows from the fact the composition of f with the natural
projection of T to the first factor S 1 is a finite covering map.
5. A lower bound for distortion
The main theorem in this section is the following.
Theorem 5.1. Let g : (S, s0 ) # (N, x0 ) be a horizontal surface in a graph
manifold M . Let G = π1 (N, x0 ) and H = g∗ (π1 (S, s0 )). Then the distortion
∆G
H is at least quadratic. Furthermore, if the horizontal surface g is not
virtually embedded, then the distortion ∆G
H is at least exponential.
To see the proof of Theorem 5.1, we need several lemmas. For the rest of
this section we fix a horizontal surface g : S # N in a simple graph manifold
N . We equip N with the metric d described in Remark 4.13 and equip S
with a hyperbolic metric dS such that the boundary (if nonempty) is totally
geodesic and the simple closed curves of Tg are geodesics.
Lemma 5.2. Let γ be any geodesic loop in S such that γ and Tg have
nonempty intersection and such that wγ ≥ 1. There exists a positive number
A = A(γ) such that for all µ > 0 the following holds: Let {c1 , . . . , cm } be the
sequence of curves of Tg crossed by γ. The image of the circle g(ci ) in M
lies in a JSJ torus Ti . For each i = 1, 2, . . . , m, let ai and bi be the integers
such that
←
−
→
−
g(ci ) = ai [ fi ] + bi [ fi ] in H1 (Ti ; Z).
Extend the sequence a1 , . . . , am to a periodic sequence {aj }∞
j=1 with aj+m =
aj for all j > 0, and similarly extend b1 , . . . , bm to an m–periodic sequence
∞
{bj }∞
j=1 . Then there exists a (nonperiodic) sequence of integers t(j) j=1 ,
depending on our choice of the constant µ and the loop γ, with the following
properties:
(1) t(j) ≥ µ for all j.
(2) t(j) aj + t(j − 1) bj−1 ≤ A for all j > 1.
P
2
n
(3) The partial sum f (n) = nm
j=1 t(j) satisfies f (n) n + wγ .
Qm
Proof. By the definition
of the dilation function, we have wγ =
i=1 bi /ai .
Let A = max 1 + |ai | i = 1, 2, . . . , m . Set ξ = min |1/aj | , and
choose λ ∈ (0, 1] so that λ ≤ bj−1 /aj for all j > 1. Starting from an initial
value t(1) ≥ µ/λm−1 , we recursively construct an infinite sequence t(j)
satisfying (2). Suppose that t(j − 1) has been defined for some j > 1, and
we wish to define t(j). As A ≥ 1 + |aj |, we have
1≤
A + t(j − 1) bj−1
1 + t(j − 1) bj−1
A−1
=
−
.
|aj |
|aj |
|aj |
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
14
It follows that there is an integer t(j) such that
A + t(j − 1) bj−1
1 + t(j − 1) bj−1
≤ |t(j)| ≤
,
|aj |
|aj |
(♣)
which is equivalent to
1 ≤ t(j) aj − t(j − 1) bj−1 ≤ A.
Furthermore, we are free to choose the sign of t(j) so that t(j) aj and
t(j − 1) bj−1 have
opposite signs, which immediately gives (2). By induction,
the sequence t(j) satisfies both (♣)
and (2) for all j > 1.
We next show that any sequence t(j) satisfying (♣) also satisfies (3).
Indeed, the first inequality of (♣) implies
(♦)
t(j) ≥
bj−1
1
+
|aj |
aj
t(j − 1) ≥
bj−1
aj
t(j − 1)
for all j > 1.
For any j >
m, we apply (♦) iteratively m times (and use that the sequences
aj and bj are m–periodic) to get
bj−1
1
t(j − 1)
+
|aj |
aj
bj−1 bj−2
1
≥
t(j − 2) ≥ · · ·
+
|aj |
aj aj−1
b1 · · · bm
1
t(j − m)
+
≥
|aj |
a1 · · · am
t(j) ≥
(♥)
≥ ξ + wγ t(j − m) .
Further applying (♥) iteratively k times (and using that wγ ≥ 1) gives
t(j) ≥ ξ + wγ t(j − m)
≥ ξ + wγ ξ + wγ t(j − 2m)
(♠)
≥ 2ξ + wγ2 t(j − 2m) ≥ · · ·
≥ ξk + wγk t(j − km)
for all j > km
The inequality (♠) can be rewritten in the form
t(km + 1) ≥ ξk + t(1) wγk
for all k > 0.
Finally for each positive n we observe that
nm
X
j=1
t(j) ≥
n−1
X
k=1
t(km + 1) ≥ ξ
n−1
X
k=1
k + t(1)
n−1
X
wγk
k=1
which implies (3) as desired.
In order to establish (1), recall that γ satisfies wγ ≥ 1. Therefore (♥)
implies that t(j) ≥ |t(j −m)| for any j > m. In particular, it follows that
the terms of the sequence t(j) have absolute value bounded below by the
absolute values of the first m terms: t(1), . . . , t(m).
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
15
Using our choice of t(1) ≥ µ/λm−1 and the fact λ ≤ bj−1 /aj , the inequality (♦) shows that for all i = 1, . . . , m we have
µ
t(i) ≥ λi−1 t(1) ≥ m−i .
λ
As λ ≤ 1, we conclude that t(i) ≥ µ, completing the proof of (1).
Definition 5.3 (spirals). Let γ be a closed curve in S satisfying the conclusion of Lemma 3.3. Let {c1 , . . . , cm } be the sequence of curves of C crossed
by γ. Let {γ1 , . . . , γm } be the sequence of subpaths of γ introduced in Definition 4.10. Extend the finite sequences of curves c1 , . . . , cm and γ1 , . . . , γm to
∞
m–periodic infinite sequences {cj }∞
j=1 and {γj }j=1 . Let t(j) be a sequence
t(j)
of integers. We denote αj = cj .
Choose the basepoint s0 ∈ S to be a point of intersection between γ and
one of the curves of the family C. For each n ∈ N, we define a spiral loop
σn in S based at s0 as a concatenation:
σn = α1 γ1 · · · αnm γnm
and a double spiral loop ρn of σn in S based at s0 as ρn = σn α′nm+1 σn−1
t(1)
where α′nm+1 = cnm+1 .
∞
Lemma 5.4. Let t(j) j=1 be the sequence of integers given by Lemma 5.2.
Let ρn be the double spiral loop of σn coresponding to the curve γ and the
sequence t(j) . Let ρ̃n be the lift of ρn in S̃. Then the distance in Ñ
between the endpoints of g̃(ρ˜n ) is bounded above by a linear function of n.
Proof. First we describe informally the idea of the proof, which is illustrated
in Figure 1. The lift σ̃n of σn is the spiral-shaped curve running around the
outside of the left-hand diagram. The path σ̃n alternates between long
segments α̃j belonging to JSJ planes and short segments γ̃j belonging to
Seifert components. Each long segment α̃j is one side of a large triangle
in the JSJ plane whose other two sides are fibers of the adjacent blocks,
which meet in a corner yj opposite to α̃j . Connecting each pair of adjacent
corners yj produces a thin trapezoid that interpolates betweentwo adjacent
JSJ triangles. We will see that the sequence of exponents t(j)} in the
construction of σ̃n was chosen carefully to ensure that the distances between
adjacent corners yj are all short, i.e., bounded above. Thus the path running
around the inside of the spiral has at most a linear length—except for its
last segment, which is a long side of a large JSJ triangle. The double spiral
gives rise to a diagram similar to the spiral diagram, expect that it has
been doubled along this long triangular side, so that the long side no longer
appears on the boundary of the diagram but rather appears in its interior
(see Figure 2).
To be more precise, let Mj be the Seifert component of N containing γj ,
with its given product metric as a hyperbolic surface crossed with a circle
of length one. Let (M̃j , dj ) be the Seifert component of Ñ that contains
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
16
xj
α̃j
zj
γ̃j
xj+1
yj
α̃j+1
yj+1
zj+1
Figure 1. On the left, the piecewise geodesic σ̃n is the
spiral-shaped path running around the outside of the diagram. On the right is a magnified portion of the left-hand
picture showing more detail.
γ̃j , with the product metric dj induced by lifting the given metric on Mj .
Let T̃j be the JSJ plane containing α̃j . Recall that T̃j is a topological plane
that is a subspace of both M̃j−1 and M̃j . However the metrics dj−1 and
dj typically do not agree on the common subspace T̃j . Each metric space
←
−
−
→
Ej = (T̃j , dj−1 ) and Ej = (T̃j , dj ) is a Euclidean plane and the identity map
←
−
−
→
Ej → Ej is affine.
The plane T̃j universally covers a JSJ torus Tj obtained by identifying
←
−
→
−
boundary tori Tj and Tj of Seifert components Mj−1 and Mj . The initial
and terminal points xj and zj of α̃j are contained in Euclidean geodesics
←
− ←
→ −
−
←
− ←
→ −
−
−
→
−
→
ℓj ⊂ Ej and ℓj ⊂ Ej that project to fibers fj ⊂ Tj and fj ⊂ Tj respectively.
←
−
→
−
The lines ℓj and ℓj intersect in a unique point yj . Similarly, we consider
the subpath α̃−1
j in the double spiral ρ̃n . Let y j be the intersection point of
the two fibers that contain its endpoints.
Our goal is to find a linear upper bound for the distance in (N, d) between
the endpoints of ρ̃n . By the triangle inequality it suffices to produce an
upper bound for the distance between successive points of the linear sequence
y1 , . . . , ynm , y nm , . . . , y 1 . Recall that the inclusions (M̃j , dj ) → (Ñ , d) are
K–bilipschitz for some universal constant K, as explained in Remark 4.13.
Thus it is enough to bound the distance between these points with respect
to the given product metrics on each Seifert component.
Let η be the maximum of lengths of γ̃j with respect to metric dj . Let A
be the constant given by Lemma 5.2. We claim that
(⋆)
dj (yj , yj+1 ) ≤ η + A.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
17
Figure 2. The outer path represents the piecewise geodesic ρ̃n .
We prove this claim by examining the quadrilateral with vertices yj , zj , xj+1 ,
and yj+1 , illustrated on the right-hand side of Figure 1. This quadrilateral
is a trapezoid in the sense that the opposite sides [yj , zj ] and [yj+1 , xj+1 ] lie
in fibers of M̃j that are parallel lines in the product metric dj .
To find the lengths of these parallel sides, we must first examine the JSJ
triangle ∆(xj , yj , zj ), also shown on the right-hand side of Figure 1. We
consider this triangle to be a pair of homotopic paths α̃j and τj from xj to
←
−
yj in the plane T̃j , where τj = [xj , yj ]∪[yj , zj ] is a segment of ℓj concatenated
→
−
with a segment of ℓj . In particular, α̃j and τj project to homotopic loops
←
−
→
−
in Tj of the form g(αj ) and ( fj )rj ( fj )sj for some rj , sj ∈ Z. Recall that the
←
−
→
−
fiber fj has length one in the product metric on Mj−1 . Similarly the fiber fj
has length one in Mj . It follows that dj−1 (xj , yj ) = |rj | and dj (yj , zj ) = |sj |.
Since g(αj ) = g(cj )t(j) , the homology relation (written additively)
←
−
→
−
t(j) g(cj ) = t(j) aj [ fj ] + t(j) bj [ fj ] in H1 (Tj ; Z) ≈ π1 (Tj ),
implies that rj = t(j) aj and sj = t(j) bj .
Let βj be the lift of γj based at yj . The fiber which contains yj+1 and
xj+1 will intersect βj exactly at one point. We denote this point by uj . It
follows that dj (uj , yj ) ≤ η and dj (uj , yj+1 ) = t(j + 1) aj+1 + t(j) bj . Using
the triangle inequality for ∆(yj , uj , yj+1 ), we have
dj (yj , yj+1 ) ≤ dj (yj , uj ) + dj (uj , yj+1 )
≤ η + t(j + 1) aj+1 + t(j) bj
≤η+A
by Lemma 5.2(2), completing the proof of (⋆).
For a similar reason, the distance in the corresponding Seifert component
between y j and y j−1 is at most η + A. Thus it suffices to find an upper
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
18
bound for dnm (ynm , y nm ). Let R be the length of c̃1 in the metric dnm . Let
t(1)
′
z nm be the initial point of α̃−1
nm . Since αnm = cnm+1 , the dnm –distance between the endpoints of α̃′nm+1 is at most R t(1) . By the triangle inequality,
dnm (znm , z nm ) ≤ 2η + R t(1) .
We note that [znm , ynm ] and [z nm , y nm ] lie in parallel fibers of M̃nm . Furthermore they are oriented in the same direction with respect to the fiber
and have the same length. Therefore they form opposite sides of a Euclidean parallelogram in M̃nm . In particular the distances dnm (ynm , y nm )
and dnm (znm , z nm ) are equal, so that dnm (ynm , y nm ) ≤ 2η + R t(1) .
Proof of Theorem 5.1. Any graph manifold has a simple finite cover by Theorem 4.3. By Corollary 4.7 and Proposition 2.9, it suffices to prove the theorem for all horizontal surfaces in this cover. Thus we assume, without loss
of generality that N is a simple graph manifold.
Let γ be any geodesic loop in S such that γ and Tg have nonempty
intersection. The existence of such a loop is guaranteed by Lemma 3.3.
Replacing γ with γ −1 if necessary, we may assume that wγ ≥ 1. Let κ be
the maximum of lengths of γi with respect to the metric dS .
Let µ, L and C be the constants given by Lemma 3.4. Let t(j) be the
sequence of integers given by Lemma 5.2. For each n,
let σn be the spiral
loop coresponding to the curve γ and the sequence t(j) . Let ρn be the
double spiral of σn . Let L be the family of lines that are lifts of loops of Tg
or boundary loops of S. Since ρ̃n satisfies the hypotheses of Lemma 3.4, it
is an (L, C)–quasigeodesic in S̃.
Let hn be the homotopy
class of loop ρn at the basepoint s0 . We claim
2
that dS̃ s̃0 , hn (s̃0 ) n + wγn . Indeed, let r be the minimum of lengths of
ci with respect to P
the metric dS . By the construction of the spiral loop σn
2
n
we have σ̃n ≥ r nm
j=1 t(j) . By Lemma 5.2(3), we have σ̃n n + wγ .
It is obvious that |ρ̃n | n2 + wγn because |ρ̃n | ≥ 2|σ̃n |. Since ρ̃n is an
(L, C)–quasigeodesic, it follows that dS̃ s̃0 , hn (s̃0 ) n2 + wγn .
Furthermore, we have d x̃0 , hn (x̃0 ) n by Lemma 5.4. Therefore, n2 +
G
wγn ∆G
H by Corollary 2.10. It follows that ∆H is at least quadratic. If
the horizontal surface is not virtually embedded, then we may choose the
geodesic loop γ in S such that wγ > 1 by Theorem 4.11. In this case wγ is
an exponential function, and wγn ∆G
H.
6. Upper Bound of Distortion
In this section, we will find the upper bound of the distortion of horizontal
surface. The main theorem in this section is the following.
Theorem 6.1. Let g : (S, s0 ) # (N, x0 ) be a horizontal surface in a graph
manifold N . Let G = π1 (N, x0 ) and H = g∗ π1 (S, s0 ) . Then the distortion ∆G
H is at most exponential. Furthermore, if the horizontal surface g is
virtually embedded then ∆G
H is at most quadratic.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
19
Definition 6.2. Lift the JSJ decomposition of the simple graph manifold N
to the universal cover Ñ , and let TN be the tree dual to this decomposition
of Ñ . Lift the collection Tg to the universal cover S̃. The tree dual to
this decomposition of S̃ will be denoted by TS . The map g̃ induces a map
T : TS → TN .
The following lemma plays an important role in the proof of Theorem 6.1.
Lemma 6.3. Let F be a connected compact surface with non-empty boundary and χ(F ) < 0. Let M = F × S 1 . Let g : (B, b) # (M, x) be a horizontal
surface. Then each fiber in M̃ intersects with g̃(B̃) exactly at one point.
Proof. According to Lemma 2.1 in [RW98], there exists a finite covering map
p : B × S 1 → M and an embedding i : B → B×S 1 given by i(x) = (x, 1) such
that g = p ◦ i. Let ĩ : B̃ → B̃ × R be the lift of i such that ĩ(b̃) = (b̃, 0). Let
φ : B̃ → B and Ψ : F̃ → F be the universal covering maps. Let π : R → S 1
be the usual covering space. Since B̃ × R and F̃ × R both uninversal cover
M , there exists a homeomorphism ω : B̃ × R, (b̃, 0) → F̃ × R, g̃(b̃) such
that (Ψ × π) ◦ ω = p ◦ (φ × π). By the unique
lifting property, we have
ω ◦ ĩ = g̃. It follows that g̃(B̃) = ω B̃ × {0} . Since ω maps each fiber in
B̃ × R to a fiber in F̃ × R. It follows that each fiber in F̃ × R intersects
ω B̃ × {0} exactly at one point.
Proposition 6.4. The map T is bijective.
Proof. A simplicial map between trees is bijective if is locally bijective. Thus
it suffices to show that the map T is locally injective and locally surjective
(see [Sta83] for details).
Suppose by way of contradiction that T is not locally injective. Then
there exist three distinct blocks B̃1 , B̃2 and B̃3 in S̃ such that B̃1 ∩ B̃2 6= ∅
and B̃2 ∩ B̃3 6= ∅ such that the images g̃(B̃1 ) and g̃(B̃3 ) lie in the same
block M̃1 of M̃ . Let M̃2 denote the block containing the image g̃(B̃2 ). We
denote ℓ1 = B̃1 ∩ B̃2 and ℓ3 = B̃2 ∩ B̃3 . We have g̃(ℓ1 ) and g̃(ℓ3 ) are subsets
of the JSJ plane T̃ = M̃1 ∩ M̃2 . Since the lines ℓ1 and ℓ3 are disjoint and
the map g̃ is an embedding, it follows that g̃(ℓ1 ) and g̃(ℓ3 ) are disjoint lines
in the plane T̃ . By Remark 4.17, any fiber in the plane T̃ intersects g̃(ℓ1 )
and g̃(ℓ3 ) at distinct points. This contradicts with Lemma 6.3 because g̃(ℓ1 )
and g̃(ℓ3 ) are subsets of g̃(B̃2 ). Therefore, T is locally injective.
By Lemma 6.3, the block g̃(B̃) must intersect every fiber of the Seifert
component M̃ containing it. In particular, g̃(B̃) intersects every JSJ plane
adjacent to M̃ . Therefore the map T is locally surjective.
The following corollary is a combination of Lemma 6.3 and Proposition 6.4.
Corollary 6.5. Each fiber of Ñ intersects with g̃(S̃) in one point.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
20
Remark 6.6. Let G and H be finitely generated groups with generating sets
A and B respectively. Let φ : G → H be a homomorphism. Then there exists
a positive number L such that φ(g) B ≤ L|g|A for all g in G. Indeed, suppose
that A = {g1 , g2 , . . . , gn } we define L = max |φ(gi )|B i = 1, 2, . . . , n .
Since φ is a homomorphism, it is not hard to see that φ(g) B ≤ L|g|A for
all g ∈ G.
The following proposition shows that the distortion of a horizontal surface
in a trivial Seifert manifold is linear.
Proposition 6.7. Let F be a connected compact surface with non-empty
boundary and χ(F ) < 0. Let g : (B, b) # (M, x) be a horizontal surface. Let
H = g∗ π1 (B, b) and G = π1 (M, x). Then H ֒→ G is a quasi-isometric
embedding.
Proof. We first choose generating sets for π1 (B), π1 (F ) and π1 (S 1 ). The
generating sets of π1 (F ) and π1 (S 1 ) induce a generating set on π1 (M ). Let
g1 : B → F and g2 : B → S 1 be the maps such that g = (g1 , g2 ). We have
g1 : B → F is a finite covering
map because g is a horizontal surface in M .
It follows that g1∗ π1 (B) is a finite index subgroup of π1 (F ). As a result,
g1∗ is an (L′ , 0)–quasi-isometry for some constant L′ . Since g∗ = (g1∗ , g2∗ )
we have g∗ (h) ≥ g1∗ (h) ≥ |h| L′ for all h ∈ π1 (B). Applying Remark 6.6
to the homomorphism g∗ , the constant L′ can be enlarged so that we can
show that g∗ is an (L′ , 0)–quasi–isometric embedding.
For the rest of this section, we fix g : (S, s0 ) # (N, x0 ) a horizontal surface
in a simple graph manifold N , the metric d which given by Remark 4.13, and
the hyperbolic metric dS on S which described in Section 5. By Remark 4.16,
we also assume that for each curve c in Tg then g(c) is a straight in the
JSJ torus T where T is the JSJ torus such that g(c) ⊂ T . We define a
metric dg̃(S̃) on g̃(S̃) as the following: for any u = g̃(x) and v = g̃(y), we
define dg̃(S̃) (u, v) = dS̃ (x, y). The following corollary follows by combining
Proposition 6.7 with several earlier results, using the fact that S has only
finitely many blocks, and N has only finitely many Seifert components.
Corollary 6.8. There exist numbers L and C such that the following holds:
For each block B̃ in S̃, let M̃ = F̃ × R be the Seifert component of Ñ such
that g̃(B̃) ⊂ M̃ . The map g̃|B̃ : B̃ → M̃ = F̃ × R can be expressed as a pair
of maps g̃1 : B̃ → F̃ and g̃2 : B̃ → R. Then g̃1 and g̃|B̃ are (L, C)–quasiisometric embeddings, and
g̃2 (u) − g̃2 (v) ≤ L d g̃1 (u), g̃1 (v) + C
for all u, v ∈ B̃.
Proof. The map g|B : B → F × S 1 can be written as (g1 , g2 ). Since the map
g1 : B → F is a finite covering map, the lift g̃1 is a quasi–isometry. It follows
from Proposition 6.7 that g̃|B̃ is a quasi–isometric embedding. The facts g̃1
and g̃|B̃ are quasi–isometrically embedded imply the final claim.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
21
Now, we describe informally the strategy of the proof of Theorem 6.1 in
the case N is a simple graph manifold. For each n ∈ N, let u ∈ g̃(S̃) such
that d(x̃0 , u) ≤ n. We would like to find an upper bound (either quadratic or
exponential) of dS̃ (x̃0 , u) in terms of n. We first show the existence of a path
β in Ñ connecting x̃0 to u such that β passes through a sequence of Seifert
components M̃1 , . . . , M̃k and β intersects the plane T̃i = M̃i ∩ M̃i+1 exactly
at one point that is denoted by yi with i = 1, . . . , k − 1 if k ≥ 2. We will
show that k is bounded above by a linear function of n. Therefore it suffices
to find an upper bound for dS̃ (x̃0 , u) in terms of k. Let di be the given
product metric on M̃i . By Corollary 6.5 the fiber of M̃i passing through yi
intersects g̃(S̃) in a unique point which is denoted by xi . Similarly, the fiber
of M̃i+1 passing through yi intersects g̃(S̃) in one point which is denoted by
zi .
On the one hand, proving the distance in g̃(S̃) of endpoints of β is domi
Pk−1
di (yi , xi ) + di+1 (yi , zi ) is easy. On the other hand,
nated by the sum i=1
finding a quadratic or exponential upper bound for this sum as a function
of k requires more work. Our goal is to analyze the growth of the sequence
d1 (y1 , x1 ), d2 (y1 , z1 ), d2 (y2 , x2 ), . . . ,
di−1 (yi−1 , xi−1 ), di (yi−1 , zi−1 ), di (yi , xi ), . . . ,
dk−1 (yk−1 , xk−1 ), dk (yk−1 , zk−1 )
A relation between di (yi−1 , zi−1 ) and di (yi , xi ) in the Seifert component M̃i
will be described in Lemma 6.9. The ratio of di (yi−1 , zi−1 ) to di−1 (yi−1 , xi−1 )
in the JSJ plane T̃i−1 will be described in Lemma 6.10.
Lemma 6.9 (Crossing a Seifert component). There exists a positive constant L′ such that the following holds: For each block B̃ in S̃, let M̃ = F̃ ×S 1
be the Seifert component such that g̃(B̃) ⊂ M̃ . Let dM be the given product
metric on M̃ , and let T̃ and T˜′ be two disjoint JSJ planes in the Seifert
component M̃ . For any two points y ∈ T̃ and y ′ ∈ T˜′ , let ℓ ⊂ T̃ and ℓ′ ⊂ T˜′
be the lines that project to the fiber S 1 in M such that y ∈ ℓ and y ′ ∈ ℓ′ . Let
x (resp. x′ ) be the unique intersection point of ℓ (resp. ℓ′ ) with g̃(B̃) ∩ M̃
given by Lemma 6.3. Then
dM (y ′ , x′ ) ≤ dM (y, x) + L′ dM (y, y ′ )
Proof. Let ρ and K be the constants given by Remark 4.13 and Remark 4.14
respectively, and let D = ρ/K. Let L and C be the constants given by
Corollary 6.8. Let L′ = L + 2 + C/D.
Let a and b be the projection points of y and y ′ to F̃ respectively. We
write g̃|B̃ = (g̃1 , g̃2 ) where g̃1 : B̃ → F̃ and g̃2 : B̃ → R. Since g̃|B̃ is an
embedding map and x, x′ ∈ g̃(B̃), there exist a′ , b′ ∈ B̃ such that g̃(a′ ) = x
and g̃(b′ ) = x′ . It follows that g̃1 (a′ ) = a and g̃1 (b′ ) = b. By Corollary 6.8
we have
g̃2 (a′ ) − g̃2 (b′ ) ≤ L dM g̃1 (a′ ), g̃1 (b′ ) + C = L dM (a, b) + C.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
22
Since ρ ≤ d(a, b) ≤ K dM (a, b), it follows that D ≤ dM (a, b). Therefore
g̃2 (a′ ) − g̃2 (b′ ) ≤ (L + C/D)dM (a, b) ≤ (L + C/D)dM (y, y ′ ).
With respect to the orientation of the factor R of M̃ , let ∆(y, a) and
∆(y ′ , b) be the displacements of pairs of points (y, a) and (y ′ , b) respectively.
We would like to show that ∆(y, a) − ∆(y ′ , b) ≤ 2 dM (y, y ′ ). Indeed, let
s and t be the real numbers such that y = (a, s) and y ′ = (b, t). We
note that ∆(y, a) = −s if s ≥ 0 and ∆(y, a) = s if s ≤ 0 as well as
∆(y ′ , b) = −t if t ≥ 0 and ∆(y ′ , b) = t if t ≤ 0. Since dM (a, b) ≤ dM (y, y ′ ),
it follows that ∆(y, a) − ∆(y ′ , b) ≤ 2dM (y, y ′ ). Moreover, we have that
dM (y, x) = g̃2 (a′ ) + ∆(y, a) and dM (y ′ , x′ ) = g̃2 (b′ ) + ∆(y ′ , b) . Therefore
the previous inequalities imply
dM (y ′ , x′ ) − dM (y, x) ≤ g̃2 (a′ ) − g̃2 (b′ ) + ∆(y, a) − ∆(y ′ , b)
≤ (L + 2 + C/D)dM (y, y ′ ) = L′ dM (y, y ′ ).
Lemma 6.10 (Crossing a JSJ plane). Let M̃ and M̃ ′ be the two adjacent
Seifert components. Let dM and dM ′ be the given product metrics on M̃
and M̃ ′ respectively. Let T̃ = M̃ ∩ M̃ ′ , and let α ⊂ g̃(S̃) ∩ T̃ be the line
such that α universally covers a curve g(c) for some c in Tg . We moreover
assume that α is a straight line in (T̃ , dM ). For any two points x and z in
←
−
→
−
the line α, let ℓ ⊂ (T̃ , dM ) and ℓ ⊂ (T̃ , dM ′ ) be the Euclidean geodesics
←
−
−
→
←
− ←
→ −
−
−
→
such that x ∈ ℓ and z ∈ ℓ and they project to fibers f ⊂ T and f ⊂ T
←
−
→
−
respectively. Let y be the unique intersection point of ℓ and ℓ . Let a and
b be the integers such that
←
−
→
−
g(c) = a[ f ] + b[ f ] in H1 (T ; Z).
←
−
→
−
where T is the JSJ torus obtained from gluing T to T . Then dM (y, x) =
a/b dM ′ (y, z)
→
−
Proof. Let κ be the positive constant such that length of the fiber f with
respect to the metric dM equals to 1/κ. Let c̃ be a path lift of c such
that g̃(c̃) ⊂ α. Let x′ and z ′ be the initial point and the terminal point
←
−
→
−
of g̃(c̃) respectively. Let ℓ′ and ℓ′ be the Euclidean geodesics in (T̃ , dM )
←
−
→
−
←
−
and (T̃ , dM ′ ) respectively such that x′ ∈ ℓ′ and z ′ ∈ ℓ′ and both lines ℓ′
→
−
←
−
→
−
and ℓ′ project to fibers in T and T respectively. Let y ′ be the unique
←
−′
→′
−
intersection point of ℓ and ℓ . It was shown in the proof of Lemma 5.4
that dM (y ′ , x′ ) = |a| and dM ′ (y ′ , z ′ ) = |b|. By the definiton of κ, it follows
that dM ′ (y ′ , z ′ ) = κ dM (y ′ , z ′ ).
In the Euclidean plane (T̃ , dM
z)
), consider the similar
triangles ∆(x, y,
and ∆(x′ , y ′ , z ′ ). Since dM (y,x) dM (y, z) = dM(y ′ , x′ ) dM (y ′ , z ′ ) = κ a b ,
it follows that dM (y, x) = a b κ dM (y, z) = a b dM ′ (y, z).
Proof of Theorem 6.1. We may assume that N is a simple graph manifold
for the same reason as in the first paragraph of the proof of Theorem 5.1.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
23
Let K be the constant given by Lemma 4.13. Let L and C be the constants
given by Corollary 6.8. Moreover, the constant L can be enlarged so that
L ≥ K and L is greater than the constant L′ given by Lemma 6.9. Moreover,
we assume that the base point s0 belongs to a curve
in the collection Tg .
For any h ∈ π1 (S, s0 ) such that d x̃0 , h(x̃0 ) ≤ n. We will show that
dS̃ s̃0 , h(s̃0 ) is bounded above by either a quadratic or exponential function in term of n. The theorem is confirmed by an application of By Corollary 2.10. We consider the following cases:
Case 1: s̃0 and h(s̃0 ) belong to the
same a block B̃. In this degenerate
case, we will show that dS̃ s̃0 , h(s̃0 ) n. Indeed, let M̃ be the Seifert
component such that g̃(B̃) ⊂ M̃ . Let dM̃ be the given product metric on
M̃ . Since g̃|B̃ is an (L, C)–quasi–isometric embedding by Corollary 6.8 , it
follows that
dg̃(B̃) x̃0 , h(x̃0 ) ≤ LdM̃ x̃0 , h(x̃0 ) + C ≤ L2 d x̃0 , h(x̃0 ) + C ≤ L2 n + C.
Therefore,
dS̃ (s̃0 , h(s̃0 )) = dg̃(S̃) x̃0 , h(x̃0 ) ≤ dg̃(B̃) x̃0 , h(x̃0 ) ≤ L2 n + C.
Case 2: s̃0 and h(s̃0 ) belong to distinct blocks of S̃. Let L be the family
of lines in S̃ that are lifts of curves of Tg . Since we assume that s0 belongs
to a curve in the collection Tg , thus there are distinct lines α and α′ in L
such that s̃0 ∈ α and h(s̃0 ) ∈ α′ . Let e and e′ be the non-oriented edges in
the tree TS corresponding to the lines α and α′ respectively. Let β be the
non backtracking path joining e to e′ in the tree TS , with ordered vertices
v0 , v1 , . . . , vk−1 where v1 is not a vertex on the edge e and vk−2 is not a
vertex on the edge e′ . We denote the Seifert components corresponding to
the vertices T(vi ) by M̃i with i = 0, 1, · · · , k − 1. We note that the Seifert
components M̃i are distinct because T is injective by Proposition 6.4. Let
di be the given product metric on the Seifert component M̃i .
For convenience, relabel x̃0 by y0 , and h(x̃0 ) by yk . Let γ be a geodesic
in (Ñ , d) joining y0 to yk . Replace the path γ by a new path β, described
as
follows. For i = 1, 2, . . . , k − 1, let T̃i = M̃i−1 ∩ M̃i , and let Ai = t ∈ [0, 1]
γ(t) ∈ T̃i . Note that the set Ai is non-empty. Let ti = sup {t ∈ Ai }, and
let yi = γ(ti ). Let βi be the geodesic segment in (M̃i , di ) joining yi−1 to yi .
Let β be the concatenation β1 β2 · · · βk . Since di (yi−1 , yi ) ≤ L d(yi−1 , yi ), it
follows that |β| ≤ L |γ| ≤ Ln.
←
−
→
−
For each i = 1, 2, . . . , k − 1, let ℓi and ℓi be the Euclidean geodesics in
(T̃i , di−1 ) and (T̃i , di ) passing through yi respectively. Let αi = g̃(S̃) ∩ T̃i .
←
−
→
−
By Corollary 6.5, each line ℓi and ℓi intersects αi at one point, we denote
←
−
→
−
{xi } = αi ∩ ℓi and {zi } = αi ∩ ℓi .
Pk−1
di+1 (yi , zi ).
Claim 1: dg̃(S̃) x̃0 , h(x̃0 ) i=1
We recall that Tg is the collection of components of g −1 (T ) in S where T
is the JSJ decomposition of N . We note that αi universally covers a closed
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
24
←
−
→
−
curve g(ci ) ∈ Ti for some ci ∈ Tg and g(ci ) = ai [ fi ] + bi [ fi ] in H1 (Ti ; Z)
for some ai , bi ∈ Z. By Lemmas 6.10 and 6.9, we have
(∗)
di (yi , xi ) = ai /bi di+1 (yi , zi )
and
(†)
di yi , xi − di yi−1 , zi−1 ≤ Ldi yi , yi−1 ≤ L2 βi .
For each i = 2, . . . , k − 1 we have
di (zi−1 , zi ) ≤ di (zi−1 , yi−1 ) + di (yi , zi ) + di (yi−1 , yi ).
The triangle inequality implies
d1 (y0 , z1 ) ≤ d1 (y0 , y1 ) + d1 (y1 , z1 )
and
dk−1 (zk−1 , yk ) ≤ dk−1 (zk−1 , yk−1 ) + dk−1 (yk−1 , yk ).
By Corollary 6.8, we have
dg̃(S̃) (x̃0 , u) ≤ 2L
k−1
X
di+1 (yi , zi ) + L|β| + kC.
i=1
Let ρ be the minimum distance between two distinct JSJ planes in Ñ (see
Remark 4.14). Since d x̃0 , h(x̃0 ) ≤ n, it follows that kρ ≤ n, and therefore
k ≤ n/ρ.
Pk−1
Claim 2: i=1
di+1 (yi , zi ) en .
Indeed, by using (∗) and (†) we have
(‡)
bi−1
di−1 (yi−1 , xi−1 )
di yi−1 , zi−1 =
ai−1
bi−1
≤
di−1 (yi−2 , zi−2 ) + L2 βi−1
ai−1
bi−1 2
bi−1 bi−2
di−2 (yi−3 , xi−3 ) +
L βi−1 ≤ · · ·
≤
ai−1 ai−2
ai−1
Let ǫ = ǫ(g) be the governor of g, as defined in Remark 4.14. We note that
ǫ > 1 if g is not virtually embedded. By (‡) we have
di (yi−1 , zi−1 ) ≤ ǫ2 di−2 (yi−3 , zi−3 ) + ǫ2 L2 βi−2 + ǫL βi−1
≤ ǫi−2 d2 (y1 , z1 ) + L2 (Ln)
i−2
X
ǫj
j=1
We have d2 (y1 , z1 ) ≤ ǫd1 (y1 , x1 ) and d1 (y1 , x1 ) ≤ Ld1 (y1 , y0 ) ≤ L2 n by using
(∗) and (†). Hence d2 (y1 , z1 ) ≤ L2 nǫ ≤ L3 nǫ. Therefore
di (yi−1 , zi−1 ) ≤ L3 n
i−1
X
j=1
ǫj .
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
25
Pk−1
When ǫ > 1 we obtain i=1
di+1 (yi , zi ) en . If ǫ = 1 then since k ≤ n/ρ,
Pk−1
it is not hard to see i=1 di+1 (yi , zi ) n2 en .
Pk−1
Claim 3: If g is virtually embedded then i=1
di+1 (yi , zi ) n2 .
Indeed, let Λ be the constant given by Remark 4.14. By (‡) we have
di (yi−1 , zi−1 ) ≤ Λ
k−1
X
βm ≤ ΛLn.
m=1
It follows that
k−1
X
di+1 (yi , zi ) ≤ 2kΛLn ≤ 2(n/ρ)ΛLn,
i=1
establishing the claim. The theorem now follows from Corollary 2.10.
7. Fiber surfaces have quadratic distortion
In this section we show in detail how results of Gersten and Kapovich–
Leeb [Ger94, KL95] can be combined with Thurston’s geometric description
of 3–manifolds that fiber over the circle to prove Theorem 1.5. This section
is an elaboration of ideas that are implicitly used by Kapovich–Leeb in
[KL95] but not stated explicitly there. As explained in the introduction,
Theorem 1.5 is the main step in an alternate proof of the virtually embedded
case of Theorem 1.2.
The following theorem relates distortion of normal subgroups to the notion of divergence of groups. Roughly speaking, divergence is a geometric
invariant that measures the circumference of a ball of radius n as a function
of n. (See [Ger94] for a precise definition.)
Theorem 7.1 ([Ger94], Thm. 4.1). If G = H ⋊φ Z, where G and H are
finitely generated, then the divergence of G is dominated by the distortion
∆G
H.
Let H be generated by a finite set T . An automorphism φ ∈ Aut(H) has
polynomial growth of degree at most d if there exist constants α, β such that
φi (t)
T
≤ αnd + β
for all t ∈ T and all i with |i| ≤ n.
Gersten claims the following result in the case that H is a free group.
However his proof uses only that H is finitely generated, so we get the
following result using the same proof.
Theorem 7.2 ([Ger94], Prop. 4.2). If G = H ⋊φ Z, where G and H are
finitely generated and φ ∈ Aut(H) has polynomial growth of degree at most
d+1 .
d, then ∆G
H n
Proof of Theorem 1.5. Let N be a graph manifold that fibers over S 1 with
surface fiber S. Then N is the mapping torus of a homeomorphism f ∈
Aut(S). In particular, if we let G = π1 (N ) and H = π1 (S), then G = H ⋊φ Z,
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
26
where φ ∈ Aut(H) is an automorphism induced by f . Passing to finite
covers, we may assume without loss of generality that N and S are orientable
and that the map f is orientation preserving.
Kapovich–Leeb show that the divergence of the fundamental group of any
graph manifold is at least quadratic [KL98, §3]. Therefore by Theorem 7.1
the distortion of H in G is also at least quadratic.
By Theorem 7.2, in order to establish a quadratic upper bound for ∆G
H,
it suffices to show that φ has linear growth. We will first apply the Nielsen–
Thurston classification of surface homeomorphisms to the map f (see, for example, Corollary 13.2 of [FM12]). By the Nielsen–Thurston theorem, there
exists a multicurve {c1 , . . . , ck } with the following properties. The curves ci
have disjoint closed annular neighborhoods S1 , . . . , Sk . Let Sk+1 , . . . , Sk+ℓ
S
be the closures of the connected components of S − ki=1 Si . Then there is
a map g isotopic to f and a positive number m such that gm leaves each
subsurface Si invariant. Furthermore gm is a product of homeomorphisms
g1 · · · gk+ℓ such that each gi is supported on Si . For i = 1, . . . , k, the map
gi (supported on the annulus Si ) is a power of a Dehn twist about ci . For
i = k + 1, . . . , k + ℓ, each gi is either the identity or a map that restricts to
a pseudo-Anosov map of Si .
Consider the mapping torus N̂ for the homeomorphism gm of S, which
finitely covers N . Apply Thurston’s geometric classification of mapping tori
to N̂ to conclude that the family of tori ci × S 1 in the mapping torus N̂ is
equal to the family of JSJ tori of N̂. It follows that for each i = k+1, . . . , k+ℓ
the map gi is equal to the identity on S. Indeed if any gi were pseudoAnosov, then the corresponding JSJ component of N̂ would be atoroidal
and hyperbolic, which is impossible in a graph manifold.
Therefore gm is a product of powers of Dehn twists about disjoint curves.
In particular the automorphism φm has linear growth. Clearly φ itself must
also have linear growth. Therefore the distortion of H in G is at most
quadratic as desired.
References
[Ago13] I. Agol. The virtual Haken conjecture. Doc. Math., 18:1045–1087, 2013. With an
appendix by Agol, Daniel Groves, and Jason Manning.
[BBI01] D. Burago, Y. Burago, and S. Ivanov. A course in metric geometry, volume 33 of
Graduate Studies in Mathematics. American Mathematical Society, Providence,
RI, 2001.
[BS04] S.V. Buyalo and P.V. Svetlov. Topological and geometric properties of graph
manifolds. Algebra i Analiz, 16(2):3–68, 2004.
[BW13] H. Bigdely and D.T. Wise. Quasiconvexity and relatively hyperbolic groups that
split. Michigan Math. J., 62(2):387–406, 2013.
[DS05] C. Druţu and M. Sapir. Tree-graded spaces and asymptotic cones of groups.
Topology, 44(5):959–1058, 2005. With an appendix by D. Osin and M. Sapir.
[FM12] B. Farb and D. Margalit. A primer on mapping class groups, volume 49 of Princeton Mathematical Series. Princeton University Press, Princeton, NJ, 2012.
[Ger94] S.M. Gersten. Quadratic divergence of geodesics in CAT(0) spaces. Geom. Funct.
Anal., 4(1):37–51, 1994.
DISTORTION OF SURFACES IN GRAPH MANIFOLDS
27
[GH90] É. Ghys and P. de la Harpe, editors. Sur les groupes hyperboliques d’après Mikhael
Gromov, volume 83 of Progress in Mathematics. Birkhäuser Boston, Inc., Boston,
MA, 1990.
[HP15] M.F. Hagen and P. Przytycki. Cocompactly cubulated graph manifolds. Israel J.
Math., 207(1):377–394, 2015.
[Hru10] G.C. Hruska. Relative hyperbolicity and relative quasiconvexity for countable
groups. Algebr. Geom. Topol., 10(3):1807–1856, 2010.
[Joh79] K. Johannson. Homotopy equivalences of 3–manifolds with boundaries, volume
761 of Lecture Notes in Mathematics. Springer, Berlin, 1979.
[JS79] W.H. Jaco and P.B. Shalen. Seifert fibered spaces in 3–manifolds. Mem. Amer.
Math. Soc., 21(220):1–192, 1979.
[KL95] M. Kapovich and B. Leeb. On asymptotic cones and quasi-isometry classes of
fundamental groups of 3–manifolds. Geom. Funct. Anal., 5(3):582–603, 1995.
[KL98] M. Kapovich and B. Leeb. 3–manifold groups and nonpositive curvature. Geom.
Funct. Anal., 8(5):841–852, 1998.
[Neu01] W.D. Neumann. Immersed and virtually embedded π1 –injective surfaces in graph
manifolds. Algebr. Geom. Topol., 1:411–426, 2001.
[Pau05] G. Paulik. Gluing spaces and analysis. Bonner Mathematische Schriften [Bonn
Mathematical Publications], 372. Universität Bonn, Mathematisches Institut, Bonn, 2005. Dissertation, Rheinische Friedrich-Wilhelms-Universität Bonn,
Bonn, 2005.
[PW14] P. Przytycki and D.T. Wise. Graph manifolds with boundary are virtually special. J. Topol., 7(2):419–435, 2014.
[RW98] J.H. Rubinstein and S. Wang. π1 –injective surfaces in graph manifolds. Comment. Math. Helv., 73(4):499–515, 1998.
[Sco78] P. Scott. Subgroups of surface groups are almost geometric. J. London Math.
Soc. (2 ), 17(3):555–565, 1978.
[Sta83] J.R. Stallings. Topology of finite graphs. Invent. Math., 71(3):551–565, 1983.
[Tid]
J. Tidmore. Cocompact cubulations of mixed 3–manifolds. Preprint.
arXiv:1612.06272 [math.GR].
[Tra]
H.C. Tran. Geometric embedding properties of Bestvina–Brady subgroups. To
appear in Algebr. Geom. Topol. arXiv:1601.00539.
[Wis12] D.T. Wise. From riches to RAAGs: 3–manifolds, right-angled Artin groups, and
cubical geometry, volume 117 of CBMS Regional Conference Series in Mathematics. Published for the Conference Board of the Mathematical Sciences, Washington, DC; by the American Mathematical Society, Providence, RI, 2012.
[Woo16] D.J. Woodhouse. Classifying finite dimensional cubulations of tubular groups.
Michigan Math. J., 65(3):511–532, 2016.
[WY97] S. Wang and F. Yu. Graph manifolds with non-empty boundary are covered by
surface bundles. Math. Proc. Cambridge Philos. Soc., 122(3):447–455, 1997.
Department of Mathematical Sciences, University of Wisconsin–Milwaukee,
P.O. Box 413, Milwaukee, WI 53201, USA
E-mail address: [email protected], [email protected]
| 4math.GR
|
arXiv:1412.4524v2 [math.GR] 1 Aug 2016
THE NIELSEN AND REIDEMEISTER THEORIES OF
ITERATIONS ON INFRA-SOLVMANIFOLDS OF TYPE (R) AND
POLY-BIEBERBACH GROUPS
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Abstract. We study the asymptotic behavior of the sequence of the Nielsen
numbers {N (f k )}, the essential periodic orbits of f and the homotopy minimal
periods of f by using the Nielsen theory of maps f on infra-solvmanifolds
of type (R). We develop the Reidemeister theory for the iterations of any
endomorphism ϕ on an arbitrary group and study the asymptotic behavior
of the sequence of the Reidemeister numbers {R(ϕk )}, the essential periodic
[ϕ]-orbits and the heights of ϕ on poly-Bieberbach groups.
1. Introduction
Let f : X → X be a map on a connected compact polyhedron X. A point
x ∈ X is a fixed point of f if f (x) = x and is a periodic point of f with period n if
f n (x) = x. The smallest period of a periodic x is called the minimal period. We
will use the following notations:
Fix(f ) = {x ∈ X | f (x) = x},
Per(f ) = the set of all minimal periods of f ,
Pn (f ) = the set of all periodic points of f with minimal period n,
\
HPer(f ) =
{n ∈ N | Pn (g) 6= ∅}
g≃f
= the set of all homotopy minimal periods of f .
Let p : X̃ → X be the universal covering projection onto X and f˜ : X̃ → X̃ a
fixed lift of f . Let Π be the group of covering transformations of the projection
p : X̃ → X. Then f induces an endomorphism ϕ = ϕf : Π → Π by the following
identity
ϕ(α)f˜ = f˜α, ∀α ∈ Π.
The subsets p(Fix(αf˜)) ⊂ Fix(f ), α ∈ Π, are called fixed point classes of f . A
fixed point class is called essential if its index is nonzero. The number of essential
fixed point classes is called the Nielsen number of f , denoted by N (f ) [27].
Date: XXX 1, 2014 and, in revised form, YYY 22, 2015.
2000 Mathematics Subject Classification. Primary 37C25; Secondary 55M20.
Key words and phrases. Infra-solvmanifold, Nielsen number, Nielsen zeta function, periodic
[ϕ]-orbit, poly-Bieberbach group, Reidemeister number, Reidemeister zeta function.
The second author is supported in part by Basic Science Researcher Program through
the National Research Foundation of Korea(NRF) funded by the Ministry of Education
(No. 2013R1A1A2058693) and by the Sogang University Research Grant of 2010 (10022).
1
2
ALEXANDER FEL’SHTYN AND JONG BUM LEE
The Nielsen number is always finite and is a homotopy invariant lower bound for
the number of fixed points of f . In the category of compact, connected polyhedra
the Nielsen number of a map is, apart from in certain exceptional cases, equal to
the least number of fixed points of maps with the same homotopy type as f .
Let ϕ : Π → Π be an endomorphism on an arbitrary group Π. Consider the
Reidemeister action of Π on Π determined by the endomorphism ϕ and defined
as follows:
Π × Π −→ Π, (γ, α) 7→ γαϕ(γ)−1 .
The Reidemeister class containing α will be denoted by [α], and the set of Reidemeister classes of Π determined by ϕ will be denoted by R[ϕ]. Write R(ϕ) = #R[ϕ],
called the Reidemeister number of ϕ. When the endomorphism ϕ : Π → Π is
induced from a self-map f : X → X, i.e., when ϕ = ϕf , we also refer to R[ϕ] as the
set R[f ] of Reidemeister classes of f , and R(ϕ) as the Reidemeister number R(f )
of f .
It is easy to observe that if ψ is an automorphism on Π, then ψ sends the
Reidemeister class [α] of ϕ to the Reidemeister class [ψ(α)] of ψϕψ −1 . Hence
the Reidemeister number is an automorphism invariant. For any β ∈ Π, let τβ
denote the inner automorphism determined by β. We will compare R[ϕ] with
R[τβ ϕ]. Observe that the right multiplication rβ −1 by β −1 on Π induces a bijection
R[ϕ] → R[τβ ϕ], [α] 7→ [αβ −1 ]. Indeed,
rβ −1 : γ · α · ϕ(γ)−1 7−→ (γ · α · ϕ(γ)−1 )β −1
= γ · (αβ −1 ) · βϕ(γ)−1 β −1 = γ · (αβ −1 ) · (τβ ϕ)(γ)−1 .
Similarly, we can show that r(βϕ(β)···ϕn−1 (β))−1 induces a bijection R[ϕn ] → R[(τβ ϕ)n ],
[α]n 7→ [α(βϕ(β) · · · ϕn−1 (β))−1 ]n . Hence the Reidemeister number is a conjugacy
invariant. This is not surprising because if f and g are homotopic, then their
induced endomorphisms differ by an inner automorphism τβ .
The set Fix(f n ) of periodic points of f splits into a disjoint union of periodic
point classes p(Fix(αf˜n )) of f , and these sets are indexed by the Reidemeister
classes [α]n ∈ R[ϕn ] of the endomorphism ϕn where ϕ = ϕf . Namely,
a
(D)
p Fix(αf˜n ) .
Fix(f n ) =
[α]n ∈R[ϕn ]
From the dynamical point of view, it is natural to consider the Nielsen numbers
N (f k ) and the Reidemeister numbers R(f k ) of all iterations of f simultaneously.
For example, N. Ivanov [21] introduced the notion of the asymptotic Nielsen number, measuring the growth of the sequence N (f k ), and found the basic relation
between the topological entropy of f and the asymptotic Nielsen number. Later
on, it was suggested in [11, 42, 12, 13, 14] to arrange the Nielsen numbers N (f k ),
the Reidemeister numbers R(f k ) and R(ϕk ) of all iterations of f and ϕ into the
Nielsen and the Reidemeister zeta functions
!
∞
X
N (f k ) k
z ,
Nf (z) = exp
k
k=1
Rf (z) = exp
∞
X
R(f k )
k=1
k
zk
!
,
Rϕ (z) = exp
∞
X
R(ϕk )
k=1
k
zk
!
.
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
3
The Nielsen and Reidemeister zeta functions are nonabelian analogues of the Lefschetz zeta function
!
∞
X
L(f k ) k
Lf (z) = exp
z ,
k
k=1
where
L(f n ) :=
dim
XX
k=0
h
i
n
(−1)k tr f∗k
: Hk (X; Q) → Hk (X; Q)
is the Lefschetz number of the iterate f n of f .
Nice analytic properties of Nf (z) [14] indicate that the numbers N (f k ), k ≥ 1,
are closely interconnected. Other manifestations of this are Gauss congruences
X k
N (f d ) ≡ 0 mod k,
µ
d
d|k
for any k > 0, where f is a map on an infra-solvmanifold of type (R) [15]. Whenever
all R(f k ) are finite, we also have
X k
X k
µ
µ
R(f d ) =
N (f d ) ≡ 0 mod k.
d
d
d|k
d|k
It is known that the Reidemeister numbers of the iterates of an automorphism ϕ
of an almost polycyclic group also satisfy Gauss congruences [17, 18].
The fundamental invariants of f used in the study of periodic points are the
Lefschetz numbers L(f k ), and their algebraic combinations, the Nielsen numbers
N (f k ) and the Nielsen–Jiang periodic numbers N Pn (f ) and N Φn (f ), and the Reidemeister numbers R(f k ) and R(ϕk ).
The study of periodic points by using the Lefschetz theory has been done extensively by many authors in the literature such as [27], [9], [2], [24], [41]. A natural
question is to ask how much information we can get about the set of essential periodic points of f or about the set of (homotopy) minimal periods of f from the
study of the sequence {N (f k )} of the Nielsen numbers of iterations of f . Utilizing the arguments employed mainly in [2] and [24, Chap. III] for the Lefschetz
numbers of iterations, we study the asymptotic behavior of the sequence {N (f k )},
the essential periodic orbits of f and the homotopy minimal periods of f by using
the Nielsen theory of maps f on infra-solvmanifolds of type (R). We will give a
brief description of the main results in Section 4 whose details and proofs can be
found in [16]. From the identity (D), the Reidemeister theory for the iterations of
f is almost parallel to the Nielsen theory of the iterates of f . Motivated from this
parallelism, we will develop in Section 2 the Reidemeister theory for the iterations
of any endomorphism ϕ on an arbitrary group Π. In this paper, we will study the
asymptotic behavior of the sequence {R(ϕk )}, the essential periodic [ϕ]-orbits and
the heights of ϕ on poly-Bieberbach groups. We refer to [15, 16] for background to
our present work.
Acknowledgments. The first author is indebted to the Max-Planck-Institute for
Mathematics(Bonn) and Sogang University(Seoul) for the support and hospitality
and the possibility of the present research during his visits there. The authors also
would like to thank Thomas Ward for making careful corrections and suggestions
to a few expressions.
4
ALEXANDER FEL’SHTYN AND JONG BUM LEE
2. Preliminaries
Recall that the periodic point set Fix(f n ) splits into a disjoint union of periodic
point classes
G
p Fix(αf˜n ) .
Fix(f n ) =
[α]n ∈R[ϕn ]
Consequently, there is a 1-1 correspondence η from the set of periodic point classes
p(Fix(αf˜n )) to the set of Reidemeister classes [α]n of ϕn . When m | n, Fix(f m ) ⊂
Fix(f n ). Let x ∈ Fix(f m ) and x̃ ∈ p−1 (x). Then there exist unique α, β ∈ π such
that αf˜m (x̃) = x̃ and β f˜n (x̃) = x̃. It can be easily derived that
β = αϕm (α)ϕ2m (α) · · · ϕn−m (α).
This defines two natural functions, called boosting functions,
γm,n : p Fix(αf˜m ) 7→ p Fix(αϕm (α)ϕ2m (α) · · · ϕn−m (α)f˜n ) ,
ιm,n = ιm,n (ϕ) : [α]m 7→ [αϕm (α)ϕ2m (α) · · · ϕn−m (α)]n
so that the following diagram is commutative
γm,n
✤
/ p Fix(αϕm (α)ϕ2m (α) · · · ϕn−m (α)f˜n )
p Fix(αf˜m )
❴
❴
η
η
✤
[α]m
ιm,n
/ [αϕm (α)ϕ2m (α) · · · ϕn−m (α)]n
Moreover, it is straightforward to check the commutativity of the diagram
[α]m
❴
r(βϕ(β)···ϕm−1 (β))−1
/ [α(βϕ(β) · · · ϕm−1 (β))−1 ]m
❴
✤
ιm,n (ϕ)
[αϕm (α) · · · ϕn−m (α)]n ✤
ιm,n (τβ ϕ)
r(βϕ(β)···ϕn−1 (β))−1
/ [αϕm (α) · · · ϕn−m (α)(βϕ(β) · · · ϕm−1 (β))−1 ]n
On the other hand, for x ∈ p(Fix(αf˜n )) we choose x̃ ∈ p−1 (x) so that αf˜n (x̃) =
x̃. Then
ϕ(α)f˜n f˜(x̃) = ϕ(α)f˜f˜n (x̃) = f˜αf˜n (x̃) = f˜(x̃)
and so f (x) ∈ p(Fix(ϕ(α)f˜n )). Namely, p(Fix(ϕ(α)f˜n )) is the periodic point class
determined by f (x). Therefore, f induces a function on the periodic point classes
of f n , which we denote by [f ], defined as follows:
[f ] : p Fix(αf˜n ) 7−→ p Fix(ϕ(α)f˜n ) .
Similarly, ϕ induces a well-defined function on the Reidemeister classes of ϕn , which
we will denote by [ϕ], given by [ϕ] : [α]n 7→ [ϕ(α)]n . Then the following diagram
commutes:
[f ]
✤
/ p Fix(ϕ(α)f˜n )
p Fix(αf˜n )
O
O
[α]n ✤
[ϕ]
/ [ϕ(α)]n
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
5
By [27, Theorem III.1.12], [f ] is an index-preserving bijection on the periodic point
classes of f n . We say that [α]n is essential if the corresponding class p(Fix(αf˜n ))
is essential. Evidently,
Fix(αf˜n )
f˜
˜n−1
/ Fix(ϕ(α)f˜n ) αf
/ Fix(αf˜n ).
5
identity
This implies that for each α ∈ Π, the restrictions of f
f | : p Fix(αf˜n ) −→ p Fix(ϕ(α)f˜n )
are homeomorphisms such that [f ]n is the identity. In particular,
p Fix(αf˜n ) = ∅ ⇐⇒ p Fix(ϕ(α)f˜n ) = ∅.
Moreover, [ϕ]n is the identity, ιm,n ◦ [ϕ] = [ϕ] ◦ ιm,n and γm,n ◦ [f ] = [f ] ◦ γm,n .
The length of the element [α]n ∈ R[ϕn ], denoted by ℓ([α]n ), is the smallest
positive integer ℓ such that [ϕ]ℓ ([α]n ) = [α]n . The [ϕ]-orbit of [α]n is the set
h[α]n i = {[α]n , [ϕ]([α]n ), · · · , [ϕ]ℓ−1 ([α]n )},
where ℓ = ℓ([α]n ). We must have that ℓ | n. The element [α]n ∈ R[ϕn ] is reducible
to m if there exists [β]m ∈ R[ϕm ] such that ιm,n ([β]m ) = [α]n . Note that if [α]n is
reducible to m, then m | n. If [α]n is not reducible to any m < n, we say that [α]n
is irreducible. The depth of [α]n , denoted by d([α]n ), is the smallest integer m
to which [α]n is reducible. Since clearly d([α]n ) = d([ϕ]([α]n )), we can define the
depth of the orbit h[α]n i: d(h[α]n i) = d([α]n ). If n = d([α]n ), the element [α]n or
the orbit h[α]n i is called irreducible.
Clearly, as a set p(Fix(αf˜m )) ⊂ p(Fix(αϕm (α)ϕ2m (α) · · · ϕn−m (α)f˜n )). This
implies that if p(Fix(αf˜m )) is the periodic point class of f m determined by x, then
p Fix(αϕm (α)ϕ2m (α) · · · ϕn−m (α)f˜n )
is the periodic point class of f n determined by x.
Note that if [α]n is irreducible, then every element of the fixed point class
p(Fix(αf˜n )) is a periodic point of f with minimal period n. Let [α]n be an essential class with depth m and let ιm,n ([β]m ) = [α]n . Then there is a periodic point
x of f with minimal period m. Consequently, the irreducibility of a periodic Reidemeister class of ϕ is an algebraic counterpart of the minimal period of a periodic
point of f . We say that a periodic Reidemeister class [α]n of ϕ has height n if it
is irreducible. The set IR(ϕn ) of all classes in R[ϕn ] with height n is an algebraic
analogue of the set Pn (f ) of periodic points of f with minimal period n. Let I(ϕ)
be the set of all irreducible classes of ϕ. That is,
I(ϕ) = {[α]k ∈ R[ϕk ] | α ∈ Π, k > 0, [α]k is irreducible}.
We define the set H(ϕ) of all heights of ϕ to be
H(ϕ) = {k ∈ N | some [α]k has height k}.
Then H(ϕ) is an algebraic analogue of the set Per(f ) of all minimal periods of
f . Motivated from homotopy minimal periods of f , we may define the set of all
homotopy heights of ϕ as follows:
\
HI(ϕ) =
{n ∈ N | IR((τβ ϕ)n ) 6= ∅} .
β∈Π
6
ALEXANDER FEL’SHTYN AND JONG BUM LEE
However, as we have observed before, since the boosting functions ιm,n commute
with “right multiplications”, i.e.,
ιm,n (τβ ϕ) ◦ r(βϕ(β)···ϕm−1 (β))−1 = r(βϕ(β)···ϕn−1 (β))−1 ◦ ιm,n (ϕ),
it follows that the height is a conjugacy invariant. Consequently, we have HI(ϕ) =
H(ϕ).
3. Poly-Bieberbach groups
The fundamental group of an infra-solvmanifold is called a poly-Bieberbach
group, which is a torsion free poly-crystallographic group. It is known (see for
example [10, Theorem 2.12]) that every poly-Bieberbach group is a torsion-free
virtually poly-Z group. We refer to [46, Theorem 3] for a characterization of
poly-crystallographic groups. Recall also from [46, Corollary 4] that for any polyBieberbach group Π there exist a connected simply connected supersolvable Lie
group S, a compact subgroup K of Aut(S) and an isomorphism ι of Π onto a discrete cocompact subgroup of S ⋊ K such that ι(Π) · S is dense in S ⋊ K. By [16,
Lemma 2.1], the supersolvable Lie groups are the Lie groups of type (R), that is,
Lie groups for which if ad X : S → S has only real eigenvalues for all X in the Lie
algebra S of S. Assuming ι to be an inclusion or identifying Π with ι(Π), we have
the following commutative diagram
1 −−−−→
S
x
p
−−−−→ S ⋊ K −−−−→
x
1 −−−−→ Π ∩ S −−−−→
Π
K
x
−−−−→ 1
−−−−→ p(Π) −−−−→ 1
Here, we cannot assume that the subgroup p(Π) of K ⊂ Aut(S) is a finite group
and that the translations Π ∩ S form a lattice in the solvable Lie group S of type
(R).
In this paper, we will assume the following: Let Π be a poly-Bieberbach group
which is the fundamental group of an infra-solvmanifold of type (R), i.e., Π is a
discrete cocompact subgroup of Aff(S) := S ⋊ Aut(S), where S is a connected,
simply connected solvable Lie group of type (R) and Π ∩ S is of finite index in Π
and a lattice of S. The finite group Φ := Π/Π∩S is called the holonomy group of
the poly-Bieberbach group Π or the infra-solvmanifold Π\S of type (R). Naturally
Φ sits in Aut(S). Let ϕ : Π → Π be an endomorphism. Then by [33, Theorem 2.2],
ϕ is semi-conjugate by an “affine map”. Namely, there exist d ∈ S and a Lie group
endomorphism D : S → S such that ϕ(α)(d, D) = (d, D)α for all α ∈ Π ⊂ Aff(S).
From this identity condition, the affine map f˜ := (d, D) : S → S restricts to a map
f : Π\S → Π\S for which it induces the endomorphism ϕ. Conversely, if f is a
self-map on an infra-solvmanifold Π\S of type (R), f induces an endomorphism
ϕ = ϕf , see Section 1. As remarked above, f is homotopic to a map induced by an
affine map on S. Since the Lefschetz, Nielsen and Reidemeister numbers of f are
homotopy invariants, we may assume that our f has an affine lift (d, D) on S.
Theorem 3.1 ([15, Corollary 7.6]). Let ϕ : Π → Π be an endomorphism on a
poly-Bieberbach group Π of S with holonomy group Φ. If ϕ is the semi-conjugate
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
7
by an affine map (d, D) on S, then we have
1 X
R(ϕk ) =
σ det(I − A∗ D∗k )
#Φ
A∈Φ
where σ : R → R ∪ {∞} is given by σ(0) = ∞ and σ(x) = |x| for all x 6= 0.
Furthermore, if R(ϕk ) < ∞ then R(ϕk ) = N (f k ) where f is a map on Π\S which
induces ϕ.
When all R(ϕk ) are finite, Theorem 3.1 says that the Reidemeister theory for
poly-Bieberbach groups follows directly from the Nielsen theory for infra-solvmanifolds
of type (R). In this paper, whenever possible, we will state our results in the language of Reidemeister theory.
Proposition 3.2 ([15, Proposition 9.3]). Let f be a map on an infra-solvmanifold
Π\S of type (R) induced by an affine map. Then every essential fixed point class
of f consists of a single element.
Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group Π. We assume
as before that (d, D) be an affine map on S and f : Π\S → Π\S be the map
induced by (d, D) and inducing ϕ. We assume further that all R(ϕn ) < ∞. Hence
by Theorem 3.1, R(ϕn ) = N (f n ) for all n > 0. This implies that for every n > 0
all fixed point classes of f n are essential and hence consist of a single element by
Proposition 3.2. Consequently, we can refer to essential fixed point classes of f n
as essential periodic points of f with period n. Moreover, for every n > 0 all
Reidemeister classes of ϕn are essential.
For m | n and for β ∈ Π, let α = βϕm (β) · · · ϕn−m (β) and consider the commuting diagram
η
/ p Fix(α(α)f˜n ) = {x}
[α]n ✤
O
O
ιm,n
❴
✤
[β]m
γm,n
η
❴
/ p Fix(β f˜m ) = {x}
This shows that the observation in Section 2 can be refined as follows: [α]n is
irreducible if and only [α]n has height n if and only if the corresponding essential
periodic point x of f has minimal period n. Moreover, [α]n has depth d if and only
if the corresponding essential periodic point x of f has minimal period d. Let ℓ
be the length of [α]n . That is, [ϕℓ (α)]n = [α]n . Equivalently, we have f ℓ (x) = x.
This implies that [α]n is reducible to ℓ. Further, d = ℓ. In particular, if [α]n is
irreducible, then its length is the height, ℓ = n, and so #h[α]n i = n.
We denote by O([ϕ], k) the set of all (essential) periodic orbits of [ϕ] with length
≤ k. Then we have
O([ϕ], k) = {h[α]m i | α ∈ Π, m ≤ k}
= {hxi | x is an essential periodic point of f with length ≤ k}
= O(f, k).
Recall that the set of essential periodic points of f with minimal period k is
[
Fixe (f d ).
EPk (f ) = Fixe (f k ) −
d|k,d<k
8
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Then we have the algebraic counterpart. Namely,
EPk (ϕ) = {[α]k ∈ R[ϕk ] | [α]k is irreducible (and essential)}
= {[α]k ∈ R[ϕk ] | [α]k has height k}
= IR(ϕk ),
and #IR(ϕk ) = #EPk (f ). Hence the set of (essential) Reidemeister classes of
ϕk can be identified with a disjoint union of irreducible classes, that is, R[ϕk ] is
decomposed by heights:
G
IR(ϕd ),
R[ϕk ] =
d|k
and hence its cardinality satisfies
R(ϕk ) = #R[ϕk ] =
X
#IR(ϕd ).
d|k
Recall that if we denote by Ok (ϕ) the number of essential and irreducible periodic
orbits of R[ϕk ], i.e., if Ok (ϕ) = #{h[α]k i | [α]k ∈ EPk (ϕ)} then by definition, the
prime Nielsen–Jiang periodic number of period k is
NPk (ϕ) = k × Ok (ϕ).
As observed earlier, each such orbit h[α]k i has length k. Therefore, NPk (ϕ) =
#IR(ϕk ) and topologically NPk (f ) = #EPk (f ), the number of essential periodic
points of f with minimal period k.
Theorem 3.3. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. Then
NPk (ϕ) = #IR(ϕk ).
Let f : Π\S → Π\S be a map on an infra-solvmanifold Π\S of type (R). Then
NPk (f ) = #EPk (f ).
Consider all periodic orbits h[α]m i of ϕ with m | k. A set S of periodic orbits
h[α]m i of ϕ with m | k is said to be a set of k-representatives if every essential orbit
h[β]m i with m | k is reducible to some element of S. Then the full Nielsen–Jiang
periodic number of period k is defined to be
(
)
X
NFk (ϕ) = min
d(A) | S is a set of k-representatives .
A∈S
Recall that all periodic orbits are essential, and every periodic orbit h[β]m i is
boosted to a periodic orbit h[α]k i. Hence to compute NFk (ϕ), we need first to
consider only R[ϕk ] and a set of representatives [αi ]k of the orbits in R[ϕk ]. Then
NFk (ϕ) is the sum of depths of all [αi ]n . Topologically, NFk (f ) is the sum of
minimal periods of all essential periodic point classes hxi in Fixe (f k ).
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
9
4. The Nielsen theory of iterations on an infra-solvmanifold of type
(R)
In this section, we shall assume that f : M → M is a continuous map on an
infra-solvmanifold M = Π\S of type (R) with holonomy group Φ. Then f admits
an affine homotopy lift (d, D) : S → S. Concerning the Nielsen numbers N (f k ) of
all iterates of f , we begin with the following facts:
Averaging Formula: ([33, Theorem 4.2])
N (f k ) =
1 X
| det(I − A∗ D∗k )|.
#Φ
A∈Φ
Gauss Congruences: ([15, Theorem 11.4])
X k
N (f d ) ≡ 0
µ
d
mod k.
d|k
Indeed, we have shown in [15, Theorem 11.4] that the left-hand side is non-negative
because it is equal to the number of isolated periodic points of f with least period
k. By [43, Lemma 2.1], the sequence {N (f k )} is exactly realizable.
Rationality of Nielsen zeta function: ([7, Theorem 4.5],[15])
!
∞
X
N (f k ) k
z
Nf (z) = exp
k
k=1
is a rational function with coefficients in Q.
Using these facts as our main tools, we study the asymptotic behavior of the
sequence {N (f k )}, the essential periodic orbits of f and the homotopy minimal
periods of f by using the Nielsen theory of maps f on infra-solvmanifolds of type
(R). We will give a brief description of the main results in this section whose details
and proofs can be found in [16].
Consider the sequences of algebraic multiplicities {Ak (f )} and Dold multiplicities
{Ik (f )} associated to the sequence {N (f k )}:
X k
1X
k
d
Ak (f ) =
µ
µ
N (f ), Ik (f ) =
N (f d ).
k
d
d
d|k
d|k
Then Ik (f ) = kAk (f ) and all Ak (f ) are integers by (DN). From the Möbius
inversion formula, we immediately have
X
(M)
d Ad (f ).
N (f k ) =
d|k
On the other hand, since Nf (0) = 1 by definition, z = 0 is not a zero nor a pole
of the rational function Nf (z). Thus we can write
Q
r
Y
(1 − βi z)
u(z)
= Qi
=
(1 − λi z)−ρi
Nf (z) =
v(z)
j (1 − γj z)
i=1
10
ALEXANDER FEL’SHTYN AND JONG BUM LEE
with all λi distinct nonzero algebraic integers (see for example [5] or [2, Theorem 2.1]) and ρi nonzero integers. This implies that
r(f )
N (f k ) =
X
ρi λki .
i=1
Note that r(f ) is the number of zeros and poles of Nf (z). Since Nf (z) is a homotopy
invariant, so is r(f ).
We define
λ(f ) = max{|λi | | i = 1, · · · , r(f )}.
The number λ(f ) will play a similar role as the “essential spectral radius” in [24]
or the “reduced spectral radius” in [2].
The following theorem shows that 1/λ(f ) is the “radius” of the Nielsen zeta
function Nf (z). Note also that λ(f ) is a homotopy invariant.
Theorem 4.1 ([16, Theorem 3.2]). Let f be a map on an infra-solvmanifold of type
(R) with an affine homotopy lift (d, D). Let R denote the radius of convergence of
the Nielsen zeta function Nf (z) of f . Then λ(f ) = 0 or λ(f ) ≥ 1, and
1
= λ(f ).
R
In particular, R > 0. If D∗ has no eigenvalue 1, then
^
1
= sp
D∗ = λ(f ).
R
Next, we recall the asymptotic behavior of the Nielsen numbers of iterates of
maps.
Theorem 4.2 ([16, Theorem 4.1]). For a map f of an infra-solvmanifold of type
(R), one of the following three possibilities holds:
(1) λ(f ) = 0, which occurs if and only if Nf (z) ≡ 1.
(2) The sequence
(f k )/λ(f )k } has the same limit points as a periodic seP {N
k
quence { j αj ǫj } where αj ∈ Z, ǫj ∈ C and ǫqj = 1 for some q > 0.
(3) The set of limit points of the sequence {N (f k )/λ(f )k } contains an interval.
In order to give an estimate from below for the number of essential periodic
orbits of maps on infra-solvmanifolds of type (R), we recall the following:
Theorem 4.3 ([45]). If f : M → M is a C 1 -map on a smooth compact
manifold
S
M and {L(f k )} is unbounded, then the set of periodic points of f , k Fix(f k ), is
infinite.
This theorem is not true for continuous maps. Consider the one-point compactification of the map of the complex plane f (z) = 2z 2 /||z||. This is a continuous
degree two map of S 2 with only two periodic points but with L(f k ) = 2k+1 .
However, when M is an infra-solvmanifold of type (R), the theorem is true for
all continuous maps f on M . In fact, using the averaging formula, we obtain
1 X
|L(f k )| ≤
| det(I − A∗ D∗k )| = N (f k ).
|Φ|
A∈Φ
k
If L(f ) is unbounded, then so is N (f k ) and hence the number of essential fixed
point classes of all f k is infinite.
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
11
Recall that any map f on an infra-solvmanifold of type (R) is homotopic to a
map f¯ induced by an affine map (d, D). By [15, Proposition 9.3], every essential
fixed point class of f¯ consists of a single element x with index sign det(I − dfx ).
Hence N (f ) = N (f¯) is the number of essential fixed point classes of f¯. It is a
classical fact that a homotopy between f and f¯ induces a one-one correspondence
between the fixed point classes of f and those of f¯, which is index preserving.
Consequently, we obtain
|L(f k )| ≤ N (f k ) ≤ #Fix(f k ).
This suggests the following conjectural inequality (see [44, 45]) for infra-solvmanifolds
of type (R):
1
1
lim sup log |L(f k )| ≤ lim sup log #Fix(f k ).
k→∞ k
k→∞ k
We denote by O(f, k) the set of all essential periodic orbits of f with length
≤ k. Thus O(f, k) = {hFi | F is a essential fixed point class of f m with m ≤ k}.
We can strengthen Theorem 4.3 as follows:
Theorem 4.4. Let f be a map on an infra-solvmanifold of type (R). Suppose that
the sequence N (f k ) is unbounded. Then there exists a natural number N0 such that
k ≥ N0 =⇒ #O(f, k) ≥
k − N0
.
r(f )
Proof. As mentioned earlier, we may assume that every essential fixed point class
F of any f k consists of a single element F = {x}. Denote by Fixe (f k ) the set of
essential fixed point (class) of f k . Thus N (f k ) = #Fixe (f k ). Recalling also that f
acts on the set Fixe (f k ) from the proof of [15, Theorem 11.4], we have
O(f, k) = {hxi | x is a essential periodic point of f with length ≤ k}.
Observe further that if x is an essential periodic point of f with least period p,
then x ∈ Fixe (f q ) if and only if p | q. The length of the orbit hxi of x is p, and
[
Fixe (f d ),
Fixe (f k ) =
d|k
Fixe (f d )
Recalling that
Am (f ) =
\
′
′
Fixe (f d ) = Fixe (f gcd(d,d ) ).
1 X m
1 X m
µ
µ
N (f k ) =
#Fixe (f k ),
m
k
m
k
k|m
k|m
Fixe (f i ) to be
1 X m
µ
# hxi ∩ Fixe (f k ) .
Am (f, hxi) =
m
k
we define Am (f, hxi) for any x ∈
S
i
k|m
Then we have
Am (f ) =
X
hxi
x∈Fixe (f m )
Am (f, hxi).
12
ALEXANDER FEL’SHTYN AND JONG BUM LEE
We begin with new notation. For a given integer k > 0 and x ∈
let
S
m
Fixe (f m ),
A(f, k) = {m ≤ k | Am (f ) 6= 0} ,
A(f, hxi) = {m | Am (f, hxi) 6= 0} .
Notice that if Am (f ) 6= 0 then there exists an essential periodic point x of f with
period m such that Am (f, hxi) 6= 0. Consequently, we have
[
A(f, hxi)
A(f, k) ⊂
hxi∈O(f,k)
Since N (f k ) is unbounded, we have that λ(f ) > 1 by the definition of λ(f ). By
[16, Corollary 4.6], there is N0 such that if n ≥ N0 then there is i with n ≤ i ≤
n + n(f ) − 1 such that Ai (f ) 6= 0. This leads to the estimate
#A(f, k) ≥
k − N0
n(f )
∀k ≥ N0 .
Assume that x has least period p. Then we have
1 X m
p X m
Am (f, hxi) =
µ
#hxi =
µ
.
m
n
m
n
p|n|m
p|n|m
Thus if m is not a multiple of p then by definition Am (f, hxi) = 0. It is clear that
′
′
Ap (f, hxi) = µ(1) = 1, i.e.,Pp ∈ A(f, hxi). Because
Pp | n | rp ′⇔ n = r p with r | r,
we have Arp (f, hxi) = 1/r p|n|rp µ(rp/n) = 1/r r′ |r µ(r/r ) which is 0 when and
only when r > 1. Consequently, A(f, hxi) = {p}.
In conclusion, we obtain the required inequality
k − N0
≤ #A(f, k) ≤ #O(f, k).
r(f )
Finally, we study (homotopy) minimal periods of maps f on infra-solvmanifolds
of type (R). We seek to determine HPer(f ) only from the knowledge of the sequence
{N (f k )}. This approach was used in [1, 19, 28] for maps on tori, in [25, 26, 23,
24, 35, 36] for maps on nilmanifolds and some solvmanifolds, and in [32, 34] for
expanding maps on infra-nilmanifolds.
Utilizing new results obtained from the Gauss congruences and the rationality
of the Nielsen zeta function, together with Dirichlet’s prime number theorem, we
obtain:
Theorem 4.5. Let f be a map on an infra-solvmanifold of type (R). Suppose
that the sequence {N (f k )/λ(f )k } is asymptotically periodic (i.e., Case (2) of Theorem 4.2). Then there exist m and an infinite sequence {pi } of primes such that
{mpi } ⊂ Per(f ). Furthermore, {mpi } ⊂ HPer(f ).
Next we recall that:
Theorem 4.6 ([22, Theorem 6.1]). Let f : M → M be a self-map on a compact
PL-manifold of dimension ≥ 3. Then f is homotopic to a map g with Pn (g) = ∅ if
and only if NPn (f ) = 0.
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
13
The infra-solvmanifolds of dimension 1 or 2 are the circle, the torus and the
Klein bottle. Theorem 4.6 for dimensions 1 and 2 is verified respectively in [3], [1]
and [38, 23, 31]. Hence we have
n ∈ HPer(f ) ⇐⇒ ∃ g ≃ f such that Pn (f ) 6= ∅
⇐⇒ NPn (f ) 6= 0
(Definition)
(Theorem 4.6)
⇐⇒ EPn (f ) 6= ∅ (Theorem 3.3)
⇐⇒ In (f ) 6= 0
([16, Proposition 5.4])
⇐⇒ An (f ) 6= 0
With the identity (M), we have the following result.
Theorem 4.7. Let f be a map on an infra-solvmanifold of type (R). Then
HPer(f ) = {k | Ak (f ) 6= 0} ⊂ {k | N (f k ) 6= 0}.
Moreover, if N (f k ) 6= 0, then there exists a divisor d of k such that d ∈ HPer(f ).
Corollary 4.8. Let f be a map on an infra-solvmanifold of type (R). Suppose that
the sequence {N (f k )} is strictly monotone increasing. Then HPer(f ) is cofinite.
Proof. By the assumption, we have λ(f ) > 1. Thus by [16, Theorem 4.4] (cf.
Theorem 7.3), there exist γ > 0 and N such that if k > N then there exists ℓ =
ℓ(k) < r(f ) such that N (f k−ℓ )/λ(f )k−ℓ > γ. Then for all k > N , the monotonicity
implies that
N (f k−ℓ )
N (f k−ℓ )
γ
γ
N (f k )
≥
=
≥
≥
.
k
k
λ(f )
λ(f )
λ(f )k−ℓ λ(f )ℓ
λ(f )ℓ
λ(f )r(f )
Applying [16, Proposition 4.5] (cf. Proposition 7.4) with ǫ = γ/λ(f )r(f ) , we see
that Ik (f ) 6= 0 and so Ak (f ) 6= 0 for all k sufficiently large. Now our assertion
follows from Theorem 4.7.
Remark 4.9. Note that in the above Corollary we may use the weaker assumption
that the sequence {N (f k )} is eventually strictly monotone increasing, i.e., there
exists k0 > 0 such that N (f k+1 ) > N (f k ) for all k ≥ k0 .
Thus the main result of [34] follows from Corollary 4.8.
Corollary 4.10 ([32, Theorem 4.6], [34, Theorem 3.2]). Let f be an expanding
map on an infra-nilmanifold. Then HPer(f ) is cofinite.
In [8], the authors also discussed homotopy minimal periods for hyperbolic maps
on infra-nilmanifolds. A map f on an infra-nilmanifold with affine homotopy lift
(d, D) is hyperbolic if D∗ has no eigenvalues of modulus 1. We now give another
proof of each of the main results, Theorems 3.9 and 3.16, in [8]. In our proof, we
use some useful results such as Lemma 3.7 and Proposition 3.14 in [8].
Theorem 4.11 ([8, Theorem 3.9]). If f is a hyperbolic map on an infra-nilmanifold
with affine homotopy lift (d, D) such that D∗ is not nilpotent, then HPer(f ) is
cofinite.
Proof. [8, Lemma 3.7] says that if f is such a map, then the sequence {N (f k )} is
eventually strictly monotone increasing; by our Corollary 4.8, HPer(f ) is cofinite.
14
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Theorem 4.12 ([8, Theorem 3.16]). If f is a hyperbolic map on an infra-nilmanifold
with affine homotopy lift (d, D) such that D∗ is nilpotent, then HPer(f ) = {1}.
Proof. If f is such a map, then by [8, Proposition 3.14] all N (f k ) = 1. Now because
of the identity (M), all Ad (f ) = 0 except A1 (f ) = N (f k ) = 1. Hence Theorem 4.7
implies that HPer(f ) = {1}.
5. Reidemeister numbers R(ϕk )
Concerning the Reidemeister numbers R(ϕk ) of all iterates of ϕ, we shall assume
that all R(ϕk ) are finite. Whenever all R(ϕn ) are finite, we can consider the
Reidemeister zeta function of ϕ
!
∞
X
R(ϕk ) k
z .
Rϕ (z) = exp
k
k=1
Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group Π with Π ⊂
Aff(S) = S ⋊ Aut(S), where S is a connected, simply connected solvable Lie group
of type (R). By Section 3, ϕ is a homomorphism induced by a self-map f on the
infra-solvmanifold Π\S of type (R). First we recall the following result.
Theorem 5.1 ([15, Theorem 11.4]). Let ϕ : Π → Π be an endomorphism on a polyBieberbach group Π such that all R(ϕk ) are finite. Then the sequences {R(ϕk )} and
{N (f k )} are exactly realizable and
X k
X k
µ
µ
(DN)
R(ϕd ) ≡
N (f d ) ≡ 0 mod k
d
d
d|k
d|k
for all k > 0.
Consider the sequences of algebraic multiplicities {Ak (f )} and Dold multiplicities
{Ik (f )} associated to the sequence {N (f k )}:
X k
k
1X
µ
µ
N (f d ), Ik (f ) =
N (f d ).
Ak (f ) =
k
d
d
d|k
d|k
Then Ik (f ) = kAk (f ) and all Ak (f ) are integers by (DN). From the Möbius
inversion formula, we immediately have
X
d Ad (f ).
N (f k ) =
d|k
Because we are assuming that all R(ϕk ) are finite, by Theorem 3.1, R(ϕk ) =
N (f k ). Consequently, we obtain the sequences of algebraic multiplicities {Ak (ϕ)}
and Dold multiplicities {Ik (ϕ)} associated to the sequence {R(ϕk )}. Thus Ik (ϕ) =
kAk (ϕ) and all Ak (ϕ) are integers. Furthermore, we immediately have R(ϕk ) =
P
d|k d Ad (ϕ).
Theorem 5.2 ([15, Theorem 7.8]). Let ϕ : Π → Π be an endomorphism on a
poly-Bieberbach group Π such that all R(ϕk ) are finite. Then the Reidemeister zeta
function of ϕ
!
∞
X
R(ϕk ) k
Rϕ (z) = exp
z
k
k=1
is a rational function.
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
15
Since Rϕ (0) = 1 by definition, z = 0 is not a zero nor a pole of the rational
function Rϕ (z). Thus we can write
Q
r
Y
u(z)
i (1 − βi z)
Q
(1 − λi z)−ρi
=
=
Rϕ (z) =
v(z)
j (1 − γj z)
i=1
with all λi distinct nonzero algebraic integers (see for example [5] or [2, Theorem 2.1]) and ρi nonzero integers. This implies that
r(ϕ)
k
(R1)
R(ϕ ) =
X
ρi λki .
i=1
Note that r(ϕ) is the number of zeros and poles of Rϕ (z). Since Rϕ (z) is a homotopy
invariant, so is r(ϕ).
Consider another generating function associated to the sequence {R(ϕk )}:
Sϕ (z) =
∞
X
R(ϕk )z k−1 .
k=1
Then it is easy to see that
Sϕ (z) =
d
log Rϕ (z).
dz
Moreover,
Sϕ (z) =
∞ r(ϕ)
X
X
r(ϕ)
ρi λki z k−1
=
X
i=1
k=1 i=1
ρi λi
1 − λi z
is a rational function with simple poles and integral residues, and 0 at infinity. The
rational function Sϕ (z) can be written as Sϕ (z) = u(z)/v(z) where the polynomials
u(z) and v(z) are of the form
u(z) = R(ϕ) +
s
X
ai z i ,
v(z) = 1 +
i=1
t
X
bj z j
j=1
with ai and bj integers, see (3) ⇒ (5), Theorem 2.1 in [2] or [24, Lemma 3.1.31]. Let
ṽ(z) be the conjugate polynomial of v(z), i.e., ṽ(z) = z t v(1/z). Then the numbers
{λi } are the roots of ṽ(z), and r(ϕ) = t.
The following can be found in the proof of (3) ⇒ (5), Theorem 2.1 in [2], see
also [16, Lemma 2.4].
Lemma 5.3. If λi and λj are roots of the rational polynomial ṽ(z) which are
algebraically conjugate (i.e., λi and λj are roots of the same irreducible polynomial),
then ρi = ρj .
Q
Let ṽ(z) = sα=1 ṽα (z) be the decomposition of the monic integral polynomial
P
ṽ(z) into irreducible polynomials ṽα (z) of degree rα . Of course, r = r(ϕ) = sα=1 rα
and
ṽ(z) = z r + b1 z r−1 + b2 z r−2 + · · · + br−1 z + br
=
s
Y
rα −1
rα −2
α
+ bα
+ · · · + bα
(z rα + bα
1z
2z
rα −1 z + brα ) =
α=1
s
Y
α=1
ṽα (z).
16
ALEXANDER FEL’SHTYN AND JONG BUM LEE
(α)
If {λi } are the roots of ṽα (z), then the associated ρ’s are the same ρα . Consequently, we can rewrite (R1) as
!
rα
s
X
X
(α)
(λi )k
R(ϕk ) =
ρα
α=1
=
X
ρα >0
ρ+
α
i=1
rα
X
(α)
(λi )k
i=1
Consider the rα × rα -integral square
0 0
1 0
Mα = ... ...
0 0
0 0
!
−
matrices
···
···
0
0
..
.
···
···
0
1
X
ρ−
α
ρα <0
rα
X
(α)
(λi )k
i=1
!
.
−bα
rα
−bα
rα −1
..
.
.
−bα
2
−bα
1
(α)
The characteristic polynomial is det(zI − Mα ) = ṽα (z)
P and therefore {λi } is the
set of eigenvalues of Mα . This implies that R(ϕk ) = sα=1 ρα tr Mαk . Set
M
M
M+ =
ρ+
M− =
ρ−
α Mα ,
α Mα .
ρα >0
ρα <0
Then
(R2)
k
k
R(ϕk ) = tr M+
− tr M−
= tr (M+
M
−M− )k .
We will show in Proposition 8.2 that if Ak (f ) 6= 0 then N (f k ) 6= 0 and hence
f has an essential periodic point of period k. In the following we investigate some
other necessary conditions under which N (f k ) 6= 0. Recall that
N (f k ) = the number of essential fixed point classes of f k .
If F is a fixed point class of f k , then f k (F) = F and the length of F is the smallest
number p for which f p (F) = F, written p(F). We denote by hFi the f -orbit of F,
i.e., hFi = {F, f (F), · · · , f p−1 (F)} where p = p(F). If F is essential, so is every f i (F)
and hFi is an essential periodic orbit of f with length p(F) and p(F) | k. These
are variations of Corollaries 2.3, 2.4 and 2.5 of [2].
Assuming that all R(ϕk ) are finite, we have
Corollary 5.4. If r(ϕ) 6= 0, then R(ϕi ) 6= 0 for some 1 ≤ i ≤ r(ϕ). In particular,
ϕ has an essential periodic orbit with the length p | i, i ≤ r(ϕ).
Pr(ϕ)
Recalling the identity R(ϕk ) = i=1 ρi λki , we define
r(ϕ)
X
X
X
ρi , M (ϕ) = max
ρi , −
ρj .
ρ(ϕ) =
i=1
ρi ≥0
ρj <0
Corollary 5.5. If ρ(ϕ) = 0 and r(ϕ) ≥ 1, then r(ϕ) ≥ 2 and R(ϕi ) 6= 0 for
some 1 ≤ i < r(ϕ). In particular, ϕ has an essential periodic orbit with the length
p | i, i ≤ r(ϕ) − 1.
Corollary 5.6. If r(ϕ) > 0, then R(ϕi ) 6= 0 for some 1 ≤ i ≤ M (ϕ). In particular,
ϕ has an essential periodic orbit with the length p | i, i ≤ M (ϕ).
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
17
6. Radius of convergence of Rϕ (z)
From the Cauchy–Hadamard formula, we can see that the radii R of convergence
of the infinite series Rϕ (z) and Sϕ (z) are the same and given by
1/k
R(ϕk )
1
= lim sup R(ϕk )1/k .
= lim sup
R
k
k→∞
k→∞
We will understand the radius R of convergence from the identity R(ϕk ) =
Pr(ϕ)
−1
k
are the poles or the zeros of the rational function
i=1 ρi λi . Recall that the λi
Rϕ (z). We define
λ(ϕ) = max{|λi | | i = 1, · · · , r(ϕ)}.
If r(ϕ) = 0, i.e., if R(ϕk ) = 0 for all k > 0, then Rϕ (z) ≡ 1 and 1/R = 0. In this
case, we define customarily λ(ϕ) = 0. We shall assume now that r(ϕ) 6= 0. In what
follows, when λ(ϕ) > 0, we consider
n(ϕ) = #{i | |λi | = λ(ϕ)}.
Pr(ϕ)
Remark that if λ(ϕ) < 1 then R(ϕk ) = i=1 ρi λki → 0 and so the sequence of
integers are eventually zero, i.e., R(ϕk ) = 0 for all k sufficiently large. This shows
that 1/R = 0 and furthermore, Rϕ (z) is the exponential of a polynomial. Hence
the rational function Rϕ (z) has no poles and zeros. This forces Rϕ (z) ≡ 1; hence
λ(ϕ) = 0 = 1/R.
Assume |λj | 6= λ(ϕ) for some j; then we have
k
X λi k
λi
R(ϕk ) X
=
ρ
+
ρ
,
lim
= ∞.
ρi
i
j
λj
λj
λkj
i6=j
i6=j
P
It follows from the above observations that 1/R = lim sup( i6=j ρi λki )1/k . ConseP
quently, we may assume that R(ϕk ) = j ρj λkj with all |λj | = λ(ϕ) and then we
have
1/k
1
= lim sup
R
X
|λj |=λ(ϕ)
ρj λkj
.
If λ(ϕ) > 1, then R(ϕk ) → ∞ and by L’Hopital’s rule we obtain
P
k
k
log
ρ
λ
j j j
1
log R(ϕ )
lim sup
= lim sup
= log λ(ϕ) ⇒
= λ(ϕ).
k
k
R
k→∞
k→∞
P
If λ(ϕ) = 1, then R(ϕk ) ≤ j |ρj | < ∞ is a bounded sequence and so it has a
convergent subsequence. If lim sup R(ϕk ) = 0, then R(ϕk ) = 0 for all k sufficiently
large and so by the same reason as above, λ(ϕ) = 0, a contradiction. Hence
lim sup R(ϕk ) is a finite nonzero integer and so 1/R = 1 = λ(ϕ).
Summing up, we have obtained that
Theorem 6.1. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
Π such that all R(ϕk ) are finite. Let R denote the radius of convergence of the
Reidemeister zeta function Rϕ (z) of ϕ. Then λ(ϕ) = 0 or λ(ϕ) ≥ 1, and
1
= λ(ϕ).
R
In particular, R > 0.
18
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Recall that
r(ϕ)
Sϕ (z) =
X
ρi λi
,
1 − λi z
i=1
r(ϕ)
Rϕ (z) =
Y
i=1
−ρi
(1 − λi z)
Q
ρ <0 (1
= Qj
− λj z)−ρj
ρi >0 (1
− λi z)ρi
.
These show that all of the 1/λi are the poles of Sϕ (z), whereas the 1/λi with
corresponding ρi > 0 are the poles of Rϕ (z). The radius of convergence of a power
series centered at a point a is equal to the distance from a to the nearest point where
the power series cannot be defined in a way that makes it holomorphic. Hence the
radius of convergence of Sϕ (z) is 1/λ(ϕ) and the radius of convergence of Rϕ (z) is
1/ max{|λi | | ρi > 0}. In particular, we have shown that
λ(ϕ) = max{|λi | | i = 1, · · · , r(ϕ)} = max{|λi | | ρi > 0}.
Theorem 6.2. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group Π
of S such that all R(ϕk ) are finite. Let R denote the radius of convergence of the
Reidemeister zeta function of ϕ. If ϕ is the semi-conjugate by an affine map (d, D)
on S and if D∗ has no eigenvalue 1, then
^
1
= sp
D∗ = λ(ϕ).
R
Proof. Recall
V that Rϕ (z) = Rf (z) and the radius R of convergence of Rf (z) satisfies
1/R = sp ( D∗ ) by [16, Theorem 3.4]. With Theorem 6.1, we obtain the required
assertion.
We recall that the asymptotic Reidemeister number of ϕ is defined to be
R∞ (ϕ) := max 1, lim sup R(ϕk )1/k .
k→∞
We also recall that the most widely used measure for the complexity of a dynamical
system is the topological entropy h(f ). A basic relation between these two numbers
is h(f ) ≥ log N ∞ (f ), which was found by Ivanov in [21]. There is a conjectural
inequality h(f ) ≥ log(sp(f )) raised by Shub [44]. This conjecture was proven for all
maps on infra-solvmanifolds of type (R), see [39, 40] and [15]. Consider a continuous
map f on a compact connected manifold M , and consider a homomorphism ϕ
induced by f of the group Π of covering transformations on the universal cover of
M . Since M is compact, Π is finitely generated. Let T = {τ1 , · · · , τn } be a set of
generators for Π. For any γ ∈ Π, let L(γ, T ) be the length of the shortest word in
the letters T ∪ T −1 which represents γ. For each k > 0, we put
Lk (ϕ, T ) = max L(ϕk (τi ), T ) | i = 1, · · · , n .
Then the algebraic entropy halg (f ) = halg (ϕ) of f or ϕ is defined as follows:
1
halg (f ) = lim log Lk (ϕ, T ).
k→∞ k
The algebraic entropy of f is well-defined, i.e., independent of the choices of a set
T of generators for Π and a homomorphism ϕ induced by f ([30, p. 114]). We refer
to [30] for the background. We recall that R. Bowen in [4] and A. Katok in [29],
among others, have proved that the topological entropy h(f ) of f is at least as large
as the algebraic entropy halg (ϕ) of ϕ. Furthermore, for any inner automorphism τγ0
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
19
by γ0 , we have halg (τγ0 ϕ) = halg (ϕ) ([30, Proposition 3.1.10]). Now we can make a
statement about the relations between R∞ (ϕ), λ(ϕ), h(f ) and halg (ϕ).
Corollary 6.3. Let ϕ : Π → Π be a homomorphism on a poly-Bieberbach group
Π of S and all R(ϕk ) are finite. Let (d, D) be an affine map on S such that
ϕ(α) ◦ (d, D) = (d, D) ◦ α for all α ∈ Π. Let f¯ be the map on Π\S induced by (d, D)
and let f be any map on Π\S which is homotopic to f¯. Then
^
R∞ (ϕ) = sp
D∗ = λ(ϕ),
halg (ϕ) = halg (f¯) = halg (f ) ≤ h(f¯) = log R∞ (ϕ) ≤ h(f ),
provided that 1 is not an eigenvalue of D∗ .
Proof. From [15,
V Theorem 4.3] and Theorem 6.2, we obtain the first assertion,
R∞ (ϕ) = sp ( D∗ ) = λ(ϕ). By [15, Theorem 5.2], h(f ) ≥ h(f¯) = log λ(ϕ) and
by the remark mentioned just above, we have that h(f¯) ≥ halg (f¯) = halg (f ) =
halg (ϕ).
Remark 6.4. The inequality
log R∞ (ϕ) ≥ halg (ϕ)
in Corollary 6.3 can be regarded as an algebraic analogue of the Ivanov inequality
h(f ) ≥ log N ∞ (f ).
7. Asymptotic behavior of the sequence {R(ϕk )}
In this section, we study the asymptotic behavior of the Reidemeister numbers
of iterates of maps on poly-Bieberbach groups.
Theorem 7.1. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. Then one of the following two possibilities holds:
(1) λ(ϕ) = 0, which occurs if and only if Rϕ (z) ≡ 1.
k
(2) The sequence
)/λ(ϕ)k } has the same limit points as a periodic seP {R(ϕ
k
quence { j αj ǫj } where αj ∈ Z, ǫj ∈ C and ǫqj = 1 for some q > 0.
(3) The set of limit points of the sequence {R(ϕk )/λ(ϕ)k } contains an interval.
V
In Theorem 6.2, we showed that if D∗ has no eigenvalue 1 then λ(ϕ) = sp( D∗ ).
In fact, we have the following:
Lemma 7.2. Let ϕ be a homomorphism on a poly-Bieberbach group Π of S and
let ϕ be the
V semi-conjugate by an affine map (d, D) on S. If λ(ϕ) ≥ 1, then
λ(ϕ) = sp( D∗ ).
It is important to know not only the rate of growth of the sequence {R(ϕk )} but
also the frequency with which the largest Reidemeister number is encountered. The
following theorem shows that this sequence grows relatively densely. The following
are variations of Theorem 2.7, Proposition 2.8 and Corollary 2.9 of [2].
Theorem 7.3. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group Π
such that all R(ϕk ) are finite. If λ(ϕ) ≥ 1, then there exist γ > 0 and a natural
number N such that for any m > N there is an ℓ ∈ {0, 1, · · · , n(ϕ) − 1} such that
R(ϕm+ℓ )/λ(ϕ)m+ℓ > γ.
20
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Proposition 7.4. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite and such that λ(ϕ) > 1. Then for any ǫ > 0, there
exists N such that if R(ϕm )/λ(ϕ)m ≥ ǫ for m > N , then the Dold multiplicity
Im (ϕ) satisfies
ǫ
|Im (ϕ)| ≥ λ(ϕ)m .
2
Theorem 7.3 and Proposition 7.4 immediately imply the following:
Corollary 7.5. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite and such that λ(ϕ) > 1. Then there exist γ > 0 and a
natural number N such that if m ≥ N then there exists ℓ with 0 ≤ ℓ ≤ n(ϕ)−1 such
that |Im+ℓ (ϕ)|/λ(ϕ)m+ℓ ≥ γ/2. In particular Im+ℓ (ϕ) 6= 0 and so Am+ℓ (ϕ) 6= 0.
Remark 7.6. We can state a little bit more about the density of the set of algebraic
periods A(ϕ) = {m ∈ N | Am (ϕ) 6= 0}. We consider the notion of the lower
density DA(ϕ) of the set A(ϕ) ⊂ N:
DA(ϕ) = lim inf
k→∞
#(A(ϕ) ∩ [1, k])
.
k
By Corollary 7.5, when λ(ϕ) > 1, we have DA(ϕ) ≥ 1/n(ϕ). On the other hand,
Theorem 7.1 implies the following: If λ(ϕ) = 0 then R(ϕk ) = 0 for all k > 0; by
Theorem 4.7 Ak (ϕ) = 0 for all k > 0, hence DA(ϕ) = ∅. Consider Case (2) of
Theorem 7.1, that is, the sequence {R(ϕk )/λ(ϕ)k } has the same limit points as
Pn(ϕ)
the periodic sequence { j=1 ρj e2iπ(kθj ) } of period q = LCM(q1 , · · · , qn(ϕ) ). By
Theorem 7.3, we have DA(ϕ) ≥ 1/q. Finally considerP
Case (3). Then the sequence
k
k
{R(ϕ )/λ(ϕ) } asymptotically has a subsequence { j∈S ρj e2iπ(kθj ) } where S =
{j1 , · · · , js } and {θj1 , · · · , θjs , 1} is linearly independent over the integers. Therefore
by [6, Theorem 6, p. 91], the sequence (kθj1 , · · · , kθjs ) is uniformly distributed. It
follows that DA(ϕ) = 1.
8. Periodic [ϕ]-orbits
In this section, we shall give an estimate from below the number of periodic
[ϕ]-orbits of an endomorphism ϕ on a poly-Bieberbach group based on facts discussed in Section 3. We keep in mind that all periodic classes are essential, see
Proposition 3.2.
We denote by O([ϕ], k) the set of all (essential) periodic orbits of [ϕ] with length
≤ k. Thus
O([ϕ], k) = {h[α]m i | α ∈ Π, m ≤ k}.
Recalling from Section 3 that O([ϕ], k) = O(f, k), we can restate Theorem 4.4 as
follows:
Theorem 8.1. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. Suppose that the sequence R(ϕk ) is unbounded. Then
there exists a natural number N0 such that
k ≥ N0 =⇒ #O([ϕ], k) ≥
k − N0
.
r(ϕ)
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
21
Proposition 8.2. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. For every k > 0, we have
X k
k
R(ϕd ) = Ik (ϕ).
µ
#IR(ϕ ) =
d
d|k
Proof. We apply the Möbius inversion formula to the identity
X
#IR(ϕd )
R(ϕk ) =
d|k
k
in Section 3 to obtain #IR(ϕ ) =
multiplicity Ik (ϕ).
P
d|k
µ
k
d
R(ϕd ), which is exactly the Dold
Definition 8.3. When all R(ϕk ) are finite, we consider the mod 2 reduction of
the Reidemeister number R(ϕk ) of f k , written R(2) (ϕk ). A positive integer k is a
R(2) -period of ϕ if R(2) (ϕk+i ) = R(2) (ϕi ) for all i ≥ 1. We denote the minimal
R(2) -period of ϕ by α(2) (ϕ).
Proposition 8.4 ([41, Proposition 1]). Let p be a prime number and let A be a
square matrix with entries in the field Fp . Then there exists k with (p, k) = 1 such
that
tr Ak+i = tr Ai
for all i ≥ 1.
k
k
Recalling (R2): R(ϕk ) = N (f k ) = tr M+
− tr M−
= tr (M+ ⊕ −M− )k , we can
(2)
(2)
see easily that the minimal R -period α (ϕ) always exists and must be an odd
number.
Now we obtain a result which resembles [41, Theorem 2].
Theorem 8.5. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. Let k > 0 be an odd number. Suppose that α(2) (ϕ)2 | k
or p | k where p is a prime such that p ≡ 2i mod α(2) (ϕ) for some i ≥ 0. Then
#IR(ϕk )
NPk (ϕ)
=
k
k
is even.
9. Heights of ϕ
In this section, we study (homotopy) heights HI(ϕ) = H(ϕ) of Reidemeister
classes of endomorphisms ϕ on poly-Bieberbach groups. We wish to determine the
set H(ϕ) of all heights only from the knowledge of the sequence {R(ϕk )}. Recalling
Pr(ϕ)
that when all R(ϕk ) are finite, R(ϕk ) = i=1
ρi λki and λ(ϕ) = max{|λi | | i =
1, · · · , r(ϕ)}, we define
X
1 |λ| k
ρi λki , R̃|λ| (ϕk ) =
R|λ| (ϕk ) =
R (ϕ ).
|λ|k
|λi |=|λ|
Lemma 9.1. When all R(ϕk ) are finite, if λ(ϕ) ≥ 1, then we have
lim sup
k→∞
R(ϕk )
= lim sup |R̃λ(ϕ) (ϕk )|.
λ(ϕ)k
k→∞
22
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Proof. We have
1
R(ϕk )
= R̃λ(ϕ) (f k ) +
k
λ(ϕ)
λ(ϕ)k
X
ρi λki .
|λi |<λ(ϕ)
Since for |λi | < λ(ϕ), lim λki /λ(ϕ)k = 0, it follows that the proof is completed.
Theorem 9.2. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. Suppose that the sequence R(ϕk )/λ(ϕ)k is asymptotically periodic. Then there exist an integer m > 0 and an infinite sequence {pi }
of primes such that {mpi } ⊂ H(ϕ).
Proof. Since the sequence R(ϕk ) is unbounded, by Theorem 7.1, there exists q
such that all λi /|λi | with |λi | = λ(ϕ) are roots of unity of degree q, and the sequence {R̃λ(ϕ) (ϕk )} is periodic and nonzero, because lim supk→∞ |R̃λ(ϕ) (ϕk )| >
0 by Lemma 9.1. Consequently, there exists m with 1 ≤ m ≤ q such that
R̃λ(ϕ) (ϕm ) 6= 0.
Let ψ = ϕm . Then λ(ψ) = λ(ϕm ) = λ(ϕ)m ≥ 1. The periodicity R̃λ(ϕ) (ϕm+ℓq ) =
λ(ϕ)
R̃
(ϕm ) implies that R̃λ(ψ) (ψ 1+ℓq ) = R̃λ(ψ) (ψ) for all ℓ > 0. By Lemma 9.1 or
Theorem 7.1, we can see that there exists γ > 0 such that R(ψ 1+ℓq ) ≥ γλ(ψ)1+ℓq >
0 for all ℓ sufficiently large. From Proposition 7.4 it follows that the Dold multiplicity I1+ℓq (ψ) satisfies |I1+ℓq (ψ)| ≥ (γ/2)λ(ψ)1+ℓq when ℓ is sufficiently large.
According to Dirichlet prime number theorem, since (1, q) = 1, there are infinitely many primes p of the form 1 + ℓq. Consider all primes pi satisfying
|Ipi (ψ)| ≥ (γ/2)λ(ψ)pi .
By Proposition 8.2, #IR(ψ pi ) = Ipi (ψ) > 0, each pi is the height of some (essential) Reidemeister class [α]pi ∈ R[ψ pi ]. That is, [α]pi is an irreducible Reidemeister
class of ψ pi . Consider the Reidemeister class [α]mpi determined by α of ϕmpi . Let
di be the depth of the Reidemeister class [α]mpi ∈ R[ϕmpi ]. Then di = mi pi for
some mi | m and so there is an irreducible Reidemeister class [β]di ∈ R[ϕdi ] which is
boosted to [α]mpi . This means that di is the height of [β]di . Choose a subsequence
{mik } of the sequence {mi } bounded by m which is constant, say m0 . Consequently,
the infinite sequence {m0 pik } consists of heights of ϕ, or {m0 pi } ⊂ H(ϕ).
In the proof of Theorem 9.2, we have shown the following, which proves that the
algebraic period is a (homotopy) height when it is a prime number.
Corollary 9.3. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. For all primes p, if Ap (ϕ) 6= 0 then p ∈ H(ϕ).
Corollary 9.4. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. If the sequence {R(ϕk )} is strictly monotone increasing, then there exists N such that the set H(ϕ) contains all primes larger than
N.
Proof. By the assumption, we have λ(ϕ) > 1. Thus by Theorem 7.3, there exist
γ > 0 and N such that if k > N then there exists ℓ = ℓ(k) < r(ϕ) such that
R(ϕk−ℓ )/λ(ϕ)k−ℓ > γ. Then for all k > N , the monotonicity gives
R(ϕk )
R(ϕk−ℓ )
R(ϕk−ℓ )
γ
γ
.
≥
=
≥
≥
λ(ϕ)k
λ(ϕ)k
λ(ϕ)k−ℓ λ(ϕ)ℓ
λ(ϕ)ℓ
λ(ϕ)r(ϕ)
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
23
Applying Proposition 7.4 with ǫ = γ/λ(ϕ)r(ϕ) , we see that Ik (ϕ) 6= 0 and so
Ak (ϕ) 6= 0 for all k sufficiently large. Now our assertion follows from Corollary 9.3.
Example 9.5. There are examples of groups and endomorphisms satisfying the
conditions of the above Corollary. The simplest one is the endomorphism ϕ : Z → Z
such that ϕ(1) = d. Then ϕk (1) = dk and so R(ϕk ) = |1 − dk | for all k > 0. When
d ≥ 2, it is easy to see that all R(ϕk ) are finite and the sequence {R(ϕk )} is strictly
increasing.
By a direct computation, we can show that
{1}
if d = 0 or −1
∅
if d = 1
H(ϕ) =
N − {2} if d = −2
N
if d ≥ 2 or d ≤ −3.
In fact, when d = 1, all the Reidemeister classes are inessential and hence by
definition H(ϕ) = ∅. For another instance, consider the case d = −2. For any
k ≥ 1, ϕk (1) = (−2)k and so the Reidemeister class [n]k ∈ R[ϕk ] is
[n]k = {m + n − (−2)k m | m ∈ Z} = n + (1 − (−2)k )Z.
Since ι1,2 ([n]1 ) = [n + ϕ(n)]2 = [n − 2n]2 = [−n]2 , it follows that 2 ∈
/ H(ϕ). Next,
we remark that
ιk,ℓ ([n]k ) = [n + ϕk (n) + · · · + ϕℓ−k (n)]ℓ
= [(1 + (−2)k + · · · + (−2)ℓ−k )n]ℓ
ℓ
1 − (−2)ℓ
n
.
=
1 − (−2)k
For 0 ≤ n < |1 − (−2)k |, when ℓ 6= 2 we see that
1 − (−2)ℓ
6= 1,
1 − (−2)k
0≤
1 − (−2)ℓ
n < |1 − (−2)ℓ |.
1 − (−2)k
This implies that if ℓ 6= 2 then ℓ ∈ H(ϕ). Consequently, H(ϕ) = N − {2}. Now the
remaining cases can be treated in a similar way and we omit a detailed computation.
An endomorphism ϕ : Π → Π is essentially reducible if any Reidemeister class
of ϕk being boosted to an essential Reidemeister of ϕkn is essential, for any positive
integers k and n. The group Π is essentially reducible if every endomorphism
on Π is essentially reducible.
Lemma 9.6 ([16, Lemma 6.7]). Every poly-Bieberbach group is essentially reducible.
This means that for any n, if [α]n is essential and if ιm,n ([β]m ) = [α]n then [β]m
is essential.
Lemma 9.7 ([1, Proposition 2.2]). Let ϕ : Π → Π be an endomorphism such that
all R(ϕk ) are finite. If
X
R(ϕk ) < R(ϕm ),
m
k :
prime
then ϕ has a periodic Reidemeister class with height m, i.e., m ∈ H(ϕ).
24
ALEXANDER FEL’SHTYN AND JONG BUM LEE
Proof. Let r = R(ϕm ) and let [α1 ]m , · · · , [αr ]m be the Reidemeister classes of ϕm .
If some [αj ]m is irreducible, then we are done. So assume no [αj ]n is irreducible.
Then, for each j, there is a kj so that m/k
[αj ]m is reducible to [βj ]kj ∈
Pj is prime and
k
m
kj
R[ϕ ]. But this shows that R(ϕ ) ≤ m :prime R(ϕ ), a contradiction.
k
We can not only extend but also strengthen Corollary 9.4 as follows:
Proposition 9.8. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach
group such that all R(ϕk ) are finite. Suppose that the sequence {R(ϕk )} is strictly
monotone increasing. Then:
(1) All primes belong to H(ϕ).
(2) There exists N such that if p is a prime > N then {pn | n ∈ N} ⊂ H(ϕ).
Proof. Observe that for any prime p
X
R(ϕp ) −
R(ϕk ) = R(ϕp ) − R(ϕ) = Ip (ϕ).
p
k:
prime
The strict monotonicity implies Ap (ϕ) = pIp (ϕ) > 0, and hence p ∈ H(ϕ), which
proves (1).
Under the same assumption, we have shown in the proof of Corollary 9.4 that
there exists N such that k > N ⇒ Ik (ϕ) > 0. Let p be a prime > N and n ∈ N.
Then
n
X
X
n−1
n
Ipi (ϕ) − R(ϕp ) = Ipn (ϕ) > 0.
R(ϕp ) −
R(ϕk ) =
pn
k
: prime
i=0
By Lemma 9.7, we have pn ∈ H(ϕ), which proves (2).
In Remark 7.6, we made a statement about the lower density DA(ϕ) of the set
of algebraic periods A(ϕ) = {m ∈ N | Am (ϕ) 6= 0}. We can consider as well the
lower density of the set H(ϕ) of heights, see also [37], [20] and [16]:
DH(ϕ) = lim inf
k→∞
#(H(ϕ) ∩ [1, k])
.
k
Since Ik (ϕ) = #IR(ϕk ) by Proposition 8.2, it follows that A(ϕ) ⊂ HI(ϕ) = H(ϕ).
Hence we have DA(ϕ) ≤ DH(ϕ).
Corollary 9.9. Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group
such that all R(ϕk ) are finite. Suppose that the sequence {R(ϕk )} is strictly monotone increasing. Then H(ϕ) is cofinite and DA(ϕ) = DH(ϕ) = 1.
Proof. Under the same assumption, we have shown in the proof of Corollary 9.4
that there exists N such that if k > N then Ik (ϕ) > 0. This means IR(ϕk ) is
nonempty by Proposition 8.2 and hence k ∈ H(ϕ).
Let ϕ : Π → Π be an endomorphism on a poly-Bieberbach group Π of S such
that all R(ϕk ) are finite. When ϕ is the semi-conjugate by an affine map (d, D) on
S, we say that ϕ is expanding if all the eigenvalues of D∗ have modulus > 1.
Now we can prove the main result of [34].
Corollary 9.10 ([32, Theorem 4.6], [34, Theorem 3.2]). Let ϕ be an expanding
endomorphism on an almost Bieberbach group. Then HPer(ϕ) is cofinite.
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
25
V
Proof. Since ϕ is expanding, we have that λ(ϕ) = sp( D∗ ) > 1. For any k > 0,
we can write R(ϕk ) = Γk + Ωk , where
r(ϕ)
n(ϕ)
X
X
ρi λki with |λi | < λ(ϕ).
ρj e2iπ(kθj ) , Ωk =
Γk = λ(ϕ)k
j=1
i=n(ϕ)+1
Here Ωk → 0 and Γk → ∞ as k → ∞. This implies that R(ϕk ) is eventually strictly
monotone increasing. We can use Corollary 9.4 and then Corollary 9.9 to conclude
the assertion.
References
[1] L. Alsedà, S. Baldwin, J. Llibre, R. Swanson and W. Szlenk, Minimal sets of periods for torus
maps via Nielsen numbers, Pacific J. Math., 169 (1995), 1–32.
[2] I. K. Babenko and S. A. Bogatyı̌, The behavior of the index of periodic points under iterations
of a mapping, Izv. Akad. Nauk SSSR Ser. Mat., 55 (1991), 3–31 (Russian); translation in
Math. USSR-Izv., 38 (1992), 1–26.
[3] L. Block, J. Guckenheimer, M. Misiurewicz and L. S. Young, Periodic points and topological
entropy of one-dimensional maps, Global theory of dynamical systems (Proc. Internat. Conf.,
Northwestern Univ., Evanston, Ill., 1979), pp. 18–34, Lecture Notes in Math., 819, Springer,
Berlin, 1980.
[4] R. Bowen, Entropy and the fundamental group, The structure of attractors in dynamical
systems (Proc. Conf., North Dakota State Univ., Fargo, N.D., 1977), pp. 21–29, Lecture
Notes in Math., Vol. 668, Springer, Berlin, 1978.
[5] R. Bowen and O. E. Lanford, III, Zeta functions of restrictions of the shift transformation,
1970 Global Analysis (Proc. Sympos. Pure Math., Vol. XIV, Berkeley, Calif., 1968) pp. 43–49
Amer. Math. Soc., Providence, R.I.
[6] K. Chandrasekharan, Introduction to analytic number theory, Die Grundlehren der mathematischen Wissenschaften, Band 148, Springer-Verlag New York Inc., New York, 1968.
[7] K. Dekimpe and G.-J. Dugardein, Nielsen zeta functions for maps on infra-nilmanifolds are
rational, to appear in J. Fixed Point Theory Appl. (arXiv:1302.5512).
[8] K. Dekimpe and G.-J. Dugardein, A note on homotopy minimal periods for hyperbolic maps
on infra-nilmanifolds, (arXiv:1408.5579).
[9] A. Dold, Fixed point indices of iterated maps, Invent. Math., 74 (1983), 419–435.
[10] F. Farrell and L. Jones, Classical aspherical manifolds, CBMS Regional Conference Series in
Mathematics 75, Amer. Math. Soc., Providence, RI, 1990.
[11] A. L. Fel’shtyn, New zeta function in dynamic, in Tenth Internat. Conf. on Nonlinear Oscillations, Varna, Abstracts of Papers, B, 1984.
[12] A. L. Fel’shtyn, New zeta functions for dynamical systems and Nielsen fixed point theory,
Lecture Notes in Math., 1346, Springer, 1988, 33–55.
[13] A. L. Fel’shtyn, The Reidemeister zeta function and the computation of the Nielsen zeta
function, Colloq. Math., 62, (1991), 153–166.
[14] A. Fel’shtyn, Dynamical zeta functions, Nielsen theory and Reidemeister torsion, Mem. Amer.
Math. Soc., 699, Amer. Math. Soc., Providence, R.I., 2000.
[15] A. Fel’shtyn and J. B. Lee, The Nielsen and Reidemeister numbers of maps on infrasolvmanifolds of type (R), Topology Appl., 181 (2015), 62–103.
[16] A. Fel’shtyn and J. B. Lee, The Nielsen numbers of iterations of maps on infra-solvmanifolds
of type (R) and periodic orbits, (arXiv:1403.7631).
[17] A. Fel’shtyn and E. Troitsky, Twisted Burnside-Frobenius theory for discrete groups, J. reine
Angew. Math., 613 (2007), 193–210.
[18] A. Fel’shtyn and E. Troitsky, Geometry of Reidemeister classes and twisted Burnside theorem,
J. K-Theory, 2 (2008), 463–506.
[19] B. Halpern, Periodic points on tori, Pacific J. Math., 83 (1979), 117–133.
[20] J. W. Hoffman, Z. Liang, Y. Sakai and X. Zhao, Homotopy minimal period self-maps on flat
manifolds, Adv. Math., 248 (2013), 324–334.
[21] N. V. Ivanov, Entropy and the Nielsen numbers. Dokl. Akad. Nauk SSSR 265 (2) (1982),
284-287 (in Russian); English transl.: Soviet Math. Dokl. 26 (1982), 63–66.
26
ALEXANDER FEL’SHTYN AND JONG BUM LEE
[22] J. Jezierski, Wecken theorem for fixed and periodic points, Handbook of Topological Fixed
Point Theory, 555–615, Springer, Dordrecht, 2005.
[23] J. Jezierski, J. Kȩdra and W. Marzantowicz, Homotopy minimal periods for solvmanifolds
maps, Topology Appl., 144 (2004), 29–49.
[24] J. Jezierski and W. Marzantowicz, Homotopy methods in topological fixed and periodic points
theory, Topological Fixed Point Theory and Its Applications, 3, Springer, Dordrecht, 2006.
[25] J. Jezierski and W. Marzantowicz, Homotopy minimal periods for nilmanifolds maps,
Math. Z., 239 (2002), 381–414.
[26] J. Jezierski and W. Marzantowicz, Homotopy minimal periods for maps of three dimensional
nilmanifolds, Pacific J. Math., 209 (2003), 85–101.
[27] B. Jiang, Lectures on Nielsen fixed point theory, Contemp. Math., 14, Amer. Math. Soc.,
Providence, R.I., 1983.
[28] B. Jiang and J. Llibre, Minimal sets of periods for torus maps, Discrete Contin. Dynam.
Systems, 4 (1998), 301–320.
[29] A. B. Katok, The entropy conjecture(Russian), Smooth dynamical systems(Russian), pp.181–
203. Izdat. “Mir”, Moscow, 1977.
[30] A. Katok and B. Hasselblatt, Introduction to the modern theory of dynamical systems, Encyclopedia of Mathematics and its Applications, 54, Cambridge University Press, Cambridge,
1995.
[31] J. Y. Kim, S. S. Kim and X. Zhao, Minimal sets of periods for maps on the Klein bottle, J.
Korean Math. Soc., 45 (2008), 883–902.
[32] J. B. Lee and K. B. Lee, Lefschetz numbers for continuous maps, and periods for expanding
maps on infra-nilmanifolds, J. Geom. Phys., 56 (2006), 2011–2023.
[33] J. B. Lee and K. B. Lee, Averaging formula for Nielsen numbers of maps on infra-solvmanifolds
of type (R), Nagoya Math. J., 196 (2009), 117–134.
[34] J. B. Lee and X. Zhao, Homotopy minimal periods for expanding maps on infra-nilmanifolds,
J. Math. Soc. Japan, 59 (2007), 179–184.
[35] J. B. Lee and X. Zhao, Nielsen type numbers and homotopy minimal periods for maps on
the 3-nilmanifolds, Sci. China Ser. A, 51 (2008), 351–360.
[36] J. B. Lee and X. Zhao, Nielsen type numbers and homotopy minimal periods for maps on
the 3-solvmanifolds, Algebr. Geom. Topol., 8 (2008), 563–580.
[37] J. B. Lee and X. Zhao, Density of the homotopy minimal periods of maps on infrasolvmanifolds, arXiv:1404.5114.
[38] J. Llibre, A note on the set of periods for Klein bottle maps, Pacific J. Math., 157 (1993),
87–93.
[39] W. Marzantowicz and F. Przytycki, Entropy conjecture for continuous maps of nilmanifolds,
Israel J. Math., 165 (2008), 349–379.
[40] W. Marzantowicz and F. Przytycki, Estimates of the topological entropy from below for
continuous self-maps on some compact manifolds, Discrete Contin. Dyn. Syst., 21 (2008),
501–512.
[41] T. Matsuoka, The number of periodic points of smooth maps, Ergod. Th. & Dynam. Sys., 9
(1989), 153–163.
[42] V. B. Pilyugina and A. L. Fel’shtyn, The Nielsen zeta function, Funktsional. Anal. i Prilozhen.,
19 (1985) 61–67 (in Russian); English transl.: Functional Anal. Appl., 19, (1985) 300–305.
[43] Y. Puri and T. Ward, Arithmetic and growth of periodic orbits, J. Integer Seq., 4 (2001),
Article 01.2.1, 18 pp.
[44] M. Shub, Dynamical systems, filtrations and entropy, Bull. Amer. Math. Soc., 80 (1974),
27–41.
[45] M. Shub and D. Sullivan, A remark on the Lefschetz fixed point formula for differentiable
maps, Topology, 13 (1974), 189–191.
[46] B. Wilking, Rigidity of group actions on solvable Lie groups, Math. Ann., 317 (2000), 195–
237.
THE NIELSEN AND REIDEMEISTER THEORIES OF ITERATIONS
27
Instytut Matematyki, Uniwersytet Szczecinski, ul. Wielkopolska 15, 70-451 Szczecin,
Poland
E-mail address: [email protected]
Department of mathematics, Sogang University, Seoul 121-742, KOREA
E-mail address: [email protected]
| 4math.GR
|
KOSZUL ALMOST COMPLETE INTERSECTIONS
arXiv:1801.00763v1 [math.AC] 2 Jan 2018
MATTHEW MASTROENI
Abstract. Let R = S/I be a quotient of a standard graded polynomial ring
S by an ideal I generated by quadrics. If R is Koszul, a question of Avramov,
Conca, and Iyengar asks whether the Betti numbers of R over S can be bounded
above by binomial coefficients on the minimal number of generators of I. Motivated by previous results for Koszul algebras defined by three quadrics, we give
a complete classification of the structure of Koszul almost complete intersections
and, in the process, give an affirmative answer to the above question for all such
rings.
1. Introduction
Let k be a field, S be a standard graded polynomial ring over k, I ⊆ S be a
graded ideal, and R = S/I. We say that R is a Koszul algebra if k ∼
= R/R+ has
a linear free resolution over R. Many rings arising from algebraic geometry are
Koszul, including the coordinate rings of Grassmannians [Kem90], sets of r ≤ 2n
points in general position in Pn [Kem92], and canonical embeddings of smooth
curves under mild restrictions [Pol95], as well as all suitably high Veronese subrings of any standard graded algebra [Bac86]. However, the simplest examples
of Koszul algebras, due to Fröberg [Fro75], are quotients by quadratic monomial
ideals, and a guiding heuristic in the study of Koszul algebras has been that any
reasonable property of algebras defined by quadratic monomial ideals should also
hold for Koszul algebras; for example, see [ACI10], [Con14], [ACI15]. Among such
properties, considering the Taylor resolution for an algebra defined by a quadratic
monomial ideal leads to the following question about the Betti numbers of a Koszul
algebra.
Question 1.1 ([ACI10, 6.5]). If R is Koszul and I is minimally generated by g
elements, does the following inequality hold for all i?
g
S
βi (R) ≤
i
In particular, is pdS R ≤ g?
Key words and phrases. Betti numbers, Koszul algebras, almost complete intersections.
1
2
MATTHEW MASTROENI
The above questions are known to have affirmative answers when R is LGquadratic (see next section) and for arbitrary Koszul algebras when g ≤ 3 by
[BHI16, 4.5]. Recall that R or I is called an almost complete intersection if I
is minimally generated by ht I + 1 elements. The motivation for studying Koszul
almost complete intersections comes from the fact that the above question is easily
seen to have an affirmative answer when I is a complete intersection or has height
one so that the interesting case for Koszul algebras defined by three quadrics is
precisely when I is an almost complete intersection. Our main results (3.1, 3.3, 3.4,
4.3) show that Question 1.1 has an affirmative answer for Koszul almost complete
intersections generated by any number of quadrics; they are summarized in the
theorem below.
Main Theorem. Let R = S/I be a Koszul almost complete intersection with I
S
minimally generated by g + 1 quadrics for some g ≥ 1. Then β2,3
(R) ≤ 2, and:
S
(a) If β2,3
(R) = 1, then I = (xz, zw, q3 , . . . , qg+1 ) for some linear forms x, z,
and w and some regular sequence of quadrics q3 , . . . , qg+1 on S/(xz, zw).
S
(b) If β2,3
(R) = 2, then I = I2 (M) + (q4 , . . . , qg+1 ) for some 3 × 2 matrix of
linear forms M with ht I2 (M) = 2 and some regular sequence of quadrics
q4 , . . . , qg+1 on S/I2 (M).
Furthermore, R is LG-quadratic and, therefore, satisfies βiS (R) ≤
g+1
i
for all i.
The division of the rest of the paper is as follows. We recount various properties
and examples of Koszul algebras and their Betti tables in §2 which will be important in the sequel. In §3, we determine the structure of Koszul almost complete
intersections with either one or two linear second syzygies. We then complete the
classification of Koszul almost complete intersections in §4 by showing that every
quadratic almost complete intersection has at most two linear second syzygies.
Notation. Throughout the remainder of the paper, the following notation will
be in force unless specifically stated otherwise. Let k be a fixed ground field of
arbitrary characteristic, S be a standard graded polynomial ring over k, I ⊆ S be
a proper graded ideal, and R = S/I. Recall that the ideal I is called nondegenerate
if it does not contain any linear forms. We can always reduce to a presentation for
R with I nondegenerate by killing a basis for the linear forms contained in I, and
we will assume that this is the case throughout. We denote the irrelevant ideal of
L
R by R+ = n≥1 Rn .
KOSZUL ALMOST COMPLETE INTERSECTIONS
3
2. Koszul Algebras and Their Betti Tables
If R is a Koszul algebra, it is well-known that its defining ideal I must be
generated by quadrics, but not every ideal generated by quadrics defines a Koszul
algebra. We have already noted in the introduction that every quadratic monomial
ideal defines a Koszul algebra. More generally, we say that R or I is G-quadratic
if, after a suitable linear change of coordinates ϕ : S → S, the ideal ϕ(I) has a
Gröbner basis consisting of quadrics. We also say that R or I is LG-quadratic
if R is a quotient of a G-quadratic algebra A by an A-sequence of linear forms.
Every G-quadratic algebra is Koszul by upper semicontinuity of the Betti numbers; see [BC03, 3.13]. It then follows from Proposition 2.4 below that every
LG-quadratic algebra is also Koszul. In particular, every complete intersection
generated by quadrics is LG-quadratic by an argument due to Caviglia. Indeed, if
R = S/(q1 , . . . , qg ) where q1 , . . . , qg is a regular sequence of quadrics, we can take
A = S[y1, . . . , yg ]/(y12 + q1 , . . . , yg2 + qg ) so that A/(y1 , . . . , yg ) ∼
= R. By choosing a
monomial order in which the yi are greater than every monomial in the variables
of S, it follows from [Eis95, 15.15] that A is G-quadratic and that the yi2 + qi form
a regular sequence so that htA (y1 , . . . , yg ) = dim A − dim R = dim S − dim R = g
and y1 , . . . , yg is an A-sequence. In summary, we have the following implications.
G-quadratic
LG-quadratic
Koszul
Quadratic CI’s
Each of the above implications is strict. Clearly, any quadratic monomial ideal
which is not a complete intersection, such as (xy, xz, xw) ⊆ k[x, y, z, w], is LGquadratic. In [Con14, 1.14], it is observed that (x2 +yz, y 2 +xz, z 2 +xy) ⊆ Q[x, y, z]
is an Artinian quadratic complete intersection which cannot be G-quadratic since
it does not contain the square of a linear form. We will see an example of a Koszul
algebra which is not LG-quadratic below.
Remark 2.1. If R = S/I is G-quadratic and J is a quadratic initial ideal of I,
then β1S (R) = β1S (S/J) since I is generated by quadrics and R and S/J have the
same Hilbert function. Consequently, βi (R) ≤ βi (S/J) ≤ gi for all i by upper
semicontinuity of the Betti numbers and the Taylor resolution for S/J. Since
killing a regular sequence of linear forms does not affect the Betti numbers of R, it
follows that Question 1.1 has an affirmative answer for every LG-quadratic algebra.
We will be specifically interested in the graded Betti numbers of a Koszul algebra
S
R, which are defined by βi,j
(R) = dimk TorSi (k, R)j and related to the usual Betti
4
MATTHEW MASTROENI
S
numbers by βiS (R) =
j βi,j (R). This information is usually organized into a
table, called the Betti table of R; see below for an example. As we have already
pointed out in the the introduction, quadratic monomial ideals serve as a useful
benchmark in the study of Koszul algebras. In particular, we note that the squarefree quadratic monomial ideals are precisely edge ideals. Recall that, if G is a
graph with vertex set [n] = {1, . . . , n}, the edge ideal of G is the ideal of the
polynomial ring S = k[x1 , . . . , xn ] defined by IG = (xi xj | ij ∈ E(G)). We note
that every quadratic monomial ideal can be obtained as the image of an edge ideal
modulo a regular sequence of linear forms via polarization [BH93, 4.2.16], and
hence, studying the Betti tables of all quadratic monomial ideals with g generators
is equivalent to studying the Betti tables of edge ideals of graphs with g edges,
which are reasonably simple to enumerate in practice for small values of g.
In fact, a byproduct of the proof in [BHI16] that every Koszul algebra defined
by g ≤ 3 quadrics satisfies Question 1.1 is that every such algebra has the Betti
table of some edge ideal. This suggests taking the Betti tables of edge ideals as our
guide for exploring possible patterns in Betti tables of Koszul algebras with more
generators. One can then easily compute that, for various values of g, there are
only two possible Betti tables for almost complete intersection edge ideals with g
generators, one with a single linear syzygy and another with two. The purpose of
this paper is to show that this pattern holds more generally for all Koszul almost
complete intersections. However, the following example shows that the mantra
that Koszul algebras are similar to quotients by quadratic monomial ideals must
be taken with a grain of salt.
P
Example 2.2 ([Con14, 3.8]). The ring R = k[x, y, z, w]/(xy, xw, (x − y)z, z 2 , x2 +
zw) is Koszul by a filtration argument. The minimal free resolution of R over
S = k[x, y, z, w] can be computed via iterated mapping cones using the fact that
((xy, xw, z 2 ) : (x − y)z) = (xy, xw, z) and ((xy, xw, z 2 , (x − y)z) : x2 + zw) =
(xw, y, z). This yields the following Betti table for R, where the entry in column
S
i and row j is βi,i+j
(R) and zero entries are represented by “−” for readability.
0
0 1
1 –
2 –
1
–
5
–
2
–
4
4
3
–
–
6
4
–
–
2
From the above Betti table, we see that the Hilbert series of R is
HR (t) =
1 + 2t − 2t2 − 2t3 + 2t4
.
(1 − t)2
KOSZUL ALMOST COMPLETE INTERSECTIONS
5
If R were LG-quadratic, then the numerator of the Hilbert series must be the hpolynomial of a 5-generated edge ideal, since killing a regular sequence of linear
forms and passing to a quadratic initial ideal do not change either the h-polynomial
or the minimal number of generators of the defining ideal. As noted above, we can
easily compute that the h-polynomial of R does not belong to any 5-generated
edge ideal. Hence, R is not LG-quadratic, and in particular, the Betti table of R
is not the Betti table of any edge ideal. This points to unexpected complications
in trying to answer Question 1.1 for Koszul algebras defined by g ≥ 5 quadrics.
Remark 2.3. We can compute the Betti tables of 5-generated edge ideals in the
above example over a field of any characteristic by a result of Katzman, [Kat06,
4.1]. However, Katzman also shows that the Betti tables of edge ideals do depend
on the characteristic of the ground field in general.
In the remainder of this section, we collect a few results about Koszul algebras
that will be useful in the sequel. The first of these results states how the Koszul
property can be passed to and from quotient rings.
Proposition 2.4 ([CDR13, §3.1, 2]). Let S be a standard graded k-algebra and R
be a quotient ring of S.
(a) If S is Koszul and regS (R) ≤ 1, then R is Koszul.
(b) If R is Koszul and regS (R) is finite, then S is Koszul.
Compared with general quadratic algebras, the Betti tables of Koszul algebras
are much more restricted. The following result, discovered in [Bac88] and [Kem90,
4], says that the Betti tables of Koszul algebras have nonzero entries only on or
above the diagonal; see [Con14, 2.10] for an easier argument using regularity.
S
Lemma 2.5. If R = S/I is a Koszul algebra, then βi,j
(R) = 0 for all i and j > 2i.
In addition, the extremal portions of the Betti table of a Koszul algebra R,
namely the diagonal entries and the linear strand of I, satisfy bounds similar to
those in Question 1.1.
Proposition 2.6 ([BHI16, 3.4, 4.2]). Suppose that R = S/I is Koszul and that I
is minimally generated by g elements. Then:
S
(a) βi,i+1
(R) ≤ gi for 2 ≤ i ≤ g, and if equality holds for i = 2, then I has
height one and a linear resolution of length g.
S
(b) βi,2i
(R) ≤ gi for 2 ≤ i ≤ g, and if equality holds for some i, then I is a
complete intersection.
Corollary 2.7. If R = S/I is a Koszul algebra which is not a complete intersection, then I has a linear syzygy.
6
MATTHEW MASTROENI
Proof. Suppose that I is minimally generated by q1 , . . . , qg . If the Koszul syzygies
S
on the qi are all minimal generators of SyzS1 (I), then β2,4
(R) ≥ g2 contradicting the
preceding proposition. Hence, some k-linear combination of the Koszul syzygies is
not minimal, and therefore, it is an S-linear combination of linear syzygies.
Lastly, we will need a fact about the syzygies of a Koszul algebra which will be
clear to experts, but for completeness, we give a quick proof. The proof relies on
the product structure on TorS∗ (R, k). We briefly recall how this product is defined
and refer the reader to [Avr98] for further details. To simplify notation, all tensor
products below are over S.
If F• denotes the minimal free resolution of R over S, we have the Künneth map
κ
TorSi (R, k) ⊗ TorSj (R, k) = Hi (F• ⊗ k) ⊗ Hj (F• ⊗ k) −→ Hi+j ((F• ⊗ k) ⊗ (F• ⊗ k))
sending cls(v)⊗cls(w) 7→ cls(v ⊗w). Denoting by µk : k ⊗k → k and µR : R⊗R →
R the respective product maps, we have a chain map µF : F• ⊗ F• → F• lifting
µR . The product structure on TorS∗ (R, k) is the composition of the Künneth map
with the map induced on homology by the chain map
F
k
µ ⊗µ
F• ⊗ k ⊗ F• ⊗ k ∼
= F• ⊗ F• ⊗ k ⊗ k −→ F• ⊗ k .
Proposition 2.8. If R = S/I is a Koszul algebra, then SyzS1 (I) is minimally
generated by linear syzygies and Koszul syzygies.
Proof. By Lemma 2.5, we know that SyzS1 (I) is minimally generated by linear
S
and quadratic syzygies. We may assume that β2,4
(R) 6= 0 or else the conclusion holds trivially. In that case, it follows from [ACI10, 3.1] that TorS2 (R, k)4 =
(TorS1 (R, k)2 )2 , so it suffices to note that the products of the generators of TorS1 (R, k)2
correspond to the Koszul syzygies on a minimal set of generators q1 , . . . , qg for I.
If e1 , . . . , eg denotes the standard basis of S(−2)g = F1 such that ∂(ei ) = qi for
each i, we can choose µF so that µF (ei ⊗ 1) = µF (1 ⊗ ei ) = ei for all i. Since the
ei ⊗ 1 span TorS1 (R, k)2 , it follows that the µF (ei ⊗ ej ) ⊗ 1 span TorS2 (R, k)4 . As
µF is a chain map, we see that
∂(µF (ei ⊗ ej )) = µF (∂(ei ⊗ ej )) = µF (qi ⊗ ej − ei ⊗ qj ) = qi ej − qj ei
so that µF (ei ⊗ej ) corresponds to a Koszul syzygy in SyzS1 (I) as wanted. Hence, the
Koszul syzygies together with multiples of the linear syzygies must span SyzS1 (I)4 ,
and the proposition easily follows.
KOSZUL ALMOST COMPLETE INTERSECTIONS
7
3. Koszul Almost Complete Intersections
Recall that a standard graded k-algebra R = S/I with ht I = g is called an
almost complete intersection (or ACI for short) if I is minimally generated by
g + 1 elements.
S
Theorem 3.1. Let R = S/I be a Koszul algebra with β2,3
(R) = 1. Then there are
independent linear forms x and w and a linear form z such that I = (xz, zw, q3 , . . . , qg+1 )
for some regular sequence of quadrics q3 , . . . , qg+1 on S/(xz, zw), and conversely,
S
every ideal of this form defines a Koszul algebra with β2,3
(R) = 1. Hence, R is an
g−1
almost complete intersection with e(R) = 2
and Betti table
0
1
2
..
.
0
1
1
–
– g+1
–
–
g−1 –
g
–
–
–
2
–
1
3
–
–
g+2 g−1
2
1
···
g−1
1
..
.
..
g
–
–
–
–
g−1
g+i
i
i−1
g+1
–
–
–
.
2g−1 g−1
g−1 g−2
–
–
S
Specifically, we have βi,2i
(R) =
g+1
S
βi (R) = i for all i.
g−1
–
–
–
S
and βi,2i−1
(R) =
g−1
g−2
2
g−1
i−2
–
1
for i ≥ 2 so that
Proof. Since I has a linear syzygy, it is not a complete intersection. In particular,
we can write I = (q1 , . . . , qg+1 ) for some linear independent quadrics qi with g ≥ 1.
Let U = SyzS1 (I), W ⊆ U4 denote the k-span of the Koszul syzygies on the qi , and
ℓ ∈ U denote the unique linear syzygy up to scalar multiple. If W ∩ S+ U = 0, then
S
β2,4
(R) ≥ g+1
so that Proposition 2.6 implies I is a complete intersection, which
2
is a contradiction. Hence, there is a linear form z such that zℓ ∈ W is nonzero.
P
Write zℓ = 1≤i<j≤g+1 ai,j (qj ei −qi ej ) for some ai,j ∈ k, where e1 , . . . , eg+1 denotes
the standard basis of S(−2)g+1 . After suitably relabeling the qi and rescaling the
equality, we may assume that a1,2 = 1. Reading off the first two coordinates of the
Pg+1
P
preceding equality then gives zℓ1 = q2 + g+1
j=3 a2,j qj .
j=3 a1,j qj and zℓ2 = −q1 +
Using these equalities, we can replace q1 and q2 with zℓ2 and zℓ1 as generators of
I and assume that q1 = xz and q2 = zw for some linear forms x, z, and w. Note
that x and w must be independent since the qi are.
After making this change, we have ℓ = (w, −x, 0, . . . , 0) is the unique linear
syzygy on the qi , and (q2 , −q1 , 0, . . . , 0) = zℓ. Let W ′ ⊆ U4 denote the k-span of
the Koszul syzygies other than (q2 , −q1 , 0, . . . , 0). If W ′ ∩ S+ U 6= 0, then there is
8
MATTHEW MASTROENI
a linear form v such that vℓ ∈ W ′ is nonzero. Write
X
bi,j (qj ei − qi ej )
vℓ =
1≤i<j≤g+1
j≥3
for some bi,j ∈ k. Since bi,j 6= 0 for some j ≥ 3, reading off the j-th coordinate
of the above equality yields a linear dependence relation on the qi , which is a
contradiction. Hence, we must have W ′ ∩ S+ U = 0 so that all of the Koszul
syzygies except (q2 , −q1 , 0, . . . , 0) are part of a minimal set of generators for U.
S
R
Because β2,4
(R) ≤ g+1
− 1 and β2,j
(S) = 0 for j > 4 by Lemma 2.5, it follows
2
S
that U = Syz1 (I) is minimally generated by all the Koszul syzygies on the qi ,
except (q2 , −q1 , 0, . . . , 0), together with the linear syzygy ℓ.
P
If fg+1 ∈ ((xz, zw, q3 , . . . , qg ) : qg+1 ), then we can write fg+1 qg+1 = − gi=1 fi qi
for some fi ∈ S so that (f1 , . . . , fg+1 ) ∈ U. It follows from the preceding paragraph
that fg+1 ∈ (xz, zw, q3 , . . . , qg ) so that qg+1 is regular on R′ = S/(xz, zw, q3 , . . . , qg ).
As regR′ R = 1, it follows from Corollary 2.4 that R′ is also Koszul. Moreover, because we can obtain the resolution of R over S by taking the mapping cone of multiS
(R′ ) = 1 and that
plication by qg+1 on the resolution of R′ over S, it follows that β2,3
(w, −x, 0, . . . , 0) is the unique linear syzygy on xz, zw, q3 , . . . , qg . Hence, induction
on g implies that q3 , . . . , qg+1 is a regular sequence on S/(xz, zw). Conversely,
if I = (xz, zw, q3 , . . . , qg+1 ) for some regular sequence of quadrics q3 , . . . , qg+1
on S/(xz, zw), it also follows from Corollary 2.4 that R = S/I is Koszul since
S/(xz, zw) is Koszul.
From the preceding paragraph, we see that ht I = ht(xz, zw) + g − 1 = g so that
I is an almost complete intersection. If F• denotes the minimal free resolution of
S/(xz, zw) over S, we obtain the minimal resolution of R by repeatedly taking the
mapping cone of multiplication by qi+1 on the resolution of S/(xz, zw, q3 , . . . , qi ).
Since taking the mapping cone of multiplication by qi+1 is the same as tensoring
with the Koszul complex on qi+1 , we see that F• ⊗S K• (q3 , . . . , qg+1 ) is the minimal
free resolution of R over S, from which the Betti table is easily deduced. In
particular, we have
g+1
g
g
g−1
g+i g−1
S
.
=
+
=
+
βi (R) =
i
i−1
i
i−2
i−1
i
Similarly, we note that the multiplicity of S/(xz, zw, q3 , . . . , qi+1 ) is twice the multiplicity of S/(xz, zw, q3 , . . . , qi ), and so, since e(S/(xz, zw)) = 1, we see that
e(R) = 2g−1 .
Remark 3.2. In the statement of the above theorem, we can choose x and w
so that zw, q3 , . . . , qg+1 is a maximal S-regular sequence contained in I. Indeed,
KOSZUL ALMOST COMPLETE INTERSECTIONS
9
since q3 , . . . , qg+1 is a regular sequence on S/(xz, zw), we know that q3 , . . . , qg+1 is a
regular sequence on S by Auslander’s Zerodivisor Theorem, which is a consequence
of the Peskine-Szpiro Intersection Theorem for arbitrary Noetherian local rings and
follows from results of Serre in the regular case; see [PS73, II.0]. Each associated
prime of (q3 , . . . , qg+1 ) cannot contain both xz and zw, otherwise we would have
ht I ≤ g −1 since the former ideal is unmixed. If either of xz or zw is not contained
in every associated prime of (q3 , . . . , qg+1 ), we are done after possibly switching the
roles of x and w. Otherwise, if xz and zw are both contained in different associated
primes of (q3 , . . . , qg+1 ), then we can replace w with w + x.
S
Theorem 3.3. Let R = S/I be a Koszul almost complete intersection with β2,3
(R) =
2. Then there is a 3 × 2 matrix of linear forms M with ht I2 (M) = 2 such that
I = I2 (M) + (q4 , . . . , qg+1 ) for some regular sequence of quadrics q4 , . . . , qg+1 on
S/I2 (M), and conversely, every ideal of this form defines a Koszul almost complete
S
intersection with β2,3
(R) = 2. Hence, R has multiplicity e(R) = 3 · 2g−2 and Betti
table
0
1
2
..
.
0
1
1
–
– g+1
–
–
3
g−2 –
g−1 –
–
–
2
–
2
g−2
+
1
3
–
–
g−2
2
2
···
g−2
1
..
.
–
–
S
Specifically, we have βi,2i
(R) = 3
g+1
S
so that βi (R) ≤ i for all i.
..
g−2
–
–
–
g−1
–
–
–
.
3
g−2
g−3
+1 2
–
g−2
i−1
+
g−2
i
g
–
–
–
S
and βi,2i−1
(R) = 2
g−2
g−3
3
g−2
i−2
–
2
for i ≥ 2
Proof. Since I has a linear syzygy, it is not a complete intersection. In particular,
we can write I = (q1 , . . . , qg+1 ) for some linear independent quadrics qi with g ≥ 1.
In fact, we must have g ≥ 2 since it is easily seen that a 2-generated graded ideal
cannot have two independent linear syzygies. Let U = SyzS1 (I), W ⊆ U4 denote
the k-span of the Koszul syzygies on the qi , and ℓ, h ∈ U denote independent
linear syzygies. Arguing as in the proof of the previous theorem, we see there
are linear forms z and v such that zℓ + vh ∈ W is nonzero. Write zℓ + vh =
P
1≤i<j≤g+1 ai,j (qj ei − qi ej ) for some ai,j ∈ k, , where e1 , . . . , eg+1 denotes the
standard basis of S(−2)g+1 . After suitably relabeling the qi and rescaling the
equality, we may assume that a1,2 = 1. Reading off the coordinates of the preceding
10
MATTHEW MASTROENI
equality then gives
q˜2 = zℓ1 + vh1 = q2 +
g+1
X
a1,j qj
j=3
−q˜1 = zℓ2 + vh2 = −q1 +
g+1
X
a2,j qj
j=3
zℓp + vhp = −
X
ai,p qi +
X
ap,i qi
(p ≥ 3) .
i>p
i<p
Using the above equalities, we can replace q1 and q2 with q˜1 and q˜2 as generators for
I. As a result, we must also replace ℓ with ℓ̃ = (ℓ1 , ℓ2 , ℓ3 − a1,3 ℓ2 + a2,3 ℓ1 , . . . , ℓg+1 −
a1,g+1 ℓ2 + a2,g+1 ℓ1 ) since
0=
g+1
X
ℓj qj = ℓ1 q˜1 + ℓ2 q˜2 +
g+1
X
(ℓj − a1,j ℓ2 + a2,j ℓ1 )qj .
j=3
j=1
Similarly, h must be replaced with the linear syzygy h̃ defined as above. It is
easily seen that ℓ̃ and h̃ must also be independent linear syzygies. Finally, setting
bi,j = ai,j + a1,j a2,i − a1,i a2,j for 3 ≤ i < j ≤ g + 1, we claim that
X
z ℓ̃ + v h̃ = (q˜2 , −q˜1 , 0, . . . , 0) +
bi,j (qj ei − qi ej ) .
3≤i<j≤g+1
By definition of q˜1 and q˜2 , it suffices to check equality in the p-th coordinate for
p ≥ 3. Using the above equalities, we see that
z ℓ̃p + v h̃p = zℓp + vhp + a1,p q˜1 + a2,p q˜2
=−
X
ai,p qi +
ap,i qi −
a1,p a2,i qi +
X
(ai,p + a1,p a2,i − a2,p a1,i )qi +
X
bi,p qi +
3≤i<p
g+1
X
a2,p a1,i qi
i=3
X
(ap,i − a1,p a2,i + a2,p a1,i )qi
i>p
3≤i<p
=−
g+1
X
i=3
i>p
3≤i<p
=−
X
X
bp,i qi
i>p
as required. Hence, after replacing q1 and q2 as above, we may assume that q1 =
−(zℓ2 + vh2 ), q2 = zℓ1 + vh1 , and a1,j = a2,j = 0 for all j ≥ 3.
If ai,j 6= 0 for some 3 ≤ i < j ≤ g + 1, then after relabeling the qi we may
assume that a3,4 6= 0. Since a1,j = a2,j = 0 for all j ≥ 3, arguing as in the
preceding paragraph shows that we can replace q3 and q4 with −(zℓ4 + vh4 ) and
zℓ3 + vh3 respectively so that I ⊆ (z, v, q5 , . . . , qg+1 ) has height at most g − 1 by
Krull’s Height Theorem, contradicting that I is an almost complete intersection.
KOSZUL ALMOST COMPLETE INTERSECTIONS
11
Therefore, ai,j = 0 for 3 ≤ i < j ≤ g+1, and we see that (q2 , −q1 , 0, . . . , 0) = zℓ+vh
for some linear forms z and v.
Suppose first that z and v are independent linear forms. Then zℓi + vhi = 0 for
i > 2 implies that (ℓi , hi ) = ai (v, −z) for some ai ∈ k so that ℓ = (ℓ1 , ℓ2 , a3 v, . . . , ag+1 v)
and h = (h1 , h2 , −a3 z, . . . , −ag+1 z). If ai = 0 for all i, then we would have two
independent linear syzygies on q1 and q2 , which we have already noted is impossible above. Hence, after relabeling, we may assume that a3 6= 0. Replacing
q3 with a3 q3 + · · · + ag+1 qg+1 , we may assume that ℓ = (ℓ1 , ℓ2 , v, 0, . . . , 0) and
h = (h1 , h2 , −z, 0, . . . , 0). Therefore, we have q1 = −(zℓ2 + vh2 ) and q2 = zℓ1 + vh1 ,
and furthermore, zq3 = h1 q1 + h2 q2 = z(ℓ1 h2 − ℓ2 h1 ) implies q3 = ℓ1 h2 − ℓ2 h1 so
that I = I2 (M) + (q4 , . . . , qg+1 ) where M is the matrix
ℓ1 h1
M = ℓ2 h2 .
(3.1)
v −z
Suppose now that v = cz for some c ∈ k. Then after replacing ℓ with ℓ + ch,
we may assume that (q2 , −q1 , 0, . . . , 0) = zℓ so that q1 = −zℓ2 , q2 = zℓ1 , and
ℓ = (ℓ1 , ℓ2 , 0, . . . , 0). Note that ℓ1 and ℓ2 must be independent linear forms or else q1
P
and q2 would not be independent. On the other hand, we know that g+1
i=1 hi qi = 0
so that (ℓ1 h2 − ℓ2 h1 )z ∈ (q3 , . . . , qg+1 ). We claim that z is a nonzerodivisor modulo
(q3 , . . . , qg+1 ) so that ℓ1 h2 − ℓ2 h1 ∈ (q3 , . . . , qg+1 ).
To see that the claim holds, we first note that ht(q3 , . . . , qg+1 ) = g − 1 so that
(q3 , . . . , qg+1 ) is a complete intersection. Indeed, if this is not the case, then since
I ⊆ (z, q3 , . . . , qg+1 ) we would have ht I ≤ ht(q3 , . . . , qg+1 ) + 1 ≤ g − 1 by Krull’s
Height Theorem and [Ser00, III, Prop. 17], contradicting that I is an almost complete intersection. If z were a zerodivisor modulo (q3 , . . . , qg+1 ), then there would
be an associated prime P of (q3 , . . . , qg+1 ) such that I ⊆ (z, q3 , . . . , qg+1 ) ⊆ P so
that ht I ≤ g − 1 as (q3 , . . . , qg+1 ) is unmixed, again contradicting that I is an
almost complete intersection. And so, we see that z must be a nonzerodivisor
modulo (q3 , . . . , qg+1 ) as claimed. Write ℓ1 h2 − ℓ2 h1 = a3 q3 + · · · + ag+1 qg+1 for
some ai ∈ k. If ai = 0 for all i, then ℓ1 h2 − ℓ2 h1 = 0 so that (h2 , −h1 ) = b(ℓ2 , −ℓ1 )
for some b ∈ k as ℓ1 and ℓ2 are independent linear forms. In that case, we can
replace h with h − bℓ and assume that h = (0, 0, h3 , . . . , hg+1 ) so that q3 is a zerodivisor modulo (q4 , . . . , qg+1 ). However, we claim that this is impossible. Indeed,
by arguing as above, we see that ht(q4 , . . . , qg+1 ) = g − 2 so that (q4 , . . . , qg+1 ) is a
complete intersection, and so, if q3 were a zerodivisor modulo (q4 , . . . , qg+1 ), there
would be an associated prime P of (q4 , . . . , qg+1 ) such that (q3 , . . . , qg+1 ) ⊆ P so
that ht(q3 , . . . , qg+1 ) ≤ g − 2 as (q4 , . . . , qg+1 ) is unmixed, contradicting our earlier
12
MATTHEW MASTROENI
observation. Hence, after relabeling, we may assume that a3 6= 0. Replacing q3
with a3 q3 + · · · + ag+1 qg+1 = ℓ1 h2 − ℓ2 h1 , we see that h = (h1 , h2 , −z, 0, . . . , 0) and
I = I2 (M) + (q4 , . . . , qg+1 ) where M is the matrix of linear forms in (3.1) with
v = 0.
In both of the above cases, it is easily checked that the Koszul syzygies involving
any two of q1 , q2 , q3 are non-minimal. Let W ′ ⊆ U4 denote the k-span of the other
Koszul syzygies. If W ′ ∩ S+ U 6= 0, then there are linear forms u and w such that
uℓ + wh ∈ W ′ is nonzero. Write
uℓ + wh =
g+1
X
j=4
[b1,j (qj e1 − q1 ej ) + b2,j (qj e2 − q2 ej )] +
X
bi,j (qj ei − qi ej )
3≤i<j≤g+1
for some bi,j ∈ k. Since bi,j 6= 0 for some j ≥ 4, reading off the j-th coordinate
of the above equality yields a linear dependence relation on the qi , which is a
contradiction. Hence, we must have W ′ ∩ S+ U = 0 so that all of the Koszul
syzygies involving at least one of q4 , . . . , qg+1 are part of a minimal set of generators
for U. By Proposition 2.8 and Lemma 2.5, it follows that U = SyzS1 (I) is minimally
generated by all the Koszul syzygies involving at least one of q4 , . . . , qg+1 together
with the linear syzygies ℓ and h.
P
If fg+1 ∈ ((q1 , . . . , qg ) : qg+1 ), then we can write fg+1 qg+1 = − gi=1 fi qi for
some fi ∈ S so that (f1 , . . . , fg+1 ) ∈ SyzS1 (I). It follows from the preceding paragraph that fg+1 ∈ (q1 , . . . , qg ) so that qg+1 is regular on R′ = S/(q1 , . . . , qg ). As
regR′ R = 1, it follows from Corollary 2.4 that R′ is also Koszul. Moreover, because
we can obtain the resolution of R over S by taking the mapping cone of multiS
(R′ ) = 2 and
plication by qg+1 on the resolution of R′ over S, it follows that β2,3
that (ℓ1 , ℓ2 , v, 0, . . . , 0) and (h1 , h2 , −z, 0, . . . , 0) are the independent linear syzygies on q1 , . . . , qg . Hence, induction on g implies that q4 , . . . , qg+1 is a regular
sequence on S/I2 (M). In particular, we see that g = ht I = ht I2 (M) + g − 2
so that ht I2 (M) = 2. Conversely, if I = I2 (M) + (q4 , . . . , qg+1 ) for some 3 × 2
matrix of linear forms M with ht I2 (M) = 2 and some regular sequence of quadrics
q4 , . . . , qg+1 on S/I2 (M), then S/I2 (M) has a Hilbert-Burch resolution by [BH93,
1.4.17] so that regS (S/I2 (M)) = 1, and it follows from Corollary 2.4 that S/I2 (M),
and hence also R = S/I, is Koszul.
If F• denotes the minimal free resolution of S/I2 (M) over S, we obtain the minimal resolution of R by repeatedly taking the mapping cone of multiplication by
qi+1 on the resolution of S/(q1 , . . . , qi ). Since taking the mapping cone of multiplication by qi+1 is the same as tensoring with the Koszul complex on qi+1 , we see
that F• ⊗S K• (q4 , . . . , qg+1 ) is the minimal free resolution of R over S, from which
KOSZUL ALMOST COMPLETE INTERSECTIONS
13
the Betti table is easily deduced. In particular, we have
g+1
g
g
g−1
g
g−1
g−1
S
.
=
+
≤
+
=
+
βi (R) = 2
i
i−1
i
i−1
i
i
i−1
Similarly, the multiplicity of S/(q1 , . . . , qi+1 ) is twice the multiplicity of S/(q1 , . . . , qi )
for i ≥ 3, and so, since e(S/I2 (M)) = 3, we see that e(R) = 3 · 2g−2 .
In the next section, we will show that every Koszul almost complete intersection has at most two linear syzygies so that the above results give a complete
classification of Koszul almost complete intersections, and therefore, Question 1.1
has an affirmative answer for Koszul almost complete intersections with any number of generators. Assuming this result for the time being, we have the following
corollary.
Corollary 3.4. Koszul almost complete intersections are LG-quadratic.
Proof. Let R = S/I be a Koszul almost complete intersection, and assume first
S
that β2,3
(R) = 2 so that I = I2 (M)+(q4 , . . . , qg+1 ) for some 3×2 matrix M = (mij )
of linear forms and q4 , . . . , qg+1 a regular sequence of quadrics on S/I2 (M). Set
S̃ = S[X][y4 , . . . , yg+1] where X = (xij ) is a 3 ×2 generic matrix, I˜ = I2 (X) + (y42 +
2
˜ If we choose a lexicographic order on S̃ with
q4 , . . . , yg+1
+ qg+1 ), and A = S̃/I.
x1,2 > x1,1 > x2,2 > x2,1 > x3,2 > x3,1 and yi greater than the variables in S for all
˜ = in> (I2 (X)) + (y 2, . . . , y 2 ) so that
i, it follows from [Eis95, 15.15] that in> (I)
4
g+1
2
˜
the 2-minors of X together with the yi + qi are a Gröbner basis for I by [Stu90].
Hence, A is G-quadratic. Moreover, we also know that the yi2 + qi form a regular
sequence on S̃/I2 (X), and since the latter ring is Cohen-Macaulay, we see that
A is Cohen-Macaulay. If J denotes the ideal of A generated by the linear forms
xij − mij and ys for i = 1, 2, 3, j = 1, 2, and 4 ≤ s ≤ g + 1, then A/J ∼
= R so that
R will be LG-quadratic if the linear forms generating J are a regular sequence.
Since A is Cohen-Macaulay and I˜ is also an almost complete intersection of height
g, this follows from the fact that ht J = dim A − dim R = dim S̃ − dim S = g + 4
is the number of generators of J.
S
Assume now that β2,3
(R) = 1 so that I = (xz, zw, q3 , . . . , qg+1 ) for some linear
forms x, z, and w and q3 , . . . , qg+1 a regular sequence of quadrics on S/(xz, zw).
In this case, we define Si = S[yi+1 , . . . , yg+1 ] and Ai = Si /Ii for 0 ≤ i ≤ g + 1,
where
2
I0 = (y1 z, y2 z, y32 + q3 , . . . , yg+1
+ qg+1 )
2
I1 = (xz, y2 z, y32 + q3 , . . . , yg+1
+ qg+1 )
2
2
Ii = (xz, zw, q3 , . . . , qi , yi+1
+ qi+1 , . . . , yg+1
+ qg+1 )
(i ≥ 2) .
14
MATTHEW MASTROENI
2
As above, we see that in> (I0 ) = (in> (z)y1 , in> (z)y2 , y32 , . . . , yg+1
) for any monomial
order on S0 in which the yi are greater than every monomial in S so that the generators of I0 are a Gröbner basis and A0 is G-quadratic. In addition, we have Ag+1 = R
and Ai /(yi+1 ) ∼
= Ai+1 for all i < g+1. An initial ideal argument as above shows that
2
2
yi+1 + qi+1 , . . . , yg+1
+ qg+1 is a regular sequence on Si /(xz, zw, q3 , . . . , qi ) for i ≥ 2,
2
and similarly, the yj + qj are a regular sequence on S0 /(y1z, y2 z) and S1 /(xz, y1 z).
Si
Consequently, Ai is a Koszul almost complete intersection with β2,3
(Ai ) = 1 and
ht Ii = g for all i. It then follows from Theorem 3.1 that the Ai have the same
Betti table, hence the same h-polynomial h(t), over their respective polynomial
rings Si . Hence, the Hilbert series of Ai is HAi (t) = h(t)/(1 − t)dim Ai . We then
compute that dim Ai = dim Si − g = dim Si+1 − g + 1 = dim Ai+1 + 1 so that
(1 − t)HAi (t) = HAi+1 (t) for all i < g + 1. This implies that the natural sequence
yi+1
0 → Ai (−1) → Ai → Ai+1 → 0 is exact so that yi+1 is Ai -regular. Therefore, we
see that y1 , . . . , yg+1 is an A0 -sequence, and R is LG-quadratic.
4. Linear Syzygies of Quadratic ACI’s
The following proposition is similar in spirit to Theorem 3.3. However, there are
two important distinctions: We do not assume that R is Koszul, so we lose some
information about the syzygies of the defining ideal I, and to make up for this
loss of information, we must assume that the ground field is infinite. But first, we
make a simple observation which will be useful in the proof.
Remark 4.1. If f1 , . . . , fn ∈ S is a regular sequence of homogeneous forms of
the same degree and f = a1 f1 + · · · + an fn for some ai ∈ k with a1 6= 0, then
((f2 , . . . , fn ) : f ) = ((f2 , . . . , fn ) : f1 ) so that f, f2 , . . . , fn is also a regular sequence.
Proposition 4.2. Suppose that k is an infinite field and that R = S/I is an almost
S
complete intersection defined by quadrics with β2,3
(R) ≥ 2. Then there are quadrics
q1 , . . . , qg+1 and a 3 × 2 matrix of linear forms M such that I = (q1 , . . . , qg+1 ),
q2 , . . . , qg+1 is a regular sequence, and I2 (M) = (q1 , q2 , q3 ).
Proof. Set g = ht I. We note that g ≥ 2, since otherwise we would have I =
S
(xz, yz) for some linear forms x, y, z so that β2,3
(R) = 1. First, we can find
quadrics q1 , . . . , qg+1 such that I = (q1 , . . . , qg+1 ) and q2 , . . . , qg+1 is a regular sequence. Indeed, we can take qg+1 to be any quadric in I. Having found quadrics
qi , . . . , qg+1 ∈ I with i > 2 forming a regular sequence, we know that I is not
contained in any associated prime of (qi , . . . , qg+1 ) since the latter ideal is unmixed
of height g − i + 2 < g. Because I is generated in degree two, this implies I2 * P
for each associated prime P of (qi , . . . , qg+1 ). Since k is infinite, I2 is not a union
of the proper subspaces (I ∩ P )2 for P ∈ Ass(S/(qi , . . . , qg+1 )). Hence, we can find
KOSZUL ALMOST COMPLETE INTERSECTIONS
15
a quadric qi−1 ∈ I so that qi−1 , . . . , qg+1 is a regular sequence. So by induction
we have a regular sequence of quadrics q2 , . . . , qg+1 in I, and we can take q1 to be
any other quadric independent from q2 , . . . , qg+1 since I is minimally generated by
g + 1 quadrics.
Let ℓ and h be be two independent linear syzygies on the qi . Then h1 ℓ − ℓ1 h
is a syzygy on q2 , . . . , qg+1 and, therefore, a linear combination of Koszul syzygies.
Write
X
h1 ℓ − ℓ1 h =
ai,j (qj ei − qi ej )
2≤i<j≤g+1
for some ai,j ∈ k, where e1 , . . . , eg+1 denotes the standard basis of S(−2)g+1 . Note
that ℓ1 and h1 must be independent linear forms, otherwise we could find a nontrivial linear syzygy on q2 , . . . , qg+1 since ℓ and h are independent, but that contradicts
that q2 , . . . , qg+1 is a regular sequence. If h1 ℓ − ℓ1 h = 0, then (−hi , ℓi ) = bi (h1 , −ℓ1 )
for some bi ∈ k for all i ≥ 2 so that h = h1 (1, −b2 , . . . , −bg+1 ). But then
(1, −b2 , . . . , −bg+1 ) must be a syzygy on the qi , contradicting that they are independent quadrics. Hence, we see that h1 ℓ − ℓ1 h 6= 0 so that ai,j 6= 0 for some i, j. Relabeling q2 , . . . , qg+1 if necessary, we may assume that a2,3 6= 0. Then by Remark 4.1,
we can replace q3 with q = h1 ℓ2 − ℓ1 h2 = a2,3 q3 + · · · + a2,g+1 qg+1 . In exchanging q3
−1
−1
for q, we must replace ℓ with ℓ̃ = (ℓ1 , ℓ2 , a−1
2,3 ℓ3 , ℓ4 −a2,3 a2,4 ℓ3 , . . . , ℓg+1 −a2,3 a2,g+1 ℓ3 )
as
g+1
g+1
X
X
−1
(ℓi − a−1
ℓi qi = a2,3 ℓ3 q + ℓ1 q1 + ℓ2 q2 +
0=
2,3 a2,i ℓ3 )qi
i=4
i=1
and we also replace h with the syzygy h̃ defined as above. However, ℓ̃ and h̃ are
still independent linear syzygies since their first coordinates are independent linear
forms. After making the above changes, we have a2,3 = 1 and a2,i = 0 for all
i > 3. Then h1 ℓ3 − ℓ1 h3 = −q2 + a3,4 q4 + · · · + a3,g+1 qg+1 , and we can we replace
q2 with −(h1 ℓ3 − ℓ1 h3 ) as above. In that case, we have q2 = −(h1 ℓ3 − ℓ1 h3 ) and
q3 = h1 ℓ2 − ℓ1 h2 so that
0=
g+1
X
i=1
ℓi qi = ℓ1 (q1 + ℓ2 h3 − ℓ3 h2 ) +
4
X
ℓi qi
i=1
implies that q1 + ℓ2 h3 − ℓ3 h2 ∈ ((q4 , . . . , qg+1 ) : ℓ1 ).
We claim that ℓ1 is a nonzerodivisor modulo (q4 , . . . , qg+1 ). If not, then ℓ1 is
contained in an associated prime of (q4 , . . . , qg+1 ) so that ht(ℓ1 , q4 , . . . , qg+1 ) =
g − 2. But then ht(ℓ1 , h1 , q4 , . . . , qg+1 ) ≤ ht(ℓ1 , q4 , . . . , qg+1 ) + 1 = g − 1, and
since (q2 , . . . , qg+1 ) ⊆ (ℓ1 , h1 , q4 , . . . , qg+1 ), this contradicts ht(q2 , . . . , qg+1 ) = g.
Therefore, ℓ1 is a nonzerodivisor modulo (q4 , . . . , qg+1 ) as claimed so that q1 +ℓ2 h3 −
ℓ3 h2 ∈ (q4 , . . . , qg+1 ). We can then write ℓ2 h3 − ℓ3 h2 = −q1 + c4 q4 + · · · + cg+1 qg+1
16
MATTHEW MASTROENI
for some ci ∈ k. Replacing q1 with ℓ2 h3 − ℓ3 h2 and setting
ℓ1 h1
M = ℓ2 h2
ℓ3 h3
yields I2 (M) = (q1 , q2 , q3 ) as wanted.
(4.1)
Theorem 4.3. If R = S/I is a quadratic almost complete intersection, then
S
β2,3
(R) ≤ 2.
S
Proof. Suppose that β2,3
(R) ≥ 3. Let K be an infinite extension field of k, and for
SK
S
each k-algebra A, set AK = A ⊗k K. Then β2,3
(RK ) = β2,3
(R), dim RK = dim R,
∼
∼
and ISK /I(SK )+ = I/IS+ ⊗S SK = I/IS+ ⊗k K by faithfully flat base change so
that ISK is still a quadratic almost complete intersection, and replacing R with
RK , we may assume that the ground field k is infinite.
By the preceding proposition, there are quadrics q1 , . . . , qg+1 for g = ht I ≥ 2
and a 3 × 2 matrix of linear forms M as in (4.1) such that I = (q1 , . . . , qg+1 ),
q2 , . . . , qg+1 is a regular sequence, and I2 (M) = (q1 , q2 , q3 ). We may assume that
q1 , q2 , q3 are the minors of M as in the proof of the proposition. In that case,
ℓ = (ℓ1 , ℓ2 , ℓ3 , 0, . . . , 0) and h = (h1 , h2 , h3 , 0, . . . , 0) are two independent linear
syzygies on the qi . Let u be a linear syzygy independent from ℓ and h. By
arguing as in the proof of the preceding proposition, we see that u1 , ℓ1 , and h1 are
independent linear forms and that u1 ℓ − ℓ1 u 6= 0.
We claim that u1 ℓ − ℓ1 u is linear independent from h1 ℓ − ℓ1 h. If not, then
u1 ℓ−ℓ1 u = c(h1 ℓ−ℓ1 h) for some nonzero c ∈ k. Setting ũ = u−ch and rearranging
the preceding equality, we have that ũ is a linear syzygy independent from ℓ and h
with ũ1 ℓ−ℓ1 ũ = 0, which is impossible as already noted in the previous paragraph.
Hence, u1 ℓ − ℓ1 u is independent from h1 ℓ − ℓ1 h as claimed. In particular, we note
that g ≥ 3 since there cannot be two independent quadric syzygies on the regular
sequence q2 , q3 . Write
X
u 1 ℓ − ℓ1 u =
bi,j (qj ei − qi ej )
2≤i<j≤g+1
for some bi,j ∈ k. Since h1 ℓ − ℓ1 h = (0, q3 , −q2 , 0, . . . , 0) by assumption, we must
have bi,j 6= 0 for some (i, j) 6= (2, 3), otherwise we would have a contradiction to
the claim. In fact, by replacing u with u − b2,3 h, we may assume that b2,3 = 0.
Next, we claim that there is a j ≥ 4 such that b2,j 6= 0 or b3,j 6= 0. If
not, the first three coordinates of u1 ℓ − ℓ1 u must be zero so that u1 ℓ − ℓ1 u =
(0, 0, 0, −ℓ1u4 , . . . , −ℓ1 ug+1). But this implies that (u4 , . . . , ug+1 ) is a linear syzygy
on q4 , . . . , qg+1 , which is impossible since q4 , . . . , qg+1 is a regular sequence. Hence,
KOSZUL ALMOST COMPLETE INTERSECTIONS
17
relabeling if necessary, we may assume that b2,4 6= 0 so that we can replace q4 with
u1 ℓ2 − ℓ1 u2 = b2,4 q4 + · · · + b2,g+1 qg+1 .
Finally, we claim that there is a j ≥ 5 such that b3,j 6= 0. If not, then u1 ℓ3 −
ℓ1 u3 = b3,4 q4 = b3,4 (u1 ℓ2 − ℓ1 u2 ) as b2,3 = 0. But this implies that (b3,4 u2 − u3 , ℓ3 −
b3,4 ℓ2 ) = r(u1, −ℓ1 ) for some r ∈ k as ℓ1 and u1 are independent linear forms. In
particular, we see that ℓ3 ∈ Span{ℓ1 , ℓ2 } so that I ⊆ (ℓ1 , ℓ2 , q5 , . . . , qg+1 ). However,
ht(ℓ1 , ℓ2 , q5 , . . . , qg+1 ) ≤ g − 1, which contradicts ht I = g. Hence, we must have
g ≥ 4, and after relabeling, we may assume that b3,5 6= 0 and replace q5 with
u1 ℓ3 − ℓ1 u3 = b3,4 q4 + b3,5 q5 + · · · + b3,g+1 qg+1 . But then I ⊆ (ℓ1 , ℓ2 , ℓ3 , q6 , . . . , qg+1 )
and ht(ℓ1 , ℓ2 , ℓ3 , q6 , . . . , qg+1 ) ≤ g − 1, contradicting that ht I = g. Therefore, we
S
must have β2,3
(R) ≤ 2.
5. Future Directions
Using our main result, we have reason to believe that Question 1.1 can be
answered affirmatively for Koszul algebras defined by g = 4 quadrics. However,
Example 2.2 points to unexpected difficulties when g = 5.
Our work also has unintended connections to various other conjectures of interest. For example, the Buchsbaum-Eisenbud-Horrocks Conjecture asks whether
βiS (R) ≥ ci for all i if c = ht I. This conjecture is already known to hold for quo
tients by monomial ideals. An even larger lower bound βiS (R) ≥ ci + c−1
was
i−1
given for monomial ideals I of finite colength that are not complete intersections
by Charalambous and Evans in [Cha91][CE91] and for almost complete intersections directly linked to a complete intersection by Dugger in [Dug00, 2.3]. Among
Koszul almost complete intersections R = S/I, those with one linear syzygy cannot
be directly linked to a complete intersection since they are not Cohen-Macaulay.
Nonetheless, they still satisfy this larger bound. For Koszul ACI’s with two linear
syzygies, at least when the ground field is infinite, the results of the previous section show that I is directly linked to the complete intersection (ℓ1 , h1 , q4 , . . . , qg+1 ),
and Theorem 3.3 yields that Dugger’s result is sharp. A total rank version of the
P
Charalambous-Evans bound i βi (R) ≥ 2c + 2c−1 has been studied in [CEM90],
and Boocher and Seiner have recently established this bound for all monomial
ideals which are not complete intersections. Our work affirmatively answers a
couple questions they pose [BS17, 1.2, 1.3] in the Koszul ACI case.
Another consequence of our structure theorem is that the EGH Conjecture holds
for Koszul almost complete intersections in a strong form similar to [CCV14, 2.1].
This conjecture asks whether, given a graded ideal I ⊆ S = k[x1 , . . . , xn ] containing a homogeneous regular sequence f1 , . . . , fr of degrees 2 ≤ d1 ≤ · · · ≤ dr , there
is a monomial ideal J containing xd11 , . . . , xdr r and having the same Hilbert function
18
MATTHEW MASTROENI
as I. The EGH Conjecture is known to hold when I is a quadratic monomial ideal
by the preceding paper, when I is a complete intersection of quadrics, or when I
is generated by products of linear forms [Abe15], which covers quadratic ideals of
height one. To this list, we add that, if I defines a Koszul almost complete intersection, we can simply take J = (x21 , . . . , x2g , xg xg+1 ) or J = (x21 , . . . , x2g , xg−1 xg )
according to whether I has one or two linear syzygies respectively. Note for the
former case that g + 1 = pdS R ≤ n by Hilbert’s Syzygy Theorem.
Given the previous and new evidence for the above conjectures in the Koszul
case, it is natural to ask whether they hold at the very least for Koszul algebras
in general.
Acknowledgments
The author would like to thank his advisor, Hal Schenck, for many helpful
comments and discussions throughout the development of this work. He would
also like to thank Aldo Conca for pointing out a mistake in an earlier draft of
this paper and the anonymous referee for helping to simplify the exposition and
clarify the history of various results cited. Evidence for the results in this paper
was provided by several computations in Macaulay2 [M2].
References
[Abe15]
[Avr98]
[ACI10]
[ACI15]
[Bac86]
[Bac88]
[BDG15]
[BHI16]
[BS17]
[BC03]
A. Abedelfatah. On the Eisenbud-Green-Harris conjecture. Proc. Amer. Math. Soc.
143 (2015), no. 1, 105–115.
L. Avramov. Infinite free resolutions. Six lectures on commutative algebra (Bellaterra,
1996), 1–118, Progr. Math., 166, Birkhuser, Basel, 1998.
L. Avramov, A. Conca, and S. Iyengar. Free resolutions over commutative Koszul
algebras. Math. Res. Lett. 17 (2010), no. 2, 197–210.
L. Avramov, A. Conca, and S. Iyengar. Subadditivity of syzygies of Koszul algebras.
Math. Ann. 361 (2015), no. 1-2, 511–534.
J. Backelin. On the rates of growth of the homologies of Veronese subrings. Algebra,
algebraic topology and their interactions (Stockholm, 1983), 79–100, Lecture Notes in
Math., 1183, Springer, Berlin, 1986.
J. Backelin. Relations between rates of growth of homologies. Research Reports in
Mathematics 25, Department of Mathematics (1988), Stockholm University.
A. Boocher, A. D’Alı̀, E. Grifo, et al. Edge ideals and DG algebra resolutions. Matematiche (Catania) 70 (2015), no. 1, 215–238.
A. Boocher, S. H. Hassanzadeh, and S. Iyengar. Koszul algebras defined by three
relations. arXiv:1612.01558 [math.AC]
A. Boocher and J. Seiner. Lower bounds for Betti numbers of monomial ideals.
arXiv:1706.09866 [math.AC]
W. Bruns and A. Conca. Gröbner bases and determinantal ideals. Commutative algebra, singularities and computer algebra (Sinaia, 2002), 9–66, NATO Sci. Ser. II Math.
Phys. Chem., 115, Kluwer Acad. Publ., Dordrecht, 2003.
KOSZUL ALMOST COMPLETE INTERSECTIONS
[BH93]
19
W. Bruns and J. Herzog. Cohen-Macaulay rings. Cambridge Studies in Advanced
Mathematics, 39. Cambridge University Press, Cambridge, 1993.
[CCV14] G. Caviglia, A. Constantinescu, and M. Varbaro. On a conjecture by Kalai. Israel J.
Math. 204 (2014), no. 1, 469–475.
[Cha91] H. Charalambous. Betti numbers of multigraded modules. J. Algebra 137 (1991), no.
2, 491–500.
[CE91]
H. Charalambous and E. G. Evans. A deformation theory approach to Betti numbers
of finite length modules. J. Algebra 143 (1991), no. 1, 246–251.
[CEM90] H. Charalambous, E. G. Evans, and M. Miller. Betti numbers for modules of finite
length. Proc. Amer. Math. Soc. 109 (1990), no. 1, 63–70.
[Con14] A. Conca. Koszul algebras and their syzygies. Combinatorial algebraic geometry, 1–31,
Lecture Notes in Math., 2108, Fond. CIME/CIME Found. Subser., Springer, Cham,
2014.
[CDR13] A. Conca, E. De Negri, and M.E. Rossi. Koszul algebras and regularity. Commutative
algebra, 285–315, Springer, New York, 2013.
[Dug00] D. Dugger. Betti numbers of almost complete intersections. Illinois J. Math. 44 (2000),
no. 3, 531–541.
[Eis95]
D. Eisenbud. Commutative algebra. With a view toward algebraic geometry. Graduate
Texts in Mathematics, 150. Springer-Verlag, New York, 1995.
[Fro75]
R. Fröberg. Determination of a class of Poincaré series. Math. Scand. 37 (1975), no.
1, 29–39.
[M2]
D. Grayson and M. Stillman. Macaulay2, a software system for research in algebraic
geometry. Available at http://www.math.uiuc.edu/Macaulay2/.
[Kat06]
M. Katzman. Characteristic-independence of Betti numbers of graph ideals. J. Combin. Theory Ser. A 113 (2006), no. 3, 435–454.
[Kem90] G. Kempf. Some wonderful rings in algebraic geometry. J. Algebra 134 (1990), no. 1,
222–224.
[Kem92] G. Kempf. Syzygies for points in projective space. J. Algebra 145 (1992), no. 1, 219–
223.
[MS05]
E. Miller and B. Sturmfels. Combinatorial commutative algebra. Graduate Texts in
Mathematics, 227. Springer-Verlag, New York, 2005.
[PS73]
C. Peskine and L. Szpiro. Dimension projective finie et cohomologie locale. Applications à la démonstration de conjectures de M. Auslander, H. Bass et A. Grothendieck.
Inst. Hautes Études Sci. Publ. Math. No. 42 (1973), 47–119.
[Pol95]
A. Polishchuk. On the Koszul property of the homogeneous coordinate ring of a curve.
J. Algebra 178 (1995), no. 1, 122–135.
[Ser00]
J.-P. Serre. Local algebra. Translated from the French by CheeWhye Chin and revised
by the author. Springer Monographs in Mathematics. Springer-Verlag, Berlin, 2000.
[Stu90]
B. Sturmfels. Gröbner bases and Stanley decompositions of determinantal rings. Math.
Z. 205 (1990), no. 1, 137–144.
Department of Mathematics, University of Illinois, Urbana, IL 61801
E-mail address: [email protected]
| 0math.AC
|
CARLA: An Open Urban Driving Simulator
Alexey Dosovitskiy1, German Ros2,3, Felipe Codevilla1,3, Antonio López3, and Vladlen Koltun1
arXiv:1711.03938v1 [cs.LG] 10 Nov 2017
1
Intel Labs
2
Toyota Research Institute
3
Computer Vision Center, Barcelona
Abstract: We introduce CARLA, an open-source simulator for autonomous driving research. CARLA has been developed from the ground up to support development, training, and validation of autonomous urban driving systems. In addition to open-source code and protocols, CARLA provides open digital assets
(urban layouts, buildings, vehicles) that were created for this purpose and can
be used freely. The simulation platform supports flexible specification of sensor
suites and environmental conditions. We use CARLA to study the performance
of three approaches to autonomous driving: a classic modular pipeline, an endto-end model trained via imitation learning, and an end-to-end model trained via
reinforcement learning. The approaches are evaluated in controlled scenarios of
increasing difficulty, and their performance is examined via metrics provided by
CARLA, illustrating the platform’s utility for autonomous driving research.
Keywords: Autonomous driving, sensorimotor control, simulation
1
Introduction
Sensorimotor control in three-dimensional environments remains a major challenge in machine
learning and robotics. The development of autonomous ground vehicles is a long-studied instantiation of this problem [22, 26]. Its most difficult form is navigation in densely populated urban
environments [21]. This setting is particularly challenging due to complex multi-agent dynamics at
traffic intersections; the necessity to track and respond to the motion of tens or hundreds of other
actors that may be in view at any given time; prescriptive traffic rules that necessitate recognizing
street signs, street lights, and road markings and distinguishing between multiple types of other vehicles; the long tail of rare events – road construction, a child running onto the road, an accident
ahead, a rogue driver barreling on the wrong side; and the necessity to rapidly reconcile conflicting
objectives, such as applying appropriate deceleration when an absent-minded pedestrian strays onto
the road ahead but another car is rapidly approaching from behind and may rear-end if one brakes
too hard.
Research in autonomous urban driving is hindered by infrastructure costs and the logistical difficulties of training and testing systems in the physical world. Instrumenting and operating even one
robotic car requires significant funds and manpower. And a single vehicle is far from sufficient for
collecting the requisite data that cover the multitude of corner cases that must be processed for both
training and validation. This is true for classic modular pipelines [21, 8] and even more so for datahungry deep learning techniques. Training and validation of sensorimotor control models for urban
driving in the physical world is beyond the reach of most research groups.
An alternative is to train and validate driving strategies in simulation. Simulation can democratize
research in autonomous urban driving. It is also necessary for system verification, since some scenarios are too dangerous to be staged in the physical world (e.g., a child running onto the road ahead
of the car). Simulation has been used for training driving models since the early days of autonomous
driving research [22]. More recently, racing simulators have been used to evaluate new approaches
to autonomous driving [28, 3]. Custom simulation setups are commonly used to train and benchmark robotic vision systems [2, 9, 10, 11, 20, 25, 27, 29]. And commercial games have been used
to acquire high-fidelity data for training and benchmarking visual perception systems [23, 24].
While ad-hoc use of simulation in autonomous driving research is widespread, existing simulation
platforms are limited. Open-source racing simulators such as TORCS [28] do not present the com1st Conference on Robot Learning (CoRL 2017), Mountain View, United States.
Figure 1: A street in Town 2, shown from a third-person view in four weather conditions. Clockwise from top left: clear day, daytime rain, daytime shortly after rain, and clear sunset. See the
supplementary video for recordings from the simulator.
plexity of urban driving: they lack pedestrians, intersections, cross traffic, traffic rules, and other
complications that distinguish urban driving from track racing. And commercial games that simulate urban environments at high fidelity, such as Grand Theft Auto V [23, 24], do not support detailed
benchmarking of driving policies: they have little customization and control over the environment,
limited scripting and scenario specification, severely limited sensor suite specification, no detailed
feedback upon violation of traffic rules, and other limitations due to their closed-source commercial
nature and fundamentally different objectives during their development.
In this paper, we introduce CARLA (Car Learning to Act) – an open simulator for urban driving.
CARLA has been developed from the ground up to support training, prototyping, and validation of
autonomous driving models, including both perception and control. CARLA is an open platform.
Uniquely, the content of urban environments provided with CARLA is also free. The content was
created from scratch by a dedicated team of digital artists employed for this purpose. It includes
urban layouts, a multitude of vehicle models, buildings, pedestrians, street signs, etc. The simulation
platform supports flexible setup of sensor suites and provides signals that can be used to train driving
strategies, such as GPS coordinates, speed, acceleration, and detailed data on collisions and other
infractions. A wide range of environmental conditions can be specified, including weather and time
of day. A number of such environmental conditions are illustrated in Figure 1.
We use CARLA to study the performance of three approaches to autonomous driving. The first is a
classic modular pipeline that comprises a vision-based perception module, a rule-based planner, and
a maneuver controller. The second is a deep network that maps sensory input to driving commands,
trained end-to-end via imitation learning. The third is also a deep network, trained end-to-end via
reinforcement learning. We use CARLA to stage controlled goal-directed navigation scenarios of
increasing difficulty. We manipulate the complexity of the route that must be traversed, the presence
of traffic, and the environmental conditions. The experimental results shed light on the performance
characteristics of the three approaches.
2
Simulation Engine
CARLA has been built for flexibility and realism in the rendering and physics simulation. It is
implemented as an open-source layer over Unreal Engine 4 (UE4) [7], enabling future extensions by
2
the community. The engine provides state-of-the-art rendering quality, realistic physics, basic NPC
logic, and an ecosystem of interoperable plugins. The engine itself is free for non-commercial use.
CARLA simulates a dynamic world and provides a simple interface between the world and an agent
that interacts with the world. To support this functionality, CARLA is designed as a server-client
system, where the server runs the simulation and renders the scene. The client API is implemented
in Python and is responsible for the interaction between the autonomous agent and the server via
sockets. The client sends commands and meta-commands to the server and receives sensor readings
in return. Commands control the vehicle and include steering, accelerating, and braking. Metacommands control the behavior of the server and are used for resetting the simulation, changing the
properties of the environment, and modifying the sensor suite. Environmental properties include
weather conditions, illumination, and density of cars and pedestrians. When the server is reset, the
agent is re-initialized at a new location specified by the client.
Environment. The environment is composed of 3D models of static objects such as buildings, vegetation, traffic signs, and infrastructure, as well as dynamic objects such as vehicles and pedestrians.
All models are carefully designed to reconcile visual quality and rendering speed: we use low-weight
geometric models and textures, but maintain visual realism by carefully crafting the materials and
making use of variable level of detail. All 3D models share a common scale, and their sizes reflect
those of real objects. At the time of writing, our asset library includes 40 different buildings, 16
animated vehicle models, and 50 animated pedestrian models.
We used these assets to build urban environments via the following steps: (a) laying out roads
and sidewalks; (b) manually placing houses, vegetation, terrain, and traffic infrastructure; and (c)
specifying locations where dynamic objects can appear (spawn). This way we have designed two
towns: Town 1 with a total of 2.9 km of drivable roads, used for training, and Town 2 with 1.4 km
of drivable roads, used for testing. The two towns are shown in the supplement.
One of the challenges in the development of CARLA was the configuration of the behavior of
non-player characters, which is important for realism. We based the non-player vehicles on the
standard UE4 vehicle model (PhysXVehicles). Kinematic parameters were adjusted for realism.
We also implemented a basic controller that governs non-player vehicle behavior: lane following,
respecting traffic lights, speed limits, and decision making at intersections. Vehicles and pedestrians
can detect and avoid each other. More advanced non-player vehicle controllers can be integrated in
the future [1].
Pedestrians navigate the streets according to a town-specific navigation map, which conveys a
location-based cost. This cost is designed to encourage pedestrians to walk along sidewalks and
marked road crossings, but allows them to cross roads at any point. Pedestrians wander around town
in accordance with this map, avoiding each other and trying to avoid vehicles. If a car collides with
a pedestrian, the pedestrian is deleted from the simulation and a new pedestrian is spawned at a
different location after a brief time interval.
To increase visual diversity, we randomize the appearance of non-player characters when they are
added to the simulation. Each pedestrian is clothed in a random outfit sampled from a pre-specified
wardrobe and is optionally equipped with one or more of the following: a smartphone, shopping
bags, a guitar case, a suitcase, a rolling bag, or an umbrella. Each vehicle is painted at random
according to a model-specific set of materials.
We have also implemented a variety of atmospheric conditions and illumination regimes. These
differ in the position and color of the sun, the intensity and color of diffuse sky radiation, as well as
ambient occlusion, atmospheric fog, cloudiness, and precipitation. Currently, the simulator supports
two lighting conditions – midday and sunset – as well as nine weather conditions, differing in cloud
cover, level of precipitation, and the presence of puddles in the streets. This results in a total of 18
illumination-weather combinations. (In what follows we refer to these as weather, for brevity.) Four
of these are illustrated in Figure 1.
Sensors. CARLA allows for flexible configuration of the agent’s sensor suite. At the time of writing,
sensors are limited to RGB cameras and to pseudo-sensors that provide ground-truth depth and
semantic segmentation. These are illustrated in Figure 2. The number of cameras and their type and
position can be specified by the client. Camera parameters include 3D location, 3D orientation with
respect to the car’s coordinate system, field of view, and depth of field. Our semantic segmentation
3
Figure 2: Three of the sensing modalities provided by CARLA. From left to right: normal vision
camera, ground-truth depth, and ground-truth semantic segmentation. Depth and semantic segmentation are pseudo-sensors that support experiments that control for the role of perception. Additional
sensor models can be plugged in via the API.
pseudo-sensor provides 12 semantic classes: road, lane-marking, traffic sign, sidewalk, fence, pole,
wall, building, vegetation, vehicle, pedestrian, and other.
In addition to sensor and pseudo-sensor readings, CARLA provides a range of measurements associated with the state of the agent and compliance with traffic rules. Measurements of the agent’s state
include vehicle location and orientation with respect to the world coordinate system (akin to GPS
and compass), speed, acceleration vector, and accumulated impact from collisions. Measurements
concerning traffic rules include the percentage of the vehicle’s footprint that impinges on wrong-way
lanes or sidewalks, as well as states of the traffic lights and the speed limit at the current location of
the vehicle. Finally, CARLA provides access to exact locations and bounding boxes of all dynamic
objects in the environment. These signals play an important role in training and evaluating driving
policies.
3
Autonomous Driving
CARLA supports development, training, and detailed performance analysis of autonomous driving
systems. We have used CARLA to evaluate three approaches to autonomous driving. The first is
a modular pipeline that relies on dedicated subsystems for visual perception, planning, and control.
This architecture is in line with most existing autonomous driving systems [21, 8]. The second
approach is based on a deep network trained end-to-end via imitation learning [4]. This approach
represents a long line of investigation that has recently attracted renewed interest [22, 16, 4]. The
third approach is based on a deep network trained end-to-end via reinforcement learning [19].
We begin by introducing notation that is common to all methods and then proceed to describe each
in turn. Consider an agent that interacts with the environment over discrete time steps. At each
time step, the agent gets an observation ot and must produce an action at . The action is a threedimensional vector that represents the steering, throttle, and brake. The observation ot is a tuple of
sensory inputs. This can include high-dimensional sensory observations, such as color images and
depth maps, and lower-dimensional measurements, such as speed and GPS readings.
In addition to momentary observations, all approaches also make use of a plan provided by a highlevel topological planner. This planner takes the current position of the agent and the location of the
goal as input, and uses the A∗ algorithm to provide a high-level plan that the agent needs to follow
in order to reach the goal. This plan advises the agent to turn left, turn right, or keep straight at
intersections. The plan does not provide a trajectory and does not contain geometric information. It
is thus a weaker form of the plan that is given by common GPS navigation applications which guide
human drivers and autonomous vehicles in the physical world. We do not use metric maps.
3.1
Modular pipeline
Our first method is a modular pipeline that decomposes the driving task among the following subsystems: (i) perception, (ii) planning, and (iii) continuous control. Since no metric map is provided
as input, visual perception becomes a critical task. Local planning is completely dependent on the
scene layout estimated by the perception module.
The perception stack uses semantic segmentation to estimate lanes, road limits, and dynamic objects
and other hazards. In addition, a classification model is used to determine proximity to intersections.
4
The local planner uses a rule-based state machine that implements simple predefined polices tuned
for urban environments. Continuous control is performed by a PID controller that actuates the
steering, throttle, and brake. We now describe the modules in more detail.
Perception. The perception stack we describe here is built upon a semantic segmentation network
based on RefineNet [17]. The network is trained to classify each pixel in the image into one of the
following semantic categories: C = {road, sidewalk, lane marking, dynamic object,
miscellaneous static}. The network is trained on 2,500 labelled images produced in the
training environment using CARLA. The probability distributions provided by the network are used
to estimate the ego-lane based on the road area and the lane markings. The network output is also
used to compute an obstacle mask that aims to encompass pedestrians, vehicles, and other hazards.
In addition, we estimate the likelihood of being at an intersection by using a binary scene classifier (intersection/no intersection) based on AlexNet [15]. This network is trained on 500 images
balanced between the two classes.
Local planner. The local planner coordinates low-level navigation by generating a set of waypoints:
near-term goal states that represent the desired position and orientation of the car in the near future.
The goal of the planner is to synthesize waypoints that keep the car on the road and prevent collisions. The local planner is based on a state machine with the following states: (i) road-following,
(ii) left-turn, (iii) right-turn, (iv) intersection-forward, and (v) hazard-stop. Transitions between
states are performed based on estimates provided by the perception module and on topological information provided by the global planner. Further details can be found in the supplement. The local
plan in the form of waypoints is delivered to the controller, along with the vehicle’s current pose and
speed.
Continuous controller. We use a proportional-integral-derivative (PID) controller [6] due to its
simplicity, flexibility, and relative robustness to slow response times. Each controller receives the
current pose, speed, and a list of waypoints, and actuates the steering, throttle and brake, respectively.
We target a cruise speed of 20 km/h. Controller parameters were tuned in the training town.
3.2
Imitation learning
Our second method is conditional imitation learning, a form of imitation learning that uses highlevel commands in addition to perceptual input [4]. This method utilizes a dataset of driving traces
recorded by human drivers in the training town. The dataset D = {hoi , ci , ai i} consists of tuples,
each of which contains an observation oi , a command ci , and an action ai . The commands are
provided by drivers during data collection and indicate their intentions, akin to turn signals. We use
a set of four commands: follow the lane (default), drive straight at the next intersection, turn left
at the next intersection, and turn right at the next intersection. The observations are images from a
forward-facing camera. To increase the robustness of the learned policies, we inject noise during
data collection. The dataset is used to train a deep network to predict the expert’s action a given an
observation o and a control command c. Further details are provided by Codevilla et al. [4].
We have collected around 14 hours of driving data for training. The network was trained using the
Adam optimizer [14]. To improve generalization, we performed data augmentation and dropout.
Further details are provided in the supplement.
3.3
Reinforcement learning
Our third method is deep reinforcement learning, which trains a deep network based on a reward
signal provided by the environment, with no human driving traces. We use the asynchronous advantage actor-critic (A3C) algorithm [19]. This algorithm has been shown to perform well in simulated
three-dimensional environments on tasks such as racing [19] and navigation in three-dimensional
mazes [19, 13, 5]. The asynchronous nature of the method enables running multiple simulation
threads in parallel, which is important given the high sample complexity of deep reinforcement
learning.
We train A3C on goal-directed navigation. In each training episode the vehicle has to reach a goal,
guided by high-level commands from the topological planner. The episode is terminated when
the vehicle reaches the goal, when the vehicle collides with an obstacle, or when a time budget is
exhausted. The reward is a weighted sum of five terms: positively weighted speed and distance
5
traveled towards the goal, and negatively weighted collision damage, overlap with the sidewalk, and
overlap with the opposite lane. Further details are provided in the supplement.
The network was trained with 10 parallel actor threads, for a total of 10 million simulation steps. We
limit training to 10 million simulation steps because of computational costs imposed by the realistic
simulation. This correspond to roughly 12 days of non-stop driving at 10 frames per second. This
is considered limited training data by deep reinforcement learning standards, where it is common
to train for hundreds of millions of steps [19], corresponding to months of subjective experience.
To ensure that our setup is fair and that 10 million simulation steps are sufficient for learning to act
in a complex environment, we trained a copy of our A3C agent to navigate in a three-dimensional
maze (task D2 from Dosovitskiy and Koltun [5]). The agent reached a score of 65 out of 100 after
10 million simulation steps – a good result compared to 60 out of 100 reported by Dosovitskiy and
Koltun [5] after 50 million simulation steps for A3C with less optimized hyperparameters.
4
Experiments
We evaluate the three methods – modular pipeline (MP), imitation learning (IL), and reinforcement
learning (RL) – on four increasingly difficult driving tasks, in each of the two available towns, in
six weather conditions. Note that for each of the three approaches we use the same agent on all
four tasks and do not fine-tune separately for each scenario. The tasks are set up as goal-directed
navigation: an agent is initialized somewhere in town and has to reach a destination point. In these
experiments, the agent is allowed to ignore speed limits and traffic lights. We organize the tasks in
order of increasing difficulty as follows:
• Straight: Destination is straight ahead of the starting point, and there are no dynamic objects
in the environment. Average driving distance to the goal is 200 m in Town 1 and 100 m in
Town 2.
• One turn: Destination is one turn away from the starting point; no dynamic objects. Average driving distance to the goal is 400 m in Town 1 and 170 m in Town 2.
• Navigation: No restriction on the location of the destination point relative to the starting
point, no dynamic objects. Average driving distance to the goal is 770 m in Town 1 and
360 m in Town 2.
• Navigation with dynamic obstacles: Same as the previous task, but with dynamic objects
(cars and pedestrians).
Experiments are conducted in two towns. Town 1 is used for training, Town 2 for testing. We
consider six weather conditions for the experiments, organized in two groups. Training Weather Set
was used for training and includes clear day, clear sunset, daytime rain, and daytime after rain. Test
Weather Set was never used during training and includes cloudy daytime and soft rain at sunset.
For each combination of a task, a town, and a weather set, testing is carried out over 25 episodes. In
each episode, the objective is to reach a given goal location. An episode is considered successful if
the agent reaches the goal within a time budget. The time budget is set to the time needed to reach
the goal along the optimal path at a speed of 10 km/h. Infractions, such as driving on the sidewalk
or collisions, do not lead to termination of an episode, but are logged and reported.
5
Results
Table 1 reports the percentage of successfully completed episodes under four different conditions.
The first is the training condition: Town 1, Training Weather Set. Note that start and goal locations
are different from those used during training: only the general environment and ambient conditions
are the same. The other three experimental conditions test more aggressive generalization: to the
previously unseen Town 2 and to previously unencountered weather from the Test Weather Set.
Results presented in Table 1 suggest several general conclusions. Overall, the performance of all
methods is not perfect even on the simplest task of driving in a straight line, and the success rate
further declines for more difficult tasks. Generalization to new weather is easier than generalization
to a new town. The modular pipeline and the agent trained with imitation learning perform on
par on most tasks and conditions. Reinforcement learning underperforms relative to the other two
approaches. We now discuss these four key findings in more detail.
6
Task
Training conditions
MP IL
RL
Straight
One turn
Navigation
Nav. dynamic
98
82
80
77
95
89
86
83
89
34
14
7
New town
MP IL RL
New weather
MP IL RL
92
61
24
24
100
95
94
89
74
12
3
2
97
59
40
38
98
90
84
82
86
16
2
2
New town & weather
MP
IL
RL
50
50
47
44
80
48
44
42
68
20
6
4
Table 1: Quantitative evaluation of three autonomous driving systems on goal-directed navigation
tasks. The table reports the percentage of successfully completed episodes in each condition. Higher
is better. The tested methods are: modular pipeline (MP), imitation learning (IL), and reinforcement
learning (RL).
Performance on the four tasks. Surprisingly, none of the methods performs perfectly even on
the simplest task of driving straight on an empty street in the training conditions. We believe the
fundamental reason for this is variability in the sensory inputs encountered by the agents. Training
conditions include four different weather conditions. The exact trajectories driven during training
are not repeated during testing. Therefore performing perfectly on this task requires robust generalization, which is challenging for existing deep learning methods.
On more advanced tasks the performance of all methods declines. On the most difficult task of
navigation in a populated urban environment, the two best methods – modular pipeline and imitation
learning – are below 90% success in all conditions and are below 45% in the test town. These
results clearly indicate that performance is far from saturated even in the training conditions, and
that generalization to new environments poses a serious challenge.
Generalization. We study two types of generalization: to previously unseen weather conditions and
to a previously unseen environment. Interestingly, the results are dramatically different for these
two. For the modular pipeline and for imitation learning, the performance in the “New weather”
condition is very close to performance in the training condition, and sometimes even better. However, generalization to a new town presents a challenge for all three approaches. On the two most
challenging navigation tasks, the performance of all methods falls by at least a factor of 2 when
switching to the test town. This phenomenon can be explained by the fact that the models have been
trained in multiple weather conditions, but in a single town. Training with diverse weather supports
generalization to previously unseen weather, but not to a new town, which uses different textures and
3D models. The problem can likely be ameliorated by training in diverse environments. Overall,
our results highlight the importance of generalization for learning-based approaches to sensorimotor
control.
Modular pipeline vs end-to-end learning. It is instructive to analyze the relative performance
of the modular pipeline and the imitation learning approach. These systems represent two general approaches to designing intelligent agents, and CARLA enables a direct controlled comparison
between them.
Surprisingly, the performance of both systems is very close under most testing conditions: the performance of the two methods typically differs by less than 10%. There are two notable exceptions
to this general rule. One is that the modular pipeline performs better under the “New weather” condition than under the training conditions. This is due to the specific selection of training and test
weathers: the perception system happens to perform better on the test weathers. Another difference
between the two approaches is that MP underperforms on navigation in the “New town” condition
and on going straight in “New town & weather”. This is because the perception stack fails systematically under complex weather conditions in the context of a new environment. If the perception
stack is not able to reliably find a drivable path, the rules-based planner and the classic controller
are unable to navigate to the destination in a consistent way. The performance is therefore bimodal:
if the perception stack works, the whole system works well; otherwise it fails completely. In this
sense, MP is more fragile than the end-to-end method.
Imitation learning vs reinforcement learning. We now contrast the performance of the two endto-end trained systems: imitation learning and reinforcement learning. On all tasks, the agent trained
with reinforcement learning performs significantly worse than the one trained with imitation learn7
Task
Training conditions
MP
IL
RL
MP
Opposite lane
Sidewalk
Collision-static
Collision-car
Collision-pedestrian
10.2
18.3
10.0
16.4
18.9
0.45
0.46
0.44
0.51
1.40
33.4
12.9
5.38
3.26
6.35
0.18
0.75
0.42
0.58
17.8
New town
IL
RL
1.12
0.76
0.40
0.59
1.88
0.23
0.43
0.23
0.41
2.55
New weather
MP
IL
RL
New town & weather
MP
IL
RL
16.1
24.2
16.1
20.2
20.4
0.40
0.43
0.45
0.47
1.46
57.3
> 57
4.05
1.86
11.2
0.09
0.72
0.24
0.85
20.6
0.78
0.81
0.28
0.44
1.41
0.21
0.48
0.25
0.37
2.99
Table 2: Average distance (in kilometers) traveled between two infractions. Higher is better.
ing. This is despite the fact that RL was trained using a significantly larger amount of data: 12 days
of driving, compared to 14 hours used by imitation learning. Why does RL underperform, despite
strong results on tasks such as Atari games [18, 19] and maze navigation [19, 5]? One reason is that
RL is known to be brittle [12], and it is common to perform extensive task-specific hyperparameter
search, such as 50 trials per environment as reported by Mnih et al. [19]. When using a realistic
simulator, such extensive hyperparameter search becomes infeasible. We selected hyperparameters
based on evidence from the literature and exploratory experiments with maze navigation. Another
explanation is that urban driving is more difficult than most tasks previously addressed with RL.
For instance, compared to maze navigation, in a driving scenario the agent has to deal with vehicle
dynamics and more complex visual perception in a cluttered dynamic environment. Finally, the poor
generalization of reinforcement learning may be explained by the fact that in contrast with imitation
learning, RL has been trained without data augmentation or regularization such as dropout.
Infraction analysis. CARLA supports fine-grained analysis of driving policies. We now examine
the behavior of the three systems on the hardest task: navigation in the presence of dynamic objects.
We characterize the approaches by average distance traveled between infractions of the following
five types: driving on the opposite lane, driving on the sidewalk, colliding with other vehicles,
colliding with pedestrians, and hitting static objects. Details are provided in the supplement.
Table 2 reports the average distance (in kilometers) driven between two infractions. All approaches
perform better in the training town. For all conditions, IL strays onto the opposite lane least frequently, and RL is the worst in this metric. A similar pattern is observed with regards to veering
onto the sidewalk. Surprisingly, RL collides with pedestrians least often, which could be explained
by the large negative reward incurred by such collisions. However, the reinforcement learning agent
is not successful at avoiding collisions with cars and static objects, while the modular pipeline generally performs best according to this measure.
These results highlight the susceptibility of end-to-end approaches to rare events: breaking or swerving to avoid a pedestrian is a rare occurrence during training. While CARLA can be used to increase
the frequency of such events during training to support end-to-end approaches, deeper advances
in learning algorithms and model architectures may be necessary for significant improvements in
robustness [3].
6
Conclusion
We have presented CARLA, an open simulator for autonomous driving. In addition to open-source
code and protocols, CARLA provides digital assets that were created specifically for this purpose
and can be reused freely. We leverage CARLA’s simulation engine and content to test three approaches to autonomous driving: a classic modular pipeline, a deep network trained end-to-end via
imitation learning, and a deep network trained via reinforcement learning. We challenged these
systems to navigate urban environments in the presence of other vehicles and pedestrians. CARLA
provided us with the tools to develop and train the systems and then evaluate them in controlled
scenarios. The feedback provided by the simulator enables detailed analyses that highlight particular failure modes and opportunities for future work. We hope that CARLA will enable a broad
community to actively engage in autonomous driving research. The simulator and accompanying
assets will be released open-source at http://carla.org.
8
Acknowledgements
CARLA would not have been possible without the development team at the CVC in Barcelona. The
authors are particularly grateful to Nestor Subiron, the principal programmer, and Francisco Perez,
the lead digital artist, for their tireless work. We sincerely thank artists Iris Saez and Alberto Abal,
FX programmer Marc Garcia, and traffic behavior programmer Francisco Bosch. We thank artists
Mario Gonzalez, Juan Gonzalez, and Ignazio Acerenza for their contributions, and programmer
Francisco Molero for his support. Antonio M. López and Felipe Codevilla acknowledge the Spanish
MINECO project TRA2014-57088-C2-1-R and the Spanish DGT project SPIP2017-02237, as well
as the Generalitat de Catalunya CERCA Program and its ACCIO agency. Felipe Codevilla was supported in part by FI grant 2017FI-B1-00162. The authors thank Epic Games for support concerning
the use of UE4.
References
[1] A. Best, S. Narang, D. Barber, and D. Manocha. AutonoVi: Autonomous vehicle planning with dynamic
maneuvers and traffic constraints. In Intelligent Robots and Systems (IROS), 2017.
[2] D. H. Biedermann, M. Ochs, and R. Mester. Evaluating visual ADAS components on the COnGRATS
dataset. In IEEE Intelligent Vehicles Symposium, 2016.
[3] C. Chen, A. Seff, A. L. Kornhauser, and J. Xiao. DeepDriving: Learning affordance for direct perception
in autonomous driving. In International Conference on Computer Vision (ICCV), 2015.
[4] F. Codevilla, M. Müller, A. Dosovitskiy, A. López, and V. Koltun. End-to-end driving via conditional
imitation learning. arXiv:1710.02410, 2017.
[5] A. Dosovitskiy and V. Koltun. Learning to act by predicting the future. In International Conference on
Learning Representations (ICLR), 2017.
[6] M. T. Emirler, I. M. C. Uygan, B. A. Güvenç, and L. Güvenç. Robust PID steering control in parameter
space for highly automated driving. International Journal of Vehicular Technology, 2014.
[7] Epic Games. Unreal Engine 4. https://www.unrealengine.com.
[8] U. Franke. Autonomous driving. In Computer Vision in Vehicle Technology. 2017.
[9] A. Gaidon, Q. Wang, Y. Cabon, and E. Vig. Virtual worlds as proxy for multi-object tracking analysis. In
Computer Vision and Pattern Recognition (CVPR), 2016.
[10] V. Haltakov, C. Unger, and S. Ilic. Framework for generation of synthetic ground truth data for driver
assistance applications. In German Conference on Pattern Recognition (GCPR), 2013.
[11] A. Handa, R. A. Newcombe, A. Angeli, and A. J. Davison. Real-time camera tracking: When is high
frame-rate best? In European Conference on Computer Vision (ECCV), 2012.
[12] P. Henderson, R. Islam, P. Bachman, J. Pineau, D. Precup, and D. Meger. Deep reinforcement learning
that matters. arXiv:1709.06560, 2017.
[13] M. Jaderberg, V. Mnih, W. M. Czarnecki, T. Schaul, J. Z. Leibo, D. Silver, and K. Kavukcuoglu. Reinforcement learning with unsupervised auxiliary tasks. In International Conference on Learning Representations (ICLR), 2017.
[14] D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. In International Conference on
Learning Representations (ICLR), 2015.
[15] A. Krizhevsky, I. Sutskever, and G. E. Hinton. ImageNet classification with deep convolutional neural
networks. In Neural Information Processing Systems (NIPS), 2012.
[16] Y. LeCun, U. Muller, J. Ben, E. Cosatto, and B. Flepp. Off-road obstacle avoidance through end-to-end
learning. In Neural Information Processing Systems (NIPS), 2005.
[17] G. Lin, A. Milan, C. Shen, and I. Reid. RefineNet: Multi-path refinement networks for high-resolution
semantic segmentation. In Computer Vision and Pattern Recognition (CVPR), 2017.
[18] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller,
A. K. Fidjeland, G. Ostrovski, S. Petersen, C. Beattie, A. Sadik, et al. Human-level control through deep
reinforcement learning. Nature, 518(7540), 2015.
9
[19] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. P. Lillicrap, T. Harley, D. Silver, and K. Kavukcuoglu.
Asynchronous methods for deep reinforcement learning. In International Conference on Machine Learning (ICML), 2016.
[20] M. Müller, N. Smith, and B. Ghanem. A benchmark and simulator for UAV tracking. In European
Conference on Computer Vision (ECCV), 2016.
[21] B. Paden, M. Cáp, S. Z. Yong, D. S. Yershov, and E. Frazzoli. A survey of motion planning and control
techniques for self-driving urban vehicles. IEEE Transactions on Intelligent Vehicles, 1(1), 2016.
[22] D. Pomerleau. ALVINN: An autonomous land vehicle in a neural network. In Neural Information Processing Systems (NIPS), 1988.
[23] S. R. Richter, V. Vineet, S. Roth, and V. Koltun. Playing for data: Ground truth from computer games. In
European Conference on Computer Vision (ECCV), 2016.
[24] S. R. Richter, Z. Hayder, and V. Koltun. Playing for benchmarks. In International Conference on Computer Vision (ICCV), 2017.
[25] G. Ros, L. Sellart, J. Materzynska, D. Vázquez, and A. López. The SYNTHIA dataset: A large collection of synthetic images for semantic segmentation of urban scenes. In Computer Vision and Pattern
Recognition (CVPR), 2016.
[26] D. Silver, J. A. Bagnell, and A. Stentz. Learning from demonstration for autonomous navigation in
complex unstructured terrain. International Journal of Robotics Research, 29(12), 2010.
[27] J. Skinner, S. Garg, N. Sünderhauf, P. I. Corke, B. Upcroft, and M. Milford. High-fidelity simulation for
evaluating robotic vision performance. In Intelligent Robots and Systems (IROS), 2016.
[28] B. Wymann, E. Espié, C. Guionneau, C. Dimitrakakis, R. Coulom, and A. Sumner. TORCS, The Open
Racing Car Simulator. http://www.torcs.org.
[29] Z. Zhang, H. Rebecq, C. Forster, and D. Scaramuzza. Benefit of large field-of-view cameras for visual
odometry. In International Conference on Robotics and Automation (ICRA), 2016.
10
Supplementary Material
S.1
Simulator Technical Details
S.1.1
Client and Server Information Exchange
CARLA is designed as a client-server system. The server runs and renders the CARLA world. The
client provides an interface for users to interact with the simulator by controlling the agent vehicle
and certain properties of the simulation.
Commands. The agent vehicle is controlled by 5 types of commands sent via the client:
• Steering: The steering wheel angle is represented by a real number between -1 and 1, where
-1 and 1 correspond to full left and full right, respectively.
• Throttle: The pressure on the throttle pedal, represented as a real number between 0 and 1.
• Brake: The pressure on the brake pedal, represented as a real number between 0 and 1.
• Hand Brake: A boolean value indicating whether the hand brake is activated or not.
• Reverse Gear: A boolean value indicating whether the reverse gear is activated or not.
Meta-commands. The client is also able to control the environment and the behavior of the server
with the following meta commands:
• Number of Vehicles: An integer number of non-player vehicles to be spawned in the city.
• Number of Pedestrians: An integer number of pedestrians to be spawned in the city.
• Weather Id: An index of the weather/lighting presets to use. The following are currently
supported: Clear Midday, Clear Sunset, Cloudy Midday, Cloudy Sunset, Soft Rain Midday,
Soft Rain Sunset, Medium Rain Midday, Cloudy After Rain Midday, Cloudy After Rain
Sunset, Medium Rain Sunset, Hard Rain Midday, Hard Rain Sunset, After Rain Noon,
After Rain Sunset.
• Seed Vehicles/Pedestrians: A seed that controls how non-player vehicles and pedestrians
are spawned. It is possible to have the same vehicle/pedestrian behavior by setting the same
seed.
• Set of Cameras: A set of cameras with specific parameters such as position, orientation,
field of view, resolution and camera type. Available camera types include an optical RGB
camera, and pseudo-cameras that provide ground-truth depth and semantic segmentation.
Measurements and sensor readings. The client receives from the server the following information
about the world and the player’s state:
• Player Position: The 3D position of the player with respect to the world coordinate system.
• Player Speed: The player’s linear speed in kilometers per hour.
• Collision: Cumulative impact from collisions with three different types of objects: cars,
pedestrians, or static objects.
• Opposite Lane Intersection: The current fraction of the player car footprint that overlaps
the opposite lane.
• Sidewalk Intersection: The current fraction of the player car footprint that overlaps the
sidewalk.
• Time: The current in-game time.
• Player Acceleration: A 3D vector with the agent’s acceleration with respect to the world
coordinate system.
• Player Orientation: A unit-length vector corresponding to the agent car orientation.
• Sensor readings: The current readings from the set of camera sensors.
• Non-Client-Controlled agents information: The positions, orientations and bounding boxes
for all pedestrians and cars present in the environment.
• Traffic Lights information: The position and state of all traffic lights.
• Speed Limit Signs information: Position and readings from all speed limit signs.
11
S.1.2
Environment
CARLA provides two towns: Town 1 and Town 2. Figure S.1 shows maps of these towns and representative views. A large variety of assets were produced for CARLA, including cars and pedestrians.
Figure S.2 demonstrates this diversity.
S.2
Driving Systems Technical Details
In this section we provide additional technical details for the autonomous driving systems we have
tested.
S.2.1
Modular Pipeline
Perception module. Training of the semantic segmentation network was performed using
Adam [14] with learning rate λ0 = 10−6 for 300 epochs with batch size 2. The back-end ResNet is
pre-trained on ImageNet and frozen during training. No data augmentation is used.
The intersection classifier network is trained on 500 images balanced between the two classes. We
used Adam with learning rate λ0 = 10−3 for 500 epochs with batch size 5. No pre-training or data
augmentation are used.
Local planning for modular pipeline. In the road-following state, the local planner uses
the ego-lane mask computed from the semantic segmentation to select points that maintain a fixed
distance with the right edge of the road. The left-turn at intersections is more complex due
to the temporary absence of lane markings, the longer distance to the target lane, and the limited
field of view of the forward-facing camera. To deal with these challenges, we first compute waypoints towards the center of the intersection with a predefined skew angle; this helps improve the
visibility of the target lane. An auxiliary camera (along with its computed semantic segmentation
map) is used to determine the shape and alignment of the vehicle with respect of the target lane.
In the second step, the waypoints are laid out to yield a smooth trajectory from the center of the
intersection to the target lane. The right-turn state uses a similar strategy. However, as turning
right is easier given the target lane proximity, the number of waypoints needed is lower and only the
forward-facing information is required. The intersection-forward state is handled similarly
to road-following. The hazard-stop mode is activated when the dynamic obstacle map presents
a cumulative probability of obstacle above a predefined threshold. In this case, the system generates
a special waypoint to request an emergency break from the controller.
S.2.2
Imitation Learning
Architecture. Table S.1 details the configuration of the network used in the imitation learning
approach [4]. The network is composed of four modules: a perception module that is focused on
processing image inputs, a measurement module that processes the speed input, a joint input module
that merges the perception and measurement information, and a control module that produces motor
commands from the joint input representation. The control module consists of 4 identical branches:
command-conditional modules for predicting the steering angle, brake, and throttle – one for each
of the four commands. One of the four command-conditional modules is selected based on the input
command. The perception module is implemented by a convolutional network that takes a 200×88
image as input and outputs a 512-dimensional vector. All other modules are implemented by fullyconnected networks. The measurement module takes as input a measurement vector and outputs a
128-dimensional vector.
Training details. We trained all networks with Adam [14]. We used mini-batches of 120 samples.
We balanced the mini-batches, using the same number of samples for each command. Our starting
learning rate was 0.0002 and it was multiplied by 0.5 every 50,000 mini-batch iterations. We trained
for 294,000 iterations in total. Momentum parameters were set to β1 = 0.7 and β2 = 0.85. We used
no weight decay, but performed 50% dropout after hidden fully-connected layers and 20% dropout
on convolutional layers. To further reduce overfitting, we performed extensive data augmentation by
adding Gaussian blur, additive Gaussian noise, pixel dropout, additive and multiplicative brightness
variation, contrast variation, and saturation variation. Before feeding a raw 800 × 600 image to
12
Town 1 Map
Town 2 Map
Figure S.1: The two CARLA towns. Left: views and a map of CARLA Town 1. Right: views and
a map of CARLA Town 2.
13
Figure S.2: Diversity of cars and pedestrians currently available in CARLA.
14
module
Perception
Measurement
Joint input
Control
input dimension
channels
kernel
stride
200 × 88 × 3
98 × 48 × 32
96 × 46 × 32
47 × 22 × 64
45 × 20 × 64
22 × 9 × 128
20 × 7 × 128
9 × 3 × 256
7 · 1 · 256
512
1
128
128
512 + 128
512
256
256
32
32
64
64
128
128
256
256
512
512
128
128
128
512
256
256
1
5
3
3
3
3
3
3
3
−
−
−
−
−
−
−
−
−
2
1
2
1
2
1
2
1
−
−
−
−
−
−
−
−
−
Table S.1: Exact configurations of all network modules for the imitation learning approach.
the network, we cropped 171 pixels at the top and 45 at the bottom, and then resized the resulting
800 × 384 image to a resolution of 200×88.
Training data. The expert training data was collected from two sources: an automated agent and
human driver data. The automated agent has access to privileged information such as locations of
dynamic objects, ego-lane, states of traffic lights. 80% of the demonstrations were provided by the
automated agent and 20% by a human driver.
In order to improve the robustness of the learned policy, we injected noise into the expert’s steering
during training data collection. Namely, at random points in time we added a perturbation to the
steering angle provided by the driver. The perturbation is a triangular impulse: it increases linearly,
reaches a maximal value, and then linearly declines. This simulates gradual drift from the desired
trajectory, similar to what might happen with a poorly trained controller. The triangular impulse is
parametrized by its starting time t0 , duration τ ∈ R+ , sign σ ∈ {−1, +1}, and intensity γ ∈ R+ :
2(t − t0 )
sperturb (t) = σγ max 0, 1 −
.
(1)
−1
τ
Every second of driving we started a perturbation with probability pperturb . We used pperturb = 0.1
in our experiments. The sign of each perturbation was sampled at random, the duration was sampled
uniformly from 0.5 to 2 seconds, and intensity was fixed to 0.15.
S.2.3
Reinforcement Learning
We base our A3C agent on the network architecture proposed by Mnih et al. [18]. The input to
the network consists of two most recent images observed by the agent, resized to 84 × 84 pixels,
as well as a vector of measurements. The measurement vector includes the current speed of the
car, distance to goal, damage from collisions, and the current high-level command provided by
the topological planner, in one-hot encoding. The inputs are processed by two separate modules:
images by a convolutional module, measurements by a fully-connected network. The outputs of the
two modules are concatenated and further processed jointly. We trained A3C with 10 parallel actor
threads, for a total of 10 million environment steps. We used 20-step rollouts, following Jaderberg et
al. [13], with initial learning rate 0.0007 and entropy regularization 0.01. Learning rate was linearly
decreased to zero over the course of training.
The reward is a weighted sum of five terms: distance traveled towards the goal d in km, speed v in
km/h, collision damage c, intersection with the sidewalk s (between 0 and 1), and intersection with
the opposite lane o (between 0 and 1).
rt = 1000 (dt−1 − dt ) + 0.05 (vt − vt−1 ) − 0.00002 (ct − ct−1 ) − 2 (st − st−1 ) − 2 (ot − ot−1 ). (2)
15
S.3
Experimental Setup
S.3.1
Types of Infractions
We characterize the approaches by average distance travelled between infractions of the following
five types:
•
•
•
•
•
Opposite lane: More than 30% of the car’s footprint is over wrong-way lanes.
Sidewalk: More than 30% of the car’s footprint is over the sidewalk.
Collision with static object: Car makes contact with a static object, such as pole or building.
Collision with car: Car makes contact with another car.
Collision with pedestrian: Car makes contact with a pedestrian.
The duration of each violation is limited to 2 seconds, so if the car remains on the sidewalk for 10
seconds, this will be counted as 5 violations, not one.
16
| 1cs.CV
|
Noname manuscript No.
(will be inserted by the editor)
Investigating the Parameter Space of Evolutionary
Algorithms
Moshe Sipper · Weixuan Fu · Karuna
Ahuja · Jason H. Moore
arXiv:1706.04119v3 [cs.NE] 10 Oct 2017
Received: October 11, 2017/ Accepted: date
Abstract The practice of evolutionary algorithms involves the tuning of many
parameters. How big should the population be? How many generations should
the algorithm run? What is the (tournament selection) tournament size? What
probabilities should one assign to crossover and mutation? Through an extensive series of experiments over multiple evolutionary algorithm implementations and problems we show that parameter space tends to be rife with viable
parameters, at least for 25 the problems studied herein. We discuss the implications of this finding in practice.
Keywords Evolutionary Algorithms · Genetic Programming · Meta-Genetic
Algorithm · Parameter Tuning · Hyper-Parameter
1 Introduction
One of the crucial tasks of the evolutionary computation (EC) practitioner
is the tuning of parameters. The fitness-select-vary paradigm comes with a
plethora of parameters relating to the population, the generations, and the
operators of selection, crossover, and mutation. It seems natural to ask whether
the myriad parameters can be obtained through some clever methodology
(perhaps even an evolutionary one) rather than by trial and error; indeed,
as we shall see below, such methods have been devised. Our own interest
in the issue of parameters stems partly from a desire to better understand
evolutionary algorithms (EAs) and partly from our recent investigation into
the design and implementation of an accessible artificial intelligence system
[16].
Institute for Biomedical Informatics (IBI), Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA 19104. E-mail: {sipper,weixuanf,karunaa,jhmoore}@upenn.edu ·
M. Sipper is also with the Department of Computer Science, Ben-Gurion University, BeerSheva 8410501, Israel.
2
Moshe Sipper et al.
In this paper we examine key parameters, asking whether we might improve
the parameter-seeking process. EC practitioners often employ commonly used
parameters “selected by conventions, ad hoc choices, and very limited experimental comparisons” [7]. We experimented with a large and variegated
assortment of problems in what is arguably one of the most extensive EC
experiments, concluding that parameter space, in fact, tends to be rife with
viable parameters, at least for the 25 problems studied herein.
We begin in the next section by delineating previous work on finding parameters through intelligent means. In Section 3 we turn to our own experiments by first describing the software and datasets we used. Section 4 presents
our first approach for obtaining “good” parameter sets, which was based on
a meta-genetic algorithm, followed by a random-search approach in Section 5.
We discuss our findings and conclude in Section 6.
2 Previous Work: Seeking Parameters
Before delving into a detailed discussion, let us make the distinction between
parameters, which are part of the model being evolved, and hyper-parameters
(also called meta-parameters), which are not part of the model and need to
be set by the user before running the evolutionary process, either manually or
algorithmically. Examples of parameters are synaptic weights in deep neural
networks and ephemeral random constants (ERCs) in genetic programming
(GP), while examples of hyper-parameters include the number of hidden layers
in deep neural networks and several standard parameters in GP: population
size, generation count, crossover rate, mutation probability, and selection type.
[4] noted that there are two major forms of setting
(hyper-)parameter values: parameter tuning and parameter control. Tuning
refers to the common practice of seeking good values for the parameters before running the algorithm, then running the algorithm using these values,
which remain fixed during the run. Parameter control means that values for
the parameters are changed during the run.
An early work by [19] looked into the problem of VLSI layout, aiming to
minimize the overall connection length between the components (cells) of a
circuit. They devised a genetic algorithm that used three operators: crossover
(order, cycle, or partially mapped—PMX), mutation (pairwise interchange
of genes), and inversion (taking a random segment in a solution string and
flipping it). They used a meta-GA to optimize crossover rate, inversion rate,
and mutation rate. The individuals in the meta-GA population consisted of
three integers in the range [0,20] (the overall search space was thus quite
small, comprising 8000 combinations). An individual’s fitness was defined as
the quality of the best layout found when a GA was run with the parameters it
embodied. The meta-GA was run on four test circuits, had a population size of
20, ran for 100 generations, and used uniform crossover (select parameter from
either parent at random) and mutation (add random noise; no inversion used).
They noted that crossover rate converged to values in the range 20-40%, with
Investigating the Parameter Space of Evolutionary Algorithms
3
little difference in best fitness as long as the rate was within this range. The
mutation rate evolved by the meta-GA was 0.5-1.5%, and the inversion rate
was 0-30%. The authors then adopted a crossover rate of 33%, an inversion rate
of 15%, and a mutation rate of 0.5%. These were used to run the optimizing
GA on circuits of interest (different than those used in the meta-GA phase)
and compare it with other techniques.
Another early work by [8] described meta-evolutionary programming. Their
flavor of evolutionary programming used mutation only to evolve solutions to
two functions in R2 . Mutation took a single parent and generated an offspring by adding Gaussian random noise with zero mean and variance equal
to F (x, y)—the function under investigation; this was applied to all members
of the population. The meta-algorithm attached a perturbation term to each
individual in the population, which was used as variance during mutation.
This term was then evolved along with the solution. They compared both
these algorithms (meta- and non-meta) with each other, and with a standard,
Holland-style genetic algorithm, concluding that both versions of evolutionary
programming outperformed the GA. They also concluded that the standard
evolutionary-programming method attained better results over the two functions studied, but that the meta-version was more robust to changes in the
function.
[26] applied a genetic algorithm to nonlinear constrained mixed discreteinteger optimization problems, using a meta-GA to optimize population size,
crossover probability, mutation probability, and crossover operator. The total
number of parameter combinations was 19,200. The fitness of an individual in
the meta-GA population was taken as the optimum found by a GA run with
the parameters defined by the individual. Their findings showed insensitivity
to crossover rate but high sensitivity to mutation rate. Four-point crossover
outperformed one-, two-, and three-point crossover.
[10] (see also [6]) noted that, “it is natural to expect adaptation to be used
not only for finding solutions to a problem, but also for tuning the algorithm
to the particular problem.” Their paper provided a short survey of adaptation techniques in evolutionary computation. They defined four categories of
adaptation: static—constant throughout run and tuned externally; and dynamic, refined further into deterministic—parameter altered by a deterministic rule, adaptive—some feedback from the evolutionary algorithm determines
the change in the parameter, and self-adaptive—the parameters to be adapted
are encoded into the chromosomes and undergo crossover and mutation. They
also defined four levels of adaptation: environment—such as changes to the
fitness function (e.g., weights), population—parameters that apply to the entire population are adapted, individual—parameters held within an individual
affecting only that individual, and component—parameters specific to a component or gene within an individual (such as self-adaptation of component-level
mutation steps sizes and rotation angles in evolution strategies).
[17] presented meta-Lamarckian learning in the context of memetic algorithms (MA), which incorporate local improvement procedures within traditional GAs. Their paper investigated the adaptive choice of local search (LS)
4
Moshe Sipper et al.
methods to ensure robustness in MA search. In addition to Darwinian evolution they also studied Lamarckian learning, where the genotype reflected the
result of improvement through placing the locally improved individual back
into the population to compete for reproductive opportunities. They studied
two adaptive meta-Lamarckian learning strategies, a heuristic approach based
on subproblem decomposition, and a stochastic approach based on a biased
roulette wheel. They tested their system on continuous parametric benchmark
test problems and on a wing-design problem. They concluded that, “the strategies presented are effective in producing search performances that are close to
the best traditional MA with a LS chosen to suit the problem in hand. Given
that such knowledge is often not available a priori, this ability to tackle new
problems in a robust way is of significant value.”
[18] proposed the utilization of logistic regression for tuning the parameters
of a “transgenetic” algorithm—an evolutionary algorithm that deals, basically,
with a population of chromosomes and a population of transgenetic vectors.
They cited symbiogenesis as their inspiration, a theory of evolution according
to which new cell organelles, new bodies, new organs, and new species arise
from symbiosis, wherein independent organisms merge to form composites.
The chromosomes of a transgenetic algorithm do not share genetic material directly. There are no crossover and mutation operations but rather transgenetic
vectors that obtain and insert information into the chromosomes. They used
logistic regression to set two main parameters of their algorithm (population
size and maximum length of transgenetic vector that met certain constraints),
their problem of interest being Traveling Salesman. They showed that their
algorithm outperformed a standard memetic algorithm.
[4], mentioned above, described an efficient technique for adapting control parameter settings associated with differential evolution (DE). DE uses a
floating-point encoding for global optimization over continuous spaces, creating new candidate solutions by combining the parent individual and several
other individuals of the same population. A candidate replaces the parent only
if it has better fitness. DE has three parameters: amplification factor of the
difference vector, crossover control parameter, and population size. In [4], the
parameter control technique was based on the self-adaptation of the first two
parameters, which were encoded within an individual’s genome. Their testbed
consisted of twenty-one benchmark functions from [27]. They concluded that
self-adaptive DE is better or comparable to the original DE and some other
evolutionary algorithms they examined.
[5]—in his chapter in the book Parameter Setting in Evolutionary Algorithms ([13])—provided a thirty-year perspective of parameter setting in evolutionary computation. He wrote that, “It is not surprising, then, that from
the beginning EA practitioners have wanted to know the answers to questions
like:
– Are there optimal settings for the parameters of an EA in general?
– Are there optimal settings for the parameters of an EA for a particular class of fitness landscapes?
Investigating the Parameter Space of Evolutionary Algorithms
5
– Are there robust settings for the parameters of an EA that produce
good performance over a broad range of fitness landscapes?
– Is it desirable to dynamically change parameter values during an
EA run?
– How do changes in a parameter affect the performance of an EA?
– How do landscape properties affect parameter value choices?”
He went on to review static parameter-setting strategies, where he mentioned a two-level EA, the top level of which evolved the parameters of the
lower-level EA. [5] stated that the, “key insight from such studies is the robustness of EAs with respect to their parameter settings. Getting ‘in the ball park’
is generally sufficient for good EA performance.” Our study herein not only
confirms this observation through numerous experiments, but also presents
the novel finding that the ballpark can be quite large. Of dynamic parametersetting strategies he opined that, “it is difficult to say anything definitive and
general about the performance improvements obtained through dynamic parameter setting strategies.” He added, interestingly, “My own view is that
there is not much to be gained in dynamically adapting EA parameter settings when solving static optimization problems. The real payoff for dynamic
parameter setting strategies is when the fitness landscapes are themselves dynamic ...” [5] also discussed the different aspects of setting various standard
parameters: parent population size, offspring population size, selection, reproductive operators; adapting the representation; and parameterless EAs.
[11] provided a survey of self-adaptive parameter control in evolutionary
computation, where—as noted above—control parameters are added to the
(evolving) genome. He complemented the taxonomy offered by [6], dividing
parameter setting into two main categories: tuning and control. Tuning was
further divided into tuning by hand, tuning by design of experiments, and
tuning by meta-evolution; while control was divided as previously into deterministic, adaptive, and self-adaptive. This paper mainly focused on function
optimization techniques, such as the covariance matrix self-adaptation evolution strategy (CMSA-ES). A mention of meta-evolution noted that they,
“have to be chosen problem-dependent, which is the obvious drawback of the
approach.” He concluded with the observation that most theoretical work on
self-adaptation concentrated on mutation, stating that, “A necessary condition
for the success of self-adaptation is a tight link between strategy parameters
and fitness.”
[7] (see also [20, 21]) presented a conceptual framework for parameter tuning based on a three-tier hierarchy of: a problem, an evolutionary algorithm
(EA), and a tuner. They argued that parameter tuning could be considered
from two different perspectives, that of configuring an evolutionary algorithm
by choosing parameter values that optimize its performance, and that of analyzing an evolutionary algorithm by studying how its performance depends
on its parameter values. Furthermore, they distinguished between analyzing
an evolutionary algorithm by studying how its performance depends on the
problems it is solving, and analyzing an evolutionary algorithm by studying
6
Moshe Sipper et al.
how its performance varies when executing independent repetitions of its run.
They noted the existence of two types of parameters, qualitative (e.g., crossover
type) and quantitative (e.g., crossover rate). They opined that, “using tuning
algorithms is highly rewarding. The efforts are moderate and the gains in performance can be very significant. Second, by using tuning algorithms one does
not only obtain superior parameter values, but also much information about
parameter values and algorithm performance. This information can be used
to obtain a deeper understanding of the algorithm in question.” The paper
discussed a wide range of tuning algorithms, which they classified as sampling
methods, model-based methods, screening methods, and meta-evolutionary algorithms. Of interest in their discussion of meta-evolutionary GAs was [14],
an early (possibly first) though limited work; and the description of multiobjective meta-GAs, which tuned for more than a single objective, e.g., speed
and accuracy. They opined that, “parameter tuning in EC has been a largely
ignored issue for a long time ... In the current EC practice parameter values are
mostly selected by conventions, ad hoc choices, and very limited experimental
comparisons.”[italics added] This latter observation—with which we wholly
concur—forms part of our motivation for the current study.
[1] carried out “the largest empirical analysis so far on parameter tuning
in search-based software engineering.” They performed experiments in the
domain of test generation for object-oriented software using genetic algorithms.
The objective was to derive sets of test cases (suites) for a given class, such
that the test suite maximized a chosen coverage criterion while minimizing the
number of tests and their length. A test case in this domain was a sequence of
method calls that constructed objects and called methods on them. Because
their goal was to study the effects of tuning, they analyzed all the possible
combinations of the selected parameter values. They concluded that, “tuning
can improve performance, but default values coming from the literature can
be already sufficient.”
[3] studied neural networks, showing that random experiments were more
efficient than grid experiments for hyper-parameter optimization in the case
of several learning algorithms on several datasets. They wrote that, “random
experiments are more efficient because not all hyperparameters are equally
important to tune ... Random experiments are also easier to carry out than
grid experiments for practical reasons related to the statistical independence
of every trial.” This paper partly motivated our choice of random search in
Section 5.
[22] is perhaps the most relevant paper to our current research, presenting a
meta-EA called REVAC (Relevance Estimation and Value Calibration), which
they used on a suite of 25 real-valued benchmark functions (real-parameter
optimization functions defined for the CEC 2005 Special Session on RealParameter Optimization, including five unimodal functions and twenty multimodal functions; [23]). They chose to improve G-CMA-ES, which they considered a hard-to-improve evolutionary algorithm, cycling through parent selectionrecombination-mutation-survivor selection-evaluation over a population of G-
Investigating the Parameter Space of Evolutionary Algorithms
7
CMA-ES parameter vectors. They were indeed successful in improving the
algorithm’s performance.
Our aim is to go further, casting our net much wider in terms of problem
domains, seeking to better understand parameter space.
3 Software and Datasets
We chose to work with two very different evolutionary-algorithm packages:
Distributed Evolutionary Algorithms in Python (DEAP) [9]—which uses treebased GP, and M4GP [12]—which is a stack-based evolutionary algorithm. We
ran our experiments on a cluster of 224 cores (Intel® Xeon® E5-2650L), with
2 threads per core.
DEAP, available at github.com/DEAP, comes with five sample problems:
1. Symbolic Regression, with data points generated from the quartic polynomial x4 + x3 + x2 + x.
2. Even-Parity: find the parity, even or odd, of n Boolean inputs (we set n to
8).
3. Multiplexer 3-8: reproduce the behavior of an electronic multiplexer with
3 address bits (inputs) and 8 data lines (outputs).
4. Artificial Ant: evolve simple controllers—“artificial ants”—that are able to
eat all the food located in a given two-dimensional, grid environment.
5. Spambase: return true if an email is spam, false otherwise.
We performed a preliminary investigation of these five problems, essentially
running DEAP with parameters tuned by hand (a common-enough undertaking in the EC community). We found that for the first four problems one can
attain an accuracy level of close to 1, while for Spambase our preliminary investigation set the attainable accuracy level at 0.93. More detailed descriptions
of each problem can be found on the DEAP website.
M4GP is entirely different, based on stack-based GP. This serves to reinforce our conclusions by running our experiments on two very different types
of GP algorithms. M4GP uses a nearest centroid distance metric to make
classifications, with each program producing multiple outputs. We ran M4GP
over problems from PMLB, a new publicly available dataset suite (accessibly
hosted on GitHub) initialized with 165 real-world, simulated, and toy benchmark datasets for evaluating supervised classification methods [15]. Note that
PMLB focuses on classification benchmarks, whereas of the DEAP sample
problems above only Spambase involves classification. Thus, our study includes
different types of problems.
The preliminary investigation in this case consisted of delving into the
data provided by the PMLB authors. “Once the datasets were scaled,” wrote
[15], “we performed a comprehensive grid search of each of the ML method’s
parameters using 10-fold cross-validation to find the best parameters (according to mean cross-validation balanced accuracy) for each ML method on each
dataset. This process resulted in a total of over 5.5 million evaluations of the
13 ML methods over the 165 data sets.”
8
Moshe Sipper et al.
Table 1 PMLB results by [15]. (a) “Easier” problems: 10 datasets for which a balanced
accuracy of 1 was attained most frequently. (b) “Harder” problems: 10 datasets whose
average balanced accuracy was in the range [0.9, 0.95]. Shown for each problem: number of
features, number of classes, and number of samples.
(a) “Easier” problems
problem
mofn-3-7-10
clean2
clean1
mushroom
irish
agaricus-lepiota
corral
xd6
mux6
threeOf9
features
10
168
168
22
5
22
6
9
6
9
classes
2
2
2
2
2
2
2
2
2
2
samples
1324
6598
476
8124
500
8145
160
973
128
512
(b) “Harder” problems
problem
breast-cancer-wisconsin
wdbc
tokyo1
new-thyroid
spambase
vote
soybean
house-votes-84
breast-w
molecular-biology promoters
features
30
30
44
5
57
16
35
16
9
58
classes
2
2
2
3
2
2
18
2
2
2
samples
569
569
959
215
4601
435
675
435
699
106
This available data saved us the need to run initial investigative experiments over PMLB. Each row of the 5.5-million table of results represents a
single run, of a single ML algorithm, using a specific set of parameters; a row
contains six columns: dataset name, classifier (machine learning algorithm),
parameters, accuracy, macro-averaged F1 score, balanced accuracy. Given that
one usually wants first and foremost to solve a problem we focused on accuracy, specifically, balanced accuracy (the rightmost value of each row), which
is a normalized version of accuracy that accounts for class imbalance by calculating accuracy on a per-class basis, then averaging the per-class accuracies
[24, 25].
We composed two suites of ten datasets each: 1) 10 datasets for which
a balanced accuracy of 1 was attained most frequently (Table 1(a)), and 2)
10 datasets whose average balanced accuracy was in the range [0.9, 0.95] (Table 1(b)).
Investigating the Parameter Space of Evolutionary Algorithms
9
Fig. 1 The meta-genetic algorithm. The population consisted of simple linear genomes that
contained five parameters. An individual’s fitness was obtained by launching an entire GP
evolutionary run with the parameters given in the genome. pop: population size, gen: generation count, xo: crossover probability, mu: mutation probability, tour: size of tournament
for tournament selection.
4 Searching for Parameters using a Meta-Genetic Algorithm
As done in a number of previous works discussed in Section 2, we ran a metalevel genetic algorithm over the space of GP parameters, of which we identified
five major ones:
1.
2.
3.
4.
5.
Population size (∈ N, [100, 3000]),
Number of generations (∈ N, [100, 2000]),
Crossover rate (∈ R, [0, 1]),
Mutation rate (∈ R, [0, 1]),
Tournament size (∈ N, [3, 100]).
Figure 1 shows a schematic of the meta-GA’s workings. The meta-GA
population comprised individuals with simple linear genomes that encoded
the above five parameters as either integers or real values, respectively. An individual’s fitness was obtained by launching entire GP evolutionary runs with
the parameters given in the genome. The GP in question was either DEAP or
M4GP. DEAP’s goal was to solve the five problems listed in Section 3 (regression, parity, mux, ant, spam), while M4GP was set lose on PMLB datasets.
Each GP was run n times, where n was the number of problems it was set to
solve (5 for DEAP, 10 for M4GP). Fitness was then a simple average of the n
highest fitness values obtained during the n GP runs.
The meta-GA had a population size ranging from 100-300, ran for 50-160
generations, and used tournament selection with tournament size 3. Variance
operators included: two-point crossover—with probability pxo = 0.5 perform
crossover on a pair of parents by selecting two (of four possible) parameter
boundaries and switching the parameters between them; and value mutation—
10
Moshe Sipper et al.
with probability pm = 0.2 perform mutation on a single parent by selecting
one of the five values at random, and mutating it by generating a random
integer (population size, generation count, size of tournament) or real value
(crossover probability, mutation probability) in the range specified above.
We experimented with the meta-GA for approximately two months, performing tens of thousands of evolutionary runs. We noted that numerous good
parameter sets kept emerging, quite often appearing at random generation
zero. Hence, we designed several putative improvements to the algorithmic
process. First, we tweaked parameters such as crossover and mutation, and
also added elitism (2%). It seemed that easier problems were causing the GP
to move into local minima. To correct for this effect we introduced a weighted
fitness function, where fitness was not computed as a simple average of the n
GP runs but rather a weighted one, with weights learned adaptively: examine
every m ∈ [1, 5] generations the average fitness per problem attained by all
GP runs over that particular problem; then increase weights of below-average
problems and decrease weights of above-average problems.
Other tweaks are not described here for brevity. Suffice it to say that after
numerous runs of the various versions of the meta-GA, we eventually concluded
that there seemed to be numerous successful parameter sets.
5 Searching for Parameters using Random Search
How rife is parameter space with good parameters, i.e., ones whose use by a
GP run results in success (which needs to be carefully defined)? Given the
findings by [3] and the high cost grid search would incur in our case, we opted
for random search.
We generated parameter sets at random, ran the following sets of experiments, and recorded the successful ones:
1. DEAP over the 5 sample problems (regression, parity, mux, ant, spam).
– Generate random parameter sets with parameters in the following ranges:
population size – [100, 1000]; generation count – [100, 1000]; crossover
rate – [0, 1]; mutation rate – [0, 1]; tournament size – [3, 30].
– Total runs (i.e., random parameter sets generated, with 5 GP runs
launched per each, attempting to solve all five problems): 2693; number
of successful parameter sets found: 110.
– Success criterion of a parameter set: accuracy of 0.97 attained for all 5
problems but Spambase, where the accuracy threshold was set to 0.93.
Figure 2 shows our results.
2. M4GP over the 10 problems of Table 1(a).
– Generate random parameter sets with parameters in the following ranges:
population size – [100, 2000]; generation count – [100, 2000]; crossover
rate – [0, 1]; mutation rate – [0, 1]; tournament size – [3, 30].
– Total runs: 2610; number of successful parameter sets found: 207.
– Success criterion of a parameter set: accuracy of 0.97 attained for all
10 problems.
Investigating the Parameter Space of Evolutionary Algorithms
11
(a)
(b)
(c)
(d)
(e)
Fig. 2 DEAP run over 5 problems. Shown are plots for the successful parameter sets found.
Figure 3 shows our results.
3. M4GP over the 10 problems of Table 1(b).
– Generate random parameter sets with parameters in the following ranges:
population size – [100, 2000]; generation count – [100, 2000]; crossover
rate – [0, 1]; mutation rate – [0, 1]; tournament size – [3, 30].
– Total runs: 5432; number of successful parameter sets found: 48.
– Success criterion of a parameter set: accuracy of 0.88 attained for all
10 problems.
Figure 4 shows our results.
The above experiments involved a total of 93,615 GP runs, each with a
population size and generation count that could both be as high as 1000 or
2000.
Perhaps evolution is not providing any added value and simple random
search would suffice? This is a standard question one should ask, hence we
performed the following:
12
Moshe Sipper et al.
(a)
(b)
(c)
(d)
(e)
Fig. 3 M4GP over the 10 problems of Table 1(a). Shown are plots for the successful parameter sets found.
1. DEAP: For each of the 110 “good” parameter sets found, generate pop size×
gen count × [1, 5] random solutions and check how many of them pass the
same 5-problem criterion employed above.
Result: none passed.
The total number of random solutions examined was 47,028,011.
2. M4GP: For each of the 48 “good” Table 1(b) parameter sets found, generate
pop size×gen count×[1, 10] random solutions and check how many of them
pass the same 10-problem criterion employed above.1
Result: none passed.
The total number of random solutions examined was 205,377,967.
Random solutions were generated by using the respective software package
to generate generation zero of size pop size × gen count. This not only saved
programming time but also prevented any bias vis-a-vis the GP experiments.
1 Note: The number of actual solutions generated per test point could be less than 5 or
10, respectively, if the criterion failed early on.
Investigating the Parameter Space of Evolutionary Algorithms
13
(a)
(b)
(c)
(d)
(e)
Fig. 4 M4GP over the 10 problems of Table 1(b). Shown are plots for the successful parameter sets found.
6 Concluding Remarks
We performed what is arguably one of the most extensive EC experiments.
Studying our results in Figures 2, 3, and 4, a clear trend emerges: There is very
little trend. We clearly see that good parameters range over the entire spectrum, somewhat in contrast with common lore. At least for 25 the problems
studied herein we note that:
– Population size need not be maximal.
– Generation count need not be maximal.
– At most, population size and generation count should not both be very
low. We remark that recent evolutionary findings suggest the use of fewer
generations [2].
– Tournament size need not be in the commonly used range of 3-7.
– Crossover rate can be high, low, or intermediate.
– Mutation rate can be high, low, or intermediate.
14
Moshe Sipper et al.
– Crossover-mutation pairs show no tendency to aggregate anywhere. Crossovermutation pairs should perhaps not both be low (which makes sense given
that an evolutionary algorithm requires inter-generational variation).
The yield (percentage) of good random parameter sets may seem relatively
small, but that is not the point, rather, our major observation concerns the
diversity in parameter space. Moreover, this yield will likely be far higher in
most situations encountered by evolutionary-algorithm practitioners, as we
were aiming at a broad spectrum of problems—quite a high and somewhat
unconventional bar—rather than at the more common case of a single problem.
To test this latter hypothesis we ran two additional sets of experiments:
1. DEAP: For each of the 5 problems, generate 100 random parameter sets
and perform a GP run for each, recording the best accuracy attained.
2. M4GP: For each of the 10 problems of Table 1(b), generate 100 random
parameter sets and perform a GP run for each, recording the best accuracy
attained.
Figure 5 shows the results of these 1500 runs.
Our findings suggest that perhaps one need not always spend too much time
and resources on tuning hyper-parameters and that random search is a good
choice for such tuning. Moreover, robustness to hyper-parameter tuning is a
desired quality of an evolutionary algorithm and if one’s algorithm requires
very specific parameters, the chances of finding them are slim; this would
essentially be a needle-in-a-haystack situation in hyper-parameter space.
Acknowledgments
We thank William La Cava, Randal Olson, and Ryan Urbanowicz for helpful
discussions. This research was supported by National Institutes of Health grant
no. AI116794.
References
1. Arcuri, A., Fraser, G.: Parameter tuning or default values? an empirical
investigation in search-based software engineering. Empirical Software
Engineering 18(3), 594–623 (2013)
2. Arnold,
C.:
Evolution
runs
faster
on
short
timescales.
Quanta
Magazine
(2017).
www.quantamagazine.org/
20170314-time-dependent-rate-phenomenon-evolution-viruses
3. Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. Journal of Machine Learning Research 13(Feb), 281–305 (2012)
4. Brest, J., Greiner, S., Boskovic, B., Mernik, M., Zumer, V.: Self-adapting
control parameters in differential evolution: a comparative study on numerical benchmark problems. IEEE Transactions on Evolutionary Computation 10(6), 646–657 (2006)
Investigating the Parameter Space of Evolutionary Algorithms
15
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
Fig. 5 Results for single-problem test. For each of the above 15 problems, 100 random
parameter sets were generated, and a GP run executed for every one, recording the best
accuracy attained. (a)-(e): DEAP, (f)-(o):M4GP
5. De Jong, K.: Parameter setting in eas: a 30 year perspective. In: Parameter
setting in evolutionary algorithms, pp. 1–18. Springer (2007)
6. Eiben, Á.E., Hinterding, R., Michalewicz, Z.: Parameter control in evolutionary algorithms. IEEE Transactions on Evolutionary Computation
3(2), 124–141 (1999)
7. Eiben, A.E., Smit, S.K.: Parameter tuning for configuring and analyzing
evolutionary algorithms. Swarm and Evolutionary Computation 1(1), 19–
31 (2011)
16
Moshe Sipper et al.
8. Fogel, D.B., Fogel, L.J., Atmar, J.W.: Meta-evolutionary programming.
In: Signals, systems and computers, 1991. 1991 Conference record of the
twenty-fifth asilomar conference on, pp. 540–545. IEEE (1991)
9. Fortin, F.A., De Rainville, F.M., Gardner, M.A., Parizeau, M., Gagné, C.:
DEAP: Evolutionary algorithms made easy. Journal of Machine Learning
Research 13, 2171–2175 (2012)
10. Hinterding, R., Michalewicz, Z., Eiben, A.E.: Adaptation in evolutionary
computation: A survey. In: Evolutionary Computation, 1997., IEEE International Conference on, pp. 65–69. IEEE (1997)
11. Kramer, O.: Evolutionary self-adaptation: a survey of operators and strategy parameters. Evolutionary Intelligence 3(2), 51–65 (2010)
12. La Cava, William, Silva, Sara, Vanneschi, Leonardo, Spector, Lee, Moore,
Jason H.: Genetic programming representations for multi-dimensional feature learning in biomedical classification. In: EvoStar 2017. Spring (2017).
To Appear
13. Lobo, F., Lima, C.F., Michalewicz, Z.: Parameter setting in evolutionary
algorithms, vol. 54. Springer Science & Business Media (2007)
14. Mercer, R.E., Sampson, J.: Adaptive search using a reproductive metaplan. Kybernetes 7(3), 215–228 (1978)
15. Olson, R.S., La Cava, W., Orzechowski, P., Urbanowicz, R.J., Moore, J.H.:
PMLB: A large benchmark suite for machine learning evaluation and comparison. arXiv e-print. https://arxiv.org/abs/1703.00512 (2017)
16. Olson, R.S., Sipper, M., La Cava, W., Tartarone, S., Vitale, S., Fu, W.,
Holmes, J.H., Moore, J.H.: A system for accessible artificial intelligence.
In: Genetic Programming Theory & Practice XV. Springer (2017). URL
https://arxiv.org/abs/1705.00594. (submitted)
17. Ong, Y.S., Keane, A.J.: Meta-lamarckian learning in memetic algorithms.
IEEE Transactions on Evolutionary Computation 8(2), 99–110 (2004)
18. Ramos, I.C., Goldbarg, M.C., Goldbarg, E.G., Neto, A.D.D.: Logistic regression for parameter tuning on an evolutionary algorithm. In: 2005
IEEE Congress on Evolutionary Computation, vol. 2, pp. 1061–1068. IEEE
(2005)
19. Shahookar, K., Mazumder, P.: A genetic approach to standard cell placement using meta-genetic parameter optimization. IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems 9(5), 500–511
(1990)
20. Smit, S.K., Eiben, A.: Parameter tuning of evolutionary algorithms: Generalist vs. specialist. In: European Conference on the Applications of Evolutionary Computation, pp. 542–551. Springer (2010)
21. Smit, S.K., Eiben, A.E.: Comparing parameter tuning methods for evolutionary algorithms. In: 2009 IEEE congress on evolutionary computation,
pp. 399–406. IEEE (2009)
22. Smit, S.K., Eiben, A.E.: Beating the world champion evolutionary algorithm via revac tuning. In: IEEE Congress on Evolutionary Computation,
pp. 1–8. IEEE (2010)
Investigating the Parameter Space of Evolutionary Algorithms
17
23. Suganthan, P.N., Hansen, N., Liang, J.J., Deb, K., Chen, Y.P., Auger,
A., Tiwari, S.: Problem definitions and evaluation criteria for the cec 2005
special session on real-parameter optimization. KanGAL report 2005005,
2005 (2005)
24. Urbanowicz, R.J., Moore, J.H.: Exstracs 2.0: description and evaluation
of a scalable learning classifier system. Evolutionary Intelligence 8(2-3),
89–116 (2015)
25. Velez, D.R., et al.: A balanced accuracy function for epistasis modeling in
imbalanced datasets using multifactor dimensionality reduction. Genetic
Epidemiology 31(4), 306–315 (2007)
26. Wu, S.J., Chow, P.T.: Genetic algorithms for nonlinear mixed discreteinteger optimization problems via meta-genetic parameter optimization.
Engineering Optimization+ A35 24(2), 137–159 (1995)
27. Yao, X., Liu, Y., Lin, G.: Evolutionary programming made faster. IEEE
Transactions on Evolutionary computation 3(2), 82–102 (1999)
| 9cs.NE
|
arXiv:1207.4074v1 [math.PR] 17 Jul 2012
An analytical comparison of coalescent-based
multilocus methods: The three-taxon case
Sebastien Roch∗
April 9, 2018
Abstract
Incomplete lineage sorting (ILS) is a common source of gene tree incongruence in multilocus analyses. A large number of methods have been
developed to infer species trees in the presence of ILS. Here we provide a
mathematical analysis of several coalescent-based methods. Our analysis is
performed on a three-taxon species tree and assumes that the gene trees are
correctly reconstructed along with their branch lengths.
1
Introduction
Incomplete lineage sorting (ILS) is an important confounding factor in phylogenetic analyses based on multiple genes or loci [Mad97, DR09]. ILS is a populationlevel phenomenon that is caused by the failure of two lineages to coalesce in a
population, leading to the possibility that one of the lineages first coalesces with
a lineage from a less closely related population. As a result, it can produce extensive gene tree incongruence that must be accounted for appropriately in multilocus
analyses [DR06].
A large number of methods have been developed to address this source of incongruence [LYK+ 09]. Several such methods rely on a statistical model of ILS
known as the multispecies coalescent. In this model, populations are connected by
a phylogeny. Independent coalescent processes are performed in each population
∗
Department of Mathematics, University of Wisconsin–Madison.
1
and assembled to produce gene trees. Several methods have been shown to be statistically consistent under the multispecies coalescent, that is, they are guaranteed
to return the correct species tree given enough loci.
The performance and accuracy of coalescent-based multilocus methods have
been the subject of numerous simulation studies [LR11, LYPE09, YN10]. In
this paper, we complement such studies with a detailed analytical comparison
in a tractable test case, a three-taxon species tree. We analyze 7 methods: maximum likelihood (ML), GLASS/Maximum Tree (MT), R∗ , STAR, minimizing
deep coalescences (MDC), STEAC, and shallowest coalescences (SC). Under the
assumption that gene trees are reconstructed without estimation error, we derive
the exponential decay rate of the failure probability as the internal branch length
of the species tree varies. The analysis, which relies on large-deviations theory,
reveals that ML and GLASS/MT are more accurate in this setting than the other
methods—especially in the regime where ILS is more common.
2
2.1
Materials and Methods
Multispecies coalescent: Three-taxon case
We first describe the statistical model under which our analysis is performed, the
multispecies coalescent. We only discuss the three-taxon case. For more details,
see [DR09] and references therein.
A weighted rooted tree is called ultrametric if each leaf is exactly at the same
distance from the root. For a three-leaf ultrametric tree G with leaves a, b, and c,
we denote by ab|c the topology where a and b are closer to each other than to c,
and similarly for ac|b, bc|a. The topology of G is denoted by T [G].
Let S be an ultrametric species phylogeny with three taxa. We assume that
all haploid populations in S have population size N . We denote the current populations by A, B and C (which we identify with the leaves of S) and we assume
that S has topology AB|C. The ancestral populations are AB (corresponding
to the immediate ancestor to populations A and B) and ABC (corresponding to
the ancestor of populations A, B and C). The corresponding divergence times
(backwards in time from the present) are denoted by τAB and τABC with the assumption τAB ≤ τABC . All times are given in units of N generations. For a
population X, we let τXP be the divergence time of the parent population of X. Let
X = {A, B, C, AB, ABC} be the set of all populations in S.
We consider L loci ` = 1, . . . , L and, for each locus, we sample one lineage
2
(`)
from each population at time 0. For locus `, we denote by IX the number of
(`)
lineages entering population X and by OX the number of lineages exiting pop(`)
(`)
ulation X (backwards in time), where necessarily IX ≥ OX . Similarly, for
(`)
(`)
k = OX + 1, . . . , IX , the time of the coalescent event bringing the number of
(`,k)
lineages from k to k − 1 in population X and locus ` is TX . We denote by
G1 , . . . , GL the corresponding ultrametric gene trees (including both topology and
branch lengths).
Then, under the multispecies coalescent, assuming the loci are unlinked, the
likelihood of the gene trees is given by
f (G1 , . . . , GL |S) =
L
Y
exp
`=1
X O(`)
(`)
(`,OX +1)
P
X
−
τX − TX
2
X∈X
(`)
IX
X
−
(`)
k
(`,k+1)
(`,k)
TX
+ TX
(1)
2
k=OX +1
(`,I
(`)
+1)
where we let TX X
= τX for convenience [RY03].
The parameter governing the extent of incomplete lineage sorting is the length
of the internal branch of S
t = τABC − τAB .
The probability that the lineages from A and B fail to coalesce in branch AB, an
event we denote by FAIL` for locus ` (and its complement by S UCCESS` ), is
1 − p = e−t .
Note that, in that case, all three gene-tree topologies are equally likely. Of course,
1 − p → 1 as t → 0.
2.2
Multilocus methods
A basic goal of multilocus analyses is to reconstruct a species phylogeny (including possibly estimates of the divergence times) from a collection of gene trees.
Here we assume that the data consists of L gene trees G1 , . . . , GL corresponding
to L unlinked loci generated under the multispecies coalescent. We assume further that the gene trees are ultrametric and that their topology and branch lengths
are estimated without error.
3
We consider several common multilocus methods. In our setting, several of
these methods are in fact equivalent and we therefore group them below. Note
further that we only consider statistically consistent methods, that is, methods that
are guaranteed to converge on the right species phylogeny as the number of loci L
increases to +∞ (at least, in the test case we described above). We briefly describe
these methods. For more details, see e.g. [LYK+ 09] and references therein.
ML/GLASS/MT Under the multispecies coalescent, maximum likelihood (ML)
selects the topology and divergence times that maximizes the likelihood (1).
In the GLASS method [MR10], the species phylogeny is reconstructed from
a distance matrix in which the entries are the minimum gene coalescence times
across loci. The equivalent Maximum Tree (MT) method was introduced and
studied in [LP07, ELP07, LYP10].
A key result in [LYP10] is that, in the constant-population case, the term inside
the exponential in the likelihood (1) is monotonically decreasing in the divergence
times. As a result, because GLASS and MT select the phylogeny with the largest
possible divergence times, maximum likelihood is equivalent to GLASS and MT
in this context. See [LYP10] for details.
R∗ /STAR/MDC In the R∗ consensus method [Bry03, DDBR09], for each threetaxon set (here, we only have one such set), we include the topology that appears in
highest frequency among the loci and we reconstruct the most resolved phylogeny
that is compatible with these three-taxon topologies.
In the STAR method [LYPE09], the species phylogeny is reconstructed from
a distance matrix in which the entries are the average ranks of gene coalescence
times across loci. Here the root has the highest rank and the rank decreases by one
as one goes from the root to the leaves.
The minimizing deep coalescences (MDC) method [Mad97, TN09] selects the
species phylogeny that requires the smallest number of “extra lineages,” that is,
lineages that fail to coalesce in a branch of the species phylogeny.
On a three-taxon phylogeny, there is only three distinct rooted topologies. In
each case, the most recent divergence is assigned rank 1 in STAR and the other
divergence is assigned rank 2. Hence selecting the topology corresponding to the
lowest average rank is equivalent to selecting the most common topology among
all loci—which is what R∗ does. A similar argument shows that MDC also selects
the R∗ consensus tree in our test case.
4
STEAC/SC In the STEAC method [LYPE09], the species phylogeny is reconstructed from a distance matrix in which the entries are the average coalescence
times across loci. The shallowest coalescences (SC) method is similar to STEAC
in that it uses average coalescence times. The difference between the two methods
is in how they deal with multiple alleles per population. Since we only consider
the single-allele case, the two methods are equivalent here.
2.3
Large-deviations approach
As mentioned above, we consider estimation methods that are statistically consistent in the sense that they are guaranteed to converge on the correct species
phylogeny as the number of loci L increases to +∞. To compare different methods, we derive the rate of exponential decay of the probability of failure. Let S be
a species phylogeny with internal branch length t and assume that G1 , . . . , GL are
unlinked gene trees generated under the multispecies coalescent. As L → +∞,
large-deviations theory (see e.g. [Dur96]) gives a characterization of the (exponential) decay rate
αM (t) = − lim
L→+∞
1
ln P[Method M fails given L loci from S].
L
That is, roughly
P[Method M fails given L loci from S] ≈ e−LαM (t) ,
for large L. As the notation indicates, the key parameter that influences the decay
rate is the length of the internal branch t of the species phylogeny. In particular, we
expect that αM (t) is increasing in t as a larger t makes the reconstruction problem
easier.
To derive αM (t), we express the probability of failure as a large deviation event
of the form
" L
#
X
P[Method M fails given L loci from S] = P
Y` > yL ,
`=1
where y is a constant and {Y` }L`=1 are independent identically distributed random
variables. The particular choice of random variables depends on the method, as
we explain below. Let
φ(s) = E[esY` ],
5
be the moment-generating function of Y` (which does not depend on ` by assumption). Then the decay rate is given by
αM (t) = ys∗ − ln φ(s∗ ),
(2)
where s∗ > 0 is the solution (if it exists) to
φ0 (s∗ )
= y,
φ(s∗ )
provided there is an s > 0 such that φ(s) < +∞, y > E[Y` ] and Y` is not a point
mass at E[Y` ]. For more details on large-deviations theory, see e.g. [Dur96].
3
Results
3.1
A domination result
We first argue that, given perfectly reconstructed unlinked gene trees under the
multispecies coalescent, ML/GLASS/MT always has a greater probability of success than R∗ /STAR/MDC and STEAC/SC—or, in fact, any other method. Indeed
note that the probability of success can be divided into two cases:
1. The case where S UCCESS` occurs for at least one locus `, an event of probability (1 − (1 − p)L ). In that case, ML/GLASS/MT necessarily succeeds
whereas the other two methods succeed with probability < 1.
2. The case where FAIL` occurs for all loci `, an event of probability (1 − p)L .
In that case, all methods succeed with probability 1/3 by symmetry. For
instance, for ML/GLASS/MT, any pair of populations is equally likely to
lead to the smallest inter-species distance. A similar argument applies to
the other two methods.
Hence, overall ML/GLASS/MT succeeds with greater probability.
3.2
Decay rates
We derive the decay rates for the methods above. The results are plotted in Figure 1. The asymptotic regimes are highlighted in Figures 2 and 3. All proofs can
be found in the appendix.
6
ML/GLASS/MT In this case, the decay rate can be derived directly without
using (2). Following the derivation in [MR10] (see also [LYP10] for a similar
argument), ML/GLASS/MT succeeds with probability
1
(1 − (1 − p)L ) + (1 − p)L .
3
Then we get the following:
Claim 1 (ML/GLASS/MT) The decay rate of ML/GLASS/MT on S is
αML (t) = t.
(`)
R∗ /STAR/MDC For a locus `, we let ZAB be 1 if FAIL` occurs and T [G` ] =
AB|C, and 0 otherwise. We let
ZAB =
L
X
(`)
ZAB .
`=1
(`)
(`)
Similarly, we define ZAC , ZBC , ZAC and ZBC . Then R∗ /STAR/MDC fails if
ZAB + (L − ZAC − ZBC − ZAB ) < max{ZAC , ZBC }.
It can be shown that
1
ln P[2ZAC + ZBC > L].
L→+∞ L
αR∗ (t) = − lim
Then we get the following:
Claim 2 (R∗ /STAR/MDC) The decay rate of R∗ /STAR/MDC on S is
s
!
1 −t
2 −t
1 −t
αR∗ (t) = − ln 2
e
1− e
+ e
.
3
3
3
As t → 0,
3
αR∗ (t) = t2 + O(t3 ),
4
and, as t → +∞,
αR∗ (t) ≈
t 1 4
− ln .
2 2 3
7
(`)
STEAC/SC For a locus `, we let DAB be the time to the most recent common
ancestor of A and B in G` (in units of N generations). We let
DAB =
L
X
(`)
DAB .
`=1
(`)
(`)
Similarly, we define DAC , DBC , DAC and DBC . Then STEAC/SC fails if
DAB > min{DAC , DBC }.
It can be shown that
αSTEAC (t) =
lim −
L→+∞
1
ln P[DAB − DAC > 0].
L
Then we get the following:
Claim 3 (STEAC/SC) The decay rate of STEAC/SC on S is
−s∗ t
3e
− s2∗ e−t
αSTEAC (t) = − ln
,
3(1 − s2∗ )
where 0 < s∗ < 1 is the unique solution to the fixed-point equation
1
s∗ = [6s∗ − 3t(1 − s2∗ )]e(1−s∗ )t .
2
Further, as t → 0,
3
αSTEAC (t) = t2 + O(t3 ),
8
and, as t → +∞,
αSTEAC (t) ≈ t − ln t − 0.1656.
4
Discussion
As can be seen from Figures 1, 2 and 3 as well as from the asymptotics, ML/GLASS/MT does indeed give a larger decay rate for all t. In fact, the decay rate of
ML/GLASS/MT is significantly higher, especially as t → 0 that is, under high
levels of incomplete lineage sorting. For instance, to be concrete, if L = 500 loci
and t = 0.1 (in units of N generations), the probability of failure is approximately:
8
1.9 × 10−22 for ML/GLASS/MT; 0.038 for R∗ /STAR/MDC; 0.16 for STEAC/SC.
Intuitively, this difference in behavior arises from the fact that ML/GLASS/MT requires only one successful locus, whereas R∗ /STAR/MDC and STEAC/SC rely on
an average over all loci.
Comparing R∗ /STAR/MDC and STEAC/SC, note that αR∗ (t) is higher than
αSTEAC (t) for small t but that the situation is reversed for large t. In fact, in
the limit t → +∞, αSTEAC (t) grows at roughly the same rate as the optimal
αML (t). At large t, STEAC/SC has somewhat of an advantage in that the expectation gap in the failure event increases linearly with t, whereas it saturates under
R∗ /STAR/MDC.
The analysis described here ignores several features that influence the accuracy of species tree reconstruction. Notably we have assumed that gene trees,
including their branch lengths, are reconstructed without error. On real sequence
datasets, the uncertainty arising from gene-tree estimation plays an important role.
For instance, although GLASS/MT achieves the optimal decay rate in our setting,
these methods are in fact sensitive to sequence noise because they rely on the
computation of a minimum over loci—the very feature that leads to their superior
performance here. Extending our analysis to incorporate gene tree estimation error is an important open problem which should help in the design of multilocus
methods. It is important to note that, under appropriate modeling of sequence data,
ML is not in general equivalent to GLASS/MT and is likely to be more robust to
estimation error. In particular our analysis suggest that ML may be significantly
more accurate than other methods in multilocus studies.
Other extensions deserve further study. Often many alleles are sampled from
each population. Note that the benefit of multiple alleles is known to saturate
as the number of alleles increases [Ros02]. This is because the probability of
observing any number of alleles at the top of a branch is uniformly bounded in the
number alleles existing at the bottom.
Further, the molecular clock assumption, although it may be a reasonable first
approximation in the context of recently diverged populations, should not be necessary for our analysis. One should also consider larger numbers of taxa, varying
population sizes, etc.
Simulation studies may provide further insight into these issues. However an
analytical approach, such as the one we have used here, is valuable in that it allows
the study of an entire class of models in one analysis. It can also provide useful,
explicit predictions to guide the design of reconstruction procedures.
9
5
Acknowledgments
This work was supported by NSF grant DMS-1007144 and an Alfred P. Sloan Research Fellowship. Part of this work was performed while the author was visiting
the Institute for Pure and Applied Mathematics (IPAM) at UCLA.
10
3
ML
2.5
R*
STEAC
α
2
1.5
1
0.5
0
0
0.5
1
1.5
t
Figure 1: Decay rates.
11
2
2.5
3
−3
8
x 10
7
R*
STEAC
6
α
5
4
3
2
1
0
0
0.02
0.04
t
0.06
0.08
0.1
Figure 2: Decay rates as t → 0. The dotted lines indicate the respective predicted
asymptotics.
12
100
90
80
ML
R*
STEAC
70
α
60
50
40
30
20
10
0
0
20
40
t
60
Figure 3: Decay rates as t → +∞.
13
80
100
References
[Bry03]
David Bryant. A classification of consensus methods for phylogenetics. In Bioconsensus (Piscataway, NJ, 2000/2001), volume 61 of
DIMACS Ser. Discrete Math. Theoret. Comput. Sci., pages 163–183.
Amer. Math. Soc., Providence, RI, 2003.
[DDBR09] James H. Degnan, Michael DeGiorgio, David Bryant, and Noah A.
Rosenberg. Properties of consensus methods for inferring species
trees from gene trees. Systematic Biology, 58(1):35–54, 2009.
[DR06]
J. H. Degnan and N. A. Rosenberg. Discordance of species trees with
their most likely gene trees. PLoS Genetics, 2(5), May 2006.
[DR09]
James H. Degnan and Noah A. Rosenberg. Gene tree discordance,
phylogenetic inference and the multispecies coalescent. Trends in
ecology and evolution, 24(6):332–340, 2009.
[Dur96]
Richard Durrett. Probability: theory and examples. Duxbury Press,
Belmont, CA, second edition, 1996.
[ELP07]
Scott V. Edwards, Liang Liu, and Dennis K. Pearl. High-resolution
species trees without concatenation. Proceedings of the National
Academy of Sciences, 104(14):5936–5941, 2007.
[LP07]
Liang Liu and Dennis K. Pearl. Species trees from gene trees: Reconstructing bayesian posterior distributions of a species phylogeny using estimated gene tree distributions. Systematic Biology, 56(3):504–
514, 2007.
[LR11]
Adam D. Leaché and Bruce Rannala. The accuracy of species tree
estimation under simulation: A comparison of methods. Systematic
Biology, 60(2):126–137, 2011.
[LYK+ 09] Liang Liu, Lili Yu, Laura Kubatko, Dennis K. Pearl, and Scott V. Edwards. Coalescent methods for estimating phylogenetic trees. Molecular Phylogenetics and Evolution, 53(1):320 – 328, 2009.
[LYP10]
Liang Liu, Lili Yu, and Dennis Pearl. Maximum tree: a consistent estimator of the species tree. Journal of Mathematical Biology, 60:95–
106, 2010. 10.1007/s00285-009-0260-0.
14
[LYPE09] Liang Liu, Lili Yu, Dennis K. Pearl, and Scott V. Edwards. Estimating species phylogenies using coalescence times among sequences.
Systematic Biology, 58(5):468–477, 2009.
[Mad97]
Wayne P. Maddison. Gene trees in species trees. Systematic Biology,
46(3):523–536, 1997.
[MR10]
Elchanan Mossel and Sébastien Roch. Incomplete lineage sorting:
Consistent phylogeny estimation from multiple loci. IEEE/ACM
Trans. Comput. Biology Bioinform., 7(1):166–171, 2010.
[Roc12]
Sebastien Roch. An analytical comparison of coalescent-based multilocus methods: The three-taxon case. Preprint, 2012.
[Ros02]
N. A. Rosenberg. The probability of topological concordance of gene
trees and species trees. Theor. Popul. Biol., 61(2):225–247, March
2002.
[RY03]
Bruce Rannala and Ziheng Yang. Bayes estimation of species divergence times and ancestral population sizes using dna sequences from
multiple loci. Genetics, 164(4):1645–1656, 2003.
[TN09]
Cuong Than and Luay Nakhleh. Species tree inference by minimizing
deep coalescences. PLoS Comput Biol, 5(9):e1000501, 09 2009.
[YN10]
Yun Yu and Luay Nakhleh. The performance of methods for inferring
species trees from multi-locus data. Preprint, 2010.
15
A
A.1
Proofs
ML/GLASS/MT
Decay rate Following the derivation in [MR10] (see also [LYP10] for a similar
argument), ML/GLASS/MT succeeds with probability
1
(1 − (1 − p)L ) + (1 − p)L ,
3
where the two terms correspond to the two cases described in Section 3.1. Hence
the decay rate of the failure probability is
1
1
L
L
αML (t) = lim − ln 1 − (1 − (1 − p) ) + (1 − p)
L→+∞
L
3
2
1
(1 − p)L
= lim − ln
L→+∞
L
3
1 2
= lim − ln − ln(1 − p)
L→+∞
L 3
= − ln(1 − p)
= t.
A.2
R∗ /STAR/MDC
(`)
Definitions For a locus `, we let ZAB be 1 if FAIL` occurs and T [G` ] = AB|C,
and 0 otherwise. We let
L
X
(`)
ZAB =
ZAB .
`=1
(`)
(`)
Similarly, we define ZAC , ZBC , ZAC and ZBC . Then R∗ /STAR/MDC fails if
ZAB + (L − ZAC − ZBC − ZAB ) < max{ZAC , ZBC },
an event we denote by E. The second term on the LHS comes form the fact that,
given S UCCESS` , T [G` ] = AB|C. To deal with the term on the RHS, we re-write
E as
2 max{ZAC , ZBC } + min{ZAC , ZBC } > L,
and we use the auxiliary events
E 0 = {2ZAC + ZBC > L},
16
and
E 00 = {2ZBC + ZAC > L},
to bound P[E] as follows
P[E 0 ] ≤ P[E] ≤ P[E 0 ∪ E 00 ] ≤ 2P[E 0 ],
where we used that P[E 0 ] = P[E 00 ] (by symmetry) in a union bound, and the fact
that, on E 0 ,
2 max{ZAC , ZBC } + min{ZAC , ZBC } ≥ 2ZAC + ZBC > L.
Hence
−
1
1
1
1
1
ln P[E 0 ] ≥ − ln P[E] ≥ − ln 2P[E 0 ] = − ln P[E 0 ] − ln 2,
L
L
L
L
L
and, taking a limit as L → +∞,
αR∗ (t) = lim −
L→+∞
1
1
ln P[E] = lim − ln P[E 0 ],
L→+∞
L
L
provided the limit exists.
Moment-generating function
moment-generating function
In order to compute the limit above, we use the
(`)
(`)
φ(s) = E[exp(s[2ZAC + ZBC ])],
(which does not depend on `) as described in Section 2.3. Dividing up the expectation into the four possible cases, we have
1
1
φ(s) = p + (1 − p) + (1 − p)(es + e2s ) < +∞,
3
3
for all s ∈ R. Letting
1
Wp = (1 − p),
3
the derivative of φ(s) is
φ0 (s) = Wp (es + 2e2s ).
17
Decay rate
By large-deviations theory, we are looking for a solution to
1=
φ0 (s)
.
φ(s)
Letting ω = es , we get the quadratic equation
(p + Wp ) + Wp (ω + ω 2 ) = Wp (ω + 2ω 2 ),
or, rearranging,
(p + Wp ) = Wp ω 2 ,
whose solution is
s
ω∗ = es∗ =
p + Wp
.
Wp
Then
1
ln P[E 0 ]
L→+∞
L
1
= lim − ln P[2ZAC + ZBC > L]
L→+∞
L
= s∗ − ln φ(s∗ ).
αR∗ (t) =
lim −
Noting that
s
φ(s∗ ) = p + Wp + Wp
= 2(p + Wp ) +
p + Wp
p + Wp
+ Wp
Wp
Wp
q
(p + Wp )Wp ,
we get
p
s∗ − ln φ(s∗ ) = ln
p + Wp
p
p
2 Wp (p + Wp ) + Wp p + Wp
Rearranging, we have finally
q
αR∗ (t) = − ln 2 Wp (p + Wp ) + Wp
s
!
1 −t
2 −t
1 −t
e
1− e
+ e
.
= − ln 2
3
3
3
18
!
,
Asymptotics By a Taylor expansion, we get as t → 0 that
3
αR∗ (t) = t2 + O(t3 ).
4
On the other hand, as t → +∞,
#!
" s
2
1
1
1 − e−t + e−t/2
αR∗ (t) = − ln e−t/2 2
3
3
3
=
t
− βt
2
where
lim βt =
t→+∞
A.3
1 4
ln .
2 3
STEAC/SC
(`)
Definitions For a locus `, we let DAB be the time to the most recent common
ancestor of A and B in G` (in units of N generations). We let
DAB =
L
X
(`)
DAB .
`=1
(`)
(`)
Similarly, we define DAC , DBC , DAC and DBC . Then STEAC/SC fails if
DAB > min{DAC , DBC },
an event we denote by E. Once again, to deal with the term on the RHS, we
re-write E as
DAB − min{DAC , DBC } > 0,
and we use the auxiliary events
E 0 = {DAB − DAC > 0},
and
E 00 = {DAB − DBC > 0},
to bound P[E] as follows
P[E 0 ] ≤ P[E] ≤ P[E 0 ∪ E 00 ] ≤ 2P[E 0 ],
19
where we used that P[E 0 ] = P[E 00 ] (by symmetry) in a union bound, and the fact
that E 0 implies E. Hence
1
1
1
1
1
− ln P[E 0 ] ≥ − ln P[E] ≥ − ln 2P[E 0 ] = − ln P[E 0 ] − ln 2,
L
L
L
L
L
and, taking a limit as L → +∞,
1
1
αSTEAC (t) = lim − ln P[E] = lim − ln P[E 0 ],
L→+∞
L→+∞
L
L
provided the limit exists.
Moment-generating function In order to compute the limit above, we need the
moment-generating function
(`)
(`)
φ(s) = E[exp(s[DAB − DAC ])],
(which does not depend on `). Dividing up the expectation into the four possible
cases, we have
h
i
φ(s) = pe−st E esẼ0 E e−sE0
1
+ (1 − p)E[e−sE1 ]
3
1
+ (1 − p)E[esE1 ]
3
1
+ (1 − p)
3
where we used:
(`)
1. In the case S UCCESS` , DAB − τAB = Ẽ0 where Ẽ0 is an exponential mean 1
conditioned to be less than t. Independently, using the memoryless property
(`)
of the exponential, DAC − τABC = E0 where E0 is an exponential mean 1.
Hence
(`)
(`)
DAB − DAC = τAB + Ẽ0 − τABC − E0 = −t + Ẽ0 − E0 .
(`)
2. In the case FAIL
` and T [G` ] = AB|C, DAB − τABC = Ẽ1 where Ẽ1 the
3
minimum of 2 independent exponentials mean 1, that is, an exponential
(`)
mean 1/ 32 = 1/3. Moreover, DAC − τABC = Ẽ1 + E1 where E1 is an
exponential mean 1 independent of Ẽ1 . Hence
(`)
(`)
DAB − DAC = τABC + Ẽ1 − τABC − Ẽ1 − E1 = −E1 .
20
(`)
3. In the case FAIL` and T [G` ] = AC|B, DAC − τABC = Ẽ1 where Ẽ1 is an
(`)
exponential mean 1/ 32 = 1/3. Moreover, DAB − τABC = Ẽ1 + E1 where
E1 is an exponential mean 1 independent of Ẽ1 .
(`)
(`)
DAB − DAC = τABC + Ẽ1 + E1 − τABC − Ẽ1 = E1 .
(`)
(`)
4. In the case FAIL` and T [G` ] = BC|A, DAC = DAB .
Note that
E[esE0 ] = E[esE1 ] =
1
,
1−s
for all |s| < 1, and
sẼ0
E[e
1
]=
p
Z
t
esx e−x dx =
0
1 − e−(1−s)t
.
p(1 − s)
Hence
− e−(1−s)t 1
φ(s) = pe
p(1 − s) 1 + s
1
1
1
+
+1
+ (1 − p)
3
1+s 1−s
e−st − e−t 1 −t 3 − s2
=
+ e
1 − s2
3
1 − s2
3e−st − s2 e−t
.
=
3(1 − s2 )
−st 1
The derivative of φ(s) is
[−3te−st − 2se−t ][3(1 − s2 )] − [3e−st − s2 e−t ][−6s]
[3(1 − s2 )]2
[18s − 9t(1 − s2 )]e−st − 6se−t
=
[3(1 − s2 )]2
φ0 (s) =
Decay rate
By large-deviations theory, we are looking for a solution to
0=
φ0 (s)
[6s − 3t(1 − s2 )]e−st − 2se−t
=
.
φ(s)
(1 − s2 )(3e−st − s2 e−t )
21
(3)
Note that the denominator on the RHS is positive on s ∈ (0, 1), and that
φ0 (0)
= −t
φ(0)
and
lim−
s→1
φ0 (s)
= +∞,
φ(s)
so that by [Dur96] there is a solution 0 < s∗ < 1 to (3). The solution s∗ must
satisfy
[6s∗ − 3t(1 − s2∗ )]e−s∗ t − 2s∗ e−t = 0.
(4)
which can be re-written as the fixed-point equation
1
s∗ = [6s∗ − 3t(1 − s2∗ )]e(1−s∗ )t ≡ Ft (s∗ ),
2
0 < s∗ < 1.
(5)
Note that Ft (0) = −3tet ≤ 0 and Ft (1) = 3 > 1. Moreover,
1
t
[6 + 6ts]e(1−s)t − [6s − 3t(1 − s2 )]e(1−s)t
2
2
1 (1−s)t
e
[6 + 3t2 (1 − s2 )] > 1,
=
2
Ft0 (s) =
for 0 < s < 1. Hence Ft (s) − s is strictly increasing and has a unique solution in
(0, 1). Eq. (5) is easily solved numerically.
Then
1
ln P[E 0 ]
L→+∞
L
1
= lim − ln P[DAB − DAC > 0]
L→+∞
L
= − ln φ(s∗ ).
αSTEAC (t) =
lim −
Asymptotics We consider asymptotics when t → 0. Define
3
sε = t + ε−1 t2 .
4
22
Evaluating the LHS in (4) (for ε > 0 small but fixed) as t → 0 gives
[6sε − 3t(1 − s2ε )]e−sε t − 2sε e−t
9
9 2
3 2
−1 2
3
3
= t + 6ε t − 3t 1 − t + O(t )
1 − t + O(t )
2
16
4
2
t
3
− t + 2ε−1 t2 1 − t + + O(t3 )
2
2
3 2
3
−1 2
3
3
= t + 6ε t + O(t ) 1 − t + O(t )
2
4
2
3
t
−1 2
3
− t + 2ε t
1 − t + + O(t )
2
2
3 2
= 4ε−1 +
t + O(t3 ),
2
so that, because
4(−ε)−1 +
3
3
< 0 and 4ε−1 + > 0,
2
2
the solution of (4) satisfies s−ε < s∗ < sε for 0 < ε <
Then
8
3
and t small enough.
3e−sε t − s2ε e−t
3(1 − s2 )
ε
9 2
1
3 2
t2
3
3
3
=
3 1 − t + O(t ) −
t + O(t )
1 − t + + O(t )
3
4
16
2
9
× 1 + t2 + O(t3 )
16
3
3
9
2
= 1+t − −
+
+ O(t3 ).
4 16 16
φ(sε ) =
Since this holds for all ε > 0 small we get
3
αSTEAC (t) = − ln φ(s∗ ) = t2 + O(t3 ).
8
For the t → +∞ asymptotics, let
u=
1
t
and σ = (1 − s)t.
23
Substituting in (5), we get
1
1 − σu = [6(1 − σu) − 3σ(2 − σu)]eσ ,
2
which after rearranging becomes
3eσ − 1 − 3σeσ
3σeσ − σ − 32 σ 2 eσ
1
=
3σeσ
σ(1 + 2(3eσ −1−3σe
σ) )
u =
(6)
≡ F(σ).
We have F(0) = +∞. Moreover, letting σ∗ be the only positive solution to
G(σ∗ ) ≡ 3eσ∗ − 1 − 3σ∗ eσ∗ = 0,
(7)
we have F(σ∗ ) = 0. Note that G 0 (σ) = −3σeσ < 0, G(0) = 2 and limσ→+∞ G(σ) =
−∞, so that σ∗ is well-defined. Noticing that G appears in the denominator of (6)
as well we get that F is strictly decreasing between σ = 0 and σ = σ∗ . Hence the
limit t → +∞ is equivalent to the limit σ → σ∗− . Finally, in that limit, letting σt
be the σ-value giving rise to the value u = 1/t
αSTEAC (t) = − ln φ(s∗ )
3e−s∗ t − s2∗ e−t
= − ln
3(1 − s2∗ )
3eσt − (1 − σtt )2
= t − ln
3(1 − (1 − σtt )2 )
= t − ln
σt2
2σt
−
t
t2
σt2
2σt
3( t − t2 )
3eσt − 1 +
= t − ln t − βt ,
where
3eσ∗ − 1
3σ∗ eσ∗
lim βt = ln
= ln
= σ∗ − ln 2,
t→+∞
6σ∗
6σ∗
where we used (7).
24
| 5cs.CE
|
Backdoors to Tractable Valued CSP
Robert Ganian, M. S. Ramanujan, and Stefan Szeider
arXiv:1612.05733v1 [cs.DS] 17 Dec 2016
Algorithms and Complexity Group, TU Wien, Vienna, Austria
Abstract. We extend the notion of a strong backdoor from the CSP setting to
the Valued CSP setting (VCSP, for short). This provides a means for augmenting
a class of tractable VCSP instances to instances that are outside the class but of
small distance to the class, where the distance is measured in terms of the size of
a smallest backdoor. We establish that VCSP is fixed-parameter tractable when
parameterized by the size of a smallest backdoor into every tractable class of
VCSP instances characterized by a (possibly infinite) tractable valued constraint
language of finite arity and finite domain. We further extend this fixed-parameter
tractability result to so-called “scattered classes” of VCSP instances where each
connected component may belong to a different tractable class.
1 Introduction
Valued CSP (or VCSP for short) is a powerful framework that entails among others the
problems CSP and MAX-CSP as special cases [26]. A VCSP instance consists of a finite set of cost functions over a finite set of variables which range over a domain D, and
the task is to find an instantiation of these variables that minimizes the sum of the cost
functions. The VCSP framework is robust and has been studied in different contexts in
computer science. In its full generality, VCSP considers cost functions that can take as
values the rational numbers and positive infinity. CSP (feasibility) and Max-CSP (optimisation) arise as special cases by limiting the values of cost functions to {0, ∞} and
{0, 1}, respectively. Clearly VCSP is in general intractable. Over the last decades much
research has been devoted into the identification of tractable VCSP subproblems. An
important line of this research (see, e.g., [17,18,25]) is the characterization of tractable
VCSPs in terms of restrictions on the underlying valued constraint language Γ , i.e.,
a set Γ of cost functions that guarantees polynomial-time solvability of all VCSP instances that use only cost functions from Γ . The VCSP restricted to instances with cost
functions from Γ is denoted by VCSP[Γ ].
In this paper we provide algorithmic results which allow us to gradually augment
a tractable VCSP based on the notion of a (strong) backdoor into a tractable class of
instances, called the base class. Backdoors where introduced by Williams et al. [27,28]
for SAT and CSP and generalize in a natural way to VCSP. Let C denote a tractable
class of VCSP instances over a finite domain D. A backdoor of a VCSP instance P
into C is a (small) subset B of the variables of P such that for all partial assignments
α that instantiate B, the restricted instance P|α belongs to the tractable class C. Once
The authors acknowledge support by the Austrian Science Fund (FWF, project P26696).
Robert Ganian is also affiliated with FI MU, Brno, Czech Republic.
we know such a backdoor B of size k we can solve P by solving at most |D|k tractable
instances. In other words, VCSP is then fixed parameter tractable parameterized by
backdoor size. This is highly desirable as it allows us to scale the tractability for C to
instances outside the class, paying for an increased “distance” from C only by a larger
constant factor.
In order to apply this backdoor approach to solving a VCSP instance, we first need
to find a small backdoor. This turns out to be an algorithmically challenging task. The
fixed-parameter tractability of backdoor detection has been subject of intensive research
in the context of SAT (see, e.g., [16]) and CSP (see, e.g., [2]). In this paper we extend
this line of research to VCSP.
First we obtain some basic and fundamental results on backdoor detection when
the base class is defined by a valued constraint language Γ . We obtain fixed-parameter
tractability for the detection of backdoors into VCSP[Γ ] where Γ is a valued constraint
language with cost functions of bounded arity. In fact, we show the stronger result: fixedparameter tractability also holds with respect to heterogeneous base classes of the form
VCSP[Γ1 ] ∪ · · · ∪ VCSP[Γℓ ] where different assignments to the backdoor variables
may result in instances that belong to different base classes VCSP[Γi ]. A similar result
holds for CSP, but the VCSP setting is slightly more complicated as a valued constraint
language of finite arity over a finite domain is not necessarily finite.
Secondly, we extend the basic fixed-parameter tractability result to so-called scattered base classes of the form VCSP[Γ1 ] ⊕ · · · ⊕ VCSP[Γℓ ] which contain VCSP
instances where each connected component belongs to a tractable class VCSP[Γi ] for
some 1 ≤ i ≤ ℓ—again in the heterogeneous sense that for different assignments to the
backdoor variables a single component of the reduced instance may belong to different classes VCSP[Γi ]. Backdoors into a scattered base class can be much smaller than
backdoors into each single class it is composed of, hence the gain is huge if we can handle scattered classes. This boost in scalability does not come for free. Indeed, already
the “crisp” case of CSP, which was the topic of a recent SODA paper [14], requires a
sophisticated algorithm which makes use of advanced techniques from parameterized
algorithm design. This algorithm works under the requirement that the constraint languages contain all unary constraints (i.e., is conservative); this is a reasonable requirement as one needs these unary cost functions to express partial assignments (see also
Section 2 for further discussion). Here we lift the crisp case to general VCSP, and this
also represents our main technical contribution.
To achieve this, we proceed in two phases. First we transform the backdoor detection problem from a general scattered class VCSP(Γ1 )⊕· · ·⊕ VCSP(Γℓ ) to a scattered
class VCSP(Γ1′ ) ⊕ · · · ⊕ VCSP(Γℓ′ ) over finite valued constraint languages Γi′ . In the
subsequent second phase we transform the problem to a backdoor detection problem
into a scattered class VCSP(Γ1′′ ) ⊕ · · · ⊕ VCSP(Γℓ′′ ) where each Γi′′ is a finite crisp
language; i.e., we reduce from the VCSP setting to the CSP setting. We believe that
this sheds light on an interesting link between backdoors in the VCSP and CSP settings.
The latter problem can now be solved using the known algorithm [14].
Related Work
Williams et al. [27,28] introduced backdoors for CSP or SAT as a theoretical tool to capture the overall combinatorics of instances. The purpose was an analysis of the empirical
behaviour of backtrack search algorithms. Nishimura et. al [22] started the investigation
on the parameterized complexity of finding a small SAT backdoor and using it to solve
the instance. This lead to a number of follow-up work (see [16]). Parameterized complexity provides here an appealing framework, as given a CSP instance with n variables,
one can trivially find a backdoor of size ≤ k into a fixed tractable class of instances by
trying all subsets of the variable set containing ≤ k variables; but there are Θ(nk ) such
sets, and therefore the running time of this brute-force algorithm scales very poorly in k.
Fixed-parameter tractability removes k from the exponent providing running times of
the form f (k)nc which yields a significantly better scalability in backdoor size.
Extensions to the basic notion of a backdoor have been proposed, including backdoors with empty clause detection [6], backdoors in the context of learning [7], heterogeneous backdoors where different instantiations of the backdoor variables may
result in instances that belong to different base classes [15], and backdoors into scattered classes where each connected component of an instance may belong to a different
tractable class [14]. Le Bras et al. [20] used backdoors to speed-up the solution of hard
problems in materials discovery, using a crowd sourcing approach to find small backdoors.
The research on the parameterized complexity of backdoor detection was also successfully extended to other problem areas including disjunctive answer set programming [11,10], abstract argumentation [9], and integer linear programming [13]. There
are also several papers that investigate the parameterized complexity of backdoor detection for CSP. Bessière et al. [1], considered “partition backdoors” which are sets of variables whose deletion partitions the CSP instance into two parts, one falls into a tractable
class defined by a conservative polymorphism, and the other part is a collection of independent constraints. They also performed an empirical evaluation of the backdoor
approach which resulted in promising results. Gaspers et al. [15] considered heterogeneous backdoors into tractable CSP classes that are characterized by polymorphisms. A
similar approach was also undertaken by Carbonnel et al. [3] who also considered base
classes that are “h-Helly” for a fixed integer h under the additional assumption that the
domain is a finite subset of the natural numbers and comes with a fixed ordering.
2 Preliminaries
2.1 Valued Constraint Satisfaction
For a tuple t, we shall denote by t[i] its i-th component. We shall denote by Q the set of
all rational numbers, by Q≥ 0 the set of all nonnegative rational numbers, and by Q≥0
the set of all nonnegative rational numbers together with positive infinity, ∞. We define
α + ∞ = ∞ + α = ∞ for all α ∈ Q≥0 , and α · ∞ = ∞ for all α ∈ Q≥0 . The elements
of Q≥0 are called costs.
For every fixed set D and m ≥ 0, a function ϕ from Dm to Q≥0 will be called a
cost function on D of arity m. D is called the domain, and here we will only deal with
finite domains. If the range of ϕ is {0, ∞}, then ϕ is called a crisp cost function.
With every relation R on D, we can associate a crisp cost function ϕR on D which
maps tuples in R to 0 and tuples not in R to ∞. On the other hand, with every mary cost function ϕ we can associate a relation Rϕ defined by (x1 , . . . , xm ) ∈ Rϕ ⇔
ϕ(x1 , . . . , xm ) < ∞. In the view of the close correspondence between crisp cost functions and relations we shall use these terms interchangeably in the rest of the paper.
A VCSP instance consists of a set of variables, a set of possible values, and a
multiset of valued constraints. Each valued constraint has an associated cost function
which assigns a cost to every possible tuple of values for the variables in the scope of
the valued constraint. The goal is to find an assignment of values to all of the variables
that has the minimum total cost. A formal definition is provided below.
Definition 1 (VCSP). An instance P of the VALUED C ONSTRAINT SATISFACTION
P ROBLEM, or VCSP, is a triple (V, D, C) where V is a finite set of variables, which
are to be assigned values from the set D, and C is a multiset of valued constraints. Each
c ∈ C is a pair c = (x, ϕ), where x is a tuple of variables of length m called the scope
of c, and ϕ : Dm → Q≥0 is an m-ary cost function. An assignment for the instance
P is a mapping τ from V to D. We extend τ to a mapping from V k to Dk on tuples
of variables by applying τ componentwise. The cost of an assignment τ is defined as
follows:
CostP (τ ) =
X
ϕ(τ (x)).
(x,ϕ)∈C
The task for VCSP is the computation of an assignment with minimum cost, called
a solution to P.
For a constraint c, we will use var(c) to denote the set of variables which occur in
the scope of c. We will later also deal with the constraint satisfaction problem, or CSP.
Having already defined VCSP, it is advantageous to simply define CSP as the special
case of VCSP where each valued constraint has a crisp cost function.
The following representation of a cost function will sometimes be useful for our
purposes. A cost table for an m-ary cost function ϕ is a table with Dm rows and m + 1
columns with the following property: each row corresponds to a unique tuple a =
(a1 , . . . , am ) ∈ Dm , for each i ∈ [m] the position i of this row contains ai , and position
m + 1 of this row contains ϕ(a1 , . . . , am ).
A partial assignment is a mapping from V ′ ⊆ V to D. Given a partial assignment τ ,
the application of τ on a valued constraint c = (x, ϕ) results in a new valued constraint
c|τ = (x′ , ϕ′ ) defined as follows. Let x′ = x \ V ′ (i.e., x′ is obtained by removing
′
all elements in V ∩ x from x) and m′ = |x′ |. Then for each a′ ∈ Dm , we set
′
′
ϕ (a ) = ϕ(a) where for each i ∈ [m]
τ (x[i]) if x[i] ∈ V ′
a[i] =
a′ [i − j] otherwise, where j = |{ x[p] | p ∈ [i] } ∩ V ′ |.
Intuitively, the tuple a defined above is obtained by taking the original tuple a′ and
enriching it by the values of the assignment τ applied on the “missing” variables from
x. In the special case when x′ is empty, the valued constraint c|τ becomes a nullary
constraint whose cost function ϕ′ will effectively be a constant. The application of τ on
a VCSP instance P then results in a new VCSP instance P|τ = (V \ V ′ , D, C ′ ) where
C ′ = { c|τ | c ∈ C }. It will be useful to observe that applying a partial assignment τ can
be done in time linear in |P| (each valued constraint can be processed independently,
and the processing of each such valued constraint consists of merely pruning the cost
table).
2.2 Valued Constraint Languages
A valued constraint language (or language for short) is a set of cost functions. The arity
of a language Γ is the maximum arity of a cost function in Γ , or ∞ if Γ contains cost
functions of arbitrarily large arities. Each language Γ defines a set VCSP[Γ ] of VCSP
instances which only use cost functions from Γ ; formally, (V, D, C) ∈ VCSP[Γ ] iff
each (x, ϕ) ∈ C satisfies ϕ ∈ Γ . A language is crisp if it contains only crisp cost
functions.
A language Γ is globally tractable if there exists a polynomial-time algorithm
which solves VCSP[Γ ].1 . Similarly, a class H of VCSP instances is called tractable
if there exists a polynomial-time algorithm which solves H. For technical reasons, we
will implicitly assume that every language contains all nullary cost functions (i.e., constants); it is easily seen that adding such cost functions into a language has no impact
on its tractability.
There are a few other properties of languages that will be required to formally state
our results. A language Γ is efficiently recognizable if there exists a polynomial-time
algorithm which takes as input a cost function ϕ and decides whether ϕ ∈ Γ . We note
that every finite language is efficiently recognizable.
A language Γ is closed under partial assignments if for every instance P ∈ VCSP[Γ ]
and every partial assignment τ on P and every valued constraint c = (x, ϕ) in P, the
valued constraint c|τ = (x′ , ϕ′ ) satisfies ϕ′ ∈ Γ . The closure of a language Γ under
partial assignments, is the language Γ ′ ⊇ Γ containing all cost functions that can be
obtained from Γ via partial assignments; formally, Γ ′ contains a cost function ϕ′ if and
only if there exists a cost function ϕ ∈ Γ such that for a constraint c = (x, ϕ) and an
assignment τ : X → D defined on a subset X ⊆ var(c) we have c|τ = (x′ , ϕ′ ).
If a language Γ is closed under partial assignments, then also VCSP[Γ ] is closed under partial assignments, which is a natural property and provides a certain robustness of
the class. This robustness is also useful when considering backdoors into VCSP[Γ ] (see
Section 3), as then every superset of a backdoor remains a backdoor. Incidentally, being
closed under partial assignments is also a property of tractable classes defined in terms
of a polynomial-time subsolver [27,28] where the property is called self-reducibility.
A language is conservative if it contains all unary cost functions [18]. We note
that being closed under partial assignments is closely related to the well-studied property of conservativeness. Crucially, for every conservative globally tractable language
Γ , its closure under partial assignments Γ ′ will also be globally tractable; indeed, one
1
The literature also defines the notion of tractability [17,19], which we do not consider here.
We remark that, to the best of our knowledge, all known tractable constraint languages are also
globally tractable [17,19]
can observe that every instance P ∈ VCSP[Γ ′ ] can be converted, in linear time, to
a solution-equivalent instance P ′ ∈ VCSP[Γ ] by using infinity-valued (or even sufficiently high-valued) unary cost functions to model the effects of partial assignments.
2.3 Parameterized Complexity
We give a brief and rather informal review of the most important concepts of parameterized complexity. For an in-depth treatment of the subject we refer the reader to other
sources [5,8,12,21].
The instances of a parameterized problem can be considered as pairs (I, k) where I
is the main part of the instance and k is the parameter of the instance; the latter is
usually a non-negative integer. A parameterized problem is fixed-parameter tractable
(FPT) if instances (I, k) of size n (with respect to some reasonable encoding) can be
solved in time O(f (k)nc ) where f is a computable function and c is a constant independent of k. The function f is called the parameter dependence, and algorithms with
running time in this form are called fixed-parameter algorithms. Since the parameter
dependence is usually superpolynomial, we will often give the running times of our algorithms in O∗ notation which suppresses polynomial factors. Hence the running time
of an FPT algorithm can be simply stated as O∗ (f (k)).
The exists a completeness theory which allows to obtain strong theoretical evidence
that a parameterized problem is not fixed-parameter tractable. This theory is based on a
hierarchy of parameterized complexity classes W[1] ⊆ W[2] ⊆ . . . where all inclusions
are believed to be proper. If a parameterized problem is shown to be W[i]-hard for some
i ≥ 1, then the problem is unlikely to be fixed-parameter tractable, similarly to an
NP-complete problem being solvable in polynomial time [5,8,12,21].
3 Backdoors into Tractable Languages
This section is devoted to establishing the first general results for finding and exploiting
backdoors for VCSP. We first present the formal definition of backdoors in the context
of VCSP and describe how such backdoors once found, can be used to solve the VCSP
instance. Subsequently, we show how to detect backdoors into a single tractable VCSP
class with certain properties. In fact, our proof shows something stronger. That is, we
show how to detect heterogeneous backdoors into a finite set of VCSP classes which
satisfy these properties. The notion of heterogeneous backdoors is based on that introduced by Gaspers et al. [15]. For now, we proceed with the definition of a backdoor.
Definition 2. Let H be a fixed class of VCSP instances over a domain D and let P =
(V, D, C) be a VCSP instance. A backdoor into H is a subset X ⊆ V such that for each
assignment τ : X → D, the reduced instance P|τ is in H.
We note that this naturally corresponds to the notion of a strong backdoor in the
context of Constraint Satisfaction and Satisfiability [27,28]; here we drop the adjective
“strong” because the other kind of backdoors studied on these structures (so-called weak
backdoors) do not seem to be useful in the general VCSP setting. Namely, in analogy to
the CSP setting, one would define a weak backdoor of a VCSP instance P = (V, D, C)
into H as a subset X ⊆ V such that for some assignment τ : X → D (i) the reduced
instance P|τ is in H and (ii) τ can be extended to an assignment to V of minimum
cost. However, in order to ensure (ii) we need to compare the cost of τ with the costs of
all other assignments τ ′ to V . If X is not a strong backdoor, then some of the reduced
instances P|τ ′ restricted to X will be outside of H, and so in general we have no efficient
way of determining a minimum cost assignment for it.
We begin by showing that small backdoors for globally tractable languages can
always be used to efficiently solve VCSP instances as long as the domain is finite
(assuming such a backdoor is known).
Lemma 1. Let H be a tractable class of VCSP instances over a finite domain D. There
exists an algorithm which takes as input a VCSP instance P along with a backdoor X
of P = (V, D, C) into H, runs in time O∗ (|D||X| ), and solves P.
Proof. Let B be a polynomial-time algorithm which solves every P in H, i.e., outputs
a minimum-cost assignment in P; the existence of B follows by the tractability of H.
Consider the following algorithm A. First, A branches on the at most |D||X| -many partial assignments of X. In each branch, A then applies the selected partial assignment τ
to obtain the instance P|τ in linear time. In this branch, A proceeds by calling B on P|τ ,
and stores the produced assignment along with its cost. After the branching is complete
A reads the table of all of the at most |D||X| assignments and costs outputted by B, and
selects one assignment (say α) with a minimum value (cost) a. Let τ be the particular
partial assignment on X which resulted in the branch leading to α. A then outputs the
assignment α ∪ τ along with the value (cost) a.
⊓
⊔
Already for crisp languages it is known that having a small backdoor does not necessarily allow for efficient (i.e., fixed-parameter) algorithms when the domain is not
bounded. Specifically, the W[1]-hard k-clique problem can be encoded into a CSP
with only k variables [23], which naturally contains a backdoor of size at most k for
every crisp language under the natural assumption that the language contains the empty
constraint. Hence the finiteness of the domain in Lemma 1 is a necessary condition for
the statement to hold.
Next, we show that it is possible to find a small backdoor into VCSP[Γ ] efficiently
(or correctly determine that no such small backdoor exists) as long as Γ has two properties. First, Γ must be efficiently recognizable; it is easily seen that this condition is
a necessary one, since detection of an empty backdoor is equivalent to determining
whether the instance lies in VCSP[Γ ]. Second, the arity of Γ must be bounded. This
condition is also necessary since already in the more restricted CSP setting it was shown
that backdoor detection for a wide range of natural crisp languages (of unbounded arity)
is W[2]-hard [15].
Before we proceed, we introduce the notion of heterogeneous backdoors for VCSP
which represent a generalization of backdoors into classes defined in terms of a single
language. For languages Γ1 , . . . , Γℓ , a heterogeneous backdoor is a backdoor into the
class H = VCSP[Γ1 ] ∪ · · · ∪ VCSP[Γℓ ]; in other words, after each assignment to
the backdoor variables, all cost functions in the resulting instance must belong to a
language from our set. We now show that detecting small heterogenous backdoors is
fixed-parameter tractable parameterized by the size of the backdoor.
Lemma 2. Let Γ1 , . . . , Γℓ be efficiently recognizable languages over a domain D of
size at most d and let q be a bound on the arity of Γi for every i ∈ [ℓ]. There exists an
algorithm which takes as input a VCSP instance P over D and an integer k, runs in
time O∗ ((ℓ · d · (q + 1))k ), and either outputs a backdoor X of P into VCSP[Γ1 ] ∪ · · · ∪
VCSP[Γℓ ] such that |X| ≤ k or correctly concludes that no such backdoor exists.
Proof. The algorithm is a standard branching algorithm (see also [15]). Formally, the
algorithm is called Detectbd, takes as input an instance P = (V, D, C), integer k, a set
of variables B of size at most k and in time O∗ ((ℓ·d·(q+1))k ) either correctly concludes
that P has no backdoor Z ⊇ B of size at most k into VCSP[Γ1 ] ∪ · · · ∪ VCSP[Γℓ ]
or returns a backdoor Z of P into VCSP[Γ1 ] ∪ · · · ∪ VCSP[Γℓ ] of size at most k. The
algorithm is initialized with B = ∅.
In the base case, if |B| = k, and B is a backdoor of P into VCSP[Γ1 ] ∪ · · · ∪
VCSP[Γℓ ] then we return the set B. Otherwise, we return N O. We now move to the
description of the case when |B| < k.
In this case, if for every σ : B → D there is an i ∈ [ℓ] such that P|σ ∈ VCSP[Γi ],
then it sets Z = B and returns it. That is, if B is already found to be a backdoor of
the required kind, then the algorithm returns B. Otherwise, it computes an assignment
σ : B → D and valued constraints c1 , . . . , cℓ in P|σ such that for every i ∈ [ℓ], the cost
function of ci is not in Γi . Observe that for some σ, such a set of constraints must exist.
Furthermore, since every Γi is efficiently recognizable and B has size at most k, the
selection of these valued constraints takes time O∗ (dk ). The algorithm now constructs
a set Y as follows. Initially, Y = ∅. For each i ∈ [ℓ], if the scope of the constraint ci
contains more than q variables then it adds to Y an arbitrary q + 1-sized subset of the
scope of ci . Otherwise, it adds to Y all the variables in the scope of c. This completes
the definition of Y . Observe that any backdoor set for the given instance which contains
B must also intersect Y . Hence the algorithm now branches on the set Y . Formally, for
every x ∈ Y it executes the recursive calls Detectbd(P, k, B ∪{x}). If for some x ∈ Y ,
the invoked call returned a set of variables, then it must be a backdoor set of the given
instance and hence it is returned. Otherwise, the algorithm returns N O.
Since the branching factor of this algorithm is at most ℓ · (q + 1) and the set B,
whose size is upper bounded by k, is enlarged with each recursive call, the number of
nodes in the search tree is bounded by O((ℓ · (q + 1))k ). Since the time spent at each
node is bounded by O∗ (dk ), the running time of the algorithm Detectbd is bounded by
O∗ ((ℓ · (q + 1) · d)k ).
⊓
⊔
Combining Lemmas 1 and 2, we obtain the main result of this section.
Corollary 1. Let Γ1 , . . . , Γℓ be globally tractable and efficiently recognizable languages
each of arity at most q over a domain of size d. There exists an algorithm which solves
2
VCSP in time O∗ ((ℓ · d · (q + 1))k +k ), where k is the size of a minimum backdoor of
the given instance into VCSP[Γ1 ] ∪ · · · ∪ VCSP[Γℓ ].
4 Backdoors into Scattered Classes
Having established Corollary 1 and knowing that both the arity and domain restrictions
of the language are necessary, it is natural to ask whether it is possible to push the
frontiers of tractability for backdoors to more general classes of VCSP instances. In
particular, there is no natural reason why the instances we obtain after each assignment
into the backdoor should necessary always belong to the same language Γ even if Γ itself is one among several globally tractable languages. In fact, it is not difficult to show
that as long as each “connected component” of the instance belongs to some tractable
class after each assignment into the backdoor, then we can use the backdoor in a similar
fashion as in Lemma 1. Such a generalization of backdoors from single languages to
collections of languages has recently been obtained in the CSP setting [14] for conservative constraint languages. We proceed by formally defining these more general
classes of VCSP instances, along with some other required notions.
4.1 Scattered Classes
A VCSP instance (V, D, C) is connected if for each partition of its variable set into
nonempty sets V1 and V2 , there exists at least one constraint c ∈ C such that var(c) ∩
V1 6= ∅ and var(c) ∩ V2 6= ∅. A connected component of (V, D, C) is a maximal connected subinstance (V ′ , D, C ′ ) for V ′ ⊆ V , C ′ ⊆ C. These notions naturally correspond
to the connectedness and connected components of standard graph representations of
VCSP instances.
Let Γ1 , . . . , Γd be languages. Then the scattered class VCSP(Γ1 )⊕· · ·⊕VCSP(Γd )
is the class of all instances (V, D, C) which may be partitioned into pairwise variable
disjoint subinstances (V1 , D, C1 ), . . . , (Vd , D, Cd ) such that (Vi , D, Ci ) ∈ VCSP[Γi ]
for each i ∈ [d]. Equivalently, an instance P is in VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γd ) iff
each connected component in P belongs to some VCSP[Γi ], i ∈ [d].
Lemma 3. Let Γ1 , . . . , Γd be globally tractable languages. Then there exists a polynomialtime algorithm solving VCSP for all instances P ∈ VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γd ).
It is worth noting that while scattered classes on their own are a somewhat trivial
extension of the tractable classes defined in terms of individual languages, backdoors
into scattered classes can be much smaller than backdoors into each individual globally tractable language (or, more precisely, each individual class defined by a globally
tractable language). That is because a backdoor can not only simplify cost functions to
ensure they belong to a specific language, but it can also disconnect the instance into
several “parts”, each belonging to a different language, and furthermore the specific
language each “part” belongs to can change for different assignments into the backdoor. As a simple example of this behavior, consider the boolean domain, let Γ1 be the
globally tractable crisp language corresponding to Horn constraints [24], and let Γ2 be
a globally tractable language containing only submodular cost functions [4]. It is not
difficult to construct an instance P = (V1 ∪ V2 ∪ {x}, {0, 1}, C) such that (a) every
assignment to x disconnects V1 from V2 , (b) in P|x7→0 , all valued constraints over V1
are crisp Horn constraints and all valued constraints over V2 are submodular, and (c) in
P|x7→1 , all valued constraints over V1 are submodular and all valued constraints over
V2 are crisp Horn constraints. In the hypothetical example above, it is easy to verify
that x is a backdoor into VCSP[Γ1 ] ⊕ VCSP[Γ2 ] but the instance does not have a small
backdoor into neither VCSP[Γ1 ] nor VCSP[Γ2 ].
It is known that backdoors into scattered classes can be used to obtain fixed-parameter
algorithms for CSP, i.e., both finding and using such backdoors is FPT when dealing
with crisp languages of bounded arity and domain size [14]. Crucially, these previous
results relied on the fact that every crisp language of bounded arity and domain size is
finite (which is not true for valued constraint languages in general). We formalize this
below.
Theorem 1 ([14, Lemma 1.1]). Let Γ1 , . . . , Γℓ be globally tractable conservative crisp
languages over a domain D, with each language having arity at most q and containing
at most p relations. There exists a function f and an algorithm solving VCSP in time
O∗ (f (ℓ, |D|, q, k, p)), where k is the size of a minimum backdoor into VCSP[Γ1 ] ⊕
· · · ⊕ VCSP[Γℓ ].
Observe that in the above theorem, when q and |D| are bounded, p is immediately
bounded. However, it is important that we formulate the running time of the algorithm in
this form because in the course of our application, these parameters have to be bounded
separately. Our goal for the remainder of this section is to extend Theorem 1 in the
VCSP setting to also cover infinite globally tractable languages (of bounded arity and
domain size). Before proceeding, it will be useful to observe that if each Γ1 , . . . , Γℓ is
globally tractable, then the class VCSP[Γ1 ] ⊕ · · · ⊕ VCSP[Γℓ ] is also tractable (since
each connected component can be resolved independently of the others).
4.2 Finding Backdoors to Scattered Classes
In this subsection, we prove that finding backdoors for VCSP into scattered classes is
fixed-parameter tractable. This will then allow us to give a proof of our main theorem,
stated below.
Theorem 2. Let ∆1 , . . . , ∆ℓ be conservative, globally tractable and efficiently recognizable languages over a finite domain and having constant arity. Then VCSP is fixedparameter tractable parameterized by the size of a smallest backdoor of the given instance into VCSP(∆1 ) ⊕ · · · ⊕ VCSP(∆ℓ ).
Recall that the closure of a conservative and globally tractable language under partial assignments is also a globally tractable language. Furthermore, every backdoor
of the given instance into VCSP(∆1 ) ⊕ · · · ⊕ VCSP(∆ℓ ) is also a backdoor into
VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ) where Γi is the closure of ∆i under partial assignments.
Due to Lemma 1, it follows that it is sufficient to compute a backdoor of small size into
the scattered class VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ) where each Γi is closed under partial
assignments.
Our strategy for finding backdoors to scattered classes defined in terms of (potentially infinite) globally tractable languages relies on a two-phase transformation of the
input instance. In the first phase (Lemma 4), we show that for every choice of Γ1 , . . . , Γd
(each having bounded domain size and arity), we can construct a set of finite languages
Γ1′ , . . . , Γd′ and a new instance P ′ such that there is a one-to-one correspondence between backdoors of P into Γ1 ⊕ · · · ⊕ Γd and backdoors of P ′ into Γ1′ ⊕ · · · ⊕ Γd′ . This
allows us to restrict ourselves to only the case of finite (but not necessarily crisp) languages as far as backdoor detection is concerned. In the second phase (Lemma 5), we
transform the instance and languages one more time to obtain another instance P ′′ along
with finite crisp languages Γ1′′ , . . . , Γd′′ such that there is a one-to-one correspondence
between the backdoors of P ′′ and backdoors of P ′ . We crucially note that the newly
constructed instances are equivalent only with respect to backdoor detection; there is no
correspondence between the solutions of these instances.
Before proceeding, we introduce a natural notion of replacement of valued constraints which is used in our proofs.
Definition 3. Let P = (V, D, C) be a VCSP instance and let c = (x, ϕ) ∈ C. Let ϕ′
be a cost function over D with the same arity as ϕ. Then the operation of replacing ϕ
in c with ϕ′ results in a new instance P ′ = (V, D, (C \ {c}) ∪ {(x, ϕ′ )}).
Lemma 4. Let Γ1 , . . . , Γℓ be efficiently recognizable languages closed under partial
assignments, each of arity at most q over a domain D of size d. There exists an algorithm
which takes as input a VCSP instance P = (V, D, C) and an integer k, runs in time
O∗ (f (ℓ, d, k, q)) for some function f and either correctly concludes that P has no
backdoor into VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ) of size at most k or outputs a VCSP
instance P ′ = (V, D′ , C ′ ) and languages Γ1′ , . . . , Γℓ′ with the following properties.
1. For each i ∈ [ℓ], the arity of Γi′ is at most q
2. For each i ∈ [ℓ], Γi′ is over D′ and D′ ⊆ D
3. Each of the languages Γ1′ , . . . , Γℓ′ is closed under partial assignments and contains
at most g(ℓ, d, k, q) cost functions for some function g.
4. For each X ⊆ V , X is a minimal backdoor of P into VCSP(Γ1 )⊕· · ·⊕ VCSP(Γℓ )
of size at most k if and only if X is a minimal backdoor of P ′ into VCSP(Γ1′ ) ⊕
· · · ⊕ VCSP(Γℓ′ ) of size at most k.
Proof. We will first define a function mapping the valued constraints in C to a finite set
whose size depends only on ℓ, d, k and q. Subsequently, we will show that every pair of
constraints in C which are mapped to the same element of this set are, for our purposes
(locating a backdoor), interchangeable. We will then use this observation to define the
new instance P ′ and the languages Γ1′ , . . . , Γℓ′′ . To begin with, observe that if the arity
of a valued constraint in P is at least q + k + 1, then P has no backdoor of size at most k
into VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ). Hence, we may assume without loss of generality
that the arity of every valued constraint in P is at most q + k.
Let F be the set of all functions from [q + k] × 2[q+k] × D[q+k] → 2[ℓ] ∪ {⊥},
where ⊥ is used a special symbol expressing that F is “out of bounds.” Observe that
(q+k)+log(q+k)
|F | ≤ η(ℓ, d, k, q) = (2ℓ + 1)(2d)
. We will now define a function Type :
C → F as follows. We assume without loss of generality that the variables in the scope
of each constraint in C are numbered from 1 to |var(c)| based on their occurrence in
the tuple x where c = (x, ϕ). Furthermore, recall that |var(c)| ≤ q + k. For c ∈ C, we
define Type(c) = δ ∈ F where δ is defined as follows. Let r ≤ q + k, Q ⊆ [q + k] and
γ : [q +k] → D. Let γ[Q∩[r]] denote the restriction of γ to the set Q∩[r]. Furthermore,
recall that c|γ[Q∩[r]] denotes the valued constraint resulting from applying the partial
assignment γ on the variables of c corresponding to all those indices in Q ∩ [r].
Then, δ(r, Q, γ) = ⊥ if r 6= |var(c)|. Otherwise, δ(r, Q, γ) = L ⊆ [ℓ] where
i ∈ [ℓ] is in L if and only if c|γ[Q∩[r]] ∈ VCSP(Γi ). This completes the description
of the function Type; observe that Type(c) can be computed in time which is upperbounded by a function of ℓ, d, k, q.
For every δ ∈ F , if there is a valued constraint c ∈ C such that Type(c) = δ, we
pick and fix one arbitrary such valued constraint c∗δ = (x∗δ , ϕ∗δ ). We now proceed to the
definition of the instance P ′ and the languages Γ1′ , . . . , Γℓ′′ .
Observe that for 2 constraints c = (x1 , ϕ), c′ = (x′ , ϕ′ ) ∈ C, if Type(c) =
Type(c′ ) then |var(c)| = |var(c′ )|. Hence, the notion of replacing ϕ in c with ϕ′ is
well-defined (see Definition 3). We define the instance P ′ as the instance obtained from
P by replacing each c = (x, ϕ) ∈ C with the constraint (x, ϕ∗δ ) where δ = Type(c).
For each i ∈ [ℓ] and cost function ϕ ∈ Γi , we add ϕ to the language Γi′ if and only if
for some δ ∈ F and some set Q ⊆ var(c∗δ ) and assignment γ : Q → D, the constraint
c|γ[Q] = (x \ Q, ϕ). Clearly, for every i ∈ [ℓ], |Γi′ | ≤ dq · |F | ≤ dq · η(ℓ, d, k, q).
Finally, for each Γi′ , we compute the closure of Γi′ under partial assignments and add
each relation from this closure into Γi′ . Since the size of each Γi′ is bounded initially
in terms of ℓ, d, k, q, computing this closure can be done in time O∗ (λ(ℓ, d, k, q)) for
some function λ. Since each cost function has arity q and domain D, the size of the
final language Γi′ obtained after this operation is blown up by a factor of at most dq ,
implying that in the end, |Γi′ | ≤ d2q · |F | ≤ d2q · η(ℓ, d, k, q).
Now, observe that the first two statements of the lemma follow from the definition
of the languages {Γi′ }i∈[ℓ] . Furthermore, the number of cost functions in each Γi′ is
bounded by dq · η(ℓ, d, k, q), and so the third statement holds as well. Therefore, it
only remains to prove the final statement of the lemma. Before we do so, we state a
straightforward consequence of the definition of P ′ .
Observation 1 For every Y ⊆ V , γ : Y → D and connected component H′ of P ′ |γ ,
there is a connected component H of P|γ and a bijection ψ : H → H′ such that for
every c ∈ H, Type(c) = Type(ψ(c)). Furthermore, for every c = (x, ϕ) ∈ H, the
constraint ψ(c) is obtained by replacing ϕ in c with ϕ∗Type(c) .
We now return to the proof of Lemma 4. Consider the forward direction and let X
be a backdoor of size at most k for P into VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ) and suppose
that X is not a backdoor for P ′ into VCSP(Γ1′ ) ⊕ · · · ⊕ VCSP(Γℓ′ ). Then, there is an
assignment γ : X → D such that for some connected component H of P ′ |γ , there is
no i ∈ ℓ such that all constraints in H′ lie in VCSP(Γi′ ). By Observation 1 above, there
is a connected component H in P|γ and a bijection ψ : H → H′ such that for every
c ∈ H, Type(c) = Type(ψ(c)). Since X is a backdoor for P, there is a j ∈ ℓ such
that all constraints in H lie in VCSP(Γj ). Pick an arbitrary constraint c = (x, ϕ) ∈ H.
Let c′ = (x, ϕ∗Type(c) ) be the constraint ψ(c). By definition of ϕ∗Type(c) it follows that
c′ |γ ∈ VCSP(Γj ). The fact that this holds for an arbitrary constraint in H along with
the fact that ψ is a bijection implies that every constraint in H′ is in fact in VCSP(Γj′ ),
a contradiction. The argument in the converse direction is symmetric. This completes
the proof of the final statement of the lemma.
The time taken to compute P ′ and the languages Γ1′ , . . . , Γℓ′ is dominated by the
time required to compute the function Type. Since the languages Γ1 , . . . , Γℓ are ef-
ficiently recognizable, this time is bounded by O∗ (|F |), completing the proof of the
lemma.
⊓
⊔
Lemma 5. Let Γ1 , . . . , Γℓ be efficiently recognizable languages closed under partial
assignments, each of arity at most q over a domain D of size d. Let P ′ = (V, D′ , C ′ )
be the VCSP instance and let Γ1′ , . . . , Γℓ′ be languages returned by the algorithm of
Lemma 4 on input P and k. There exists an algorithm which takes as input P ′ , these
languages and k, runs in time O∗ (f (ℓ, d, k, q)) for some function f and outputs a CSP
instance P ′′ = (V ′′ ⊇ V, D′′ , C ′′ ) and crisp languages Γ1′′ , . . . , Γℓ′′ with the following
properties.
1. For each i ∈ [ℓ], the arity of Γi′′ is at most q + 1
2. D′′ ⊇ D and |D′′ | ≤ β(q, d, k) for some function β.
3. The number of relations in each of the languages Γ1′′ , . . . , Γℓ′′ is at most α(q, d, k)
for some function α.
4. if X is a minimal backdoor of arity at most k of P ′′ into CSP(Γ1′′ )⊕· · ·⊕CSP(Γℓ′′ ),
then X ⊆ V .
5. For each X ⊆ V , X is a minimal backdoor of P ′ into VCSP(Γ1′ )⊕· · ·⊕VCSP(Γℓ′ )
if and only if X is a minimal backdoor of P ′′ into CSP(Γ1′′ ) ⊕ · · · ⊕ CSP(Γℓ′′ ).
Proof. We propose a fixed-parameter algorithm A, and show that it has the claimed
properties. It will be useful to recall that we do not distinguish between crisp cost functions and relations. We also formally assume that D′ does not intersect the set of rationals Q; if this is not the case, then we simply rename elements of D′ to make sure that
this holds. Within the proof, we will use a ◦ b to denote the concatenation of vector a
by element b.
First, let Ti be the set of all values which are returned
by at least one cost function
S
from Γi′ , i ∈ [ℓ], for at least one input. Let T = i∈[ℓ] Ti . Observe that |T | is upperbounded by the size, domain and arity of our languages. Let us now set D′′ = D′ ∪T ∪ǫ.
Intuitively, our goal will be to represent the cost function in each valued constraint in
P ′ by a crisp cost function with one additional variable which ranges over T , where T
corresponds to a specific value which occurs in one of our base languages. Note that this
satisfies Condition 2. of the lemma, and that T can be computed in linear time from the
cost tables of Γ1′ , . . . , Γℓ′ . We will later construct k + 1 such representations (each with
its own additional variable) to ensure that the additional variables are never selected by
minimal backdoors.
Next, for each language Γi′ , i ∈ [ℓ], we compute a new crisp language Γi′′ as follows.
For each ϕ ∈ Γi′ of arity t, we add a new relation ψ of arity t + 1 into Γi′′ , and for each
tuple (x1 , . . . , xt ) of elements from D′ we add the tuple (x1 , . . . , xt , ϕ(x1 , . . . , xt ))
into ψ; observe that this relation exactly corresponds to the cost table of ϕ. We then
compute the closure of Γi′′ under partial assignments and add each relation from this
closure into Γi′′ . Observe that the number of relations in Γi′′ is bounded by a function
of |T | and |Γi′ |, and furthermore the number of tuples in each relation is upper-bounded
′
by q |D | , and so Conditions 1. and 3. of the lemma hold. The construction of each Γi′′
from Γi′ can also be done in linear time from the cost tables of Γ1′ , . . . , Γℓ′ .
Finally, we construct a new instance P ′′ = (V ′′ , D′′ , C ′′ ) from P ′ = (V, D′ , C ′ ) as
follows. At the beginning, we set V ′′ := V . For each c′ = (x′ , ϕ′ ) ∈ C ′ , we add k + 1
unique new variables vc1′ , . . . , vck+1
into V ′′ and add k + 1 constraints c′′1 , . . . , c′′k+1
′
′′
′′i
into C . For i ∈ [k + 1], each c = (x′ ◦ vci ′ , ψ ′′ ) where ψ ′′ is a relation that is constructed similarly as the relations in our new languages Γi′′ above. Specifically, for each
tuple (x1 , . . . , xt ) of elements from D′ we add the tuple (x1 , . . . , xt , ϕ′ (x1 , . . . , xt ))
into ψ ′′ , modulo the following exception. If ϕ′ (x1 , . . . , xt ) 6∈ D′′ , then we instead add
the tuple (x1 , . . . , xt , ǫ) into ψ ′′ . Clearly, the construction of our new instance P ′′ takes
′
time at most O(|C ′ | + q |D | ). This concludes the description of A.
It remains to argue that Conditions 4. and 5. of the lemma hold. First, consider a
minimal backdoor X of size at most k of P ′′ into CSP[Γ1′′ ] ⊕ · · · ⊕ CSP[Γℓ′′ ], and
assume for a contradiction that there exists some c′ = (x′ , ϕ′ ) ∈ C ′ and i ∈ [k + 1]
such that vci ′ ∈ X. First, observe that this cannot happen if the whole scope of c′′i lies
in X. By the size bound on X, there exists j ∈ [k + 1] such that vcj′ 6∈ X. Then for each
partial assignment τ of X, the relation ϕ′′ in c′′j belongs to the same globally tractable
language as the rest of the connected component of P ′′ containing the scope of c′′ (after
applying τ ). Since the relation ϕ′′ in c′′j is precisely the same as in c′′i and the scope of
c′′i must lie in the same connected component as that of c′′j , it follows that X \ {vxi ′ }
is also a backdoor of P ′′ into CSP(Γ1′′ ) ⊕ · · · ⊕ CSP(Γℓ′′ ). However, this contradicts
the minimality of X.
Finally, for Condition 5., consider an arbitrary backdoor X of P ′ into VCSP(Γ1′ ) ⊕
· · · ⊕ VCSP(Γℓ′ ), and let us consider an arbitrary assignment from X to D′′ . It will
be useful to note that while the contents of relations and/or cost functions in individual
(valued) constraints depend on the particular choice of the assignment to X, which
variables actually occur in individual components depends only on the choice of X and
remains the same for arbitrary assignments.
Now observe that each connected component P CSP of P ′′ after the application of
the (arbitrarily chosen) assignment will fall into one of the following two cases. P CSP
could contain a single variable vc′ with a single constraint whose relation lies in every
language Γi′′ , i ∈ [ℓ]; this occurs precisely when the whole scope of a valued constraint
c′ ∈ C ′ lies in X, and the relation will either contain a singleton element from T or
be the empty relation. In this case, we immediately conclude that P CSP ∈ CSP(Γi ) for
each i ∈ [ℓ].
Alternatively, P CSP contains at least one variable v ∈ V . Let P VCSP be the unique
connected component of P ′ obtained after the application of an arbitrary assignment
from X to D′ which contains v. Observe that the variable sets of P CSP and P VCSP
only differ in the fact that P CSP may contain some of the newly added variables vc′ for
various constraints c′ . Now let us consider a concrete assignment τ from X to D′ along
with an i ∈ [ℓ] such that after the application of τ , the resulting connected component
P VCSP belongs to VCSP(Γi′ ). It follows by our construction that applying the same
assignment τ in P ′′ will result in a connected component P CSP corresponding to P VCSP
such that P VCSP ∈ CSP(Γi′′ ); indeed, whenever Γi′ contains an arbitrary cost function
ϕ(x) = β, the language Γi′′ will contain the relation (x ◦ β).
By the above, the application of an assignment from X to D′ in P ′′ will indeed
result in an instance in CSP(Γ1′′ ⊕ · · · ⊕ Γℓ′′ ). But recall that the domain of P ′′ is D′′ ,
which is a superset of D′ ; we need to argue that the above also holds for assignments
τ from X to D′′ . To this end, consider an arbitrary such τ and let τ0 be an arbitrary
assignment from X to D′ which matches τ on all mappings into D′ . Let us compare
the instances Pτ′′0 and Pτ′′ . By our construction of P ′ , whenever τ maps at least one
variable from the scope of some constraint c′′ to D′′ \ D′ , the resulting relation will be
the empty relation. It follows that each constraint in Pτ′′ will either be the same as in
Pτ′′ , or will contain the empty relation. But since the empty relation is included in every
language Γ1′′ , . . . , Γℓ′′ , we conclude that each connected component of Pτ′′ must belong
to at least one language Γi′′ , i ∈ [ℓ]. This shows that X must also be a backdoor of P ′′
into CSP[Γ1′′ ] ⊕ · · · ⊕ CSP[Γℓ′′ ].
For the converse direction, consider a minimal backdoor X of P ′′ into CSP[Γ1′′ ] ⊕
· · · ⊕ CSP[Γℓ′′ ]. Since we already know that Condition 4. holds, X must be a subset
of V . The argument from the previous case can then simply be reversed to see that X
will also be a backdoor of P ′ into VCSP[Γ1′ ] ⊕ · · · ⊕ VCSP[Γℓ′ ]; in fact, the situation
in this case is much easier since only assignments into D′ need to be considered.
Summarizing, we gave a fixed-parameter algorithm and then showed that it satisfies
each of the required conditions, and so the proof is complete.
⊓
⊔
We are now ready to prove Theorem 2, which we restate for the sake of convenience.
Theorem 2. Let ∆1 , . . . , ∆ℓ be conservative, globally tractable and efficiently recognizable languages over a finite domain and having constant arity. Then VCSP is fixedparameter tractable parameterized by the size of a smallest backdoor of the given instance into VCSP(∆1 ) ⊕ · · · ⊕ VCSP(∆ℓ ).
Proof. For each i ∈ [ℓ], let Γi denote the closure of ∆i under partial assignments.
Observe that every backdoor of the given instance into VCSP(∆1 ) ⊕ · · · ⊕ VCSP(∆ℓ )
is also a backdoor into VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ). Furthermore, each VCSP(Γi )
is tractable since VCSP(∆1 ) is tractable and conservative. Hence, it is sufficient to
compute and use a backdoor of size at most k into VCSP(Γ1 ) ⊕ · · · ⊕ VCSP(Γℓ ).
The claimed algorithm has two parts. The first one is finding a backdoor into VCSP(Γ1 )⊕
· · · ⊕ VCSP(Γℓ ) and the second one is using the computed backdoor to solve VCSP.
Given an instance P and k, we first execute the algorithm of Lemma 4 to compute the
instance P ′ , and the languages Γ1′ , . . . , Γℓ′ with the properties stated in the lemma. We
then execute the algorithm of Lemma 5 with input P ′ , k, and Γ1′ , . . . , Γℓ′ to compute the
CSP instance P ′′ and crisp languages Γ1′′ , . . . , Γℓ′′ with the stated properties. Following
this, we execute the algorithm of Theorem 1 with input P ′′ , k. If this algorithm returns
N O then we return N O as well. Otherwise we return the set returned by this algorithm
as a backdoor of size at most k for the given instance P. Finally, we use the algorithm
of Lemma 1 with H set to be the class VCSP(Γ1 ) ⊕ · · ·⊕ VCSP(Γℓ ), to solve the given
instance.
The correctness as well as running time bounds follow from those of Lemmas 4
and 5, Theorem 1, and Lemma 1. This completes the proof of the theorem.
⊓
⊔
5 Concluding Remarks
We have introduced the notion of backdoors to the VCSP setting as a means for augmenting a class of globally tractable VCSP instances to instances that are outside the
class but of small distance to the class. We have presented fixed-parameter tractability
results for solving VCSP instances parameterized by the size of a smallest backdoor
into a (possibly scattered and heterogeneous) tractable class satisfying certain natural
properties.
Our work opens up several avenues for future research. Since our main objective
was to establish the fixed-parameter tractability of this problem, we have not attempted
to optimize the runtime bounds for finding backdoors to scattered classes. As a result,
it is quite likely that a more focussed study of scattered classes arising from specific
constraint languages will yield a significantly better runtime. A second interesting direction would be studying the parameterized complexity of detection of backdoors into
tractable VCSP classes that are characterized by specific fractional polymorphisms.
References
1. C. Bessiere, C. Carbonnel, E. Hebrard, G. Katsirelos, and T. Walsh. Detecting and exploiting subproblem tractability. In F. Rossi, editor, IJCAI 2013, Proceedings of the 23rd
International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013.
IJCAI/AAAI, 2013.
2. C. Carbonnel and M. C. Cooper. Tractability in constraint satisfaction problems: a survey.
Constraints, 21(2):115–144, 2016.
3. C. Carbonnel, M. C. Cooper, and E. Hebrard. On backdoors to tractable constraint languages.
In B. O’Sullivan, editor, Principles and Practice of Constraint Programming - 20th International Conference, CP 2014, Lyon, France, September 8-12, 2014. Proceedings, volume
8656 of Lecture Notes in Computer Science, pages 224–239. Springer Verlag, 2014.
4. D. A. Cohen, P. G. Jeavons, and S. Zivny. The expressive power of valued constraints:
Hierarchies and collapses. Theoretical Computer Science, 409(1):137–153, 2008.
5. M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk,
and S. Saurabh. Parameterized Algorithms. Springer, 2015.
6. B. N. Dilkina, C. P. Gomes, and A. Sabharwal. Tradeoffs in the complexity of backdoor detection. In Principles and Practice of Constraint Programming - CP 2007, 13th International
Conference, CP 2007, Providence, RI, USA, September 23-27, 2007, Proceedings, volume
4741 of Lecture Notes in Computer Science, pages 256–270. Springer Verlag, 2007.
7. B. N. Dilkina, C. P. Gomes, and A. Sabharwal. Backdoors in the context of learning. In
O. Kullmann, editor, Theory and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009, Swansea, UK, June 30 - July 3, 2009. Proceedings, volume
5584 of Lecture Notes in Computer Science, pages 73–79. Springer Verlag, 2009.
8. R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Texts in
Computer Science. Springer Verlag, 2013.
9. W. Dvorák, S. Ordyniak, and S. Szeider. Augmenting tractable fragments of abstract argumentation. Artificial Intelligence, 186:157–173, 2012.
10. J. K. Fichte and S. Szeider. Backdoors to normality for disjunctive logic programs. ACM
Trans. Comput. Log., 17(1), 2015.
11. J. K. Fichte and S. Szeider. Backdoors to tractable answer set programming. Artificial
Intelligence, 220:64–103, Mar. 2015.
12. J. Flum and M. Grohe. Parameterized Complexity Theory, volume XIV of Texts in Theoretical Computer Science. An EATCS Series. Springer Verlag, Berlin, 2006.
13. R. Ganian and S. Ordyniak. The complexity landscape of decompositional parameters for
ILP. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI Press,
2016. To appear.
14. R. Ganian, M. S. Ramanujan, and S. Szeider. Discovering archipelagos of tractability for
constraint satisfaction and counting. In Proceedings of the Twenty-Seventh Annual ACMSIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12,
2016, pages 1670–1681, 2016.
15. S. Gaspers, N. Misra, S. Ordyniak, S. Szeider, and S. Živný. Backdoors into heterogeneous
classes of SAT and CSP. In C. E. Brodley and P. Stone, editors, Proceedings of the TwentyEighth AAAI Conference on Artificial Intelligence, July 27 -31, 2014, Québec City, Québec,
Canada, pages 2652–2658. AAAI Press, 2014.
16. S. Gaspers and S. Szeider. Backdoors to satisfaction. In H. L. Bodlaender, R. Downey, F. V.
Fomin, and D. Marx, editors, The Multivariate Algorithmic Revolution and Beyond - Essays
Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday, volume 7370 of
Lecture Notes in Computer Science, pages 287–317. Springer Verlag, 2012.
17. P. Jeavons, A. A. Krokhin, and S. Živný. The complexity of valued constraint satisfaction.
Bulletin of the European Association for Theoretical Computer Science, 113, 2014.
18. V. Kolmogorov and S. Živný. The complexity of conservative valued CSPs. J. of the ACM,
60(2):Art. 10, 38, 2013.
19. A. Krokhin, A. Bulatov, and P. Jeavons. The complexity of constraint satisfaction: An algebraic approach. In Structural Theory of Automata, Semigroups and Universal Algebra
(Montreal, 2003), number 207 in NATO Science Series II: Mathematics, Physics, and Chemistry, pages 181–213, 2005.
20. R. LeBras, R. Bernstein, C. P. Gomes, B. Selman, and R. B. van Dover. Crowdsourcing
backdoor identification for combinatorial optimization. In F. Rossi, editor, IJCAI 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence, Beijing, China,
August 3-9, 2013, 2013.
21. R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford Lecture Series in Mathematics and its Applications. Oxford University Press, Oxford, 2006.
22. N. Nishimura, P. Ragde, and S. Szeider. Detecting backdoor sets with respect to Horn and
binary clauses. In Proceedings of SAT 2004 (Seventh International Conference on Theory
and Applications of Satisfiability Testing, 10–13 May, 2004, Vancouver, BC, Canada), pages
96–103, 2004.
23. C. H. Papadimitriou and M. Yannakakis. On the complexity of database queries. J. of
Computer and System Sciences, 58(3):407–427, 1999.
24. T. J. Schaefer. The complexity of satisfiability problems. In Conference Record of the Tenth
Annual ACM Symposium on Theory of Computing (San Diego, Calif., 1978), pages 216–226.
ACM, 1978.
25. J. Thapper and S. Živný. Necessary conditions for tractability of valued CSPs. SIAM J.
Discrete Math., 29(4):2361–2384, 2015.
26. S. Živný. The Complexity of Valued Constraint Satisfaction Problems. Cognitive Technologies. Springer, 2012.
27. R. Williams, C. Gomes, and B. Selman. Backdoors to typical case complexity. In G. Gottlob and T. Walsh, editors, Proceedings of the Eighteenth International Joint Conference on
Artificial Intelligence, IJCAI 2003, pages 1173–1178. Morgan Kaufmann, 2003.
28. R. Williams, C. Gomes, and B. Selman. On the connections between backdoors, restarts, and
heavy-tailedness in combinatorial search. In Informal Proc. of the Sixth International Conference on Theory and Applications of Satisfiability Testing, S. Margherita Ligure - Portofino,
Italy, May 5-8, 2003 (SAT 2003), pages 222–230, 2003.
| 8cs.DS
|
Correlation Properties of Signal at Mobile Receiver
for Different Propagation Environments
Cezary Ziółkowski, Jan M. Kelner, Leszek Nowosielski
Institute of Telecommunications, Faculty of Electronics
Military University of Technology
Warsaw, Poland
{cezary.ziolkowski, jan.kelner, leszek.nowosielski}@wat.edu.pl
Abstract—An issue of the parameter selection in various
branches of a multi-antenna receiver system determines its
effectiveness. A significant effect on these parameters are
correlation properties of received signals. In this paper, the
assessment of the signal correlation properties for different
environmental conditions is presented. The obtained results
showed that depending on the receiver speed, the adaptive
selection of the delays in the different RAKE receiver branches
provide minimization of the correlation between the signals.
Particularly low levels of the signal correlation could be obtained
in complex propagation environments such as urban and bad
urban.
Keywords—propagation; channel model; autocorrelation
function; correlational properties; angle distribution; modified
Laplacian; delay spread; mobile receiver; RAKE receiver; type of
environment; modeling; simulation
I. INTRODUCTION
The impact of the environment on the autocorrelation
function (ACF) properties is important for the development of
multi-antenna systems and processing methods of the received
signals. For individual branches of the system, the evaluation
of ACF properties allows to determine the parameters that
provide minimize the correlation of the received signals. In
RAKE receiver [1][2][3][4], knowing ACF properties is the
basis for choosing the values of the coefficients and delays of
each branch of the tapped delay line. Superposition of all
signals from line ensures minimization of frequency selective
fading. This mean that ACF properties play a large role in
minimizing intersymbol interference and, as a consequence,
they significantly affect the capacity of the entire system.
The angular spread of power is one of the main factors that
determine ACF properties of the received signal. Hence, the
assessment of these properties is determined by selection of the
appropriate angular spread model that provides mapping the
effects of actual propagation phenomena. The basic function
that defines a statistical spread model is the probability density
function (PDF) of angle of arrival (AOA). In this set of models,
we can distinguish analytical (geometrical) and empirical
models. The analytical models are based on the geometrical
structures that described the spatial location of the scattering
elements. The empirical models whereas use standard PDFs. In
this case, the criterion for selection of model parameters is to
minimize the approximation error with respect to measurement
data. The analytical models characterized by considerable
complexity of the analytical description compared to empirical
models. In addition, in [5], the comparison of the results of
approximation shows that the empirical models provide a
smaller approximation error of measurement data with respect
to the analytical models.
Influence of the propagation environment on the ACF
properties is the main purpose of this paper. The assessment of
this impact is based on the selected PDF of AOA empirical
model that minimizes the approximation error of data from
several measurement campaigns. The modified Laplacian
distribution is one of the fundamental empirical models that is
used to describe PDF of AOA. The accuracy of measurement
data mapping for this model is presented in [6][7], and a
comparative assessment with other models is contained in [8].
The presented results are the reason for choosing this model to
assess ACF properties of the received signal by mobile receiver
in different propagation conditions. Propagation environment
type is defined on the basis of the rms delay spread (DS), στ.
Adaptation of the modified Laplacian uses the relationship
between the parameters of this model and DS. Dispersion of
AOA versus DS allows the assessment of the impact of
propagation environment on AFC properties that among other
things, determine the efficacy of using multi-antenna systems.
A method of determining the empirical model parameters as a
function of DS is shown based on measurement data in [9].
The remainder of the paper is organized as follows. In
Section II, we present the theoretical basis for the
determination of ACF analytical form of received signal by a
moving receiver. This section also shows the PDF of AOA and
an adapting method its parameters to the type of propagation
environment. The calculation results of averaging procedure
for the different environmental parameters are presented in
Section III. From the obtained results, final conclusions are
contained in Section IV.
II. NORMALIZED CORRELATION FUNCTION
AND ANGLE DISTRIBUTION
The fundamental model that defines ACF of the received
signal by the mobile receiver is a two-dimensional isotropic
Cezary Ziółkowski, Jan M. Kelner, and Leszek Nowosielski,
“Correlation properties of signal at mobile receiver for different propagation environments,”
in 2018 14th International Conference on Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering (TCSET),
Lviv - Slavske, Ukraine, 20-24.02.2018., pp. 1–4.
Clark model. For this model, the analytic form of the low-pas
received signal, x(t), for the unmodulated carrier is [10]
N
x t an exp 2πi f Dm t cos n i n
For the Clark model, PDF of AOA, f (φ), is described by the
uniformly distributed. In this case, we have
r J 0 2π
n 1
where N is the number of propagation paths, an represents the
signal amplitude of the nth path, fDm is the maximum frequency
of the Doppler shift, φn means angle between the nth path and
velocity vector of the receiver, γn is the random phase of signal
component from the nth path.
In practice, all parameters of x(t) are statistically
independent and γn values are equally likely. It is the premise
that PDF of each γn (n = 1,2,…,N) can be assumed to be
uniformly distributed. By using these assumptions, the ACF,
R(τ), for time interval that conditions stationary properties of
x(t), is
R E x t x* t
ak exp 2πi f Dm t cos k i k
k 1
E N
a exp 2πi f t cos i
l
Dm
l
l
l 1
where J0(⸱) is the zero-order Bessel function of the first kind
and τ’ = fDmτ is a normalized time.
However, a number of measurement results executed in real
environment significantly different from the uniform PDF. This
fact is shown in many publications, for example [6]. In this
paper, our attention focuses on the empirical model f (φ) that
provides a simple analytical description and minimizes
approximation errors of measurement data. In [8], the
comparative analysis of empirical models shows that the
modified Laplacian gives the smallest approximation error for
different propagation scenarios. Therefore, in the paper, this
PDF is used to analyze the signal ACF. Modified Laplacian has
a form
N
N
E an2 exp 2πi f Dm cos n
n 1
N
n 1
where E{⸱} is an averaging operator after sets of an and φn
values.
The statistical properties of each AOA are the same for all
propagation paths. Thus, we have
R E exp 2πif Dm cos E an2
N
n 1
E a
2
where C 1 exp π
1
n 1
2
n
such that
where
rI irQ
rI E cos 2π f Dm cos
9.44 0.40 1
Considering (4) and (6), the analytical forms of the in-phase
and quadrature components of ACF, we can express as
2
π
cos 2π cos exp d
π
and
rQ E sin 2π f Dm cos are the in-phase and quadrature
components of r(τ).
is a normalized factor
f d 1 .
rI , C
Hence, the normalized ACF, r(τ) has a form
for π, π
Adaptation of f (φ) to the type of propagation environment
consists in appropriately adjusting the PDF parameters. In this
procedure, a statistical relationship between DS and the rms
angle spread (AS), σφ, is used [6]. Details of adaptation method
are shown in [9]. Considering the results of several
measurement campaigns, the relationship between λ and στ is
approximated by [9]
is the average power of received signal.
r R R 0 E exp 2πi f Dm cos
π
N
where
exp
π
E an2 E exp 2πi f Dm cos n
f C
rQ , C
2
π
sin 2π cos exp d
π
Cezary Ziółkowski, Jan M. Kelner, and Leszek Nowosielski,
“Correlation properties of signal at mobile receiver for different propagation environments,”
in 2018 14th International Conference on Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering (TCSET),
Lviv - Slavske, Ukraine, 20-24.02.2018., pp. 1–4.
Formulas (8) and (9) are the basis to determine the module
of ACF, r(τ’, στ), which enables the ACF assessment of the
received signal in different environmental conditions.
III. NUMERICAL CALCULATION
In the paper, we use numerical calculation for analysis of
signal ACF. Such an approach to analyzed problem results
from the complexity of analytic expressions (8) and (9).
Numerical calculation of integrals are made for three different
values of στ (0.1 μs, 0.2 μs, 1.0 μs) that define the propagation
environments of rural area and typical urban types. The
obtained results of rI(τ’, στ), rQ(τ’, στ), and | r(τ’, στ) | are
presented in Figs. 1-3.
Fig. 1. In-phase component of ACF for different environment types.
As shown in graphs, the strong correlation of the signal
occurs for rural area, and | r(τ’, στ) | graph is converges to the
Clark model with the increased complexity of the propagation
environment. This means that the application of the multiantenna system in rural area gives a significantly smaller
improvement in the quality and channel capacity compared to
an environment that has a large
value. The graph of
| r(τ’, στ) | shows that in individual branches, the selection of the
delays minimizes correlate the received signals in the multiantenna system. The minimum value of ACF that can be
obtained for the first local minimum (τ’ = τ’min) are shown in
Fig. 4 for different propagation environments (versus στ). In
addition, the maximum values of | r(τ’, στ) | (the first local
maximum τ’ = τ’min) are presented in this figure.
Fig. 4. First local minimum and maximum of | r(τ’, στ) | for different
environment types.
The figure indicates that for the higher the complexity of
propagation environment, the ACF value can be a smaller.
Comparing graphs shows that the use of procedure for delaying
the signals in individual branches can provide the efficiency
increase of signal reception.
A measure
r r m ax, r m in ,
Fig. 2. Quadrature component of ACF for different environment types.
that gives you the opportunity to evaluate the use effectiveness
of the first local minimum of the module of ACF in the
branches receiver, is shown in Fig. 5.
Fig. 3. Module of ACF for different environment types.
Fig. 5. Difference between first local maximum and minimum of ACF for
different environment types.
Cezary Ziółkowski, Jan M. Kelner, and Leszek Nowosielski,
“Correlation properties of signal at mobile receiver for different propagation environments,”
in 2018 14th International Conference on Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering (TCSET),
Lviv - Slavske, Ukraine, 20-24.02.2018., pp. 1–4.
The graph of Δr(στ) shows that the selection of the signal
delays in various branches of the receiver could provide several
times reduction of the signal correlation for complex
propagation environments such as urban and bad urban areas.
IV. CONCLUSION
The issue of the parameter selection in the various branches
of the multi-antenna system and processing method determines
their effectiveness. A significant effect on these parameters are
the correlation properties of the received signals. In this paper,
the assessment of signal correlation properties for different
environmental conditions is presented. The obtained results
showed that depending on the receiver speed, the adaptive
selection of the delays in the different RAKE receiver branches
provide minimization of the correlation between the signals.
This mean that ACF properties play a large role in minimizing
intersymbol interference and, as a consequence, they
significantly affect the capacity of the entire system.
Particularly low levels of the signal correlation could be
obtained in complex propagation environments such as urban
and bad urban.
REFERENCES
[1]
[2]
I. Syed, Channel shortening equalizers for UWB RAKE receivers:
Design and performance analysis. Saarbrücken: VDM Verlag, 2009.
[3] C. Buchacher, A hybrid equalizer/RAKE receiver: Multipath
interference mitigation for HSDPA in large delay spread channels.
Saarbrücken, Germany: VDM Verlag, 2008.
[4] M. Wang, Y. Han, and W. Sheng, “A Bayesian approach to adaptive
RAKE receiver,” IEEE Access, pp. 1–7, 2017.
[5] C. Ziółkowski and J. M. Kelner, “Estimation of the reception angle
distribution based on the power delay spectrum or profile,” Int. J.
Antennas Propag., vol. 2015, p. e936406, Dec. 2015.
[6] K. I. Pedersen, P. E. Mogensen, and B. H. Fleury, “A stochastic model
of the temporal and azimuthal dispersion seen at the base station in
outdoor propagation environments,” IEEE Trans. Veh. Technol., vol. 49,
no. 2, pp. 437–447, Mar. 2000.
[7] K. I. Pedersen, P. E. Mogensen, and B. H. Fleury, “Power azimuth
spectrum in outdoor environments,” Electron. Lett., vol. 33, no. 18, pp.
1583–1584, Aug. 1997.
[8] C. Ziółkowski and J. M. Kelner, “Empirical models of the azimuthal
reception angle—Part I: Comparative analysis of empirical models for
different propagation environments,” Wirel. Pers. Commun., vol. 91, no.
2, pp. 771–791, Jul. 2016.
[9] C. Ziółkowski and J. M. Kelner, “Empirical models of the azimuthal
reception angle—Part II: Adaptation of the empirical models in
analytical and simulation studies,” Wirel. Pers. Commun., vol. 91, no. 3,
pp. 1285–1296, Dec. 2016.
[10] G. L. Stüber, Principles of mobile communication, 3rd ed. New York,
USA: Springer, 2011.
M. Singh, Study of DS-CDMA RAKE receiver in realistic mobile radio
environment: Case study. S.l.: VDM Verlag Dr. Müller, 2011.
Cezary Ziółkowski, Jan M. Kelner, and Leszek Nowosielski,
“Correlation properties of signal at mobile receiver for different propagation environments,”
in 2018 14th International Conference on Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering (TCSET),
Lviv - Slavske, Ukraine, 20-24.02.2018., pp. 1–4.
| 7cs.IT
|
Nominal C-Unification
Mauricio Ayala-Rincón1⋆ , Washington de Carvalho-Segundo1, Maribel
Fernández2 and Daniele Nantes-Sobrinho1
arXiv:1709.05384v1 [cs.PL] 15 Sep 2017
1
Depts. de Matemática e Ciência da Computação, Universidade de Brası́lia, Brazil
[email protected], [email protected], [email protected],
[email protected]
2
Department of Informatics, King’s College London, UK
Abstract. Nominal unification is an extension of first-order unification
that takes into account the α-equivalence relation generated by binding
operators, following the nominal approach. We propose a sound and complete procedure for nominal unification with commutative operators, or
nominal C-unification for short, which has been formalised in Coq. The
procedure transforms nominal C-unification problems into simpler (finite families) of fixpoint problems, whose solutions can be generated by
algebraic techniques on combinatorics of permutations.
1
Introduction
Unification, where the goal is to solve equations between first-order terms, is
a key notion in logic programming systems, type inference algorithms, protocol analysis tools, theorem provers, etc. Solutions to unification problems are
represented by substitutions that map variables (X, Y, . . . ) to terms.
When terms include binding operators, a more general notion of unification
is needed: unification modulo α-equivalence. In this paper, we follow the nominal
approach to the specification of binding operators [20,30,26], where the syntax of
terms includes, in addition to variables, also atoms (a, b, . . . ), which can be abstracted, and α-equivalence is axiomatised by means of a freshness relation a#t
and name-swappings (a b). For example, the first-order logic formula ∀a.a ≥ 0
can be written as a nominal term ∀([a]geq(a, 0)), using function symbols ∀ and
geq and an abstracted atom a. Nominal unification [30] is the problem of solving
equations between nominal terms modulo α-equivalence; it is a decidable problem and efficient nominal unification algorithms are available [11,9,24], that compute solutions consisting of freshness contexts (containing freshness constraints
of the form a#X) and substitutions.
In many applications, operators obey equational axioms. Nominal reasoning
and unification have been extended to deal with equational theories presented
by rewrite rules (see, e.g., [18,17,5]) or defined by equational axioms (see, e.g.,
[14,19]). The case of associative and commutative nominal theories was considered in [3], where a parametric {α, AC}-equivalence relation was formalised in
⋆
Work supported by the Brazilian agencies FAPDF (DE 193.001.369/2016), CAPES
(Proc. 88881.132034/2016-01, 2nd author) and CNPq (PQ 307009/2013, 1st author).
2
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
Coq. However, only equational deduction was considered (not unification). In
this paper, we study nominal C-unification.
Contributions: We present a nominal C-unification algorithm, based on a set
of simplification rules, which transforms a given nominal C-unification problem
h∆, Qi, where ∆ is a freshness context and Q a set of freshness constraints and
equations, respectively of the form a#? s and s ≈? t, into a finite set of triples of
the form h∇, σ, P i, consisting of a freshness context ∇, a substitution σ and a
set of fixpoint equations P , of the form π.X ≈? X. The simplifications are based
on the deduction rules for freshness and α-C-equivalence (denoted as ≈{α,C} ).
The role of fixpoint equations in nominal C-unification is tricky: while in standard nominal unification [30], solving a fixpoint equation of the form (a b).X ≈?
X reduces to checking whether the constraints a#X, b#X (a and b fresh in X)
are satisfied, and in this case the solution is the identity substitution, in nominal
C-unification, for ∗ and + commutative operators, one can have additional combinatory solutions of the form {X/a+b}, {X/(a+b)∗. . .∗(a+b)}, {X/f (a)+f (b)},
etc. We show that in general there is no finitary representation of solutions using
only freshness contexts and substitutions, hence a nominal C-unification problem
may have a potentially infinite set of independent most general unifiers (unlike
standard C-unification, which is well-known to be finitary).
We adapt the proof of NP-completeness of syntactic C-unification to show
that nominal C-unification is NP-complete as well.
The simplification rules were formalised to be sound and complete in Coq.
The formalisation and a full version of the present paper with all details of the
proofs are available at http://ayala.mat.unb.br/publications.html.
Related work: To generate the set of combinatorial solutions for fixpoint equations we can use an enumeration procedure given in [4], which is based on the
combinatorics of permutations. By combining the simplification and enumeration methods, we obtain a nominal C-unification procedure in two phases: a
simplification phase, described in this paper, which outputs a finite set of most
general solutions that may include fixpoint constraints, and a generation phase,
which eliminates the fixpoint constraints according to [4].
Several extensions of the nominal unification algorithm have been defined, in
addition to the equational extensions already mentioned.
An algorithm for nominal unification of higher-order expressions with recursive let was proposed in [23]; as for nominal C-unification, fixpoint equations are
obtained in the process. Using the techniques in [4], it is possible to proceed
further and generate the combinatorial solutions of fixpoint equations.
Recently, Aoto and Kikuchi [1] proposed a rule-based procedure for nominal
equivariant unication [13], an extension of nominal unification that is useful in
confluence analysis of nominal rewriting systems [2,16].
Furthermore, several formalisations and implementations of the nominal unification algorithm are available. For example, formalisations of its soundness and
completeness were developed by Urban et al [30,29], Ayala-Rincón et al [6], and
Kumar and Norrish [22] using, respectively, the proof assistants Isabelle/HOL,
PVS and HOL4. An implementation in Maude using term graphs [10] is also
Nominal C-Unification
3
available. Urban and Cheney used a nominal unification algorithm to develop
a Prolog-like language called α-Prolog [12]. Our formalisation of nominal Cunification is based on the formalisation of equivalence modulo {α, AC} presented in [3]. The representations of permutations and terms are similar, but
here we deal also with substitutions and unification rules, and prove soundness
and completeness of the unification algorithm.
Non nominal reasoning modulo equational theories has been subject of formalisations. For instance, in [25], Nipkow presented a set of Isabelle/HOL tactics
for reasoning modulo A, C and AC; Braibant and Pous [8] designed a plugin for
Coq, with an underlying AC-matching algorithm, that extends the system tactic
rewrite to deal with AC function symbols; also, Contejean [15] formalised in
Coq the correction of an AC-matching algorithm implemented in CiME.
Syntactic unification with commutative operators is an NP-complete problem
and its solutions can be finitely generated [21,28]. Since C-unification problems
are a particular case of nominal C-unification problems, our simplification algorithm, checked in Coq, is also a formalisation of the C-unification algorithm.
Organisation: Section 2 presents basic concepts and notations. Section 3 introduces the formalised equational and freshness inference rules for nominal
C-unification, and also discusses NP-completeness; Section 4 shows how single
fixpoint equations are solved giving rise to infinite independent solutions and
also we briefly explain how fixpoint solutions are combined in [4] in order to
produce solutions. Section 5 concludes and describes future work.
2
Background
Consider countable disjoint sets of variables X := {X, Y, Z, · · · } and atoms A :=
{a, b, c, · · · }. A permutation π is a bijection on A with a finite domain, where
the domain (i.e., the support ) of π is the set dom(π) := {a ∈ A | π · a 6= a}.
The inverse of π is denoted by π −1 . Permutations can be represented by lists of
swappings, which are pairs of different atoms (a b); hence a permutation π is a
finite list of the form (a1 b1 ) :: . . . :: (an bn ) :: nil, where nil denotes the identity
permutation; concatenation is denoted by ⊕ and, when no confusion may arise,
:: and nil are omitted. We follow Gabbay’s permutative convention: Atoms differ
on their names, so for atoms a and b the expression a 6= b is redundant. Also,
(a b) and (b a) represent the same swapping.
We will assume as in [3] countable sets of function symbols with different
equational properties such as associativity, commutativity, idempotence, etc.
Function symbols have superscripts that indicate their equational properties;
thus, fkC will denote the k th function symbol that is commutative and fj∅ the
j th function symbol without any equational property.
Nominal terms are generated by the following grammar:
s, t := hi | ā | [a]t | hs, ti | fkE t | π.X
hi denotes the unit (that is the empty tuple), ā denotes an atom term, [a]t
denotes an abstraction of the atom a over the term t, hs, ti denotes a pair,
fkE t the application of fkE to t and, π.X a moderated variable or suspension.
Suspensions of the form id.X will be represented just by X.
4
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
The set of variables occurring in a term t will be denoted as S
V ar(t). This
notation extends to a set S of terms in the natural way: V ar(S) = t∈S V ar(t).
As usual, | | will be used to denote the cardinality of sets as well as to denote
the size or number of symbols occurring in a given term.
Definition 1 (Permutation action). The action of a permutation on atoms
is defined as: nil · a := a; (b c) :: π · a := π · a; and, (b c) :: π · b := π · c. The action
of a permutation on terms is defined recursively as:
π · hi := hi
π · hu, vi := hπ · u, π · vi
π · fkE t
:= fkE (π · t)
′
π · a := π · a
π · ([a]t) := [π · a](π · t)
π · (π . X) := (π ′ ⊕ π) . X
Notice that according to the definition of the action of a permutation over
atoms, the composition of permutations π and π ′ , usually denoted as π ◦ π ′ ,
corresponds to the append π ′ ⊕ π. Also notice that π ′ ⊕ π · t = π · (π ′ · t). The
difference set between two permutations π and π ′ is the set of atoms where the
action of π and π ′ differs: ds(π, π ′ ) := {a ∈ A | π · a 6= π ′ · a}.
A substitution σ is a mapping from variables to terms such that its domain, dom(σ) := {X | X 6= Xσ}, is finite. For X ∈ dom(σ), Xσ is called
the image of X. Define the image of σ as im(σ) := {Xσ | X ∈ dom(σ)}. Let
dom(σ) = {X1 , · · · , Xn }, then σ can be represented as a set of bindings in the
form {X1 /t1 , · · · , Xn /tn }, where Xi σ = ti , for 1 ≤ i ≤ n.
Definition 2 (Substitution action). The action of a substitution σ on a term
t, denoted tσ, is defined recursively as follows:
aσ
:= a
(fkE t)σ := fkE tσ
hiσ
:= hi
hs, tiσ := hsσ, tσi
([a]t)σ := [a]tσ
(π.X)σ := π · Xσ
The following result can be proved by induction on the structure of terms.
Lemma 1 (Substitutions and Permutations Commute). (π ·t)σ = π ·(tσ)
The inference rules defining freshness and α-equivalence are given in Fig. 1
and 2. The symbols ∇ and ∆ are used to denote freshness contexts that are sets of
constraints of the form a#X, meaning that the atom a is fresh in X. The domain
of a freshness context dom(∆) is the set of atoms appearing in it; ∆|X denotes
the restriction of ∆ to the freshness constraints on X: {a#X | a#X ∈ ∆}. The
rules in Fig. 1 are used to check if an atom a is fresh in a nominal term t under
a freshness context ∇, also denoted as ∇ ⊢ a#t. The rules in Fig. 2 are used to
check if two nominal terms s and t are α-equivalent under some freshness context
∇, written as ∇ ⊢ s ≈α t. These rules use the inference system for freshness
constraints: specifically freshness constraints are used in rule (≈α [ab]).
Example 1. Let σ = {X/[a]a}. Verify that h(a b).X, f (e)iσ ≈α hX, f (e)iσ.
By dom(π)#X and ds(π, π ′ )#X we abbreviate the sets {a#X | a ∈ dom(π)}
and {a#X | a ∈ ds(π, π ′ )}, respectively.
Key properties of the nominal freshness and α-equivalence relations have
been extensively explored in previous works [3,6,29,30].
Nominal C-Unification
∇ ⊢ a # hi
(#hi)
∇ ⊢ a#t
∇ ⊢ a # [b]t
∇ ⊢ a#b
(# a[b])
(# atom)
∇ ⊢ a#t
∇ ⊢ a # fkE t
(π −1 · a#X) ∈ ∇
∇ ⊢ a # π.X
(# var)
5
(# app) ∇ ⊢ a # [a]t (# a[a])
∇ ⊢ a#s ∇ ⊢ a#t
∇ ⊢ a # hs, ti
(# pair)
Fig. 1. Rules for the freshness relation
∇ ⊢ hi ≈α hi
(≈α hi)
∇ ⊢ s ≈α t
∇ ⊢ [a]s ≈α [a]t
∇ ⊢ a ≈α a
(≈α [aa])
ds(π, π ′ )#X ⊆ ∇
′
∇ ⊢ π.X ≈α π .X
(≈α atom)
∇ ⊢ s ≈α t
∇ ⊢ fkE s ≈α fkE t
∇ ⊢ s ≈α (a b) · t ∇ ⊢ a # t
(≈α var)
∇ ⊢ [a]s ≈α [b]t
∇ ⊢ s0 ≈α t0 ∇ ⊢ s1 ≈α t1
∇ ⊢ hs0 , s1 i ≈α ht0 , t1 i
(≈α app)
(≈α [ab])
(≈α pair)
Fig. 2. Rules for the relation ≈α
2.1
The relation ≈{α,C} as an extension of ≈α
In [3], the relation ≈α was extended to deal with associative and commutative
theories. Here we will consider α-equivalence modulo commutativity, denoted as
≈{α,C} . This means that some function symbols in our syntax are commutative,
and therefore the rule for function application (≈α app) in Fig. 2 should be
replaced by the rules in Fig. 3.
∇ ⊢ s ≈{α,C} t
∇ ⊢ fkE s ≈{α,C} fkE t
, E 6= C or both s and t are not pairs (≈{α,C} app)
∇ ⊢ s0 ≈{α,C} ti , ∇ ⊢ s1 ≈{α,C} t(i+1) mod 2
∇ ⊢ fkC hs0 , s1 i ≈{α,C} fkC ht0 , t1 i
, i = 0, 1 (≈{α,C} C)
Fig. 3. Additional rules for {α, C}-equivalence
The following properties for ≈{α,C} were formalised as simple adaptations of
the formalisations given in [3] for ≈α .
Lemma 2 (Inversion). The inference rules of ≈{α,C} are invertible.
This means, for instance, that for rules (≈α [ab]) one has ∇ ⊢ [a]s ≈{α,C}
[b]t implies ∇ ⊢ s ≈{α,C} (a b) · t and ∇ ⊢ a # t; and for (≈{α,C} app), ∇ ⊢
fkC hs0 , s1 i ≈{α,C} fkC ht0 , t1 i implies ∇ ⊢ s0 ≈{α,C} t0 and ∇ ⊢ s1 ≈{α,C} t1 , or
∇ ⊢ s0 ≈{α,C} t1 and ∇ ⊢ s1 ≈{α,C} t0 .
Lemma 3 (Freshness preservation). If ∇ ⊢ a # s and ∇ ⊢ s ≈{α,C} t then
∇ ⊢ a # t.
Lemma 4 (Intermediate transitivity for ≈{α,C} with ≈α ). If ∇ ⊢ s ≈{α,C}
t and ∇ ⊢ t ≈α u then ∇ ⊢ s ≈{α,C} u.
Lemma 5 (Equivariance). ∇ ⊢ π · s ≈{α,C} π · t whenever ∇ ⊢ s ≈{α,C} t.
6
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
Lemma 6 (Equivalence).
⊢ ≈{α,C}
is an equivalence relation.
Remark 1. According to the grammar for nominal terms, function symbols have
no fixed arity: any function symbol can apply to any term. Despite this, in the
syntax of our Coq formalisation commutative symbols apply only to tuples.
3
A nominal C-unification algorithm
Inference rules are given that transform a nominal C-unification problem into
a finite family of problems that consist exclusively of fixpoint equations of the
form π.X ≈? X, together with a substitution and a set of freshness constraints.
Definition 3 (Unification problem). A unification problem is a pair h∇, P i,
where ∇ is a freshness context and P is a finite set of equations and freshness
constraints of the form s ≈? t and a#? s, respectively, where ≈? is symmetric, s
and t are terms and a is an atom. Nominal terms in the equations preserve the
syntactic restriction that commutative symbols are only applied to tuples.
Equations of the form π.X ≈? X are called fixpoint equations. Given h∇, P i,
by P≈ , P# , Pfp≈ and Pnfp≈ we will resp. denote the sets of equations, freshness
constraints, fixpoint equations and non fixpoint equations in the set P .
Example 2. Given the nominal unification problem P = h∅, {[a][b]X ≈? [b][a]X}i,
the standard unification algorithm [30] reduces it to h∅, {X ≈? (a b).X}i, which
gives the solution h{a#X, b#X}, idi. However, we will see that infinite independent solutions are feasible when there is at least a commutative operator.
We design a nominal C-unification algorithm using one set of transformation rules to deal with equations (Fig. 4) and another set of rules to deal with
freshness constraints and contexts (Fig. 5). These rules act over triples of the
form h∇, σ, P i, where σ is a substitution. The triple that will be associated by
default with a unification problem h∇, P i is h∇, id, P i. We will use calligraphic
uppercase letters (e.g., P, Q, R, etc) to denote triples.
Remark 2. Let ∇ and ∇′ be freshness contexts and σ and σ ′ be substitutions.
– ∇′ ⊢ ∇σ denotes that ∇′ ⊢ a # Xσ holds for each (a#X) ∈ ∇, and
– ∇ ⊢ σ ≈ σ ′ that ∇ ⊢ Xσ ≈{α,C} Xσ ′ for all X (in dom(σ) ∪ dom(σ ′ )).
Definition 4 (Solution for a triple or problem). A solution for a triple
P = h∆, δ, P i is a pair h∇, σi, where the following conditions are satisfied:
1. ∇ ⊢ ∆σ;
3. ∇ ⊢ sσ ≈{α,C} tσ if s ≈? t ∈ P ;
2. ∇ ⊢ a # tσ if a#? t ∈ P ; 4. there is a substitution λ such that ∇ ⊢ δλ ≈ σ.
A solution for a unification problem h∆, P i is a solution for the associated
triple h∆, id, P i. The solution set for a problem or triple P is denoted by UC (P).
Definition 5 (More general solution and complete set of solutions). For
h∇, σi and h∇′ , σ ′ i in UC (P), we say that h∇, σi is more general than h∇′ , σ ′ i,
denoted h∇, σi 4 h∇′ , σ ′ i, if there exists a substitution λ satisfying ∇′ ⊢ σλ ≈ σ ′
and ∇′ ⊢ ∇λ. A subset V of UC (P) is said to be a complete set of solutions of P
if for all h∇′ , σ ′ i ∈ UC (P), there exists h∇, σi in V such that h∇, σi 4 h∇′ , σ ′ i.
Nominal C-Unification
7
We will denote the set of variables occurring in the set P of a problem h∇, P i
or triple P = h∇, σ, P i as V ar(P ). We also will write V ar(P) to denote this set.
h∇, σ, P ⊎ {s ≈? s}i
h∇, σ, P i
(≈? refl)
h∇, σ, P ⊎ {hs1 , t1 i ≈? hs2 , t2 i}i
h∇, σ, P ∪ {s1 ≈? s2 , t1 ≈? t2 }i
(≈? pair)
h∇, σ, P ⊎ {fkE s ≈? fkE t}i
, if E 6= C (≈? app)
h∇, σ, P ∪ {s ≈? t}i
h∇, σ, P ⊎ {fkC s ≈? fkC t}i
where s = hs0 , s1 i and t = ht0 , t1 i
(≈? C)
,
v = hti , t(i+1) mod 2 i, i = 0, 1
h∇, σ, P ∪ {s ≈? v}i
h∇, σ, P ⊎ {[a]s ≈? [a]t}i
h∇, σ, P ∪ {s ≈? t}i
(≈? [aa])
h∇, σ, P ⊎ {[a]s ≈? [b]t}i
h∇, σ, P ∪ {s ≈? (a b) t, a#? t}i
(≈? [ab])
h∇, σ, P ⊎ {π.X ≈? t}i let σ ′ := σ{X/π −1 · t}
/ V ar(t) (≈? inst)
*
+ , if X ∈
S
{a#? Y σ ′ }
′
−1
∇, σ , P {X/π · t} ∪ Y ∈dom(σ ′ ),
a#Y ∈∇
h∇, σ, P ⊎ {π.X ≈? π ′ .X}i
h∇, σ, P ∪ {π ⊕ (π ′ )−1 .X ≈? X}i
, if π ′ 6= id (≈? inv)
Fig. 4. Reduction rules for equational problems
The unification algorithm proceeds by simplification. Derivation with rules
of Figs. 4 and 5 is respectively denoted by ⇒≈ and ⇒# . Thus, h∇, σ, P i ⇒≈
h∇, σ ′ , P ′ i means that the second triple is obtained from the first one by application of one rule. We will use the standard rewriting nomenclature, e.g., we will
say that P is a normal form or irreducible by ⇒≈ , denoted by ⇒≈ -nf, whenever
there is no Q such that P ⇒≈ Q; ⇒∗≈ and ⇒+
≈ denote respectively derivations
in zero or more and one or more applications of the rules in Fig. 4.
The only rule that can generate branches is (≈? C), which is an abbreviation
for two rules providing the different forms in which one can relate the arguments
s and t in an equation fkC s ≈? fkC t for a commutative function symbol (s, t are
tuples, by the syntactic restriction in Definition 3): either hs0 , s1 i ≈? ht0 , t1 i or
hs0 , s1 i ≈? ht1 , t0 i.
The syntactic restriction on arguments of commutative symbols being only
tuples, is not crucial since any equation of the form fkC π.X ≈? t can be translated into an equation of form fkC hπ.X1 , π.X2 i ≈? t, where X1 and X2 are new
variables and ∇ is extended to ∇′ in such a way that both X1 and X2 inherit
all freshness constraints of X in ∇: ∇′ = ∇ ∪ {a#Xi | i = 1, 2, and a#X ∈ ∇}.
In the rule (≈? inst) the inclusion of new constraints in the problem, given in
[
{a#? Y σ′ } is necessary to guarantee that the new substitution σ ′ is
′
Y ∈dom(σ ),
compatible with the freshness context ∇.
a#Y ∈∇
Example 3. Let ∗3 be a commutative function symbol. Below, we show how the
problem P = h∅, {[e](a b).X ∗ Y ≈? [f ](a c)(c d).X ∗ Y }i reduces (via rules in
3
Infix notation is adopted for commutative symbols: s ∗ t abbreviates ∗hs, ti.
8
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
h∇, σ, P ⊎ {a#? hi}i
h∇, σ, P i
h∇, σ, P ⊎ {a#? f t}i
h∇, σ, P ∪ {a#? t}i
h∇, σ, P ⊎ {a#? [b]t}i
h∇, σ, P ∪ {a#? t}i
(#? hi)
(#? app)
(#? a[b])
h∇, σ, P ⊎ {a#? b̄}i
h∇, σ, P i
(#? ab̄)
h∇, σ, P ⊎ {a#? [a]t}i
h∇, σ, P i
(#? a[a])
h∇, σ, P ⊎ {a#? π.X}i
h{(π −1 · a)#X} ∪ ∇, σ, P i
h∇, σ, P ⊎ {a#? hs, ti}i
h∇, σ, P ∪ {a#? s, a#? t}i
(#? var)
(#? pair)
Fig. 5. Reduction rules for freshness problems
Figs. 4 and 5). Application of rule (≈? C) gives two branches which reduce
into two fixpoint problems: Q1 and Q2 . Highlighted terms show where the rules
are applied. For brevity, let π1 = (a c)(c d)(e f ), π2 = (a b)(e f )(c d)(a c), π3 =
(a c)(c d)(e f )(a b) and, σ = {X/(e f )(a b).Y }.
h∅, id, { [e](a b).X ∗ Y ≈? [f ](a c)(c d).X ∗ Y }i
⇒(≈? [ab])
h∅, id, { (a b).X ∗ Y ≈? π1 .X ∗ (e f ).Y , e#? (a c)(c d).X ∗ Y }i ⇒(≈? C)
branch 1:
h∅, id, { (a b).X ≈? π1 .X , Y ≈? (e f ).Y , e#? (a c)(c d).X ∗ Y }i
⇒(≈? inv)(2×) h∅, id, {(a b)[π1 ]−1 .X ≈? X, [(e f )]−1 .Y ≈? Y, e#? (a c)(c d).X ∗ Y }i
⇒ (#? app),
h∅, id, {π2 .X ≈? X, (e f ).Y ≈? Y, e#? (a c)(c d).X , e#? Y }i
(#? pair)
⇒(#? var)(2×) h{e#X, e#Y }, id, {π2 .X ≈? X, (e f ).Y ≈? Y }i = Q1
branch 2:
h∅, id, { (a b).X ≈? (e f ).Y , Y ≈? π1 .X, e#? (a c)(c d).X ∗ Y }i
⇒(≈? inst)
h∅, σ, { Y ≈? (a c)(c d)(e f )(e f )[(a b)]−1 .Y , e#? π1 [(a b)]−1 .Y ∗ Y }i
⇒(≈? inv)
h∅, σ, {[(a c)(c d)(a b)]−1 .Y ≈? Y, e#? π3 .Y ∗ Y }i
⇒ (#? app),
h∅, σ, {(a b)(c d)(a c).Y ≈? Y, e#? π3 .Y , e#? Y }i
(#? pair)
⇒(#? var)(2×) h{e#Y, f #Y }, σ, {(a b)(c d)(a c).Y ≈? Y }i = Q2
Definition 6 (Set of ⇒≈ and ⇒# -normal forms). We denote by P⇒≈ (resp.
P⇒# ) the set of normal forms of P with respect to ⇒≈ (resp. ⇒# ).
Definition 7 (Fail and success for ⇒≈ ). Let P be a triple, such that the
rules in Fig. 4 give rise to a normal form h∇, σ, P i. The rules in Fig. 4 are
said to fail if P contains non fixpoint equations. Otherwise h∇, σ, P i is called
a successful triple regarding ⇒≈ (i.e., in a successful triple, P consists only of
fixpoint equations and, possibly, freshness constraints).
The rules in Fig. 5 will only be applied to successful triples regarding ⇒≈ .
Definition 8 (Fail and success for ⇒# ). Let Q = h∇, σ, Qi be a successful
triple regarding ⇒≈ , and Q′ = h∇′ , σ, Q′ i its normal form via rules in Fig. 5,
that is Q ⇒∗# Q′ and Q′ is in Q⇒# . If Q′ contains freshness constraints it is
said that ⇒# fails for Q; otherwise, Q′ will be called a successful triple for ⇒# .
Nominal C-Unification
9
Remark 3. Since in a successful triple regarding ⇒≈ , Q, one has only fixpoint
equations and ⇒# acts only over freshness constraints, Q′ in the definition above
contains only fixpoint equations and freshness constraints. Also, by a simple case
analysis on t one can check that any triple with freshness constraints a#? t is
reducible by ⇒# , except when t ≡ ā. Hence the freshness constraints in Q′ would
be only of the form a#? ā.
The relation ⇒≈ , starts from a triple with the identity substitution and
always maintains a triple h∇, σ ′ , P ′ i in which the substitution σ ′ does not affect
the current problem P ′ . The same happens for ⇒# since the substitution does
not change with this relation. This motivates the next definition and lemma.
Definition 9 (Valid triple). P = h∇, σ, P i is valid if im(σ) ∩ dom(σ) = ∅ and
dom(σ) ∩ V ar(P ) = ∅.
Remark 4. A substitution σ in a valid triple P is idempotent, that is, σσ = σ.
Lemma 7 is proved by case analysis on the rules used by ⇒≈ and ⇒# .
Lemma 7 (Preservation of valid triples). If P = h∇, σ, P i is valid and
P ⇒≈ ∪ ⇒# P ′ = h∇′ , σ ′ , P ′ i, then P ′ is also valid.
From now on, we consider only valid triples.
Lemma 8 (Termination of ⇒≈ and ⇒# ). There is no infinite chain of reductions ⇒≈ (or ⇒# ) starting from an arbitrary triple P = h∇, σ, P i.
Proof. – The proof for ⇒≈ is by well-founded induction on P using the measure
kPk
k, |Pnfp≈ |i with a lexicographic ordering, where kP k =
P = h|V ar(P≈ )|, kPP
s≈? t ∈ P≈ |s| + |t| +
a#? u∈P# |u|. Note that this measure decreases after
each step h∇, σ, P i ⇒≈ h∇, σ ′ , P ′ i: for (≈? inst), |V ar(P≈ )| > |V ar(P≈′ )|; for
(≈? refl), (≈? pair), (≈? app), (≈? [aa]), (≈? [ab]) and (≈? C), |V ar(P≈ )| ≥
|V ar(P≈′ )|, but kP k > kP ′ k; and, for (≈? inv), both |V ar(P≈ )| = |V ar(P ′ ≈)|
′
|.
and kP k = kP ′ k, but |Pnfp≈ | > |Pnfp
≈
– The proof for ⇒# is by induction on P using as measure kP# k. It can be
checked that this measure decreases after each step: h∇, σ, P i ⇒# h∇, σ ′ , P ′ i.
To solve a unification problem, h∇, P i, one builds the derivation tree for
⇒≈ , labelling the root node with h∇, id, P i. This tree has leaves labelled with
⇒≈ -nf’s that are either failing or successful triples. Then, the tree is extended
by building ⇒# -derivations starting from all successful leaves. The extended
tree will include failing leaves and successful leaves. The successful leaves will be
labelled by triples P ′ in which the problem P ′ consists only of fixpoint equations.
Since ⇒≈ and ⇒# are both terminating (Lemma 8), the process described above
must be also terminating.
Definition 10 (Derivation tree for h∇, P i). A derivation tree for the unification problem h∇, P i, denoted as Th∇,P i , is a tree with root label P = h∇, id, P i
built in two stages:
10
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
– Initially, a tree is built, whose branches end in leaf nodes labelled with the
triples in P⇒≈ . The labels in each path from the root to a leaf correspond to
a ⇒≈ -derivation.
– Further, for each leaf labelled with a successful triple Q in P⇒≈ , the tree is
extended with a path to a new leaf that is labelled with a Q̄ ∈ Q⇒# . The labels
in the extended path from the node with label Q to the new leaf correspond to
a ⇒# -derivation.
Remark 5. For h∇, P i, all labels in the nodes of Th∇,P i are valid by Lemma 7.
The next lemma is proved by case analysis on elements of P⇒≈ and P⇒# .
Lemma 9 (Characterisation of leaves of Th∇,P i ). Let h∇, P i be a unification problem. If P ′ = h∇′ , σ ′ , P ′ i is the label of a leaf in Th∇,P i , then P ′ can be
partitioned as follows: P ′ = P ′′ ∪P⊥ , where P ′′ is the set of all fixpoint equations
in P ′ and P⊥ = P ′ − P ′′ . If P⊥ 6= ∅ then UC (P ′ ) = ∅.
The next definition is motivated by the previous characterisation of the labels
of leaves in derivation trees.
Definition 11 (Successful leaves). Let h∇, P i be a unification problem. A
leaf in Th∇,P i that is labelled with a triple of the form Q = h∇′ , σ ′ , Qi, where Q
consists only of fixpoint equations, is called a successful leaf of Th∇,P i . In this
case Q is called a successful triple of Th∇,P i . The sets of successful leaves and
triples of Th∇,P i are denoted respectively by SL(Th∇,P i ) and ST (Th∇,P i ).
The soundness theorem states that successful leaves of Th∇,P i produce correct
solutions. The proof is by induction on the number of steps of ⇒≈ and ⇒# and
uses Lemma 9 and auxiliary results on the preservation of solutions by ⇒≈ and
⇒# . Proving preservation of solutions for rules (≈? [ab]) and (≈? inst) is not
straightforward and uses Lemmas 1 2, 3 and 5 to check that the four conditions
of Def. 4 are valid before, if one supposes their validity after the rule application.
Theorem 1 (Soundness of Th∇,P i ). Th∇,P i is correct, i.e., if P ′ = h∇′ , σ, P ′ i
is the label of a leaf in Th∇,P i , then 1. UC (P ′ ) ⊆ UC (h∇, id, P i), and 2. if P ′
contains non fixpoint equations or freshness constraints then UC (P ′ ) = ∅.
The completeness theorem guarantees that the set of successful triples provides a complete set of solutions. Its proof uses case analysis on the rules of the
relations ⇒≈ and ⇒# by an argumentation similar to the one used for Theorem
1. For ⇒# one has indeed equivalence: P ⇒# P ′ , implies UC (P) = UC (P ′ ). The
same is true for all rules of the relation ⇒≈ except the branching rule (≈? C),
for which it is necessary to prove that all solutions of a triple reduced by (≈? C)
must belong to the set of solutions of one of its sibling triples.
Theorem 2 (Completeness of Th∇,P i ). Let h∇, P i and
S Th∇,P i be a unification
problem and its derivation tree. Then UC (h∇, id, P i) = Q∈ST (Th∇,P i ) UC (Q).
Nominal C-Unification
11
Corollary 1 (Generality of successful triples). Let P = h∇, P i be a unification problem and h∆′ , σ ′ i ∈ UC (P). Then there exists a successful triple
Q ∈ ST (Th∇,P i ) where Q = h∆, σ, Qi such that h∆′ , σ ′ i ∈ UC (Q), and hence,
∆′ ⊢ ∆σ ′ and there exists λ such that ∆′ ⊢ σλ ≈ σ ′ .
S
Proof. By Theorem 2, UC (P) = P ′ ∈ST (Th∇,P i ) UC (P ′ ). Then there exists Q ∈
ST (Th∇,P i ) such that h∆′ , σ ′ i ∈ UC (Q). Suppose Q = h∆, σ, Qi. Then by the
first and fourth conditions of the definition of solution (Def. 4) we have that
∆′ ⊢ ∆σ ′ and there exists λ such that ∆′ ⊢ σλ ≈ σ ′ .
Remark 6. The nominal C-unification problem is to decide, for a given P, if
UC (P) is non empty; that is, whether P has nominal C-unifiers. To prove that
this problem is in NP, a non-deterministic procedure using the reduction rules in
the same order as in Definition 10 is designed. In this procedure, whenever rule
(≈? C) applies, only one of the two possible branches is guessed. In this manner,
if the derivation tree has a successful leaf, this procedure will guess a path to
the successful leaf, answering positively to the decision problem. According to
the measures used in the proof of termination Lemma 8, reduction with both
the relations ⇒≈ and ⇒# is polynomially bound, which implies that this nondeterministic procedure is polynomially bound.
To prove NP-completeness, one can polynomially reduce the well-known NPcomplete positive 1-in-3-SAT problem into nominal C-unification, as done in [7]
for the C-unification problem. An instance of the positive 1-in-3-SAT problem
consists of a set of clauses C = {Ci |1 ≤ i ≤ n}, where each Ci is a disjunction of
three propositional variables, say Ci = pi ∨ qi ∨ ri . A solution of C is a valuation
whit exactly one variable true in each clause. The proposed reduction of C into
a nominal C-unification problem would require just a commutative function
symbol, say ⊕, two atoms, say a and b, a variable for each clause Ci , say Yi ,
and a variable for each propositional variable p in C, say Xp . Instantiating Xp
as a or b, would be interpreted as evaluating p as true or false, respectively.
Each clause Ci = pi ∨ qi ∨ ri in C is translated into an equation Ei of the form
((Xpi ⊕ Xqi ) ⊕ Xri ) ⊕ Yi ≈? ((b ⊕ b) ⊕ a) ⊕ ((b ⊕ a) ⊕ b). The nominal C-unification
problem for C is given by PC = h∅, {Ei |1 ≤ i ≤ n}i. Simplifying PC would not
introduce freshness constraints since the problem does not include abstractions.
Thus, to conclude it is only necessary to check that h∅, σi is a solution for PC if
and only if σ instantiates exactly one of the variables Xpi , Xqi and Xri in each
equation with a and the other two with b, which means that C has a solution.
4
Generation of solutions for successful leaves of Th∇,P i
To build solutions for a successful leaf P = h∇, σ, P i in the derivation tree
of a given unification problem, we will select and combine solutions generated
for fixpoint equations π.X ≈? X, for each X ∈ V ar(P ). We introduce the
notion of pseudo-cycle of a permutation, in order to provide precise conditions
to build terms t by combining the atoms in dom(π), such that π · t ≈{α,C} t. For
convenience, we use the algebraic cycle representation of permutations. Thus,
12
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
instead of sequences of swappings, permutations in nominal terms will be read
as products of disjoint cycles [27].
Example 4. (Continuing Example 3) The permutations (a b)::(e f )::(c d)::(a c)::
nil and (a b) :: (c d) :: (a c) :: nil are respectively represented as the product of
permutation cycles (a b c d)(e f ) and (a b c d)(e)(f ).
Permutation cycles of length one are omitted. In general the cyclic representation of a permutation consists of the product of all its cycles.
Let π be a permutation with dom(π) = n. Given a ∈ dom(π) the elements of
the sequence a, π(a), π 2 (a), . . . cannot be all distinct. Taking the first k ≤ n, such
that π k (a) = a, we have the k-cycle (a π(a) . . . π k−1 (a)), where π j+1 (a) is the
successor of π j (a). For the 4-cycle in the permutation (a b c d) (e f ), the 4-cycles
generated by a, b, c and d are the same: (a b c d) = (b c d a) = (c d a b) = (d a b c).
Def. 12 establishes the notion of a pseudo-cycle w.r.t. a k-cycle κ. Intuitively,
given a k-cycle κ and a commutative function symbol ∗, a pseudo-cycle w.r.t κ,
(A0 . . . Al ), is a cycle whose elements are either atom terms built from the atoms
in κ or terms of the form A′i ∗ A′j , for A′i , A′j elements of a pseudo-cycle w.r.t κ.
Definition 12 (Pseudo-cycle). Let κ = (a0 a1 . . . ak−1 ) be a k-cycle of a
permutation π. A pseudo-cycle w.r.t. κ is inductively defined as follows:
1. κ = (a0 · · · ak−1 ) is a pseudo-cycle w.r.t. κ, called trivial pseudo-cycle of κ.
2. κ′ = (A0 ... Ak′ −1 ) is a pseudo-cycle w.r.t. κ, if the following conditions are
simultaneously satisfied:
(a) each element of κ′ is of the form Bi ∗ Bj , where ∗ is a commutative
function symbol in the signature, and Bi , Bj are different elements of
κ′′ , a pseudo-cycle w.r.t. κ. κ′ will be called a first-instance pseudo-cycle
of κ′′ w.r.t. κ.
(b) Ai 6≈α,C Aj for i 6= j, 0 ≤ i, j ≤ k ′ − 1;
(c) for each 0 ≤ i < k ′ − 1, κ · Ai ≈{α,C} A(i+1)mod k′ .
The length of the pseudo-cycle κ, denoted by |κ|, consists of the number of
elements in κ. A pseudo-cycle of length one will be called unitary.
Example 5. A (Continuing Example 2) Considering ∗ a commutative function
symbol in the signature, the unitary pseudo-cycles of κ = (a b) generate infinite independent solutions for the leaf h∅, id, {X ≈? (a b).X}i. Examples of
these solutions are: h∅, {X/a∗b}i, h∅, {X/(a∗a)∗(b∗b)}i, h∅, {X/(a∗b)∗(a∗b)}i,
h∅, {X/((a ∗ a) ∗ a) ∗ ((b ∗ b) ∗ b)}i, h∅, {X/(a ∗ (a ∗ a)) ∗ (b ∗ (b ∗ b))}i, etc.
B (Continuing Examples 3 and 4) In Q1 and Q2 we have the occurrences of
the 4-cycle κ = (a b c d). Suppose ∗, ⊕, + are commutative operators in the
signature. The following are pseudo-cycles w.r.t. κ: κ = (a b c d); κ1 =
((a ∗ b) (b ∗ c) (c ∗ d) (d ∗ a)); κ2 = ((a ⊕ c) (b ⊕ d)); κ11 = (((a ∗ b) + (b ∗ c)) ((b ∗
c)+(c∗d))((c∗d)+(d∗a)) ((d∗a)+(a∗b))); κ12 = (((a∗b)∗(c∗d)) ((b∗c)∗(d∗a)));
κ21 = (((a ⊕ c) ∗ (b ⊕ d))); κ121 = (((a ∗ b) ∗ (c ∗ d)) ∗ ((b ∗ c) ∗ (d ∗ a))). κ1 and
κ2 are first-instance pseudo-cycles of κ, and κ11 and κ12 of κ1 and κ21 of κ2 .
Nominal C-Unification
13
Notice that, |κ| = |κ1 | = |κ11 | = 4, |κ12 | = 2, and |κ21 | = |κ121 | = 1. Also, κ1
corresponds to ((a ∗ d) (b ∗ a) (c ∗ b) (d ∗ c)), a first-instance pseudo-cycle of κ.
Finally, observe that for the elements of the unitary pseudo-cycles κ21 and
κ121 , say s = (a ⊕ c) ∗ (b ⊕ d) and t = ((a ∗ b) ∗ (c ∗ d)) ∗ ((b ∗ c) ∗ (d ∗ a)), {X/s}
and {X/t} (resp. {Y /s} and {Y /t}) are solutions of the fixpoint equation
(a b c d)(e f ).X ≈? X (resp. (a b c d).Y ≈? Y ).
Let κ be a pseudo-cycle. Notice that only item 2 of Def. 12 may build a
first-instance pseudo-cycle κ′ w.r.t. κ with fewer elements. If |κ′ | < |κ| then,
due algebraic properties of cycles and commutativity of the operator applied
(∗), one must have that |κ′ | = |κ|/2. Thus, unitary pseudo-cycles can only be
generated from cycles of length a power of two. This is the intuition behind the
next theorem, proved by induction on the size of the cycle κ.
Theorem 3. A pseudo-cycle κ generates unitary pseudo-cycles iff |κ| is a power
of two.
Notice that, according item 2.c of Def. 12, if κ′ = (A0 . . . Ak′ −1 ) is a pseudocycle w.r.t. π then π · Ak′ −1 ≈{α,C} A0 ; particularly, if k ′ = 1 then π · A0 ≈{α,C}
A0 . Below, given P = h∅, {π.X ≈? X}i a fixpoint equational problem, we call
a combinatory solution of P, a substitution {X/t}, such that π · t ≈C t, and t
contains only atoms from π and commutative function symbols, built as unary
pseudo-cycles w.r.t. κ a cycle in π.
The next theorem is proved by contradiction, supposing that κ has an odd
factor and using Theorem 3.
Theorem 4. Let P = h∅, {π.X ≈? X}i be a fixpoint problem. P has a combinatory solution iff there exists a unitary pseudo-cycle κ w.r.t. π.
Remark 7. Since one can generate infinitely many unitary pseudo-cycles from a
given 2n -cycle κ in π, n ∈ N, there exist infinite independent solutions for the
fixpoint problem h∅, {π.X ≈? X}i.
General solutions for fixpoint problems. To compute the set of solutions for a
fixpoint equation, we use a method described in [4], which is based on the computation of unitary extended pseudo-cycles (epc). We refer to [4] for the definition
of extended pseudo-cycles and an algorithm to enumerate all the solutions of a
successful leaf in the derivation tree.
Pseudo-cycles are built just from atom terms in dom(π) and commutative
function symbols, while epc’s consider all nominal syntactic elements including
new variables, and also non commutative function symbols. The soundness and
completeness of the generator of solutions described in [4] relies on the properties
of pseudo-cycles described above, in particular the fact that only unitary pseudocycles generate solutions.
Example 6. A (Continuing Example 5 A) General solutions for the fixpoint
problem h∅, {(a b).X ≈? X}i include not only those generated by pseudocycles, but also any other generated by unitary epc’s from (a b), which include other syntactic elements to the pseudo-cycle construction; for instance:
14
M. Ayala-Rincón, W. de Carvalho, M. Fernández, D. Nantes-Sobrinho
h∅, {X/h a∗h b}i, h{a, b#Y, {X/(ha, Y i∗ha, Y i)⊕(hb, Y i∗hb, Y i)}i, h∅, {X/([i]a∗
[i]b) ⊕ ([i]a∗ [i]b)}i, h{a, b#Z}, {X/(hZ, ai ∗ (a ∗ a)) ⊕ (hZ, bi ∗ (b ∗ b))}i and
h∅, {X/(([b]a ∗ [b]a) ∗ b) ⊕ (([a]b ∗ [a]b) ∗ a)}i.
B (Continuing Example 5 B) Notice that constraints e#X and e#Y in Q1 =
h{e#X, e#Y }, id, {(a b c d)(e f ).X ≈? X, (e f ).Y ≈? Y }i avoid any combinatory solution for atoms in (e f ), but there are unitary epc’s w.r.t (a b c d)
that give solutions; for instance, epc’s s1 = (a ⊕ c) ∗ (b ⊕ d), s2 = (h a ⊕
h c) ∗ (h b ⊕ h d) and s3 = ([i]a ⊕ [i]c) ∗ ([i]b ⊕ [i]d), generate solutions of the
form h{e, f #X, e, f #Y }, {X/si}i, i = 1, 2, 3; the epc v = (h ha, Zi⊕h hc, Zi)∗
(h hb, Zi ⊕ h hd, Zi) the solution h{e, f #X, e, f #Y, a, b, c, d, e, f #Z}, {X/v}i,
etc.
5
Conclusions and future work
A Coq formalisation of a sound and complete nominal C-unification algorithm
was obtained by combining ⇒≈ - and ⇒# -reduction. The algorithm builds finite
derivation trees such that the leaves provide a complete set of most general
unifiers consisting of freshness contexts, substitutions and fixpoint equations. We
have also introduced the notion of pseudo-cycle to eliminate fixpoint equations
by generating their possibly infinite set of solutions. The generator is based
on the analysis of permutation cycles, followed by a brute-force enumeration
procedure. An implementantion of the algorithm, as well as its extension to deal
with different equational theories is left as future work.
References
1. T. Aoto and K. Kikuchi. A Rule-Based Procedure for Equivariant Nominal Unification. In Pre-proc. of Higher-Order Rewriting (HOR), pages 1–5, 2016.
2. T. Aoto and K. Kikuchi. Nominal Confluence Tool. In Proc. of the 8th Int.
Joint Conf.: Automated Reasoning (IJCAR), volume 9706 of LNCS, pages 173–
182. Springer, 2016.
3. M. Ayala-Rincón, W. Carvalho-Segundo, M. Fernández, and D. Nantes-Sobrinho.
A Formalisation of Nominal Equivalence with Associative-Commutative Function
Symbols. ENTCS, 332:21–38, 2017.
4. M. Ayala-Rincón, W. Carvalho-Segundo, M. Fernández, and D. Nantes-Sobrinho.
On Solving Nominal Fixpoint Equations. In Proc. of the 11th Int. Symp. on Frontiers of Combining Systems (FroCoS), volume 10483 of LNCS, pages 209–226.
Springer, 2017.
5. M. Ayala-Rincón, M. Fernández, and D. Nantes-Sobrinho. Nominal Narrowing. In
Proc. of the 1st Int. Conf. on Formal Structures for Computation and Deduction
(FSCD), volume 52 of LIPIcs, pages 11:1–11:17, 2016.
6. M. Ayala-Rincón, M. Fernández, and A. C. Rocha-oliveira. Completeness in PVS
of a Nominal Unification Algorithm. ENTCS, 323:57–74, 2016.
7. F. Baader and T. Nipkow. Term Rewriting and All That. Cambridge UP, 1998.
8. T. Braibant and D. Pous. Tactics for Reasoning Modulo AC in Coq. In In Proc.
of the 1st. Int. Conf. on Certified Programs and Proofs (CPP), volume 7086 of
LNCS, pages 167–182. Springer, 2011.
9. C. F. Calvès. Complexity and implementation of nominal algorithms. PhD Thesis,
King’s College London, 2010.
Nominal C-Unification
15
10. C. F. Calvès and M. Fernández. Implementing Nominal Unification. ENTCS,
176(1):25–37, 2007.
11. C. F. Calvès and M. Fernández. The First-order Nominal Link. In Proc. of the
20th Int. Symp. Logic-based Program Synthesis and Transformation (LOPSTR),
volume 6564 of LNCS, pages 234–248. Springer, 2011.
12. J. Cheney. αProlog Users Guide & Language Reference Version 0.3 DRAFT, 2003.
13. J. Cheney. Equivariant unification. J. of Autom. Reasoning, 45(3):267–300, 2010.
14. R. A. Clouston and A. M. Pitts. Nominal Equational Logic. ENTCS, 172:223–257,
2007.
15. E. Contejean. A Certified AC Matching Algorithm. In Proc. of the 15th Int. Conf.
on Rewriting Techniques and Applications, (RTA), volume 3091 of LNCS, pages
70–84. Springer, 2004.
16. M. Fernández and M. J. Gabbay. Nominal Rewriting. Information and Computation, 205(6):917–965, 2007.
17. M. Fernández and M. J. Gabbay. Closed nominal rewriting and efficiently computable nominal algebra equality. In Proc. of the 5th Int. Work. on Logical Frameworks and Meta-languages: Theory and Practice (LFMTP), volume 34 of EPTCS,
pages 37–51, 2010.
18. M. Fernández, M. J. Gabbay, and I. Mackie. Nominal Rewriting Systems. In
Proc. of the 6th Int. Conf. on Principles and Practice of Declarative Programming
(PPDP), pages 108–119. ACM Press, 2004.
19. M. J. Gabbay and A. Mathijssen. Nominal (Universal) Algebra: Equational Logic
with Names and Binding. J. of Logic and Computation, 19(6):1455–1508, 2009.
20. M. J. Gabbay and A. M. Pitts. A New Approach to Abstract Syntax with Variable
Binding. Formal Aspects of Computing, 13(3-5):341–363, 2002.
21. D. Kapur and P. Narendran. Matching, Unification and Complexity. SIGSAM
Bulletin, 21(4):6–9, 1987.
22. R. Kumar and M. Norrish. (Nominal) Unification by Recursive Descent with
Triangular Substitutions. In Proc. of Interactive Theorem Proving, 1st Int. Conf.
(ITP), volume 6172 of LNCS, pages 51–66. Springer, 2010.
23. T. Kutsia, J. Levy, M. Schmidt-Schauß, and M. Villaret. Nominal Unification of
Higher Order Expressions with Recursive Let. In Proc. of the 26th Int. Sym. on
Logic-Based Program Synthesis and Transformation (LOPSTR), volume 10184 of
LNCS, pages 328–344. Springer, 2016.
24. J. Levy and M. Villaret. An Efficient Nominal Unification Algorithm. In Proc. of
the 21st Int. Conf. on Rewriting Techniques and Applications (RTA), volume 6 of
LIPIcs, pages 209–226, 2010.
25. T. Nipkow. Equational Reasoning in Isabelle. Science of Computer Programming,
12(2):123–149, 1989.
26. A. M. Pitts. Nominal Sets: Names and Symmetry in Computer Science. Cambridge
UP, 2013.
27. Sagan, B. E. The Symmetric Group: Representations, Combinatorial Algorithms,
and Symmetric Functions. Springer, 2nd edition, 2001.
28. J. H. Siekmann. Unification of Commutative Terms. In Proc. of the Int. Symposium on Symbolic and Algebraic Manipulation, volume 72 of LNCS, pages 22–29.
Springer, 1979.
29. C. Urban. Nominal Unification Revisited. In Proc. of the 24th Int. Work. on
Unification (UNIF), volume 42 of EPTCS, pages 1–11, 2010.
30. C. Urban, A. M. Pitts, and M. J. Gabbay. Nominal Unification. Theoretical
Computer Science, 323(1-3):473–497, 2004.
| 6cs.PL
|
www.nature.com/scientificreports
OPEN
Three representations of the Ising
model
Joost Kruis1 & Gunter Maris1,2
received: 21 June 2016
accepted: 07 September 2016
Published: 04 October 2016
Statistical models that analyse (pairwise) relations between variables encompass assumptions about
the underlying mechanism that generated the associations in the observed data. In the present paper
we demonstrate that three Ising model representations exist that, although each proposes a distinct
theoretical explanation for the observed associations, are mathematically equivalent. This equivalence
allows the researcher to interpret the results of one model in three different ways. We illustrate the
ramifications of this by discussing concepts that are conceived as problematic in their traditional
explanation, yet when interpreted in the context of another explanation make immediate sense.
Scientific advances can be achieved by two types of theories: those that simply seek to identify correlations
between observable events without regard to linking mechanisms; and those that specify the mechanisms governing the relations between observable events (Bandura, p. 21).1.
Examining the structure of observed associations between measured variables is an integral part in many
branches of science. At face value, associations (or their quantification in the form of correlations) inform about
a possible relation between two variables, yet contain no information about the nature and directions of these
relations. Making causal inferences from associations requires the specification of a mechanism that explains the
emergence of the associations2,3. By constructing an explanatory model to account for associations in the data,
that has testable consequences at the level of the joint distribution of variables, it is possible to test the adequacy of
the model against the data. When the model is deemed sufficiently adequate with respect to the data, this is often
perceived as justification for the proposed causal interpretation4.
We can discern (at least) three general frameworks, each representing a different mechanism to explain the
emergence of associations between variables, with their own collection of corresponding explanatory models.
These frameworks, and their corresponding statistical models, all originate from different disciplines and have
received considerable attention in diverse fields such as, physics, mathematics, statistical mechanics, causality,
biology, epidemiology, and social sciences. Although both authors originate from psychology, and primarily
illustrate their findings with examples from this field, the frameworks and models discussed in this paper clearly
transcend the domain of psychology, and as such have a multidisciplinary relevance. In the current paper we
refer to these frameworks as, respectively, the common cause-, reciprocal affect-, and common effect framework.
The common cause framework explains the observed associations through a latent (unobserved) variable acting as a common cause with respect to the manifest (observed) variables5. Causal models that propose a common cause mechanism as generating the associations between manifest variables, are also known as reflective
models6,7; the manifest variables are indicators of the latent variable and reflect its current state. In the statistical
literature, models in this framework are therefore often referred to as latent variable models. Latent variable
models have proven to be extremely successful at fitting observed multivariate distributions, at the same time
their theoretical and philosophical underpinning remains problematic. Latent variables are both a powerful and
controversial concept, in psychology for example, the idea of psychological constructs as intelligence8,9 and personality10 being latent variables has been the subject of many intense debate. In particular about the question
whether one should take a realist interpretation of latent variables, that is the latent variable signifying a real but
hidden entity, to justify the use of latent variable analysis11,12. An important reason for this is that a latent cause is
never observed, and similar to physics around the turn of the 20th century, there was need for…
Popper, p. 21113. …an epistemological programme: to rid the theory of ‘unobservables’, that is, of magnitudes
inaccessible to experimental observation; to rid it, one might say, of metaphysical elements.
1
University of Amsterdam, Department of Psychology, Amsterdam, The Netherlands. 2Cito, Psychometric Research
Center, Arnhem, The Netherlands. Correspondence and requests for materials should be addressed to J.K. (email:
[email protected])
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
1
www.nature.com/scientificreports/
a
c
b
Χ1
Χ2
Χ1
Χ2
Χ1
Θ
Χ4
Χ2
Ε
Χ3
Χ4
Χ3
Χ4
Χ3
Figure 1. Three frameworks for explaining observed associations in the parametrisation of their
prototypical statistical models. (a) The Rasch model from the common cause framework as a DAG. (b) The
Curie-Weiss model from the reciprocal affect framework as an undirected graph. (c) The collider selection bias
model from the common effect framework as a DAG.
It is in the reciprocal affect framework that we find such a programme without ‘unobservables’. In this framework the relations between variables are represented as is, in that, observed associations between manifest variables are explained as a consequence of mutualistic relations between these variables14. The idea that variables
are associated as a consequence of reciprocal affect has been formalised in the field of network analysis15, and
has been studied extensively in diverse field of science such as mathematics, physics, and biology16–19. The Ising
model is a suitable example of a statistical model in this framework, as it captures all main effects and pairwise
interactions between variables20,21. While originally a model of ferromagnetism from statistical physics, in the
last decade the Ising model has been adopted within the social sciences, where the network perspective has been
gaining much popularity22–25. As an alternative for the latent variable perspective, the network approach has lead
to valuable new insights about, for example, psychopathology and the aforementioned concept of intelligence26.
In the, final, common effect framework, observed associations between manifest variables are explained as
arising from (unknowingly) conditioning on a common effect of these variables; the manifest variables are marginally independent with respect to each other, yet their collective state leads to the occurrence (or absence) of the
effect27,28. Variables can act as the collective cause towards an effect in (at least) two ways, either as the separate
indicators of an artificial compound score (e.g. Socio-Economic-Status, SAT)29, or as determinants of a naturally
occurring phenomenon, such as agents culminating into the outbreak of an epidemic. In the statistical literature,
the term collider variable models is used for this framework, as the collective state of the independent variables
collides into the effect4,30. Because of the independence, one would naturally expect not to find any associations
between these variables. However, from the literature on causality it is known that conditioning on a collider variable introduces (spurious) correlations among the variables functioning as the collective cause. This phenomenon
is known as endogenous selection bias and will results in the observation of associations between the manifest
variables30–34.
It is clear that each of these frameworks proposes a radically different explanation for the emergence of associations between a set of manifest variables. In this paper we argue that these differences only exist with respect
to the theoretical interpretation of these frameworks. Specifically, we demonstrate that the prototypical statistical
models for binary data in each framework are mathematically equivalent, and that this equivalence extends to
more realistic models that capture all main effects and pairwise interactions between the observed variables.
Through this we obtain three, statistically equivalent, representations of the Ising model that each explain the
occurrence of associations between binary variables by a theoretically very distinct mechanism.
Results
Prototypical models. To enhance the readability of this section we start by introducing the variables that
return in all discussed models, and clarify the mathematical notation used in the text and equations for the
distribution functions. We will denote random variables with capital letters and possible realisations of random
variables with lower case letters. We represent vectors with bold-faced letters, and use boldfaced capital letters to
indicate matrices for parameters. Manifest variables are denoted with Roman letters, whereas we use Greek letters
to indicate latent variables and parameters that need be estimated.
In the context of the paper we are primarily interested in the vector X = [X1, X2, …, XN], consisting of N binary
random variables that can take +1 and −1 as values, as we look to the mechanism by which the three frameworks
explain the observed associations between the realisations of this vector denoted by x = [x1, x2, … , xn].
Furthermore, each of the models we discuss includes a vector containing the main effect parameters δ = [δ1,
δ2, …, δn], consisting of N numbers in . Except for equation (1) which we write out in full, we use ∑i and ∏i to
denote respectively ∑ ni =1 and ∏ni =1 for the remainder of the equations. Additionally, we use p(x) to denote
p(X = x), which extends to all variables in both conditional, and joint probability distributions, such that we can
read it as the probability of observing some realisation of the random vector X, optionally, conditional on, or
together with, the realisation of some other variable.
We consider the Rasch model35, an Item Response Theory (IRT) model from the field of psychometrics, as the
prototypical model for binary data in the common cause framework. Historically, the Rasch model has been
developed for modelling the responses of persons to binary scored items on a test. The model is graphically represented in Fig. 1(a) as a Directed Acyclic Graph (DAG) 36, where the latent random variable Θ acts as the
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
2
www.nature.com/scientificreports/
common cause of the manifest random variables X. The Rasch model is characterised by the following distribution for the manifest variables (X), conditional on the latent variable (Θ ∈ ):
exp(x [θ + δ ])
∏ exp( + [θ + δ ])i + exp(i − [θ + δ ])
p (X = x Θ = θ ) =
i
i
i
(1)
The marginal probabilities for X can be obtained by endowing Θwith a distribution as shown in equation (2).
While this gives us an expression for the manifest probabilities of the Rasch model, for almost all choices for the
distribution of f(θ), this expression becomes computationally intractable.
p ( x) =
x i [θ + δ i ])
f (θ) dθ
∫ ∏ exp( + [θ +exp(
δ ]) + exp( − [θ + δ ])
i
i
i
(2)
In the traditional interpretation of the Rasch model, xi indicates whether the response to item i is correct
(xi = +1) or incorrect (xi = −1). In this context, the continuous random variable (Θ) represents the latent ability
being examined by the set of items (X). The vector δ contains the item main effects, where δi represents the easiness of item i, such that −δi represents the difficulty of item i with respect to the measured ability. The response
of an individual on item i is a trade-off between the ability of the person (θ) and the item difficulty (−δi). When
the ability of the person is greater than the difficulty of the item, the probability for a correct response will be
higher than for an incorrect response (θ > −δi ⇒ p(xi = 1) > p(xi = −1)), if the ability of the person is lower than
the item difficulty the reverse holds (θ < −δi ⇒ p(xi = 1) < p(xi = −1)). As such, persons with a greater ability will
always have a higher probability of giving a correct response, and persons always has a higher probability for a
correct response on an easy item than on a more difficult item. A key property of the Rasch model is that of local
independence, which entails that only variation in Θdetermines the probability for a response on an item. That
is, conditionally on the state of the latent variable all manifest variables are independent, such that marginally
(with respect to the latent variable) they are dependent. Consequently, any observed associations between the
manifest variables can be traced back to the influence of the latent variable. It is the latent variable that causes the
associations on the manifest variables, which is why the Rasch model falls within the common cause framework.
For the reciprocal affect framework we examine the Curie-Weiss model from statistical physics37–39, originally
used to model the state of a set of magnetic moments, for which the thermodynamical properties correspond to
that of the classical Curie-Weiss theory of magnetism, and where the pairwise interactions between the magnetic
moments are replaced by the mean magnetisation. Graphically, the Curie-Weiss model can be represented as an
undirected graph wherein the manifest variables (X), representing the set of magnetic moments, are fully connected with each other, and all connection are of equal strength, as illustrated in Fig. 1(b). The distribution of the
manifest variables (X) in the Curie-Weiss model is given by:
p ( x) =
2
1
1
exp ∑x i δ i + ∑x i
i
Z
2 i
(3)
In the conventional interpretation of the Curie-Weiss model, xi indicates that the magnetic spin of moment i
is upward (xi = +1) or downward (xi = −1), whereas the main effect for each moment (δi) indicates the natural
preference of moment i to be in an upward (δi > 0) or downward (δi < 0) spin position, due to the external magnetic field not present in X. In equation (3) we use Z to represents the normalising constant, in thermodynamical
systems often referred to as the partition function, that makes the distribution sum to one. In the Curie-Weiss
model, this partition function sums over all 2N possible configurations of the vector X, which we denote in this
paper as ∑ x , and is given by the following expression:
Z=
2
1
∑ exp ∑x iδi + 2 ∑x i
x
i
i
(4)
As the pairwise interactions between the magnetic moments are replaced by the mean magnetisation, all interactions are captured by the squared sum of the set of moments in the exponential of the Curie-Weiss distribution.
By averaging over individual interactions between magnetic moments, the Curie-Weiss model is the simplest
non-trivial model that exhibits a phase transition in statistical mechanics. However, because the model violates
fundamental principles of statistical physics, and its predictions are only partially verified by experiments, it is
considered as being mainly of theoretical interest37. Nonetheless, due to its simplicity, the Curie-Weiss model has
been useful in understanding the dynamics of equivalent phenomena in more realistic systems, such as the Ising
model39. Still, it is clear that as the observed associations between magnetic moments are presumed to emerge due
to the magnetic interaction between these moments themselves, the Curie-Weiss model falls within the reciprocal
affect framework.
Whereas in the Rasch model, from the common cause framework, associations between manifest variables
are explained by the latent variable Θ, in the Curie-Weiss model, from the reciprocal affect framework, these
associations are captured in the squared sum of the set of moments in the exponential of the distribution. The key
ingredient for establishing the connection between these two models has been known for a long time, and has
also been rediscovered quite a few times in quite diverse fields of science37,40–45. It was in his Brandeis lecture that
Mark Kac37 established the relation between the Curie-Weiss model and the Rasch model through an ingenuous
use of the following Gaussian integral:
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
3
www.nature.com/scientificreports/
exp(a2) =
2
∫ exp(2aθπ − θ ) dθ
(5)
What Kac realized is that whenever you see the exponential of a square, you can replace it with the right hand
side integral from equation (5). In the Methods section we demonstrate that applying this Gaussian identity to
the Curie-Weiss distribution from equation (3) linearises the squared sum in the exponential, and introduces a
random variable Θ, such that we obtain a latent variable representation of the Curie-Weiss model. We then show
that because the square in the exponential is gone, we can rewrite the expression for the latent variable representation of the Curie-Weiss model such that, both the marginal distribution of the manifest variables, and that of the
manifest variables conditional on θ, are identical to that of the Rasch model from equation (1) and equation (2).
Having established the relation between the prototypical models from the common cause, and reciprocal affect
framework we turn to our third framework.
For the common effect framework we consider X as a set of independent random variables, which we will
collectively call the cause, together with a single dependent binary random variable (E), which we will call the
effect. Their joint distribution, given in equation (6), is a collider structure and can be graphically represented in
a DAG as illustrated in Fig. 1(c).
e
exp( 1 [∑i x i ]2 )
exp(x i δ i )
2
p (x , e ) = ∑
1
sup exp( 2 [∑i x i ]2 )
i exp( + δ i ) + exp( − δ i )
x
1 −e
1
exp( 2 [∑i x i ]2 )
× 1 −
1
sup exp( 2 [∑i x i ]2 )
x
(6)
In this collider distribution, xi indicates if cause i is active (xi = +1) or inactive (xi = −1), whereas (e) indicates
whether the effect was present (e = 1) or absent (e = 0) at that time. The main effect for each cause (δi) denotes
the natural predisposition for cause i to be active (δi > 0) or inactive (δi < 0) at any given time. As mentioned, and
shown by equation (9) in the Methods section, are the individual causes independent of each other in the marginal distribution of X. As a consequence when we marginalise X with respect to E, the causes will not show any
associations among each other. From the literature on causality it is however known that selection with respect to
a common effect variable will introduce (spurious) correlations among the causes. That is, by using only observations of x where the common effect is present (e = 1), this set of observations will show a pattern of associations
among the causes. This is known as endogenous selection bias with respect to a collider variable, and can be
mathematically represented in the distribution of the causes conditionally on the effect. In the Methods section
we demonstrate that when we apply this selection bias mechanism to the collider structure from equation (6),
the distribution of the collective cause (X) conditionally on the effect, exactly gives the Curie-Weiss model from
statistical physics, and hence, the Rasch model.
Realistic models. Having studied the three statistical explanations in their simplest non-trivial form, we
conclude that, although their theoretical interpretation is radically different, the three models are mathematically indistinguishable. Still, the simplicity of the prototypical models for each framework also makes them often
unrealistic with respect to the observed reality. Specifically, the Rasch model and simple collider model only allow
for main effects between the observations, and do not consider possible pairwise interactions. The Curie-Weiss
model does allow some crude form of interaction, however, as the individual interactions between nearest neighbours are replaced by the mean interaction, one must make the (often) unrealistic assumption that all observations are interconnected with the same strength. Fortunately, we can swiftly generalise all three prototypical
models to more realistic forms.
We start with the Ising model, of which the Curie-Weiss model is the simplest form, from the reciprocal affect
framework. Like the Curie-Weiss model, the Ising model was originally introduced in statistical physics as a
model for magnetism, with the same possible values and interpretation for X and its possible realisations.
However, instead of only considering the mean magnetisation, the Ising model captures all pairwise interactions
between the set of manifest variables (X). The distribution of the Ising model, where ∑ i , j is the sum over all
distinct pairs of magnetic moments, is commonly written as follows:
p ( x) =
1
exp ∑x i δ i +
i
Z
∑x ix jσ ij
i ,j
(7)
The pairwise interactions are represented in the Ising model distribution by the symmetric N × N connectivity
matrix ∑ in . In this connectivity matrix, σij modulates the reciprocal affect relation between xi and xj, indicating if
moments i and j prefer to be in identical (σij > 0), or opposing (σij < 0) spin positions, wherein the higher the absolute
value of σij, the stronger this preference. Under the condition that all off-diagonal entries of Σ are equal, the Ising
model reduces to the prototypical Curie-Weiss model. Because the diagonal values of the connectivity matrix in the
Ising model are arbitrary, i.e., the probability of X is independent of these values, we can choose the values for the
diagonal in such a way that the connectivity matrix becomes positive (semi) definite. As a consequence the eigenvalue
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
4
www.nature.com/scientificreports/
decomposition of the matrix will also be non-negative. As clarified in the Methods section, by applying this transformation to the Ising model distribution from equation (7) we obtain an eigenvalue representation of the Ising model:
p ( x) =
1
exp ∑x i δ i +
i
Z
1
∑ 2 λr ∑qir x i
r
i
2
(8)
where λr is the r non-negative eigenvalue of the vector Λ = [λ1, λ2, …, λN], and qir the value of the i row and rth
column of the N × N eigenvector matrix Q. In the equation above ∑r should be read as ∑ nr =1, we continue this
practice in the notation of the applicable equations in the Methods section. In the Methods section we demonstrate how this eigenvalue representation allows us to connect the Ising model from the reciprocal affect framework to the more realistic models in both the other frameworks. First, by applying the Gaussian identity from Kac
to the squared sum in the exponent for each eigenvalue in equation (8), we obtain a latent variable representation
of the Ising model46, with as many latent dimensions as there are non-zero eigenvalues. This latent variable representation of the Ising model is then shown to be the multidimensional IRT model47 from the common cause
framework, of which the Rasch model is the simplest instance, but allows for more than one latent variable to
explain the observed associations between the manifest variables. Similarly, we can introduce (independent)
effect variables for each eigenvalue in equation (8), such that we obtain a collider representation of the Ising
model where endogenous selection bias has taken place. We then show that this distribution is a version of the
common effect model as seen in equation (6), that is extended such that the collective cause can collide into more
then one common effect.
th
th
Discussion
We have shown that the mathematical equivalence of the simple prototypical models from the common cause,
reciprocal affect, and common effect framework, extends to the more realistic counterparts of these models.
That is, there exist three, statistically indistinguishable, representations of the Ising model that explain observed
associations either through marginalisation with respect to latent variables, through reciprocal affect between
variables, or through conditioning on common effect variables. We therefore argue that these are not three different models, but just one model for which three distinct theoretical interpretations have been developed in
different fields of science. Consequently, any set of associations between variables that is sufficiently described by
a model in one framework, can be explained as emerging from the mechanism represented by any of the three
theoretical frameworks. We illustrate the implications of this by considering one of the most controversial topics
in the common cause framework, differential item functioning (DIF)48, and discuss it in the context of the three
possible interpretations.
In it’s traditional (common cause) framework DIF indicates that, conditional on the level of the latent variable,
the probability for some response is dependent on group membership. For items that exhibit DIF it is not only
variation in Θthat determines the probability for a response on an item. From a common cause perspective the
occurrence of DIF is a violation of local independence, and as such measurement invariance. In the context of
ability testing DIF is often perceived as indication of item bias49. As a fictitious example, consider the situation
where on certain items from the Revised NEO Personality Inventory (NEO PI-R)50, that intents to measure the
Big Five personality traits51, we find that for a group of subjects with the same latent trait score, those that listed
their occupation as being a manager always have a higher probability of giving a correct response on these items,
compared to subjects that have no occupation as a manager.
Needless to say, in this context items that exhibit DIF are seen as bad because they pose a problem for both the
reliability and validity of a test. From a reciprocal affect perspective, identification of DIF would exhibit itself in
the form of differences in the estimated pairwise associations between items depending on group membership.
As such the appearance of DIF in the NEO PI-R example would also be viewed as troublesome. However, in contrast to the common cause framework, the appearance of DIF in a network model is at least informative in that
our model might be incomplete, i.e., the network is missing a node. The interpretation of DIF in a common effect
framework is best understood, in the context of the current example, by considering the answer to the question:
What causes people to obtain a managerial position as occupation? It is safe to say that in most cases a persons personality is an important factor in this process. In other words, people that are selected to become manager, get this
position because they posses a certain set of personality traits associated with being a successful manager52. As
such, the items in the NEO PI-R that show DIF in this case measure those personality traits that are most sought
after in managers. More broadly in the context of the common effect framework, the occurrence of DIF indicates
how well an item predicts differences in the effect. In contrast to the disruptive interpretation of DIF in both the
common cause and reciprocal affect frameworks, the occurrence of DIF within the context of the common effect
framework is actually both sensible and informative.
The previous example clearly demonstrates how fundamental concepts, that are firmly established in their
traditional framework as being problematic, can be perceived as neutral and informative or even desirable in
another context. Having multiple possible interpretations for the same model allows for more plausible explanations when it comes to the theoretical concepts and the causal inferences we obtain from the measurement model
applied to our data. For example in the context of psychopathology, depression has been habitually being treated
as a common cause variable for which its symptoms are the interchangeable indicators. Measures of these symptoms with the popular Beck Depression Inventory53 have shown to fit a latent variable model with one underlying
general depression factor and three highly inter-correlated sub-factors, or a two-factor solution well54. However,
in a common cause framework depression symptoms, such as sleep problems, loss of energy, and trouble concentrating, are assumed independent of one another, as they are purely caused by the latent variable interpreted as
depression. More recently it has been shown that a network model can also give an accurate description of data
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
5
www.nature.com/scientificreports/
on depression symptoms26. The reciprocal affect representation of depression, where symptoms can directly influence each other, is as an explanation more in line with our perceived reality. Furthermore, the historical success
of theoretically very implausible models, such as the latent variable model, can thus in retrospect, arguably be
explained by the equivalence of these three models.
Being able to interpret the outcome of an applied measurement model from theoretically very distinct perspectives, instead of only the perspective as traditionally assumed by the model, is great progress, as it allows for
novel explanations that might be a better reflection of our perceived reality. Furthermore, in their different fields
of application different aspects of these models have been studied and different methodology has been developed.
Through their connection much of these developments become available to all fields of application.
Methods
In this section we clarify the mathematics involved in connecting the simple prototypical models, as well as the
more realistic Ising model representations, for the three different frameworks. In the first proof we demonstrate
the equivalence between the simple collider, Curie-Weiss and Rasch models, the prototypical (yet unrealistic)
models for respectively the common effect, reciprocal affect, and common cause explanation for observed associations between a set of binary variables.
Proof for the equivalence of the simple prototypical models. Collider to Curie-Weiss. The simple
collider model from the common effect framework is characterised by the following joint probability distribution
p(x, e):
p (x , e ) =
∏
i
exp 1 [∑i x i ]2
exp(x i δ i )
2
exp( + δ i) + exp( − δ i ) sup exp 1 [∑i x i ]2
2
x
(
1
exp 2 [∑i x i ]2
×1 −
1
sup exp 2 [∑i x i ]2
x
(
)
(
)
(
e
)
1 −e
)
(9)
In order to connect this collider model to the Curie-Weiss model we introduce endogenous selection bias
on the set of manifest variables forming the collective cause, by conditioning on the effect being present. This is
mathematically presented as the conditional distribution p(x|e = 1), proportional to the product of the marginal
distribution for the cause p(x), and the probability of observing the effect given the cause p(e = 1|x), defined by:
p (x|e = 1) ∝ p (x) p (e = 1|x) =
∏
i
(
)
1
exp 2 [∑i x i ]2
exp(x i δ i )
exp( + δ i ) + exp( − δ i ) sup exp 1 [∑i x i ]2
x
(
2
)
(10)
We can simplify the expression for p(x|e = 1) by recognising that the product of exponentials in the numerator can be rewritten as a sum within the exponential. Furthermore, the denominator of the expression is only
dependent on the sum of X, and thus independent of the specific pattern that the realisation of X takes. As a consequence p(x|e = 1) is only proportional to the numerator of equation (10), such that we can write:
2
1
p (x|e = 1) ∝ exp ∑x i δ i + ∑x i
i
2 i
(11)
In order to obtain a valid probability density function we have to add the appropriate normalising constant
that makes the probabilities sum to one again. In this case this translates to dividing the expression in equation (11) for a certain realisation of X by the sum of this expression for all possible configurations of X:
p (x|e = 1) =
(
1
exp ∑ i x i δ i + 2 [∑i x i ]2
(
∑ x exp ∑ i x i δ i +
1
[ ∑i
2
)
x i ]2
)
(12)
It can quickly be verified that the resulting expression in equation (12) is identical to the distribution for the
Curie-Weiss model introduced in equation (3), with the same normalising constant as given in equation (4). Thus
proofing that, conditional on the effect being present, the distribution of the collective cause in the collider model
is equivalent to the distribution of a set of directly interacting magnetic moments in the Curie-Weiss model.
Curie-Weiss to Rasch. Next, we will connect the Curie-Weiss model from statistical physics to the Rasch model
from psychometrics. We start from the distribution function of the Curie-Weiss model, where we use Z to denote
the appropriate normalising constant:
p ( x) =
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
(
1
exp ∑ i x i δ i + 2 [∑i x i ]2
Z
)
(13)
6
www.nature.com/scientificreports/
Next we use Kac’s Gaussian identity from equation (5) to linearise the quadratic sum in the exponential of the
Curie-Weiss distribution, to that end let a2 = 1 [∑i x i ]2, so we can rewrite it in the following way:
2
1
exp [∑i x i ]2 =
2
(
1
exp 2 2 [∑i x i ] θ − θ 2
∫
π
) dθ
(14)
By incorporating this transformation we obtain a latent variable representation of the Curie-Weiss model
p ( x) =
∫ exp(∑i
x i δ i + [∑i x i ] θ − θ 2 )
dθ
Z π
(15)
Which we can simplify further by merging the two sums in the exponential:
p ( x) =
2
∫ exp(∑i xi [Zθ +π δi] − θ ) dθ
(16)
Where we will use Z ⁎ = Z π to denote the appropriate normalising constant. For the next step towards our goal
we multiply both the numerator and denominator of equation (16) by ∏i [exp( + [θ + δ i ]) + exp( − [θ + δ i ])],
such that we obtain the equivalent expression:
p ( x) =
2
[
exp( [
i ])
i ])]
dθ
∫ exp(∑i xi [θZ+⁎ δi] − θ ) ∏∏i [exp(
[exp( + [θ + δ ]) + exp( − [θ + δ ])]
+ θ+δ
+
− θ+δ
i
i
i
(17)
Next we rearrange the expression in equation (17) by switching the denominators of both factors, taking the
sum in the first numerator out of the exponential so it becomes a product, and transferring exp (−θ2) out the
numerator of the first factor, and into the numerator of the second factor:
p ( x) =
x i [θ + δ i ])
∫ ∏ exp( + [θ +exp(
δ ]) + exp( − [θ + δ ])
i
i
i
2
∏ [exp( + [θ + δ i ]) + exp( − [θ + δ i ])]exp( − θ )
× i
dθ
⁎
Z
(18)
The resulting expression can be recognised as p (x) = ∫ p (x θ) f (θ) dθ, the marginal probability for some
realisation of X where the latent variable Θis integrated out. Let us denote the second factor of the expression in
equation (18) as the distribution of the latent variable (f(θ)), which gives us:
p ( x) =
x i [θ + δ i ])
f (θ)dθ
∫ ∏ exp( + [θ +exp(
δ ]) + exp( − [θ + δ ])
i
i
i
(19)
Such that the distribution of the set of binary random variables (X), conditionally on the latent variable (Θ) , is:
p ( x| θ ) =
exp(x [θ + δ ])
∏ exp( + [θ + δ ])i + exp(i − [θ + δ ])
i
i
i
(20)
Again, it is readily seen that the resulting latent variable expression of the Curie-Weiss model in equation (20)
is identical to the distribution of the Rasch model from equation (1). This completes our first proof in which we
demonstrated that by conditioning on the effect in the collider model from the common effect framework, the
distribution of set of binary random variables (X) is equivalent to that of the Curie-Weiss model from the reciprocal affect framework. Furthermore, when we linearise the quadratic sum in the exponential of the Curie-Weiss
model, we obtain a latent variable representation of this model where the distribution of the manifest random
variables (X) given the latent variable (Θ) is equivalent to that of the Rasch model from the common cause
framework. Consequently, given the equivalence of the collider model and the Curie-Weiss model, and that of
the Curie-Weiss model and the Rasch model, we can conclude that the collider model and the Rasch model are
also equivalent.
In the next proof we demonstrate that this equivalence relation between the three frameworks extends to the
more realistic models of these frameworks, as those allow pairwise interactions between the random variables in
the set X. We start with the conventional representation of the full Ising model from the reciprocal affect framework and rewrite this into an equivalent eigenvalue representation. Subsequently we connect this to both a latent
variable representation equivalent to the multidimensional IRT model from the common cause framework, and
a collider representation from the common effect framework.
Three representations of the Ising model. Conventional to Eigenvalue representation. The distribution
of the Ising model is commonly written as follows:
p ( x) =
1
exp ∑x i δ i +
i
Z
∑x ix jσ ij
i ,j
(21)
Where the partition function Z, that makes the distribution sum to one, is given by:
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
7
www.nature.com/scientificreports/
Z=
∑ exp ∑x iδi + ∑x ix jσ ij
x
i
i ,j
(22)
In order to connect the Ising model from the reciprocal affect framework to the models from both other
frameworks, we first have to rewrite it into matrix notation such that we can obtain the eigenvalue representation
of the Ising model. To that end we first rewrite the sum over all distinct i, j pairs in the exponent, as a function of
the sum over i and the sum over j:
p ( x) =
1
1 n n
exp ∑x i δ i + ∑∑ x i x j σ ij
i
Z
2 i=1 j=1
(23)
Such that we may rewrite the Ising model in matrix notation:
p ( x) =
1
1
exp xTδ + xTΣx
2
Z
(24)
All parameters, except for entries on the diagonal of the connectivity matrix, are identifiable from the data.
However, as xi xj = 1 when i = j any diagonal entry for the connectivity matrix will be cancelled out by the partition function. With the observation that the diagonal values of Σ are thus arbitrary (i.e., do not change the
probabilities), we can shift them in such a way that the connectivity matrix Σbecomes positive (semi) definite,
and hence its eigenvalue decomposition non-negative. This allows for the transformation Σ + cI = QΛQT, where
c contains the chosen values for the diagonal of the connectivity matrix, that when implemented gives:
p ( x) =
1
1
exp xTδ + xTQΛQT x
2
Z
(25)
By taking the expression out of its matrix notation we obtain the eigenvalue representation of the Ising model:
p ( x) =
1
exp ∑x i δ i +
i
Z
1
∑ 2 λr ∑qir x i
r
i
2
(26)
Eigenvalue to Latent Variable representation. We obtain a latent variable representation of the Ising model by
applying Kac’s Gaussian identity to the squared sum in the exponent of equation (26). To that end let a2 be
1
λ [∑i qir x i ]2 for each of the N eigenvalues in the Ising model, and replace this with the right hand side integral
2 r
from equation (5):
2
1
exp λr ∑qir x i =
2 i
∫
1
1
exp 2 λr ∑qir x i θr − θr2 dθr
2
π
i
(27)
N
#
Incorporating this transformation into the Ising model, and letting Z = Z π , we get he latent variable
representation of the Ising model, where the number of non-zero eigenvalues represents the number of latent
dimensions in the model:
p ( x) =
∫ Z1# exp ∑xiδi + ∑λr ∑qir xi θr − θr2 dθ
i
r
i
(28)
In order to connect this latent variable representation to the multidimensional IRT model we the multiply we
multiply both the numerator and denominator of equation (28) by ∑ x exp(∑i x i δ i + ∑r λr [∑i qir x i ] θr ), such
that we obtain the equivalent expression:
p ( x) =
exp(∑ i x i δ i + ∑ r λ r [∑ i qir x i ] θr − θr2 )
Z#
∑ x exp(∑i x i δ i + ∑r λr [∑i qir x i ] θr )
×
dθ
∑ x exp(∑i x i δ i + ∑r λr [∑i qir x i ] θr )
∫
(29)
Next we rearange and simplify the expression in equation (29). To that end let us merge the sums over xi in the
exponential, and denote λrqir as αir, where αir is the value of the ith row and rth column of the N × N matrix A in .
We can then rewrite the sum over r as a product of the vector αiT , containing the ith row of the matrix A, and the
vector θ. Furthermore, we switch the denominators of both factors and transfer exp(∑r θr2 ) out the numerator of
the first factor, to the numerator of the second factor:
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
8
www.nature.com/scientificreports/
p ( x) =
T
T
2
∑i x i [δ i + αi θ]) ∑ x exp(∑i x i [δ i + αi θ] − ∑r θr )
dθ
∫ ∑exp(
Z#
exp(∑ x [δ + α T θ])
x
i
i
i
i
(30)
In the resulting expression we can again recognise a function for the marginal probability of X where all latent
dimensions (Θ) are integrated out. Finally we take the sum over i out of the exponential such that we obtain:
p ( x) =
T
x i [δ i + αi θ])
f (θ)dθ
∫ ∏ ∑exp(
exp(x [δ + α T θ])
x
i
i
i
(31)
i
We can recognise this particular latent variable representation of the Ising model as a multidimensional IRT
model47 from the common cause framework, where the vector Θ represent the set of latent abilities measured by
the items in X. In addition to this vector, we also find the matrix A in the model, where the ith row contains the
discrimination parameters for all latent variables on item i. In the traditional interpretation of the IRT framework,
the discrimination parameter quantifies how well the item measures the corresponding latent variable, or in model
terms, the degree to which the probability for item responses varies with respect to each latent variable in Θ. We
obtain the following expression for the conditional probabilities of X given the vector of latent variables (Θ):
p ( x| θ ) =
∏
i
exp(x i [δ i + αiT θ])
∑ x exp(x i [δ i + αiT θ])
(32)
Note that, as the number of non-zero eigenvalues represents the number of latent dimensions in the model,
under the condition that only the first eigenvalue is non-zero, and the discrimination parameters with respect to
the single resulting latent variable are 1 for all the items, the model reduces to the Rasch model from equation (1).
Eigenvalue to Collider representation. To acquire an collider representation of the Ising model we start again
from the eigenvalue representation of the Ising model:
p ( x) =
1
exp ∑x i δ i +
i
Z
2
1
∑ 2 λr ∑qir x i
r
i
(33)
By taking the partition function out of the expression we obtain the following proportionality relation:
p (x) ∝ exp ∑x i δ i +
i
2
1
∑ 2 λr ∑qir x i
r
i
(34)
Next we can introduce a set of (independent) effect variables (E = [E1, E2, …, Em]) for each eigenvalue, such
that we obtain a collider representation of the Ising model where endogenous selection bias has taken place for
multiple effect variables. To that end, we recognise p(x) from equation (34) as p(x|e = 1), the conditional probability of the collective cause (X) given that all effects are present (E = 1), proportional to the product of the marginal distribution for the collective cause [p (x) ∝ ∑i exp(x i δ i )], and the probability of observing the effects given
the collective cause p (e = 1|x) ∝ exp ∑r 1 λr [∑i qir x i ]2 . Taking the sum over i in p(x), and the sum over r in
2
p(e = 1|x) out of their respective exponential, and adding the appropriate normalising constant to make the probabilities sum to one we obtain the following expression:
(
p (x|e = 1) =
∏
i
)
exp(x i δ i )
exp( + δ i ) + exp( − δ i )
∏
r
(
)
1
λ [∑i qir x i ]2
2 r
1
sup exp 2 λ r [∑i qir x i ]2
x
exp
(
)
(35)
Such that we can write the joint distribution of causes and effect variables as a common effect representation
of the Ising model:
p (x , e ) =
∏
i
exp 1 λ r [∑i q x i ]2
exp(x i δ i )
ir
2
∏
exp( + δ i) + exp( − δ i ) r sup exp 1 λr [∑i q x i ]2
ir
2
x
(
1
exp 2 λr [∑i qir x i ]2
× 1 −
1
sup exp 2 λr [∑i qir x i ]2
x
(
(
)
(
)
e
)
r
1 −e r
)
(36)
We can quickly recognise a collider model in this distribution that is extended for as much common effect
variables as there are non-negative eigenvalues. With this we have completed our second, and final, set of proofs,
showing that three, statistically equivalent, representations of the Ising model exist that explain observed associations between binary variables as arising either through marginalisation with respect to latent variables, through
reciprocal affect between variables, or through conditioning on common effect variables.
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
9
www.nature.com/scientificreports/
References
1. Bandura, A. Social cognitive theory: An agentic perspective. Asian J. Soc. Psychol. 2, 21–41 (1999).
2. Costner, H. L. Theory, deduction, and rules of correspondence. Am. J. Sociol. 75, 245–263 (1969).
3. Edwards, J. R. & Bagozzi, R. P. On the nature and direction of relationships between constructs and measures. Psychol. Methods 5,
155–174 (2000).
4. Pearl, J. Causality: models, reasoning and inference. Economet. Theor. 19, 675–685 (2003).
5. Reichenbach, H. The Direction of Time (University of California Press, Berkeley, 1956).
6. Fornell, C. & Bookstein, F. L. Two structural equation models: Lisrel and PLS applied to consumer exit-voice theory. J. Mark. Res. 19,
440–452 (1982).
7. Markus, K. A. & Borsboom, D. Reflective measurement models, behavior domains, and common causes. New Ideas Psychol. 31,
54–64 (2013).
8. Spearman, C. ‘General intelligence’ objectively determined and measured. Am. J. Psychol. 15, 201–293 (1904).
9. Jensen, A. R. The g factor: The science of mental ability (Praeger, Westport, 1998).
10. McCrae, R. R. & Costa, P. T. Empirical and theoretical status of the five-factor model of personality traits in The SAGE Handbook of
Personality Theory and Assessment: Volume 1 – Personality Theories and Models 273–294 (SAGE, London, 2008).
11. Borsboom, D., Mellenbergh, G. J. & van Heerden, J. The concept of validity. Psychol. Rev. 111, 1061–1071 (2004).
12. Borsboom, D. Psychometric perspectives on diagnostic systems. J. Clin. Psychol. 64, 1089–1108 (2008).
13. Popper, K. R. The Logic of Scientific Discovery (Hutchinson, London, 1959).
14. Van Der Maas, H. L. et al. A dynamical model of general intelligence: the positive manifold of intelligence by mutualism. Psychol.
Rev. 113, 842–861 (2006).
15. Epskamp, S., Maris, G., Waldorp, L. J. & Borsboom, D. Network Psychometrics in Handbook of Psychometrics. (Wiley, New York,
2015).
16. Lee, T.-D. & Yang, C.-N. Statistical theory of equations of state and phase transitions II. Lattice gas and Ising model. Phys. Rev. 87,
410–419 (1952).
17. Besag, J. Spatial interaction and the statistical analysis of lattice systems. J. R. Stat. Soc. Series B Stat. Methodol. (Methodological) 36,
192–236 (1974).
18. Besag, J. Statistical analysis of non-lattice data. Statistician 24, 179–195 (1975).
19. Barzel, B. & Barabási, A. L. Universality in network dynamics. Nat. Phys. 9, 673–681 (2013).
20. Ising, E. Beitrag zur theorie des ferromagnetismus. Zeit. Phys. 31, 253–258 (1925).
21. Jaynes, E. T. Information theory and statistical mechanics. Phys. Rev. 106, 620–630 (1957).
22. Barabási, A. L. The network takeover. Nat. Phys. 8, 14–16 (2012).
23. Cramer, A. O., Waldorp, L. J., van der Maas, H. L. & Borsboom, D. Comorbidity: A network perspective. Behav. Brain Sci. 33,
137–150 (2010).
24. Borsboom, D. & Cramer, A. O. Network analysis: an integrative approach to the structure of psychopathology. Annu. Rev. Clin.
Psychol. 9, 91–121 (2013).
25. Schmittmann, V. D. et al. Deconstructing the construct: A network perspective on psychological phenomena. New Ideas Psychol. 31,
43–53 (2013).
26. van Borkulo, C. D. et al. A new method for constructing networks from binary data. Sci. Rep. 4, 5918 (2014).
27. Blalock, H. M. Causal models involving unmeasured variables in stimulus-response situations in Causal Models in the Social Sciences
335–347 (Aldine-Atherton, Chicago, 1971).
28. Bollen, K. & Lennox, R. Conventional wisdom on measurement: A structural equation perspective. Psychol. Bull. 110, 305–314 (1991).
29. Hauser, R. M. Disaggregating a social-psychological model of educational attainment. Soc. Sci. Res. 1, 159–188 (1972).
30. Greenland, S., Pearl, J. & Robins, J. M. Causal diagrams for epidemiologic research. Epidemiology 10, 37–48 (1999).
31. Heckman, J. J. Sample selection bias as a specification error. Econometrica 47, 153–161 (1979).
32. Greenland, S. Quantifying biases in causal models: classical confounding vs collider-stratification bias. Epidemiology 14, 300–306
(2003).
33. Hernán, M. A., Hernández-Daz, S. & Robins, J. M. A structural approach to selection bias. Epidemiology 15, 615–625 (2004).
34. Elwert, F. & Winship, C. Endogenous selection bias: The problem of conditioning on a collider variable. Annu. Rev. Sociol. 40, 31–53 (2014).
35. Rasch, G. Probabilistic Models for some Intelligence and Attainment Tests (The Danish Institute of Educational Research, Copenhagen,
1960).
36. Christofides, N. Graph Theory: An Algorithmic Approach (New York: Academic Press Inc, 1975).
37. Kac, M. Statistical physics: Phase transitions and superfluidity in Brandeis University Summer Institute in Theoretical Physics, Vol. 1
(eds Chretien, M., Gross, E. & Deser, S.) 241–305 (Gordon and Breach Science Publishers, New York, 1968).
38. Stanley, H. E. Introduction to Phase Transitions and Critical Phenomena. (Oxford University Press, New York, 1971).
39. Ellis, R. S. & Newman, C. M. The statistics of curie-weiss models. J. Stat. Phys. 19, 149–161 (1978).
40. Olkin, I. & Tate, R. F. Multivariate correlation models with mixed discrete and continuous variables. Ann. Math. Stat. 32, 448–465
(1961).
41. Emch, G. G. & Knops, H. J. Pure thermodynamical phases as extremal kms states. J. Math. Phys. 11, 3008–3018 (1970).
42. Cox, D. R. & Wermuth, N. A note on the quadratic exponential binary distribution. Biometrika 81, 403–408 (1994).
43. McCullagh, P. Exponential mixtures and quadratic exponential families. Biometrika 81, 721–729 (1994).
44. Lauritzen, S. L. Graphical models (Oxford University Press, USA, 1996).
45. Anderson, C. J. & Yu, H.-T. Log-multiplicative association models as item response models. Psychometrika 72, 5–23 (2007).
46. Marsman, M., Maris, G., Bechger, T. & Glas, C. Bayesian inference for low-rank ising networks. Sci. Rep. 5, 9050 (2015).
47. Reckase, M. Multidimensional Item Response Theory (Springer, 2009).
48. Mellenbergh, G. J. Item bias and item response theory. Int. J. Educ. Res. 13, 127–143 (1989).
49. Meredith, W. Measurement invariance, factor analysis and factorial invariance. Psychometrika 58, 525–543 (1993).
50. Costa, P. T. & MacCrae, R. R. Revised NEO personality inventory (NEO PI-R) and NEO five-factor inventory (NEO FFI): Professional
manual (Psychological Assessment Resources, 1992).
51. Goldberg, L. R. An alternative “description of personality”: the big-five factor structure. J. Pers. Soc. Psychol. 59, 1216–1229 (1990).
52. Barrick, M. R. & Mount, M. K. The big five personality dimensions and job performance: a meta-analysis. Pers. Psychol. 44, 1–26 (1991).
53. Beck, A. T., Ward, C. H., Mendelson, M., Mock, J. & Erbaugh, J. An inventory for measuring depression. Arch. Gen. Psychiatry 562,
53–63 (1961).
54. Beck, A. T., Steer, R. A. & Carbin, M. G. Psychometric properties of the beck depression inventory: Twenty-five years of evaluation.
Clin. Psychol. Rev. 8, 77–100 (1988).
Acknowledgements
We thank Dr. Maria A. Bolsinova and Dr. Maarten Marsman for proof reading the manuscript. This work was
supported by by NWO (The Netherlands Organisation for Scientific Research), No. 022.005.0 (JK), and No.
CI1-12-S037 (GM).
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
10
www.nature.com/scientificreports/
Author Contributions
J.K. and G.M. wrote the main manuscript. All authors reviewed the manuscript.
Additional Information
Competing financial interests: The authors declare no competing financial interests.
How to cite this article: Kruis, J. and Maris, G. Three representations of the Ising model. Sci. Rep. 6, 34175;
doi: 10.1038/srep34175 (2016).
This work is licensed under a Creative Commons Attribution 4.0 International License. The images
or other third party material in this article are included in the article’s Creative Commons license,
unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license,
users will need to obtain permission from the license holder to reproduce the material. To view a copy of this
license, visit http://creativecommons.org/licenses/by/4.0/
© The Author(s) 2016
Scientific Reports | 6:34175 | DOI: 10.1038/srep34175
11
| 10math.ST
|
Sensitivity to the Neutrino Mass Hierarchy
Emilio Ciuffoli, Jarah Evslin and Xinmin Zhang
arXiv:1305.5150v4 [hep-ph] 20 Apr 2016
Theoretical Physics Division, IHEP, CAS, YuQuanLu 19B, Beijing 100049, China
In the next decade, a number of experiments will attempt to determine the neutrino mass hierarchy.
Feasibility studies for such experiments generally determine the statistic ∆χ2 . As the hierarchy is
a discrete choice, ∆χ2 does not obey a one degree of freedom χ2 distribution and so the number
of σ’s of confidence of the hierarchy determination is not the square root of ∆χ2 . We present a
simple Bayesian formula for the sensitivity to the hierarchy that can be expected from the median
experiment as a function of ∆χ2 .
In the next two decades a number of reactor,
accelerator and atmospheric neutrino experiments
will attempt to determine the neutrino mass hierarchy, which is the sign of the mass difference
2
∆M31
= M32 − M12 where Mi is the ith eigenvalue
of the neutrino mass matrix. If the sign is positive (negative), one says that the hierarchy is normal (inverted). Most of these experiments are still
in the planning stages, where the key role is played
by studies of the sensitivity of a given design to the
hierarchy.
Such studies determine, either analytically or via
Monte Carlo simulations,
∆χ2 = χ2I − χ2N
(1)
where χ2N (χ2I ) is the χ2 statistic equal to a weighted
sum of the squares of the differences between the
data and predictions given the normal (inverted) hierarchy, choosing all of the nuisance parameters so
as to minimize χ2N (χ2I ). The goal of these experiments is not to determine whether each of the hierarchies is consistent with the data, as would be usual
in a frequentist approach. Rather, as it is already
well accepted that precisely one of the hierarchies is
manifested in nature, the goal of these experiments
is to determine which of the hierarchies provides the
best fit to the data. In this paper we will use the
test statistic ∆χ2 to answer this question as follows.
We will define the best fit hierarchy to be that which
yields the lowest value of χ2 , and so the hierarchy
determined by the experiment simply corresponds to
the sign of ∆χ2 .
The critical question is then, given ∆χ2 , what is
the sensitivity of a typical experiment to the hierarchy? In Ref. [1] the authors showed that the most
naive answer, the p value that would be obtained
if ∆χ2 satisfied a one degree of freedom χ2 distri-
bution, gives the incorrect answer. Indeed ∆χ2 is
not necessarily positive and so such a prescription
would not even always be defined. In this note we
will provide an analytic answer (13) to this question
and will compare our answer to the results of simulations of Daya Bay II and disappearance data at
NOνA.
Nested hypotheses
To begin, we will describe just why the p value is
not the answer to the question stated above. Consider N data points {yi } generated by an experiment
trying to determine an unknown quantity x. We will
use the approximation in which these data points yi
(0)
follow a Gaussian distribution peaked at yi (x) with
(0)
variance σi2 (x). Both yi (x) and σi (x) are known
functions of x. An experimenter is interested in two
hypotheses. Hypothesis (A) states that x is a real
number. Hypothesis (B) states that x = x0 , for a
particular real number x0 . Clearly hypothesis (B) is
a special case of hypothesis (A), so these hypotheses
are said to be nested. In particular, (B) is obtained
from (A) by fixing one, otherwise unconstrained, real
number, the number x.
For any given value of x, the experimenter can define a statistic χ2 (x) by simulating the experiment
with that value of x and calculating the weighted
sum of the squares of differences between his measured and simulated results
χ2 (x) =
X (yi − y (0) (x))2
i
i
σi (x)2
.
(2)
The experimenter then determines a best fit x, for
which χ2 (x) is minimized. He then asks how compatible his results are with the hypothesis (B). To
determine this, he calculates
δχ2 = χ2 (x0 ) − χ2 (x).
(3)
2
Unlike ∆χ2 defined in Eq. (1), δχ2 is manifestly nonnegative, because x is defined so as to give the lowest
value of χ2 .
Just what value of δχ2 should the experimenter
expect? 75 years ago Wilks proved [2] that if hypothesis (B) is true then δχ2 will obey a χ2 distribution
with a single degree of freedom. The experimenter
can then determine a conditional probability that
given (B), the experiment would have gone as badly
as it did
!!
r
1
δχ2
2
pW (δχ ) =
1 − erf
.
(4)
2
2
For example, if he found δχ2 = 9, then pW would
only be about 0.13%, and so a frequentist experimenter might conclude that he has ruled out (B)
with 3σ of confidence.
Non-nested Hypotheses
As described in Ref. [1], the determination of the
hierarchy is qualitatively different. The two hypotheses are the normal hierarchy (NH) and the
inverted hierarchy (IH). These hypotheses are not
nested, and they correspond to a discrete choice, not
the fixing of a degree of freedom. So the conditions
for Wilks’ theorem are strongly violated. As was observed in general in Ref. [3] and in this context in
Ref. [1], this means that the statistic ∆χ2 defined in
Eq. (1) does not follow a χ2 distribution.
Just what distribution does ∆χ2 follow? Let us
begin with the simple case in which there are no nuisance parameters, which was applied to a toy model
of the hierarchy determination in Ref. [1].
An experiment will produce a set of numbers {yi },
which we assemble into a vector y. The normal and
inverted hierarchies yield two theoretical estimates
of this vector which we will denote yN and yI respectively. Again let us assume that the measured numbers yi are normally distributed about their mean
with a variance σi2 , which for simplicity we take to
be independent of the hierarchy. Without loss of
generality, let us assume for the moment that the
true hierarchy is normal. Then the measured numbers will be
yi = yiN + σi gi
(5)
where gi is a standard Gaussian random variable.
The statistic ∆χ2 is then easily determined to be
∆χ2 = χ2I − χ2N
X (yi − y I )2 X (yi − y N )2
i
i
−
=
2
2
σ
σ
i
i
i
i
=
X (y N + σi gi − y I )2 − (y N + σi gi − y N )2
i
i
i
i
σi2
i
=
(6)
X (y N − y I )2
i
i
σi2
i
+
X 2(y N − y I )
i
i
i
σi
gi .
This identifies ∆χ2 as a Gaussian distributed random variable with mean given by the first term on
the right hand side
∆χ2 =
X (y N − y I )2
i
i
i
σi2
(7)
and standard deviation given by the second term [1]
s
q
X 4(y N − y I )2
i
i
σ∆χ2 =
(8)
= 2 ∆χ2 .
2
σ
i
i
Note that ∆χ2 is the ∆χ2 statistic without statistical fluctuations, for example it may be given by
the theoretical spectra of ν e observed at a reactor
experiment, of νµ and ν µ at an iron calorimeter atmospheric neutrino experiment, or of νe (ν e ) appearance at an accelerator experiment running in the
neutrino (antineutrino) mode. In an atmospheric
neutrino experiment one may use the spectra as a
function of energy, zenith angle and even the inelasticity of the events [4]. ∆χ2 is the statistic most
often reported in the literature. We will now use
Eq. (8) to relate ∆χ2 to three quantities of interest.
What is the probability that the hierarchy which
yields the lowest χ2 is indeed the true hierarchy?
Let us first consider the case in which the normal hierarchy is manifested in nature. The correct
hierarchy will be determined by the experiment if
∆χ2 > 0. The statistic ∆χ2 is centered on theqposi-
tive value ∆χ2 with a standard deviation of 2 ∆χ2
q
and so the closest negative value is ∆χ2 /2 σ’s from
the mean, on one side of the distribution. For example, if ∆χ2 = 9 then a negative value will be excluded at 1.5σ’s on one side, yielding a probability of
successfully determining the hierarchy of 93.3%, considerably less than the 99.7% that one may naively
suspect just by taking the square root of ∆χ2 . More
3
generally, the probability of correctly determining
the hierarchy is
pc (∆χ2 ) =
s
1
1 + erf
2
∆χ2
.
8
(9)
In a more standard terminology, pc is the sensitivity to the hierarchy of the binary classification test
whose classification function is the sign of ∆χ2 . We
will refer to it simply as the “probability of success”
in what follows. In Ref. [5] the authors obtained a
similar result which differs as a result of their formula (5.11) for the probability of success for a given
∆χ2 .
If instead the inverted hierarchy is correct, the
calculation proceeds identically. As we have approximated σi to be hierarchy independent, the probability of success is identical for both hierarchies. This
is the quantity quoted in a number of studies such
as Refs. [6–8].
Second, what is the sensitivity of a typical experiment to the hierarchy?
A “typical experiment” is one in which |∆χ2 | obtains its average value |∆χ2 |. As the probability
of successfully determining the hierarchy is a monotonic function of ∆χ2 , the average value of ∆χ2
corresponds to the median value of the probability of success and so we will refer to such experiments as median experiments. The sensitivity of
the sign(∆χ2 ) test to the hierarchy is the probability that a fit to the correct hierarchy yields a lower
value of χ2 than one to the wrong hierarchy. Since
|∆χ2 | is fixed, this is simply the probability that
∆χ2 has the correct sign.
Again the calculation will proceed identically for
both hierarchies, so we may restrict our attention to
the case in which the normal hierarchy is correct.
Therefore the question is, given that ∆χ2 is positive
and ∆χ2 is equal to either ∆χ2 or −∆χ2 , what is
the probability pv that ∆χ2 = ∆χ2 .
Let L± be the likelihood, given the normal hierarchy, that ∆χ2 = ±∆χ2 , which is easily found
using the fact that ∆χ2 obeys a normal distribution
p
centered at ∆χ2 with standard deviation 2 ∆χ2 .
Using the fact that the distribution of ∆χ2 is odd
with respect to a change in the hierarchy, the Bayes
factor for the normal hierarchy is
L+
2
= e∆χ /2 .
L−
(10)
In particular, symmetric Bayesian priors assigning a
50% chance to each hierarchy yield a probability of
success of
pv =
1
L+
=
L+ + L−
1 + e−∆χ2 /2
(11)
for median experiments, those in which |∆χ2 | =
|∆χ2 |. For example, if ∆χ2 = 9 then the probability
that a median experiment correctly determines the
hierarchy will be 98.9%. While this is better than
the mean probability of success 93.3%, it still falls
noticeably short of the 99.7% which one might expect from Wilks’ theorem. In Ref. [9] it was noted
that the sensitivity (11) is equal to the posterior
probability of determining the correct hierarchy.
Given ∆χ2 determined either from Monte Carlo
simulations or from Asimov data, one may express
the sensitivity to the hierarchy expected at a median
experiment in terms of a number s of standard deviations σ. We will convert probabilities into standard
deviations using the one-sided Gaussian distribution
s
1
.
(12)
1 + erf √
pv (∆χ2 ) =
2
2
While the double-sided Gaussian is also often used
in the literature, we have checked that this choice of
convention has a small effect on our results.
Using Eq. (11) one now finds that the number of
σ’s of sensitivity is
!
2
√
1 − e−∆χ /2
−1
2
s(∆χ ) = 2 erf
.
(13)
1 + e−∆χ2 /2
This function is plotted in Fig. 1. For example, if
∆χ2 = 9 then a median experiment determines the
hierarchy with a sensitivity of 2.3σ instead of the 3σ
which might be expected. Had we insteaded opted
for the double-sided Gaussian convention for s, we
would have instead found 2.5σ.
A general Bayesian prior of b and 1 − b for the
normal and inverted hierarchies leads to a sensitivity
−∆χ2 /2 !
1
√
1
+
1
−
−1
b e
. (14)
s(∆χ2 ) = 2 erf
1
1 + b − 1 e−∆χ2 /2
4
s
7
6
5
4
3
2
1
10
20
30
40
50
DΧ2
FIG. 1: For a given ∆χ2 statistic determined from theoretical spectra, the black curve is the number s of σ’s
of sensitivity of the determination of the mass hierarchy
by a median experiment. A median experiment is one in
which |∆χ2 | obtains its median value. For comparison,
the dashed curve uses the two-sided definition of s and
the red curve is the square root of ∆χ2 .
Third, what is the probability p(s) that the hierarchy
will be determined with a sensitivity of at least sσ?
Note first that for a general experimental outcome
∆χ2 , the probability of success
pv =
=
L+
L+ + L−
2 −∆χ2 )2 /8∆χ2
e−(∆χ
e−(∆χ2 −∆χ2 )2 /8∆χ2 + e−(∆χ2 +∆χ2 )2 /8∆χ2
1
=
(15)
1 + e−∆χ2 /2
FIG. 2: The black, red, blue, purple and green curves
are the probability of a hierarchy determination with 1σ,
2σ, 3σ, 4σ and 5σ of sensitivity as a function of ∆χ2 .
The dashed line represents a median experiment, and its
intersections with the curves yield the same information
as Fig. 1.
responds not to a point but to a K-dimensional subset of the N -dimensional vector space in which y
is valued. The nuisance parameters xi are coordinates on these subsets. If the standard deviations σi
vary sufficiently slowly, then the inverse covariance
matrix defines a metric on this space. Recall that,
in the case of the normal (inverted) hierarchy, the
nuisance parameters x are chosen to minimize χ2N
(χ2I ). Geometrically, this minimization corresponds
to choosing the point in each subset which is closest to y, the coordinates of the point are the nuisance parameters which minimize the corresponding
χ2 statistic.
is independent of ∆χ2 . Using this fact, an argument
similar to those above leads to
In this framework, it is easy to combine data from
multiple
experiments. They can simply be added to
s
2
∆χ − 4arctanh erf √2
1
y
as
new
components. For example, one can combine
q
1 + erf
.
p(s) =
2
2
a
forecast
spectrum of Daya Bay II with a value of
8∆χ
the nuisance parameter θ13 determined at Daya Bay
(16)
and RENO by letting the first N − 2 components of
y correspond to the νe spectrum at Daya Bay II and
This function is plotted in Fig. 2.
the next two to the relative survival probabilities obParallel nuisance parameters
served at Daya Bay and RENO. The single nuisance
In reality there is no single experimental result
parameter θ13 yields a curve in the N -dimensional
yN or yI which is predicted by a given hierarchy.
space of observations for each hierarchy. The curve
The results also depend on a number of nuisance
is parameterized by θ13 . The last two coordinates of
parameters, such as the neutrino mass matrix pathis curve are simply the relative survival probabilirameters and the flux normalization of the source.
ties expected at Daya Bay and RENO as a function
We will assemble these nuisance parameters into a
of the parameter θ13 . The χ2 to be minimized is the
vector x = {xi }.
distance in the full N dimensional space, so it automatically combines determinations of θ13 at RENO,
If the final data consists of N numbers, such as
Daya Bay and Daya Bay II without the need for any
the number of events in N energy bins, and if there
penalty terms.
are K nuisance parameters, then each hierarchy cor-
5
Now let us make two approximations. First, we
approximate yN and yI to be linear (or affine) functions of the nuisance parameters x, so that the subspaces corresponding to theoretical predictions are
hyperplanes. The resulting models are called linear regression models. Model selection in one dimensional non-nested linear regression models was
first studied in Ref. [10]. Ref. [3] presented a statistic, generalizing ∆χ2 , which is Gaussian distributed
and distinguishes the models. The properties of this
statistic, in the case of linear regression models, were
determined in Ref. [11].
One may object that the spectra are not indeed
linear functions of the neutrino mass matrix. However the essential point is that they be approximately
linear in a regime whose size is the precision to which
an experiment can determine the nuisance parameters. This is a much easier criterion. Later we
will compare our analytical results to simulations in
which no such approximation is made, and we will
see that the resulting error is small.
For now we will make the further approximation
that one obtains the same value of ∆χ2 for any value
of the nuisance parameters chosen for the normal hierarchy if the nuisance parameters for the inverse
hierarchy are chosen so as to minimize ∆χ2I . In
other words, ∆χ2 , is independent of the choice of
the nuisance parameters so long as each χ2 is properly minimized. Geometrically this means that the
hyperplanes corresponding to the theoretical values
yN and yI are parallel.
Again assume that the normal hierarchy is correct. If xT is the true value of the nuisance parameters, then the theoretical values of the observables
yN will be linear functions yiN of xT . χ2N (χ2I ) is just
the minimum distance squared from the observations
yi = yiN + σi gi to the hyperplane corresponding to
the normal (inverted) hierarchy. The statistical fluctuation vector g = σi gi can be decomposed into a
two vectors, g⊥ and gk such that g⊥ is perpendicular to the hyperplanes and gk is parallel.
To determine χ2N or χ2I , one must choose the nuisance parameters x at which it is minimized. χ2 will
be minimized for the choice of nuisance parameters
xT + gk . In other words, the parallel part of g yields
the statistical error in the determination of the nuisance parameters. We have assumed that this error
is the same for both hierarchies. For this choice of
FIG. 3: In this figure the hierarchy is normal and ∆χ2 is
independent of the nuisance parameters. The two parallel lines are the expected measurements corresponding to
various values of the nuisance parameters for the two hierarchies. As a result of statistical fluctuations yiN + σi gi
is measured instead of the theoretical value yiN . The parallel part of g determines the effect of this fluctuation on
the best fit nuisance parameters and the perpendicular
part its effect on ∆χ2 .
nuisance parameters, the theoretical predictions for
k
k
yi are yiN + σi gi and yiI + σi gi in the cases of the two
hierarchies.
Now we are ready to calculate
∆χ2 = χ2I − χ2N
(17)
k
X (yi − y I − σi g )2 X (yi − y N − σi g k )2
i
i
i
i
=
−
2
2
σ
σ
i
i
i
i
=
X (y N + σi g ⊥ − y I )2 − (y N + σi g ⊥ − y N )2
i
i
i
i
=
X (y N − y I )2
i
i
σi2
i
=
i
i
i
σi2
X (y N − y I )2
i
i
σi2
i
+
X 2(y N − y I )
i
i
+
i
σi
X 2(y N − y I )
i
i
i
σi
gi⊥ .
gi .
In the last step we used the identity
X 2(y N − y I )
i
i
i
σi
k
gi = 0
(18)
which follows from the fact that, using the metric
1/σi2 , the vector (yiN − yiI ) is perpendicular to the
k
hyperplanes and so to σi gi .
Just as in Eq. (6), Eq. (17) describes a normal
2
distribution
q centered at ∆χ and with standard deviation 2 ∆χ2 . As a result, Eqs. (9) and (13) for
6
the probability of success and number of σ’s of sensitivity in the median experiment remain correct.
General nuisance parameters
Of course, ∆χ2 does depend on the nuisance parameters, and so the hyperplanes corresponding to
the theoretical data are not parallel and the above
results are only approximate. This fact was first
noted in Ref. [3], where it was concluded that as a
result ∆χ2 is not normally distributed. Its distribution leptokurtic.
This observation can be intuitively understood as
follows. Imagine that ∆χ2 depends so strongly upon
the nuisance parameters that a 1σ change in the nuisance parameters can reduce the sensitivity to the
hierarchy by several σ’s. As a result, most of the
experiments in which the hierarchy determination is
incorrect will be those in which the nuisance parameter is such that ∆χ2 is much smaller. Thus the
tails of the distribution of ∆χ2 will grow as a result
of those simulations in which the nuisance parameters take a nonstandard value. Clearly, this effect
is only present in simulations in which the nuisance
parameters are allowed to vary, and so simulations
that fix the nuisance parameters will yield values of
∆χ2 which, upon using Eq. (13), overestimate the
sensitivity to the hierarchy.
In Ref. [3] the author proposed a new statistic
which does follow a Gaussian distribution even in
this more general setting. However, in the case of
the hierarchy determinations planned in the near future, the angle between the hypersurfaces is actually
quite small. This is reflected in the observation [13]
that even a 1σ variation in θ13 only leads to about a
one third of a σ variation in the confidence. Therefore the approximate treatment of the ∆χ2 statistic
above is quite precise.
To illustrate this point, in Fig. 4 we present the
distribution of the ∆χ2 statistic in simulations which
combine the ν e spectrum measured at Daya Bay II
with MINOS’ 4% determination of the atmospheric
mass difference [12] and also with an optimistic 1%
forecast determination at an upgraded NOνA . All of
2
the nuisance parameters are fixed except for |∆M32
|,
2
2
which is chosen to minimize χI and χN as described
above. Following [14] we have considered 6 years
of exposure at a 20 kton detector for Daya Bay II
which detects ν e via inverse β decay on the 10% of
FIG. 4: The distribution of ∆χ2 in 50,000 experiments
with each hierarchy is shown, combining the data with
MINOS’ 4% determination of the atmospheric mass
splitting (red curve) and with an optimistic 1% determination at NOνA (black curve). The dashed curves
are the corresponding
q Gaussian distributions centered
at ∆χ2 with width 2
∆χ2 .
its mass consisting of free protons. The baselines
and reactor fluxes are identical to Ref. [14]. The
leptonic CP-violating angle δ is set to π/2.
We find that the distribution of ∆χ2 is indeed well
approximated by a Gaussian distribution
centered
q
at ∆χ2 with standard deviation 2 ∆χ2 . ∆χ2 ∼
11 (20) for Daya Bay II with MINOS (NOνA) yielding 2.6σ (3.9σ) of sensitivity at the median experiment, with a rate of successfully determining the
hierarchy of 94.6% (98.5%) in good agreement with
Eq. (9).
In Fig. 5 we present the distribution of ∆χ2 in simulations in which δ = 0 and π, although we always
fit to a δ = π/2 theoretical mode as the appearance mode at T2K and NOνA cannot distinguish 0
and π [13, 15]. At δ = 0 (π) we find ∆χ2 = 17
(22) yielding 3.5σ (4.2σ) of sensitivity, confirming
the expectations of Ref. [16]. Despite the fact that
the model used for fitting differs from that used to
generate the data, the distribution of ∆χ2 described
in this paper approximates the simulated data well.
Frequentist confidence
A frequentist notion of confidence can be made
well defined even in this context [17, 18]. Imagine
that an experiment measures ∆χ2 . This differs from
the expected ∆χ2 for the normal (inverted) hierarchy by |∆χ2 ∓ ∆χ2 | which corresponds to a frequentist incompatibility of
|∆χ2 ∓ ∆χ2 |
q
2 ∆χ2
(19)
7
FIG. 5: As in Fig. 4, but using only a 1% determination of the atmospheric mass splitting. The simulations
reported in the red and black curves use δ = 0 and π
respectively, although the fitting is always performed assuming δ = π/2. As can be seen, if δ = π, the hierarchy
determination will be more reliable [13, 14].
σ’s.
In particular, in the case of the median experiment
with the true hierarchy, ∆χ2 = ∆χ2 . Therefore
thepinverted hierarchy is excluded at a confidence
of ∆χ2 σ’s. In this sense it might be tempting
to ignore the results of this paper
p and to identify
the frequentist incompatibility ∆χ2 with the confidence in the hierarchy determination expected in a
median experiment.
While such a definition of confidence is welldefined, it has a very unattractive feature. Consider an experiment with an expected ∆χ2 = 16.
The general arguments in this note imply that if
the hierarchy is normal (inverted) then ∆χ2 will follow a Gaussian distribution centered on 16 (−16)
with a width of σ = 8. In the frequentist sense,
the median experiment will yield |∆χ2 | = 16 and so
is incompatible with the false hierarchy with 4σ of
confidence while the 98th percentile experiment will
yield ∆χ2 = 0 and so is incompatible with the false
hierarchy with 2σ of confidence. An identification of
the sensitivity to the hierarchy with the frequentist
incompatibility would therefore imply that even the
98th percentile of experimental outcomes will yield
a 2σ sensitivity to the hierarchy.
Now consider the somewhat unlikely case in which
due to statistical fluctuations, the results of this experiment are indeed in the 98th percentile, so that
∆χ2 = 0. Now the experimentalist will be asked
to provide the hierarchy with 2σ of confidence. Of
course he cannot, the experiment has not yielded
any preference for either hierarchy, even at the 2σ
level that was promised for a 98th percentile experi-
ment when the funding was requested. In this sense,
the identification of the frequentist incompatibility
with the confidence in the hierarchy determination
is misleading: the confidence can be nonzero even
when no information is obtained.
The basic problem with the application of the frequentist notion of confidence in this example is that
both hierarchies have been ruled out with equal confidence. Ruling out both hierarchies can be useful
when searching for new physics, testing assumptions
regarding backgrounds, etc. Although in that case
one would use a χ2 test and not a ∆χ2 test, as the
latter is insensitive to effects that affect both hierarchies similarly. However, for the purpose of determining which hierarchy is manifested in nature it is
reasonable to assume that one of the hierarchies is
indeed correct. In this case one is led to the Bayesian
constructions described in this note.
Acknowledgement
We have benefited beyond measure from correspondence with Xin Qian, Yoshitaro Takaesu and Tyce
DeYoung. We thank Amir Nawaz Khan for identifying two typos in an earlier version of this paper.
JE is supported by the Chinese Academy of Sciences
Fellowship for Young International Scientists grant
number 2010Y2JA01. EC and XZ are supported in
part by the NSF of China.
[1] X. Qian, A. Tan, W. Wang, J. J. Ling, R. D. McKeown and C. Zhang, “Statistical Evaluation of
Experimental Determinations of Neutrino Mass
Hierarchy,” Phys. Rev. D 86 (2012) 113011
[arXiv:1210.3651 [hep-ph]].
[2] S. S. Wilks, “The Large-Sample Distribution of the
Likelihood Ratio for Testing Composite Hypotheses” Ann. Math. Stat. 9, No. 1 (1938), 60-62.
[3] D. R. Cox, “Tests of Separate Families of Hypotheses,” Proc. Fourth Berkeley Symp. on Math. Statist.
and Prob. 1 (1961), 105-123.
[4] M. Ribordy and A. Y. Smirnov, “Improving the
neutrino mass hierarchy identification with inelasticity measurement in PINGU and ORCA,”
arXiv:1303.0758 [hep-ph].
[5] S. -F. Ge, K. Hagiwara, N. Okamura and
Y. Takaesu, “Determination of mass hierarchy with
8
[6]
[7]
[8]
[9]
[10]
[11]
[12]
medium baseline reactor neutrino experiments,”
arXiv:1210.8141 [hep-ph].
L. Zhan, Y. Wang, J. Cao and L. Wen, “Experimental Requirements to Determine the Neutrino Mass
Hierarchy Using Reactor Neutrinos,” Phys. Rev. D
79 (2009) 073007 [arXiv:0901.2976 [hep-ex]].
X. Qian, D. A. Dwyer, R. D. McKeown, P. Vogel, W. Wang and C. Zhang, “Mass Hierarchy
Resolution in Reactor Anti-neutrino Experiments:
Parameter Degeneracies and Detector Energy Response,” PRD, 87, 033005 (2013) [arXiv:1208.1551
[physics.ins-det]].
E. Ciuffoli, J. Evslin and X. Zhang, “Mass Hierarchy Determination Using Neutrinos from Multiple
Reactors,” JHEP 1212 (2012) 004 [arXiv:1209.2227
[hep-ph]].
M. Blennow, “On the Bayesian approach to neutrino
mass ordering,” arXiv:1311.3183 [hep-ph].
H. Hotelling, “The Selection of Variates for Use
in Prediction with Some Comments on the General Problem of Nuisance Parameters,” Ann. Math.
Statist. Volume 11, 3 (1940) 271-283
M. H. Pesaran, “On the General Problem of Model
Selection,” Rev. of Econ. Stud. 41 (1974) 153-171.
H. Nunokawa, S. J. Parke and R. Zukanovich Funchal, “Another possible way to determine the neutrino mass hierarchy,” Phys. Rev. D 72 (2005)
013009 [hep-ph/0503283].
[13] E. Ciuffoli, J. Evslin and X. Zhang, “Optimizing
Medium Baseline Reactor Neutrino Experiments,”
arXiv:1302.0624 [hep-ph].
[14] Y. -F. Li, J. Cao, Y. Wang and L. Zhan, “Unambiguous Determination of the Neutrino Mass Hierarchy Using Reactor Neutrinos,” arXiv:1303.6733
[hep-ex].
[15] H. Minakata and S. J. Parke, “Correlated, Precision Measurements of θ23 and ∆ using only
the Electron Neutrino Appearance Experiments,”
arXiv:1303.6178 [hep-ph].
[16] H. Minakata, H. Nunokawa, S. J. Parke and
R. Zukanovich Funchal, “Determining neutrino
mass hierarchy by precision measurements in
electron and muon neutrino disappearance experiments,” Phys. Rev. D 74 (2006) 053008
[hep-ph/0607284].
[17] Y. Takaesu, “Mass Hierarchy Using Medium Baseline Detector,” presented at the International Workshop on RENO-50.
[18] A. U. Abeysekara, R. Alfaro, C. Alvarez,
J. D. lvarez, R. Arceo, J. C. Arteaga-Velzquez,
H. A. A. Solares and A. S. Barber et al., “Sensitivity of the High Altitude Water Cherenkov Detector to Sources of Multi-TeV Gamma Rays,”
arXiv:1306.5800 [astro-ph.HE].
| 10math.ST
|
T. S. Rappaport, G. R. MacCartney, Jr., S. Sun, H. Yan, S. Deng, “Small-Scale, Local Area, and Transitional Millimeter Wave Propagation
for 5G Communications,” in IEEE Transactions on Antennas and Propagation, Special Issue on 5G, Nov. 2017.
Small-Scale, Local Area, and Transitional Millimeter Wave
Propagation for 5G Communications
Theodore S. Rappaport, George R. MacCartney Jr., Shu Sun, Hangsong Yan, and Sijia Deng
arXiv:1707.07816v2 [cs.IT] 15 Aug 2017
Abstract—This paper studies radio propagation mechanisms that
impact handoffs, air interface design, beam steering, and MIMO for
5G mobile communication systems. Knife edge diffraction (KED)
and a creeping wave linear model are shown to predict diffraction
loss around typical building objects from 10 to 26 GHz, and human
blockage measurements at 73 GHz are shown to fit a double knifeedge diffraction (DKED) model which incorporates antenna gains.
Small-scale spatial fading of millimeter wave received signal voltage
amplitude is generally Ricean-distributed for both omnidirectional
and directional receive antenna patterns under both line-of-sight
(LOS) and non-line-of-sight (NLOS) conditions in most cases, although the log-normal distribution fits measured data better for the
omnidirectional receive antenna pattern in the NLOS environment.
Small-scale spatial autocorrelations of received voltage amplitudes
are shown to fit sinusoidal exponential and exponential functions for
LOS and NLOS environments, respectively, with small decorrelation
distances of 0.27 cm to 13.6 cm (smaller than the size of a handset)
that are favorable for spatial multiplexing. Local area measurements
using cluster and route scenarios show how the received signal
changes as the mobile moves and transitions from LOS to NLOS
locations, with reasonably stationary signal levels within clusters.
Wideband mmWave power levels are shown to fade from 0.4 dB/ms
to 40 dB/s, depending on travel speed and surroundings.
Index Terms—Millimeter wave, diffraction, human blockage,
small-scale fading, spatial autocorrelation, propagation, channel transition, mobile propagation, MIMO, spatial consistency
I. I NTRODUCTION
Driven mainly by the pervasive usage of smartphones and
the emergence of the Internet of Things (IoT), future 5G mobile
networks will become as pervasive as electrical wiring [1] and will
offer unprecedented data rates and ultra-low latency [2]–[4]. For
the first time in the history of radio, millimeter-wave (mmWave)
frequencies will be used extensively for mobile and fixed access,
thus requiring accurate propagation models that predict how the
channel varies as people move about. Remarkable progress has
been made in modeling large-scale propagation path loss at
mmWave frequencies [4]–[14], and it is well understood that for
an assumption of unity gain antennas across all frequencies, Friis
equation predicts that path loss is greater at mmWave compared to
today’s UHF/microwave cellular systems [4]–[6], [8]–[10], [15].
Also, rain and atmospheric attenuation are well understood, and
reflection and scattering are more dominant than diffraction at
mmWave bands [4], [16]–[19].
Broadband statistical spatial channel models (SSCMs) and
simulators that faithfully predict the statistics of signal strength,
and the number and direction of arrival and departure of multipath
components, have been developed by a consortium of companies
and universities [20] and from measurements in New York City
This material is based upon work supported by the NYU WIRELESS Industrial
Affiliates program, NSF research grants 1320472, 1302336, and 1555332, and
funding from Nokia. The authors acknowledge Amitava Ghosh of Nokia for his
support of this work. The authors thank Yunchou Xing, Jeton Koka, Ruichen Wang,
and Dian Yu for their help in conducting the measurements. The authors also thank
Prof. Henry Bertoni for his insights and advisement in diffraction theory.
T. S. Rappaport (email: [email protected]), G. R. MacCartney, Jr., S. Sun, H. Yan,
and S. Deng are with NYU WIRELESS Research Center, NYU Tandon School of
Engineering, 9th Floor, 2 MetroTech Center, Brooklyn, NY 11201.
[21]. These models are being used to develop air-interfaces for
5G systems [22] [23]. Elsewhere in this issue, [4] summarizes
standard activities for large-scale mmWave channel modeling.
Little is known, however, about the small-scale behavior of
wideband mmWave signals as a mobile user moves about a local
area. Such information is vital for the design of handoff mechanisms and beam steering needed to rescue the communication
link from deep fades. In this paper, propagation measurements
investigate diffraction, human blocking effects, small-scale spatial
fading and autocorrelation, local area channel transitions, and
stationarity of signal power in local area clusters at frequencies
ranging from 10 to 73 GHz. Diffraction measurements for indoor
and outdoor materials at 10, 20, and 26 GHz are presented
in Section II, and two diffraction models, i.e., the knife edge
diffraction (KED) model and a creeping wave linear model, are
used to fit the measured results. We predict the rapid signal
decay as a mobile moves around a diffracting corner. In Section
III, measurements at 73 GHz are presented and a double knifeedge diffraction (DKED) antenna gain model that uses directional
antenna patterns is shown to describe minimum and maximum
fade depths caused by human blockage. Small-scale fading and
correlation studies at 73 GHz are presented in Section IV, where
small-scale fading distributions and spatial autocorrelations of
received voltage amplitudes in LOS and NLOS environments
with omnidirectional and directional antennas are provided and
analyzed. In Section V, route and cluster scenarios are used to
study local area channel transitions and stationarity, where analysis
for channel transition from a NLOS to a LOS region and local
area path loss variations are provided. Conclusions are given in
Section VI. Channel models given here may be implemented
for small-scale propagation modeling and real-time site-specific
mobile channel prediction and network control [24].
II. D IFFRACTION M EASUREMENTS AND M ODELS
A. Introduction of Diffraction Measurements and Models
Accurate characterization of diffraction at cmWave and
mmWave frequencies is important for understanding the rate of
change of signal strength for mobile communications since future
5G mmWave systems will have to rely less on diffraction as a
dominant propagation mechanism [6], [8]. Published indoor and
outdoor diffraction measurements show that diffraction has little
contribution to the received signal power using various materials
and geometries (edges, wedges, and circular cylinders) at 60 GHz
and 300 GHz [25]–[27]. It was shown that the KED model agreed
well with diffraction measurements for cuboids at 300 GHz [28],
vegetation obstacles at 2.4, 5, 28, and 60 GHz [29], and for
human blocking at 60 GHz [13]. Apart from the KED model,
uniform theory of diffraction (UTD) models are also used. An
overview of the Geometrical Theory of Diffraction (GTD) and
the UTD are provided in [30], as well as their utility to solve
practical problems. Besides the KED and UTD models, Mavridis
et al. presented a creeping wave linear model [31] to estimate
the diffraction loss by a perfectly conducting or lossy circular
cylinder for both transverse-magnetic (TM) and transverse-electric
(TE) polarizations at 60 GHz. In the following sub-sections, we
describe diffraction measurements conducted in 2015 around the
engineering campus of New York University [17], where the
frequency dependency of diffraction at 10, 20, and 26 GHz in
realistic indoor and outdoor scenarios was investigated to yield
simple yet accurate diffraction models for wireless planning.
B. Diffraction Measurement System
Diffraction measurements were performed by transmitting a
continuous wave (CW) signal generated by an Agilent E8257D
PSG analog signal generator through a pyramidal horn antenna at
the transmitter (TX). An identical horn antenna was used at the
receiver (RX) to receive signal energy around a corner test material
(e.g. a stone pillar). The RX antenna was fed to an E4407B
ESA-E spectrum analyzer that measured received power which
was subsequently recorded on a laptop with LabVIEW software.
During the measurements, the TX antenna was set one meter from
the knife edge, sufficiently in the far field, and was fixed to a tripod
and aimed at the knife edge, whereas the RX antenna was set 2
meters from the knife edge (also in the far field) and was fixed
on a rotatable gimbal attached to a translatable linear track that
was made to from an approximate arc around the knife edge (see
Fig. 1). Diffraction loss was measured at 10, 20, and 26 GHz
using identical pairs of antennas at the TX and RX to measure
each frequency, separately. For each frequency, Table I lists the
flange type, antenna gain, and half-power beamwidth (HPBW) of
the antenna pairs used. The TX and RX were stationed at a wide
range of angles, both in the lit and shadowed region, and the horns
always had their boresights focused on the corner knife-edge of
the indoor and outdoor materials that were studied. More details
regarding the measurement system are given in [17], [32].
C. Diffraction Measurement Description
The indoor measurements were performed at 90◦ (right-angle)
wall corners made of drywall, wood, and semi-transparent plastic
board with 2 cm thickness. Outdoor measurements studied one
rounded stone pillar corner and one right-angle marble building
corner. During the measurements, the TX and RX were placed
on either side of the corner (knife edge) of the test material. A
diagram of the corner diffraction geometry is shown in Fig. 1
where d1 is the distance between the TX and the corner knifeedge, and d2 is the distance between the corner knife-edge and the
RX. Both d1 (1 m) and d2 (2 m) remained constant throughout
the diffraction measurement campaign. The β and α values are the
incident and diffraction angles, respectively, where two (outdoor)
or three (indoor) fixed values between 10◦ and 39◦ were chosen
for β. The RX antenna was mounted on a motorized linear track
(see Fig. 1) that translated in step increments of 0.875 cm, which
corresponds to approximately a 0.5◦ increment in diffraction angle
(α) for each step increment. At each step increment, the RX
antenna was adjusted to point perfectly towards the knife-edge
TABLE I: Antenna parameters used diffraction measurements.
Measured
Frequency
10 GHz
20 GHz
26 GHz
Flange
Type
WR-75
WR-51
WR-28
Antenna
Gain
20 dBi
20 dBi
24.5 dBi
HPBW
(Az./El.)
17◦ /17◦
17◦ /17◦
10.9◦ /8.6◦
Far Field
Distance
0.47 m
0.46 m
0.83 m
corner. The length of the track was 35.5 cm and was used to
measure a 20◦ swath of diffraction angles over the entire length
of the track. At each measurement location, five consecutive linear
tracks (see Fig. 1) were used to provide a 100◦ diffraction angle
arc around the corner which covered a broad range of the shadow
region where the TX antenna is shadowed by the corner object
with respect to RX antenna. Additionally, a smaller range of
diffraction angles was measured in the lit region where the TX
and RX antennas were in view of each other but were not pointed
at each other since they were always aimed at the corner.
At each location, prior to the diffraction measurements, a free
space calibration in an open area with both antennas pointed at
each other on boresight was conducted with a 3 m (d1 + d2 = 3
m) transmitter-receiver (T-R) separation distance to provide a free
space power reference for each frequency. The diffraction loss was
then obtained by calculating the difference between the measured
received signal power at each step increment of the RX antenna
during the diffraction measurements and the free space calibration
received power (the TX and RX antenna gains were deducted from
all power measurements).
D. Theoretical Diffraction Models
1) KED Model: The KED model is suitable for applications
with sharp knife edges and has a simple form yet high prediction
accuracy [33]. In general, diffraction loss over complex and
irregular obstructions can be difficult to calculate, but typical
obstructions for 5G wireless will involve common building partitions which are generally simple in nature and with dimensions
that appear infinite at such small wavelengths, such as a wall or
building corner, thus justifying simple diffraction models.
The diffraction loss (as compared to free space) is obtained by
calculating the electric field strength Ed [V/m] at the RX based on
the specific Fresnel diffraction parameter ν [34]. The ratio of Ed
and the free space field strength E0 can be computed by summing
all the secondary Huygens’ sources in the knife edge plane and
is given by [17], [34]:
1+j
Ed
= F (ν) =
E0
2
∞
Z
2
e−j(π/2)t dt
(1)
ν
where F (ν) is the complex Fresnel integral and ν is the Fresnel
diffraction parameter is defined as [34]:
s
ν=h
2(d1 + d2 )
=α
λd1 d2
s
2d1 d2
λ(d1 + d2 )
(2)
RX
Track
TX
β
h
d2
d1
RX Locations
d2
d1
TX Location
α
RX Linear Track
RX
Track
Fig. 1: Top view of the corner diffraction geometry [17].
E(α, d2 , k) ∼ Ei e−jkαRh √
kd2
∞
X
Dp Rh · exp(−ψp α)
(5)
The expression for the diffraction power loss in dB based on the
creeping wave linear model is given by [17], [32]:
(6)
In order to facilitate the computation of G(α), a simple linear
model (7) based on minimum mean squared error (MMSE) estimation between the model and measured data was proposed in [36]
to estimate the diffraction loss caused by a curved surface at a
single frequency, based on the creeping wave linear model [17],
[32]:
P (α) = n · α + c
(7)
where n is the linear slope of diffraction loss calculated by MMSE
for each specific frequency and object radius, and c is the anchor
point set to 6.03 dB, the diffraction loss estimated by KED with
diffraction angles α = β = 0◦ .
E. Indoor Diffraction Results and Analysis
The indoor diffraction loss measurements for the drywall corner,
wooden corner, and plastic board are plotted with the KED model
(3) at 10, 20, and 26 GHz as a function of the diffraction angle in
Fig. 2. Three different TX incident angles were used to measure
diffraction loss for each frequency. Since the measurements in [17]
were conducted with the TX and RX along a constant radius
Shadow Region
Lit Region
30
20
0
-40
-30
-20
-10
0
10
20
30
40
50
60
70
Diffraction Angle α (°)
70
Relative Loss (dB)
60
50
40
Measurement Data at 10, 20, & 26 GHz for Wooden Corner
w/ V-V Polarization for All Incident Angles
Relative Loss at 10 GHz
Relative Loss at 20 GHz
Relative Loss at 26 GHz
KED at 10 GHz
KED at 20 GHz
KED at 26 GHz
Shadow Region
Lit Region
30
20
10
0
-40
-30
-20
-10
0
10
20
30
40
50
60
Diffraction Angle α (°)
70
60
where Ei is the incident field from the TX that impinges upon the
obstruction, Rh is the radius of cylinder for the diffraction corner,
k is the wave number of the carrier frequency, α is the diffraction
angle, d2 is the distance between the launch point at the rounded
corner edge and the RX, Dp is the excitation coefficient and ψp
is the attenuation constant. Due to the computational complexity
of (4), a reasonable approximation for E on a flat surface can be
obtained by considering only the p = 1 term in (4), which is given
by [17], [31], [32], [35], [36]:
G(α)[dB] = −P (α)[dB] = 20 log10 E
40
Relative Loss at 10 GHz
Relative Loss at 20 GHz
Relative Loss at 26 GHz
KED at 10 GHz
KED at 20 GHz
KED at 26 GHz
10
(4)
p=1
E ∼ Ei Dp Rh · exp(−ψp α)
50
Measurement Data at 10, 20, & 26 GHz for Drywall Corner
w/ V-V Polarization for All Incident Angles
(3)
where P (ν) is the power loss of the diffracted signal for the value
of ν, compared to free space case for the same distance.
2) Convex Surfaces based Diffraction Model: Although the
KED model has broad applications for various geometries, it
requires the diffraction corner to be in the shape of a sharp
knife edge and does not account for the radius of curvature of an
obstacle. When a diffraction corner is rounded in shape, such as
a stone pillar corner (it resembles a circular cylinder), a creeping
wave linear model can better predict diffraction loss [31], [35]. A
creeping ray field at the RX antenna behind the circular object for
an incident plane wave is given by [35]:
e−jkd2
60
Relative Loss (dB)
G(ν)[dB] = −P (ν)[dB] = 20 log10 |F (ν)|
70
Relative Loss (dB)
where λ is the wavelength, α is the diffraction angle, h is the
effective height (or width) of the obstructing screen with an infinite
width (or height) placed between the TX and RX at the distances
d1 and d2 , respectively, under the conditions that d1 , d2 h, and
d1 , d2 λ. These conditions were met for 10, 20 and 26 GHz
measurements in both the indoor and outdoor environments, as
shown in Fig. 1.
Based on (1) and (2), the diffraction power gain G(ν) in dB
produced in a knife edge by the KED model is expressed as [17],
[34]:
50
40
Measurement Data at 10, 20, & 26 GHz for Plastic Board
w/ V-V Polarization for All Incident Angles
Relative Loss at 10 GHz
Relative Loss at 20 GHz
Relative Loss at 26 GHz
KED at 10 GHz
KED at 20 GHz
KED at 26 GHz
Shadow Region
Lit Region
30
20
10
0
-40
-30
-20
-10
0
10
20
30
40
50
60
70
Diffraction Angle α (°)
Fig. 2: Diffraction measurements for the indoor drywall corner (top),
wooden corner (middle), and plastic board (bottom) compared to the KED
model at 10, 20 and 26 GHz [17].
(d1 and d2 , respectively) from the corner of each test material,
diffraction loss can be represented as a function of the diffraction
angle α in (2) for each frequency (or wavelength λ), without the
need for the TX incident angle.. Fig. 2 shows diffraction loss
increases to approximately 30 dB as compared to free space as
the RX antenna moves from the edge of the lit region (0◦ ) into the
shadow region (20◦ ) for the drywall corner and wooden corner,
respectively. This demonstrates the rapid signal degradation that
occurs when diffraction is the primary propagation mechanism in
mobile systems. Note the good fit between the drywall diffraction
measurements and the simple KED model in the early and deep
shadow regions for all three frequencies, while the KED model
overestimates diffraction loss by 5-10 dB compared with the
wooden corner diffraction measurements at 10, 20, and 26 GHz.
As for the plastic board material, the KED model overestimates
the measured diffraction loss at small diffraction angles near the
lit/shadow region boundary (from 0◦ to 30◦ ), and underestimates
diffraction loss in portions of the deep shadow region (diffraction
angles greater than 30◦ ), most noticeably at 20 GHz and 26 GHz.
Fig. 2 indicates slightly less loss occurs at lower frequencies,
implying frequency dependence, where divergence from pure
diffraction theory can be attributed to reflections and scattering
in the indoor environment and potential transmissions through the
test materials. In general, the observations match the KED model
trend. Oscillation patterns of the measured data in the shadow
region observed in Fig. 2 indicate that the measured diffraction
signal includes corner diffraction, penetration through the material,
and partial scattering in the measurement environment. We note
that the diffraction loss observed in the lit region is due to
the measurement procedure where the TX and RX antennas
were never aligned on boresight (except at 0◦ ) since they were
constantly pointed directly at the knife-edge corner.
Penetration loss was measured for typical building materials
in the same indoor environment at 73 GHz and showed that copolarized penetration loss ranged from 0.8 dB/cm (lowest loss
material – drywall) to 9.9 dB/cm (highest loss material – steel
door), with standard deviation σ about the average loss ranging
from 0.3 dB/cm (lowest σ – drywall) to 2.3 dB/cm (highest σ –
clear glass). Additional details can be found in Table II of [37].
F. Outdoor Diffraction Results and Analysis
The outdoor marble corner and stone pillar measurement results
are shown in Fig. 3 with the MMSE creeping wave linear models
(7) at 10, 20, and 26 GHz. It can be seen from Fig. 3 that
(7) predicts a linearly increasing diffraction loss into the deeply
shadowed region, as opposed to the leveling off seen in Fig. 2 from
(3). Fig. 3 also shows the outdoor stone pillar measurement results
70
Outdoor Measurement Data at 10, 20, & 26 GHz for Pillar
w/ V-V Polarization for All Incident Angles
Relative Loss (dB)
60
50
40
Lit Region
Shadow Region
Relative Loss at 10 GHz
Relative Loss at 20 GHz
Relative Loss at 26 GHz
n10 GHz = 0.75
30
20
10
n20 GHz = 0.88
n26 GHz = 0.96
0
-30
-20
-10
0
10
20
30
40
50
60
70
Diffraction Angle α (°)
Outdoor Measurement Data at 10, 20, & 26 GHz for Marble Corner
w/ V-V Polarization for All Incident Angles
Relative Loss (dB)
60
50
40
Lit Region
Shadow Region
30
Relative Loss at 10 GHz
Relative Loss at 20 GHz
Relative Loss at 26 GHz
n10 GHz = 0.62
20
10
n20 GHz = 0.77
n26 GHz = 0.96
0
-30
-20
-10
0
10
20
30
40
50
60
Diffraction Angle α (°)
Relative Loss vs Diffraction Angle at 10 GHz
for Pillar w/ V-V Polarization
Relative Loss (dB)
60
50
40
30
Diffraction Loss for 21° Incident Angle
Diffraction Loss for 35° Incident Angle
Knife Edge Diffraction Model at 10 GHz
MMSE Linear Fit with σ = 2.75 dB
Lit Region
at 10 GHz compared to the KED model and creeping wave linear
model, where the creeping wave linear model provides a better fit
to the measured relative diffraction loss than the KED model, in
the shadow region. Diffraction loss for each frequency is plotted
as a function of diffraction angle and includes the measured loss at
two TX incident angles. The measured data matches well with the
creeping wave linear model derived via MMSE for each frequency,
in the shadow region. The creeping wave linear model slopes are
0.75, 0.88, and 0.96 for the stone pillar measurements and 0.62,
0.77, and 0.96 for the marble corner measurements at 10, 20, and
26 GHz, respectively. Fig. 3 shows outdoor obstructions cause an
even greater loss when a mobile moves into a deeply shadowed
region, showing as much as 50 dB of loss when solely based on
diffraction. Based on the increase in slope values with frequency,
it is easily seen that diffraction loss increases with frequency
in the outdoor environment. The simple creeping wave linear
model (7) fits well with the measured data and has a much lower
standard deviation compared with the KED model [17], indicating
a good overall match between the creeping wave linear model and
measured data. Similar to the indoor environment diffraction loss
measurements, the high diffraction loss in the lit region is caused
by the TX and RX pointing off boresight towards the corner of
the test material.
When comparing the slope values of the two outdoor materials,
the rougher surface (stone) with a slightly rounded edge has a
greater slope (greater attenuation) for identical frequencies as
compared to the smoother surface (marble) straight edge. We note
that using the MMSE method to derive the typical slope values
instead of calculating the theoretical slope value provides system
engineers a useful parameter while reducing the computational
complexity of the diffraction model. The simple slope values are
useful for mobile handoff design since a mobile at 20 GHz would
see approximately 21 dB of fading when moving around a marble
corner from a diffraction angle of 0◦ to 20◦ . For a person moving
at a speed of 1 m/s, this results in about a 21 dB/s initial fade rate
from LOS to NLOS. Fig. 3 shows more oscillation patterns in the
marble corner measurements in the deeply shadowed region than
in the stone pillar measurements, which indicates more prevalent
scattering when measuring the marble corner. We note that the
diffraction loss for outdoor building corners at mmWaves using
directional antennas can be better predicted with a simple linear
model (creeping wave), whereas the KED model agrees well with
indoor diffraction loss measurements. Both the creeping wave and
KED models can be used in network simulations and ray-tracers
with short computation time and good accuracy while considering
approximately 5-6 dB standard deviation (see [17] for mean error
and standard deviation values between the measured data and
models derived from the data). For cross-polarized diffraction
measurement results, see [32].
III. H UMAN B LOCKAGE M EASUREMENTS AND M ODELS
Shadow Region
A. Introduction of mmWave Human Blockage
20
10
Diffraction Loss = 0.75 * α + 6.03 dB
0
-30
-20
-10
0
10
20
30
40
50
60
70
Diffraction Angle α (°)
Fig. 3: Measured diffraction loss for the outdoor stone pillar (top) and
marble corner (middle) with creeping wave linear models at 10, 20, and
26 GHz, and stone pillar measurement results compared to the KED and
the creeping wave linear models at 10 GHz (bottom) [17].
In mmWave communications, attenuation caused by human
blockage (when a human body blocks the LOS path between
a transmitter and receiver) will greatly impact cellphone link
performance, and phased array antennas will need to adapt to
find other propagation paths when blocked by a human [15], [38].
This is in sharp contrast to omnidirectional antennas used at sub-6
GHz frequencies. Understanding this severe blockage effect and
employing appropriate models for mobile system simulation are
important for properly designing future mmWave antennas and
beam steering algorithms [22], [39], [40]. One of the earliest
human blockage measurement studies [41] was conducted at 60
GHz for indoor wireless local area networks (WLAN) with T-R
separation distances of 10 m or less in a typical office environment.
Results showed that the signal level decreased by as much as 20
dB when a person blocked the direct path between omnidirectional
TX and RX antennas, with deep fades reaching 30 dB using
directive antennas [42], [43]. In addition to human blockage
measurements at 60 GHz, [44] provided a human induced cluster
blockage model based on ray tracing [45], a random walk model,
and a diffraction model from contributions to 802.11ad [46], [47].
The probability distributions for four parameters (duration, decay
time, rise time, and mean attenuation) were generated by the
human-induced cluster blockage model and were validated with
the Kolmogorov-Smirnov test [44]. The mobile and wireless communications enablers for the twenty-twenty information society
(METIS) and 3rd Generation Partnership Project (3GPP) also
proposed their own human blockage models [20], [48], [49] based
on KED models for one or multiple edges. In the following subsections, 73 GHz human blockage measurements and an improved
human blockage model are described.
B. Human Blockage Measurement System
A real-time spread spectrum correlator channel sounder system
described in [38] was used for the human blockage measurements.
A pseudorandom noise (PN) sequence of length 2047 was generated at baseband with a field programmable gate array (FPGA)
and high-speed digital-to-analog converter (DAC). This wideband
sequence was modulated to an intermediate-frequency (IF) of
5.625 GHz which was then upconverted to a center frequency of
73.5 GHz (1 GHz null-to-null RF bandwidth). The transmit power
at the TX was -5.8 dBm, and identical TX and RX horn antennas
with 15◦ azimuth and elevation (Az./El.) HPBW and 20 dBi of
gain were used. The received signal was downconverted to IF, and
then demodulated to its in-phase (I) and quadrature (Q) baseband
signals that were sampled at 1.5 Giga-Samples (GS/s) via a highspeed analog-to-digital converter (ADC). The digital signals were
then correlated in software via a Fast Fourier Transform (FFT)
matched filter to create the I and Q channel impulse response
(CIR), and subsequent power delay profiles (PDPs) (I 2 +Q2 ). The
system had a multipath resolution of 2 ns and an instantaneous
dynamic range of 40 dB and could capture PDPs with a minimum
consecutive snapshot interval of 32.752µs to measure rapid fading.
Power was computed as the area under the PDP, and the voltage
was found as the square root of power [34].
C. Blockage Measurement Environment Description
Human blockage measurements were conducted in an open
laboratory using a 5 m T-R separation distance. High gain narrowbeam horn antennas were used at the TX and RX with both
antenna heights set to 1.4 m relative to the ground and aligned
on boresight. Nine measurements were recorded with a human
blocker walking at a perpendicular orientation through the LOS
path between the TX and RX at an approximate 1 m/s speed. This
perpendicular walk was performed at 0.5 m increments between
the TX and RX starting at 0.5 m from the TX for measurement
one, and 4.5 m from the TX for measurement nine, as depicted
in Fig. 4. We note that 0.5 m is the typical distance for a
5m
1
TX
2
3
4
5
6
7
8
9
RX
0.5 m 1.0 m 1.5 m2.0 m 2.5 m 3.0 m 3.5 m 4.0 m 4.5 m
Fig. 4: Depiction of nine measurement locations where at each indicator
separated by 0.5 m, the human blocker walked at a perpendicular
orientation between the TX and RX antennas [38].
h1
Screen Blocker
w1
A
B
w2
h2
(a) 3D screen projection.
w1
A
αw1
D2w1
w
D1w1
TS
S
SR
D2w2
w2
αw2
B
D1w2
(b) Top view of screen projection.
Fig. 5: (a) 3D and (b) top-down projection of screen blocker.
person to view the screen of a smartphone. For each of the nine
perpendicular walks, 500 PDPs were recorded per second in a fivesecond window, resulting in 2500 PDPs for each measurement.
The dimensions of the human blocker were: bbreadth = 0.47 m;
bdepth = 0.28 m; bheight = 1.80 m. Detailed information about the
experiment is given in [38], [50].
D. KED Blockage Model
Knife-edge diffraction is commonly used to model human
blockage by modeling a thin rectangular screen as the blocker [20],
[48], [49], [51]. In DKED modeling, the rectangular screen is
considered infinitely high, such that diffraction loss only occurs
from the two side edges of the body. A typical screen blocker
with height h and width w is displayed in Fig. 5 from both a 3D
and top view screen projection. The dimensions for the top view
of the screen are defined as follows: w is the width of the screen
def
def
def
def
from w1 to w2; r = AB; w = w1w2; h = h1h2; T S = AS;
def
def
def
def
SR = SB; D2w1 = Aw1; D1w1 = w1B; D2w2 = Aw2;
def
D1w2 = w2B; αw1 and αw2 are the diffraction angles for the w1
and w2 edges of the screen, respectively [38]. From Fig. 5b, the
two side edges of the screen are denoted w1 and w2, where the
distance between the edges is the body depth (bdepth ) or width of
the screen w, since the blocker walks through the LOS path at a
perpendicular orientation. As the screen moves between the TX
and RX antennas and blocks the LOS path, the screen is always
considered perpendicular to the solid line drawn between the two,
to reduce computational complexity.
Diffraction loss is calculated via numerical approximation by
Total Rec. Power
Fresnel integration and the diffraction parameter as follows [52]:
v
Z
sin
S(v) =
0
πv 2
2
dv
(9a)
dv
(9b)
2 · AS · SB
The diffraction parameter v is calculated based on the distance
from the TX to the screen, from the screen to the RX, the
diffraction angle α (see Fig. 5b), and the carrier wavelength λ.
The ± sign in (10) is applied as + to both edges for NLOS
conditions. When calculating the diffraction parameter (10) under
unobstructed (LOS) conditions for the screen edge (w1 or w2)
closest to the straight line drawn between the TX and RX, the ±
is treated as “−”, whereas the ± is treated as “+” for the screen
edge farthest from the straight line drawn between the TX and
RX [52].
The individual received signal caused by knife-edge diffraction
from the w1 and w2 edges is Fw1 and Fw2 , respectively. The
complex signals corresponding to the edges can be added in order
to determine the combined diffraction loss observed at the RX. The
total diffraction loss power in log-scale is determined by taking
the magnitude squared of the summed signals as follows [52]:
Lscreen [dB] = 20 log10
Fw1 + Fw2
(11)
The DKED model (11) has been adopted by METIS and others [20], [48], but it does not consider the antenna radiation
pattern (it assumes an omnidirectional antenna [53]) and has
been shown to underestimate diffraction loss in the deepest fades
when using directional antennas, which are sure to be employed
by mmWave mobile devices [38]. This physical phenomenon
occurs when the blocker obstructs the LOS path between antennas
(i.e. deep fading), leaving only the off-boresight antenna gains
to contribute to the received signal strength, which is slightly
less than the directive gain. To account for the impact of nonuniform gain directional antennas on human blockage, antenna
gain is considered in (11) (see [38]). The following azimuth farfield power radiation pattern of a horn antenna (general for any
directional antenna) for a given half-power beamwdith (HPBW)
is approximated by [38], [39]:
G(θ) = sinc2 (a · sin(θ)) · cos2 (θ)
where:
sinc
2
a · sin
HPBWAZ
2
!
· cos
2
HPBWAZ
2
=
1
2
The DKED model in (11) can be extended to include TX and RX
antenna gains for the projected angles θ between the TX and the
screen, and the screen and RX as follows [38]:
LScreen A.G. [dB] = 20 log10
Fw1 ·
p
p
GD2w1 · GD1w1
!
+Fw2 ·
p
p
GD2w2 · GD1w2
Rel. Pow. (dB)
Rel. Pow. (dB)
-30
2.1
2.2
-20
-30
3
(12)
-20
-30
-40
2.8
3
-30
2.6
2
0
-20
-30
3.2
2.4
2.6
0
-10
-20
-30
-40
2.6
2.8
3
2.6
2.8
3
Time (sec.)
Meas 9: 4.5 m
0
-10
-20
-30
-40
2.6
2.2
Time (sec.)
Meas 6: 3.0 m
Time (sec.)
Meas 8: 4.0 m
0
Time (sec.)
2.4
-10
-40
2.4
3.2
-10
2.6
-20
Time (sec.)
Meas 5: 2.5 m
0
2.8
0
-10
-40
2.2
Time (sec.)
Meas 7: 3.5 m
(10)
λ(AS + SB)
2
-10
2.6
Rel. Pow. (dB)
vw1|w2 = ±αw1|w2
-20
-40
1.9
-40
and where the diffraction parameter v is derived by [34]:
s
0
Rel. Pow. (dB)
0
πv 2
2
-30
Rel. Pow. (dB)
cos
-20
3GPP/METIS
Meas 3: 1.5 m
-10
Time (sec.)
Meas 4: 2.0 m
Rel. Pow. (dB)
v
Z
0
-10
-40
1.8
DKED-AG. Worst Case (out-of-phase)
Meas 2: 1.0 m
Rel. Pow. (dB)
where the numerical approximations of Fresnel integration for
C(v) and S(v) are:
C(v) =
DKED-AG. Best Case (in-phase)
Rel. Pow. (dB)
(8)
Rel. Pow. (dB)
Fw1|w2
(1−j) 1+j − (C(v) + j · S(v)) , if v > 0
2
2
= (1−j) 1+j
+ (C(−v) + j · S(−v)) , otherwise
2
2
DKED-AG.
Meas 1: 0.5 m
0
-10
-20
-30
-40
2.8
3
3.2
Time (sec.)
2.7
2.8
2.9
3
3.1
Time (sec.)
Fig. 6: Comparison of measured received power of human blockage at
73 GHz and the DKED-AG model in (12) [38].
where GD2w1 , GD1w1 , GD2w2 , and GD1w2 are the linear power
gains (normalized to the directive gain such that G0◦ = 1) of the
antennas based on the point-source projections Aw1; w1B; Aw2;
w2B; A to w1, w1 to B, A to w2, and w2 to B (see Fig. 5b).
When the screen does not obstruct the LOS path between the TX
and RX, the normalized gains are set to G(θ) = 1, since the slight
variations of antenna patterns have little effect on diffraction loss
in the unobstructed case.
E. Human Blockage Results and Analysis
For each of the nine measurement paths, the area under the
curve of each of the 2500 PDPs was integrated to calculate the
received power in 2 ms increments. In Fig. 6 the received power
(red) is compared to the DKED antenna gain (DKED-AG) model
(green) (12), in addition to showing the constructive (signals inphase) and destructive (signals out of phase) sum of received
signals of the upper (blue) and lower (black) bound of the fade
envelope, respectively. Fig. 6 represents loss as compared to a free
space reference with no blockage between the TX and RX. From
Fig. 6, we observe gain in the received signal as the human enters
the TX/RX LOS path, and then deep attenuations as the human
blocks the LOS path. Due to the fact that identical antennas were
used at the TX and RX, the envelopes of the received signal power
were similar in the two different symmetrical cases (i.e., Meas. 1
and Meas. 9). The best case scenario (minimum diffraction loss)
is found by summing the magnitudes of received field components
from the w1 and w2 edges of the blocker, represented by the blue
dashed line in Fig.
minimum loss, (12)
as:
p 6. Forp
p is reformulated
p
20 log10 (|Fw1 · GD2w1 · GD1w1 |+|Fw2 · GD2w2 · GD1w2 |).
The worst case scenario (maximum diffraction loss) is found by
taking the difference of the magnitudes of received signals from
the w1 and w2 edges, and is represented by the
line
black dotted
p
in Fig 6, where (12) is computed as: 20 log10 |Fw1 · GD2w1 ·
p
p
p
GD1w1 | − |Fw2 · GD2w2 · GD1w2 | .
It was previously demonstrated that diffraction loss models that
do not account for antenna gain pattern can severely underestimate
the diffraction loss when the blocker is close to either antenna
(a critical issue for mobile phone use) [38]. The DKED-AG
model (12) accurately predicts what is measured, and predicts the
deepest attenuation caused by a human blocker in excess of 40 dB.
To model multiple blockers, the screen model can be replicated
multiple times. These results show that adaptive antenna array
and beamforming techniques will be employed to find suitable
reflectors and scatterers in the signal transmission to overcome
severe blockage attenuation in future 5G communication systems.
The DKED-AG model in (12) may be extended [51] to consider
the top and bottom screen edges, phase corrections, and nonperpendicular screen orientations, although the simple model (12)
matches the human blocking measurements with confidence. It
can be seen in Fig. 6 (Meas. 1 and 9) that the signal strength
drops off at a rate of 0.4 dB/ms as the blocker moves at 1
m/s and begins to shadow the TX (RX). Mobile handoffs and
beam steering schemes will be needed to rescue the mobile from
severe fades by the use of electrically scanning beams at the submillisecond level, a feat easily accomplished with sub millisecond
packets in an air interface standard. An additional technique for
mitigating the effects of rapid fading could include rapid re-routing
around obstacles via handoff to another access point (AP) in a
network cluster [54]. Note that just prior to the deep shadowing
events in Fig. 6 there is a slight increase/scintillation of signal
strength of ∼ 2 dB peak-to-peak amplitudes (noticed by others
in [55]), which could be used to detect the imminent presence of
an obstruction such that the RX adapts its beam in anticipation of
the pending deep fade. The 3GPP/METIS blockage model [20],
[48] shown in Fig. 6 underestimates the deep fades of shadowing
events [38], especially when the blocker is close to the TX or
RX antenna, since the full directive gain of the TX and RX
antennas is not available across the diffraction obstacle, and thus is
unable to contribute to the received signal strength from diffraction
around the blocker during the shadowing event [38]. We note that
the 3GPP/METIS model only offers reasonable agreement to the
measured loss when the blocker is far (several meters) from the
TX and RX antenna.
IV. S MALL -S CALE S PATIAL S TATISTICS
A. Introduction of Small-Scale Spatial Statistics
Small-scale fading and small-scale autocorrelation characteristics are crucial for the design of future mmWave communication
systems, especially in multiple-input multiple-output (MIMO)
channel modeling. Previous studies on small-scale fading characteristics focused on sub-6 GHz frequencies, yet investigations
at mmWave are scarce. Wang et al. [56] showed that smallscale fading of received power in indoor corridor scenarios with
omnidirectional antennas at both TX and RX could be well
described by Ricean distributions with K-factors ranging from 5
dB to 10 dB based on their indoor corridor measurements at 15
GHz with a bandwidth of 1 GHz, and ray tracing results using
a ray-optical based channel model validated by measurements.
Henderson et al. compared Rayleigh, Ricean, and the Two-WaveDiffuse-Power (TWDP) distributions to find the proper small-scale
fading distribution of received voltage magnitudes for a measured
2.4 GHz indoor channel [57] where the Ricean distribution had
highest modeling accuracy in most indoor cases [57]. The authors in [58] demonstrated the use of the TWDP fading model
for mmWave communications. It was reported that log-normal
distribution had a good fit to measured received signal envelopes
in some indoor mobile radio channels [59]. Important work on
wideband directional small-scale fading also appears in [60]–
[64]. In the following subsections, small-scale fading distributions
TABLE II: Hardware Specifications of Small-Scale Fading and Local
Area Channel Transition Measurements.
Campaign
Broadcast Sequence
TX and RX Antenna Type
TX/RX Chip Rate
Slide Factor γ
RF Null-to-Null Bandwidth
PDP Threshold
TX/RX Intermediate Freq.
TX/RX Local Oscillator
Carrier Frequency
TX Antenna Gain
RX Antenna Gain
Max TX Power / EIRP
TX Az. and El. HPBW
TX/RX Heights
RX Az. and El. HPBW
TX-RX Antenna Pol.
Max Measurable Path Loss
73 GHz Small-Scale
Fading and
Correlation
Measurements
73 GHz Local Area
Channel Transition
Measurements
11th order PN Code (L = 211 − 1 = 2047)
Rotatable pyramidal horn antenna
500 Mcps / 499.9375 Mcps
8000
1 GHz
20 dB down from max peak
5.625 GHz
67.875 GHz (22.625 GHz × 3)
73.5 GHz
27 dBi
9.1 dBi
14.2 dBm / 41.2 dBm
20 dBi
14.3 dBm / 41.3 dBm
7◦
4.0 m / 1.4 m
4.0 m / 1.5 m
60◦
15◦
V-V (vertical-to-vertical)
168 dB
180 dB
of total power and autocorrelation characteristics of received
voltage amplitudes at 73 GHz in urban microcell environments are
investigated based on a measurement campaign conducted during
the summer of 2016 around the engineering campus of New York
University in downtown Brooklyn.
B. Measurement System for Small-Scale Spatial Statistics
The TX system for small-scale fading and autocorrelation
measurements at 73 GHz was identical to the TX system used
for the human blocking measurements with the difference only
for TX antennas and transmit powers as identified in Table II.
The RX side of the system captured the RF signal via steerable
horn antennas and downconverted the signal to an IF of 5.625
GHz, which was then demodulated into its baseband in-phase
(I) and quadrature-phase (Q) signals which were correlated via a
common sliding correlation architecture [5], [6], [8], [34] where
the time-dilated I and Q channel voltages were sampled by an
oscilloscope and then squared and added together in software to
generate a PDP. Antennas with 27 dBi gain (7◦ Az./El. HPBW)
and 9.1 dBi gain (60◦ Az./El.HPBW) were used at the TX and
RX sides, respectively [62].
C. Small-Scale Measurement Environment and Procedure
In the summer of 2016, a set of small-scale linear track
measurements were conducted at 73 GHz on the campus of NYU
Tandon School of Engineering in downtown Brooklyn, New York,
representative of an urban microcell (UMi) environment [62].
The measurement environment, and the TX and RX locations are
depicted in Fig. 7. One TX location with an antenna height of
4.0 m above the ground and two RX locations with an antenna
height of 1.4 m were selected to perform the measurements, where
one RX was LOS to the TX while the other was NLOS. The
TX was placed near the southwest corner of the Dibner library
building (top center in Fig. 7), the LOS RX was located 79.9
m away from the TX, and the NLOS RX was shadowed by the
southeast corner of a building (Rogers Hall on the map) with a
T-R separation distance of 75.0 m [62]. Other specifications about
the measurement hardware are detailed in Table II.
Fig. 7: 2D map of the 73 GHz small-scale measurement environment and
the locations of TX and RX. Pointing to the top of the map is 0◦ .
A fixed 35.31-cm spatial linear track (about 87 wavelengths
at 73.5 GHz) was used at each RX location in the small-scale
fading measurements, over which the RX antenna was moved in
increments of half-wavelength (2.04 mm) over 175 track positions
[62]. At each RX, six sets of small-scale fading measurements
were performed, where the elevation angle of the RX antenna
remained fixed at 0◦ (parallel to the horizon) and a different
azimuth angle was chosen for each set of the measurements with
the adjacent azimuth angles separated by 60◦ , such that the RX
antenna swept over the entire azimuth plane after rotating through
the six pointing angles. The RX antenna was pointing at a fixed
angle while moving along the linear track for each set of the
measurements and a PDP was acquired at each track position for
each pointing angle. The TX antenna elevation angle was always
fixed at 0◦ (parallel to horizon). Under the LOS condition, the TX
antenna was pointed at 90◦ in the azimuth plane, directly towards
the RX location; for NLOS, the TX antenna azimuth pointing
angle was 200◦ , roughly towards the southeast corner of Rogers
Hall in Fig. 7 [62]. Due to space limitations, we show here only
one track orientation at each RX (along the direction of the street
beside the RX), but more results and observations are detailed
in [62] which show the fading depths are a function of antenna
orientations and environment.
As a comparison, the 28 GHz small-scale measurements presented in [65] investigated the small-scale fading and autocorrelation of individual resolvable multipath voltage amplitudes using
a 30◦ Az./El. HPBW RX antenna, whereas this paper studies
73 GHz fading and autocorrelation using a wider HPBW (60◦ )
RX antenna, and focuses on received signal voltage amplitude by
integrating the area under the entire PDP curve and then taking
the square root of the total power, instead of individual multipath
voltage amplitude at each location along a track.
Fig. 8: Measured 73 GHz small-scale directional PDPs over 175 track
positions in LOS. The RX horn antenna (60◦ HPBW) was pointing on
boresight to the TX, and track orientation orthogonal to the T-R line.
Fig. 9: Measured 73 GHz small-scale directional PDPs over 175 track
positions in NLOS. The RX horn antenna (60◦ HPBW) was pointing to
the TX but was obstructed by a building corner, and the track orientation
was along the direction of the street.
Typical measured small-scale directional PDPs over 175
track positions on the 35.31-cm (about 87 wavelengths at 73.5
GHz) linear track in the NLOS environment are depicted in
Fig. 9, where the track orientation was along the direction of
the street, and the RX antenna was pointing to the TX but
was obstructed by a building corner [62]. Fig. 9 shows there is
very moderate power variation (4.1 dB) over different local-area
track positions, albeit with rich and varying multipath components.
E. Small-Scale Spatial Statistics Results and Analysis
D. Small-Scale Measurement Results
Fig. 8 illustrates typical measured small-scale directional PDPs
over 175 track positions on the 35.31-cm (about 87 wavelengths
at 73.5 GHz) linear track in the LOS environment, where the RX
horn antenna with 60◦ HPBW was pointing on boresight to the
TX, and the track orientation was orthogonal to the T-R line. The
total power in Figs. 8 and 9 is computed as the area under the PDP
at a particular track position over the 1 GHz RF bandwidth. Fig. 8
shows there is 11 dB power variation over different track positions,
but the power variation is only 3.7 dB when the track orientation
was in the direction of the T-R line (not shown), indicating little
small-scale spatial fading [62].
1) Omnidirectional Small-Scale Spatial Statistics: As described
above, a rotatable directive horn antenna was used at the RX
side to capture directional PDPs in the small-scale fading and
correlation measurements. In channel modeling, however, omnidirectional statistics are often preferred, since arbitrary antenna
patterns can be implemented according to one’s own needs if
accurate temporal and spatial statistics are known [23]. Therefore,
we synthesized the approximated omnidirectional received power
at every track interval by taking the area under the curve of
each directional PDP and summing powers using the approach
presented in [39] and on Page 3040 from [6], thereby computing
omnidirectional received power. Although the RX antenna did not
80
100
Measured LOS
Log-normal, = 0.91 dB
Ricean, K = 10 dB
Rayleigh
60
10 1
40
10 0
10 -1
10 -2
20
0
-4
10 -3
10 -4
-4
-3
-2
-1
0
-3
1
-2
2
-1
3
0
4
Signal Level (dB relative to mean)
Probability (%) (<= abscissa)
Probability (%) (<= abscissa)
100
80
Measured NLOS
Log-normal, = 0.65 dB
Ricean, K = 19 dB
Rayleigh
60
10 1
40
10 0
10 -1
10 -2
20
0
-1.5
10 -3
10 -4
-1.5
-1
-0.5
0
-1
0.5
-0.5
1
0
1.5
Signal Level (dB relative to mean)
Fig. 10: CDF of the measured small-scale spatial fading distribution of
the received voltage amplitude for the omnidirectional RX antenna pattern
in the LOS environment at 73 GHz with a 1 GHz RF bandwidth.
sweep the entire 4π Steradian sphere, the azimuth plane spanned
±30◦ with respect to the horizon, ensuring that a large majority
of the arriving energy was captured, as verified in [39].
Fig. 10 illustrates the cumulative distribution function (CDF)
of the measured small-scale received voltage amplitude at 73
GHz with a 1 GHz RF bandwidth over the 35.31-cm length
track with 175 track positions in increments of half-wavelength
(2.04 mm) for the omnidirectional RX antenna pattern in the
LOS environment [62]. Superimposed with the measured curve
are the CDFs of the Rayleigh distribution, the zero-mean lognormal distribution with a standard deviation of 0.91 dB (obtained
from the measured data), and the Ricean distribution with a Kfactor of 10 dB obtained from the measured data by dividing the
total received power contained in the LOS path by the power
contributed from all the other reflected or scattered paths. As
shown in Fig. 10, the measured 73 GHz small-scale spatial fading
in the LOS environment can be approximated by the Ricean
distribution with a K-factor of 10 dB, indicating that there is
a dominant path (i.e., the LOS path) contributing to the total
received power, and that the received signal voltage amplitude
varies little over the 35.31-cm (about 87 wavelengths) length
track. The log-normal distribution does not fit the measured data
well in the regions of -3 to -2.5 dB and +1.2 to +1.5 dB
about the mean. The maximum fluctuation of the received voltage
amplitude is merely 3 dB relative to the mean value, whereas
the fades are much deeper for the Rayleigh distribution. The
physical reason for this is the presence of a dominant LOS path.
The small-scale spatial fading in the NLOS environment for the
omnidirectional RX antenna pattern is illustrated in Fig. 11, and
the zero-mean log-normal distribution with a standard deviation
of 0.65 dB (obtained from the measured data) is selected to fit
the measured result, and Ricean and Rayleigh distributions are
also given as a reference [62]. As evident from Fig. 11, the
measured NLOS small-scale spatial fading distribution matches
the log-normal fitted curve almost perfectly. In contrast, the Ricean
distribution with K = 19 dB does not fit the measured data as
well as the log-normal distribution in the tail region around -0.6
dB to -0.8 dB of the relative mean signal level (as shown by
the inset in Fig. 11), since the Ricean K = 19 dB distribution
predicts more occurrences of deeper fading events, whereas the
log-normal distribution with a 0.65 dB standard deviation predicts
a more compressed fading range of -0.8 dB to +0.8 dB about the
mean, which was observed for the wideband NLOS signals. The
fact that the local fading of received voltage amplitudes in the
NLOS environment is log-normal instead of Rayleigh is similar
to models in [66] for urban mobile radio channels. For a NLOS
environment, there may not be a dominant path, yet the transmitted
Fig. 11: CDF of the measured small-scale spatial fading distribution of
the received voltage amplitude for the omnidirectional RX antenna pattern
in the NLOS environment at 73 GHz with a 1 GHz RF bandwidth.
broadband signal experiences frequency-selective fading (when
the signal bandwidth is larger than the coherence bandwidth of
the channel [34]). Different frequency components of the signal
experience uncorrelated fading, thus it is highly unlikely that all
parts of the signal will simultaneously experience a deep fade,
and the fades over frequency tend to be very sharp, taking up a
small portion of the total power received over the entire signal
bandwidth [16]. Consequently, the total received power changes
very little over a small-scale local area. This is a distinguishing
feature of wideband mobile signals as compared to narrowband
signals.
Apart from small-scale spatial fading, small-scale spatial autocorrelation is also important for wireless modem design. Spatial
autocorrelation characterizes how the received voltage amplitudes
correlate at different linear track positions within a local area [65].
Spatial autocorrelation coefficient functions can be calculated
using Eq. (13), where Xk denotes the k th linear track position,
E[ ] is the expectation operator where the average of voltage
amplitudes is taken over all the positions Xk , and ∆X represents
the spacing between different antenna positions on the track [62].
The measured 73 GHz spatial autocorrelation of the received
voltage amplitudes in LOS and NLOS environments with a 1 GHz
RF bandwidth are depicted in Fig. 12 and Fig. 13, respectively.
Note that a total of 175 linear track positions over the 35.31-cm
length track were measured during the measurements, yielding a
maximum spatial separation of 174 half-wavelengths on a single
track. Only up to 60 half-wavelengths, however, are shown herein
because little change is found thereafter and it provides 100
autocorrelation data points for all spatial separations on a single
track, thus improving the reliability of the statistics. According
to Fig. 12, the received omnidirectional signal voltage amplitude
first becomes uncorrelated at a spatial separation of about 3.5λ,
then becomes slightly anticorrelated for separations of 3.5λ to
10λ, and becomes slightly correlated for separations between 10λ
and 18λ, and decays towards 0 sinusoidally after 18λ. Therefore,
the spatial correlation can be modeled by a “damped oscillation”
function of (14) [62] [67]:
f (∆X) = cos(a∆X)e−b∆X
(14)
where ∆X denotes the space between antenna positions, a is an
oscillation distance with units of radians/λ (wavelength), T =
2π/a can be defined as the spatial oscillation period with units of λ
or cm, and b is a constant with units of λ−1 whose inverse d = 1/b
is the spatial decay constant with units of λ. a and b are obtained
using the minimum mean square error (MMSE) method to find
the best fit between the empirical spatial autocorrelation curve
ρ= q
E
E
Ak (Xk ) − Ak (Xk )
Ak (Xk ) − Ak (Xk )
Ak (Xk + ∆X) − Ak (Xk + ∆X)
2
E
(13)
2
Ak (Xk + ∆X) − Ak (Xk + ∆X)
TABLE III: Spatial correlation model parameters in (14) for 73 GHz, 1
GHz RF bandwidth (λ=0.41 cm).
a (rad/λ)
T = 2π/a
b (λ−1 )
d = 1/b
LOS Omnidirectional
0.45
14.0λ (5.71 cm)
0.10
10.0λ (4.08 cm)
NLOS Omnidirectional
0
Not used
0.26
3.85λ (1.57 cm)
LOS
Directional
0.33 to 0.50
12.6λ to 19.0λ (5.14
cm to 7.76 cm)
0.03 to 0.15
6.67λ to 33.3λ (2.72
cm to 13.6 cm)
NLOS
Directional
0
Not used
0.04 to 1.49
0.67λ to 25.0λ (0.27
cm to 10.2 cm)
100
Probability (%) (<= abscissa)
Fig. 12: Measured 73 GHz broadband spatial autocorrelation coefficients
of the received voltage amplitude in the LOS environment, and the
corresponding fitting model. The T-R separation distance is 79.9 m.
Condition
60
40
20
0
-4
Fig. 13: Measured 73 GHz broadband spatial autocorrelation coefficients
of the received voltage amplitude in the NLOS environment, and the
corresponding fitting model. The T-R separation distance is 75.0 m.
and theoretical exponential model given by (14). The “damped
oscillation” pattern can be explained by superposition of multipath
components with different phases at different linear track positions. As the separation distance of linear track positions increases,
the phase differences among individual multipath components will
oscillate as the separation distance of track positions increases
due to alternating constructive and destructive combining of the
multipath phases. This “damped oscillation” pattern is obvious
in LOS environment where phase difference among individual
multipath component is not affected by shadowing effects that
occurred in NLOS environments. The form of (14) also guarantees
that the spatial autocorrelation coefficient is always 1 for ∆X = 0,
and converges to 0 when ∆X approximates infinity. The spatial
autocorrelation curve for NLOS environment in Fig. 13 exhibits
a different trend from that in Fig. 12, which is more akin to an
exponential distribution without damping, but can still be fitted
using Eq. (14) with a set to 0 [62]. The constants a, b, are
provided in Table III, where T is the oscillation period, and d
represents the spatial decay constant. From Fig. 13 and Table III
it is clear that after 1.57 cm (3.85 wavelengths at 73.5 GHz) in
the NLOS environment, the received voltage amplitudes become
uncorrelated (the correlation coefficient decreases to 1/e [22]).
We note that Samimi [65] found individual multipath voltage
amplitudes received using a 30◦ Az./El. HPBW antenna became
uncorrelated at physical distances of 0.52 cm (0.48 wavelengths
at 28 GHz) and 0.67 cm (0.62 wavelengths at 28 GHz) in LOS
and NLOS environments, respectively – smaller decorrelation
distances compared to the present 73 GHz results measured using
a 60◦ Az./El. HPBW antenna.
2) Directional Small-Scale Spatial Statistics: Since mobile
devices will use directional antennas, directional statistics are
270° (b)
330°
30 °
90 °
150°
210°
Ricean
K=7dB
Ricean
K=17dB
80
-3
-2
-1
0
1
2
Signal Level (dB relative to mean)
3
4
Fig. 14: Measured 73 GHz LOS small-scale spatial fading distributions of
the directional received voltage amplitude, and the corresponding Ricean
fitting curves with different K factors. The angles in the legend denote
the receiver antenna azimuth angle, and ”b” denotes boresight to the TX.
also of interest. In this subsection, we will investigate smallscale spatial fading and autocorrelation of the received voltage
amplitudes associated with directional antennas at the RX.
Small-scale fading of received voltage amplitudes along the linear track using the 7◦ Az./El. HPBW TX antenna and 60◦ Az./El.
HPBW RX antenna in LOS and NLOS environments are shown
in Fig. 14 and Fig. 15, respectively, where the TX and RX were
placed as shown in Fig. 7, and each measured curve corresponds
to a unique RX antenna azimuth pointing angle relative to true
north as specified in the legend. There was no signal for the RX
azimuth pointing angle of 270◦ in the NLOS environment, thus the
corresponding results are absent in Fig. 15. The strongest pointing
directions are 270◦ and 150◦ in Figs. 14 and 15, respectively
[62]. As shown in Figs. 14 and 15, the measured directional
spatial autocorrelation coefficients resemble Ricean distributions
in both LOS and NLOS environments. Possible reason for such
distributions is that only one dominant path (accompanied with
several weaker paths) is captured by the horn antenna due to
its directionality, given the fact that mmWave propagation is
directional and the channel is sparse [22]. The Ricean K-factor
for received voltage amplitudes for various RX pointing directions
ranges from 7 dB to 17 dB for the LOS environment, and 9 dB
to 21 dB for the NLOS case, as shown in Figs. 14 and 15, as the
RX is moved over a 35.31 cm (86.5 wavelengths at 73.5 GHz)
track.
Figs. 16 and 17 illustrate the spatial autocorrelation coefficients
of the received voltage amplitudes for individual antenna pointing
angles in LOS and NLOS environments in downtown Brooklyn
(see Fig. 7), respectively. As shown by Fig. 16, all of the six
spatial autocorrelation curves in the LOS environment exhibit
sinusoidally exponential decaying trends, albeit with different
oscillation patterns and decay rates. The TX-RX boresight-toboresight pointing angle (270◦ RX pointing angle, corresponding
Probability (%) (<= abscissa)
the southeast corner of Rogers Hall in Fig. 7. It is clear from Fig.
4 in [4] that correlation distances vary among typical mmWave
measurements [18] due to the site-specific nature of propagation.
100
90 ° (s, to TX)
150°
210°
330°
30 °
Ricean
K=9dB
Ricean
K=21dB
80
60
40
20
0
-4
-3
-2
V. L OCAL A REA C HANNEL T RANSITION
A. Introduction of Local Area Channel Transition
-1
0
1
2
3
4
Signal Level (dB relative to mean)
Spatial Autocorrelation Coefficient
Fig. 15: Measured 73 GHz NLOS small-scale spatial fading distributions
of the directional received voltage amplitude, and the corresponding
Ricean fitting curves with different K factors. The angles in the legend
denote the receiver antenna azimuth angle, and ”s, to TX” denotes along
the direction of the street and pointing to the TX side.
1
270° (b)
330°
90 °
150°
210°
0.8
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
0
5
10
15
20
25
Separation x (Number of Wavelengths)
30
Fig. 16: Measured 73 GHz LOS spatial autocorrelation coefficients of the
directional received voltage amplitudes. The angles in the legend denote
the receiver antenna azimuth angle, and ”b” denotes boresight to the TX.
to the strongest received power) yields the smallest oscillation
since there is only a single LOS component in the PDP, while
the other pointing directions contain two or more multipath
components with varying phases that result in larger oscillation
[62]. The spatial decay constants for all the curves in Fig. 16
are given in Table III. Compared with the omnidirectional case
displayed in Fig. 12, it is clear that for the LOS environment,
the spatial autocorrelation of both omnidirectional and directional
received voltage amplitude obeys similar distribution, namely,
the sinusoidal-exponential function, with similar decorrelation
distances. On the other hand, most of the spatial autocorrelation
curves for the directional received voltage amplitude shown in
Fig. 17 are also in line with that given by Fig. 13. One exception
for the 73 GHz spatial correlation is found at 30◦ pointing angle
that is the second strongest pointing direction (see Fig. 17), where
decorrelation was much more gradual and decreases to 1/e at 25.0λ
(10.2 cm), probably due to the presence of a dominant path with a
relatively constant signal level, likely caused by the diffraction of
Fig. 17: Measured 73 GHz NLOS spatial autocorrelation coefficients of
the directional received voltage amplitudes. The angles in the legend
denote the receiver antenna azimuth angle, and “s, to TX” denotes along
the direction of the street and pointing to the TX side.
Large-scale channel characteristics, such as the autocorrelation
of shadow fading and delay spread over distance at the mobile,
inter-site correlation of shadow fading at the mobile for two base
stations or a base station for one mobile, and properties of local
area channel transition, play an important role in constructing
channel models for wireless communication systems [20], [68]–
[70]. While sufficient studies on large-scale channel characteristics
have been conducted at sub-6 GHz frequencies [67], [68], [71],
[72], similar studies have been rarely conducted at mmWave
frequencies. Guan et al. investigated spatial autocorrelation of
shadow fading at 920 MHz, 2400 MHz, and 5705 MHz in curved
subway tunnels [71]. Results showed that the 802.16J model was
a better fit to the measured data than an exponential model,
and the mean decorrelation distances were found to be several
meters. Another measurement campaign carried out in urban
macro-cell (UMa) environments at 2.35 GHz showed that a double
exponential model fit well with the autocorrelation coefficients
of shadow fading samples extracted from all measured routes,
while for individual routes, an exponentially decaying sinusoid
model had better fitting performance [67]. On the other hand,
an exponential function was adopted in the 3GPP channel model
(Releases 9 and 11) to describe the normalized autocorrelation of
shadow fading versus distances [69], [70]. Moreover, Kolmonen et
al. [72] investigated interlink correlation of eigenvectors of MIMO
correlation matrices based on a multi-site measurement campaign
at 5.3 GHz using a bandwidth of 100 MHz. Results showed
that the first eigenvectors for both x- and y-oriented arrays were
highly correlated when two RX locations were largely separated.
In the following subsections, local area and channel transition
measurements at 73 GHz are described and analyzed.
B. Measurement System, Environment, and Procedure for Local
Area Channel Transition
The measurement system used for local area channel transition
measurements was identical to the one used in the previous
small-scale fading and autocorrelation measurements described
in Section IV, except from the antennas [50] [73]. A 27 dBi
gain (7◦ azimuth and elevation Az./El. HPBW) and 20.0 dBi
gain (15◦ Az./El. HPBW) antenna were used at the TX and RX,
respectively. Detailed specifications regarding the measurement
system are provided in Table II.
The local area channel transition measurements were conducted
at 73 GHz in the MetroTech Commons courtyard next to 2 and 3
MetroTech Center in downtown Brooklyn. During measurements,
the TX and RX antennas were set to 4.0 m and 1.5 m above
ground level, respectively. For each set of cluster or route scenario RX locations, the TX antenna remained fixed and pointed
towards a manually selected azimuth and elevation pointing angle
that resulted in the strongest received power at the starting RX
position (RX81 for route measurements, and RX51 and RX61
for the LOS and NLOS cluster measurements, respectively). For
each specific TX-RX combination, five consecutive and identical
azimuth sweeps (∼3 minutes per sweep and ∼2 minutes between
C. Local Area Channel Transition Results and Stationarity
The route measurements mimicked a person moving along
an urban canyon from a NLOS to a LOS region, in order to
understand the evolution of the channel during the transition.
Fig. 20 displays the omnidirectional path loss for each of the
RX locations (RX81 to RX96) where the received power from
the individual directional measurements at the RX was summed
up to determine the entire omnidirectional received power at each
measurement location (out of the 5 sweeps, the maximum power
at each angle was used, although variation was less than a dB
between sweeps) [39], [74].
The transition from LOS to NLOS in Fig. 20 is quite abrupt,
where path loss increases by ∼8 dB from RX92 to RX91, similar
Fig. 18: 2D map of TX and RX locations for route NLOS to LOS transition measurements. The yellow star is the TX location, blue dots represent
LOS RX locations, and red squares indicate NLOS RX locations. N = 0◦ .
Fig. 19: 2D map of TX and RX locations for cluster measurements with
LOS and NLOS RX clusters. The yellow star is the TX location, blue
dots represent LOS RX locations, and red squares indicate NLOS RX
locations. Pointing to the top is 0◦ .
160
140
Path Loss (dB)
sweeps) were conducted at the RX in HPBW step increments
(15◦ ) where a PDP was recorded at each RX azimuth pointing
angle and resulted in at most 120 PDPs ( 360
15 × 5 = 120) per
combination (some angles did not have detectable signal above
the noise). The best RX pointing angle in the azimuth plane was
selected as the starting point for the RX azimuth sweeps (elevation
remained fixed for all RX’s), at each RX location measured.
For the route measurements, 16 RX locations were measured
for a fixed TX location (L8) with the RX locations positioned in 5
m adjacent increments of each other forming a simulated route in
the shape of an “L” around a building corner from a LOS to NLOS
region, as provided in Fig. 18. The LOS location (five: RX92 to
RX96) and NLOS location (11: RX81 to RX91) T-R separation
distances (Euclidean distance between TX and RX) varied from
29.6 m to 49.1 m and 50.8 m to 81.5 m, respectively. The TX
antenna at L8 kept the same azimuth and elevation pointing angle
of 100◦ and 0◦ , respectively, during each experiment (see Fig. 18.
Therefore, the LOS measurements have the TX and RX antennas
roughly on boresight in the LOS situation, but they are not exactly
on boresight throughout the entire experiment over all measured
locations. The general layout of measurements consisted of the
RX location starting at RX81, approximately 54 m along an urban
canyon (Bridge Street: 18 m width), with the TX antenna pointed
towards the opening of the urban canyon (see Fig. 18). The LOS
locations were in clear view of the RX, but with some nearby
minor foliage and lamppost obstructions.
For the cluster measurements, 10 RX locations were measured
for a fixed TX location (L11), with two sets of RX clusters, one
in LOS (RX61 to RX65) and the other in NLOS (RX51 to RX
55). For each cluster of RX’s, the adjacent distance between each
RX location was 5 m, however, the path of adjacent RX locations
took the shape of a semi-circle as displayed in Fig. 19. The LOS
cluster T-R separation distances (Euclidean distance between TX
and RX) varied between 57.8 m and 70.6 m with a fixed TX
antenna azimuth and elevation departure angle of 350◦ and -2◦ ,
respectively, and fixed RX elevation angles of +3◦ , to ensure
rough elevation and azimuth alignment for all RX locations. For
the NLOS cluster, the T-R separation distances were between 61.7
m and 73.7 m with a fixed TX antenna azimuth and elevation
departure angle of 5◦ and -2◦ , respectively, and fixed RX elevation
angles of +3◦ . The LOS cluster of RX’s was located near the
opening of an urban canyon near some light foliage, while the
TX location was ∼57 m along an urban canyon (Lawrence Street:
18 m width). The NLOS cluster of RX locations was around
the corner of the urban canyon opening in a courtyard area (see
Fig. 19), also with nearby moderate foliage and lampposts.
Path Loss for LOS to NLOS Transition at 73 GHz
Free Space Path Loss
LOS PL Data
NLOS PL Data
CI LOS: n = 2.53; σ = 2.5 dB
CI NLOS: n = 3.61; σ = 5.6 dB
120
NLOS->LOS Transition: 24.8 dB
100
135
130
125
120
115
110
45
80
60
100
101
50 55 60 65
102
T-R Separation (m)
Fig. 20: Omnidirectional path loss for route measurements for an RX
transitioning from a NLOS to a LOS region.
to the abrupt diffraction loss noticed in Section II. Path loss then
increases 9 dB further from RX91 to RX90, 1 dB from RX90
to RX89, 6 dB from RX 89 to RX88, and 1 dB from RX88 to
RX 87. This observation shows a large initial drop in 8 dB at
the LOS to NLOS transition region, but an overall 25 dB drop
in signal power when moving from LOS conditions to deeply
shadowed NLOS conditions approximately 25 meters farther along
a perpendicular urban canyon (∼10 m increase in Euclidean T-R
separation distance), when using an omnidirectional RX antenna.
The 25 dB drop in signal strength over a 25 m path around
a corner (1 dB/m) is important for handoff considerations. The
signal fading rate is 35 dB/s for vehicle speeds of 35 m/s, or 1
73 GHz Polar Plot at RX 87 for TX: L8
Environment: NLOS
0°
330°
30°
TR Separation: 60.6 m
TX Height: 4 m
300°
60°
RX Height: 1.5 m
Measurement: 3
270°
90°
-110 -100 -90 -80
dBm
240°
120°
TXAZ/EL: 100°/ 0°
TX HPBWAZ/EL: 7°/ 7°
150°
180°
(a) RX87: NLOS
73 GHz Polar Plot at RX 92 for TX: L8
Environment: LOS
0°
330°
30°
TR Separation: 49.1 m
TX Height: 4 m
300°
60°
RX Height: 1.5 m
Measurement: 5
270°
-94
-79
240°
-64
90°
dBm
120°
TXAZ/EL: 100°/ 0°
RXEL: 0°
TX HPBWAZ/EL: 7°/ 7°
RX HPBWAZ/EL: 15°/ 15°
210°
Measurement Set
Omnidirectional Received Power σ [dB]
Route - LOS: RX92 to RX96
1.2
Route - NLOS: RX81 to RX91
7.9
Cluster - LOS: RX61 to RX65
4.3
Cluster - NLOS: RX51 to RX55
2.2
RXEL: 0°
RX HPBWAZ/EL: 15°/ 15°
210°
TABLE IV: Omnidirectional received power standard deviation for the
large-scale route and cluster scenario measurements.
150°
180°
(b) RX92: LOS
Fig. 21: Route scenario polar plots of RX azimuth spectra for RX 87
(NLOS location) and RX 92 (LOS location) that show the evolution of
AOA energy around a corner.
dB/s for walking speeds of 1 m/s. This motivates the use of beam
scanning and phased array technologies in the handset for urban
mobile mmWave communications that will search for and find
the strongest signal paths [40], and future work will study the best
antenna pointing angles at each location from these measurements.
Azimuth power spectra are useful to study how the arriving
energy changes as an RX moves from NLOS to LOS. Work
in [22] showed that energy arrives in directional lobes in mmWave
channels. Fig. 21 displays an RX polar plot from RX87 (NLOS
location) and RX92 (LOS location), where the TX was pointed
in the 100◦ direction towards the street opening (see Fig. 18).
Fig. 21a shows the power azimuth spectra at RX87 (∼25 meters down the urban street canyon) where energy from the TX
waveguides and reflects down Bridge Street such that there is one
main broad lobe at the RX oriented in the 0◦ direction and a
small narrow lobe in the 180◦ direction from weak reflectors and
scattering. The large azimuth spread in the main lobe demonstrates
the surprisingly reflective nature of the channel at the 73 GHz
mmWave band [22], [75].
Fig. 21b displays the power azimuth spectra at RX92 in LOS
with a strong central lobe coming from the direction of the TX
(285◦ ). A relatively strong secondary lobe (100◦ ) is also apparent
in Fig. 21b with energy contributions from reflections off of
the building to the east of RX92 and additional reflectors and
scatterers from nearby lampposts and signs. Table IV displays the
standard deviations of the omnidirectional received power values
measured along the LOS and NLOS routes shown in Fig. 18.
The omnidirectional received power standard deviation of 1.2 dB
is generally small for the LOS locations but is much larger in
NLOS (7.9 dB) due to substantial scattering along the route of
RX locations along the urban canyon where path loss tends to
increase non-linearly over log-distance.
The cluster measurements for the TX at L11 were designed
to understand the stationarity of received power in a local area
(larger than small-scale distances) on the order of many hundreds
to thousands of wavelengths (5 to 10 meters) at mmWave. In
LOS, the cluster of five RX locations with a fixed directional TX
antenna resulted in an omnidirectional received power standard
deviation of 4.3 dB over local area of 5 m x 10 m, a relatively
small variation, indicating a reasonably stationary average received
power for a local set of RX locations in LOS at 73 GHz. The
NLOS cluster resulted in an even lower omnidirectional received
power standard deviation of 2.2 dB, over a 5 m x 10 m local
area. The small fluctuation in received power over the local area
of the LOS and NLOS clusters implies that received power does
not significantly vary over RX locations separated by even a few
to several meters in a dense urban environment at mmWave. As an
aside, the directional CI model path loss exponent (PLE) using a 1
m free space reference in the route measurements was 2.53 in LOS
(a bit higher than free space due to elevation mismatch over the
route) and 3.61 in NLOS (for a single TX beam) [50]. Recent work
in [76] at 28 GHz studied the stationarity of wideband mmWave
channels, and reported smaller stationary regions than at 2 GHz.
VI. C ONCLUSION AND D ISCUSSION
Measurements and analysis were presented on diffraction, human blockage, small-scale fading and local area channel transition
at mmWave frequencies. We showed the KED model is suitable
for modeling diffraction at cmWave and mmWave bands in indoor
scenarios, while a creeping wave linear model is applicable to outdoor environments. Indoor and outdoor diffraction measurements
confirm theoretical simulations [17] that mmWave diffraction will
not be a dominant propagation mechanism. Measurements show
significant attenuation of 30 dB in indoor channels and 40 dB or
more in outdoor channels in the deep shadow region. Therefore,
systems will need to be designed to overcome extremely large
fades when a signal path is blocked and when diffraction is
no longer viable. MmWave antenna systems at the TX and RX
will need to cooperatively search for secondary paths at different
pointing directions. The large fades due to diffraction loss have
implications on the design of physical layer protocols and frame
structures to maintain a link, while finding other spatial paths.
Human blockage measurements showed a person can induce
more than 40 dB of loss when standing 0.5 m from the TX or
RX antenna, with a signal decay rate of 0.4 dB/ms at walking
speeds. The DKED-AG model given here incorporates directional
antenna patterns to accurately predict the upper and lower envelopes of measured received power during a blockage which
better agrees with real-world measurements when compared to the
3GPP/METIS blockage model (that was shown to underestimate
human blockage, most severely when close to the TX or RX).
Scintillation with ∼2 dB peak-to-peak amplitudes can be seen
in the measurements and model just before the blocker enters
the field of view of the RX, suggesting that deep fades may be
predictable just before they occur. This information may be used
in the design of beam steering or handoff algorithms.
Small-scale spatial fading statistics of received signal voltage
amplitudes of 1 GHz bandwidth signals at 73 GHz were measured
over a 35.31-cm (∼ 87 wavelengths) linear track and show only
small power variations when such a wide bandwidth is used.
Fading in LOS locations for omnidirectional RX antennas obeyed
the Ricean distribution with a K-factor of 10 dB, while fading in
NLOS locations can be described by the log-normal distribution
with a standard deviation of 0.65 dB. The fading depth ranges from
-3 dB to +1.5 dB relative to the mean for LOS, and -0.8 dB to +0.8
dB for NLOS. For a 60◦ directional RX antenna, fading in both
LOS and NLOS environments follows the Ricean distribution,
where the K-factor ranges from 7 dB to 17 dB for LOS, and
9 dB to 21 dB for NLOS, depending on the RX orientation in
relation to the environment and the TX [62], while the fading
depth varies between -4 dB to +2 dB relative to the mean for
both LOS and NLOS environments.
Spatial autocorrelation modeling of instantaneous total received
signal voltage amplitudes showed that the sinusoidal-exponential
distribution fits measurements in the LOS environment for both
omnidirectional and directional RX antennas. In the NLOS environment, the spatial autocorrelation can be modeled by the
exponential distribution for both omnidirectional and directional
RX antennas. Table III shows the oscillation distance/period and
spatial decay constant to represent the autocorrelation, where rapid
decorrelation of received voltage amplitudes occurred over 0.67
to 33.3 wavelengths (0.27 cm to 13.6 cm), depending on the
RX orientation in relation to the environment and the TX [62].
The short correlation distance, in general, is favorable for spatial
multiplexing in MIMO since it allows for uncorrelated spatial data
streams to be transmitted from closely-spaced (a fraction to several
wavelengths) antennas [40]. Furthermore, the small fading depth
indicates that the signal quality of an established link between a
TX and an RX will not vary much when the RX moves within a
local area on the order of a few tens of wavelengths (within 13.6
cm), as shown in Figs. 16 and 17.
Local area channel transition measurements show an initial 8
dB power loss and an overall 25 dB power loss when an RX
moves from LOS to NLOS around a building corner and along a
street canyon in an urban microcell environment. However, local
area path loss measurements (cluster measurements) suggest omnidirectional received power has a relatively stationary mean over
a relatively large area (5 m x 10 m) in LOS and NLOS scenarios,
respectively, as indicated in Table IV. Wideband mmWave signals
in typical indoor and outdoor environments were shown to fade
at rates from 0.4 dB/ms to 40 dB/s, depending on the speed and
environment. The results presented here will aid the 5G wireless
community as it develops models for small-scale fading and spatial
consistency for handoff algorithms and beam scanning techniques.
R EFERENCES
[1] T. S. Rappaport, “The wireless revolution,” IEEE Communications Magazine,
vol. 29, no. 11, pp. 52–71, Nov. 1991.
[2] F. Boccardi et al., “Five disruptive technology directions for 5G,” IEEE
Communications Magazine, vol. 52, no. 2, pp. 74–80, Feb. 2014.
[3] A. Ghosh et al., “Millimeter-wave enhanced local area systems: A high-datarate approach for future wireless networks,” IEEE Journal on Selected Areas
in Communications, vol. 32, no. 6, pp. 1152–1163, June 2014.
[4] T. S. Rappaport et al., “Overview of millimeter wave communications for
fifth-generation (5G) wireless networks-with a focus on propagation models,”
IEEE Trans. Ant. Prop., Special Issue on 5G, to appear Nov. 2017.
[5] ——, “Millimeter Wave Mobile Communications for 5G Cellular: It Will
Work!” IEEE Access, vol. 1, pp. 335–349, May 2013.
[6] ——, “Wideband millimeter-wave propagation measurements and channel
models for future wireless communication system design,” IEEE Transactions
on Communications, vol. 63, no. 9, pp. 3029–3056, Sept. 2015.
[7] ——, “Broadband millimeter-wave propagation measurements and models
using adaptive-beam antennas for outdoor urban cellular communications,”
in IEEE Trans. Ant. Prop., vol. 61, no. 4, Apr. 2013, pp. 1850–1859.
[8] G. R. MacCartney, Jr. et al., “Indoor office wideband millimeter-wave
propagation measurements and models at 28 GHz and 73 GHz for ultra-dense
5G wireless networks,” IEEE Access, vol. 3, pp. 2388–2424, Oct. 2015.
[9] S. Sun et al., “Investigation of prediction accuracy, sensitivity, and parameter
stability of large-scale propagation path loss models for 5G wireless communications (Invited Paper),” IEEE Transactions on Vehicular Technology,
vol. 65, no. 5, pp. 2843–2860, May 2016.
[10] T. A. Thomas et al., “A prediction study of path loss models from 2-73.5 GHz
in an urban-macro environment,” in 2016 IEEE 83rd Vehicular Technology
Conference (VTC2016-Spring), May 2016, pp. 1–5.
[11] O. H. Koymen et al., “Indoor mm-Wave channel measurements: Comparative
study of 2.9 GHz and 29 GHz,” in 2015 IEEE Global Telecommunications
Conference Workshops (Globecom Workshops), Dec. 2015, pp. 1–6.
[12] Y. Yoon et al., “Site specific analysis on mm-Wave radio propagation in commercial small urban,” in 2015 Int. Conf. on Information and Communication
Technology Convergence (ICTC), Oct. 2015, pp. 1312–1314.
[13] A. Maltsev et al., “Impact of polarization characteristics on 60-GHz indoor
radio communication systems,” IEEE Antennas and Wireless Propagation
Letters, vol. 9, pp. 413–416, May 2010.
[14] G. R. MacCartney, Jr. and T. S. Rappaport, “Study on 3GPP rural macrocell
path loss models for millimeter wave wireless communications,” in 2017
IEEE International Conference on Communications (ICC), May 2017.
[15] H. T. Friis, “A note on a simple transmission formula,” Proceedings of the
IRE, vol. 34, no. 5, pp. 254–256, May 1946.
[16] T. S. Rappaport, R. W. Heath, Jr., R. C. Daniels, and J. N. Murdock,
Millimeter Wave Wireless Communications. Pearson/Prentice Hall, 2015.
[17] S. Deng, G. R. MacCartney, Jr., and T. S. Rappaport, “Indoor and outdoor 5G
diffraction measurements and models at 10, 20, and 26 GHz,” in 2016 IEEE
Global Telecommunications Conference (GLOBECOM), Dec. 2016, pp. 1–7.
[18] M. Rumney, “Testing 5G: Time to throw away the cables,” Microwave
Journal, Nov. 2016.
[19] D. Solomitckii et al., “Characterizing the impact of diffuse scattering in urban millimeter-wave deployments,” IEEE Wireless Communications Letters,
vol. 5, no. 4, pp. 432–435, Aug. 2016.
[20] 3GPP, “Technical specification group radio access network; channel model
for frequency spectrum above 6 GHz (Release 14),” 3rd Generation Partnership Project (3GPP), TR 38.900 V14.2.0, Dec. 2016.
[21] S. Sun, G. R. MacCartney, Jr., and T. S. Rappaport, “A novel millimeter-wave
channel simulator and applications for 5G wireless communications,” in 2017
IEEE International Conference on Communications (ICC), May 2017.
[22] M. K. Samimi and T. S. Rappaport, “3-D millimeter-wave statistical channel
model for 5G wireless system design,” IEEE Transactions on Microwave
Theory and Techniques, vol. 64, no. 7, pp. 2207–2225, July 2016.
[23] T. S. Rappaport et al., “Investigation and comparison of 3GPP and NYUSIM
channel models for 5G wireless communications,” in 2017 IEEE 86th
Vehicular Technology Conference (VTC Fall), Sep. 2017.
[24] H. Wang and T. S. Rappaport, “A parametric formulation of the UTD
diffraction coefficient for real-time propagation prediction modeling,” IEEE
Antennas and Wireless Propagation Letters, vol. 4, pp. 253–257, 2005.
[25] A. Maltsev et al., “Characteristics of indoor millimeter-wave channel at 60
GHz in application to perspective WLAN system,” in Proceedings of the
Fourth European Conference on Antennas and Propagation, Apr. 2010.
[26] J. S. Lu et al., “Measurement and characterization of various outdoor 60
GHz diffracted and scattered paths,” in 2013 IEEE Military Communications
Conference (MILCOM), Nov. 2013, pp. 1238–1243.
[27] M. Jacob et al., “Diffraction in mm and Sub-mm Wave indoor propagation
channels,” IEEE Transactions on Microwave Theory and Techniques, vol. 60,
no. 3, pp. 833–844, Mar. 2012.
[28] T. Kleine-Ostmann et al., “Diffraction measurements at 60 GHz and 300 GHz
for modeling of future THz communication systems,” in 2012 37th International Conference on Infrared, Millimeter, and Terahertz Waves (IRMMWTHz), Sept. 2012, pp. 1–2.
[29] Y. Corre et al., “Analysis of outdoor propagation and multi-cell coverage
from ray-based simulations in sub-6 GHz and mmwave bands,” in 2016 10th
European Conference on Antennas and Propagation (EuCAP), Apr. 2016.
[30] P. H. Pathak, G. Carluccio, and M. Albani, “The uniform geometrical theory
of diffraction and some of its applications,” IEEE Antennas and Propagation
Magazine, vol. 55, no. 4, pp. 41–69, Aug. 2013.
[31] T. Mavridis et al., “Creeping wave model of diffraction of an obliquely
incident plane wave by a circular cylinder at 60 GHz,” IEEE Transactions
on Antennas and Propagation, vol. 62, no. 3, pp. 1372–1377, Mar. 2014.
[32] S. Deng, “Indoor and outdoor 5G diffraction measurements and models at
10, 20, and 26 GHz,” Master’s thesis, TR 2016-001, New York University,
New York, May 2016.
[33] T. A. Russell, C. W. Bostian, and T. S. Rappaport, “A deterministic approach
to predicting microwave diffraction by buildings for microcellular systems,”
IEEE Transactions on Antennas and Propagation, vol. 41, no. 12, pp. 1640–
1649, Dec. 1993.
[34] T. S. Rappaport, Wireless Communications: Principles and Practice, 2nd ed.
Upper Saddle River, NJ: Prentice Hall, 2002.
[35] L. Piazzi and H. L. Bertoni, “Effect of terrain on path loss in urban
environments for wireless applications,” IEEE Transactions on Antennas and
Propagation, vol. 46, no. 8, pp. 1138–1147, Aug. 1998.
[36] N. Tervo et al., “Diffraction measurements around a building corner at
10 GHz,” in 2014 1st International Conference on 5G for Ubiquitous
Connectivity (5GU), Nov. 2014, pp. 187–191.
[37] J. Ryan, G. R. MacCartney, Jr., and T. S. Rappaport, “Indoor office wideband
penetration loss measurements at 73 ghz,” in 2017 IEEE International
Conference on Communications Workshop (ICCW), May 2017, pp. 1–6.
[Online]. Available: https://arxiv.org/pdf/1703.08030.pdf
[38] G. R. MacCartney, Jr. et al., “Millimeter-wave human blockage at 73
GHz with a simple double knife-edge diffraction model and extension for
directional antennas,” in 2016 IEEE 84th Vehicular Technology Conference
(VTC2016-Fall), Sept. 2016, pp. 1–6.
[39] S. Sun et al., “Synthesizing omnidirectional antenna patterns, received power
and path loss from directional antennas for 5G millimeter-wave communications,” in 2015 IEEE Global Communications Conference (GLOBECOM),
Dec. 2015, pp. 3948–3953.
[40] ——, “MIMO for millimeter-wave wireless communications: beamforming,
spatial multiplexing, or both?” IEEE Communications Magazine, vol. 52,
no. 12, pp. 110–121, Dec. 2014.
[41] K. Sato and T. Manabe, “Estimation of propagation-path visibility for indoor
wireless lan systems under shadowing condition by human bodies,” in 48th
IEEE Vehicular Technology Conference (VTC1998), vol. 3, May 1998, pp.
2109–2113.
[42] S. Collonge, G. Zaharia, and G. El Zein, “Influence of the human activity
on wide-band characteristics of the 60 GHz indoor radio channel,” IEEE
Transactions on Wireless Communications, vol. 3, no. 6, pp. 2396–2406,
Nov. 2004.
[43] ——, “Wideband and dynamic characterization of the 60 GHz indoor radio propagation – future homeWLAN architectures,” Annales Des
Télécommunications, vol. 58, no. 3, pp. 417–447, 2003.
[44] A. Maltsev et al., “Channel Models for 60 GHz WLAN Systems,” doc.: IEEE
802.11-09/0334r8, May 2010.
[45] S. Y. Seidel and T. S. Rappaport, “Site-specific propagation prediction for
wireless in-building personal communication system design,” IEEE Transactions on Vehicular Technology, vol. 43, no. 4, pp. 879–891, Nov. 1994.
[46] M. Jacob, C. Mbianke, and T. Kürner, “Human body blockage - guidelines
for TGad MAC development,” doc.: IEEE 802.11-09/1169r0, Nov. 2009.
[47] M. Jacob, S. Priebe, and T. Kürner, “Modeling the human induced 60 GHz
channel dynamics,” doc.: IEEE 802.11-11/1170r0, Nov. 2009.
[48] METIS, “METIS Channel Model,” METIS2020, Deliverable D1.4 v3, July
2015.
[49] J. Medbo and F. Harrysson, “Channel modeling for the stationary UE
scenario,” in 2013 7th European Conference on Antennas and Propagation
(EuCAP), Apr. 2013, pp. 2811–2815.
[50] G. R. MacCartney and T. S. Rappaport, “A flexible millimeter-wave channel
sounder with absolute timing,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 6, pp. 1402–1418, June 2017.
[51] J. Kunisch and J. Pamp, “Ultra-wideband double vertical knife-edge model
for obstruction of a ray by a person,” in 2008 IEEE International Conference
on Ultra-Wideband, vol. 2, Sept. 2008, pp. 17–20.
[52] Z. Wang et al., “A diffraction measurement model and particle filter tracking
method for RSS-based DFL,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 11, pp. 2391–2403, Nov. 2015.
[53] J. Medbo, J. E. Berg, and F. Harrysson, “Temporal radio channel variations
with stationary terminal,” in IEEE 60th Vehicular Technology Conference
(VTC2004-Fall), vol. 1, Sept. 2004, pp. 91–95.
[54] A. Ghosh, “The 5G mmWave radio revolution,” Microwave Journal, vol. 59,
no. 9, pp. 22–36, Sept. 2016.
[55] M. Jacob, C. Mbianke, and T. Kürner, “A dynamic 60 GHz radio channel
model for system level simulations with MAC protocols for IEEE 802.11ad,”
in IEEE International Symposium on Consumer Electronics (ISCE 2010),
June 2010, pp. 1–5.
[56] Q. Wang et al., “Ray-based analysis of small-scale fading for indoor corridor
scenarios at 15 GHz,” in 2015 Asia-Pacific Symposium on Electromagnetic
Compatibility (APEMC), May 2015, pp. 181–184.
[57] A. H. Henderson, C. J. Durkin, and G. D. Durgin, “Finding the right smallscale fading distribution for a measured indoor 2.4 GHz channel,” in 2008
IEEE Antennas and Propagation Society International Symposium, July 2008,
pp. 1–4.
[58] J. M. Romero-Jerez et al., “The fluctuating two-ray fading model for
mmwave communications,” in 2016 IEEE Globecom Workshops (GC Wkshps), Dec. 2016, pp. 1–6.
[59] S. L. Cotton and W. G. Scanlon, “Higher order statistics for lognormal
small-scale fading in mobile radio channels,” IEEE Antennas and Wireless
Propagation Letters, vol. 6, pp. 540–543, Nov. 2007.
[60] J. M. Holtzman and L. M. A. Jalloul, “Rayleigh fading effect reduction
with wideband DS/CDMA signals,” IEEE Transactions on Communications,
vol. 42, no. 234, pp. 1012–1016, Feb. 1994.
[61] G. D. Durgin, V. Kukshya, and T. S. Rappaport, “Wideband measurements of
angle and delay dispersion for outdoor and indoor peer-to-peer radio channels
at 1920 MHz,” IEEE Transactions on Antennas and Propagation, vol. 51,
no. 5, pp. 936–944, May 2003.
[62] S. Sun et al., “Millimeter wave small-scale spatial statistics in an urban microcell scenario,” in 2017 IEEE International Conference on Communications
(ICC), May 2017, pp. 1–7.
[63] M. K. Samimi and T. S. Rappaport, “Local multipath model parameters
for generating 5G millimeter-wave 3GPP-like channel impulse response,”
in 2016 10th European Conference on Antennas and Propagation (EuCAP),
Apr. 2016, pp. 1–5.
[64] D. Dupleich et al., “Investigations on fading scaling with bandwidth and
directivity at 60 GHz,” in 2017 11th European Conference on Antennas and
Propagation (EUCAP), Mar. 2017, pp. 3375–3379.
[65] M. K. Samimi et al., “28 GHz millimeter-wave ultrawideband small-scale
fading models in wireless channels,” in 2016 IEEE 83rd Vehicular Technology
Conference (VTC2016-Spring), May 2016, pp. 1–6.
[66] T. S. Rappaport, S. Y. Seidel, and K. Takamizawa, “Statistical channel impulse response models for factory and open plan building radio communicate
system design,” IEEE Transactions on Communications, vol. 39, no. 5, pp.
794–807, May 1991.
[67] Y. Zhang et al., “A Novel Spatial Autocorrelation Model of Shadow Fading
in Urban Macro Environments,” in 2008 IEEE Global Telecommunications
Conference, Nov. 2008, pp. 1–5.
[68] N. Jalden et al., “Inter- and intrasite correlations of large-scale parameters
from macrocellular measurements at 1800 MHz,” EURASIP Journal on
Wireless Communications and Networking, no. 10, pp. 1–12, July 2007.
[69] 3GPP, “Further advancements for E-UTRA physical layer aspects (Release
9),” 3rd Generation Partnership Project (3GPP), TR 36.814, Mar. 2010.
[Online]. Available: http://www.3gpp.org/DynaReport/36814.htm
[70] ——, “Technical specification group radio access network; evolved universal
terrestrial radio access (E-UTRA); mobility enhancements in heterogeneous
networks (Release 11),” 3rd Generation Partnership Project (3GPP), TR
36.839 V11.1.0, Dec. 2012.
[71] K. Guan et al., “Measurements and analysis of large-scale fading characteristics in curved subway tunnels at 920 MHz, 2400 MHz, and 5705 MHz,”
IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 5, pp.
2393–2405, Oct. 2015.
[72] V. M. Kolmonen et al., “Measurement-based evaluation of interlink correlation for indoor multiuser MIMO channels,” IEEE Antennas and Wireless
Propagation Letters, vol. 9, pp. 311–314, Apr. 2010.
[73] G. R. MacCartney, Jr. et al., “A flexible wideband millimeter-wave channel
sounder with local area and NLOS to LOS transition measurements,” in 2017
IEEE International Conference on Communications (ICC), May 2017.
[74] G. R. MacCartney, Jr., M. K. Samimi, and T. S. Rappaport, “Omnidirectional
path loss models in New York City at 28 GHz and 73 GHz,” in IEEE 25th
International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), Sept. 2014, pp. 227–331.
[75] M. K. Samimi et al., “28 GHz angle of arrival and angle of departure
analysis for outdoor cellular communications using steerable beam antennas
in New York City,” in 2013 IEEE 77th Vehicular Technology Conference
(VTC-Spring), June 2013, pp. 1–6.
[76] R. Wang et al., “Stationarity region of mm-wave channel based on outdoor
microcellular measurements at 28 GHz,” in IEEE MILCOM 2017, Oct. 2017.
| 7cs.IT
|
Emergence of Structured Behaviors from Curiosity-Based Intrinsic Motivation
Nick Haber, Damian Mrowca, Li Fei-Fei, Daniel L. K. Yamins
( [nhaber, mrowca, feifeili, yamins]@stanford.edu )
Department of Psychology and Computer Science, Stanford University, Stanford, CA 94305, USA
arXiv:1802.07461v1 [cs.LG] 21 Feb 2018
Abstract
Infants are experts at playing, with an amazing ability to generate novel structured behaviors in unstructured environments
that lack clear extrinsic reward signals. We seek to replicate
some of these abilities with a neural network that implements
curiosity-driven intrinsic motivation. Using a simple but ecologically naturalistic simulated environment in which the agent can
move and interact with objects it sees, the agent learns a world
model predicting the dynamic consequences of its actions. Simultaneously, the agent learns to take actions that adversarially
challenge the developing world model, pushing the agent to
explore novel and informative interactions with its environment.
We demonstrate that this policy leads to the self-supervised
emergence of a spectrum of complex behaviors, including ego
motion prediction, object attention, and object gathering. Moreover, the world model that the agent learns supports improved
performance on object dynamics prediction and localization
tasks. Our results are a proof-of-principle that computational
models of intrinsic motivation might account for key features
of developmental visuomotor learning in infants. Keywords:
Development learning, Curiosity, Neural Network Models
Introduction
Within the first year of life, humans exhibit a wide range of
interesting, apparently spontaneous, visuomotor behaviors —
including navigating their environment, seeking out and attending to objects, and engaging physically with these objects
in novel and surprising ways (Fantz, 1964; Twomey & Westermann, 2017; Hurley et al., 2010; Hurley & Oakes, 2015;
Goupil et al., 2016; Begus et al., 2014; Gopnik et al., 2009). In
short, young children are excellent at playing, and their ability to make sense of and (re)structure their environments sets
them apart from even the most advanced autonomous robots.
Play capacity in this period likely interacts with infants’ powerful abilities to understand and model their environment. By
six months of age or younger, infants can orient themselves
in a complex environment, account for the presence, number
and visual properties of objects they interact with, and have a
sense of how these objects behave dynamically Spelke (1985);
Stahl & Feigenson (2015); Baillargeon (2007).
But how exactly do such young children know how to
play? And how do such behaviors relate to their world-model
building abilities? One natural idea is that infants’ worldmodeling capacities are the result of built-in core systems,
including those for e.g. object attention and permanence, selflocalization, number sense, and intuitive physics (Spelke &
Kinzler, 2007). Once operational, such systems would naturally give the infant a basis on which to make judgments about
which sequences of actions would be interesting to perform.
A related but alternative idea is that the intrinsic motivation of curiosity can itself drive the development of worldmodel making (Schmidhuber, 2010). This idea relies on a
virtuous cycle in which, by seeking out novel but replicable
Figure 1: Problem setting. How do agents learn from object
interactions while moving around in the physical world?
interactions, the child pushes the boundaries of what its worldmodel-prediction systems can achieve, giving itself useful data
on which to improve and develop these systems. As worldmodeling capacity improves, what used to be novel becomes
old hat, and the cycle starts again. Related to the conception of
the “scientist in the crib” (Gopnik et al., 2009), in this account,
aside from being fun, play behaviors may be extremely useful
and highly structured, driving the self-supervised learning of
a variety of representations underlying sensory judgments and
motor planning capacities (Mitash et al., 2017).
Building on recent work in artificial intelligence (Schmidhuber, 2010; Pathak et al., 2017; Kulkarni et al., 2016; Jaderberg
et al., 2016) we make a computational model of an agent
driven by curiosity-based intrinsic motivation. We present a
simple simulated interactive environment in which an agent
can move around and physically act on objects it sees (Fig. 1).
In this world, interesting interactions are sparse unless actively
sought after. We then describe a neural network architecture
through which the agent learns a world model that seeks to
predict the consequences of its own actions. In addition, as
the agent optimizes the accuracy of its world model, a separate neural network simultaneously learns an agent action
policy that seeks to take actions that adversarially challenge
the current state of its world model. We demonstrate that
this architecture stably engages in the virtuous reinforcement
learning cycle described above, spontaneously learning to
understand self-generated ego motion and to selectively pay
attention to, localize, and interact with objects, without having
to have any of these concepts built in. This learning occurs
through emergent self-curricularization in which new capacities arise at distinct “developmental milestones.” This work is
computational proof-of-principle of how intrinsic motivation
could drive aspects of visuomotor learning and play in infants
and young children, and of how more flexible intrinsically
motivated autonomous robots might be constructed.
S t a te
St at e
World
Model
Λψ
2
Ac t i o
argmax
n
L t L t+1 L t+2 ... L t+T
st
St a t e
t+1
t+1
t+1
αego
αobj
αobj
1
S t a te
ωφ
A c t i o n Lo s s
Environment
1
A c t i o n Lo s s
Loss
Model
n
Actio
t
t
t
αego
αobj
αobj
2
s t-1
t
t
t
αego
αobj
αobj
st
1
2
Lt
s t+1
t-1
t-1
t-1
αego
αobj
αobj
1
2
Figure 2: Self-supervised curiosity model. We train a dynamical world model (blue), while simultaneously learning a loss model
(red) that predicts the world model’s loss to choose actions that lead to novel and surprising events in the environment (black).
Agent Architecture and Environment
We place an agent in a physically realistic simulated environment built in the Unity 3D simulation framework. The agent
consists of a world model and a loss model. The world model
is tasked to learn dynamics from visuomotor inputs. The loss
model tries to estimate the world model’s losses several time
steps into the future to choose actions that antagonize the
world model’s learning. Our self-supervised curiosity system
is depicted in Figure 2. We emphasize that we do not initialize our model with pretrained weights so as to explore what
world representation and behaviors emerge from this simple
antagonistic setup in a physically embodied environment.
Interaction environment
Our environment consists of a simple square room in which
an agent and several objects are initially placed randomly. The
agent is modeled as an invisible sphere that can move around
and, in discrete time steps, receives an RGB image from its
forward-facing camera. In order to model interaction with
objects requiring some attention and proximity, the agent can
apply forces and torques in all three dimensions to objects that
are both in view and within a fixed distance δ. We refer to a
state in which the agent can act on the object as a play state,
and the object as in play. Although the remaining environment
is static, the agent and objects can collide with every part.
We define a state in the state space st ∈ S to consist of the
images captured at times t and t −1 by the agent. In state st , the
agent specifies an action at ∈ A, which leads to the next state
st+1 . The action space A ∈ R2+6N is continuous. The first 2
dimensions specify ego motion, restricting agent movement to
forward/backward motion v f wd and horizontal planar rotation
vθ . The remaining 6N dimensions specify the forces fx , fy , fz
and torques τx , τy τz applied to N objects sorted from the lowerleftmost to the upper-rightmost object relative to the agent’s
field of view. This representation is unambiguous as objects
can only be acted on when in view, and if k < N objects are
in play, the environment accepts all 2 + 6N-tuples but only
applies the leftmost k force-torque pairs. All coordinates are
bounded by constants and normalized to 1.
World model
Given a slice of history ht = (st−kb , at−kb . . . st+k f , at+k f ) ∈ H,
we can describe a generalized dynamical problem by an input map ξ : H → X and a true-value map η : H → Y and
require the world model (blue in Figure 2) map ξ(h) to η(h)
— regardless of whether this is well-defined. Let ω denote
this world model, so that ω(ξ(h)) ∈ Y . For each prediction,
a loss Lwm (ω(ξ(h)), η(h)) is incurred. In theory, future prediction makes an attractive dynamical problem, with H =
{h = (st−k , at−k . . . st , at , st+1 )}, ξ(h) = (st−k , at−k . . . st , at ),
and η(h) = st+1 . In practice, we find inverse dynamical
prediction useful — filling in a missing action, instead of
predicting the future — and concretely in our case, H =
{(at−2 , st−1 , at−1 , st , at , st+1 , at+1 , st+2 )} with ξ(h) excluding
at and η(h) = ζ(at ). Here ζ zeros out the force and torque
components not corresponding to objects in play, as they have
no observable effect, and bins the action into classes, with Lwm
the softmax cross-entropy loss. We bin each dimension by
x < −0.1, −0.1 ≤ x ≤ 0.1, and x > 0.1.
We train a convolutional neural network ωφ for this task
from scratch with stochastic gradient descent, with randomly
initialized parameters φ. We use twelve convolutional layers,
with two-stride max pools every other layer and one hidden
layer to encode all states into a lower-dimensional latent space
with shared weights. The latent states {λt+i } concatenated
with the given actions {at+ j } are then input to a two-layer
MLP to predict at .
Loss model
The agent’s goal is to antagonize the world model, so if
it could predict the loss incurred at future time steps as a
function of its options, a policy could be made. In practice,
we do this explicitly, except predicting only a discretization
of the loss for ease of training. Given st and a proposed
next action a, the loss model Λ (red in Figure 2) predicts
a probability distribution over Cl discrete (via thresholding)
classes of world model loss for a set number T of future
time steps. It is penalized with a softmax cross-entropy loss
Llm (Λ(st ), (Lwm (η( ht+s ), ωφ (ξ(ht ))) | s ∈ 1 . . . T )). We use a
separate convolutional neural network Λψ with parameters ψ,
with twelve convolutional layers with two-stride max pools every other layer and one hidden layer to encode the state which
is then concatenated with the proposed at . This representation
is then used as input to a two-hidden-layer MLP to infer the
prediction. Note that all future losses aside from the first one,
depend not only on the state of the world model, but also on
future actions taken, and the loss model hence needs to predict
in expectation over future policy. The loss predictions are
usefully interpreted as loss prediction maps Λst (a) on action
space given a current state st as depicted in Figure 4.
Action policy
Given the loss prediction model, the agent can use a simple
mechanism to choose its actions. The loss model provides,
given st and a proposed next action a, T probability distributions p(k | st , a) = (p1lm (k | st ) . . . pT (k | st , at )), k ∈ {1 . . .Cl }.
Given a real-valued function σ of these T probability distributions, we can define our policy π(a|st ) as a distribution
π(a|st ) ∼ exp(βσ(p(k | st , a)),
(1)
with hyperparameter β. For our purposes, taking expectation
in loss class k and sum over all time steps is sufficient. In
practice, we execute our policy by evaluating σ for K uniform
random samples in A. We then sample from a K-way discrete
distribution with probabilities proportional to equation (1). In
choosing this policy mechanism, we opt to start with a naı̈ve
approach over using more sophisticated reinforcement learning standards in an effort to focus on studying the structure of
the proposed self-supervision signal. By explicitly predicting
loss separately for several time steps into the future, our results
admit easy visualization and interpretation.
Experiments
We randomly situate the agent and up to two objects in a square
10x10 unit room with play distance δ = 2. The agent trains
on 16 blue objects with different shapes, i.e. cones, cylinders,
cuboids, pyramids, and spheres of varied aspect ratios. We
reinitialize the play scene every 8, 000 to 30, 000 steps.
We first place the agent with one object in the room and
show that it learns to predict ego motion, and attend, localize
and navigate towards objects by evaluating the world model’s
training loss, the agent’s play state frequency, and the inverse
dynamics prediction performance on a fixed validation set.
In a second experiment we increase the number of objects
to two, and demonstrate that the agent learns to gather both
objects and further prefers to play with two objects over one
object by looking at the frequency of 1 and 2 object play states
and object-agent distances. Overarching these results is the
observation that these behaviors emerge in a specific order
akin to developmental milestones.
We compare our learned world model with curious policy
with T = 40 (LW/CP-40) against a baseline with a world
model with fixed random weights following a random policy
(RW/RP) and a baseline where the world model weights are
learned with a random policy (LW/RP).
Ego motion learning
Figure 3 (a) shows the training loss curves of LW/CP-40 and
the baselines. RW/RP does not learn well since most of its
weights are fixed to be random. LW/RP quickly converges to
a low value as it learns from a constant random distribution
without an antagonistic policy. The LW/CP-40 loss dips before increasing as the loss model first needs to learn which
actions lead to higher loss before being able to antagonize the
world model effectively. This first dip in loss corresponds to
the world model learning ego motion. The ego motion error
reported in Table 1 is close to the error reached at this point.
Emergence of object attention
As the LW/CP-40 loss increases after the initial ego motion
dip the agent starts to attend to objects which is reflected in an
increase of object interactions as shown in Figure 3 (b). At the
final stage, the agent interacts with the object about 60% of the
time which indicates that it learns to localize and attend to the
object (Table 1). At the same time, the increasing world model
loss shows that these object interactions are much harder to
predict than ego motion. The baselines almost never interact
with the object and thus experience lower ego motion losses.
Improved inverse dynamics prediction
We evaluate the inverse dynamics prediction performance on
a held out validation set gathered from the environment while
following a random action policy. To measure the models’
performance on predicting ego motion and object actions separately, we divide the validation set into two sets. The first
set contains all examples in which the agent is in a play state.
The second set consists of all remaining examples. As we can
see in Figure 3 (c) and in Table 1, LW/CP-40 and LW/RP perform well on predicting ego motion as no antagonistic policy
is necessary to encounter ego motion. However, our policy
outperforms the baselines on predicting object interactions
by a significant margin showing that focusing on object interactions does indeed improve inverse dynamics prediction
performance as seen in Figure 3 (d) and Table 1.
Improved object detection and localization
To quantify the world model’s object presence and localization
performance, we train a linear regression/logistic regression
with elastic net regularization on features from various world
model layers on an offline dataset generated by gathering
data online while following a random action policy. Half of
the object presence training data contains an object. For the
localization experiment, the second image is guaranteed to
contain the object. Both training datasets consists of 16,000
Ego motion learning
*
Emergence of object attention
object interaction learning
°
(a) World model training loss
*
°
°
*
(b) 1 object play frequencies
(c) Ego motion validation loss
(d) 1 object interaction validation loss
Figure 3: 1 object experiments. Learned world model with curious policy (LW/CP-40) is compared against learning a world
model following a random policy (LW/RP) and a world model with random weights with a random policy (RW/RP). (a) World
model cross-entropy loss during training. (b) Object play state frequency in %. (c) Ego motion prediction cross-entropy loss on
held out validation set. (d) 1 object interaction prediction cross-entropy loss on held out validation set.
Table 1: Performance comparison. Learned world model with
a curious policy (LW/CP-40) is compared against learned
world model with random policy (LW/RP) and random world
model with random policy (RW/RP). Ego motion (v f wd , vθ )
and interaction ( f , τ) accuracy in % is compared for play and
non-play states. Object frequency and presence are measured
in % and localization in mean pixel error.
Task
RW/RP
LW/RP
LW/CP-40
Play v f wd accuracy
Play vθ accuracy
Play f , τ accuracy
Non-play v f wd accuracy
Non-play vθ accuracy
Object frequency
61.8
78.8
20.8
59.2
75.0
0.2
84.5
95.2
39.8
94.2
97.9
0.4
93.6
97.9
44.4
92.3
97.9
59.0
Presence error
Localization error [px]
3.9
15.14
1.2
5.99
0.6
4.80
image pairs labeled with the object’s presence or pixel-wise 2d
position of its centroid respectively. The respective validation
and test sets comprise 8,000 image pairs each. As can be see
in Table 1 our model outperforms the baselines on the object
presence and localization task, indicating that it learns better
visual features.
Navigation and planning
In addition to object localization, the agent also exhibits navigation and planning abilities. In Figure 4 we give visualizations of loss maps projected onto the agent’s position at the
respective time. The loss prediction maps are generated by
uniformly sampling 1000 actions a from the action space A,
evaluating Λst (a) and applying a postprocessing smoothing
algorithm. We truncate the figure at five out of the 40 time
steps our loss model predicts. The loss maps show the agent
predicting a higher loss (red) for actions moving it towards the
object to reach a play state. Consequently, our curious policy
will take actions that navigate the agent closer to the object.
Emergence of multi-object interactions
At the beginning of the training of the 2 object experiment we
observe similar stages as for the 1 object experiment (Figure 5
(a)). The loss dips as the agent learns to predict its ego motion
and rises when its attention shifts towards objects which it then
interacts with. This stage is followed by a another loss increase
which corresponds to the agent gathering and playing with
both objects simultaneously. This is reflected in an increase in
2 object play time (Figure 5 (c)) over 1 object play time (Figure
5 (b)). Consequently, the average distance between the agent
and the objects decreases over time as seen in Figure 5 (c). It
drops to about 2 units which equals the maximum interaction
distance. The LW/RP baseline quickly drops and flattens out.
LW/CP-20 with T = 20 instead of T = 40 learns to interact
with one object but not with two objects simultaneously.
Discussion and Future Work
We observe that a simple and general intrinsic motivation
mechanism based on adversarially antagonizing the loss of a
dynamically constructed model of the world allows an agent
to stably generate a spectrum of emergent naturalistic behaviors. Through self-curricularization in an active learning Set-
t
t+1
t+2
t+3
t+4
Figure 4: Navigation and planning behavior. The loss model predicts higher loss if the agent turns towards the object. Red colors
correspond to high and blue colors to low loss predictions. The center of the heat map corresponds to the agents position.
Ego motion learning
2 object loss
Emergence of object attention
1 object learning
°
*
1 object loss
2 object learning
x
(a) World model training loss
*
°
x
(b) 1 object play frequencies
x
(c) 2 object play frequencies
x
(d) Object-agent distances
Figure 5: 2 object experiments. Learned world model with curious policy (LW/CP-40) is compared against the same setup but
with T = 20 (LW/CP-20) and a learned world model following a random policy (LW/RP). (a) World model cross-entropy loss
during training. (b) Object play state frequency for 1 object in %. (c) Object play state frequency for 2 objects in %. (d) Average
distance between agent and objects in Unity units.
tles (2011) process the agent achieves several “developmental
milestones” of suitably increasing complexity as it learns to
“play”. Starting with random actions, it quickly learns the
dynamics of its own ego motion. Then, without being given an
explicit supervision signal as to the presence or location of an
object, it discards ego motion prediction as boring and begins
to focus its attention on objects, which are more interesting.
Lastly, when multiple objects are available, it gathers the objects so as to bring them into interaction range of each other.
Throughout, the agent finds its way towards a more challenging data distribution that is at each moment just hard enough
to expose the agent to new situations, but still understandable
and exploitable by the agent. This intrinsically motived policy
leads to performance gains in its understanding both of the
object dynamics, as well as other tasks which the system was
not explicitly learning.
This occurs without any pretrained visual backbone — the
visual system world model was intentionally not initialized
with filter weights pretrained on (e.g.) ImageNet classification.
This result constitutes partial progress in replacing the training
of a visual backbone through a task such as large-scale image
classification with an interactive self-supervised task and is
a proof-of-concept that more complex milestones can be potentially reached while developing an understanding of object
categories and physical relations.
From a machine learning perspective, this combination of
spontaneous behavior leading to an improved world model is
well suited to designing agents that must act effectively in the
many real-world reinforcement learning scenarios in which rewards are sparse or potentially unknown. Here, we ultimately
seek to develop algorithms that will control autonomous robots
that learn to operate in complex unpredictable environments.
From a cognitive science perspective, these results suggest a
route toward using intrinsically motivated learning systems to
model emergence of spontaneous behavior in young children.
In this domain, we seek to make computational models that
describe key aspects of real infant learning.
However, to truly achieve either of these goals, a variety of
limitations of the current work will need to be overcome in
future work. First, to make the connection to cognitive science
more realistic, our environment and agent themselves need
to be more realistic. On the one hand, better graphics and
physics, with more varied and interesting visual objects, will
be important to allow better transfer the learned behavior to
real-world visuomotor interactions. It will also be important to
create a properly embodied agent with visible arms and tactile
feedback, allowing for more realistic interactions. In our current work, which we stress is more a proof-of-principle than
a full cognitive model, we fail to address the fact that infants
have severely limited mobility and motor control. To be able
to make realistic predictions for actual infant developmental
milestones, it will be especially critical to more realistically
model the known developmental trajectory of the motor system. In addition, including other animate agents is another
way for more complex interactions, but potentially also for
better learning through imitation.
Second, it will be important to improve the reinforcement
learning techniques used to better handle more complex interactions beyond those demonstrated here. For interactions that
are part of a larger experiment, e.g. placing an object on a table or a ramp and then watching it fall, more sophisticated RL
policies than those used here are likely to be necessary, with
better ability to handle temporally extended reward schedules.
It will also likely be necessary to use recurrent networks to
meet working memory demands in such scenarios.
Third, our world model needs to use better representations
to improve at predicting such complex interactions. Our current approach especially suffers from degenerate cases in the
inverse dynamical prediction problem — the problem does
not correspond to a well-defined map. For example, when
given a sequence of images in which an object rests on the
ground, the action sequence is under-determined: the agent
could have been pushing down on the object, or not. Though
the latent-space approach of (Pathak et al., 2017) is meant in
part to ameliorate this issue, we have not yet found an entirely
effective solution in this context. Choices for how to blend
components of a generalized inverse dynamical prediction task
and the interaction of loss terms seem to be key in resolving
this. Taking these next steps will not only help us to understand how infants learn, but also to develop AI systems that
learn without human supervision.
Acknowledgements
This work was supported by an Understanding Human Cognition award from the James S. McDonnell foundation (DLKY),
a Simons Collaboration on the Global Brain grant (DLKY), a
Berry Foundation postdoctoral fellowship (NH), and by hardware donation from the NVIDIA Corporation.
References
Baillargeon, R. (2007). The acquisition of physical knowledge in infancy: A summary in eight lessons. In Blackwell
handbook of childhood cognitive development (pp. 47–83).
Blackwell Publishers Ltd.
Begus, K., Gliga, T., & Southgate, V. (2014, 10). Infants learn
what they want to learn: Responding to infant pointing leads
to superior learning. PLOS ONE, 9(10), 1-4.
Fantz, R. L. (1964). Visual experience in infants: Decreased
attention to familiar patterns relative to novel ones. Science,
146(3644), 668-670.
Gopnik, A., Meltzoff, A., & Kuhl, P. (2009). The scientist in
the crib: Minds, brains, and how children learn. HarperCollins.
Goupil, L., Romand-Monnier, M., & Kouider, S. (2016).
Infants ask for help when they know they dont know. Proceedings of the National Academy of Sciences, 113(13).
Hurley, K. B., Kovack-Lesh, K. A., & Oakes, L. M. (2010,
Dec). The influence of pets on infants’ processing of cat
and dog images. Infant Behav Dev, 33(4), 619–628.
Hurley, K. B., & Oakes, L. M. (2015, Jan). Experience and
distribution of attention: Pet exposure and infants’ scanning
of animal images. J Cogn Dev, 16(1), 11–30.
Jaderberg, M., Mnih, V., Czarnecki, W. M., Schaul, T., Leibo,
J. Z., Silver, D., & Kavukcuoglu, K. (2016). Reinforcement
learning with unsupervised auxiliary tasks. arXiv preprint
arXiv:1611.05397.
Kulkarni, T. D., Narasimhan, K., Saeedi, A., & Tenenbaum,
J. B. (2016). Hierarchical deep reinforcement learning:
Integrating temporal abstraction and intrinsic motivation.
CoRR, abs/1604.06057.
Mitash, C., E. Bekris, K., & Boularias, A. (2017, 03). A
self-supervised learning system for object detection using
physics simulation and multi-view pose estimation.
Pathak, D., Agrawal, P., Efros, A. A., & Darrell, T. (2017).
Curiosity-driven exploration by self-supervised prediction.
arXiv preprint arXiv:1705.05363.
Schmidhuber, J. (2010, Sept). Formal theory of creativity, fun,
and intrinsic motivation (1990 – 2010). IEEE Transactions
on Autonomous Mental Development, 2(3), 230-247.
Settles, B. (2011). Active learning (Vol. 18). Morgan &
Claypool Publishers.
Spelke, E. S. (1985). Object permanence in five-month-old
infants. Cognition, 20(3), 191–208.
Spelke, E. S., & Kinzler, K. D. (2007). Core knowledge.
Developmental science, 10(1), 89–96.
Stahl, A. E., & Feigenson, L. (2015, Apr). Cognitive development. Observing the unexpected enhances infants’ learning
and exploration. Science, 348(6230), 91–94.
Twomey, K. E., & Westermann, G. (2017, Oct). Curiositybased learning in infants: a neurocomputational approach.
Dev Sci.
| 1cs.CV
|
arXiv:1607.02482v1 [math.AC] 8 Jul 2016
POLYNOMIALS INDUCING THE ZERO FUNCTION ON LOCAL
RINGS
MARK W. ROGERS AND CAMERON WICKHAM
Abstract. For a Noetherian local ring pR, mq having a finite residue field of cardinality q,
we study the connections between the ideal Z pRq of Rrxs, which is the set of polynomials
that vanish on R, and the ideal Z pmq, the polynomials
ś that vanish on m, using what we
call π-polynomials: polynomials of the form πpxq “ qi“1 px ´ ci q, where c1 , . . . , cq is a set
of representatives of the residue classes of m. When R is Henselian we prove that πpRq “ m
and show that a generating set for Z pRq may be obtained from a generating set for Z pmq
by composing with πpxq. When m is principal and has index of nilpotency e, we prove that
if e ď q then Z pmq “ px, mqe , and if Ş
e “ q ` 1 then Z pmq “ px, mqe ` pxq ´ mq´1 xq. When
R is finite, we prove that Z pRq “ qi“1 Z pci ` mq is a minimal primary decomposition.
We determine when Z pRq is nonzero, regular, or principal, respectively, and do the same
for Z pmq. We prove that when R is complete, repeated application of πpxq ` x to elements
of R will produce a sequence converging to the roots of πpxq. We show that Z pRq is the
intersection of the principal ideals generated by the π-polynomials.
1. Introduction
One of the surprising facts about finite rings is that a polynomial can be nonzero and
yet induce the zero function. An interesting first example is provided by Fermat’s Little
Theorem: If p is prime, then the nonzero polynomial xp ´ x induces the zero function on Zp .
Using this we can build obvious examples, such as ppxp ´ xq and pxp ´ xq2 on Zp2 , and more
surprising examples, such as pxp ´ xqp ´ pp´1 pxp ´ xq on Zpp`1 ; see Corollary 4.5 for more
information on these examples. For a ring R, it’s easy to see that the set of polynomials in
Rrxs that induce the zero function on R is an ideal of Rrxs; we call this the zero-function
ideal of R, denoted Z pRq. The zero-function ideal has been studied, often with particular
focus on the rings R “ Zpn , for its connection with integer-valued polynomials and functions
induced by polynomials [F, J, P, Z] and coding theory [LRS].
For most of our paper, pR, mq is a Noetherian local ring; we will see that Z pRq is only
nonzero when theˇ residue
field R “ R{m is finite, so we focus most of our attention on this
ˇ
case and let q “ ˇRˇ. Many authors have studied the problem of finding a generating set for
Z pRq, most often in the case R “ Zpn [D, B, F, L, NW, P, W]. In this paper, we argue that
in many cases, focus should be shifted from Z pRq to the simpler ideal Z pmq, which is the
set of polynomials that induce the zero function on m. The connection between the two is
the ideal Z pR, mq, the set of polynomials that take elements of R into m; it’s easy to show
that Z pR, mq “ pxq ´ x, mq. Certainly polynomials in Z pR, mq can be composed with those
in Z pmq to obtain polynomials in Z pRq; visually, Z pmq ˝ Z pR, mq Ď Z pRq. One of the
main themes of this paper is to show that in some sense the opposite is true: A generating
Date: July 11, 2016.
2010 Mathematics Subject Classification. Primary 13M10, 13B25; Secondary 11C08, 13J15, 13E10,
13F20.
Key words and phrases. finite ring, polynomial functions, vanishing polynomials, Artinian rings.
1
2
MARK W. ROGERS AND CAMERON WICKHAM
set for Z pRq can be obtained by composing generators of Z pR, mq with generators of Z pmq
(see Theorem 4.2).
Example 1.1. Let R “ Z9 , so that m “ p3q and R – Z3 . By direct computation or by
Theorem 4.4, Z pmq “ px, mq2 . In Lemma 2.5 we easily find that with πpxq “ x3 ´ x,
Z pR, mq “ pπpxq, mq “ px3 ´ x, 3q; from this, according to Theorem 4.2, we deduce
Z pRq “ Z pmq ˝ Z pR, mq “ px3 ´ x, 3q2 .
This makes it clear that the simpler ideal Z pmq controls the structure of the generating set
of the more complicated ideal Z pRq.
The polynomial xq ´ x has played an important role in the `research
on zero-functions,
˘
q
due primarily to the fact that the image of x ´ x generates Z R and, to a lesser extent,
the fact that when R is finite, xq ´x maps R surjectively onto m. See A. Bandini’s paper [B]
for applications of surjectivity; we generalize the surjectivity result in Corollary 2.11 and
apply it in Theorem 3.2 and Proposition 4.1. A secondary theme of this paper is that there
is actually a class of polynomials with these properties that can play the
of xq ´ x; we
śrole
q
call these π-polynomials, defined to be polynomials of the form πpxq “ i“1 px ´ ci q where
c1 , . . . , cq is any set of representatives of the residue classes of m. As we will see, xq ´ x
is a π-polynomial when R is Henselian (which holds true in the common case where R is
finite). If R is complete, we also provide a computational way of obtaining the factorization
of any π-polynomial, such as xq ´ x itself. In the case of xq ´ x, this method is as simple
as choosing any element of R and repeatedly taking the qth power; the results converge to
a root of xq ´ x. (See Theorems 2.10, 5.2.)
The ideal Z pRq for R “ Zpn was studied as early as 1929 by L. E. Dickson [D, Theorem 27]; in that work, the polynomials in Z pRq were referred to as residual polynomials. Dickson found a generating set for Z pZpn q when n ď p. In our notation, he found
Z pRq “ pπpxq, mqn , where πpxq “ xp ´ x and m “ pR. We generalize and recover this work
as another application of our Theorem 4.2: We show in Theorem 4.4 and its corollary that
if pR, mq is an Artinian local ring with a principal maximal ideal having index of nilpotency
e ď q, then Z pmq “ px, mqe , and thus Z pRq “ pπpxq, mqe for any π-polynomial. When
e ą q, the situation is more complicated, but we take care of the case e “ q ` 1; the result
is related to results on Z pRq for specific rings R ([B, Theorem 2.1] and [L, Theorem II]).
As further indication of the importance of π-polynomials and Z pmq, we provide two
additional results. Under suitable conditions, we prove in Proposition 2.7 that Z pRq is
the intersection of the principal ideals generated by the π-polynomials, and in Proposition
2.9 we provide a minimal primary decomposition of Z pRq as the intersection of the ideals
Z pci ` mq, where c1 , . . . , cq is a set of represetatives of the residue classes of m. Since
generators for Z pci ` mq may be obtained from generators for Z pmq by composition with
x ´ ci , this shows that a primary decomposition for Z pRq may be obtained from knowing
only a generating set for Z pmq. This result on primary decomposition is a generalization
of results from the paper [P] of G. Peruginelli, which was concerned with the ring R “ Zpn .
The remaining theme of our paper is provided in Theorem 3.2, Theorem 3.3, and Corollary
3.4, where we identify conditions under which Z pRq is nonzero, principal, and regular, and
the same for Z pmq; these results explain why we often focus our attention on finite rings.
The results generalize, have some overlap with, and were inspired by R. Gilmer’s paper [G].
POLYNOMIALS INDUCING THE ZERO FUNCTION ON LOCAL RINGS
3
2. Zero-Function Ideals and π-polynomials
We begin with a precise definition of the zero-function ideal of a ring, and we define a
class of polynomials that plays an important role the study of zero-function ideals.
Definition 2.1. Let R be a commutative ring with identity, let S be a subset of R, and let
J be an ideal of R. The set Z pS, Jq of polynomials in Rrxs which map S into J is easily
seen to be an ideal of Rrxs. When the ideal J is omitted, it is assumed to be zero. The
focus of this paper is on Z pRq, which we call the zero-function ideal of R.
Definition 2.2. Suppose the local ring pR, mq has a finite residue field. If c1 , . . . ,ś
cq is any set
of representatives of the residue classes of m, then we call the polynomial πpxq “ qi“1 px´ci q
a π-polynomial for R.
Example 2.3. We mentioned in the introduction that for R “ Z9 , Z pmq “ px, 3q2 .
However, for R “ Z8 , Z pmq Ľ px, 2q3 . In fact, according to Theorem 4.4 and a few
brief calculations, Z pmq “ px, 2q3 ` px2 ´ 2xq “ px2 ´ 2x, 4xq. We may then use Theorem 4.2 to compose with the π-polynomial πpxq “ x2 ´ x and conclude that Z pRq “
ppx2 ´ xq2 ´ 2px2 ´ xq, 4px2 ´ xqq.
The following basic result is a generalized factor theorem that will be useful in a few
proofs. The part related to units appears in Gilmer’s proof of Theorem 4 in [G].
Lemma 2.4. Let R be a commutative ring with identity. If f pxq P Rrxs is a polynomial
with roots c1 , c2 , . . . , cn such that each difference ci ´ cj (i ‰ j) is either a regular element
or a unit, then px ´ c1 qpx ´ c2 q . . . px ´ cn q divides f pxq in Rrxs.
Proof. By the Factor Theorem, f pxq “ px ´ c1 qf1 pxq for some f1 pxq P Rrxs. Substituting
c2 in for x, we obtain 0 “ f pc2 q “ pc2 ´ c1 qf1 pc2 q. Since c2 ´ c1 is either a regular element
or a unit, c2 is a root of f1 pxq; we obtain some f2 pxq P Rrxs with f1 pxq “ px ´ c2 qf2 pxq. So
f pxq “ px ´ c1 qpx ´ c2 qf2 pxq. By continuing to evaluate at the c’s in this manner, we arrive
at f pxq “ px´ c1 qpx´ c2 q ¨ ¨ ¨ px´ cn qfn pxq for some polynomial fn pxq P Rrxs, as desired.
Convention. Throughout this paper, let R be a Noetherian local ring with maximal ideal
m. Unless otherwise specified, the residue field R{m will be denoted by R. The image in R
of an element r P R will be denoted by r. If the residue field is finite, c1 , . . . , cq will denote
a set ofś
representatives of the residue classes of m and πpxq will denote the π-polynomial
πpxq “ qi“1 px ´ ci q.
The following lemma may be viewed as a generalization of Fermat’s Little Theorem; it
is well-known, at least in special cases, as remarked by D. J. Lewis in [L]. A simple but
important consequence of this lemma is that πpRq Ď m. Later in Corollary 2.11 we will
show that if R is Henselian, then πpRq “ m.
Lemma 2.5. If pR, mq is a Noetherian local ring with finite residue field of cardinality q,
then Z pR, mq “ pπpxq, mq for any π-polynomial πpxq.
` ˘
Proof. Let f pxq P Z pR, mq; then f pxq P Z R . By Lemma 2.4, f pxq is in the ideal generated
by πpxq in Rrxs; pull this back to Rrxs to get f pxq P pπpxq, mq.
For the opposite containment,
certainly the constant polynomials in m are in Z pR, mq.
śq
Now suppose πpxq “ i“1 px ´ ci q. Since any element in R is congruent modulo m to one
of the ci , the polynomial πpxq is in Z pR, mq, as desired.
4
MARK W. ROGERS AND CAMERON WICKHAM
Example 2.6. Let R “ Zp5q (Z localized at the prime ideal p5q), so that m “ p5q, R “ Z5 ,
and q “ 5. The polynomial xq ´ x is not a π-polynomial since it doesn’t factor completely
over R Ď Q: x5 ´ x “ xpx ´ 1qpx ` 1qpx2 ` 1q. However, by Lagrange’s Theorem applied
to the group of units of R, it is still true that x5 ´ x P Z pR, mq. According to the lemma,
we expect x5 ´ x P pπpxq, mq for any π-polynomial. In fact, if for example we let πpxq “
px ´ 2qpx ` 1qxpx ´ 1qpx ` 2q, then x5 ´ x “ πpxq ` 5px3 ´ 1q P pπpxq, mq.
In the next result we show that the zero-functions are precisely those polynomials that
are multiples of each π-polynomial.
Proposition 2.7. Let pR, mq be a Noetherian ring with finite residue field R of cardinality
q. The zero-function ideal
Ş of R is the intersection of the principal ideals generated by the
π-polynomials: Z pRq “ pπpxqq.
Proof. The fact that any zero-function f pxq P Z pRq is a multiple
of any π-polynomial πpxq
Ş
follows immediately
from
Lemma
2.4.
This
shows
Z
pRq
Ď
pπpxqq.
Ş
Let f pxq P pπpxqq and let r P R; we show f prq “ 0. We may extend r to a set r, c2 , . . . , cq
of representatives of the residue classes of m, and thus πpxq “ px ´ rqpx ´ c2 q ¨ ¨ ¨ px ´ cq q
is a π-polynomial having r as a root. Since f pxq is a multiple of πpxq, f prq “ 0. Thus
f pxq P Z pRq.
In the following result we give a minimal primary decomposition of Z pRq if R is finite.
First, we give a simple example:
Example 2.8. For R “ Z9 , as mentioned in the introduction, we have Z pmq “ px, 3q2 “
px2 , 3xq, so the proposition below gives the following minimal primary decomposition of
Z pRq:
ppx3 ´ xq2 , 3px3 ´ xqq “ px2 , 3xq X ppx ´ 1q2 , 3px ´ 1qq X ppx ´ 2q2 , 3px ´ 2qq,
where the ideals on the right are primary for the maximal ideals px, 3q, px ´ 1, 3q, and
px ´ 2, 3q, respectively.
Proposition 2.9. Let pR, mq be a finite local ring with residue field R of cardinality
q. Let c1 , . . . , cq be a set of representatives of the residue classes of m. Then Z pRq “
Ş
q
i“1 Z pci ` mq is a minimal primary decomposition of Z pRq. For each i, the associated
prime of Z pci ` mq is the maximal ideal px ´ ci , mq.
Proof. Certainly any zero-function
on R is also zero on each ci ` m. For the other inclusion,
Ť
use the fact that R “ qi“1 pci ` mq. For the statement about associated primes, let e
be the index of nilpotency of m, so that me “ 0 but me´1 ‰ 0, and use the fact that
px ´ ci , mqe Ď Z pci ` mq.
As for the minimality
of the decomposition,
Ş
ś let j be an integer between
Ş 1 and q; we show
that Z pRq Ĺ i‰j Z pci ` mq. Let hpxq “ i‰j px ´ ci qe ; then hpxq P i‰j Z pci ` mq since
ś
me “ 0. To see that hpxq is not a zero-function, note that hpcj q “ i‰j pcj ´ ci qe is a
product of units, and is thus nonzero.
Next we provide an equivalent way to view π-polynomials, provided the ring is Henselian;
of course, this holds for the finite local rings in which we are mainly interested. For an
example where the two conditions below are not equivalent, see Example 2.6. This theorem
is also needed in our proof that π-polynomials map R surjectively onto m.
POLYNOMIALS INDUCING THE ZERO FUNCTION ON LOCAL RINGS
5
Theorem 2.10. Let R be a Henselian local ring with finite residue field R of cardinality q.
For any polynomial πpxq P Rrxs, the following statements are equivalent:
(i) The polynomial πpxq is a π-polynomial.
(ii) The polynomial πpxq is monic and maps to xq ´ x in Rrxs.
Proof. Let πpxq be any π-polynomial. Since R is a field with q elements, by Lagrange’s
theorem on the group of units of R, xq ´ x is a zero-function on R. By Lemma 2.4, πpxq
divides xq ´ x in Rrxs. Since these are monic polynomials of the same degree, they are
equal.
For the converse, suppose πpxq is any monic polynomial withśπpxq “ xq ´ x. Let R “
td1 , . . . , dq u; as discussed in the previous paragraph, xq ´ x “ qi“1 px ´ di q in Rrxs. By
Hensel’s Lemma, this factorization of πpxq can be pulled
śqback to a factorization in Rrxs:
There exist ci in R with ci “ di such that πpxq “
i“1 px ´ ci q. Thus πpxq is a πpolynomial.
In the following corollary, we improve upon part of Lemma 2.5 by showing that the
induced function π : R Ñ m is actually surjective when R is Henselian. This generalizes
Lemma 1.3 of [B], where A. Bandini proved that, for any prime p, πpRq “ m in case R “ Zpn
and πpxq “ xp ´ x. We use this corollary in our Theorem 3.2, where we characterize finite
rings with principal zero-function ideals, expanding upon Gilmer [G]. It is used again in
Proposition 4.1, which is fundamental for our Theorem 4.2, which shows that generators
for Z pRq may be obtained by composing generators for Z pmq with a π-polynomial.
Corollary 2.11. If pR, mq is a Henselian local ring with finite residue field R of cardinality
q, then πpRq “ πpcq “ m for any π-polynomial πpxq and any coset c of m.
Proof. We show that πpcq Ď πpRq Ď m Ď πpcq. The first containment is clear since c Ď R,
and we saw the second containment in Lemma 2.5. For the final containment, let m P m.
By Theorem 2.10, the polynomial πpxq ´ m is still a π-polynomial, and thus it factors over
R: πpxq ´ m “ px ´ c1 qpx ´ c2 q ¨ ¨ ¨ px ´ cq q. This shows that for each i, πpci q “ m. Since
c1 , c2 , . . . , cq is a set of representatives of the residue classes of m, one of them, say cj , is in
c. Thus m “ πpcj q P πpcq, as desired.
3. When Z pRq and Z pmq are Nonzero, Regular, or Principal
In the upcoming Theorems 3.2 and 3.3 we will use the following result from B. R. McDonald. McDonald states and proves the theorem for any finite local ring pR, mq, but the
theorem and proof still hold when R is just Artinian. The notation McDonald uses is different from ours but the part we will use is that over an Artinian local ring, any regular
polynomial is an associate of a monic polynomial. McDonald writes µf where we would
write f , the image of f in Rrxs.
Theorem 3.1. [M, Theorem XIII.6, p. 259] Let f be a regular polynomial in Rrxs. Then
there is a monic polynomial f ˚ with µf “ µf ˚ and, for an element a in R, f paq “ 0 if and
only if f ˚ paq “ 0. Furthermore, there is a unit v in Rrxs with vf “ f ˚ .
One of the motivations for the current paper is Theorem 4 from [G], which states that
if pR, mq is a zero-dimensional local ring, then Z pRq is principal if and only if either R is
infinite (when Z pRq “ 0) or R is a finite field (when Z pRq is generated by xq ´ x.) The
following result recovers half of Gilmer’s result, using some of the same ideas but a few
different ones as well. For example, Gilmer used a result of E. Snapper; instead we use the
6
MARK W. ROGERS AND CAMERON WICKHAM
result of McDonald mentioned above. Also, we make the connection with π-polynomials
and Z pmq. The other half of Gilmer’s result is recovered in Theorem 3.3.
Theorem 3.2. Let pR, mq be a finite local ring and let πpxq be any π-polynomial for R.
The following statements are equivalent:
(1) R is a field.
(2) Z pRq is principal.
(3) Z pRq “ pπpxqq.
(4) Z pmq is principal.
(5) Z pmq “ pxq.
Proof. If R is a field then Rrxs is a principal ideal domain, so Z pRq is principal.
Assume Z pRq is principal. Since πpRq Ď m and me “ 0 for some e ě 1, Z pRq contains
regular polynomials, such as πpxqe ; thus, the generator of Z pRq must be regular. According
to Theorem 3.1, we may assume the generator is monic: Z pRq “ pf pxqq for some monic
polynomial in Rrxs. Let r be a nonzero element in the annihilator of m, so that, by
Lemma 2.5, rπpxq is a polynomial of degree q in Z pRq “ pf pxqq. This forces f pxq to have
degree at most q, and since we know that all polynomials in Z pRq are multiples of πpxq
(Proposition 2.7), the degree of f pxq is exactly q. Since f pxq is a monic multiple of πpxq
with the same degree, f pxq “ πpxq.
If Z pRq “ pπpxqq, then according to Corollary 2.11, 0 “ πpRq “ m. From this we easily
conclude that Z pmq “ pxq, and thus Z pmq is principal.
If Z pmq is principal, we use an argument similar to the part where we assumed Z pRq
is principal. Since Z pmq contains xe for some e ě 1, Z pmq contains regular elements, so
the generator of Z pmq is regular, and we may assume it is monic: Z pmq “ pf pxqq for some
monic f pxq P Rrxs. Let r be a nonzero element in the annihilator of m, so that rx P Z pmq.
This forces f pxq to have degree at most 1. Since f pxq is monic and f p0q “ 0, f pxq “ x, as
desired.
If Z pmq “ x, then m “ 0, so R is a field.
In the next proposition it becomes clear how the conditions of being Artinian or having
a finite residue field affect Z pRq and Z pmq. We will use the concept of the embedding
dimension of R, denoted edim R; this is the minimal number of generators of the maximal
ideal. Recall that depth R ď dim R ď edim R.
Theorem 3.3. Let pR, mq be a Noetherian local ring.
(1) Z pmq contains nonzero polynomials if and only if depth R “ 0.
(2) Z pRq contains nonzero polynomials if and only if depth R “ 0 and R is finite.
(3) Z pmq contains regular polynomials if and only if dim R “ 0.
(4) Z pRq contains regular polynomials if and only if dim R “ 0 and R is finite.
(5) Z pmq is generated by a regular polynomial if and only if edim R “ 0.
(6) Z pRq is generated by a regular polynomial if and only if edim R “ 0 and R is finite.
In order to make the similarity with the other parts more clear, parts (4), (5), and (6)
of the previous proposition were not stated as concisely as possible. Before we present the
proof, we state and prove a corollary to clarify those three parts. In the development of this
paper, we were particularly interested in the monic polynomials in Z pRq, so this corollary
explains why we were mainly focused on finite rings.
Corollary 3.4. Let pR, mq be a Noetherian local ring.
POLYNOMIALS INDUCING THE ZERO FUNCTION ON LOCAL RINGS
(3)
(4)
(5)
(6)
Z pmq
Z pRq
Z pmq
Z pRq
7
contains regular polynomials if and only if R is Artinian.
contains regular polynomials if and only if R is a finite ring.
is generated by a regular polynomial if and only if R is a field.
is generated by a regular polynomial if and only if R is a finite field.
Proof of Corollary 3.4. Part (3) is clear since a Noetherian local ring is Artinian if and
only if it has dimension 0. Part (4) follows from the proposition since a zero dimensional
Noetherian local ring has a finite residue field if and only if the ring is finite. Parts (5) and
(6) follow since edim R “ 0 if and only if R is a field.
Proof of Theorem 3.3. (1): If R has depth 0 then since R is Noetherian, there is a nonzero
element m that annihilates m; thus mx P Z pmq.
If R does not have depth 0, then R contains a regular element t. Let gpxq “ g0 ` g1 x `
¨ ¨ ¨ ` gn xn P Z pmq. Since gptq “ gpt2 q “ gpt3 q “ ¨ ¨ ¨ “ gptn`1 q “ 0, there is a matrix
equation
fi» fi » fi
»
1 t1
t2
¨¨¨
tn
g0
0
4
2n ffi — ffi
—1 t2
—0ffi
t
¨
¨
¨
t
g
1
ffi— ffi — ffi
—
— ..
..
..
.. ffi — .. ffi “ — .. ffi
..
–.
.
.
.
. fl – . fl –.fl
1 tn`1 tpn`1q2 ¨ ¨ ¨
tpn`1qn
The determinant of this Vandermonde matrix is
ź
ź
ptj ´ ti q “
1ďiăjďn`1
gn
0
ti ptj´i ´ 1q.
1ďiăjďn`1
Since each tj´i ´ 1 is a unit, this determinant is an associate of a power of t; namely tk
where k “ npn ` 1qpn ` 2q{6. After multiplying both sides of the matrix equation by the
adjugate and dividing by the unit, we find that tk gi “ 0 for each i. Since tk is regular, the
polynomial gpxq is zero, as desired.
(2): Assume R “ tc1 , . . . , cq u and R has depth 0. Since R is Noetherian with depth 0,
there
śq is a nonzero element m that annihilates m. By Lemma 2.5, the polynomial πpxq “
i“1 px ´ ci q is in Z pR, mq, so the polynomial mπpxq is a nonzero element of Z pRq.
For the converse, if R is not finite, then there is an infinite sequence of elements tcn uně1
such that no two come from the same residue class of m; thus each difference cj ´ ci (j ‰ i)
is a unit. On the other hand, if R does not have depth 0, then there is a regular element
t P m. Consider the sequence ttn uně1 ; for i ą j we have ti ´ tj “ tj pti´j ´ 1q. Since tj is
regular and ti´j ´ 1 is a unit, each difference ti ´ tj (i ‰ j) is regular.
In either case, we may apply Lemma 2.4 to conclude that any nonzero polynomial in the
zero-function ideal has arbitrarily high degree. This is a contradiction, so the zero-function
ideal contains only the zero polynomial, as desired.
(3): If R has dimension 0 then me “ 0 for some e ě 1. Thus xe P Z pmq.
Conversely, if R has positive dimension, then for any minimal prime ideal p of R, R{p is
an integral domain of positive dimension; in particular, it has positive depth. According to
Part (1), Z pm{pq is the zero ideal of of R{p. The image of any f pxq P Z pmq in pR{pqrxs is
in Z pm{pq, and thus f pxq P prxs. Since the coefficients of f pxq are in every minimal prime,
they are all nilpotent, so f pxq is not regular.
0. Let e be such that me “ 0 and let R “ tc1 , . . . , cq u.
(4): Suppose R is finite and dim R “ ś
By Lemma 2.5, the polynomial πpxq “ qi“1 px´ci q is in Z pR, mq, so the regular polynomial
πpxqe is in Z pRq.
8
MARK W. ROGERS AND CAMERON WICKHAM
Conversely, suppose either R is infinite or dim R ě 1. If R is infinite, then Z pRq does
not contain regular polynomials since it is the zero ideal, by Part (2). If dim R ě 1, then
for every minimal prime ideal p of R, R{p is an integral domain of positive dimension; in
particular, it has positive depth. According to Part (2), Z pR{pq is the zero ideal of of R{p.
The image of any f pxq P Z pRq in pR{pqrxs is in Z pR{pq, and thus f pxq P prxs. This shows
that f pxq cannot be regular.
(5): If edim R “ 0 then R is a field, so m “ 0 and Z pmq “ pxq.
Conversely, assume Z pmq “ pf pxqq for some regular polynomial f pxq P Rrxs. By Part
(3), dim R “ 0, so me “ 0 for some e ě 1. Due to this and the result from McDonald
(our Theorem 3.1), we may assume f pxq is monic. By Part (1), depth R “ 0, so there is an
element m P m with mx P Z pmq. This shows that the monic polynomial f pxq must have
degree 1; the only choice is f pxq “ x. From this we see that m “ 0 so R is a field.
(6): If edim R “ 0 and R is finite, then R is a finite field, so Z pRq “ pπpxqq for any
π-polynomial, by Lemma 2.5.
Conversely, assume Z pRq “ pf pxqq for some regular polynomial f pxq. From Part (4) we
know that dim R “ 0 and R is finite; this implies that R is finite. By Theorem 3.2, R is a
finite field, so edim R “ 0.
In the following example we illustrate the use of this theorem and contrast the behavior
of the zero-function ideals over rings with finite and infinite residue fields.
Example 3.5. The ring R “ Z2 JS, T K{pS 2 , ST q is a complete Noetherian local ring with
depth zero, dimension one, and a finite residue field with q “ 2 elements; let s and t be
the images of S and T in R. According to Theorem 3.3, Z pmq is nonzero but does not
contain regular polynomials, and the same goes for Z pRq. We argue that Z pmq “ psxq
and conclude that Z pRq “ pspx2 ´ xqq by applying Theorem 4.2. Certainly Z pmq Ě psxq,
since the annihilator of the maximal ideal of R is sR. For the opposite containment, let
R̃ “ R{sR – Z2 JT K, a local Noetherian ring of positive depth. If f pxq P Z pmq, then
f˜ P Z pm̃q, where m̃ and f˜ are the images of m and f in R̃ and R̃rxs. By Theorem 3.3 (1),
Z pm̃q “ 0, so we conclude that f P psq. Since f p0q “ 0, f P psq X pxq “ psxq, as desired.
If we switch to an infinite coefficient ring and residue field, say, Q instead of Z2 , we
still have Z pmq “ psxq (nonzero but containing no regular polynomials). However, Theorem 4.2 does not apply (for one thing, π-polynomials don’t exist). In fact, Theorem 3.3 (2)
guarantees Z pRq “ 0 instead of Z pRq “ pspx2 ´ xqq.
4. Obtaining Z pRq from Z pmq; Applications
The following proposition is the key to our main result, Theorem 4.2.
Proposition 4.1. Let pR, mq be a Henselian local ring with finite residue field R and let
πpxq be an arbitrary π-polynomial. Any f pxq P Z pRq may be written in the form
f pxq “ p0 pπpxqq ` xp1 pπpxqq ` x2 p2 pπpxqq ` ¨ ¨ ¨ ` xq´1 pq´1 pπpxqq
with each pi pxq P Z pmq.
Proof. Let f pxq P Z pRq. In the polynomial ring Rrx, ys “ Rrysrxs, f may be divided
by the monic polynomial πpxq ´ y, so that f pxq “ Qpx, yqpπpxq ´ yq ` Rpx, yq for some
Qpx, yq, Rpx, yq P Rrx, ys with Rpx, yq “ 0 or the degree of Rpx, yq with respect to x is
less than q. Now set y “ ppxq to obtain f pxq “ p0 pπpxqq ` xp1 pπpxqq ` x2 p2 pπpxqq ` ¨ ¨ ¨ `
POLYNOMIALS INDUCING THE ZERO FUNCTION ON LOCAL RINGS
9
xq´1 pq´1 pπpxqq where the polynomials pi pyq P Rrys are the coefficients of the powers of x
in Rpx, yq.
It remains to see that each pi pxq P Z pmq. Let m P m. Since (according to Corollary 2.11)
π maps each coset of m onto m, there exists a set c1 , c2 , . . . , cq of representatives of the
residue classes of m, with πpci q “ m for each ci ; each difference ci ´ cj (i ‰ j) is a unit.
Since f pxq P Z pRq, we may evaluate f pxq at ci for each i from 1 to q to obtain
0 “ p0 pmq ` ci p1 pmq ` c2i p2 pmq ` ¨ ¨ ¨ ` ciq´1 pq´1 pmq.
In matrix form, this system becomes
» fi »
1 c1 c21 ¨ ¨ ¨
0
—0ffi —1 c2 c2 ¨ ¨ ¨
2
— ffi —
— .. ffi “ — .. ..
.. . .
–.fl –. .
.
.
2
0
1 cq cq ¨ ¨ ¨
fi
fi»
c1q´1
p0 pmq
ffi
—
c2q´1 ffi
ffi — p1 pmq ffi
ffi
..
.. ffi —
fl
.
. fl–
q´1
pq´1 pmq
cq
ś
The matrix is a Vandermonde matrix, and its determinant is 1ďiăjďq pcj ´ ci q, which is
a unit since it is a product of units. Thus, the matrix is invertible, so each pi pmq “ 0, as
desired.
An application of the previous result, we come to our main theorem, which states that generators for Z pRq can be obtained by composing generators for Z pmq with any π-polynomial,
which we could roughly describe by writing Z pRq “ Z pmq ˝ Z pR, mq, if one keeps in mind
Lemma 2.5 which states that Z pR, mq “ pπpxq, mq. An obvious consequence of the next
theorem is that the minimal number of generators of Z pRq is less than or equal to the
minimal number of generators of Z pmq.
Theorem 4.2. Suppose pR, mq is a Henselian local ring with finite residue field R of cardinality q and let πpxq be an arbitrary π-polynomial. If Z pmq “ pF1 pxq, . . . , Fn pxqq then
Z pRq “ pF1 pπpxqq, . . . , Fn pπpxqqq.
Proof. Since πpRq Ď m, certainly Z pRq Ě pF1 pπpxqq, . . . , Fn pπpxqqq. Now let f pxq P
Z pRq. Use Proposition 4.1 to write f pxq “ p0 pπpxqq ` xp1 pπpxqq ` x2 p2 pπpxqq ` ¨ ¨ ¨ `
xq´1 pq´1 pπpxqq with each pi pxq P Z pmq. Since each pi pxq is an Rrxs-linear combination of
F1 pxq, . . . , Fn pxq, each pi pπpxqq is an Rrxs-linear (actually Rrπpxqs-linear) combination of
F1 pπpxqq, . . . , Fn pπpxqq. Since f pxq is an Rrxs-linear combination of the pi pπpxqq, the proof
is complete.
Remark 4.3. The equality Z pRq “ Z pmq ˝ Z pR, mq should not be taken too literally.
Certainly polynomials in Z pmq composed with polynomials in Z pR, mq are in Z pRq, but
it’s not true that every polynomial in Z pRq can be obtained in that way. For example,
xpx2 ´ xq P Z pZ2 q, but since it’s degree is not even, it does not equal f px2 ´ xq for any
polynomial f pxq.
As mentioned in the introduction, the theorem below is a version of results of Dickson [D,
p. 22, Theorem 27], Bandini [B, Theorem 2.1], and Lewis [L, Theorem II], adapted for Z pmq
rather than Z pRq, and for finite local rings rather than specific rings. We then recover the
results for Z pRq in Corollary 4.5 as an application of our main theorem, Theorem 4.2.
Theorem 4.4. Let pR, mq be a finite local ring with principal maximal ideal m “ pmq; set
q “ |R{m|. Suppose e is the index of nilpotency of m. If e ď q then Z pmq “ px, mqe ; if
e “ q ` 1, then Z pmq “ px, mqe ` pxq ´ mq´1 xq.
10
MARK W. ROGERS AND CAMERON WICKHAM
Proof. We prove the first result using induction on e. The base case e “ 1 is clear, since then
R is a field, m “ 0, and Z pmq “ pxq. Assume the result is true for rings whose maximal
ideal has index of nilpotency e ´ 1 ď q; we prove the result for a ring whose maximal
ideal has index `of nilpotency
e ď q. The containment Ě is clear. Let f pxq P Z pmq;
˘
then f pxq P Z R{me´1 . By induction, f pxq P px, mqe´1 , and thus f pxq P px, mqe´1 .
ře´1 k e´1´k
We have f pxq “ k“0
x m
fk pxq for some fk pxq P Rrxs; it remains to see that each
fk pxq P px, mq, i.e. that fk p0q P m.
For each r P R,
0 “ f prmq “
e´1
ÿ
prmqk me´1´k fk prmq “ me´1
k“0
e´1
ÿ
r k fk prmq.
k“0
ře´1
ře´1 k
Since the annihilator of me´1 is m, k“0 r k fk prmq P m, and thus k“0
r fk p0q P m. This
` ˘
` ˘
ře´1
k
q
shows that k“0 fk p0qx P Z R . Since by Lemma 2.5 Z R “ px ´ xq, this polynomial
with degree less than q must be the zero polynomial. Therefore each fk p0q P m, as desired.
For the second result, the only part of the containment Z pmq Ě px, mqe ` pxq ´ mq´1 xq
that is not clear is xq ´ mq´1 x P Z pmq; for this, take any rm P m and compute prmqq ´
mq´1 prmq “ mq pr q ´rq P mq`1 “ 0. For the opposite containment, assume f pxq P Z pmq and
reduce module me´1
to obtain a similar expression for f pxq, and again deduce that
` as
˘ above
ře´1
ře´1
k
q
k
q
k“0 fk p0qx “ upx ´ xq
k“0 fk p0qx P Z R “ px ´ xq. Since e ´ 1 “ q, we must have
for some unit u P R; thus each fk p0q “ 0 except for fq p0q “ u and f1 p0q “ ´u . Define
polynomials gk pxq identical to fk pxq except for gq pxq “ fq pxq ´ u and g1 pxq “ f1 pxq ` u.
Now the constant term of each gk pxq is in m and we have
f pxq “
e´1
ÿ
xk me´1´k fk pxq “ upxq ´ mq´1 xq `
k“0
e´1
ÿ
xk me´1´k gk pxq
k“0
so that f pxq P px, mqe ` pxq ´ mq´1 xq, as desired.
The following corollary follows immediately from the theorem and Theorem 4.2.
Corollary 4.5. Let pR, mq be a finite local ring with principal maximal ideal m “ pmq; set
q “ |R{m|. Suppose e is the index of nilpotency of m, and let πpxq be any π-polynomial. If
e ď q then Z pRq “ pπpxq, mqe ; if e “ q ` 1 then Z pRq “ pπpxq, mqe ` pπpxqq ´ mq´1 πpxqq.
5. Factoring π-Polynomials
The following lemma is the heart of a more constructive approach (Theorem 5.2) to
the converse part of the proof of Theorem 2.10, which gave two equivalent conditions for
π-polynomials. Note that according to this lemma, if me “ 0, then for any r P R, the
sequence tpn prqu stabilizes at n “ e ´ 1.
Lemma 5.1. Let pR, mq be a Noetherian local ring with finite residue field R of cardinality
q, and let πpxq be any polynomial mapping to xq ´ x in Rrxs. Let p0 pxq “ x and pn pxq “
πppn´1 pxqq ` pn´1 pxq, so that pn pxq denotes the function obtained by successively applying
the function πpxq ` x, n times. For every n ě 1,
pn pxq ´ pn´1 pxq P Z pR, mn q .
POLYNOMIALS INDUCING THE ZERO FUNCTION ON LOCAL RINGS
11
Proof. We use induction on
` n. For
˘ the base case (n “ 1) just note that p1 pxq ´ p0 pxq “
pπpxq ` xq ´ x “ πpxq P Z R, m1 by Lemma 2.5.
n
Now assume the induction hypothesis:
`
˘For some n ě 1, pn pxq ´ pn´1 pxq P Z pR, m q.q We
n`1
show that pn`1 pxq ´ pn pxq P Z R, m
. Since πpxq is a polynomial mapping to x ´ x
modulo mrxs, there is some mpxq P mrxs such that πpxq “ xq ´ x ´ mpxq; thus pn pxq may
also be viewed as applying xq ´ mpxq, n times. For simplicity of notation, set c “ pn pxq,
a “ pn´1 pxq, and b “ c ´ a, so that c “ πpaq ` a “ aq ´ mpaq. We have
pn`1 pxq ´ pn pxq “ πppn pxqq ` pn pxq ´ pn pxq
“ πpcq
“ cq ´ c ´ mpcq
“ pa ` bqq ´ c ´ mpcq
ˆ ˙
q q´2 2
q
q´1
“ a ` qa b `
a b ` ¨ ¨ ¨ ` bq ´ c ´ mpcq
2
ˆ ˙
q q´2 2
q´1
“ qa b `
a b ` ¨ ¨ ¨ ` bq ` mpaq ´ mpcq
2
since aq ´ c `“ mpaq. ˘By induction, b P Z pR, mn q, and since `q P m, we˘ see that the first
term is in Z R, mn`1 . Since b P Z pR, mn q and n ě 1, b2 P Z R, mn`1 , which takes care
of all but the last two terms: mpaq ´ mpcq.
řdeg mpxq
Now mpaq ´ mpcq “ i“1
mi pai ´ ci q, where mi is the coefficient of xi in mpxq, and is
thus in m. Since ´b “ a´c is a factor
of a˘i ´ci for all positive integers i and ´b P Z pR, mn q,
`
it follows that mpaq ´ mpcq P Z R, mn`1 , as desired.
The following theorem provides, in particular, a more constructive approach to the proof
of the result in Theorem 2.10 which states that any monic polynomial πpxq mapping to
xq ´ x is actually a π-polynomial. In a ring with me “ 0, it allows discovery of the roots by
successively applying the function πpxq ` x (e ´ 1 times) to representatives of the residue
classes of m. When πpxq “ xq ´ x, this amounts to successively taking qth powers. In the
case of a finite ring, the resulting roots of xq ´ x are called Teichmüller elements in Jian
Jun Jiang’s paper [J].
Theorem 5.2. Let pR, mq be a complete Noetherian local ring with finite residue field R “
tc1 , . . . , cq u. Let πpxq be any polynomial mapping to xq ´ x in Rrxs and let pn pxq be the
function obtained by applying πpxq`x successively, n times. The limit limnÑ8 pn pci q exists.
Set di “ limnÑ8 pn pci q; then di is a root of πpxq and di “ ci . If πpxq is monic, then there
is a factorization
πpxq “ px ´ d1 qpx ´ d2 q ¨ ¨ ¨ px ´ dq q,
and thus πpxq is a π-polynomial.
Proof. The limit exists since, by Lemma 5.1, the sequence tpn pci quně1 is a Cauchy sequence.
For any r P R, πprq ` r and r are in the same coset of m, since πprq “ r q ´ r ´ mprq P m. We
may apply this fact successively, beginning with r “ ci , to see that each pn pci q is congruent
to ci modulo m. Since m is closed under the m-adic topology, we conclude that di “ ci .
To see that πpdi q “ 0, use the Cauchy sequence mentioned above and the fact that
polynomials are continuous under the m-adic topology:
πpdi q “ πplim pn pci qq “ lim πppn pci qq “ limppn`1 pci q ´ pn pci qq “ 0.
12
MARK W. ROGERS AND CAMERON WICKHAM
If πpxq is monic then it must have degree q; an application of Lemma 2.4 completes the
proof.
Example 5.3. With R “ Z125 , we have q “ 5 and e “ 3. We can choose elements 0, 1, 2, 3, 4
to be representatives of the elements of R{m “ Z5 . We factor the polynomial
πpxq “ x5 ` 5x4 ` 40x3 ` 85x2 ` 24x ` 50 “ x5 ´ x ´ mpxq
where mpxq “ ´p5x4 ` 40x3 ` 85x2 ` 25x ` 50q. Applying p2 pxq to 0, 1, 2, 3, 4 yields
50, 31, 72, 18, 74. According to the theorem, πpxq factors in Rrxs as
πpxq “ px ´ 50qpx ´ 31qpx ´ 72qpx ´ 18qpx ´ 74q.
Acknowledgment: The authors thank Richard Belshoff, Jung-Chen Liu and Les Reid for
helpful discussions and suggestions.
References
Bandini, A., Functions f : Z{p Z ÝÑ Z{pn Z induced by polynomials of Zrxs, Annali di Matematica
181 (2002), 95–104. doi:10.1007/s102310100031
[]D
Dickson, L. E., Introduction to the Theory of Numbers, The University of Chicago Press, 1929.
[]F
Frisch, S., Polynomial Functions on Finite Commutative Rings, Lecture Notes in Pure and Appl.
Mathematics 205, Dekker 1999, 323–336.
[]G
Gilmer, R., The Ideal of Polynomials Vanishing on a Commutative Ring, Proc. Amer. Math. Soc. 127
(1999), no. 5, 1265–1267. doi:10.1090/S0002-9939-99-04634-1
[]J
Jiang, Jian Jun, On the Number Counting of Polynomial Functions, J. Math. Research & Exp. 30
(2010), no. 2, 241–248. doi:10.3770/j.issn:1000-341X.2010.02.006
[]L
Lewis, D. J., Ideals and Polynomial Functions, Amer. J. Math. 78 (1956), no. 1, 71–77.
doi:10.2307/2372485
[]LRS Lahtonen, J., Ryu, J., and Suvitie, E., On the Degree of the Inverse of Quadratic Permutation Polynomial Interleavers, IEEE Trans. Inf. Theory 58 (2012), no. 6, 3925–3932. doi:10.1109/TIT.2012.2190492
[]M McDonald, B. R., Finite Rings with Identity, Pure and Applied Mathematics, New York, Marcel
Dekker Inc, 1974.
[]NW Niven, I. and Warren, L. J., A Generalization of Fermat’s Theorem, Proc. Amer. Math. Soc. 8 (1957),
no. 2, 306–313. doi:10.1090/S0002-9939-1957-0086804-0
[]P
Peruginelli, G., Primary decomposition of the ideal of polynomials whose fixed divisor is divisible by a
prime power, J. Alg. 398 (2014), 227–242. doi:10.1016/j.jalgebra.2013.09.016
[]W Werner, N. J., Polynomials that kill each element of a finite ring, J. Alg. and Its Appl. 13 (2014), no.
3, 1350111-1–12. doi:10.1142/S0219498813501119
[]Z
Zhang, Q., Polynomial functions and permutation polynomials over some finite commutative rings,
J. Number Theory 105 (2004), 192–202. doi:10.1016/j.jnt.2003.09.009
[]B
n
Department of Mathematics, Missouri State University, Springfield, MO 65897, USA
E-mail address: [email protected]
Department of Mathematics, Missouri State University, Springfield, MO 65897, USA
E-mail address: [email protected]
| 0math.AC
|
Calcul matriciel généralisé sur les
domaines de Prüfer
arXiv:1508.00345v1 [math.AC] 3 Aug 2015
Gema M. Díaz-Toca, Henri Lombardi, 27 juillet 2015
Résumé
Dans cet article nous présentons un algorithme pour calculer la
forme de Hermite d’une pseudo-matrice sur un domaine de Prüfer. Ceci
nous donne des preuves constructives des principaux résultats théoriques
concernant les modules de présentation finie et projectifs de type fini
sur le domaines de Prüfer, et nous permet de discuter la résolution
des systèmes linéaires sur les domaines de Prüfer. Nous généralisons
ainsi la méthodologie développée par Henri Cohen pour les domaines
de Dedekind. Nous présentons également des résultats concernant la
réduction de Smith sur les domaines de Prüfer de dimension 6 1.
Abstract
In this paper, we first present an algorithm for computing the
Hermite normal form of pseudo-matrices over Prüfer domains. This
algorithm allows us to provide constructive proofs of the main theoretical results on finitely presented modules over Prüfer domains and to
discuss the resolution of linear systems. In some sense, we generalize the
methodology developed by Henri Cohen for Dedekind domains. Finally,
we present some results over Prüfer domains of dimension one about
the Smith normal form.
Introduction
La résolution algorithmique des systèmes linéaires sur les corps ou sur
les anneaux principaux est classique, et elle est équivalente au traitement
des matrices par des manipulations élémentaires (et des manipulations de
Bezout dans le cas des anneaux principaux) de façon à les ramener à une
forme réduite convenable.
On vise ici la généralisation de ce type de procédé à des domaines de Prüfer
arbitraires.
À cet effet, on adapte pour un domaine de Prüfer arbitraire le calcul matriciel
généralisé d’Henri Cohen [Cohen, Chapitre 1], qu’il a introduit dans le cadre
du traitement algorithmique des anneaux d’entiers de corps de nombres.
Notre but est de montrer qu’avec un calcul matriciel généralisé on peut
obtenir pour un domaine de Prüfer l’analogue des réductions classiques pour
un domaine de Bezout.
2
Calcul matriciel généralisé
Ceci donne un traitement algorithmique systématique et hh agréable ii, qui
permet d’obtenir, comme conséquences du calcul matriciel considéré, les
théorèmes généraux sur les domaines de Prüfer.
En particulier cela donne un moyen pratique pour discuter les systèmes
linéaires à coefficients et inconnues dans le domaine de Prüfer considéré.
Du point de vue du Calcul Formel, notre approche permet de traiter des
situations plus générales que les approches usuelles. Par exemple, pour les
anneaux d’entiers de corps de nombres, comme le véritable ingrédient de nos
algorithmes se limite à l’inversion des idéaux de type fini, notre approche
permet de traiter le cas où la factorisation du discriminant est impossible
en pratique, et plus généralement le cas où le calcul d’une base d’entiers
sur Z est trop coûteux.
Notons que pour les domaines de Dedekind, et plus généralement pour les
domaines de Prüfer de dimension 6 1, on obtient des résultats plus précis,
du type de la réduction de Smith des matrices sur les anneaux principaux.
Cela sera discuté dans la section 4. Les méthodes ici relèvent des calculs
modulaires et sont les seules vraiment efficaces pour éviter l’explosion de la
taille des objets dans les calculs intermédiaires.
1. Quelques rappels
Le premier paragraphe de cette section donne des définitions classiques
que nous donnons si nécessaire sous forme constructive. Le deuxième est
consacré à des rappels concernant les calculs avec les idéaux de type fini
sur les domaines de Prüfer. Le troisième rappelle les principaux résultats
concernant les calculs matriciels sur les domaines de Bezout.
Notre référence pour les résultats classiques exposés dans cette section est
le livre [Modules], dans lequel tous les résultats sont démontrés de manière
algorithmique.
Quelques définitions
Un anneau A est dit zéro-dimensionnel si l’axiome suivant est vérifié
∀a ∈ A, ∃n ∈ N ∃x ∈ A, xn (1 − ax) = 0.
Un anneau intègre A est dit de dimension 6 1 lorsque pour tout b =
6 0
dans A, l’anneau quotient A/hbi est zéro-dimensionnel.
Sur un anneau A arbitraire, un idéal de type fini a = ha1 , . . . , an i est dit
P
localement principal s’il existe s1 , . . ., sn ∈ A tels que i∈J1..nK si = 1
et si a ⊆ hai i pour chaque si .
1. Quelques rappels
3
Un anneau A arbitraire est dit arithmétique si tout idéal de type fini est
localement principal.
Un idéal de type fini a = ha1 , . . . , an i est dit inversible s’il existe un élément régulier c et un idéal de type fini b tel que ab = hci. Il revient au
même de dire que a est localement principal et contient un élément régulier.
Un domaine de Prüfer est un anneau arithmétique intègre. De manière
équivalente, c’est un anneau intègre dans lequel tout idéal de type fini non
nul est inversible. Dans ce cas, pour tout a 6= 0 dans l’idéal de type fini a,
le transporteur (hai : a) est de type fini, avec l’égalité a (hai : a) = hai.
Une matrice A = (aij ) sur un anneau arbitraire est dite en forme de
Smith lorsque :
– tous les coefficients aij sont nuls sauf éventuellement des hh coefficients
diagonnaux ii ai = aii ,
– et ai divise ai+1 pour i > 1.
Lorsque la matrice M admet une réduction de Smith, le module Coker M est
isomorphe à la somme directe des A/hai i et les idéaux hai i sont uniquement
déterminés en vertu du fait 1.1.
Pour un anneau intègre, cela signifie que les ai sont eux-mêmes bien déterminés hh à une unité multiplicative près ii.
On appelle anneau de Smith un anneau A sur lequel toute matrice M
est équivalente à une matrice en forme de Smith.
L’idéal déterminantiel d’ordre k d’une matrice M est l’idéal de type
fini Dk (M ) engendré par les mineurs d’ordre k de M .
L’idéal de Fitting d’ordre k d’un module de présentation finie P , conoyau
d’une matrice M ∈ Mn,m (A), est défini par l’égalité Fk (P ) := Dn−k (M ). Il
ne dépend pas de la présentation choisie pour P .
On rappelle les résultats suivants.
1.1. Fait. ([Modules, théorème V-9.1], [MRR, théorème V-2.4])
Soient a1 ⊆ · · · ⊆ an et b1 ⊆ · · · ⊆ bm des idéaux de A avec n 6 m. Si un
module P est isomorphe à la fois à A/a1 ⊕· · ·⊕A/an et A/b1 ⊕· · ·⊕A/bm ,
alors on a
1. bk = A pour n < k 6 m ;
2. et bk = ak pour 1 6 k 6 n.
1.2. Fait. ([ACMC, exercice IV-16])
Soit P ' A/a1 ⊕ · · · ⊕ A/an avec des idéaux de type fini a1 ⊇ · · · ⊇ an .
Alors pour k ∈ J1..nK, on a Fn−k (P ) = a1 · · · ak .
4
Calcul matriciel généralisé
1.3. Fait. ([Modules, exercice XVI-9])
Sur un anneau arithmétique zéro-dimensionnel, toute matrice se ramène
par manipulations élémentaires de lignes et de colonnes à une matrice en
forme de Smith.
Idéaux fractionnaires de type fini
Il est souvent confortable de considérer, sur un pied d’égalité avec les idéaux
de type fini, les idéaux fractionnaires de type fini.
Pour un anneau intègre A de corps de fractions K, nous noterons Iff(A)
l’ensemble des idéaux fractionnaires de type fini de A, c’est-à-dire l’ensemble
des sous-A-modules de type fini de K.
Un idéal fractionnaire de type fini b peut toujours s’écrire
b=
1
a
a=
1
a
ha1 , . . . , an i avec a1 , . . . , an ∈ A, et a ∈ A∗ .
On dit qu’il est localement principal lorsque a est localement principal.
Il admet alors la même matrice de localisation principale (à coefficients
dans A) que a, avec les mêmes propriétés.
Le produit de deux idéaux fractionnaires est défini de façon naturelle et
l’on a xa yb = xy ab pour x, y ∈ K.
Concernant les transporteurs, il faut distinguer entre l’idéal fractionnaire
(a : b)K = { x ∈ K | xb ⊆ a }
et l’idéal (au sens usuel) (a : b)A = { x ∈ A | xb ⊆ a }.
Un idéal fractionnaire localement principal non nul b admet un inverse b−1
au sens du produit défini dans Iff(A) : c’est l’idéal fractionnaire (A : b)K .
Notons que l’application bilinéaire θ : b × b−1 → A, (x, y) 7→ xy est une
dualité, c’est-à-dire qu’elle permet d’identifier b−1 au A-module dual de b.
Un idéal fractionnaire de type fini contenu dans A est un idéal de type fini
usuel et il est appelé un idéal entier si l’on est dans le contexte des idéaux
fractionnaires.
Calculs sur les idéaux de type fini dans les domaines
de Prüfer
Matrice de localisation principale
Un anneau intègre Z est un domaine de Prüfer d’un point de vue algorithmique lorsque l’on dispose d’un algorithme général qui permet d’inverser
un idéal de type fini arbitraire.
Comme l’a remarqué Dedekind lorsqu’il insiste sur ce qu’il estime être la
propriété la plus décisive dans les anneaux d’entiers de corps de nombres,
on peut formuler l’inversibilité de l’idéal a = ha1 , . . . , an i ⊆ Z (les ai 6= 0)
de la manière suivante.
1. Quelques rappels
5
1. Il existe γ1 , . . ., γn dans K tels que
dans Z.
P
i
γi ai = 1 et chacun des γi aj est
Deux formulations équivalentes sont les suivantes.
2. L’idéal a est localement principal, autrement dit il existe s1 , . . ., sn ∈ A
de somme 1 tels que l’on ait si a ⊆ hai i pour chaque si non nul.
3. Il existe une matrice de localisation principale pour (a1 , . . . , an )
i.e., une matrice C = (cij ) ∈ Mn (Z) satisfaisant
– Tr(C) = 1,
– chaque ligne de C est proportionnelle à [ a1 . . . an ], i.e.
ci,` ci,j
= 0 pour tous i, j, `.
a` aj
Pour passer de 1 à 2 on pose si = γi ai , et dans l’autre sens γi =
Pour passer de 2 à 3 on pose cij =
si
ai .
si aj
ai .
La matrice de localisation principale permet de nombreux calculs, comme
indiqués dans [Modules, théorème IX-2.3, lemme IX-2.5, et exercice XVI-8].
En particulier pour un anneau intègre, on a C 2 = C (matrice de projection
de rang 1) et In − C est une matrice de présentation de l’idéal a pour le
système générateur (a1 , . . . , an ). En tant que Z-module, a est isomorphe à
l’image de C dans Zn .
Notons que, lorsque la divisibilité est explicite dans Z, une matrice de
localisation principale pour (a1 , . . . , an ) est connue à partir de sa diagonale.
Nous ferons cette hypothèse de divisibilité explicite dans la suite .
Le système générateur (a1 , . . . , an ) d’un idéal de type fini sera toujours
accompagné d’une liste d’éléments si de somme 1 qui satisfont les inclusions
si a ⊆ hai i.
Sans l’hypothèse de divisibilité explicite, il faudrait travailler avec les matrices de localisation principale elles-mêmes, qui sont des objets plus lourds à
manipuler.
Pour qu’un anneau intègre Z soit un domaine de Prüfer, il suffit que les
idéaux à deux générateurs soient inversibles, ce qui s’exprime comme suit.
Pour tous a, b ∈ Z, il existe u, v, s, t ∈ Z satisfaisant :
s + t = 1, sa = vb, tb = wa.
Autrement dit, on a pour (a, b) la matrice de localisation principale
t
v
(1)
w
.
s
Supposons a 6= 0. Alors ts = vw, ht, wi = at ha, bi et ht, wi ht, vi = hti. Donc,
−1
−1
si t, a =
6 0, ht, wi = 1t ht, vi et ha, bi = a1 ht, vi (notation des idéaux
fractionnaires).
6
Calcul matriciel généralisé
Opérations élémentaires sur les idéaux de type fini
Nous supposons travailler avec un domaine de Prüfer explicite. Autrement
dit une boite noire 1 donne pour touteP
suite finie non nulle (a1 , . . . , an ) = (a)
une suite finie (s1 , . . . , sn ) = (s) avec i si = 1 et si aj ∈ hai i pour tous i, j.
Nous supposons aussi que le domaine de Prüfer est à divisibilité explicite.
Tout ce qui est écrit par la suite fonctionne aussi bien avec des idéaux
fractionnaires de type fini qu’avec des idéaux de type fini entiers. Nous
parlerons donc simplement d’idéaux de type fini.
Signification de sk = 0. Si sk = 0, en additionnant
les égalités si ak =
P
ci,k ai pour i 6= k, on obtient l’égalité ak = i6=k ci,k ai , autrement dit le
générateur ak de l’idéal a est superflu. En supprimant la ligne et la colonne
correspondante, on obtient une matrice de localisation principale pour les
ai restants.
Inversement, si l’on rajoute un générateur combinaison linéaire de ceux
déjà donnés, on peut obtenir une matrice de localisation principale pour le
nouveau système générateur en rajoutant une ligne nulle pour le nouveau
générateur, et la colonne correspondant au nouveau générateur qui exprime
la combinaison linéaire comme indiqué ci-avant.
Pour a et b de type fini, on a 1 ∈ (a : b)Z + (b : a)Z (voir [Modules,
exercice XVI-8]). On écrit a = ha1 , . . . , an i et b = hb1 , . . . , bp i. On a des si
de somme 1 tels que si a ⊆ hai i, des tj de somme 1 tels que tj b ⊆ hbj i, et
pour chaque couple (i, j) deux éléments uij et vij de somme 1 tels que
uij hai , bj i ⊆ hai i et vij hai , bj i ⊆ hbj i .
On obtient donc
uij si tj (a + b) ⊆ hai i ⊆ a et vij si tj (a + b) ⊆ hbj i ⊆ b.
P
P
On prend s = ij uij si tj et t = ij vij si tj . On a alors s + t = 1 et
s(a + b) ⊆ a (i.e. sb ⊆ a) et t(a + b) ⊆ b (i.e. ta ⊆ b).
Notons que lorsque p = 1 la matrice de localisation principale pour (b1 ) est
simplement I1 .
Somme (pgcd). Avec les mêmes données qu’au point précédent, on voit
que si l’on pose
P
P
ui = j uij si tj et
vj = i vij si tj ,
P
P
on a ui (a + b) ⊆ hai i, vj (a + b) ⊆ hbj i et i ui + j vj = 1.
Ainsi la liste (u1 , . . . , un , v1 , . . . , vp ) convient pour le système générateur
(a1 , . . . , an , b1 , . . . , bp ) de l’idéal a + b.
1. Dans les cas que l’on traite sur machine, cette boite noire cache un algorithme.
1. Quelques rappels
7
NB : cette procédure explique pourquoi on peut se ramener au cas où la
boite noire fonctionne uniquement pour les idéaux à deux générateurs.
Intersection (ppcm). Avec les mêmes données qu’aux points précédents,
on a sb + ta = a ∩ b . En effet, on a évidemment sb ⊆ b ∩ a et ta ⊆
b ∩ a. Et pour l’autre inclusion sb + ta ⊇ a ∩ b, si m ∈ a ∩ b, alors
m = (s + t)m = sm + tm ∈ sb + ta.
Inverse ([Modules, lemme IX-2.5]).
alors on a
b1
..
hai hbi = hai avec .
bn
Soit a =
P
i
ai xi = [ a1 · · · an ]X,
x1
.
= C .. = CX
xn
(où C est une matrice de localisation principale pour (a)). En effet
X
ai bi = [ a1 · · · an ] C X = [ a1 · · · an ] X = a,
i
donc a ∈ ba. En outre
X
X
X
bi aj =
cik xk aj =
cij xk ak = cij
xk ak = cij a,
k
k
k
donc ba ⊆ hai. Ainsi ba = hai.
Test d’appartenance. Si a = ha1 , . . . , an i et si s1 , . . . , sn ∈ Z vérifient
P
si a ⊆ hai i et i si = 1, alors x ∈ a si, et seulement si, chaque si x ∈ hai i.
Comme on suppose que Z est à divisibilité explicite on a un test d’appartenance aux idéaux fractionnaires, et donc aussi un test pour l’inclusion d’un
idéal fractionnaire dans un autre.
NB : un calcul plus général mais plus compliqué, sans l’hypothèse que Z
est intègre, est donné dans l’implication 1 ⇒ 3 du théorème XVI-2.2 du
livre modules)
Formes réduites de matrices sur un domaine de Bezout
On considère un domaine de Bezout B (cas particulier de domaine de Prüfer).
1.4. Définition. Une matrice de Bezout de taille n est une matrice
carrée, égale à la matrice identité, à l’exception de quatre coefficients en
aii aij
positions (i, i), (j, j), (i, j) et (j, i) avec 1 6 i < j 6 n et
= 1.
aji ajj
Nous pouvons noter cette matrice Bz(n, i, j; aii , aij , aji , ajj ). Par exemple
8
Calcul matriciel généralisé
(avec des cases vides en guise de zéros)
1
u
v
1
B = Bz(6, 2, 4; u, v, s, t) =
s
t
1
avec
ut − sv = 1.
1
Effectuer une manipulation de Bezout sur une matrice M c’est la multiplier à gauche (manipulation de lignes) ou à droite (manipulation de
colonnes) par une matrice de Bezout.
u v
Si l’on a dans un anneau une égalité matricielle [ a b ]
= [ g 0 ], alors
s t
pour une matrice A ∈ M6,n (A) ayant des coefficients a et b dans la ligne
k en positions (k, 2) et (k, 4), effectuer le produit A B revient à faire les
manipulations de colonnes simultanées suivantes sur la matrice A :
C2 ← uC2 + sC4
C4 ← vC2 + tC4
Le résultat sera (entre autres) que les coefficients en position (k, 2) et (k, 4)
seront remplacés par g et 0.
De la même manière, effectuer un produit B 0 A par une matrice de Bezout
du style B 0 = tB permettra de remplacer un couple de coefficients (a, b)
situés sur une même colonne par un couple (g, 0).
Réduction de Hermite (manipulations de colonnes, échanges de
lignes)
Soit une matrice F ∈ Mm,n (B). Il existe un entier k ∈ J0.. inf(m, n)K, une
matrice C ∈ GLn (B) et une matrice de permutation P ∈ GLm (B) telles
que l’on ait
0
T
PFC=
0
G
avec T ∈ Mk (B) triangulaire inférieure de déterminant 6= 0.
Forme réduite triangulaire (manipulations de colonnes et de lignes)
Il existe un entier k ∈ J0.. inf(m, n)K, une matrice C 0 ∈ GLn (B) et une
matrice L ∈ GLm (B) telles que l’on ait
L F C0 =
T0
0
0
0
avec T 0 ∈ Mk (B) triangulaire inférieure de déterminant 6= 0.
2. Pseudo-bases et pseudo-matrices
9
Réduction de Smith en dimension 6 1, (manipulations de lignes
et de colonnes)
1.5. Théorème. Un domaine de Bezout de dimension 6 1 est un anneau
de Smith.
Démonstration. D’après le paragraphe précédent, il suffit de savoir traiter
une matrice carrée (triangulaire) M de déterminant d =
6 0. Comme l’anneau quotient B/hdi est zéro-dimensionnel et arithmétique, toute matrice
sur B/hdi se ramène par manipulations élémentaires de lignes et de colonnes
à une matrice en forme de Smith (fait 1.3).
On peut donc ramener, modulo d, la matrice M à une forme diagonale de
Smith, disons Diag(a1 , . . . , an ). Notons dk = Dk (M ).
Puisque B est un domaine de Bezout, on a di = hdi i pour des éléments di
de B, et 1 = d0 | d1 | d2 | . . . | dn = d. On a donc des éléments c1 , . . ., cn
tels que dk = c1 · · · ck pour k ∈ J1..nK.
Quand on fait l’extension des scalaires B → B0 = B/hdi, on obtient
ha1 . . . ak i = Dk (M ) = dk , c’est-à-dire ha1 · · · ak , di = hc1 · · · ck i.
En fait, on a aussi hak , di = hck i. Pour le voir, on considère le B-module
conoyau Coker(M ) = K. On a dK = 0, donc
K = K/dK ' B0 /ha1 i ⊕ · · · ⊕ B0 /han i ' B/ha1 , di ⊕ · · · ⊕ B/han , di .
En notant a0i = pgcd(ai , d), comme hai i ⊆ hai−1 i, on a a0i−1 | a0i . Cela
montre 2 que dk = ha01 · · · a0k i. Comme dk = hc1 · · · ck i, puisque B est intègre
et les ci non nuls, on obtient de proche en proche ha0k i = hck i.
Les manipulations élémentaires modulo d se relèvent en des manipulations
élémentaires sur B, d’où une égalité LM C = M 0 , où M 0 = Diag(a1 , . . . , an ).
On voit que la k-ème ligne de M 0 est multiple de ck = pgcd(ak , d). On
peut donc écrire M 0 = Diag(c1 , . . . , cn )C1 avec C1 ∈ Mn (B). Et comme
det(M 0 ) = d, on obtient det(C1 ) = 1. D’où enfin LM C2 = Diag(c1 , . . . , cn )
avec C2 = CC1−1 .
2. Pseudo-bases et pseudo-matrices
Dans cette section, A est un anneau intègre et l’on s’intéresse
aux applications linéaires entre modules qui sont sommes
directes de modules projectif de rang 1. Nous notons K le
corps de fractions
2. Ici on utilise le fait que deux matrices de même format qui ont des conoyaux
isomorphes ont les mêmes idéaux déterminantiels : ce sont les idéaux de Fitting du
conoyau.
10
Calcul matriciel généralisé
Dans cette section on développe un hh calcul matriciel généralisé ii pour
les applications linéaires entre modules projectifs de type fini qui sont
isomorphes à des sommes directes d’idéaux inversibles.
Pseudo-bases
Soit E un A-module projectif de type fini isomorphe à une somme directe
finie d’idéaux inversibles, E = E1 ⊕ · · · ⊕ Er avec Ei ' ei ∈ Iff(A) (inversibles). On peut regarder E comme un sous-A-module du K-espace vectoriel
ES obtenu en inversant les éléments du monoïde S = A∗ . Comme (Ei )S
est un K-module projectif de rang 1, il est isomorphe à K et l’on obtient
E = e1 e1 ⊕ · · · ⊕ er er , où les ei ∈ ES forment une base du K-espace vectoriel ES .
Notons que si be1 = ah1 pour deux idéaux de type fini e1 et h1 on a l’égalité
E1 = e1 e1 = h1 ( ab e1 ) = h1 e01 (e1 et h1 sont deux A-modules isomorphes).
Ainsi la décomposition E = E1 ⊕ · · · ⊕ Er ne donne pas une écriture unique
sous forme ei ei pour les Ei .
On appelle pseudo-base de E, un r-uplet
(e1 , e1 ), . . . , (er , er ) tel que E = e1 e1 ⊕ · · · ⊕ er er ,
où les ei sont des éléments de ES et les ei des idéaux fractionnaires
Pinversibles de A. Un x ∈ E s’écrit alors de manière unique sous forme i xi ei
où les xi ∈ ei (et donc xi ei ∈ E).
2.1. Fait. Donner une pseudo-base E = ((e1 , e1 ), . . . , (er , er )) pour le
module E, revient exactement à donner un isomorphisme
P
ψE : e1 × · · · × er −→ E, (x1 , . . . , xr ) 7−→ i∈J1..rK xi ei ,
dans lequel les images inverses des ei (après l’extension de ψE à ES ) forment
la base canonique de Kr (e1 × · · · × er ⊆ Kr ).
Remarque. Dans la suite, on pourrait imaginer que tous les modules projectifs qui interviennent sont des sous-A-modules de K-espaces vectoriels Kn ,
où n est supérieur ou égal au rang r du module.
Dans un tel contexte les ei sont soumis à la seule contrainte d’être des
vecteurs linéairement indépendants du K-espace vectoriel Kn considéré,
et ES est simplement le sous-K-espace vectoriel de Kn dont une base est
donnée par les vecteurs ei . Les ei sont donnés par une matrice M ∈ Mn,r (K).
On pourrait dans ce cadre aussi bien dire que la pseudo-base E est donnée
par une matrice M ∈ Mn,r (K) et une liste de r idéaux fractionnaires inversibles de A.
Il nous semble cependant préférable de garder pour nos explications un
cadre plus général.
2. Pseudo-bases et pseudo-matrices
11
Pseudo-matrices
Matrice d’une application linéaire sur des pseudo-bases
Rappelons que toute cette section s’applique à un anneau intègre arbitraire A
pour des modules qui admettent des pseudo-bases, c’est-à-dire qui sont
isomorphes à des sommes directes finies d’idéaux inversibles.
Soit ϕ : E → H une application linéaire entre modules projectifs de rangs m
et n. Si E = (e1 , e1 ), . . . , (em , em ) et H = (h1 , h1 ), . . . , (hn , hn ) sont
des pseudo-bases de E et H, l’application ϕS : ES → HS admet une matrice
A ∈ Kn×m sur les K-bases (e1 , . . . , em ) et (h1 , . . . , hn ) de ES et HS .
Les coefficients aij de cette matrice ne sont pas arbitraires dans K .
P
En effet, vue l’égalité ϕS (ej ) = i∈J1..mK aij hi , l’inclusion ϕS (E) ⊆ H est
satisfaite si, et seulement si, pour tout j ∈ J1..mK, tout xj ∈ ej et tout
i ∈ J1..nK, on a aij xj ∈ hi .
Autrement dit, pour tous i, j, on doit avoir
aij ej ⊆ bi , c’est-à-dire encore
aij ∈ hi e−1
.
j
2.2. Définition et notation. (Avec les notations ci-dessus)
1. On appelle matrice de ϕ sur les pseudo-bases E et H la donnée
A = (h1 , . . . , hn ; e1 , . . . , em ; A) = (h; e; A), où A = (aij )ij ∈ Mn,m (K).
Cette donnée satisfait les inclusions aij ej ⊆ hi . On note A = ME,H (ϕ) .
2. On appelle pseudo-matrice toute hh matrice ii (h; e; A) de ce type, i.e.
satisfaisant les inclusions aij ej ⊆ hi .
3. Pour des listes e et h fixées, l’ensemble formé par ces pseudo-matrices
est noté Mh;e (A) .
4. Cet ensemble est muni d’une structure naturelle de A-module : pour
additionner A et B, on additionne A et B.
5. On définit également le produit de deux pseudo-matrices de formats
convenables :
Si B = (c; h; B) et A = (h; e; A), alors B · A := (c; e; B · A)
Dans le cas envisagé au point 1 ci-dessus, les modules Mh;e (A) et LA (E, H)
sont isomorphes.
Les pseudo-matrices ont donc pour hh indices de colonnes ii des couples (j, ej ),
pour hh indices de lignes ii des couples (i, hi ), et les coefficients aij satisfont
les inclusions aij ej ⊆ hi . On pourra visualiser les choses comme suit, par
exemple pour une pseudo-matrice A de format 3 × 4 :
12
Calcul matriciel généralisé
e1
h1 a11
A = h2 a21
h3 a31
e2
a12
a22
a32
e3
a13
a23
a33
e4
a14
a24 aij ej ⊆ hi .
a34
Notez que le module Mn,m (A) des matrices usuelles correspond au cas
particulier où les idéaux ei et hj sont tous égaux à h1i.
En l’absence de modules de référence E et H, si (e1 , . . . , em ) et (h1 , . . . , hn )
désignent les bases canoniques de Km et Kn , la pseudo-matrice A est vue
comme la matrice d’une application A-linéaire ϕ : E → F , où
E = e1 × · · · × em = e1 e1 + · · · + em em ⊆ Km et
F
=
h1 × · · · × hn
=
h1 h1 + · · · + hn hn
⊆
Kn .
Calcul matriciel généralisé, premiers résultats.
2.3. Théorème et définition. (Déterminant d’une application linéaire
sur des pseudo-bases) Avec les notations précédentes, on suppose que E
et H ont même rang n et l’on considère la matrice A = ME,H (ϕ) d’une
application A-linéaire ϕ : E → H. On a donc A ∈ Mh;e (A).
Q
Q
Notons h = i∈J1..nK hi et e = i∈J1..nK ei . Le déterminant de la matrice A,
qui est un élément de K, est noté detE,H (ϕ) et on l’appelle le déterminant de ϕ sur les pseudo-bases E et H. Ci-après ∆ := detE,H (ϕ) =
det(A).
1. On a ∆e ⊆ h, i.e. ∆ ∈ he−1 . En particulier si e = h on a ∆ ∈ A.
2. Les propriétés suivantes sont équivalentes.
a. L’application linéaire ϕ est un isomorphisme.
b. On a l’égalité ∆e = h.
c. L’application linéaire ϕ est surjective.
Dans ce cas, la matrice A est une pseudo-matrice inversible.
Son inverse A−1 = (e; h; A−1 ) est un élément de Me;h (A) : c’est la
matrice de l’isomorphisme ϕ−1 sur les pseudo-bases H et E.
3. L’application linéaire ϕ est injective si, et seulement si, ∆ 6= 0.
4. Lorsque E = H et E = H, ∆ est un élément de A, il ne dépend que
de ϕ, et c’est le déterminant de ϕ au sens hh usuel ii, noté det(ϕ).
P
Démonstration. 1. Puisque aij ej ⊆ hi et ∆ = σ∈Pn sign(σ)(a1j1 · · · anjn ),
on obtient ∆e ⊆ h.
2a ⇔ 2c. Évidemment si ϕ est un isomorphisme, alors ϕ est un surjective.
Si ϕ est surjective, alors ϕ est scindable ([Modules, théorème XIII-2.1]),
2. Pseudo-bases et pseudo-matrices
13
donc H ' E ⊕ Ker ϕ, et puisque les modules E et H ont le même rang, ϕ
est un isomorphisme.
2a ⇒ 2b. Si ψ est l’isomorphisme réciproque, il est représenté par une
matrice B ∈ Me;h (A) sur les pseudo-bases H et E, et l’on a AB = (h; h; In ).
1
1
Si on applique le point 1 avec det(B) = ∆
, on obtient ∆
h ⊆ e et donc
h ⊆ ∆e.
e définit
2b ⇒ 2a. Si ∆e = h, nous allons montrer que la matrice A−1 = 1 A
∆
une pseudo-matrice de Me;h (A). Ainsi cette pseudo-matrice définit un application linéaire ψ : H → E sur les pseudo-bases H et E, et comme ϕ ◦ ψ
et ψ ◦ ϕ sont représentées par la matrice identité (sur les pseudo-bases
convenables), ψ et ϕ sont deux isomorphismes réciproques.
Il faut montrer
e
aij
1
∆
e
aij hj ⊆ ei . On note que de manière générale
Y
r6=i
er ⊆
Y
s6=j
hs , ou encore e
aij hj e ⊆ ei h .
(2)
D’où le résultat puisque ∆e = h.
3. Les modules E et H sont sans torsion et peuvent être vus comme des sousA-modules de Kn . Donc ϕ est injective si, et seulement si, ϕS : Kn → Kn
est injective. Et ϕS est injective si, et seulement si, ∆ 6= 0.
4. Le déterminant d’un endomorphisme se comporte bien par extension
des scalaires. En particulier lorsque l’on passe du A-module E au K-espace vectoriel ES le déterminant ne change pas. Or la matrice de ϕ sur la
pseudo-base ((e1 , e1 ), . . . , (en , en )) n’est autre que la matrice de ϕS sur la
base (e1 , . . . , en ).
Commentaire. On notera que les deux choses suivantes sont totalement
indépendantes des hh vecteurs ii ej et hi qui interviennent dans les pseudobases E et H.
– Le fait que la matrice est bien celle d’une application linéaire de E dans H :
ceci est contrôlé par les inclusions aij ej ⊆ hi .
– Le fait que l’application linéaire est un isomorphisme : ceci est contrôlé
par l’égalité ∆e = h.
Matrice de changement de pseudo-bases
Considérons deux pseudo-bases
différentes, E = (e1 , e1 ), . . . , (er , er )
et E 0 = (e01 , e01 ), . . . , (e0r , e0r ) , pour un même module E, avec les ei et
les e0i dans le K-espace vectoriel ES .
La pseudo-matrice A = ME 0 ,E (IdE ) s’appelle la matrice de passage de E
à E 0 : la matrice A ∈ Mr (K) a pour colonnes les e0i exprimés sur les ei . C’est
la matrice de passage de la base (e1 , . . . , er ) à la base (e01 , . . . , e0r ) dans ES .
14
Calcul matriciel généralisé
L’important, pour que cela fonctionne au niveau du A-module E, est que
les coefficients pij de la matrice de passage P vérifient pij e0j ∈ ei et que le
déterminant ∆ vérifie ∆e0 = e.
En fait, chaque fois que l’on a une pseudo-matrice inversible P pour deux
familles (e1 , . . . , en ) et (e01 , . . . , e0n ), si l’on considère un A-module
E qui
admet une pseudo-base du type E = (e1 , e1 ), . . . , (en , en ) , la matrice P
peut être vue comme une matrice de changement de pseudo-base pour E. Il
suffit pour cela de considérer les vecteurs e0j qui sont donnés par les colonnes
P
de la matrice P (i.e., e0j = i pij ei ).
L
En effet, considérons le module E 0 = j e0j e0j , et E 0 = (e01 , e01 ), . . . , (e0n , e0n ) ,
la matrice P est celle d’une application linéaire ϕ : E 0 → E sur les pseudobases E 0 et E. Mais, vu que les e0i sont donnés par les colonnes de P ,
on a ϕS = IdES . Ceci montre que ϕ est une application linéaire d’inclusion
de E 0 dans E. Enfin, puisque cette inclusion est un isomorphisme, elle est
surjective et l’on obtient E = E 0 et ϕ = IdE .
Idéaux déterminantiels
On a défini le déterminant d’une application linéaire sur des pseudo-bases.
On généralise les choses comme suit, en application du point 1 du théorème 2.3.
2.4. Définition. (Idéaux déterminantiels d’une pseudo-matrice)
1. Pour une pseudo-matrice carrée A = (h; e; A) on définit son idéal
déterminant, noté det(A) : c’est l’idéal
Y
Y
det(A) = det(A) e h−1 , où e =
ej et h =
hi .
j
i
2. Soient β = [β1 , . . . , βr ] ⊆ J1..nK et α = [α1 , . . . , αr ] ⊆ J1..mK des
listes extraites en ordre croissant. Nous notons Aβ,α la pseudo-matrice
extraite sur les lignes (d’indices dans) β et les colonnes α. Précisément
Aβ,α = (hβ1 , . . . , hβr ; eα1 , . . . , eαr , Aβ,α ).
On dit que l’idéal
Qr
Qr
mβ,α (A) := det(Aβ,α ) = det(Aβ,α )( i=0 eαi )( j=0 hβj )−1
est l’idéal mineur d’ordre r de la matrice A extrait sur les
lignes β et les colonnes α.
3. Pour une pseudo-matrice arbitraire, et r 6 inf(m, n) on définit l’idéal
déterminantiel d’ordre r de A, noté Dr (A), comme la somme des
idéaux mineurs d’ordre r de A.
Pour r > inf(m, n) on définit Dr (A) = 0.
Pour r 6 0 on définit Dr (A) = h1i.
2. Pseudo-bases et pseudo-matrices
15
2.5. Fait. Si A et B sont deux pseudo-matrices carrées telles que le
produit AB est défini, on a det(AB) = det(A) det(B).
Une pseudo-matrice carrée est inversible si, et seulement si, son idéal déterminant est égal à h1i.
Démonstration. On laisse le calcul du premier point au lecteur.
Le deuxième point est donné dans le théorème 2.3.
2.6. Théorème et définition. (Idéaux déterminantiels d’une application
linéaire) On continue avec la notation A = (h1 , . . . , hn ; e1 , . . . , em ; A).
1. Lorsque m = n, l’idéal déterminant de la matrice A = ME,H (ϕ) ne
dépend pas des pseudo-bases choisies pour E et H. On l’appelle l’idéal
déterminant de l’application linéaire ϕ, noté det(ϕ). On a les
équivalences
– det(ϕ) = h1i si, et seulement si, ϕ est un isomorphisme,
– det(ϕ) 6= h0i si, et seulement si, ϕ est injective.
2. Les idéaux déterminantiels de la matrice A ne dépendent pas des pseudobases choisies pour E et H. On les appelle les idéaux déterminantiels
de l’application linéaire ϕ, on les note Dr (ϕ).
3. L’application linéaire est surjective si, et seulement si, Dn (ϕ) = h1i
si, et seulement si, elle admet un inverse à droite. Elle est injective
si, et seulement si, Dm (ϕ) 6= 0. Elle admet un inverse à gauche si, et
seulement si, Dm (ϕ) = h1i.
4. Soit s ∈ A∗ tel que les modules E[1/s] et H[1/s] sont libres sur A[1/s].
Notons ϕs : E[1/s] → H[1/s] l’extension de ϕ par A → A[1/s]. Alors
pour chaque r on a : Dr (ϕ)A[1/s] = Dr (ϕs ) (idéaux déterminantiels
usuels définis pour une application linéaire entre modules libres).
5. On a les inclusions
{0} = D1+min(m,n) (ϕ) ⊆ · · · ⊆ D1 (ϕ) ⊆ D0 (ϕ) = h1i = A
(3)
Plus précisément pour tous k, r ∈ N on a une inclusion
Dk+r (ϕ) ⊆ Dk (ϕ) Dr (ϕ)
(4)
Démonstration. Le point 1 résulte du fait 2.5 et du théorème 2.3. Les autres
points (comme d’ailleurs le point 1 ) sont conséquences du point 4 (qui est
facile) et des résultats analogues concernant les applications linéaires entre
modules libres. En effet, un idéal est caractérisé par ses localisations en
des éléments comaximaux 3 . Et les propriétés d’injectivité et de surjectivité
pour des applications linéaires également.
3. Puisque l’anneau est intègre, l’idéal est même l’intersection de ses localisés, vus
comme sous-A-modules de K.
16
Calcul matriciel généralisé
Un cas important est celui des idéaux mineurs d’ordre 1,
mij (A) = aij ej h−1
,
i
qui interviendront dans les manipulations de matrices conduisant à des
formes réduites agréables.
Pseudo-matrices par blocs
Les calculs par blocs se font pour les pseudo-matrices aussi bien que pour
les matrices usuelles.
Considérons une pseudo-matrice M = (h1 , . . . , hn ; e1 , . . . , em ; M ) et des
entiers p ∈ J2..n − 1K, q ∈ J2..m − 1K. Décomposons M en quatre blocs
A ∈ Kp×q , B ∈ Kp×(m−q) , C ∈ K(n−p)×q et D ∈ K(n−p)×(m−q) ,
M=
A
B
C
D
ce qui donne quatre pseudo-matrices A = (h1 , . . . , hp ; e1 , . . . , eq ; A), etc.
Alors on note
M=
A
B
C
D
.
Pivot de Gauss pour les pseudo-matrices
2.7. Définition et notation.
– Une pseudo-matrice est dite strictement carrée lorsqu’elle est de la
forme A = (e; e; A). On note l’algèbre des pseudo-matrices correspondante par
Me1 ,...,en (A) = Me (A) .
– On appelle pseudo-matrice élémentaire une pseudo-matrice strictement carrée A telle que A est une matrice élémentaire usuelle (sur K).
Si aij ∈ K est le coefficient non nul en dehors de la diagonale, on doit
donc avoir aij ej ⊆ ei .
– On appelle manipulation élémentaire de colonnes (resp. de
lignes) sur une pseudo-matrice la postmultiplication (resp. la prémultiplication) par une pseudo-matrice élémentaire.
Exemples.
a b
Manipulation de colonnes. Considérons une pseudo-matrice L = c a b .
2. Pseudo-bases et pseudo-matrices
17
Si m11 (L) ⊇ m12 (L), c’est-à-dire si aa ⊇ bb, on a une pseudo-matrice éléa b
a 1 − ab
mentaire P =
, de sorte que l’on obtient, comme pour le pivot
b 0 1
de Gauss classique
a b
LP = c a 0
Ainsi, dans le processus hh pivot de Gauss ii ce qui tient lieu, pour une
pseudo-matrice, de hh a11 divise a12 ii dans le cas des matrices usuelles, c’est
ii
maintenant hh m11 ⊇ m12 ii, ou encore hh m12 m−1
11 ⊆ A , ce qui se dit aussi
hh m
i
i
11 divise m12 .
a
c1 a
.
Manipulation de lignes. Considérons une pseudo-matrice L =
c2 b
Si m11 (L) ⊇ m21 (L), c’est-à-dire si ac2 ⊇ bc1 , on a une pseudo-matrice
c1 c2
a
c1
1
0
c
a
élémentaire P =
, de sorte que l’on obtient P L = 1
.
c2 − ab 1
c2 0
Ainsi, dans le processus hh pivot de Gauss ii ce qui tient lieu, pour une
pseudo-matrice, de hh a11 divise a21 ii dans le cas des matrices usuelles, c’est
maintenant hh m11 ⊇ m21 ii, ce qui se dit aussi hh m11 divise m21 ii.
Voici une autre généralisation naturelle d’un résultat classique pour les
matrices usuelles.
2.8. Lemme du mineur inversible pour les pseudo-matrices.
(Pivot généralisé) On considère une pseudo-matrice
A = (h1 , . . . , hn ; e1 , . . . , em ; A).
On suppose que l’idéal mineur mJ1..kK,J1..kK (A) est égal à h1i.
1. (Pivot sur les colonnes) Il existe une pseudo-matrice inversible
C = (e1 , . . . , em ; h1 , . . . , hk , ek+1 , . . . , em , C)
C1
C2
décrite par blocs comme C =
0
Im−k
avec C1 = AJ1..kK,J1..kK −1
telle que la pseudo-matrice AC soit de la forme
2. (Pivots sur les lignes et les colonnes)
Ik
0
B
D
.
18
Calcul matriciel généralisé
La pseudo-matrice A est équivalente à une pseudo-matrice
A0 = (h1 , . . . , hn ; h1 , . . . , hk , ek+1 , . . . , em ; A0 ) =
Ik
0
0
A00
et l’on a Dr (A00 ) = Dk+r (A) pour tout r ∈ Z.
En particulier si Dk+1 (A) = h0i, on a une forme réduite
LAC =
Ik
0
0
0
.
NB : Si A possède un mineur d’ordre k > 0 égal à h1i, on obtient des
résultats analogues après permutation de lignes et/ou de colonnes.
Démonstration. On recopie la démonstration usuelle pour les matrices
usuelles.
A1 A2
1. Notons A =
où A1 ∈ Mk (K).
A3 A4
C1 C2
La matrice C est la matrice par blocs C =
où C1 = A1 −1
0 Im−k
et C2 = −C1 A2 . On obtient la matrice A C donnée dans l’énoncé.
2. On continue en multipliant à gauche par la matrice strictement carrée
définie par blocs L =
Ik
0
−B I`
∈ Mh1 ,...,hn (Z) avec ` = n − k. On obtient
pour L A C la pseudo-matrice donnée dans l’énoncé.
Enfin Dr (A00 ) = Dk+r (A0 ) = Dk+r (A) pour tout r ∈ Z.
Remarque. On a obtenu A0 = L A C avec C inversible et L strictement
carrée inversible. Si en outre on a ei = hi pour i ∈ J1..kK, la matrice C est
également strictement carrée.
3. Domaines de Prüfer, systèmes linéaires,
réduction de Hermite
Dans cette section, Z est un domaine de Prüfer à divisibilité
explicite, avec K pour corps de fractions.
3. Réduction de Hermite
19
Systèmes linéaires, généralités
On considère un système linéaire AX = B de n équations à m inconnues
sur Z. Dans la situation usuelle, tous les idéaux indexant les lignes et les
colonnes des matrices A, B (données) et X (inconnue) sont égaux à h1i,
les inconnues (coordonnées de X) sont dans Z et A ∈ Mn,m (Z). Plus généralement, on considère des pseudo-matrices A = (h1 , . . . , hn ; e1 , . . . , em ; A)
et B = (h; b; B), et la matrice inconnue X est dans Me;b (Z).
Comme on le voit sur la démonstration, le premier résultat vaut sur un
anneau intègre arbitraire.
3.1. Proposition. (Principe local-global) Soient s1 , . . ., s` comaximaux
dans Z. Le système linéaire AX = B admet une solution X ∈ Me;b (Z) si,
et seulement si, il admet une solution dans chaque Me;b (Zsi ).
Démonstration. La condition est évidemment nécessaire. Soit Xi =
1
Yi
sk
i
une solution dans Me;b (Zsi ) avec Yi ∈ Me;b (Z), de sorte que AYi = ski B. On
P`
P`
écrit i=1 ui ski = 1 avec les ui ∈ Z. Alors X = i=1 ui Yi est une solution
dans Me;b (Z).
Le point 1 du théorème suivant, bien que cas très particulier, est intéressant
car le calcul de la solution se fait dans K. Le point 2 reprend dans le langage
des pseudo-matrices le point 3 du théorème XII-3.2 dans [ACMC].
3.2. Théorème. (Systèmes linéaires sur un domaine de Prüfer, I)
1. Cas particulier : on donne une pseudo-matrice carrée avec det(A) 6= h0i
et l’on suppose que les idéaux mineurs d’ordre 1 du vecteur colonne B
sont tous contenus dans det(A). Alors la solution X calculée dans K
fournit une pseudomatrice X ∈ Me,b (Z), autrement dit xj b ∈ ej pour
j ∈ J1..nK.
2. Cas général : le système linéaire admet une solution si, et seulement
si, les idéaux déterminantiels de [ A | B ] sont égaux à ceux de A.
Démonstration. Le point 1 peut se démontrer par calcul direct en utilisant
la règle de Cramer. Il est clair aussi qu’il résulte du point 2.
2. Considérons des éléments comaximaux si de Z tels que, après localisation
en chacun des si , chacun des idéaux hj , ei et b est principal, c’est-à-dire libre
de rang 1. Ceci nous ramène au cas des matrices usuelles, pour lesquelles
l’équivalence est établie dans [ACMC, XII-3.2].
20
Calcul matriciel généralisé
Manipulations du type Bezout
Les manipulations de colonnes (resp. de lignes) de type Bezout que nous
examinons correspondent à des changements de pseudo-base pour le module
de départ (resp. d’arrivée).
On désire faire apparaître un coefficient nul de la même façon que ce que
l’on fait dans le cas des domaines de Bezout avec des matrices usuelles.
On commence par un cas particulier.
On traite la pseudo-matrice particulière suivante de format 1 × 2
a b
L= c a a .
Plutôt que de donner tout de suite la solution, expliquons d’où elle vient.
Cela nous prend une quinzaine de lignes, mais cela éclaire la chose. On a
une suite exacte scindable
t
[ −1 1 ]
[1 1]
0 → a ∩ b −−−−→ a ⊕ b −−−→ a + b → 0
ψ
qui donne un isomorphisme (a + b) ⊕ (a ∩ b) −→ a ⊕ b.
Plus précisément, regardons a ⊕ b comme
le sous-Z-module E de K2 muni
de la pseudo-base E = (e1 , a), (e2 , b) ((e1 , e2 ), base canonique de K2 ), i.e.
E = e1 a ⊕ e2 b = E1 ⊕ E2 .
Il nous faut maintenant trouver une pseudo-base H = (f1 , a+b), (f2 , a∩b)
de E, c’est-à-dire une matrice B ∈ M2 (K) convenable, dont les colonnes
exprimeront f1 et f2 sur la base (e1 , e2 ).
Pour cela, on utilise l’égalité (a : b)Z + (b : a)Z = h1i. On a donc
s ∈ (b : a)Z et t ∈ (a : b)Z avec s + t = 1,
d’où s(a + b) ⊆ b, t(a + b) ⊆ a et sa + tb = a ∩ b. D’où la matrice de passage
de E à H avec f1 = te1 + se2 et f2 = −e1 + e2 .
B = MH,E (IdM ) =
a
b
a+b
t
s
a∩b
−1
,
1
avec pour inverse
a+b
ME,H (IdM ) =
a∩b
a b
1 1
.
−s t
Notons que l’égalité a b = (a + b)(a ∩ b) nous assurait que la première
matrice était celle d’un isomorphisme, donc il n’y a aucune surprise à voir
que la matrice inverse est bien celle d’une application Z-linéaire.
En résumé B est une pseudo-matrice inversible et l’on obtient le résultat
3. Réduction de Hermite
21
souhaité :
LB = c
a+b
a
a∩b
0
Le cas général.
On veut maintenant traiter la pseudo-matrice générale de format 1 × 2
a b
L= c a b .
On se demande d’abord si le pivot de Gauss fonctionne (c’est-à-dire est-ce
que aa ⊇ bb ou aa ⊆ bb ?), auquel cas on fait appel au pivot de Gauss.
Si ce n’est pas le cas, il suffit de se ramener au cas particulier précédent,
en considérant les idéaux a0 = b−1 a et b0 = a−1 b. 4 On a alors une pseudomatrice inversible
a0 b0
a0 b0
a b 0
P =
avec LP = c ab ab .
b 0 a
En fin de compte ce sont donc les idéaux a0 et b0 qui seront traités selon la
méthode donnée dans le cas particulier étudié en premier. En particulier,
on prendra s et t ∈ A tels que s + t = 1, sa0 ⊆ b0 et tb0 ⊆ a0 (i.e. saa ⊆ bb
et tbb ⊆ aa).
Réduction de Hermite : images et noyaux d’applications
linéaires
Dans cette sous-section, on montre comment la réduction de Hermite des
pseudo-matrices permet de démontrer sous forme très concrète les théorèmes
de structure généraux concernant aussi bien les systèmes linéaires que les
modules de présentation finie sur les domaines de Prüfer.
3.3. Théorème. (Réduction de Hermite)
Soit Z un domaine de Prüfer de corps de fractions K pour lequel on a un
test de divisibilité et un algorithme d’inversion des idéaux de type fini.
Soit A = ((hi )i∈J1..nK ), (ej )j∈J1..mK ), A) avec A = (aij ) ∈ Mn,m (K) une
pseudo-matrice sur Z (i.e., aij ej ⊆ hi pour tous i, j).
On peut calculer une pseudo-matrice inversible
C = ((ej )j∈J1..mK , (e0j )j∈J1..mK , C) avec C = (cj,k ) ∈ Mm (K)
(on regarde C comme opérant un changement de pseudo-base au départ), et
une matrice de permutation L ∈ Mn (Z) (la pseudo-matrice L correspondante
4. Dans le cas où l’on mène tous les calculs avec des idéaux entiers, on considère
un élément x ∈ K tels que les idéaux fractionnaires a0 = xb−1 a et b0 = xa−1 b soient
entiers, i.e. x ∈ ba−1 ∩ ab−1 . Simplement, on peut prendre pour x un multiple commun
des numérateurs de a et b, ce qui donne xb−1 et xa−1 ∈ A, et a fortiori a0 et b0 entiers.
22
Calcul matriciel généralisé
opère un changement de pseudo-base à l’arrivée), telles que la matrice L A C
T
soit en forme réduite de Hermite : H =
G
inférieure de déterminant non nul.
0
, T carrée triangulaire
0
Démonstration. Cela résulte des manipulations de colonnes de type pivot
de Gauss et de type Bezout décrites précédemment. Tout se passe comme
pour une matrice sur un anneau de Bezout intègre, à ceci près que l’on doit
remplacer les matrices usuelles par des pseudo-matrices.
Notons que le test de divisibilité est utilisé uniquement pour vérifier que
dans certains cas, des manipulations élémentaires du type pivot de Gauss
sont admissibles.
On pourrait donc se passer de cette hypothèse en faisant fonctionner l’algorithme de réduction de Hermite uniquement avec des manipulations de
type Bezout.
Cependant, comme déjà indiqué, nous faisons toujours l’hypothèse que
l’anneau Z est un domaine de Prüfer à divisibilité explicite (au sens constructif).
Les théorèmes qui suivent sont tous des corollaires faciles du théorème 3.3
concernant les pseudo-matrices.
3.4. Théorème. (Image d’une pseudo-matrice) L’image de toute pseudomatrice est isomorphe à une somme directe d’idéaux inversibles.
Démonstration. On effectue une réduction de Hermite de la matrice. La
multiplication à droite par une pseudo-matrice inversible ne change pas le
module image. Il suffit de traiter l’image d’une pseudo-matrice (h; e0 ; H)
où H =
T
0
est en forme réduite de Hermite. C’est aussi l’image
0
G
T
de la pseudo-matrice (h; e01 , . . . , e0r ; H1 ) où H1 =
. Comme det(T ) 6= 0,
G
l’application linéaire
e01 × · · · × e0r −→ h1 × · · · × hn
définie par H1 est injective. Donc Im A = Im H = Im H1 ' e01 × · · · × e0r .
Précisément, supposons que l’on traite la pseudo-matrice A d’une application
Z-linéaire ϕ : E → H sur des pseudo-bases E = (e1 , e1 ), . . . , (em , em )
et H = (h1 , h1 ), . . . , (hn , hn ) de E et H. Alors l’image de ϕ est le module
somme directe e01 h01 ⊕ · · · ⊕ e0r h0r , où les h0i sont les vecteurs exprimés par les
colonnes de la matrice H1 sur les hi (qui sont des éléments de K ⊗Z H).
3.5. Théorème. (Images)
1. Tout Z-module projectif de type fini est isomorphe à une somme directe
d’idéaux inversibles, autrement dit, il possède une pseudo-base.
3. Réduction de Hermite
23
2. L’image d’une application linéaire entre Z-modules projectifs de type fini est un module projectif de type fini dont on peut calculer une
pseudo-base.
3. – Tout sous-Z-module de type fini de Kn est projectif de type fini.
– Si g1 , . . ., gm ∈ Kn et si e1 , . . ., em sont des idéaux de type
Pfini non
nuls, on peut calculer une pseudo-base du Z-module E = j gj ej .
Démonstration. 1. Puisqu’un module projectif de type fini est isomorphe à
l’image d’une matrice de projection usuelle, cela résulte du théorème 3.4.
2. Il s’agit pour l’essentiel d’une reformulation du théorème 3.4. En effet, vu
le point 1, tout module projectif de type fini possède une pseudo-base. Alors
une application linéaire entre modules projectifs de type fini est représentée
par une pseudo-matrice sur les pseudo-bases des modules.
3. Les deux points sont clairement équivalents. Le second résulte du théorème 3.4 car E est l’image d’une pseudo-matrice (hdi , . . . , hdi ; e1 , . . . , em ; G),
où G a pour colonnes les gj exprimés sur la base canonique de Kn , et où
l’élément d ∈ K est choisi de façon que gij ej ⊆ dZ pour tous les (i, j).
3.6. Théorème. (Noyaux)
Soit ϕ : E → H une application linéaire entre modules projectifs de type
fini sur un domaine de Prüfer. Le noyau Ker ϕ est facteur direct dans E (a
fortiori projectif de type fini). Plus précisément, on peut calculer une pseudobase de E dont les derniers termes forment une pseudo-base de Ker ϕ.
Démonstration. Comme dans le théorème précédent, il suffit de faire la
démonstration pour le noyau d’une pseudo-matrice, et l’on prend les notations du théorème 3.3. Le changement de pseudo-base donné
par la matrice C
0
0
fournit une nouvelle pseudo-base (u1 , e1 ), . . . , (um , em ) (les uj sont exprimés par les colonnes de la matrice C), pour laquelle l’application linéaire
est exprimée par la nouvelle pseudo-matrice H. Pour cette matrice il est
clair que le noyau est fourni par la somme directe des sous-modules uj e0j
pour les numéros j des colonnes nulles de H.
Pseudo-matrices surjectives
La proposition suivante reprend le point 3 du théorème 2.6, qui généralise
un théorème bien connu pour les matrices usuelles.
Dans le point 3 du théorème 2.6, l’application linéaire ϕ, ici représentée
par A, admet un inverse à droite ψ du fait qu’elle est surjective et que l’image
est un module projectif. Le module source de ϕ est égal à Im ψ ⊕ Ker ϕ.
Lorsque Ker ϕ est une somme directe de modules projectifs de rang 1,
la matrice A peut être complétée en la pseudo-matrice inversible B qui
représente l’application linéaire ϕ|Im ψ ⊕ IdKer ϕ , laquelle a pour source
Im ψ ⊕ Ker ϕ et pour image Im ϕ ⊕ Ker ϕ.
24
Calcul matriciel généralisé
Une fois que l’existence de la pseudo-matrice B est assurée par un argument
général, il reste le problème algorithmique d’un calcul aussi simple que
possible de cette pseudo-matrice.
Nous sommes intéressés ici par une démonstration matricielle algorithmique
du résultat dans le contexte des domaines de Prüfer, pour lesquels les calculs
sur les pseudo-matrices sont simplifiés.
3.7. Proposition. (Pseudo-matrices surjectives)
Soit Z un domaine de Prüfer et soit n ∈ J1..mK.
Soit A = (h1 , . . . , hn ; e1 , . . . , em ; A) ∈ Mh,e (Z). Cette pseudo-matrice représente une application linéaire surjective si, et seulement si, Dn (A) = h1i.
Dans ce cas, A peut être complétée en une pseudo-matrice inversible
B = (h1 , . . . , hm ; e1 , . . . , em ; B).
La matrice AB
−1
est alors en forme de Smith :
AB −1 =
h1
h1
1
h2
0
h2
..
.
0
..
.
1
..
hn
0
.
···
···
···
..
.
..
0
.
hn
0
..
.
0
1
hn+1
0
..
.
..
.
0
···
···
···
hm
0
..
.
.. .
.
0
Et la pseudo-matrice extraite sur les n premières colonnes de B −1 est un
inverse à droite de A.
Démonstration. On démontre l’implication difficile.
D’après le théorème 3.3, on peut calculer une pseudo-matrice inversible
C = ((ej )j∈J1..mK ; e01 , . . . , e0n , hn+1 , . . . , hm ; C) avec C = (cj,k ) ∈ Mm (K)
telle que la matrice A C soit en forme réduite de Hermite : H = T
0
,
où T est carrée triangulaire inférieure. On a Dn (T ) = Dn (A) = h1i, donc T
est inversible. En fait les idéaux mineurs d’ordre 1 diagonaux mii (T ) ont
leur produit égal à h1i, donc sont tous égaux à h1i, ce qui autorise la
méthode du pivot par manipulations élémentaires de colonnes. On termine
en inversant la matrice diagonale obtenue. On a ainsi ramené T à la forme
(h1 , . . . , hn ; h1 , . . . , hn ; In ). Ceci donne une pseudo-matrice inversible C 0 telle
que A C C 0 = In
et l’on pose B := (C C 0 )−1 .
0
B1
En regardant B comme une pseudo-matrice par blocs B =
B1
obtient In
= A et B1 = A.
0
B2
, on
B2
3. Réduction de Hermite
25
Double réduction de Hermite, conoyaux
3.8. Théorème. (Double réduction de Hermite)
Mêmes hypothèses qu’au théorème 3.3. On peut calculer une pseudo-matrice
inversible C opérant un changement de pseudo-base au départ, et une pseudomatrice inversible L opérant un changement de pseudo-base à l’arrivée, telles
que L A C =
non nul.
T
0
0
0
, où T est triangulaire inférieure de déterminant
Démonstration. On fait une réduction de Hermite sur les colonnes, suivie
d’une réduction de Hermite sur les lignes.
Le théorème suivant est une forme précise, hh pseudo-matricielle ii, du théorème XIV-2.5 de [Modules].
3.9. Théorème. (Conoyaux)
Soit ϕ : E → H une application linéaire entre modules projectifs de type
fini sur un domaine de Prüfer.
1. Le saturé de Im ϕ dans H est en facteur direct dans H. Plus précisément, on peut calculer une pseudo-base de H dont les premiers termes
forment une pseudo-base du saturé de Im ϕ.
2. Le module conoyau Coker ϕ est un module de présentation finie, somme
directe de son sous-module de torsion et d’un module projectif de type
fini.
3. Le sous-module de torsion de Coker ϕ est le quotient d’un module projectif par un sous-module projectif de même rang. Il est isomorphe au
conoyau d’une pseudo-matrice carrée injective.
En particulier tout module de présentation finie sans torsion est projectif.
Démonstration. Le point 1 résulte du théorème 3.8 et du fait que lorsque
l’on sature l’image d’une pseudo-matrice carrée injective, on obtient le
module d’arrivée en entier. Le reste suit facilement.
Remarque. Dans le théorème 3.9, la structure du sous-module de torsion et
celle du sous-module projectif de type fini ne sont pas décryptées de manière
complètement satisfaisante. En particulier, ce théorème, bien que constructif, ne donne pas de solution algorithmique générale aux deux problèmes
suivants :
– déterminer si deux modules de présentation finie de torsion sont ou ne
sont pas isomorphes ;
– déterminer si deux modules projectifs de type fini sont ou ne sont pas
isomorphes.
26
Calcul matriciel généralisé
On verra dans la section 4 que lorsque le domaine de Prüfer Z est de
dimension 1, on sait répondre à la première question, mais pas nécessairement à la seconde, qui se ramènera à la question de savoir si un idéal de
type fini e est principal. Ce problème n’admet pas de solution algorithmique
générale, même pour les domaines de Dedekind.
Systèmes linéaires, via la réduction de Hermite
Le théorème 3.3 donne le corollaire suivant pour le traitement des systèmes
linéaires.
On notera que les tests proposés ici sont explicites parce que le divisibilité
dans Z est explicite.
3.10. Théorème. (Systèmes linéaires sur un domaine de Prüfer, II)
On considère un système linéaire AX = B de n équations à m inconnues
sur Z. Dans la situation usuelle, tous les idéaux indexant les lignes et les
colonnes des matrices A, B (données) et X (inconnue) sont égaux à h1i,
les inconnues (coordonnées de X) sont dans Z et A ∈ Mn,m (Z).
Les résultats s’appliquent aussi bien avec des pseudo-matrices A = (h; e; A)
et B = (h; b; B), en adaptant le format de la colonne X aux données : les
inconnues sont des éléments xj ∈ K soumis aux conditions xj b ∈ ej .
On considère une double réduction de Hermite L A C =
T
0
, avec la
0
0
matrice T ∈ Mr (K) triangulaire inférieure injective. Les pseudo-matrices
C = (e, e0 , C) et L = (h0 , h, L) sont inversibles, et l’on introduit les nouvelles
inconnues Y = C −1 X.
1. La solution générale du système homogène sans second membre AX = 0
est donnée par y1 = · · · = yr = 0. Ceci donne pour Y le sous-Z-module
K = {0} × · · · × {0} × e0r+1 × · · · × e0m
et pour X, le Z-module C(K) paramétré par
(yr+1 , . . . , ym ) ∈ e0r+1 × · · · × e0m ,
c’est aussi l’image de la pseudo-matrice extraite de C sur les m − r
dernières colonnes.
2. Le système linéaire avec second membre AX = B admet une solution
si, et seulement si, le sous-Z-module de Kn codé par LB est contenu
dans l’image de la pseudo-matrice
T
h01 , . . . , h0n ; e01 , . . . , e0r ;
.
0
– Les contraintes données par l’annulation des n − r dernières coordonnées de L B signifient exactement que le système A X = B a une
solution dans Km .
4. Réduction de Smith en dimension 1
27
– Les contraintes sur les r premières coordonnées de L B peuvent être
testées de proche en proche, vue la forme triangulaire de T .
– On peut donc tester l’existence d’une solution et calculer une solution
particulière lorsqu’il en existe une.
Démonstration. Il faut juste préciser la question du test pour une solution
particulière : toute solution donne par soustraction une solution avec les
hh inconnues auxiliaires ii nulles, donc le test peut porter uniquement sur
l’équation T Z = B 0 avec Z et B 0 donnés par troncatures de Y et LB aux r
premières coordonnées. Comme T est injective, la solution, si elle existe, est
unique.
Commentaire. L’énoncé du corollaire sur les systèmes linéaires est un peu
plus simple dans le cas d’un système linéaire usuel, mais il n’est pas
hh nettement plus simple ii, car les idéaux e0 et h0 introduits par la double
j
i
réduction de Hermite, ainsi que les coefficients de T dans K et non dans Z,
semblent des ingrédients inévitables.
4. Calculs modulaires et réduction de Smith
en dimension 1
Dans cette section, Z est un domaine de Prüfer à divisibilité
explicite, de dimension 6 1.
4.1. Définition. Soit A = (h1 , . . . , hn ; e1 , . . . , em ; A) ∈ Mh,e (Z) et p =
inf(m, n). La pseudo-matrice A est dite en forme de Smith si la matrice
A = (aij ) a tous ses coefficients nuls hormis éventuellement des coefficients
aii et si les idéaux mineurs d’ordre 1 ci := mii (A) = aii ei h−1
satisfont les
i
relations attendues :
c1 ⊇ c2 ⊇ · · · ⊇ cp .
4.2. Théorème. Soit Z un domaine de Dedekind explicite, i.e., un domaine de Prüfer noethérien à divisibilité explicite. Toute pseudo-matrice
sur Z est équivalente à une pseudo-matrice en forme de Smith.
Démonstration. L’algorithme est le même que pour la réduction de Smith
d’une matrice sur un anneau principal, en remplaçant les matrices usuelles
par des pseudo-matrices. On peut se reporter à [Modules, Algorithme IV2.2].
28
Calcul matriciel généralisé
Sur l’unicité d’une réduite de Smith usuelle
Lorsqu’une matrice M ∈ Mn,m (A) admet une réduction de Smith dont la
partie carrée est égale à Diag(a1 , . . . , an ), le module Coker M est isomorphe
à la somme directe des A/hai i :
Coker M ' A/ha1 i ⊕ · · · ⊕ A/han i avec des idéaux ha1 i ⊇ · · · ⊇ han i .
Les idéaux ei = hai i sont uniquement déterminés (fait 1.1).
Plus précisément, si aucun des ai n’est inversible, la liste (e1 , . . . , en ) ne
dépend que du module Coker M .
Cela ne signifie pas nécessairement que pour deux matrices équivalentes en
forme de Smith A = (aij ) et A0 = (a0ij ) les a0ii soient associés aux aii .
Néanmoins, c’est vrai lorsque A est intègre, et le lemme suivant montre que
c’est aussi le cas pour un anneau zéro-dimensionnel.
4.3. Lemme. Soient a et b ∈ A zéro-dimensionnel. Si hai = hbi, alors a
et b sont associés : a = wb pour un élément w ∈ A× .
Démonstration. On a a = ub et b = va, donc a(uv − 1) = 0. Comme A est
zéro-dimensionnel on a un idempotent e tel que uv −1 est nilpotent modulo e
et inversible modulo 1 − e. Dans la composante A/hei, on a uv = 1 + x avec
x nilpotent, donc u est inversible. Dans la composante A/h1 − ei, a = 0
donc b = 0 et l’on a a = 1.b. En bref a = wb avec w = u.(1 − e) + 1.e
inversible.
On montre maintenant un lemme qui complète en quelque sorte le lemme
précédent.
4.4. Lemme. Soit Diag(a1 , . . . , an )Qune matrice en forme de Smith sur un
anneau A, et des ui ∈ A× tels que i ui = 1. Définissons a0i = ai ui , alors
les deux matrices Diag(a1 , . . . , an ) et Diag(a01 , . . . , a0n ) sont élémentairement
équivalentes.
0
Démonstration. Il suffit
le cas suivant,
de traiter
avec b = ca, a = au,
0
a 0
a 0
uv = 1, b0 = bv, A =
et B =
.
0 b
0 b0
a 0 1 a a0 − a 2 a0 a0 − a 3 a0 a0 − a 4 a0 0
−→
−→
−→
−→
0 b
0 b
b
b
0 b0
0 b0
1
2
3
4
:
:
:
:
C2
C1
L2
C2
←
←
←
←
En bref
C2 + (u − 1)C1 .
C1 + C2 .
L2 − cvL1 , avec b − cv(a0 − a) = b − ca + cva = cva = vb = b0 .
C2 + (v −
1)C1 .
1 0
1 u−1
1 0
1 v−1
A
= B.
−cv 1
0 1
1 1
0 1
4. Réduction de Smith en dimension 1
29
La structure des modules de présentation finie de torsion, et quelques calculs matriciels
Rappelons la démonstration de la proposition suivante [Modules, XVI-4.6].
4.5. Proposition. Un module de présentation finie de torsion P sur un
domaine de Prüfer Z de dimension 1 est isomorphe à une somme directe
Z/a1 ⊕ · · · ⊕ Z/an , avec des idéaux inversibles a1 ⊇ · · · ⊇ an .
Si les ai sont 6= h1i cette écriture est unique 5 . Plus généralement, deux
écritures de ce type de même longueur sont identiques (fait 1.1).
Démonstration. Le module P est annulé par un élément δ =
6 0, parce qu’il
est de torsion et de type fini (il suffit que δ annule chacun des générateurs).
L’anneau quotient Z0 = Z/hδi est zéro-dimensionnel et arithmétique, donc
est un anneau de Smith ([Modules, XVI-4.2]).
Ainsi, on a un isomorphisme de Z-modules (ce sont aussi des Z0 -modules)
du type suivant
P = P/δP ' Z0 /ha1 i ⊕ · · · ⊕ Z0 /han i ' Z/hδ, a1 i ⊕ · · · ⊕ Z/hδ, an i ,
avec les inclusions hδ, a1 i ⊇ · · · ⊇ hδ, an i .
En pratique, cela se passe précisément comme suit. Le module P est présenté
par une matrice M ∈ Mn,m (Z) avec dn := Dn (M ) = F0 (P ) 6= h0i.
Pour un δ 6= 0 dans dn , on calcule sur Z0 une réduite de Smith par manipulations élémentaires L M C =
D
0
avec D = Diag(a1 , . . . , an )
et ha1 i ⊇ · · · ⊇ han i. On en déduit la structure de P comme ci-dessus, de
sorte que Dk (M ) = Fn−k (P ) = ha1 · · · ak , δi = a1 · · · ak et ak = hak , δi pour
chaque k ∈ J0..nK.
On en déduit le corollaire suivant.
4.6. Corollaire. Sur un domaine de Prüfer de dimension 6 1, la structure
d’un module de présentation finie de torsion P est caractérisée par ses
idéaux de Fitting Fk (P ).
Démonstration. En effet, dans la proposition 4.5, notons di = Fn−i (P ). On
a alors d1 = a1 , et plus généralement dk = a1 · · · ak pour k ∈ J2..nK (fait
1.2) ; donc ak = (dk : dk−1 ) car ak 6= h0i.
Le corollaire suivant est plus surprenant.
5. Dans la mesure où nous supposons que Z est à divisibilité explicite, on pourra se
débarrasser des idéaux égaux à h1i.
30
Calcul matriciel généralisé
4.7. Corollaire. Soit M ∈ Mn,m (Z) avec Dn (M ) 6= 0. Soit δ 6= 0 dans
Dn (M ). On considère l’anneau arithmétique zéro-dimensionnel Z0 = Z/hδi.
On note x pour x mod δ. On calcule par manipulations élémentaires une
réduite de Smith de M , disons
M0 ≡ D
0
mod δ avec D = Diag(a1 , . . . , an ) et ha1 i ⊇ · · · ⊇ han i .
Alors :
1. ha1 · · · ai , δi = ha1 , δi · · · hai , δi pour i ∈ J2..nK.
2. Dn (M ) = ha1 , δi · · · han , δi.
Q
Q
Q
=
3.
i∈J ai , δ dans les cas suivants :
i∈I ai , δ
i∈I∪J ai , δ :
I = J1..kK et J = Jk + 1..`K ⊆ J1..nK, ou vice versa.
Q
Q
Q
4.
i∈I∪J ai :
i∈I ai =
i∈J ai dans les cas suivants :
I = J1..kK et J = Jk + 1..`K ⊆ J1..nK, ou vice versa.
Démonstration. 1 et 2. Cas particulier de ce qui a été expliqué dans la
démonstration de la proposition 4.5.
Le point 3 résulte des égalités di = a1 · · · ai , car Z est un domaine de Prüfer.
Le point 4 en résulte parce que lorsqu’on a trois idéaux I ⊆ J ⊆ K dans
un anneau A, on a l’égalité
(J : K)A mod I = (J/I : K/I)A/I .
Et maintenant, oh surprise !, on obtient la hh réduction de Smith avec pseudobases ii d’une matrice carrée de déterminant non nul sans effort.
4.8. Proposition. Soit M ∈ Mn (Z) une matrice avec d = det(M ) 6= 0 (Z
domaine de Prüfer de dimension 1). Cette matrice est équivalente à une
pseudo-matrice de la forme
a1 a2 · · · an
h1i 1
0 ··· 0
.
..
. ..
h1i
0
1
M1 = . .
.. .. . . . . . . 0
h1i 0 · · · 0
1
Q
avec a1 ⊇ a2 ⊇ · · · ⊇ an , i ai = hdi et chaque ai de la forme hai , di.
Démonstration. On reprend ce qui a été expliqué dans la démonstration
de la proposition 4.5 (éventuellement avec δ = d). En examinant ce qui se
passe dans le calcul de la réduction de Smith modulaire par manipulations
4. Réduction de Smith en dimension 1
31
élémentaires, on obtient sur Z une égalité et une congruence
LM C = M 0 ≡ Diag(a1 , . . . , an ) mod δ .
h1i
a1
Considérons la pseudo-matrice 6 E := ...
an
···
h1i
.
M0
Puisque M 0 = Diag(a1 , . . . , an ) mod δ, elle est de la forme
a1
h1i
a1 + δx11
h1i
δx12
a2
E = .
..
δx21
..
.
a2 + δx22
δxn1
···
an
···
···
..
h1i
δx1n
..
.
..
.
.
.
an + δxnn
Oh merveille ! c’est une pseudo-matrice de changement de pseudo-base. En
Qn
effet, i=1 ai = hdi avec d = det(M ) = det(LM C) = det(M 0 ) = det(E),
donc det(E) = h1i. Son inverse est la pseudo-matrice
a1
E −1
h1i
.
= ..
h1i
···
an
M0
−1
Posons C1 = CE −1 . On obtient LM C1 = M1 de la forme annoncée, où L
et C1 sont des pseudo-matrices de changements de base (L et M sont des
matrices usuelles vues comme des pseudo-matrices ayant les idéaux h1i en
indices de lignes et en colonnes).
Voici maintenant le résultat analogue pour une matrice hh usuelle ii plus large
que haute. Il nous faut faire ici appel à la proposition 3.7 concernant les
pseudo-matrices surjectives en espérant qu’elle soit efficace sur un domaine
de Prüfer de dimension 1.
4.9. Théorème. Soit M ∈ Mn,m (Z) une matrice avec Dn (M ) 6= 0. Soit
un élément δ non nul de Dn (M ). Cette matrice est équivalente à une
6. On vérifie immédiatement que c’est bien une pseudo-matrice.
32
Calcul matriciel généralisé
pseudo-matrice de la forme
h1i
a1
1
a2
0
h1i
0
M1 = .
.
.. ..
h1i 0
Qn
avec a1 ⊇ a2 ⊇ · · · ⊇ an , i=1 ai
Lm
et k=1 ak ' Zm .
1
..
.
···
···
···
..
.
..
.
0
an
0
..
.
···
···
0
1
···
···
am
0
..
.
..
.
0
= Dn (M ), chaque ai de la forme hai , δi
Démonstration. On reprend ce qui a été expliqué dans la démonstration
de la proposition 4.5. En examinant ce qui se passe dans le calcul de la
réduction de Smith modulaire par manipulations élémentaires, on obtient
sur Z une égalité et une congruence
LM C = M 0 ≡ D
mod δ
0
avec D = Diag(a1 , . . . , an ) et ha1 i ⊇ · · · ⊇ han i.
h1i
···
···
···
a1
7
Considérons la pseudo-matrice E := ...
an
Elle est de la forme
h1i
h1i
···
a1 a1 + δx11
δx12
···
a2 δx21
a2 + δx22
E = .
.
..
..
..
.
an
δxn1
···
h1i
.
M0
h1i
δx1n
···
···
an + δxnn
···
h1i
δx1m
..
.
.
..
.
δxnm
Oh merveille ! c’est une pseudo-matrice surjective. En effet,
Qn
0
i=1 ai = Dn (M ) avec Dn (M ) = Dn (LM C) = Dn (M ) = Dn (E),
donc Dn (E) = h1i. D’après la proposition 3.7, on peut la compléter en
une pseudo-matrice inversible B = (a1 , . . . , am ; h1i , . . . , h1i ; B) telle que la
pseudo-matrice M 0 B −1 soit la matrice M1 de l’énoncé. Avec C1 = CB −1 , on
obtient LM C1 = M1 , où L et C1 sont des pseudo-matrices de changements
de base (L et M sont des matrices usuelles vues comme des pseudo-matrices
ayant les idéaux h1i en indices de lignes et en colonnes).
7. On vérifie immédiatement que c’est bien une pseudo-matrice.
4. Réduction de Smith en dimension 1
33
Références
[ACMC] Lombardi H. & Quitté C. Algèbre Commutative. Méthodes
constructives. Calvage&Mounet (2011).
[CACM] English version of [ACMC]. Springer (2015).
[Cohen] Cohen H. Advanced topics in computational number theory. Graduate texts in mathematics 193. Springer-Verlag (1999).
[Modules] Díaz-Toca G.-M., Lombardi H. & Quitté C. Modules sur
les anneaux commutatifs. Calvage&Mounet (2014).
[MRR] Mines R., Richman F. & Ruitenburg W. A Course in Constructive Algebra. Universitext. Springer-Verlag, (1988).
Table des matières
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 Quelques rappels . . . . . . . . . . . . . . . . . . . . . . . . .
Quelques définitions . . . . . . . . . . . . . . . . . . . . .
Idéaux fractionnaires de type fini . . . . . . . . . . .
Calculs sur les idéaux de type fini dans les domaines de Prüfer
Matrice de localisation principale . . . . . . . . . . .
Opérations élémentaires sur les idéaux de type fini .
Formes réduites de matrices sur un domaine de Bezout .
Réduction de Hermite (manipulations de colonnes,
échanges de lignes) . . . . . . . . . . . . . . . . . .
Forme réduite triangulaire (manipulations de colonnes
et de lignes) . . . . . . . . . . . . . . . . . . . . . .
Réduction de Smith en dimension 6 1, (manipulations
de lignes et de colonnes) . . . . . . . . . . . . . . .
2 Pseudo-bases et pseudo-matrices . . . . . . . . . . . . . . . . .
Pseudo-bases . . . . . . . . . . . . . . . . . . . . . . . . .
Pseudo-matrices . . . . . . . . . . . . . . . . . . . . . . .
Matrice d’une application linéaire sur des pseudo-bases
Calcul matriciel généralisé, premiers résultats. . . . .
Matrice de changement de pseudo-bases . . . . . . . .
Idéaux déterminantiels . . . . . . . . . . . . . . . . . . .
Pseudo-matrices par blocs . . . . . . . . . . . . . . . . . .
Pivot de Gauss pour les pseudo-matrices . . . . . . . . . .
3 Réduction de Hermite . . . . . . . . . . . . . . . . . . . . . .
Systèmes linéaires, généralités . . . . . . . . . . . . . . . .
Manipulations du type Bezout . . . . . . . . . . . . . . .
Réduction de Hermite : images et noyaux d’applications
linéaires . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pseudo-matrices surjectives . . . . . . . . . . . . . . . . .
Double réduction de Hermite, conoyaux . . . . . . . . . .
Systèmes linéaires, via la réduction de Hermite . . . . . .
4 Réduction de Smith en dimension 1 . . . . . . . . . . . . . . .
– 35 –
1
2
2
4
4
4
6
7
8
8
9
9
10
11
11
12
13
14
16
16
18
19
20
21
23
25
26
27
36
Table des matières
Sur l’unicité d’une réduite de Smith usuelle . . . . . . . .
La structure des modules de présentation finie de torsion,
et quelques calculs matriciels . . . . . . . . . . . . . . .
28
29
| 0math.AC
|
arXiv:1802.00509v1 [cs.CV] 1 Feb 2018
Learning Semantic Segmentation with Diverse Supervision
Linwei Ye
University of Manitoba
Zhi Liu
Shanghai University
Yang Wang
University of Manitoba
[email protected]
[email protected]
[email protected]
Abstract
Models based on deep convolutional neural networks
(CNN) have significantly improved the performance of semantic segmentation. However, learning these models requires a large amount of training images with pixel-level
labels, which are very costly and time-consuming to collect. In this paper, we propose a method for learning CNNbased semantic segmentation models from images with several types of annotations that are available for various computer vision tasks, including image-level labels for classification, box-level labels for object detection and pixel-level
labels for semantic segmentation. The proposed method is
flexible and can be used together with any existing CNNbased semantic segmentation networks. Experimental evaluation on the challenging PASCAL VOC 2012 and SIFTflow benchmarks demonstrate that the proposed method can
effectively make use of diverse training data to improve the
performance of the learned models.
1. Introduction
Semantic segmentation is one of the key problems in
computer vision. The goal is to assign a label to each pixel
in the image to indicate the object class of this pixel. Like
many areas in visual recognition, the performance of semantic segmentation has improved significantly in the past
few years thanks to the adoption of deep convolutional neural network (CNN) [1, 2, 3, 17, 28].
A limitation of current CNN-based semantic segmentation methods is that they require a large amount of training
images with pixel-level annotations which are onerous and
time-consuming to acquire. This severely restricts the applicability and scalability of existing semantic segmentation
methods to real-world scenarios. On the other hand, images
with weaker supervision labels (e.g. image-level tags, object bounding boxes) are available at a much larger scale for
other computer vision tasks, e.g. image classification [12]
and object detection [7]. In addition, these weaker labels
are much easier and cheaper to collect than pixel-level labels. For example, collecting bounding boxes for each class
in an image is about 15 times faster/cheaper than pixel-level
labeling [15]. Unsurprisingly, the image-level label is the
easiest to collect, since it only requires annotating whether
an object class is present without specifying the exact location in the image.
Several weakly supervised semantic segmentation methods have been proposed to leverage image-level labels [11,
20, 22, 24] or box-level labels [4, 10, 19] for learning semantic segmentation models. These image-level label based
models generally employ smooth or constraint terms to infer potential segmentation masks from small and sparse discriminative activation regions which lack dense localization
or shape information. On the other hand, box-level label
based methods tend to use proposals [23] or unsupervised
segmentation approaches [25] to obtain the candidate segmentaion mask from each bounding box. A few related
works [8, 13, 27] explore to use both image-level and boxlevel labels as this paper. Unlike these existing methods, we
propose a flexible CNN-based framework to learn semantic segmentation models from diverse data in an end-to-end
fashion.
In this paper, we introduce an approach for learning semantic segmentation from diverse data with different types
of annotations. In particular, we consider three types of annotations (see Fig. 1) commonly used in computer vision:
image-level labels for image classification, box-level labels
for object localization/detection, and pixel-level labels for
semantic segmentation. Our proposed network consists of
three losses to train the network from training images with
different types of labels. Available training data with one
of these three types of labels can be easily added to our
learning scheme and boost the segmentation performance
accordingly. In addition, our model is flexible and can be
used in combination with any existing CNN-based architectures in semantic segmentation. By exploiting training
data with diverse supervision, our method outperforms approaches that only use images with pixel-level supervision.
2. Related Work
The performance of semantic segmentation has improved significantly in the past few years due to the success
Horse
Person
Image
Image-level label
Box-level label
Pixel-level label
Figure 1. The proposed approach can learn semantic segmentation models by making use of training images annotated for different visual
recognition tasks: image-level labels for image classification, box-level labels for object detection, and pixel-level labels for semantic
object segmentation.
of CNN. Long et al. [17] propose to convert fully connected
layers into convolutional layers and use in-network upsampling to produce feature map with the desired spatial size,
and then make dense labeling prediction of an image based
on the feature map. Meanwhile, coarse and fine features
are fused between different layers with skip connections to
generate fine details for the segmentation results. Chen et
al. [3] develop a dilated convolution layer to enlarge the
field of view (FOV) which is gradually reduced due to the
convolution operations. Thus the network can incorporate
larger context information without increasing the number of
parameters. In this paper, we consider these two segmentation frameworks as our base network.
In order to learn semantic segmentation, we usually need
images with pixel-level labels which are very expensive to
acquire. To alleviate this limitation, there has been work on
weakly supervised semantic segmentation [20, 21, 22, 24].
The goal is to learning semantic segmentation models from
labels that are less expensive and easier to obtain, e.g.
image-level labels. Some of these approaches [21, 22] are
based on multiple instance learning (MIL) framework that
considers each image as a bag of pixels and learns semantic segmentation from bag labels (e.g. image-level labels).
Pathak et al. [20] propose weakly supervised learning with
a series of linear constraints. Different linear constraints
are incorporated into a loss function on the latent distribution to optimize CNN by standard stochastic gradient descent (SGD). Qi et al. [24] introduce an object localization
branch to select and aggregate object proposals for suppressing error accumulation in training segmentation network. A new loss that combines seeding, expansion and
constrain-to-boundary is proposed in [11]. These three cues
are integrated into a segmentation network to exploit imagelevel labels.
Another line of work on weakly supervised semantic
segmentation aims to use box-level labels as the supervision. Dai et al. [4] first generate candidate segmentation
masks based on object proposal methods, and then iteratively feed these masks as supervision and update masks
from the trained network in a recursive training fashion. Papandreou et al. [19] develop an EM algorithm with a bias to
use weak label images to estimate object labels and iteratively generate latent pixel labels to optimize the CNN pa-
rameters. Khoreva et al. [10] view the problem as an issue
of input label noise and explore training as denoising. Various computer vision processing techniques (including cropping, grabcut segmentation [25] and MCG [23]) are used
to obtain effective supervision from box-level labels. Their
method can be applied in both semantic segmentation and
instance segmentation. Our approach explores a boundary
based method to obtain per-pixel labeling of each mask as
a soft segmentation and uses the proposed loss function to
address ambiguity when a pixel belongs to more than one
masks.
In order to exploit both image-level and box-level labels,
Kumar et al. [13] propose a latent structural support vector machine (LSVM) formulation. They use the latent variables model missing information in the annotation for learning the parameters of a specific-class segmentation model.
Guillaumin et al. [8] explore the object-background segmentation in the ImageNet [5]. The segmentation process
can be propagated at the image and class level by transferring appearance models from the previous stage. Xu et
al. [27] build a unified model to incorporate different combinations of weak supervision (image level tags, bounding
boxes, partial labels) to produce a pixel-wise labeling.
3. Our Approach
Given a set of training images with different forms of annotations (image-level labels, box-level labels, pixel-level
labels), our goal is to learn a semantic segmentation model
from such diverse data. The proposed approach builds on
any off-the-shelf semantic segmentation network. Figure 2
illustrates the overall architecture of our approach. The input image of arbitrary size is fed into the fully convolutional
network to generate a feature map which has the same size
as the input image. Then a separate branch is designed to
train the network for each of the three different annotations
that the image could have. Note that all the three branches
in Fig. 2 operate on the same feature map produced by the
same fully convolutional network. So the supervision signals in any of these branches will propagate to the fully convolutional network.
We use FCN [17] as an example segmentation network
to present our approach in this section. FCN uses replace
Global average
pooling
Horse
Person
Feature Vector
(1 (C+1))
Fully
Convolutional
Network
Input image
(h w 3)
Soft Seg.
Feature map
(h w (C+1))
Annotation-Specific
Loss Module
Figure 2. An overview of our approach. Given an image of arbitrary size, a per-class feature map is generated by a fully convolutional
network (e.g., FCN [17]). The feature map has the same spatial size as the input image. The number of channels of the feature map
corresponds to the number of classes (including the background class). Our model then feeds this per-class feature map to one of three
different branches. According to the available label of this input image (e.g. image-level, box-level, or pixel-level), our annotation-specific
loss module will use one of the three branches accordingly. In each branch of the annotation-specific loss module, a different loss function
is designed according to the form of the label.
the fully connected layers in standard CNN architecture
(i.e. VGG [26]) with convolutional layers for semantic segmentation. In our approach, we replace the last softmax
layer in FCN with the proposed annotation-specific loss
module shown in Fig. 2, so that we can learn the network
from diverse data with different annotations. For each input image, the network produces a per-class feature map
f ∈ Rh×w×(C+1) , where h and w are the height and width
of the input image, and C is the total number of object categories (excluding the background class). This feature map
can be used to generate the final semantic segmentation, e.g.
by assigning the class with the highest value for each pixel.
If we have ground-truth per-pixel labels on a training image, we can define a loss function to measure the difference
between f and the ground-truth per-pixel labels. However,
the challenge is that some of our training images are not
annotated at the pixel level, but we still want to utilize all
these available data with weaker supervision labels (imagelevel labels and box-level labels). To this end, we need to
somehow convert the feature map f to a different form of
prediction label, so that an appropriate loss function can be
defined. In our model, the feature map is then fed to one of
the three different branches with an annotation-specific loss
according to the available label of this input image. In the
following, we explain the details of each branch.
3.1. Image-level label
This branch (see Fig. 3) is used when the training image
only has the image-level label l = [l1 , l2 , ..., lC ], where lc is
a binary label indicating the presence/absence of the object
class c in this image. If lc = 1, the object class c is present
Horse
Person
•
•
•
non-train
non-tv
Figure 3. Image-level label training branch. We use the FCN [17]
segmentation network and replace the last softmax loss layer with
the specific loss module. The length of output vector is the same
as the number of classes.
somewhere in the image. If lc = 0, the object class c is
not in the image. Since image-level labels do not contain
any localization or shape information of the objects, they
can not be used directly to provide supervision for semantic
segmentation models which require per-pixel labeling. Instead, we use the feature map f to predict an image-level
classification label and define a loss function in terms of the
image-level classification. We attach a global average pooling layer [14] on the feature map f to extract a label vector
v ∈ R1×(C+1) in which each element of v corresponds to a
specific category, i.e.:
P
fi,c
vc = i∈Ω
∀c ∈ {0, 1, 2, ..., C}
(1)
|Ω|
where Ω denotes the set of pixels in the image and fi,c is
the value of the i-th pixel in the c-th channel in the feature
map f .
Then we apply a sigmoid activation layer to v and use
a multi-category binary cross-entropy loss to measure the
difference between v and the ground-truth label l as follows:
C
e−vc
1 X
1
)+(1−lc )·log(
)
lc ·log(
−v
c
C c=1
1+e
1 + e−vc
(2)
Here, we ignore the loss of the background class which exists in every image so as to push the network to correctly
predict object categories.
Limage = −
3.2. Box-level label
If an image has the box-level label (i.e. object bounding box), it is sent to the second branch in our annotationspecific loss module. A box-level label provides the rough
localization and size of an object in the image, but it does
not provide detailed shape information of the object. In this
branch, we convert the ground-truth box-level labeling of
the training images to a per-pixel labeling in each bounding
box. Then we use the per-pixel labeling to define the loss
function used in this branch.
(a)
(b)
sofa
uncertain
regions
(c)
(d)
(e)
Figure 4. Example of a segmentation mask obtained from the boxlevel label of an object: (a) input image; (b) UCM; (c) box-level
label (i.e. bounding box); (d) multi-scale segmentation; (e) final
object mask for this object. This figure is best viewed in color.
Darker pixels in Fig. 4 (b) correspond to locations that are
more likely to be true object boundaries. Within each annotated box, we first normalize boundary strength to be within
[0, 1] and then use three strength thresholds of { 41 , 24 , 43 } to
generate segmentation masks of different scales (Fig. 4 (d)).
From these three coarse-to-fine segmentation masks, we fill
regions starting from the inner center region to the maximum occluded boundary and choose a certain mask of a
scale until it takes up at least α% of the region in this box as
a confident mask. Finally, we assign the corresponding category label to this confident mask and mark the remaining
regions segmented in the coarsest segmentation as uncertain
regions. Other regions that do not correspond to foreground
in any of these three segmentation masks in the box are considered as background. The generated mask is shown in
(Fig. 4 (e)). Our method for generating mask labeling is
motivated by the observations in [10]: the area of an object mask should be a reasonable size within an annotated
box, and the inner box region should have higher chances of
overlapping with the corresponding object. We use α = 30
in our experiments.
We also need to consider the ambiguity when a pixel belongs to more than one mask (e.g. in the case of overlapping
segmented masks due to overlapping bounding boxes). In
order to deal with this case, we define a binary value si,c
to indicate whether the i-th pixel belongs to the c-th object
class (including uncertain regions). If a pixel belongs to
two masks with different object classes c and c0 , we assign
si,c = 1 and si,c0 = 1 as a soft segmentation pixel. Then
PC
we denote si = c=0 si,c and define the loss function for
the box-level label as follows:
Lbox = −
(b)
(a)
sofa
cat
tv
soft
ignore
(c)
(d)
(e)
Figure 5. Example of soft segmentation annotation obtained from
box-level labels: (a) input image; (b) pixel-level ground truth; (c)
box-level labels; (d) object masks corresponding to each of the
bounding box; (e) final segmentation mask.
Figure 4 illustrates the process of generating a mask labeling from a box-level label. We leverage ultrametric contour map (UCM) [18] to obtain an object mask of each annotated box. As shown in Fig. 4 (b), UCM assigns different boundary strength values based on region differences.
C
efi,c
1 X 1 X
1(si,c = 1) log( PC
)
fi,j
C
si c=0
j=0 e
(3)
i∈Ω
The intuition of Eq. 3 is as follows. If a pixel belongs to a
single mask, we consider this pixel to be a positive instance
of the corresponding object class. But if a pixel belongs to
multiple masks of K different object classes, we essentially
consider this pixel to be a positive instance of each of the K
object classes with a weight of 1/K. Similar to [10], for the
remaining pixels belonging to uncertain regions (i.e. white
regions in Fig. 5), we ignore the loss on these pixels during
training.
3.3. Pixel-level label
If a training image has pixel-level labels, we use the standard fully supervised semantic segmentation learning approach. Let pi ∈ {0, 1, ..., C} be the label of pixel i in the
image. The loss for the pixel-level label image can be calculated by the summation of softmax losses from all pixels
as:
Lpixel = −
C
1 XX
efi,c
)
1(pi = c) log( PC
fi,j
C c=0
j=0 e
(4)
i∈Ω
3.4. Learning
Let Simage , Sbox , Spixel denote the subset of images
with image-level, box-level, and pixel-level labels. Our
final loss is the summarization of the losses defined in
Sec. 3.1 3.2 3.3 over images in each of the corresponding
subset:
X
X (n)
X
(n)
(n)
Limage +
Lfinal =
Lbox +
Lpixel (5)
n∈Simage
(n)
n∈Sbox
(n)
P
nii / i ti
P
• mean accuracy (mAcc): (1/C) i nii /ti
P
P
• mean IU (mIU): (1/C) i nii /(ti + j nji − nii )
• pixel accuracy (pAcc):
n∈Spixel
(n)
Here we use Limage , Lbox , Lpixel to denote the corresponding
loss defined on the n-th training image in Simage , Sbox and
Spixel , respectively.
To optimize the loss function, we use stochastic gradient descent with momentum of 0.9, weight decay of 0.0005
and learning rate of 0.0001. The batch size is set to 1 in
order to take an image of arbitrary size as the input and
the total iteration is based on the original setting of adopted
segmentation framework and adjusted proportionally with
the amount of available images. In each mini-batch, we
pick images from one of the subsets Simage , Sbox , Spixel .
In other words, in each mini-batch, only one branch of the
annotation-specific loss module is activated.
4. Experiments
This section describes the experimental evaluation of our
method. We first describe the dataset and the experiment
setup in Sec. 4.1. Then we present the experimental results
in Sec. 4.2 and comparison with other methods in Sec. 4.3.
We perform additional ablation analysis in Sec. 4.4.
4.1. Dataset and Setup
Dataset: We evaluate the proposed approach on the PASCAL VOC 2012 benchmark dataset [6]. The dataset
consists of images of 20 object categories and the background class, and also has instance-level label augmented
by [9] to produce box-level annotation. Following the prior
work [19, 24], we use the augmented train dataset [9] which
contains 10582 images with pixel-level labels. From the
original PASCAL VOC 2012 train dataset, we create three
subsets (for image-level, box-level, pixel-level). We consider three different ratios of |Spixel |, |Sbox |, |Simage | shown
in Table 1.
Evaluation metrics: We use the following four evaluation
metrics defined in [17] to measure the performance of the
semantic segmentation results. Specifically, let nij be the
number
of pixels of class i predicted to be class j and ti =
P
n
be
the total number of pixels of class i. These four
j ij
metrics are defined as follows:
P
i
• frequency
IU
P
P weighted P
( k tk )−1 i ti nii /(ti + j nji − nii )
(fwIU):
Methods for comparison: We consider FCN [17] and
DeepLab [2] as our base networks and reimplement them
in pytorch 1 . For each base network, we compare several
different variants of our model. Assuming FCN is used as
the base network, these variants are defined as follows:
• FCN-p: this method ignores the training images with
box-level or image-level annotations (i.e. Simage and
Sbox ). It only learns the model parameters from the
subset Spixel with pixel-level annotations.
• FCN-p+i: this method uses Spixel and Simage , but it ignores Sbox .
• FCN-p+b: this method uses Spixel and Sbox , but it ignores
Simage .
• FCN-p+b+i (i.e. our method): this is our method that
makes use of all three types of data.
4.2. Experimental Results
Table 2 shows the results of learning the FCN model [17]
from diverse data on the PASCAL VOC 2012 validation
dataset. From the results, we can see that the proposed approach can effectively improve the semantic segmentation
performance by exploiting diverse supervision. In particular, using additional weak supervision data leads to better
performance. Our approach using all three subsets outperforms other alternatives that only use part of the data. In
addition, the relative sizes of the three subsets affect the final performance. If we have more images with pixel-level
annotations, the performance is better. This is intuitive since
pixel-level annotations provide the most informative supervision for the learning algorithm. When we have more training images with image-level labels and less with pixel-level
labels (e.g. when |Spixel | : |Sbox | : |Simage | = 1 : 5 : 10), the
performance boost of our approach is even more significant.
Our proposed method is also fairly general and can be
used with any existing CNN-based semantic segmentation
models. We show the generality by replacing FCN [17] with
DeepLab [2] (without CRFs). The results are shown in Table 3. Our approach using all available training data outperforms other alternatives that only use part of the training
data.
In order to compare the proposed method with fully supervised model, we hereby calculate upper bounds of corresponding variants of our model. The upper bound uses fully
pixel-level labels with the same amount of training images
1 https://github.com/pytorch/pytorch
method
FCN-p
FCN-p+i
FCN-p+b
FCN-p+b+i
annotation
pixel
pixel+image
pixel+box
pixel+box+image
p:b:i=1:1:1
3527
3527+3528
3527+3527
3527+3527+3528
p:b:i=1:2:3
1763
1763+5293
1763+3526
1763+3526+5293
p:b:i=1:5:10
662
662+6610
662+3310
662+3310+6610
Table 1. Three different settings of the training data considered in the experiments. Here we use “p:b:i” to denote the ratio of the images in
the three subsets Spixel , Sbox , Simage . In each setting, we list the number of training images in each subset.
Method (p:b:i=1:5:10)
FCN-p
FCN-p+i
FCN-p+b
FCN-p+b+i
Method (p:b:i=1:2:3)
FCN-p
FCN-p+i
FCN-p+b
FCN-p+b+i
Method (p:b:i=1:1:1)
FCN-p
FCN-p+i
FCN-p+b
FCN-p+b+i
pAcc
84.79
85.48
87.18
87.47
pAcc
86.73
87.35
88.00
88.16
pAcc
88.24
88.52
88.94
88.96
mAcc
67.95
68.43
72.25
72.65
mAcc
72.41
72.30
74.49
75.40
mAcc
72.96
74.20
75.99
76.35
mIU
51.08
53.91
57.07
57.51
mIU
55.58
57.04
58.94
58.97
mIU
58.13
59.73
60.20
60.88
fwIU
77.42
77.67
80.20
80.80
fwIU
80.13
80.59
81.70
82.02
fwIU
81.93
82.26
82.96
83.13
ratio of |Spixel | : |Sbox | : |Simage | = 1 : 1 : 1, our model is
only about 2% less than the upper bound in terms of mean
IU.
Figure 7 shows some qualitative examples of various
FCN models. From the qualitative results, we can see that
using the images in Simage (in addition to Spixel ) helps to
predict exact categories in the images (see examples in row
2 and 5 in Fig. 7). The additional images in Sbox help to
obtain a better localization and shape for the objects (see
examples in the top and bottom rows in Fig. 7). By making
full use of all available data with different forms of labels,
the proposed approach generally produces more precise
semantic segmentation results than using part of them.
Table 2. Comparison of different variants of FCN models on the
PASCAL VOC 2012 validation dataset.
Method (p:b:i=1:5:10)
DeepLab-p
DeepLab-p+i
DeepLab-p+b
DeepLab-p+b+i
Method (p:b:i=1:2:3)
DeepLab-p
DeepLab-p+i
DeepLab-p+b
DeepLab-p+b+i
Method (p:b:i=1:1:1)
DeepLab-p
DeepLab-p+i
DeepLab-p+b
DeepLab-p+b+i
pAcc
87.64
87.99
88.31
88.65
pAcc
88.55
88.84
89.53
89.60
pAcc
89.29
89.96
90.05
90.11
mAcc
75.50
76.17
77.56
78.22
mAcc
77.57
78.41
79.46
79.70
mAcc
78.21
80.10
80.15
80.39
mIU
49.56
50.08
53.44
53.86
mIU
53.85
53.98
55.08
56.43
mIU
56.20
56.53
57.41
58.05
fwIU
81.80
82.68
82.82
83.41
fwIU
83.31
83.69
84.65
84.74
fwIU
84.20
85.13
85.41
85.49
Figure 6. Comparison of different variants of FCN models and
their corresponding upper bound on the PASCAL VOC 2012 validation dataset under different ratios of training data splits. ∗ ub is
the upper bound which uses fully pixel-level labels with the same
amount of training images to learn the FCN model. The lighter
colors show the results of different variants of the proposed model
and the corresponding darker colors show upper bound results.
Table 3. Comparison of different variants of DeepLab models on
the PASCAL VOC 2012 validation dataset.
4.3. Comparison with Other Methods
to produce the segmentation performance of our model. In
other words, this is the best performance we can get if all
the training data have pixel-level labels. As shown in Fig. 6,
the performance of different variants of our model is comparable to the upper bound performance obtained by learning FCN on the training data using pixel-level labels under
different ratios of training data splits. In particular, with the
In Table 4, we compare our model with [27] which is also
developed for semantic segmentation under various forms
of supervision. Since [27] uses the SIFT-flow dataset [16]
in the experiment, we apply our approach on the SIFT-flow
in order to compare with [27]. SIFT-flow contains 2,688
images with pixel-level labels for 33 semantic categories,
including 2,488 for training and 200 for testing. Following the setting in [27], we use a sampling ratio of 0.5 for
Image
Ground Truth
FCN-p
FCN-p+i
FCN-p+b
FCN-p+b+i
Figure 7. Some qualitative examples of our approach on the PASCAL VOC 2012 validation dataset. In each row, from left to right: Image,
Ground Truth and segmentation results generated by FCN-p, FCN-p+i, FCN-p+b and FCN-p+b+i.
image-level labels and pixel-level labels respectively. Our
model outperforms [27] by a large margin in terms of pixel
accuracy and mean accuracy.
We also compare our results with the state-of-the-art
weakly supervised semantic segmentation methods [4, 10,
19] that use box-level labels. Similarly, we follow their settings with the same numbers of pixel-level and box-level labels in training on PASCAL VOC 2012. Table 5 shows the
semantic segmentation results. Note that all three compared
methods are originally proposed for weakly supervised semantic segmentation rather than diverse supervision. Since
the source codes of these methods are not available, we directly take the performance numbers in those papers. However, these methods in Table 5 use different backbone networks and some of them apply CRF post-processing to refine the results. So it is difficult to have a fair comparison
directly. This can be seen from the fact that the fully supervised versions of these methods give slightly different
Method
Xu et al. [27]
Ours
pAcc
72.8
82.08
mAcc
36.5
58.76
Table 4. Comparison to [27] on the SIFT-flow dataset under the
same setting (p:i=1:1).
performance numbers (see Table 5). Although our model
is not specifically designed for weakly supervised semantic
segmentation, it can still achieve comparable performance
in this setting.
4.4. Ablation Analysis
In this section, we perform additional ablation analysis of our approach. We conduct experiments on the FCN
model under the ratio of |Spixel | : |Sbox | : |Simage | = 1 : 5 :
10, which has the least amount of pixel-level labels and the
method has to rely more on images with the box-level or
Method
WSSL [19]
BoxSup [4]
SDI [10]
Ours
val. semi / full
65.1 / 67.6 (96.30)
63.5 / 63.8 (99.53)
65.8 / 69.1 (95.22)
60.14 / 63.14 (95.25)
test. semi / full
66.6 / 70.3 (94.74)
66.2 / - (-)
66.9 / 70.5 (94.89)
61.42 / 62.2 (98.75)
Table 5. Comparison of different weakly-supervised segmentation
methods on the PASCAL VOC 2012 validation and test datasets
under the same setting as [10] in terms of mIU. The numbers of
pixel-level and box-level annotations are 1.4k and 9k, respectively.
For each method, we show the mIU in both semi-supervised and
fully-supervised settings. Since different methods use different
design choices (such as backbone network, CRF postprocessing,
etc), it is difficult to compare their performance numbers directly.
This can be seen from the fact that these different methods have
different mIU in the fully supervised setting. The numbers in (·)
indicate the ratio of the mIU between the semi-supervised and
fully-supervised settings. In the ideal case, this number will be
close to 100 indicating that the semi-supervised setting achieves
the upper-bound (full-supervised) performance.
image-level labels.
First, we explore and compare other alternative ways of
exploiting the box-level supervision. We consider four different ways of using box-level supervision as follows:
Hard segmentation: this method uses the same approach to obtain the mask labeling from box-level labels
as Sec. 3.2, but it does not keep all overlapping segmented
masks of different object classes and weight them in the
loss. Instead, every pixel has to belong to a certain class.
We randomly assign a class to the overlapping region of
multiple segmented masks and then uses it as the pseudo
pixel-level label.
GrabCut: this method takes each box-level label and applies GrabCut [25] to obtain the binary mask of the object
inside the bounding box. It then considers the binary mask
as the pseudo pixel-level labels.
MCG: this method uses the MCG algorithm [23] to generate a set of candidate object masks for an input image. Inside each box-level label, an object mask that has the maximum overlap with the corresponding bounding box is selected as the object mask for the object inside this bounding
box. Similarly, this object mask is used as the pseudo pixellevel labels. This strategy has been used in [10].
Raw box: this method assigns the class label to each pixel
within a bounding box and considers the pixels outside of
any bounding boxes in the image as background. Therefore,
Eq. 3 can also be adopted to address ambiguity caused by
overlapping bounding boxes.
Table 6 shows the results of different strategies of using
box-level labels in the proposed approach, respectively. The
segmentation performance with our proposed box-level supervision outperforms all other alternatives. In addition, the
proposed box-level supervision loss in Eq. 3 shows its ef-
FCN
Pseudo
pixel-level
Our loss
Grabcut
MCG
Hard seg.
Raw box
Ours
pAcc
86.68
86.71
87.30
87.04
87.47
mAcc
71.91
70.87
71.80
71.07
72.65
mIU
55.60
56.19
57.35
56.91
57.51
fwIU
79.78
79.51
80.33
79.87
80.80
Table 6. Comparison of different strategies to use box-level labels
in FCN on the PASCAL VOC 2012 validation dataset.
fectiveness to address the ambiguity caused by overlapping
regions with multiple uncertain labels. Even using raw box
method in the box-level supervision, the semantic segmentation performance is comparable to their pseudo pixel-level
methods which require additional pre-processing with segmentation or proposal.
Figure 8. Effect of using three strength thresholds of scales to generate segmentation masks.
We also analyze the effects of some of the hyperparameters in our method. Figure 8 shows the performance of using one strengh threshold ( 12 , 24 , or 34 ) versus using all three
strength thresholds (our method) when generating the segmentation masks. We can see that using all three strength
thresholds outperforms just using one threshold.
5. Conclusion
We have proposed a method for learning CNN-based semantic segmentation models from training images with diverse annotations, including image-level labels, box-level
labels and pixel-level labels. The proposed model consists
of three specific losses for each of three annotations and
can be easily used together with any existing CNN-based
semantic segmentation networks. The experimental results
show that our method can effectively make use of diverse
training data with different levels of supervision.
Acknowledgement: This work was supported by NSERC,
the National Natural Science Foundation of China under
Grant No. 61771301, and the University of Manitoba GETS
funding program. We also thank NVIDIA for the GPU donations.
References
[1] V. Badrinarayanan, A. Kendall, and R. Cipolla. Segnet: A
deep convolutional encoder-decoder architecture for image
segmentation. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 2017.
[2] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and
A. L. Yuille. Semantic image segmentation with deep convolutional nets and fully connected crfs. In International
Conference on Learning Representations, 2015.
[3] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and
A. L. Yuille. Deeplab: Semantic image segmentation with
deep convolutional nets, atrous convolution, and fully connected crfs. arXiv:1606.00915, 2016.
[4] J. Dai, K. He, and J. Sun. Boxsup: Exploiting bounding
boxes to supervise convolutional networks for semantic segmentation. In IEEE International Conference on Computer
Vision, 2015.
[5] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. FeiFei. Imagenet: A large-scale hierarchical image database. In
IEEE Conference on Computer Vision and Pattern Recognition, 2009.
[6] M. Everingham, L. Van Gool, C. K. Williams, J. Winn, and
A. Zisserman. The pascal visual object classes (voc) challenge. International Journal of Computer Vision, 2010.
[7] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic
segmentation. In IEEE Conference on Computer Vision and
Pattern Recognition, 2014.
[8] M. Guillaumin, D. Küttel, and V. Ferrari. Imagenet autoannotation with segmentation propagation. International
Journal of Computer Vision, 2014.
[9] B. Hariharan, P. Arbeláez, L. Bourdev, S. Maji, and J. Malik.
Semantic contours from inverse detectors. In International
Conference on Computer Vision, 2011.
[10] A. Khoreva, R. Benenson, J. Hosang, M. Hein, and
B. Schiele. Simple does it: Weakly supervised instance and
semantic segmentation. In IEEE Conference on Computer
Vision and Pattern Recognition, 2017.
[11] A. Kolesnikov and C. H. Lampert. Seed, expand and constrain: Three principles for weakly-supervised image segmentation. In European Conference on Computer Vision,
2016.
[12] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
Advances in Neural Information Processing Systems, 2012.
[13] M. P. Kumar, H. Turki, D. Preston, and D. Koller. Learning specific-class segmentation from diverse data. In IEEE
International Conference on Computer Vision, 2011.
[14] M. Lin, Q. Chen, and S. Yan. Network in network. In International Conference on Learning Representations, 2014.
[15] T.-Y. Lin, M. Maire, S. Belongie, L. Bourdev, R. Girshick,
J. Hays, P. Perona, D. Ramanan, C. L. Zitnick, and P. Dollár.
Microsoft COCO: Common objects in context. In European
Conference on Computer Vision, 2014.
[16] C. Liu, J. Yuen, and A. Torralba. Nonparametric scene parsing via label transfer. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 2011.
[17] J. Long, E. Shelhamer, and T. Darrell. Fully convolutional
networks for semantic segmentation. In IEEE Conference on
Computer Vision and Pattern Recognition, 2015.
[18] K.-K. Maninis, J. Pont-Tuset, P. Arbelaez, and L. Van Gool.
Convolutional oriented boundaries: From image segmentation to high-level tasks. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017.
[19] G. Papandreou, L.-C. Chen, K. Murphy, and A. L. Yuille.
Weakly-and semi-supervised learning of a dcnn for semantic
image segmentation. In IEEE International Conference on
Computer Vision, 2015.
[20] D. Pathak, P. Krahenbuhl, and T. Darrell. Constrained convolutional neural networks for weakly supervised segmentation. In IEEE International Conference on Computer Vision,
2015.
[21] D. Pathak, E. Shelhamer, J. Long, and T. Darrell. Fully convolutional multi-class multiple instance learning. In International Conference on Learning Representations, 2015.
[22] P. O. Pinheiro and R. Collobert. From image-level to pixellevel labeling with convolutional networks. In IEEE Conference on Computer Vision and Pattern Recognition, 2015.
[23] J. Pont-Tuset, P. Arbelaez, J. T. Barron, F. Marques,
and J. Malik. Multiscale combinatorial grouping for image segmentation and object proposal generation. IEEE
Transactions on Pattern Analysis and Machine Intelligence,
39(1):128–140, 2017.
[24] X. Qi, Z. Liu, J. Shi, H. Zhao, and J. Jia. Augmented feedback in semantic segmentation under image level supervision. In European Conference on Computer Vision. Springer,
2016.
[25] C. Rother, V. Kolmogorov, and A. Blake. Grabcut: Interactive foreground extraction using iterated graph cuts. ACM
Transactions on Graphics, 2004.
[26] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. International
Conference on Learning Representations, 2015.
[27] J. Xu, A. G. Schwing, and R. Urtasun. Learning to segment
under various forms of weak supervision. In IEEE Conference on Computer Vision and Pattern Recognition, 2015.
[28] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet,
Z. Su, D. Du, C. Huang, and P. H. Torr. Conditional random
fields as recurrent neural networks. In IEEE International
Conference on Computer Vision, 2015.
| 1cs.CV
|
arXiv:cs/0610120v2 [cs.MS] 22 Oct 2008
Classdesc and Graphcode: support for scientific
programming in C++
Russell K. Standish
School of Mathematics
University of New South Wales
[email protected]
http://parallel.hpc.unsw.edu.au/rks
Duraid Madina
Department of Systems Studies
University of Tokyo
[email protected]
April 3, 2018
Abstract
Object-oriented programming languages such as Java and Objective
C have become popular for implementing agent-based and other objectbased simulations since objects in those languages can reflect (i.e. make
runtime queries of an object’s structure). This allows, for example, a
fairly trivial serialisation routine (conversion of an object into a binary
representation that can be stored or passed over a network) to be written.
However C++ does not offer this ability, as type information is thrown
away at compile time. Yet C++ is often a preferred development environment, whether for performance reasons or for its expressive features such
as operator overloading.
In scientific coding, changes to a model’s code takes place constantly,
as the model is refined, and different phenomena are studied. Yet traditionally, facilities such as checkpointing, routines for initialising model
parameters and analysis of model output depend on the underlying model
remaining static, otherwise each time a model is modified, a whole slew of
supporting routines needs to be changed to reflect the new data structures.
Reflection offers the advantage of the simulation framework adapting to
the underlying model without programmer intervention, reducing the effort of modifying the model.
In this paper, we present the Classdesc system which brings many of
the benefits of object reflection to C++, ClassdescMP which dramatically
simplifies coding of MPI based parallel programs and Graphcode a general
purpose data parallel programming environment.
1
1
Introduction
This paper describes Classdesc, ClassdescMP and Graphcode, techniques for
building high performance scientific codes in C++.
Classdesc is a technique for providing automated reflection capabilities in
C++, including serialisation support. ClassdescMP builds on Classdesc’s serialisation capability to provide a simple interface to using the MPI message
passing library with objects. Graphcode implements distributed objects on a
graph, where the objects represent computation, and the links between objects represent communication patterns. It is a higher level of abstraction than
the message passing paradigm of ClassdescMP, yet more general and powerful
than traditional data parallel programming paradigms such as High Performance
Fortran[2] or POOMA[12].
This paper is organised into three sections, describing the three technologies
in more detail. The final section concludes with a description of the current
status of the code, and where it can be obtained from.
2
2.1
Classdesc
Reflection and Serialisation
Object reflection allows straightforward implementation of serialisation (i.e. the
creation of binary data representing objects that can be stored and later reconstructed), binding of scripting languages or GUI objects to ‘worker’ objects and
remote method invocation. Serialisation, for example, requires knowledge of
the detailed structure of the object. The member objects may be able to be
serialised (e.g. a dynamic array structure), but be implemented in terms of a
pointer to a heap object. Also, one may be interested in serialising the object in
a machine independent way, which requires knowledge of whether a particular
bitfield is an integer or floating point variable.
Languages such as Objective C give objects reflection by creating class objects and implicitly including an isa pointer in objects of that class pointing to
the class object. Java does much the same thing, providing all objects with the
native (i.e. non-Java) method getClass() which returns the object’s class at
runtime, as maintained by the virtual machine.
When using C++, on the other hand, at compile time most of the information about what exactly objects are is discarded. Standard C++ does provide
a run-time type information mechanism (RTTI), however this is only required
to return a unique signature for each type used in the program. Not only is this
signature compiler dependent, it could be implemented by the compiler enumerating all types used in a particular compilation, and so the signature for a given
type would differ from program to program! Importantly, standard RTTI does
not provide any information on the internal structure of a type, nor methods
implemented.
The solution to this problem lies (as it must) outside the C++ language per
2
se, in the form of a separate program which parses the interface header files. A
number of C++ reflection systems do this: SWIG[4], being perhaps the oldest,
parses a somewhat simplified C++ syntax with markup, provides exposure to
scripting language of selected top level objects. Reflex[13], a more recent system
than Classdesc[9], is interesting in that it use the GCC-XML parser (based on
the C++ front end of GCC) to parse the input file to build a dictionary of type
properties. Classdesc differs from these other attempts by traversing the data
structures recursively at runtime, providing a genuine solution to serialisation, as
well as allowing “drill down” of simulation objects in an interactive exploration
of a running simulation.
These are generically termed object descriptors. The object descriptor generator only needs to handle class, struct and union definitions. Anonymous structs
used in typedefs are parsed as well. What is emitted in the object descriptor is
a sequence of function calls for each base class and member, similar in nature to
compiler generated constructors and destructors. Function overloading ensures
that the correct sequence of actions is generated at compile time.
For instance, assume that your program had the following class definition:
class jellyfish: public animal
{
double position[D], velocity[D], radius;
int colour;
};
and you wished to generate a serialisation operator called pack. Then this
program will emit the following function declaration for jellyfish:
#include "pack_base.h"
void pack(pack_t *p, string nm, jellyfish& v)
{
pack(p,nm,(animal&)v);
pack(p,nm+".position",v.position,is_array(),1,D);
pack(p,nm+".velocity",v.velocity,is_array(),1,D);
pack(p,nm+".radius",v.radius);
pack(p,nm+".colour",v.colour);
}
The use of auxiliary types like is_array() improves resolution of overloaded
functions, without polluting global namespace further. This function is overloaded for arbitrary types, but is more than a template, so deserves a distinct
name. We call these functions class descriptors (hence the name Classdesc), or
simply an action for short.
Thus, calling pack(p,"",var) where var is of type test1, will recursively
descend the compound structure of the class type, until it reaches primitive
data types which can be handled by the following generic template defined for
primitive data types:
3
template <class T>
void pack_basic(pack_t *p,string desc, T& arg)
{p->append((char*)&arg,sizeof(arg));}
given a utility routine pack t::append that adds a chunk of data to a repository
of type pack t.
This can even be given an easier interface by defining the member template:
template <class T>
pack_t& pack_t::operator<<(T& x)
{::pack(this,"",x);}
so constructions like buf << foo << bla; will pack the objects foo and bla
into the object buf.
Classdesc is released as public domain software, and is available from the
Classdesc website1 . The pack and unpack operations work more or less as described. The type xdr_pack, derived from pack_t uses the standard unix XDR
library to pack the buffer in a machine independent way. This allows checkpoint
files to be transported between machines of different architectures, or to run the
simulation in a client-server mode, with the client downloading a copy of the
simulation whilst the simulation is in progress.
2.2
Object Exposure
Another application of reflection is exposing object internals to an external environment, such as a scripting language, or another object oriented programming
language. For computational science models, adding a scripting language has
many advantages[11]. Initialisation of the model is simply achieved by setting
a few variables within a script. Data collected can be customised without code
recompilation by simple script changes. GUI widgets can allow the real time
monitoring of the model’s variables in a graphical form during debugging and
model development. A drill down facility can be readily provided in the scripting language that allows the model to be stopped, and values of the model’s
variables queried. Being a scripted environment, the same executable can be
used for exploration in a GUI mode, or for production in a batch mode, simply
by using a different script.
Automated techniques for exposing objects to a scripting environment, or to
a different OO environment already exist. Examples include VTK[16], CORBA/IDL
and SWIG[4]. However these either straight-jacket the programmer into using
a particular programming style, or require the class definitions to be coded in a
different language, (often termed an IDL). SWIG at least has the advantage of
being able to parse any ISO standard C/C++ code. Its strong advantage is that
it already has bindings for many popular languages, including TCL, Python,
Perl and Java. Where Classdesc and SWIG might work well together is scripting Fortran applications. An experimental Fortran version of Classdesc (called
1 http://ecolab.sourceforge.net/classdesc.html
4
FClassdesc) was developed under a grant from the Australian Partnership for
Advance Computing, with serialisation of Fortran modules and a descriptor to
produce C-syntax code for use as input to SWIG.
The EcoLab agent based modelling system[20]2 uses Classdesc to expose C++
objects to the TCL scripting language[10]. If the authors had been aware of
SWIG at the time of EcoLab’s development, SWIG would probably have been
used instead, however, Classdesc’s recursive approach to analysing data structures is more useful for interactive exploration of scientific models in a simulation framework than SWIG’s approach of requiring explicit exposure of top
level objects only.
Virtually any model that is implemented as a C++ object can be dropped
into EcoLab, and one instantly has a scriptable simulation system, with GUI
plotting and drill down tools and checkpointing functionality. The main programming constraint is the DCAS requirement (§2.4), although departures from
DCAS tend to result in degraded capability rather than catastrophic failure
(such as uncompilable code).
The exposure of objects into TCL is handled by a descriptor TCL_obj.
Simple data members generate a TCL command which returns the value of
that member, and set the member if an argument is supplied (if corresponding
ostream::operator<< and istream::operator>> are defined).
Member functions whose arguments match a limited range of signatures are
also callable from TCL.
2.3
Resource Aquisition Is Initialisation (RAII)
The RAII principle [21, §14.4.1] uses stack resident objects to control the lifetime
or states of objects elsewhere in the system, such as heap resident objects. One
of the simplest and most obvious application of RAII is prevention of memory
leaks that occur through forgetting to destroy objects once they are no longer
needed. By making the raw pointer a private member of a class, placing the calls
to new and delete within member functions of the class and arranging for the
destructor to call a final delete to dispose of the object, we can then use this
class to declare a stack variable that controls the lifetime of a heap object. Figure
1 shows a simple implementation of the ISO C99 variable length automatic
arrays that is not part of the C++ standard. Like the C version, data is allocated
when control passes through the statement declaring the array variable, and is
deallocated automatically when control leaves the scope containing the array
variable, relieving the programmer of having to remember to delete the object.
Unlike the C version, however, the data is actually allocated on the heap (via
the new statement called in the constructor, rather than the stack. This is often
advantageous as many modern operating systems restrict the stack size to a few
megabytes which cannot support large arrays.
RAII is useful for many other tasks, such as ensuring files are closed and
flushed, network connections are terminated properly, software licenses released
2 http://parallel.hpc.unsw.edu.au/rks/ecolab
5
template <class T> class Array
{
T* data;
public:
Array(size_t n): data(new T[n]) {}
T& operator[](size_t i) {return data[i];}
const T& operator[](size_t i) const {return data[i];}
~Array() {delete [] data;}
};
Figure 1: Implementation of C99 variable length automatic array feature in
C++.
and very importantly, ensuring partly constructed objects are correctly cleaned
up in the event of an exception occurring[21, 14.4.1].
By way of contrast, languages such as Java and C# do not allow the RAII
technique to be deployed, as complex objects cannot reside on the stack. Instead,
garbage collection is relied upon to release objects on the heap that are no longer
needed. Since this occurs at rather indeterminate times (if ever), it cannot be
relied upon for anything other than controlling memory leaks.
One mistake seasoned Java or C# programmers make when writing C++
is to assume that the C++ new operator should be used in the same way as it
is used in the other languages. This leads to code that is hard to debug and
maintain, and has given C++ a reputation for being difficult to avoid memory
problems.
2.4
The DCAS principle
The C++ compiler automatically provides a default constructor, a copy constructor and an assignment operator, if none are explicitly provided by the
programmer, which recursively call the default constructor, copy constructor or
assignment operator repectively of the base classes and members. The use of
Classdesc is analogous — Classdesc recursively applies its descriptor on base
classes and member functions. Since serialisation is the most important Classdesc application, I call this the DCAS principle (Default constructor, Copy
constructor, Assignment and Serialisation). Classes whose members and base
classes are DCAS are also DCAS automatically, alleviating a lot of programmer
effort.
To create a DCAS object from a non-DCAS object requires wrapping. Primitive types (ints, floats, etc) are DCAS, although their default constructors do
not initialise them to any particular value, so some care must be taken with
default constructors of classes taking such types. Pointers, on the other hand
are not DCAS at all. The default constructor for a pointer does not initialise the
pointer to a valid value. The copy constructor and assignment operator merely
copies the pointer, which ends up with two references to the same object.
6
To get around this problem, various solutions have been developed. The
C++ standard defines auto_ptr<T>[21, §14.4.2], which is DCAS (to a degree).
The default constructor set the reference to NULL, and copy and assignment
operators pass control of the target object to the target of the copy or assignment
operation, leaving the original object set to NULL, which breaks some notions of
“copy”. It supports the notion of “resource aquisition is initialisation” or RAII,
so that the pointer is released when the auto_ptr object is destroyed. Its main
use is to provide a means for returning an object by reference from a function,
avoiding any performance penalties of a copy constructor or the possibility of
an exception being thrown during the copy constructor.
The Boost library[5] defined the shared_ptr<T> and intrusive_ptr<T>
concepts, which allow for multiple references to a single object, whilst still supporting RAII, which are DCA. The shared_ptr<T> concept is so useful that it
has been included into TR1[1], which is scheduled to be standardized as part of
the next C++ standard.
However, none of these concepts can be serialised, as these objects are initialised to the address of an object created by an earlier new statement. The
actual type of the object is unknown at serialisation time, only the base class
T declared in the template argument is known. This arrangement allows the
handling of polymorphic objects, which we will return to in §2.6.
The Classdesc package includes the ref<T> concept, which implements a
reference counted dynamic reference class similar to Boost’s intrusive_ptr<T>
concept, which is serialisable (hence DCAS). Instead of creating the target object outside the ref class with a new statement, as done in Boost’s smart pointer
concepts, the target object is created on first dereference. This has the advantage that the reference counter can be stored alongside the object of type T
on the heap like intrusive_ptr<T> does, without the need for T to support
any reference counting API, however T is required to be DCAS. Polymorphism
(§2.6), which requires special treatment, is not supported by ref at all, however.
The use of reference counting (whether the Classdesc ref or the Boost versions) allows heap allocated objects to be used as simply as they would with
classic garbage collection. However copying reference counted references is about
twice as expensive as simple pointer assignment, so under some circumstances,
the use of such classes may be a performance issue. By judicious use of standard
C++ references, and function inlining, this performance impact can be ameliorated, and if necessary, bare pointers can be used within the innermost scope of
pointer chasing algorithms as a performance optimisation.
Reference counted references prove effective in implementing acyclic graph
structues — deleting the reference to the head node is sufficient to ensure that all
nodes are deleted. However, cycles of references will cause objects to remain in
existence, even when no references remain to the graph structure. One possible
means of dealing with this is to perform a graph walk at graph destruction
time, deleting links to objects that have already been traversed in the walk,
thus deleting any cycles. Then deleting the head node reference is sufficient to
delete the entire structure. This operation is most conveniently handled in the
destructor of some Graph class.
7
2.5
Pointers
Pointers create difficulties for Classdesc, since pointers may point to a single
object, an array of objects, functions, members or even nothing at all. When
array sizes are known at compile time, Classdesc issues an object descriptor
that loops over the elements, however arrays allocated dynamically on the heap
through the use of new cannot be handled, even in principle.
Because pointers cause problems with the DCAS and RAII paradigms, it
is worth discussing the uses that pointers are put to in C++, and alternatives
that are available. Many of the uses have been inherited from C, where pointer
usage is almost unavoidable in practical codes. Pointers are used in C++ for
the following purposes:
Passing by reference. This use is inherited from C, but superseded by C++’s
reference types.
Dynamic arrays. C++’s std::vector<T> container can be used for most dynamic array purposes without any extra overhead. It is DCAS, provided
the element type T is also DCAS, and satisfies the RAII technique. If a
standard container is not suitable, then a purpose-built container such as
shown that in figure 1 can be provided.
Strings. std::string provides a safe and DCAS-ready alternative to char*
variables.
Graph structures. Classdesc provides the DCAS-ready ref<T> which is suitable for graphs and trees.
Polymorphic objects. Classdesc provides the poly<T> for handling polymorphic object heirarchies in a DCAS fashion (§2.6).
Opaque handles. Opaque handles are used to improve compile times by hiding the actual implementation details, including instance variables, in a
separate compilation unit. This is not a major problem, but specific methods must be provided by the programmer for construction, destruction,
copying and serialisation of the object referenced by the opaque handle.
These may call automatically generated versions of the methods in the
separate compilation unit to reduce programmer burden.
Libraries. C language API libraries will often use pointers to data structures.
Where the details of these data structures are provided as part of the
interface file, it is possible to use the automatically generated (whether
compiler or Classdesc generated) methods to implement a DCAS wrapper
around these objects. Where opaque handles are used, however, one’s
choices are limited depending on whether the appropriate methods for
implementing copying and serialisation have been provided (some means of
construction and disposing of objects will always be provided), or whether
source code is available.
8
It turns out that one can distinguish between member pointers and normal
pointers quite easily through overloading of object descriptors. Member pointers are relevant for exposing an object’s methods to a scripting interface, for
example, and are also serialised and passed between processes in ClassdescMP
to implement a form of remote procedure calling. Classdesc does not distinguish between pointers to functions and pointers to objects as simple function
overloading is not sufficient to distinguish them. However, the Boost library provides a template metaprogramming technique for distinguishing between function pointers and objects pointers in its types_trait package, so providing
overloading for function pointers is planned for the future.
By default, an attempt to serialise a pointer will issue a runtime warning.
However, if pointer members are genuinely necessary, it is possible for the programmer to specify that pointers either point to a single object of the specified
DCAS type or are NULL if invalid. We call this the graphnode protocol. This
situation is most likely to occur when using a “legacy” library that deals with
pointers, and wrapping the data with something like ref is prohibitive. The
gSOAP package[22] is an example.
Within the Classdesc system it is possible to specify that all pointers of a
given pointer type satisfies the graphnode protocol, or that all pointers within
a given graph structure satisfy the graphnode protocol. The pack descriptor
than walks the graph structure keeping a track of nodes visited so that cycles
are handled, and recursion cut off to avoid stack limits being breached.
2.6
Polymorphism
C++ has two notions of polymorphism, compile-time and runtime. Compiletime polymorphism (aka generic programming) is implemented in terms of templates, and allows the provision of code that can work on many different types
of objects. On the other hand, runtime polymorphism involves the use of virtual
member functions. Whereever generic programming can solve a task, it is to be
preferred over runtime polymorphism, as virtual member functions introduce
procedure call overhead, and inhibit optimisation. Furthermore, the use of a
DCAS class like poly introduces additional overheads.
Nevertheless, there are situations that cannot be solve with compile-time
polymorphism, for example a container containing objects of varying types.
For this purpose, Classdesc’s poly type is useful. To use poly, your object
heirarchy must implement the following interface (provided as an abstract base
class object).
struct object
{
typedef int TypeID;
virtual TypeID type() const=0;
virtual object* clone() const=0;
virtual void pack(pack_t *b) const=0;
virtual void unpack(pack_t *b)=0;
9
virtual ~object() {}
};
The type() method implements a simple runtime type identifier system. In
the case of object, it uses simple integer tags, which are assumed to be allocated
more or less consequitively to types in the type heirarchy. However, any type
may be used provided it is exported as the typedef TypeID, and an appropriate
customised type table class is defined (see below). One possibility, although by
no means the most efficient, is to use the object’s type_info object returned
by C++’s inbuilt run time type identification system[21, §15.4.4].
It is not actually necessary to use this abstract base class to use poly. The
base class (which must be default constructible, hence not abstract) is passed to
the poly template. Classdesc provides an empty concrete class Eobject which
can be used for this purpose.
To assist in deriving classes from object, the Object template is provided.
template <class This, int Type, class Base=object> struct Object;
The first template argument This is the class you’re currently defining, the
second (Type) is the integer value of its type tag and Base is the base class you
are deriving from. Eobject is defined as
class Eobject: public Object<Eobject,0> {};
and a new class (eg foo) with type ID 1 can be defined
class foo: public Object<foo,1,Eobject> {...
This saves having to explicitly provide versions of the virtual functions type(),
clone(), pack() and unpack(), as these are provided by Object. It also provides a utility method cloneT() which executes clone(), but instead of returning a bare object pointer, returns a pointer to an object of the same type as
the calling object (if legally convertible via dynamic_cast).
The synopsis of poly is:
template <class T=Eobject, class TT=SimpleTypeTable<T> >
class poly
{
public:
TT TypeTable;
poly();
poly(const polyref& x);
poly(const T& x);
poly& operator=(const poly& x);
poly& operator=(const T& x);
template <class U> void addObject();
template <class U, class A> void addObject(A);
template <class U, class A1, class A2> void addObject(A1, A2);
10
T* operator->();
T& operator*();
const T* operator->() const;
const T& operator*() const;
template <class U> U& cast();
template <class U> const U& cast();
void swap(poly& x);
};
Most of this is fairly straightforward. However the addObject() and cast()
methods need a little more explanation. To make the poly object an object of
type (say foobar), use the following calls:
poly.addObject<foobar>(); //calls foobar()
poly.addObject(1);
//calls foobar(1)
poly.addObject(1,"hello"); //calls foobar(1,"hello");
poly.addObject(foobar(x,y,z)); //more than 2 arguments
The cast method provides a convenient method casting the poly object to
a specific type. It is equivalent to calling dynamic_cast, but a little easier to
use, ie
poly.cast<foobar>().grunge() <=> dynamic_cast<foobar&>(*poly).grunge();
The return type was chosen to be a reference, not a pointer, as this is the more
convenient form. It can easily be converted to a pointer with the & operator.
The TypeTable member of poly must implement the following interface
class typetable
{
Base& operator[](TypeID);
void register_type(const Base&);
};
where Base is the base type of the poly class, and is basically a database of
reference objects, from which new objects can be constructed using clone(),
given a type identifier. This is used for implementing serialisation. Classdesc
provides simple implementation of this as SimpleTypeTable<Base>, where the
TypeIDs are integers that are reasonably close to each other.
2.7
Member Privacy
Serialisation descriptors need access to all members of an object, including private and protected ones. Since in C++ class namespaces are closed by design
(no new members can be added, except by inheritance), descriptors need to be
placed in a global or an open namespace. This means that friend declarations
need to be added to all class definitions with private or protected areas. The
11
convention adopted by Classdesc is to define two macros that expand to a list
of friend declarations for the descriptors, similar to the following:
#define CLASSDESC_ACCESS(type)\
friend void pack(pack_t *,eco_string,type&);\
friend void unpack(unpack_t *,eco_string,type&);
#define CLASSDESC_ACCESS_TEMPLATE(type)\
friend void pack<>(pack_t *,eco_string,type&);\
friend void unpack<>(unpack_t *,eco_string,type&);
Then placing a CLASSDESC_ACCESS statement in the class definition allows
the descriptor access to the private members of the class:
class foo
{
int bar;
CLASSDESC_ACCESS(foo);
public:
float bar2;
};
An auxiliary program insert-friend is provided as part of the Classdesc
package to automatically insert these macros into class definitions.
For object exposure, only public members need to be processed by the descriptor. Classdesc provides a -respect_private flag to indicate that private
and protected members should be ignored by the descriptor.
3
3.1
ClassdescMP: easy MPI programming in C++
MPIbuf
MPI[17] is an industry standard API for constructing distributed memory parallel applications using the message passing metaphor. Originally designed for
use with Fortran77 and C, it primarily deals with passing arrays of simple types
such as characters, integers or floating point numbers. In a later incarnation,
C++ bindings to the library were provided as part of the MPI-2 standard. It
primarily added support for the MPI namespace, communicators as objects and
support for C++ exception handling. However, messages are fundamentally
composed of arrays of simple types.
Classdesc’s general serialisation operation solves the problem of passing messages of complex objects as the pack descriptor turns a sequence of complex
objects into an array of bytes. In ClassdescMP, the MPIbuf type is derived from
pack_t, so messages can be constructed in a streaming fashion, eg:
buf << a << b << send(1);
12
which sends a and b to process 1.
Streaming MPI messages is not new — it is used in PARA++[6], and in
OOMPI[3], for example. However, in these packages, programmers are required
to provided explicit serialisation routines for complex types.
To receive a message, use the MPIbuf::get():
buf.get() >> a >> b;
Optional arguments to get allow selective reception of messages by source and
tag.
By setting the preprocessor macro HETERO, MPIbuf is derived from xdr_pack
instead of pack_t. This allows ClassdescMP programs to be run on heterogeneous clusters, where numerical representation may differ from processor to
processor.
In MPI-2 C++ bindings, the basic object handling messages is a communicator. In ClassdescMP, an MPIbuf has a communicator. It also has a buffer,
and assorted other housekeeping members. Some of these are used for managing
asynchronous communication patterns:
{
MPIbuf buf;
buf << a << isend(1);
while (something_to_do && !buf.sent()) do_something;
buf.wait();
buf << b << isend(2);
...
}
When buf goes out of scope, an implicit MPI_Wait is called to ensure that the
message has been correctly sent.
Often, one needs to perform all-to-all exchange of data. To do this, we use
an MPIbuf_array:
{
...
tag++;
MPIbuf_array sendbuf(nprocs());
for (unsigned proc=0; proc<nprocs(); proc++)
{
if (proc==myid()) continue;
sendbuf[proc] << requests[proc] << isend(proc,tag);
}
for (int i=0; i<nprocs()-1; i++)
{
MPIbuf b;
b.get(MPI_ANY_SOURCE,tag);
b >> rec_req[b.proc];
}
}
13
This piece of code is copied verbatim from the Graphcode library (§4). Note the
use of a tag variable to ensure that unrelated groups of communication do not
get mixed up. Also, when sendbuf goes out of scope, an implicit MPI_Waitall
called, which ensures that all messages in the group have been sent.
3.2
MPISPMD
Whilst MPIbuf and MPIbuf_array are the heart of ClassdescMP, there is also
some application framework support. Two programming models are supported:
an SPMD mode, which simply wraps up the MPI setup and teardown into
an object, and a master-slave mode in which the master thread controls slave
thread objects via remote method invocation.
The SPMD mode is rather similar to that of PARA++[6]. By instantiating
an object of type MPISPMD, the MPI environment is initialised. One key feature of Classdesc’s implementation is that MPI_Finalize() is called from the
MPISPMD object’s destructor — not only does this save the programmer from
having to remember to do this, but it is also called during stack unwinding if
an exception is thrown. This alleviates the problem with some MPI implementations (eg MPICH) which leave active threads running and consuming CPU
time if MPI_Finalize() is not called.
3.3
MPIslave
The master-slave mode is a more powerful feature of ClassdescMP. Setting up
the structure of a master-slave program is very tedious and error prone. The
MPIslave class is designed to make master-slave algorithms simple to program.
When a MPIslave object is instantiated, a slave “interpreter” object is instantiated on each process to receive messages from the master. As MPIslave
needs to know the type of object to be instantiated on the slave processes, it is
implemented as a template, with the type of slave object passed as the template
parameter.
A message sent to the slave process starts with a method pointer of type:
void (S::*)(MPIbuf&) where S is the slave object type, followed by the arguments to be passed. That method of the slave object is then called, with the
arguments passed through MPIbuf argument, and any return values also passed
through MPIbuf argument:
struct S
{
void foo(MPIbuf& args)
{
int x,y,r;
args >> x >> y;
...
args.reset() << r;
}
14
};
main(int argc, char** argv)
{
MPIslave<S> C;
MPIbuf buf;
int x=1, y=2;
buf << &S::foo << x << y << send(1);
}
When the MPIslave object is destroyed on the master process, it arranges
for all the slave objects to be MPI_Finalized() and destroyed also.
MPIslave also has features for managing a pool of idle slaves:
MPIslave<S> C(argc,argv);
vector<job> joblist;
for (int p=1; p<C.nprocs && p<joblist.size(); p++)
C.exec(C << &S::do_job << joblist[p]);
while (p<joblist.size())
{
process_return(C.get_returnv());
C.exec(C << &S::do_job << joblist[p++]);
}
while (!C.all_idle())
process_return(C.get_returnv());
3.4
Access to underlying MPI functions
The philosophy of ClassdescMP is not to hide the underlying MPI transport
layer. It is possible to mix MPI calls with ClassdescMP calls, which may be
done to provide a more efficient implementation of a particular operation, or
to provide functionality not provided in ClassdescMP (reductions for example).
This allows ClassdescMP to concentrate on providing new functionality, rather
than simply wrapping existing MPI functionality in a new syntax.
In terms of performance, the only overhead ClassdescMP adds is copying
data into the MPIbuf variable. In the case of sending a large array of a simple
type, it may well be more efficient to call the appropriate MPI call directly. On
the other hand, if one is sending a lot of different small variables, it is more
efficient to marshal the data into a single array, before sending it as a single
message, for which task ClassdescMP is extremely effective.
This philosophy of coexisting with the underlying MPI library is in sharp
contrast with PARA++[6], which was designed to allow the transport layer to
be swapped completely for another one (eg PVM). However, MPI is now so
ubiquitous that swapping the transport layer no longer seems to have much of
an advantage.
Currently, ClassdescMP is implemented completely in terms of MPI-1 functionality. As MPI-2 implementations become available, increased performance,
15
and or functionality dependent on MPI-2 functionality may be added. The most
obvious MPI-2 feature to impact ClassdescMP is one-sided messaging, which
would allow the implementation of the global pointer concept[7]. Unfortunately,
one-sided messaging appears to be the one area of MPI-2 left out of existing
implementations, or implemented badly. One could implement one-sided messaging using a standard threads API, such as Posix threads, however in real
applications encountered to date, separating the communication and computation steps (see §4.6) has proved effective, so we haven’t needed to explore
one-sided communication.
4
Graphcode
Whilst MPISPMD and MPIslave provide rather simple application frameworks
for message passing codes, Graphcode provides a far richer framework within
which programming is closer to data parallel programming than the lower level
message passing environment on which it is based. The underlying paradigm
of Graphcode is objects distributed on a graph. Computation takes place within
the objects (vertices of the graph), and communication takes place along the
edges of the graph.
Graphcode calls the PARMETIS parallel graph partitioner[15, 14] to partition
the graph across the available processors, given a suitable weighting of computational and communication costs (which defaults to a uniform weighting). Since
the solution found by PARMETIS is a Pareto non-dominated solution (no other
partitioning exists that has better load balancing and less communication), the
costs do not need to be provided in any normalised fashion — only the leading
order of computational or communication complexity need be provided.
Since traditional data parallel programs can be expressed as a graph (put
aligned data elements on the same node, express communication patterns as
graph links, eg shifts as nearest neighbour connections), it could be argued
that Graphcode embraces and extends the data parallel programming model.
However the data layout within a compute node differs. For instance, if one
considers a 5-point stencil of some hypothetical 2 component field:
u′i,j
=
′
vi,j
=
1
vi,j − (vi−1,j + vi+1,j + vi,j−1 + vi,j+1 )
4
1
ui,j − (ui−1,j + ui+1,j + ui,j−1 + ui,j+1 )
4
(1)
then Graphcode will store ui,j next to vi,j , whereas an HPF implementation
will store ui,j next to ui+1,j . It remains to be seen what impact this has on
performance in typical situations.
16
4.1
Graphcode objects
A Graphcode graph is represented by the Graph class. Nodes of the graph
are polymorphic objects, derived from the object abstract base class. Being
polymorphic allows more complex topologies, such as hypergraphs, where nodes
may belong to more than groupings. For example consider an object class
representing a human being, and also another object representing the families
that human being might belong to, for instance the family e was born into, and
the family e married into:
class human: public object
{
...
};
class family: public object
{
...
};
The relationship belongs to is represented by a link connecting a human object
with a family object. The reverse link represents the relationship contains.
Graphcode objects may be located on any processor, and may need to
be migrated to achieve dynamic load balancing. Objects are accessed through
proxy variables, of type objref. An objref contains the object’s identifier, its
location (processor ID), and may be dereferenced to obtain access to the object
(if the object is located in the current process’s address space), or a copy of the
object (if it exists in the current process’s address space):
class objref
{
public:
GraphID_t ID;
unsigned int proc;
object& operator*();
object* operator->();
const object* operator->() const;
bool nullref() const;
inline void nullify();
void addref(object* o, bool mflag=false);
};
The members nullref() allow one to test whether the objref points to
a copy of the object in the current address space, and nullify() allows one
to remove the copy of the object. addref(&obj,mflag) points the objref at
object obj, setting mflag (managed flag) to true allows the objref destructor
to destroy the object.
17
Several virtual members need to be provided for any object, including virtual serialisation members pack and unpack as described in §2.6, a “virtual
constructor”, a “virtual copy constructor” and a virtual type identifier. “Virtual constructors” are described in [21, §15.6.2], and the exact procedure used
in Graphcode is detailed below.
To migrate objects between processors, Graphcode will arrange the following
sequence of operations:
Code on source processor
objref a;
MPIbuf b;
b << a.ID << a->type() << *a << send(dest);
Code on destination processor
MPIbuf b;
GraphID_t ID;
int type;
b.get() >> ID >> type;
objref& a=objects[ID];
if (a.nullref())
a.addref(archetype[type]->lnew(),true);
b >> *a;
Note the use of the “virtual constructor” lnew(). We use the type information to index into a database of object archetypes, and call lnew() to obtain a
new object of that type. A programmer defining an object class foo defines the
virtual members as follows:
class foo:
{
public:
virtual
virtual
virtual
virtual
virtual
}
public object
int type() {return vtype(*this);}
object* lnew() {return vnew(this);}
object* lcopy() {return vcopy(this);}
void lpack(pack_t *b);
void lunpack(pack_t *);
The template function vnew() returns a pointer to a new object of the same
type as its argument, and vcopy() returns a copy of the object pointed to by
its argument. Both of these functions use the C++ new operator, so can be
disposed of using delete at a later stage.
Graphcode implements its own runtime type identification — the standard
C++ RTTI typeid() call returns a complex object of type type_info. Not only
is it inefficient to transfer the whole type_info object via MPI, and inefficient
to use a complex object to index into the archetype database, we also have the
potential scenario of the object codes on different processors being generated by
18
different compilers (a heterogeneous computer), and hence having incompatible
type_info objects.
Graphcode’s RTTI system is very simple. An object’s virtual type member
makes a call to the template function vtype, which places a version of itself into
the archetype database:
template <class T> int vtype(const T& x)
{
static int t=-1;
if (t==-1)
{
t=archetype.size();
objref *o=new objref; o->addref(x.lnew());
archetype.push_back(o);
}
return t;
}
Having discussed the virtual function interface of object, we are now ready
to present to full definition of object:
class object: public Ptrlist
{
public:
/* serialisation methods */
virtual void lpack(pack_t *buf)=0;
virtual void lunpack(pack_t *buf)=0;
/* virtual "constructors" */
virtual object* lnew() const=0;
virtual object* lcopy() const=0;
virtual int type() const=0;
virtual idxtype weight() const {return 1;}
virtual idxtype edgeweight(const objref& x) const {return 1;}
};
As well as the virtual members we have described, there are two weight functions
used by the ParMETIS partitioner, used to described the computational cost
(weight()) represented by the object, and the communication cost (edgeweight(x))
in transferring a copy of a remote object x into local address space. As can be
seen, these default to 1, but may be overridden by the programmer of the derived object. Finally, object is derived from Ptrlist, which is syntactically
equivalent to a vector of objref’s, and represents the objects linked to this
object.
As can be seen, there is a lot of similarity between the Graphcode object
type and the object type used with the poly<T> class. Graphcode was the first
real application of Classdesc to a polymorphic data structure, and so its design
stongly influenced that of the poly<T>, which was developed later. At a later
19
stage, we hope to migrate the Graphcode API to use the ref<T> and poly<T>
interfaces to more closely couple Graphcode with Classdesc.
4.2
omap
Each object is identified by a unique identifier, so each process maintains a map
object Graph::objects that can be used to locate the objref corresponding to
a particular identifier. Graphcode supplies two possible map objects — a vmap,
using a std::vector which is optimised for contiguous, or nearly contiguous
ranges of object identifiers, and hmap, a hash map implementation suitable for
non-contiguous identifiers. You select the version of omap you wish to use by
using the namespace graphcode_vmap or graphcode_hmap as appropriate.
It might seem puzzling why the Graph type is not a template, with the
omap type as a template argument. The problem is that internally, objects
need to keep track of the map to which they belong in order to regenerate the
neighbourhood linklist after migration. Therfore, the map type will need to be
a template argument to the objref, but the map itself takes objref as a template
argument, unfortunately leading to a circular template definition of objref:
template <class map> class objref;
template <class map>
class omap: public map
{
};
template <class map>
class objref
{
omap<map> Map;
};
...
typedef std::map<int,objref<Map> > Map;
omap<Map> foo;
In practice, compilers cannot cope with this code.
4.3
Standard library syntax
Wherever possible, the syntax of Graphcode’s containers follows that of the
standard library, so should be familiar to C++ programmers. So Ptrlist and
omap have iterators, and an operator[]. One slight departure from the standard library, is that omap::iterator::operator*() returns an objref, not
pair<GraphID_t, objref>, as one might expect if one followed the std::map
model. The reason for this is that objref objects already contain the object’s
20
identifier, and the pair construct is redundant and wasteful. It also leads to
clearer code.
4.4
Graph
Having introduced objects, objrefs and omaps, we are now in a position to
present a skeleton of Graphcode’s Graph class.
class Graph: public Ptrlist
{
public:
omap objects;
void rebuild_local_list();
void clear_non_local();
template <class T> objref& AddObject(const T& type, GraphID_t id);
void gather();
void Prepare_Neighbours();
void Partition_Objects();
inline void Distribute_Objects();
};
Graph contains two main data members — the objects database mentioned
previously, and a list of object references that refers those objects hosted in the
current address space. This list is a base class of Graph, allowing a simple loop
of the form:
for (Ptrlist::iterator i=begin(); i!=end(); i++)
to be, in effect, a data parallel operation.
The member rebuild_local_list() refreshes this list after a migration of
objects, and the member clear_non_local() nullifies those objrefs that are
not hosted locally, reclaiming memory.
Creating a graph involves calls to AddObject to add an object of type T
(which must be derived from object), and adding the links to each object to
form the graph. For example, the code for a 2D 5-point stencil might look like:
for (i=0; i<nx; i++)
for (j=0; j<ny; j++)
AddObject(foo(),mapid(i,j));
for (i=0; i<nx; i++)
for (j=0; j<ny; j++)
{
objref& o=objects[mapid(i,j)];
o->push_back(objects[mapid(i-1,j)]);
o->push_back(objects[mapid(i+1,j)]);
o->push_back(objects[mapid(i,j-1)]);
o->push_back(objects[mapid(i,j+1)]);
}
21
where the user supplied function mapid(,) converts a coordinate into a pin identifier. Boundary conditions can be handled by returning the special identifier
bad_ID when no link is applicable. The Graph::AddObject and Ptrlist::push_back()
members refuse to add on object having a bad_ID identifier.
4.5
Distribution of data over multiple processors
To distribute objects from the master thread to slave threads, according to some
specified distribution, assign the desired destination of the objects to the proc
member, then call Graph::Distribute_Objects(), which broadcasts the entire
graph to all nodes. There is an inverse Graph::gather() function that gathers
data from all the nodes into the master thread copy.
To partition the objects using PARMETIS, you must first distribute the graph
according to some distribution (no matter how naı̈ve and non-optimal), and
then call Graph::Partition_Objects() to redistribute the Graph more optimally by calling the PARMETIS library. Partition_Objects() can be then
called periodically to rebalance the load, if the graph contains mobile agents for
instance.
Whilst is conceptually the easiest to construct the entire computation on the
master process, and distrbute the data using Graph::Distribute_Objects(),
it is possible to for each process to construct just its part of the computation,
and for Graph::Partition_Objects() to rebalance the load without all the
data needing to pass through a single process’s address space.
4.6
Communication and computation steps
In typical Graphcode applications deployed to date, an update involves performing a computation on each object using the values of the neighbouring objects,
storing the results into a backing buffer graph, and then swapping the backing buffer with the original graph, typical of a synchronous updating scheme.
Asynchronous schemes could be employed as well with due care. The only
communication required is to ensure a copy of all neighbours residing on remote processes is transferred to the processor hosting the object being updated.
Whilst this could be done as needed via one-sided messages, it is more efficient
to batch up all the objects that need to be transferred so that only one message is sent between each pair of processes. Since the communication pattern
is already described by the graph’s links, all a programmer needs to do is make
a call to Graph::Prepare_Neighbours() before starting the computation step.
Returning to our 5 point stencil example (Eq (1)), the update code would be
written as:
graph->Prepare_Neighbours(); /* communication step */
for (Ptrlist::iterator p=graph->begin(); p!=graph->end(); p++)
{
foo* b=fooptr(back->objects[p->ID]);
b->u = fooptr(p)->v;
22
b->v = fooptr(p)->u;
for (Ptrlist::iterator n=p->begin(); n!=p->end(); n++)
{
b->u -= 0.25 * fooptr(n)->v;
b->v -= 0.25 * fooptr(n)->u;
}
}
swap(graph,back);
Here graph and back are the graph and backing buffer for the calculation. We
are also assuming a utility function fooptr() written by the programmer to
return a foo* pointer to the object. A typical implementation of this might be:
foo *fooptr(objref& x) {return dynamic_cast<foo*>(&*x);}
foo *fooptr(Ptrlist::iterator x) {return dynamic_cast<foo*>(&**x);}
It is important to use the new dynamic_cast feature of C++ to catch errors such
x not referring to a foo object, or an incorrect combination of dereferencing and
address-of operators. dynamic_cast will return a NULL pointer in case of error,
which typically causes an immediate NULL dereference error. Old fashioned C
style casts (of the type (foo*)) will simply return an invalid pointer in case of
error, which can be very hard to debug.
It should be noted that a Graph object appears as a list of those objects local
to the executing processor. So this code will execute correctly in parallel. Each
time Prepare_Neighbours is called, the message tag is incremented, preventing
subsequent calls from interfering with the delivery of the previous batches of
messages.
4.7
Deployed applications and performance
Within the EcoLab system[18], Graphcode is deployed with two of the example
models provided with the EcoLab software. These models are working scientific
models, not toy examples. The first model is the spatial Ecolab model[19],
where the panmictic Ecolab model (Lotka-Volterra ecology equations, coupled
with mutation) is replicated over a 2D Cartesian grid, and migration is allowed
between neighbouring grid cells. The performance of this model has not been
studied much yet.
The second model is one of jellyfish in assorted lakes on the islands of Palau.
Each jellyfish is represented as a separate C++ object, commonly called agent
based modelling. The jellyfish move around within a continuous space representing the lake, and from time to time bump into each other. In order to determine
if a collision happens in the next timestep, each jellyfish must examine all the
other jellyfish to see if its path intersects that of the other. This is clearly an
O(N 2 ) serial operation, which severely limits scalability of the model.
To improve scalability, the lake is subdivided into a Cartesian grid, and the
jellyfish is allocated to the cell describing its position. If the cells are sufficiently
large that the jellyfish will only ever pass from one cell to its neighbouring cell
23
35
linear
9am
noon
3pm
6pm
9pm
30
Speedup
25
20
15
10
5
0
0
5
10
15
20
No. processors
25
30
Figure 2: Speedup of the Jellyfish application with 1 million jellyfish in the OTM
lake. Speedup is reported as accumulated wall time for a single processor divided
by the accumulated wall time for n processors for that point in the simulation.
Note that the speedup from 16 processors to 32 is more than double.
in a given timestep, then only the jellyfish within the cell, plus those within
the nearest neighbours need to be examined. This reduces the complexity of
the algorithm to dramatically less than O(N 2 ), and also allows the algorithm
to be executed in parallel. In the field of molecular dynamics simulations, this
method is often called a particle in cell method. PARMETIS allows nodes and
edges to be weighted, so in this case we weight each cell by wi = n2i , and each
edge by vij = nj . In figure 2, the speedup (relative performance of the code
running on n processors versus 1 processor) is plotted for different stages of the
simulation. The simulation starts at 7am with the jellyfish uniformly distributed
throughout the lake. As the sun rises in the east, the jellyfish track the sun, and
become concentrated along the shadow lines. PARMETIS is called repeatedly to
rebalance the calculation. As the sun sets at around 5pm, the jellyfish disperse
randomly throughout the lake. In figure 3, the speedup is plotted as function
of simulation time, so the effect of load unbalancing can be seen. It can be seen
that Graphcode delivers scalable performance in this application.
Graphcode has also been deployed in a 3D artificial chemistry model[8] exhibiting superlinear speedup over 64 processors due to the effectively enlarged
24
35
16
2 processors
4 processors
8 processors
16 processors
32 processors
14
12
Speedup
10
8
6
4
2
0
8
10
12
14
16
Time of day (24 hour clock)
18
20
Figure 3: Speedup of the Jellyfish application as a function of simulation time.
This is differential speedup, calculated from the wall time needed to simulate a
6 minute period, so does not include partitioning time.
25
22
memory cache.
5
Current Status
Classdesc and Graphcode are open source packages written in ISO standard
C++. They have been tested on a range of platforms, and compilers, including
Linux, Mac OSX, Cygwin (Windows), Irix, Tru64; gcc and Intel’s icc for Linux,
as well as native C++ compilers for Irix and Tru64.
The source code is distributed through a SourceForge project, available from
http://ecolab.sourceforge.net. The code is managed by the Aegis source code
management system, which is browsable through a web interface. Version numbers of the form x.Dy are considered “production ready” — they have been
tested on a range of platforms, and are more likely to be reliable. These codes
are also available through the SourceForge file release system. The versions
x.y.Dz are under active development, and have only undergone minimal testing
(ie they should compile, but may still have significant bugs). Developers interested in contributing to the code base can register as a developer of the system
by emailing one of the authors.
Classdesc and Graphcode are also included as part of the EcoLab simulation
system, which is available from the same source code repository.
Acknowledgments
This work was funded by a grant from the Australian Partnership for Advanced
Computing (APAC) under the auspices of its Computational Tools and Techniques programme. Computer time was obtained through the Australian Centre
for Advanced Computation and Communication (ac3).
References
[1] Draft technical report on C++ library extensions. Technical Report DTR
19768, International Standards Organization, 2005.
[2] Charles H. Koelbel amd David B. Loveman, Robert S. Schreiber, Guy L.
Steele, Jr., and Mary E. Zosel. The High Performance Fortran Handbook.
MIT Press, Cambridge, Mass., 1994.
[3] J. M. Squyres an B. C. McCandless and A. Lumsdaine. Object oriented
MPI: A class library for the message passing interface. In Proceedings of
the POOMA conference, 1996.
[4] David M. Beazley.
SWIG : An easy to use tool for integrating scripting languages with C and C++.
In Proceedings of 4th Annual USENIX Tcl/Tk Workshop. USENIX, 1996.
http://www.usenix.org/publications/library/proceedings/tcl96/beazley.html.
26
[5] Greg Colvin, Beman Dawes, and Darin Adler.
http://www.boost.org/.
Boost Smart Pointers.
[6] O. Coulaud and E. Dillon. PARA++: C++ bindings for message passing
libraries. users guide. Technical report, INRIA, 1995.
[7] Dennis Gannon, Shridar Diwan, and Elizabeth Johnson. HPC++ and the
Europa call reification model. ACM SIGAPP Applied Computing Review,
4:11–14, 1996.
[8] Duraid Madina, Naoki Ono, and Takashi Ikegami. Cellular evolution in
a 3d lattice artificial chemistry. In Banzhaf et al., editors, Advances in
Artificial Life, volume 2801 of Lecture Notes in Computer Science, pages
59–68, Berlin, 2003. Springer.
[9] Duraid Madina and Russell K. Standish. A system for reflection in C++.
In Proceedings of AUUG2001: Always on and Everywhere, page 207. Australian Unix Users Group, 2001.
[10] J. K. Ousterhout. TCL and the Tk Toolkit. Addison-Wesley, 1994.
[11] John K. Ousterhout. Scripting: Higher-level programming for the 21st
century. IEEE Computer, 31(3):23–30, 1998.
[12] J.V.W. Reynders, P.J. Hinker, J.C. Cummings, S.R. Atlas, S. Banerjee,
W.F. Humphrey, S.R. Karmesin, K. Keahey, M. Srikant, M.D. Tholburn,
et al. POOMA:aframework for scientific simulations of paralllel architectures. In Parallel Programming in C++, pages 547–588. MIT Press, Cambridge, MA, 1996.
[13] S. Roiser and P. Mato. The SEAL C++ reflection system. Interlaken,
Switzerland, 2004. http://chep2004.web.cern.ch/chep2004/.
[14] Kirk Schloegel, George Karypis, and Vipin Kumar. Parallel multilevel algorithms for multi-constraint graph partitioning. In A. Bode et al., editors,
Euro-Par 2000, volume 1900 of Lecture Notes in Computer Science, page
296, Berlin, 2000. Springer.
[15] Kirk Schloegel, George Karypis, and Vipin Kumar. A unified algorithm
for load-balancing adaptive scientific simulations. In Supercomputing 2000,
2000. http://www.sc2000.org/proceedings/techpapr.
[16] Will Schroeder, Ken Martin, and Bill Lorensen. The visualization toolkit :
an object-oriented approach to 3-D graphics. Prentice Hall, Upper Saddle
River, N.J., 1996.
[17] Marc Snir et al. MPI: the complete reference. MIT Press, Cambridge, MA,
1996.
[18] Russell K. Standish.
Ecolab
http://ecolab.sourceforge.net.
27
documentation.
Available
at
[19] Russell K. Standish. Cellular Ecolab. Complexity International, 6, 1999.
[20] Russell K. Standish and Richard Leow. EcoLab: Agent based modeling for C++ programmers. In Proceedings SwarmFest 2003, 2003.
arXiv:cs.MA/0401026.
[21] Bjarne Stroustrup. The C++ Programming Language. Addison-Wesley,
Reading, Mass., 3rd edition, 1997.
[22] Robert A. van Engelen and Kyle Gallivan. The gSOAP toolkit for web
services and peer-to-peer computing networks. In Proceedings of the 2nd
IEEE International Symposium on Cluster Computing and the Grid (CCGrid2002),, pages 28–135, Berlin, Germany, May 2002.
28
| 5cs.CE
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.